首页 > 最新文献

Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.最新文献

英文 中文
Packetostatics: deployment of massively dense sensor networks as an electrostatics problem 包静力学:作为静电问题的大规模密集传感器网络的部署
S. Toumpis, L. Tassiulas
We investigate the spatial distribution of wireless nodes that can transport a given volume of traffic in a sensor network, while requiring the minimum number of wireless nodes. The traffic is created at a spatially distributed set of sources, and must arrive at a spatially distributed set of sinks. Under a general assumption on the physical and medium access control (MAC) layers, the optimal distribution of nodes induces a traffic flow identical to the electrostatic field that would exist if the sources and sinks of traffic were substituted with an appropriate distribution of electric charge. This analogy between electrostatics and wireless sensor networks can be extended in a number of different ways. For example, Thomson's theorem on the distribution of electric charge on conductors gives the optimal distribution of traffic sources and sinks (that minimizes the number of nodes needed) when we have a limited degree of freedom on their initial placement. Electrostatics problems with Neumann boundary conditions and topologies with different types of dielectric materials can also be interpreted in the context of wireless sensor networks. The analogy also has important limitations. For example, if we move to a three dimensional topology, adapting our general assumption on the physical and MAC layers accordingly, or we stay in the two dimensional plane but use an alternative assumption, that is more suited to ultra wide band communication, the optimal traffic distribution is not in general irrotational, and so can not be interpreted as an electrostatic field. Finally, the analogy cannot be extended to include networks that support more than one type of traffic.
我们研究了在传感器网络中可以传输给定流量的无线节点的空间分布,同时需要最少数量的无线节点。流量是在空间分布的一组源上创建的,并且必须到达空间分布的一组汇点。在物理层和介质访问控制(MAC)层的一般假设下,节点的最优分布引起的交通流与用适当的电荷分布代替流量源和流量集时所存在的静电场相同。静电学和无线传感器网络之间的这种类比可以以许多不同的方式进行扩展。例如,关于导体上电荷分布的汤姆逊定理给出了当我们在初始位置上有有限自由度时,流量源和汇点的最佳分布(即所需节点的数量最小化)。具有诺伊曼边界条件和具有不同类型介电材料的拓扑结构的静电问题也可以在无线传感器网络的背景下解释。这种类比也有重要的局限性。例如,如果我们移动到三维拓扑,相应地调整我们对物理层和MAC层的一般假设,或者我们停留在二维平面但使用更适合超宽带通信的替代假设,则最佳流量分布通常不是无旋转的,因此不能解释为静电场。最后,这个类比不能扩展到包括支持多种类型流量的网络。
{"title":"Packetostatics: deployment of massively dense sensor networks as an electrostatics problem","authors":"S. Toumpis, L. Tassiulas","doi":"10.1109/INFCOM.2005.1498516","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498516","url":null,"abstract":"We investigate the spatial distribution of wireless nodes that can transport a given volume of traffic in a sensor network, while requiring the minimum number of wireless nodes. The traffic is created at a spatially distributed set of sources, and must arrive at a spatially distributed set of sinks. Under a general assumption on the physical and medium access control (MAC) layers, the optimal distribution of nodes induces a traffic flow identical to the electrostatic field that would exist if the sources and sinks of traffic were substituted with an appropriate distribution of electric charge. This analogy between electrostatics and wireless sensor networks can be extended in a number of different ways. For example, Thomson's theorem on the distribution of electric charge on conductors gives the optimal distribution of traffic sources and sinks (that minimizes the number of nodes needed) when we have a limited degree of freedom on their initial placement. Electrostatics problems with Neumann boundary conditions and topologies with different types of dielectric materials can also be interpreted in the context of wireless sensor networks. The analogy also has important limitations. For example, if we move to a three dimensional topology, adapting our general assumption on the physical and MAC layers accordingly, or we stay in the two dimensional plane but use an alternative assumption, that is more suited to ultra wide band communication, the optimal traffic distribution is not in general irrotational, and so can not be interpreted as an electrostatic field. Finally, the analogy cannot be extended to include networks that support more than one type of traffic.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"11 1","pages":"2290-2301 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91387121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 102
Time and energy complexity of distributed computation in wireless sensor networks 无线传感器网络中分布式计算的时间和能量复杂度
Nilesh Khude, Anurag Kumar, A. Karnik
