首页 > 最新文献

Proceedings of the 16th International Conference on Distributed Computing and Networking最新文献

英文 中文
A fast approach to solve the Route and Spectrum Allocation problem in OFDM networks 一种快速解决OFDM网络中路由和频谱分配问题的方法
Arijit Paul, Quazi Rahman, S. Bandyopadhyay, Y. Aneja
Orthogonal Frequency Division Multiplexing (OFDM) has recently emerged as a promising technology. A network using OFDM based Spectrum-sliced Elastic Optical Path (SLICE) has a higher spectrum efficiency, due to the fine granularity of subcarrier frequencies used. To minimize the utilized spectrum in SLICE networks, the routing and spectrum allocation problem (RSA) has to be efficiently solved. We have solved the RSA problem using a Mixed Integer Linear Programming (MILP) formulation and have compared our approaches with another recent formulation.
正交频分复用技术(OFDM)是近年来发展起来的一项很有前途的技术。基于OFDM的频谱切片弹性光路(SLICE)网络由于使用了细粒度的子载波频率,具有更高的频谱效率。为了使SLICE网络的频谱利用率最小化,必须有效地解决路由和频谱分配问题(RSA)。我们使用混合整数线性规划(MILP)公式解决了RSA问题,并将我们的方法与另一个最近的公式进行了比较。
{"title":"A fast approach to solve the Route and Spectrum Allocation problem in OFDM networks","authors":"Arijit Paul, Quazi Rahman, S. Bandyopadhyay, Y. Aneja","doi":"10.1145/2684464.2684501","DOIUrl":"https://doi.org/10.1145/2684464.2684501","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) has recently emerged as a promising technology. A network using OFDM based Spectrum-sliced Elastic Optical Path (SLICE) has a higher spectrum efficiency, due to the fine granularity of subcarrier frequencies used. To minimize the utilized spectrum in SLICE networks, the routing and spectrum allocation problem (RSA) has to be efficiently solved. We have solved the RSA problem using a Mixed Integer Linear Programming (MILP) formulation and have compared our approaches with another recent formulation.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124880122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pricing with Bandwidth Guarantees for Clients with multi-ISP Connections 对具有多个isp连接的客户端进行带宽保证定价
Rohit Tripathi, G. Barua
The increase in internet coverage and decrease in internet access price has resulted in demand for good internet service. Clients want some guarantee in internet access quality. In this paper, we present a model in which clients are guaranteed connection and bandwidth and if clients do not get the service they request, the service provider pays a penalty to the clients. We consider a system of internet clients with multiple internet service provider (ISP) connections to a set of ISPs. When a client arrives, an ISP has to decide whether to accept the client, and then the price to charge from the client for the duration of its connection. Rejection of a client results in a penalty and delay in getting the requested bandwidth also incurs a penalty. We assume a Poisson arrival process with the rate of arrival sensitive to the price being charged. A client requests bandwidth for a time that is exponentially distributed, then the client is idle for a time that is also exponentially distributed; and then either the client departs or requests bandwidth again after the idle period is over. A service provider tries to maximize its income by charging appropriate prices based on its current state and deciding whether to accept more clients or not. Since penalties are imposed, such solutions also automatically balance load among service providers, and so the quality of service to clients improves. We present solutions that maximize the income of service providers. The solutions are then compared using simulation. Simulation results show that our analysed solution significantly improve quality of service of clients and increase the income of service providers as compared to a simple heuristic based solution that is otherwise could to be used.