We consider a scenario where a wireless sensor network is formed by randomly deploying n sensors to measure some spatial function over a field, with the objective of computing the maximum value of the measurements and communicating it to an operator station. We view the problem as one of message passing distributed computation over a geometric random graph. The network is assumed to be synchronous; at each sampling instant each sensor measures a value, and then the sensors collaboratively compute and deliver the maximum of these values to the operator station. Computation algorithms differ in the messages they need to exchange, and our formulation focuses on the problem of scheduling of the message exchanges. We do not exploit techniques such as source compression, or block coding of the computations. For this problem, we study the computation time and energy expenditure for one time maximum computation, and also the pipeline throughput. We show that, for an optimal algorithm, the computation time, energy expenditure and the achievable rate of computation scale as /spl Theta/(/spl radic/ n/log n), /spl Theta/(n) and /spl Theta/(1/log n) asymptotically (in probability) as the number of sensors n/spl rarr//spl infin/. We also analyze the performance of three specific computational algorithms, namely, the tree algorithm, multihop transmission, and the ripple algorithm, and obtain scaling laws for the computation time and energy expenditure as n/spl rarr//spl infin/. Simulation results are provided to show that our analysis indeed captures the correct scaling; the simulations also yield estimates of the constant multipliers in the scaling laws. Our analyses throughout assume a centralized scheduler and hence our results can be viewed as providing bounds for the performance with a distributed scheduler.
我们考虑一个场景,其中无线传感器网络是通过随机部署n个传感器来测量一个领域的一些空间功能而形成的,其目标是计算测量的最大值并将其传达给操作站。我们把这个问题看作是在一个几何随机图上传递消息的分布式计算问题。假设网络是同步的;在每个采样时刻,每个传感器测量一个值,然后传感器协同计算并将这些值的最大值传递给操作站。计算算法需要交换的消息不同,我们的公式主要关注消息交换的调度问题。我们没有利用诸如源压缩或计算块编码之类的技术。对于这一问题,我们研究了一次最大计算的计算时间和能量消耗,以及管道吞吐量。我们证明,对于最优算法,计算时间,能量消耗和可实现的计算规模速率为/spl Theta/(/spl radial / n/log n), /spl Theta/(n)和/spl Theta/(1/log n)渐近(概率上)为传感器数量n/spl rarr//spl infin/。我们还分析了三种具体的计算算法,即树算法、多跳传输和纹波算法的性能,得到了计算时间和能量消耗为n/spl rarr//spl infin/的比例规律。仿真结果表明,我们的分析确实捕获了正确的尺度;模拟还得出了标度定律中常数乘数的估计。我们的分析自始至终都假设使用集中式调度器,因此我们的结果可以被视为使用分布式调度器提供性能界限。
{"title":"Time and energy complexity of distributed computation in wireless sensor networks","authors":"Nilesh Khude, Anurag Kumar, A. Karnik","doi":"10.1109/INFCOM.2005.1498546","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498546","url":null,"abstract":"We consider a scenario where a wireless sensor network is formed by randomly deploying n sensors to measure some spatial function over a field, with the objective of computing the maximum value of the measurements and communicating it to an operator station. We view the problem as one of message passing distributed computation over a geometric random graph. The network is assumed to be synchronous; at each sampling instant each sensor measures a value, and then the sensors collaboratively compute and deliver the maximum of these values to the operator station. Computation algorithms differ in the messages they need to exchange, and our formulation focuses on the problem of scheduling of the message exchanges. We do not exploit techniques such as source compression, or block coding of the computations. For this problem, we study the computation time and energy expenditure for one time maximum computation, and also the pipeline throughput. We show that, for an optimal algorithm, the computation time, energy expenditure and the achievable rate of computation scale as /spl Theta/(/spl radic/ n/log n), /spl Theta/(n) and /spl Theta/(1/log n) asymptotically (in probability) as the number of sensors n/spl rarr//spl infin/. We also analyze the performance of three specific computational algorithms, namely, the tree algorithm, multihop transmission, and the ripple algorithm, and obtain scaling laws for the computation time and energy expenditure as n/spl rarr//spl infin/. Simulation results are provided to show that our analysis indeed captures the correct scaling; the simulations also yield estimates of the constant multipliers in the scaling laws. Our analyses throughout assume a centralized scheduler and hence our results can be viewed as providing bounds for the performance with a distributed scheduler.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"31 1","pages":"2625-2637 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87170174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
DHARMA: distributed home agent for robust mobile access DHARMA:用于强健移动接入的分布式家庭代理
Yun Mao, Björn Knutsson, Honghui Lu, Jonathan M. Smith
Mobile wireless devices have intermittent connectivity, sometimes intentional. This is a problem for conventional Mobile IP, beyond its well-known routing inefficiencies and deployment issues. DHARMA selects a location-optimized instance from a distributed set of home agents to minimize routing overheads; set management and optimization are done using the PlanetLab overlay network. DHARMA's session support overcomes both transitions between home agent instances and intermittent connectivity. Cross-layer information sharing between the session layer and the overlay network are used to exploit multiple wireless links when available. The DHARMA prototype supports intermittently connected legacy TCP applications in a variety of scenarios and is largely portable across host operating systems. Experiments with DHARMA deployed on more than 200 PlanetLab nodes demonstrate routing performance consistently better than that for best-case Mobile IP.