互联网覆盖范围的扩大和上网价格的下降导致了对优质互联网服务的需求。客户希望在互联网接入质量上有一些保证。在本文中,我们提出了一个模型,在这个模型中,客户端是有连接和带宽保证的,如果客户端没有得到他们所请求的服务,服务提供商向客户端支付违约金。我们考虑一个具有多个互联网服务提供商(ISP)连接到一组互联网服务提供商的互联网客户端系统。当客户端到达时,ISP必须决定是否接受客户端,然后决定在连接期间从客户端收取的费用。拒绝客户端会导致损失,延迟获得请求的带宽也会导致损失。我们假设一个泊松到达过程,到达率对所收取的价格敏感。客户端请求带宽的时间呈指数分布,那么客户端空闲的时间也呈指数分布;然后客户端离开或者在空闲期结束后再次请求带宽。服务提供者试图根据其当前状态收取适当的价格,并决定是否接受更多的客户,从而使其收入最大化。由于会施加惩罚,因此此类解决方案还会自动平衡服务提供者之间的负载,从而提高对客户机的服务质量。我们提出的解决方案使服务提供商的收入最大化。然后用仿真方法对解决方案进行比较。仿真结果表明,与简单的启发式解决方案相比,我们分析的解决方案显著提高了客户的服务质量,增加了服务提供商的收入。
{"title":"Pricing with Bandwidth Guarantees for Clients with multi-ISP Connections","authors":"Rohit Tripathi, G. Barua","doi":"10.1145/2684464.2684497","DOIUrl":"https://doi.org/10.1145/2684464.2684497","url":null,"abstract":"The increase in internet coverage and decrease in internet access price has resulted in demand for good internet service. Clients want some guarantee in internet access quality. In this paper, we present a model in which clients are guaranteed connection and bandwidth and if clients do not get the service they request, the service provider pays a penalty to the clients. We consider a system of internet clients with multiple internet service provider (ISP) connections to a set of ISPs. When a client arrives, an ISP has to decide whether to accept the client, and then the price to charge from the client for the duration of its connection. Rejection of a client results in a penalty and delay in getting the requested bandwidth also incurs a penalty. We assume a Poisson arrival process with the rate of arrival sensitive to the price being charged. A client requests bandwidth for a time that is exponentially distributed, then the client is idle for a time that is also exponentially distributed; and then either the client departs or requests bandwidth again after the idle period is over. A service provider tries to maximize its income by charging appropriate prices based on its current state and deciding whether to accept more clients or not. Since penalties are imposed, such solutions also automatically balance load among service providers, and so the quality of service to clients improves. We present solutions that maximize the income of service providers. The solutions are then compared using simulation. Simulation results show that our analysed solution significantly improve quality of service of clients and increase the income of service providers as compared to a simple heuristic based solution that is otherwise could to be used.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124972426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Self-stabilizing Power-law Networks 自稳定幂律网络
T. Alsulaiman, Andrew Berns, Sukumar Ghosh
Power-law graphs model the interconnections in various types of large-scale networks ranging from physical and biological systems to man-made social networks and web graphs. In these graphs, the degree distribution of the nodes obeys the power-law property: the fraction of nodes P(k) having a degree k closely follows the rule P(k) ∞ k−-γ. In the domain of man-made systems, if the topology of a power-law network gets altered due to failures or adversarial attacks, then remedial actions to restore the power-law property are very important. This paper presents self-stabilizing algorithms for maintaining the power-law property in a network of processes. These algorithms allow spontaneous restoration of the power-law property from any initial connected configuration. The algorithms consist of three modular components: a detection component to detect the violation of the power-law property, an interim topology creation component, and a repair component to build the final graph. We propose two different interim topologies, a clique and a linear graph. We then present two different techniques for rebuilding the power-law topology -- a probabilistic approach based on the preferential attachment model, which stabilizes in O(log n) communication rounds with a link complexity of O(n) per process, and a deterministic approach that introduces the novel data structure Bridge Tree and stabilizes in O(n) communication rounds with a much lower link complexity.
幂律图模拟了从物理和生物系统到人工社会网络和网络图的各种类型的大规模网络中的相互联系。在这些图中,节点的度分布服从幂律性质:具有k度的节点P(k)的分数密切遵循规则P(k)∞k−-γ。在人工系统领域,如果幂律网络的拓扑结构由于故障或对抗性攻击而发生改变,那么恢复幂律性质的补救措施是非常重要的。本文提出了过程网络中保持幂律性质的自稳定算法。这些算法允许自发恢复幂律性质从任何初始连接配置。该算法由三个模块组成:检测幂律性质的检测组件、临时拓扑创建组件和构建最终图的修复组件。我们提出了两种不同的过渡拓扑,一个团和一个线性图。然后,我们提出了重建幂律拓扑的两种不同技术——一种基于优先依恋模型的概率方法,该方法在O(log n)轮通信中稳定,每个进程的链路复杂度为O(n);另一种确定性方法引入了新的数据结构桥树,并在O(n)轮通信中稳定,链路复杂度低得多。
{"title":"Self-stabilizing Power-law Networks","authors":"T. Alsulaiman, Andrew Berns, Sukumar Ghosh","doi":"10.1145/2684464.2684485","DOIUrl":"https://doi.org/10.1145/2684464.2684485","url":null,"abstract":"Power-law graphs model the interconnections in various types of large-scale networks ranging from physical and biological systems to man-made social networks and web graphs. In these graphs, the degree distribution of the nodes obeys the power-law property: the fraction of nodes P(k) having a degree k closely follows the rule P(k) ∞ k−-γ. In the domain of man-made systems, if the topology of a power-law network gets altered due to failures or adversarial attacks, then remedial actions to restore the power-law property are very important. This paper presents self-stabilizing algorithms for maintaining the power-law property in a network of processes. These algorithms allow spontaneous restoration of the power-law property from any initial connected configuration. The algorithms consist of three modular components: a detection component to detect the violation of the power-law property, an interim topology creation component, and a repair component to build the final graph. We propose two different interim topologies, a clique and a linear graph. We then present two different techniques for rebuilding the power-law topology -- a probabilistic approach based on the preferential attachment model, which stabilizes in O(log n) communication rounds with a link complexity of O(n) per process, and a deterministic approach that introduces the novel data structure Bridge Tree and stabilizes in O(n) communication rounds with a much lower link complexity.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132391029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security-Aware Dynamic Lightpath Allocation Scheme for WDM Networks WDM网络安全感知的动态光路分配方案
A. Jaekel, S. Bandyopadhyay, Saja Al-Mamoori, Sriharsha Varanasi
In recent years, there is growing recognition of the need to develop suitable mechanisms for reducing the adverse effects of malicious attacks such as high power jamming and tapping attacks. A number of recent papers have proposed static lightpath allocation approaches that take such security issues into consideration. Most of these approaches consider the routing problem separately from the wavelength assignment problem. In this paper we propose a new security-aware ILP formulation, as well as an efficient heuristic for the complete security-aware dynamic routing and wavelength assignment (RWA) problem. To the best of our knowledge, this is the first such work to jointly consider in-band and out-of-band attacks, for either static or dynamic case.
近年来,越来越多的人认识到需要开发合适的机制来减少恶意攻击(如高功率干扰和窃听攻击)的不利影响。最近的一些论文提出了静态光路分配方法,考虑到这些安全问题。这些方法大多将路由问题与波长分配问题分开考虑。在本文中,我们提出了一个新的安全感知的ILP公式,以及一个有效的启发式的完全安全感知动态路由和波长分配(RWA)问题。据我们所知,这是第一个共同考虑带内和带外攻击的工作,无论是静态还是动态情况。
{"title":"Security-Aware Dynamic Lightpath Allocation Scheme for WDM Networks","authors":"A. Jaekel, S. Bandyopadhyay, Saja Al-Mamoori, Sriharsha Varanasi","doi":"10.1145/2684464.2684502","DOIUrl":"https://doi.org/10.1145/2684464.2684502","url":null,"abstract":"In recent years, there is growing recognition of the need to develop suitable mechanisms for reducing the adverse effects of malicious attacks such as high power jamming and tapping attacks. A number of recent papers have proposed static lightpath allocation approaches that take such security issues into consideration. Most of these approaches consider the routing problem separately from the wavelength assignment problem. In this paper we propose a new security-aware ILP formulation, as well as an efficient heuristic for the complete security-aware dynamic routing and wavelength assignment (RWA) problem. To the best of our knowledge, this is the first such work to jointly consider in-band and out-of-band attacks, for either static or dynamic case.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129198694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Fast Lock-Free Internal Binary Search Tree 一个快速无锁内部二叉搜索树
Arunmoezhi Ramachandran, N. Mittal
We present a new lock-free algorithm for concurrent manipulation of a binary search tree in an asynchronous shared memory system that supports search, insert and delete operations. It combines ideas from two recently proposed lock-free algorithms: one of them provides good performance for a read-dominated workload and the other one for a write-dominated workload. Specifically, it uses internal representation of a search tree (as in the first one) and is based on marking edges instead of nodes (as in the second one). Our experiments indicate that our new lock-free algorithm outperforms other lock-free algorithms in most cases providing up to 35% improvement in some cases over the next best algorithm.