移动无线设备具有间歇性连接,有时是故意的。除了众所周知的路由效率低下和部署问题之外,这是传统移动IP的一个问题。DHARMA从一组分布式的本地代理中选择一个位置优化的实例,以最小化路由开销;使用PlanetLab覆盖网络进行集管理和优化。DHARMA的会话支持克服了主代理实例之间的转换和间歇性连接。会话层和覆盖网络之间的跨层信息共享用于在可用时利用多个无线链路。DHARMA原型在各种场景中支持间歇性连接的遗留TCP应用程序,并且在很大程度上可以跨主机操作系统移植。在200多个PlanetLab节点上部署DHARMA的实验表明,路由性能始终优于最佳情况下的移动IP。
{"title":"DHARMA: distributed home agent for robust mobile access","authors":"Yun Mao, Björn Knutsson, Honghui Lu, Jonathan M. Smith","doi":"10.1109/INFCOM.2005.1498346","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498346","url":null,"abstract":"Mobile wireless devices have intermittent connectivity, sometimes intentional. This is a problem for conventional Mobile IP, beyond its well-known routing inefficiencies and deployment issues. DHARMA selects a location-optimized instance from a distributed set of home agents to minimize routing overheads; set management and optimization are done using the PlanetLab overlay network. DHARMA's session support overcomes both transitions between home agent instances and intermittent connectivity. Cross-layer information sharing between the session layer and the overlay network are used to exploit multiple wireless links when available. The DHARMA prototype supports intermittently connected legacy TCP applications in a variety of scenarios and is largely portable across host operating systems. Experiments with DHARMA deployed on more than 200 PlanetLab nodes demonstrate routing performance consistently better than that for best-case Mobile IP.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"12 1","pages":"1196-1206 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73916684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Design multicast protocols for non-cooperative networks 设计非合作网络的组播协议
Weizhao Wang, Xiangyang Li, Zheng Sun, Yang Wang
Conventionally, most network protocols assume that the network entities that participate in the network activities will always behave as instructed. However, in practice, most network entities will try to maximize their own benefits instead of altruistically contribute to the network by following the prescribed protocols, which is known as selfish. Thus, new protocols should be designed for the non-cooperative network, which is composed of selfish entities. In this paper, we specifically show how to design strategyproof multicast protocols for non-cooperative networks such that these selfish entities will follow the protocols out of their own interests. By assuming that a group of receivers is willing to pay to receive the multicast service, we specifically give a general framework to decide whether it is possible, and how if possible to transform an existing multicast protocol to a strategyproof multicast protocol. We then show how the payments to those relay entities are shared fairly among all receivers so that it encourages collaboration among receivers. As a running example, we show how to design the strategyproof multicast protocol for the currently used core-based multicast structure. We also conduct extensive simulations to study the relations between payment and cost of the multicast structure.