提出了一种新的无锁算法,用于异步共享内存系统中二叉搜索树的并发操作,该算法支持搜索、插入和删除操作。它结合了最近提出的两种无锁算法的思想:其中一种算法为以读为主的工作负载提供了良好的性能,另一种算法为以写为主的工作负载提供了良好的性能。具体来说,它使用搜索树的内部表示(如第一个),并且基于标记边缘而不是节点(如第二个)。我们的实验表明,我们的新无锁算法在大多数情况下优于其他无锁算法,在某些情况下比次优算法提高了35%。
{"title":"A Fast Lock-Free Internal Binary Search Tree","authors":"Arunmoezhi Ramachandran, N. Mittal","doi":"10.1145/2684464.2684472","DOIUrl":"https://doi.org/10.1145/2684464.2684472","url":null,"abstract":"We present a new lock-free algorithm for concurrent manipulation of a binary search tree in an asynchronous shared memory system that supports search, insert and delete operations. It combines ideas from two recently proposed lock-free algorithms: one of them provides good performance for a read-dominated workload and the other one for a write-dominated workload. Specifically, it uses internal representation of a search tree (as in the first one) and is based on marking edges instead of nodes (as in the second one). Our experiments indicate that our new lock-free algorithm outperforms other lock-free algorithms in most cases providing up to 35% improvement in some cases over the next best algorithm.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126096138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Randomized Rendezvous Algorithms for Agents on a Ring with Different Speeds 不同速度环上agent的随机交会算法
E. Kranakis, D. Krizanc, Fraser MacQuarie, S. Shende
We provide randomized rendezvous algorithms for two synchronous robots in a bi-directional ring of length n (n is a real number): the robots are equipped with identical chronometers, execute identical algorithms, but have different speeds u, 1 (where u > 1). In general, neither of the robots are aware of their own speed but in some cases they may be aware either of the magnitude of u or some quantity of time that depends on u, n. The robots start by choosing a direction uniformly and independently at random. Given integer k ≥ 0, we design algorithms that have the two robots alternate for k + 1 rounds between choosing the direction at random followed by walking for a predetermined time. In the last round the robots walk until rendezvous. The first algorithm, RV0, works with one random bit per robot and consists of a single round: after choosing their initial directions the robots never change direction. Rendezvous is established in u·n/2(u2−1) expected time and this is shown to be optimal among all randomized algorithms employing a single random bit during their execution. The second algorithm RV1(k), for k ≥ 1, has the two robots alternate for k + 1 rounds between choosing the direction at random followed by walking for a predetermined time u/u + 1; in the last step the robots walk until rendezvous. Among all algorithms that use k + 1 random bits we establish a sharp threshold; for u ≤ 2, RV1(k) is optimal in terms of expected rendezvous time while for u > 2, RV0 is optimal. Further, we provide new randomized rendezvous algorithms employing more random bits and analyze their expected rendezvous time depending on the knowledge of the robots about the length n of the ring and their speeds (u > 1).
我们提供了两个同步机器人在长度为n (n为实数)的双向环中的随机交会算法:机器人配备相同的计时器,执行相同的算法,但具有不同的速度u, 1(其中u > 1)。一般来说,两个机器人都不知道自己的速度,但在某些情况下,它们可能知道u的大小或取决于u, n的时间量。机器人开始时均匀独立地随机选择方向。给定整数k≥0,我们设计算法,让两个机器人在随机选择方向之间交替k + 1轮,然后在预定时间内行走。在最后一轮中,机器人一直走到会合点。第一种算法,RV0,每个机器人使用一个随机比特,由一个回合组成:在选择了它们的初始方向后,机器人永远不会改变方向。交会建立在u·n/2(u2−1)预期时间内,并且在执行过程中使用单个随机比特的所有随机算法中,这被证明是最优的。第二种算法RV1(k),当k≥1时,两个机器人随机选择方向,然后步行预定时间u/u + 1,交替k + 1轮;在最后一步,机器人走到会合点。在所有使用k + 1个随机比特的算法中,我们建立了一个尖锐的阈值;当u≤2时,RV1(k)以期望交会时间为最优,当u > 2时,RV0为最优。此外,我们提供了采用更多随机比特的新的随机交会算法,并根据机器人对环长度n和速度(u > 1)的了解分析了它们的预期交会时间。
{"title":"Randomized Rendezvous Algorithms for Agents on a Ring with Different Speeds","authors":"E. Kranakis, D. Krizanc, Fraser MacQuarie, S. Shende","doi":"10.1145/2684464.2684468","DOIUrl":"https://doi.org/10.1145/2684464.2684468","url":null,"abstract":"We provide randomized rendezvous algorithms for two synchronous robots in a bi-directional ring of length n (n is a real number): the robots are equipped with identical chronometers, execute identical algorithms, but have different speeds u, 1 (where u > 1). In general, neither of the robots are aware of their own speed but in some cases they may be aware either of the magnitude of u or some quantity of time that depends on u, n. The robots start by choosing a direction uniformly and independently at random. Given integer k ≥ 0, we design algorithms that have the two robots alternate for k + 1 rounds between choosing the direction at random followed by walking for a predetermined time. In the last round the robots walk until rendezvous. The first algorithm, RV0, works with one random bit per robot and consists of a single round: after choosing their initial directions the robots never change direction. Rendezvous is established in u·n/2(u2−1) expected time and this is shown to be optimal among all randomized algorithms employing a single random bit during their execution. The second algorithm RV1(k), for k ≥ 1, has the two robots alternate for k + 1 rounds between choosing the direction at random followed by walking for a predetermined time u/u + 1; in the last step the robots walk until rendezvous. Among all algorithms that use k + 1 random bits we establish a sharp threshold; for u ≤ 2, RV1(k) is optimal in terms of expected rendezvous time while for u > 2, RV0 is optimal. Further, we provide new randomized rendezvous algorithms employing more random bits and analyze their expected rendezvous time depending on the knowledge of the robots about the length n of the ring and their speeds (u > 1).","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130387717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multi Criteria Decision Analysis assisted Routing in Wireless Sensor Network using Fuzzy rules 基于模糊规则的多准则决策分析辅助无线传感器网络路由
S. Bhunia, Bijoy Das, N. Mukherjee
Wireless sensor network is a self-organizing wireless network system which has enabled densely deployment of nodes. These wireless sensors gather and forward data. But finding an efficient route is a challenge while the nodes communicate for data transmission. A routing algorithm, FMCR, is proposed in this paper. A well-known operations research technique, multi-criteria decision analysis, is used in this proposed scheme. Here multiple criteria, such as residual energy, packet transmission frequency and hop count are taken into account. In order to assign the weighted values on each criterion, Fuzzy rules are applied on heuristic properties like node density, dead nodes and delay. The best route is selected using Weighted Product Model (WPM). This scheme has been implemented using TinyOS, an event-driven operating system designed for wireless sensor network.
无线传感器网络是一种自组织的无线网络系统,可以实现节点的密集部署。这些无线传感器收集并转发数据。但在节点之间进行数据传输时,寻找有效的路由是一个挑战。本文提出了一种路由算法FMCR。该方案采用了著名的运筹学技术——多准则决策分析。这里考虑了多个标准,如剩余能量、分组传输频率和跳数。在节点密度、死节点和时延等启发式属性上应用模糊规则,为每个准则分配加权值。利用加权产品模型(WPM)选择最佳路线。该方案使用TinyOS实现,TinyOS是一种为无线传感器网络设计的事件驱动操作系统。
{"title":"Multi Criteria Decision Analysis assisted Routing in Wireless Sensor Network using Fuzzy rules","authors":"S. Bhunia, Bijoy Das, N. Mukherjee","doi":"10.1145/2684464.2684499","DOIUrl":"https://doi.org/10.1145/2684464.2684499","url":null,"abstract":"Wireless sensor network is a self-organizing wireless network system which has enabled densely deployment of nodes. These wireless sensors gather and forward data. But finding an efficient route is a challenge while the nodes communicate for data transmission. A routing algorithm, FMCR, is proposed in this paper. A well-known operations research technique, multi-criteria decision analysis, is used in this proposed scheme. Here multiple criteria, such as residual energy, packet transmission frequency and hop count are taken into account. In order to assign the weighted values on each criterion, Fuzzy rules are applied on heuristic properties like node density, dead nodes and delay. The best route is selected using Weighted Product Model (WPM). This scheme has been implemented using TinyOS, an event-driven operating system designed for wireless sensor network.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132349932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Boruvka-Incremental Power Greedy Heuristic for Strong Minimum Energy Topology in Wireless Sensor Networks 无线传感器网络强最小能量拓扑的boruvka -增量功率贪心启发式算法