通常,大多数网络协议都假定参与网络活动的网络实体总是按照指示行事。然而,在实践中,大多数网络实体会试图最大化自己的利益,而不是按照规定的协议无私地为网络做出贡献,这被称为自私。因此,对于由自私实体组成的非合作网络,需要设计新的协议。在本文中,我们具体展示了如何为非合作网络设计防策略多播协议,使这些自私的实体出于自己的利益而遵循协议。通过假设一组接收者愿意付费来接收多播服务,我们特别给出了一个通用框架来确定它是否可能,以及如果可能的话如何将现有的多播协议转换为防策略的多播协议。然后,我们将展示如何在所有接收者之间公平地共享对这些中继实体的支付,从而鼓励接收者之间的协作。作为一个运行的例子,我们展示了如何为目前使用的基于核心的组播结构设计防策略组播协议。我们还进行了大量的仿真来研究多播结构的付费和成本之间的关系。
{"title":"Design multicast protocols for non-cooperative networks","authors":"Weizhao Wang, Xiangyang Li, Zheng Sun, Yang Wang","doi":"10.1109/INFCOM.2005.1498442","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498442","url":null,"abstract":"Conventionally, most network protocols assume that the network entities that participate in the network activities will always behave as instructed. However, in practice, most network entities will try to maximize their own benefits instead of altruistically contribute to the network by following the prescribed protocols, which is known as selfish. Thus, new protocols should be designed for the non-cooperative network, which is composed of selfish entities. In this paper, we specifically show how to design strategyproof multicast protocols for non-cooperative networks such that these selfish entities will follow the protocols out of their own interests. By assuming that a group of receivers is willing to pay to receive the multicast service, we specifically give a general framework to decide whether it is possible, and how if possible to transform an existing multicast protocol to a strategyproof multicast protocol. We then show how the payments to those relay entities are shared fairly among all receivers so that it encourages collaboration among receivers. As a running example, we show how to design the strategyproof multicast protocol for the currently used core-based multicast structure. We also conduct extensive simulations to study the relations between payment and cost of the multicast structure.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"1 1","pages":"1596-1607 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75096040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Spatial-temporal analysis of passive TCP measurements 被动TCP测量的时空分析
E. Brosh, Galit Lubetzky-Sharon, Y. Shavitt
In this paper we look at TCP data which was passively collected from an edge ISP, and analyze it to obtain some new results and deeper understanding of TCP loss process. The focus of our study is to identify the 'root cause' links, i.e., the links that are responsible for the majority of the losses or reorders found on the end-to-end TCP connection. We suggest a new root cause criterion and a cost-effective algorithm to identify the root cause links. The algorithm incorporates a new out-of-sequence packet classification technique which is interesting by itself. We test our algorithm on the collected and simulated data and analytically justify its correctness. The simulation results show that the algorithm has a 95% detection rate with 10% false detection rate. We also analyze TCP temporal loss process, and found that the burst loss size is geometrically distributed. We analyze the TCP time-out loss indication under the Bernoulli loss model, which is the simplest model that can cause a geometric distribution, and show that the behavior of the TCP loss process is not different than when tail drop is assumed.
本文对从边缘ISP被动采集的TCP数据进行了分析,得到了一些新的结果,对TCP丢失过程有了更深入的认识。我们研究的重点是确定“根本原因”链接,即对端到端TCP连接上发现的大部分损失或重排序负责的链接。我们建议一个新的根本原因标准和一个经济有效的算法来识别根本原因链接。该算法结合了一种新的乱序包分类技术,该技术本身就很有趣。我们在收集和模拟的数据上测试了我们的算法,并分析证明了它的正确性。仿真结果表明,该算法的检测率为95%,误检率为10%。分析了TCP的时间损耗过程,发现突发损耗大小呈几何分布。本文分析了能引起几何分布的最简单的伯努利损耗模型下的TCP超时损耗指示,并表明TCP损耗过程的行为与假设尾部下降时的行为没有什么不同。
{"title":"Spatial-temporal analysis of passive TCP measurements","authors":"E. Brosh, Galit Lubetzky-Sharon, Y. Shavitt","doi":"10.1109/INFCOM.2005.1498324","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498324","url":null,"abstract":"In this paper we look at TCP data which was passively collected from an edge ISP, and analyze it to obtain some new results and deeper understanding of TCP loss process. The focus of our study is to identify the 'root cause' links, i.e., the links that are responsible for the majority of the losses or reorders found on the end-to-end TCP connection. We suggest a new root cause criterion and a cost-effective algorithm to identify the root cause links. The algorithm incorporates a new out-of-sequence packet classification technique which is interesting by itself. We test our algorithm on the collected and simulated data and analytically justify its correctness. The simulation results show that the algorithm has a 95% detection rate with 10% false detection rate. We also analyze TCP temporal loss process, and found that the burst loss size is geometrically distributed. We analyze the TCP time-out loss indication under the Bernoulli loss model, which is the simplest model that can cause a geometric distribution, and show that the behavior of the TCP loss process is not different than when tail drop is assumed.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"17 1","pages":"949-959 vol. 2"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82571651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Improving VoIP quality through path switching 通过路径交换提高VoIP质量
S. Tao, Kuai Xu, A. Estepa, Teng Fei, Lixin Gao, R. Guérin, J. Kurose, D. Towsley, Zhi-Li Zhang
The current best-effort Internet cannot readily provide the service guarantees that VoIP applications often require. Path switching can potentially address this problem without requiring new network mechanisms, simply by leveraging the robustness to performance variations available from connectivity options such as multi-homing and overlays. In this paper, we evaluate the effectiveness and benefits of path switching in improving the quality of VoIP applications, and demonstrate its feasibility through the design and implementation of a prototype gateway. We argue for an application-driven path switching system that accounts for both network path characteristics and application-specific factors (e.g., codec algorithms, playout buffering schemes). We also develop an application path quality estimator based on the ITU-T E-model for voice quality assessment, and an application-driven path switching algorithm that dynamically adapts the time scales over which path switching decisions are made to maximize voice quality. Through network emulation and experiments over a wide-area multi-homed test bed, we show that, with sufficient path diversity, path switching can yield meaningful improvements in voice quality. Hence by exploiting the inherent path diversity of the Internet, application-driven path switching is a viable option in providing quality-of-service to applications.