B. S. Panda, B. K. Bhatta, Deepak Mishra, S. De
Given a set of sensors, the strong minimum energy topology (SMET) problem is to assign transmission range to each sensor node so that the sum of the transmission range for all the sensor is minimum subject to the constraint that the network is strongly connected (there is a directed path between every pair of nodes in the Network). This problem is known to be NP-hard. As this problem has lots of practical applications, several approximation algorithms and heuristics have been proposed. In this paper, we propose a new heuristic called Boruvka-incremental power greedy heuristic based on the Boruvka algorithm for the minimum spanning tree (MST) problem for solving the SMET problem. We compare the performance of the Boruvka-incremental power greedy heuristic with Kruskal-incremental power greedy heuristic and Prim-incremental power greedy heuristic. Extensive simulation results illustrate that Boruvka heuristic outperforms the Kruskal-incremental power greedy heuristic and Prim-incremental power greedy heuristic. We have also proved that apart from providing significant improvement in terms of average power savings, Boruvka incremental power greedy heuristic takes O(n) time for planar graphs as compared to O(n log n) time taken by Kruskal-incremental power greedy heuristic and O(n2) time taken by Prim-incremental power greedy heuristic, where n is the number of nodes in the network.
给定一组传感器,强最小能量拓扑(SMET)问题是在网络是强连接的约束下(网络中每对节点之间都有一条有向路径),为每个传感器节点分配传输范围,使所有传感器的传输范围之和最小。这个问题被称为NP-hard。由于这个问题有很多实际应用,人们提出了几种近似算法和启发式算法。本文在最小生成树(MST)问题的Boruvka算法的基础上,提出了一种新的求解SMET问题的Boruvka-增量幂贪心启发式算法。我们比较了boruvka -增量幂贪婪启发式算法与kruskal -增量幂贪婪启发式算法和prim -增量幂贪婪启发式算法的性能。大量仿真结果表明,Boruvka启发式算法优于kruskal -增量功率贪婪启发式算法和prim -增量功率贪婪启发式算法。我们还证明,除了在平均功耗节省方面提供显著改进外,Boruvka增量功率贪婪启发式算法对平面图的处理时间为O(n),而kruskal增量功率贪婪启发式算法的处理时间为O(n log n), prim增量功率贪婪启发式算法的处理时间为O(n2),其中n为网络中的节点数。
{"title":"Boruvka-Incremental Power Greedy Heuristic for Strong Minimum Energy Topology in Wireless Sensor Networks","authors":"B. S. Panda, B. K. Bhatta, Deepak Mishra, S. De","doi":"10.1145/2684464.2684490","DOIUrl":"https://doi.org/10.1145/2684464.2684490","url":null,"abstract":"Given a set of sensors, the strong minimum energy topology (SMET) problem is to assign transmission range to each sensor node so that the sum of the transmission range for all the sensor is minimum subject to the constraint that the network is strongly connected (there is a directed path between every pair of nodes in the Network). This problem is known to be NP-hard. As this problem has lots of practical applications, several approximation algorithms and heuristics have been proposed. In this paper, we propose a new heuristic called Boruvka-incremental power greedy heuristic based on the Boruvka algorithm for the minimum spanning tree (MST) problem for solving the SMET problem. We compare the performance of the Boruvka-incremental power greedy heuristic with Kruskal-incremental power greedy heuristic and Prim-incremental power greedy heuristic. Extensive simulation results illustrate that Boruvka heuristic outperforms the Kruskal-incremental power greedy heuristic and Prim-incremental power greedy heuristic. We have also proved that apart from providing significant improvement in terms of average power savings, Boruvka incremental power greedy heuristic takes O(n) time for planar graphs as compared to O(n log n) time taken by Kruskal-incremental power greedy heuristic and O(n2) time taken by Prim-incremental power greedy heuristic, where n is the number of nodes in the network.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131621044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Computation of Sparse Cuts via Random Walks 基于随机游动的稀疏切割分布计算
Atish Das Sarma, A. R. Molla, Gopal Pandurangan