目前最努力的互联网不能轻易提供VoIP应用程序经常需要的服务保证。路径交换可以潜在地解决这个问题,而不需要新的网络机制,只需利用多宿主和覆盖等连接选项提供的性能变化的健壮性。在本文中,我们评估了路径交换在提高VoIP应用质量方面的有效性和好处,并通过原型网关的设计和实现证明了其可行性。我们主张应用程序驱动的路径交换系统,该系统考虑了网络路径特征和应用程序特定因素(例如,编解码器算法,播放缓冲方案)。我们还开发了一种基于ITU-T e模型的应用路径质量估计器,用于语音质量评估,以及一种应用驱动的路径交换算法,该算法可动态调整做出路径交换决策的时间尺度,以最大限度地提高语音质量。通过网络仿真和广域多归属测试平台上的实验,我们表明,在足够的路径分集下,路径交换可以显著提高语音质量。因此,通过利用Internet固有的路径多样性,应用程序驱动的路径交换是向应用程序提供服务质量的可行选择。
{"title":"Improving VoIP quality through path switching","authors":"S. Tao, Kuai Xu, A. Estepa, Teng Fei, Lixin Gao, R. Guérin, J. Kurose, D. Towsley, Zhi-Li Zhang","doi":"10.1109/INFCOM.2005.1498514","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498514","url":null,"abstract":"The current best-effort Internet cannot readily provide the service guarantees that VoIP applications often require. Path switching can potentially address this problem without requiring new network mechanisms, simply by leveraging the robustness to performance variations available from connectivity options such as multi-homing and overlays. In this paper, we evaluate the effectiveness and benefits of path switching in improving the quality of VoIP applications, and demonstrate its feasibility through the design and implementation of a prototype gateway. We argue for an application-driven path switching system that accounts for both network path characteristics and application-specific factors (e.g., codec algorithms, playout buffering schemes). We also develop an application path quality estimator based on the ITU-T E-model for voice quality assessment, and an application-driven path switching algorithm that dynamically adapts the time scales over which path switching decisions are made to maximize voice quality. Through network emulation and experiments over a wide-area multi-homed test bed, we show that, with sufficient path diversity, path switching can yield meaningful improvements in voice quality. Hence by exploiting the inherent path diversity of the Internet, application-driven path switching is a viable option in providing quality-of-service to applications.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"38 1","pages":"2268-2278 vol. 4"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82585583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 116
XVR: X visiting-pattern routing for sensor networks XVR:用于传感器网络的X访问模式路由
Yu He, C. Raghavendra
This paper proposes a new routing paradigm for sensor networks called X visiting-pattern routing (XVR) that decouples visiting-patterns of packets from the routing core. Visiting-patterns indicate where to forward packets as next hops in a network and are essential to any routing service. With XVR, the visiting-patterns are defined in a separate module from the routing core, thus enabling them to be changed independently. The overhead of changing routing behavior is further reduced significantly by parameterizing usual visiting-patterns; different routing services can be obtained by simply changing the visiting-pattern parameters. In addition, with the extensive routing behavior space and the separate visiting-pattern module, XVR furnishes a desirable base to realize automatic and concurrent routing services that adapt to application and network dynamics. Discussions and extensive simulations show that by systematically testing different visiting-patterns XVR provides a unique environment and a comprehensive approach to study both existing and new routing algorithms.
本文提出了一种新的传感器网络路由范式,称为X访问模式路由(XVR),它将数据包的访问模式与路由核心解耦。访问模式指示将数据包作为网络中的下一跳转发到哪里,对任何路由服务都是必不可少的。使用XVR,访问模式是在与路由核心分离的模块中定义的,因此可以独立地更改它们。通过参数化通常的访问模式,改变路由行为的开销进一步显著降低;通过简单地更改访问模式参数,可以获得不同的路由服务。此外,广泛的路由行为空间和独立的访问模式模块为实现适应应用动态和网络动态的自动并发路由服务提供了良好的基础。讨论和广泛的仿真表明,通过系统地测试不同的访问模式,XVR提供了一个独特的环境和综合的方法来研究现有的和新的路由算法。
{"title":"XVR: X visiting-pattern routing for sensor networks","authors":"Yu He, C. Raghavendra","doi":"10.1109/INFCOM.2005.1498456","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498456","url":null,"abstract":"This paper proposes a new routing paradigm for sensor networks called X visiting-pattern routing (XVR) that decouples visiting-patterns of packets from the routing core. Visiting-patterns indicate where to forward packets as next hops in a network and are essential to any routing service. With XVR, the visiting-patterns are defined in a separate module from the routing core, thus enabling them to be changed independently. The overhead of changing routing behavior is further reduced significantly by parameterizing usual visiting-patterns; different routing services can be obtained by simply changing the visiting-pattern parameters. In addition, with the extensive routing behavior space and the separate visiting-pattern module, XVR furnishes a desirable base to realize automatic and concurrent routing services that adapt to application and network dynamics. Discussions and extensive simulations show that by systematically testing different visiting-patterns XVR provides a unique environment and a comprehensive approach to study both existing and new routing algorithms.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"29 1","pages":"1758-1769 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83026791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Gossip algorithms: design, analysis and applications 八卦算法:设计、分析和应用
Stephen P. Boyd, Arpita Ghosh, B. Prabhakar, D. Shah
Motivated by applications to sensor, peer-to-peer and ad hoc networks, we study distributed asynchronous algorithms, also known as gossip algorithms, for computation and information exchange in an arbitrarily connected network of nodes. Nodes in such networks operate under limited computational, communication and energy resources. These constraints naturally give rise to "gossip" algorithms: schemes which distribute the computational burden and in which a node communicates with a randomly chosen neighbor. We analyze the averaging problem under the gossip constraint for arbitrary network, and find that the averaging time of a gossip algorithm depends on the second largest eigenvalue of a doubly stochastic matrix characterizing the algorithm. Using recent results of Boyd, Diaconis and Xiao (2003), we show that minimizing this quantity to design the fastest averaging algorithm on the network is a semi-definite program (SDP). In general, SDPs cannot be solved distributedly; however, exploiting problem structure, we propose a subgradient method that distributedly solves the optimization problem over the network. The relation of averaging time to the second largest eigenvalue naturally relates it to the mixing time of a random walk with transition probabilities that are derived from the gossip algorithm. We use this connection to study the performance of gossip algorithm on two popular networks: wireless sensor networks, which are modeled as geometric random graphs, and the Internet graph under the so-called preferential connectivity model.