A sparse cut of a graph is a partition of the vertices into two disjoint subsets such that the ratio of the number of edges across the two subsets divided by the sum of degrees of vertices in the smaller side is minimum. Finding sparse cuts is an important tool in analyzing large-scale distributed networks such as the Internet and Peer-to-Peer networks, as well as large-scale graphs such as the web graph, online social communities, and VLSI circuits. Sparse cuts are useful in graph clustering and partitioning among numerous other applications. In distributed communication networks, they are useful for topology maintenance and for designing better search and routing algorithms. In this paper, we focus on developing a fast distributed algorithm for computing sparse cuts in networks. Given an undirected n-node network G with conductance φ, the goal is to find a cut set whose conductance is close to φ. We present a distributed algorithm that finds a cut set with sparsity Õ(√φ) (Õ hides polylog n factors). Our algorithm works in the CONGEST distributed computing model and outputs a cut of conductance at most Õ (√φ) with high probability, in Õ(1/b(1/φ + n)log2) rounds, where b is balance of the cut of given conductance. In particular, to find a sparse cut of constant balance, our algorithm takes O((1/φ + n)log2 n) rounds. Our algorithm can also be used to output a local cluster, i.e., a subset of vertices near a given source node, and whose conductance is within a quadratic factor of the best possible cluster around the specified node. Our distributed algorithm can work without knowledge of the optimal φ value (with only a log n factor slowdown) and hence can be used to find approximate conductance values both globally and with respect to a given source node. Our algorithm uses random walks as a key subroutine and is fully decentralized and uses lightweight local computations. We also give a lower bound on the time needed for any distributed algorithm to compute any non-trivial sparse cut --- any distributed approximation algorithm (for any nontrivial approximation ratio) for computing sparsest cut will take Ω (√n + D) rounds, where D is the diameter of the graph. Our algorithm can be used to find sparse cuts (and their conductance values) and to identify well-connected clusters and critical edges in distributed networks. This in turn can be helpful in the design, analysis, and maintenance of topologically-aware networks.
图的稀疏切割是将顶点划分为两个不相交的子集,使得两个子集上的边数除以较小边的顶点度数之和的比率最小。寻找稀疏切割是分析大规模分布式网络(如Internet和p2p网络)以及大规模图(如web图、在线社会社区和VLSI电路)的重要工具。在许多其他应用中,稀疏切割在图聚类和分区中很有用。在分布式通信网络中,它们可用于拓扑维护和设计更好的搜索和路由算法。在本文中,我们致力于开发一种快速的分布式算法来计算网络中的稀疏切割。给定一个无向n节点网络G,其电导为φ,目标是找到一个电导接近φ的切集。我们提出了一种分布式算法,它可以找到一个稀疏性为Õ(√φ)的切集(Õ隐藏了多log n个因子)。我们的算法在CONGEST分布式计算模型中工作,并在Õ(1/b(1/φ + n)log2)轮中以高概率输出至多Õ(√φ)的电导切割,其中b是给定电导切割的平衡。特别是,为了找到一个常数平衡的稀疏切割,我们的算法需要O((1/φ + n)log2 n)轮。我们的算法也可以用于输出一个局部簇,即在给定源节点附近的一个顶点子集,其电导在指定节点周围最佳可能簇的二次因子内。我们的分布式算法可以在不知道最优φ值的情况下工作(只有log n因素的减速),因此可以用来找到全局和给定源节点的近似电导值。我们的算法使用随机游走作为关键子程序,并且是完全分散的,并使用轻量级的局部计算。我们还给出了任何分布式算法计算任何非平凡稀疏切割所需时间的下界——计算最稀疏切割的任何分布式近似算法(对于任何非平凡近似比)将需要Ω(√n + D)轮,其中D是图的直径。我们的算法可用于寻找稀疏切割(及其电导值),并识别分布式网络中连接良好的簇和临界边。这反过来又有助于拓扑感知网络的设计、分析和维护。
{"title":"Distributed Computation of Sparse Cuts via Random Walks","authors":"Atish Das Sarma, A. R. Molla, Gopal Pandurangan","doi":"10.1145/2684464.2684474","DOIUrl":"https://doi.org/10.1145/2684464.2684474","url":null,"abstract":"A sparse cut of a graph is a partition of the vertices into two disjoint subsets such that the ratio of the number of edges across the two subsets divided by the sum of degrees of vertices in the smaller side is minimum. Finding sparse cuts is an important tool in analyzing large-scale distributed networks such as the Internet and Peer-to-Peer networks, as well as large-scale graphs such as the web graph, online social communities, and VLSI circuits. Sparse cuts are useful in graph clustering and partitioning among numerous other applications. In distributed communication networks, they are useful for topology maintenance and for designing better search and routing algorithms. In this paper, we focus on developing a fast distributed algorithm for computing sparse cuts in networks. Given an undirected n-node network G with conductance φ, the goal is to find a cut set whose