受传感器、点对点和自组织网络应用的启发,我们研究了分布式异步算法,也称为八卦算法,用于在任意连接的节点网络中进行计算和信息交换。这种网络中的节点在有限的计算、通信和能源资源下运行。这些约束自然产生了“八卦”算法:分配计算负担的方案,其中节点与随机选择的邻居通信。分析了任意网络在八卦约束下的平均问题,发现八卦算法的平均时间取决于描述该算法的双随机矩阵的第二大特征值。利用Boyd, Diaconis和Xiao(2003)的最新结果,我们表明最小化该数量以设计网络上最快的平均算法是一个半确定程序(SDP)。一般情况下,sdp不能分布式求解;然而,利用问题结构,我们提出了一种亚梯度方法,在网络上分布式地解决优化问题。平均时间与第二大特征值的关系自然地将其与随机游走的混合时间联系起来,该混合时间具有由八卦算法导出的转移概率。我们使用这种连接来研究两种流行网络上的流言算法的性能:无线传感器网络,它被建模为几何随机图,以及所谓的优先连接模型下的互联网图。
{"title":"Gossip algorithms: design, analysis and applications","authors":"Stephen P. Boyd, Arpita Ghosh, B. Prabhakar, D. Shah","doi":"10.1109/INFCOM.2005.1498447","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498447","url":null,"abstract":"Motivated by applications to sensor, peer-to-peer and ad hoc networks, we study distributed asynchronous algorithms, also known as gossip algorithms, for computation and information exchange in an arbitrarily connected network of nodes. Nodes in such networks operate under limited computational, communication and energy resources. These constraints naturally give rise to \"gossip\" algorithms: schemes which distribute the computational burden and in which a node communicates with a randomly chosen neighbor. We analyze the averaging problem under the gossip constraint for arbitrary network, and find that the averaging time of a gossip algorithm depends on the second largest eigenvalue of a doubly stochastic matrix characterizing the algorithm. Using recent results of Boyd, Diaconis and Xiao (2003), we show that minimizing this quantity to design the fastest averaging algorithm on the network is a semi-definite program (SDP). In general, SDPs cannot be solved distributedly; however, exploiting problem structure, we propose a subgradient method that distributedly solves the optimization problem over the network. The relation of averaging time to the second largest eigenvalue naturally relates it to the mixing time of a random walk with transition probabilities that are derived from the gossip algorithm. We use this connection to study the performance of gossip algorithm on two popular networks: wireless sensor networks, which are modeled as geometric random graphs, and the Internet graph under the so-called preferential connectivity model.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"44 1","pages":"1653-1664 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86528283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 596
FISSIONE: a scalable constant degree and low congestion DHT scheme based on Kautz graphs FISSIONE:一个基于Kautz图的可扩展的恒度和低拥塞DHT方案
Dongsheng Li, Xicheng Lu, Jie Wu
The distributed hash table (DHT) scheme has become the core component of many large-scale peer-to-peer networks. Degree, diameter, and congestion are important measures of DHT schemes. Many proposed DHT schemes are based on traditional interconnection topologies, one being the Kautz graph, which is a static topology with many good properties such as optimal diameter, optimal fault-tolerance, and low congestion. In this paper, we propose FISSIONE: the first effective DHT scheme based on Kautz graphs. FISSIONE is constant degree, O(log N) diameter, and (1 + o(1))-congestion-free. FISSIONE shows that a DHT scheme with constant degree and constant congestion can still achieve O(log N) diameter, which is better than the lower bound /spl Omega/(N/sup 1/d/) conjectured before. The average degree of FISSIONE is 4, the diameter is less than 2 log N, and the maintenance message cost is less than 3 log N. The average routing path length is about log N and is shorter than CAN or Koorde with the same degree when the peer-to-peer network is large-scale. FISSIONE can achieve good load balance, high performance, and low congestion and these properties are carefully evaluated by formal proofs or simulations in the paper.
分布式哈希表(DHT)方案已经成为许多大规模对等网络的核心组成部分。度、直径和拥塞是DHT方案的重要指标。许多提出的DHT方案都是基于传统的互连拓扑,其中一种是Kautz图,它是一种静态拓扑,具有许多良好的特性,如最优直径、最优容错和低拥塞。在本文中,我们提出FISSIONE:第一个有效的基于Kautz图的DHT方案。FISSIONE度恒定,直径为O(log N),无(1 + O(1))-拥塞。FISSIONE表明,恒度和恒拥塞的DHT方案仍然可以达到O(log N)直径,优于之前推测的下界/spl Omega/(N/sup 1/d/)。FISSIONE的平均程度为4,直径小于2 log N,维护消息开销小于3 log N,平均路由路径长度约为log N,在对等网络规模较大时比相同程度的CAN或Koorde短。FISSIONE可以实现良好的负载平衡、高性能和低拥塞,并通过正式证明或仿真仔细评估了这些特性。
{"title":"FISSIONE: a scalable constant degree and low congestion DHT scheme based on Kautz graphs","authors":"Dongsheng Li, Xicheng Lu, Jie Wu","doi":"10.1109/INFCOM.2005.1498449","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498449","url":null,"abstract":"The distributed hash table (DHT) scheme has become the core component of many large-scale peer-to-peer networks. Degree, diameter, and congestion are important measures of DHT schemes. Many proposed DHT schemes are based on traditional interconnection topologies, one being the Kautz graph, which is a static topology with many good properties such as optimal diameter, optimal fault-tolerance, and low congestion. In this paper, we propose FISSIONE: the first effective DHT scheme based on Kautz graphs. FISSIONE is constant degree, O(log N) diameter, and (1 + o(1))-congestion-free. FISSIONE shows that a DHT scheme with constant degree and constant congestion can still achieve O(log N) diameter, which is better than the lower bound /spl Omega/(N/sup 1/d/) conjectured before. The average degree of FISSIONE is 4, the diameter is less than 2 log N, and the maintenance message cost is less than 3 log N. The average routing path length is about log N and is shorter than CAN or Koorde with the same degree when the peer-to-peer network is large-scale. FISSIONE can achieve good load balance, high performance, and low congestion and these properties are carefully evaluated by formal proofs or simulations in the paper.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"33 1","pages":"1677-1688 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89447001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
Hybrid search schemes for unstructured peer-to-peer networks 非结构化点对点网络的混合搜索方案
C. Gkantsidis, M. Mihail, A. Saberi
We study hybrid search schemes for unstructured peer-to-peer networks. We quantify performance in terms of number of hits, network overhead, and response time. Our schemes combine flooding and random walks, look ahead and replication. We consider both regular topologies and topologies with supernodes. We introduce a general search scheme, of which flooding and random walks are special instances, and show how to use locally maintained network information to improve the performance of searching. Our main findings are: (a) a small number of supernodes in an otherwise regular topology can offer sharp savings in the performance of search, both in the case of search by flooding and search by random walk, particularly when it is combined with 1-step replication. We quantify, analytically and experimentally, that the reason of these savings is that the search is biased towards nodes that yield more information. (b) There is a generalization of search, of which flooding and random walk are special instances, which may take further advantage of locally maintained network information, and yield better performance than both flooding and random walk in clustered topologies. The method determines edge critically and is reminiscent of fundamental heuristics from the area of approximation algorithms.
我们研究了非结构化点对点网络的混合搜索方案。我们根据点击次数、网络开销和响应时间来量化性能。我们的方案结合了洪水和随机游走,展望未来和复制。我们同时考虑常规拓扑和具有超节点的拓扑。我们介绍了一种通用的搜索方案,其中泛洪和随机游动是特殊的例子,并展示了如何利用局部维护的网络信息来提高搜索性能。我们的主要发现是:(a)在常规拓扑中使用少量的超级节点可以大大节省搜索性能,无论是在泛洪搜索还是随机行走搜索的情况下,特别是当它与1步复制相结合时。我们量化,分析和实验,这些节省的原因是搜索偏向于产生更多信息的节点。(b)搜索的泛化,其中泛洪和随机游动是特殊实例,可以进一步利用局部维护的网络信息,并在集群拓扑中产生比泛洪和随机游动更好的性能。该方法严格地确定边缘,并使人想起近似算法领域的基本启发式方法。
{"title":"Hybrid search schemes for unstructured peer-to-peer networks","authors":"C. Gkantsidis, M. Mihail, A. Saberi","doi":"10.1109/INFCOM.2005.1498436","DOIUrl":"https://doi.org/10.1109/INFCOM.2005.1498436","url":null,"abstract":"We study hybrid search schemes for unstructured peer-to-peer networks. We quantify performance in terms of number of hits, network overhead, and response time. Our schemes combine flooding and random walks, look ahead and replication. We consider both regular topologies and topologies with supernodes. We introduce a general search scheme, of which flooding and random walks are special instances, and show how to use locally maintained network information to improve the performance of searching. Our main findings are: (a) a small number of supernodes in an otherwise regular topology can offer sharp savings in the performance of search, both in the case of search by flooding and search by random walk, particularly when it is combined with 1-step replication. We quantify, analytically and experimentally, that the reason of these savings is that the search is biased towards nodes that yield more information. (b) There is a generalization of search, of which flooding and random walk are special instances, which may take further advantage of locally maintained network information, and yield better performance than both flooding and random walk in clustered topologies. The method determines edge critically and is reminiscent of fundamental heuristics from the area of approximation algorithms.","PeriodicalId":20482,"journal":{"name":"Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.","volume":"57 1","pages":"1526-1537 vol. 3"},"PeriodicalIF":0.0,"publicationDate":"2005-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89491404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 260
期刊
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1