conductance is close to φ. We present a distributed algorithm that finds a cut set with sparsity Õ(√φ) (Õ hides polylog n factors). Our algorithm works in the CONGEST distributed computing model and outputs a cut of conductance at most Õ (√φ) with high probability, in Õ(1/b(1/φ + n)log2) rounds, where b is balance of the cut of given conductance. In particular, to find a sparse cut of constant balance, our algorithm takes O((1/φ + n)log2 n) rounds. Our algorithm can also be used to output a local cluster, i.e., a subset of vertices near a given source node, and whose conductance is within a quadratic factor of the best possible cluster around the specified node. Our distributed algorithm can work without knowledge of the optimal φ value (with only a log n factor slowdown) and hence can be used to find approximate conductance values both globally and with respect to a given source node. Our algorithm uses random walks as a key subroutine and is fully decentralized and uses lightweight local computations. We also give a lower bound on the time needed for any distributed algorithm to compute any non-trivial sparse cut --- any distributed approximation algorithm (for any nontrivial approximation ratio) for computing sparsest cut will take Ω (√n + D) rounds, where D is the diameter of the graph. Our algorithm can be used to find sparse cuts (and their conductance values) and to identify well-connected clusters and critical edges in distributed networks. This in turn can be helpful in the design, analysis, and maintenance of topologically-aware networks.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114707881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Solving Consensus in Opportunistic Networks 解决机会主义网络中的共识问题
Abdulkader Benchi, P. Launay, F. Guidec
Opportunistic networks are partially connected wireless ad hoc networks, in which pairwise unpredicted transient contacts between mobile devices are the only opportunities for these devices to exchange information or services. Ensuring the coordination of multiple parts of a distributed application in such conditions is a challenge. This paper presents a system that can solve consensus problems in an opportunistic network. This system combines an implementation of the One-Third Rule (OTR) algorithm with a communication layer that supports network-wide, content-driven message dissemination based on controlled epidemic routing. Experimental results obtained with a small flotilla of smartphones are also presented, that validate the system and demonstrate that consensus can be solved effectively in an opportunistic network.
机会网络是部分连接的无线自组织网络,其中移动设备之间的两两不可预测的瞬时接触是这些设备交换信息或服务的唯一机会。在这种情况下,确保分布式应用程序的多个部分的协调是一个挑战。本文提出了一个解决机会主义网络中共识问题的系统。该系统将三分之一规则(OTR)算法的实现与通信层相结合,该通信层支持基于受控流行病路由的网络范围内内容驱动的消息传播。本文还介绍了在一小部分智能手机上获得的实验结果,验证了该系统,并证明了在机会主义网络中可以有效地解决共识问题。
{"title":"Solving Consensus in Opportunistic Networks","authors":"Abdulkader Benchi, P. Launay, F. Guidec","doi":"10.1145/2684464.2684479","DOIUrl":"https://doi.org/10.1145/2684464.2684479","url":null,"abstract":"Opportunistic networks are partially connected wireless ad hoc networks, in which pairwise unpredicted transient contacts between mobile devices are the only opportunities for these devices to exchange information or services. Ensuring the coordination of multiple parts of a distributed application in such conditions is a challenge. This paper presents a system that can solve consensus problems in an opportunistic network. This system combines an implementation of the One-Third Rule (OTR) algorithm with a communication layer that supports network-wide, content-driven message dissemination based on controlled epidemic routing. Experimental results obtained with a small flotilla of smartphones are also presented, that validate the system and demonstrate that consensus can be solved effectively in an opportunistic network.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116695631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
Proceedings of the 16th International Conference on Distributed Computing and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1