首页 > 最新文献

Proceedings of the 16th International Conference on Distributed Computing and Networking最新文献

英文 中文
A fast approach to solve the Route and Spectrum Allocation problem in OFDM networks 一种快速解决OFDM网络中路由和频谱分配问题的方法
Arijit Paul, Quazi Rahman, S. Bandyopadhyay, Y. Aneja
Orthogonal Frequency Division Multiplexing (OFDM) has recently emerged as a promising technology. A network using OFDM based Spectrum-sliced Elastic Optical Path (SLICE) has a higher spectrum efficiency, due to the fine granularity of subcarrier frequencies used. To minimize the utilized spectrum in SLICE networks, the routing and spectrum allocation problem (RSA) has to be efficiently solved. We have solved the RSA problem using a Mixed Integer Linear Programming (MILP) formulation and have compared our approaches with another recent formulation.
正交频分复用技术(OFDM)是近年来发展起来的一项很有前途的技术。基于OFDM的频谱切片弹性光路(SLICE)网络由于使用了细粒度的子载波频率,具有更高的频谱效率。为了使SLICE网络的频谱利用率最小化,必须有效地解决路由和频谱分配问题(RSA)。我们使用混合整数线性规划(MILP)公式解决了RSA问题,并将我们的方法与另一个最近的公式进行了比较。
{"title":"A fast approach to solve the Route and Spectrum Allocation problem in OFDM networks","authors":"Arijit Paul, Quazi Rahman, S. Bandyopadhyay, Y. Aneja","doi":"10.1145/2684464.2684501","DOIUrl":"https://doi.org/10.1145/2684464.2684501","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) has recently emerged as a promising technology. A network using OFDM based Spectrum-sliced Elastic Optical Path (SLICE) has a higher spectrum efficiency, due to the fine granularity of subcarrier frequencies used. To minimize the utilized spectrum in SLICE networks, the routing and spectrum allocation problem (RSA) has to be efficiently solved. We have solved the RSA problem using a Mixed Integer Linear Programming (MILP) formulation and have compared our approaches with another recent formulation.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124880122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pricing with Bandwidth Guarantees for Clients with multi-ISP Connections 对具有多个isp连接的客户端进行带宽保证定价
Rohit Tripathi, G. Barua
The increase in internet coverage and decrease in internet access price has resulted in demand for good internet service. Clients want some guarantee in internet access quality. In this paper, we present a model in which clients are guaranteed connection and bandwidth and if clients do not get the service they request, the service provider pays a penalty to the clients. We consider a system of internet clients with multiple internet service provider (ISP) connections to a set of ISPs. When a client arrives, an ISP has to decide whether to accept the client, and then the price to charge from the client for the duration of its connection. Rejection of a client results in a penalty and delay in getting the requested bandwidth also incurs a penalty. We assume a Poisson arrival process with the rate of arrival sensitive to the price being charged. A client requests bandwidth for a time that is exponentially distributed, then the client is idle for a time that is also exponentially distributed; and then either the client departs or requests bandwidth again after the idle period is over. A service provider tries to maximize its income by charging appropriate prices based on its current state and deciding whether to accept more clients or not. Since penalties are imposed, such solutions also automatically balance load among service providers, and so the quality of service to clients improves. We present solutions that maximize the income of service providers. The solutions are then compared using simulation. Simulation results show that our analysed solution significantly improve quality of service of clients and increase the income of service providers as compared to a simple heuristic based solution that is otherwise could to be used.
互联网覆盖范围的扩大和上网价格的下降导致了对优质互联网服务的需求。客户希望在互联网接入质量上有一些保证。在本文中,我们提出了一个模型,在这个模型中,客户端是有连接和带宽保证的,如果客户端没有得到他们所请求的服务,服务提供商向客户端支付违约金。我们考虑一个具有多个互联网服务提供商(ISP)连接到一组互联网服务提供商的互联网客户端系统。当客户端到达时,ISP必须决定是否接受客户端,然后决定在连接期间从客户端收取的费用。拒绝客户端会导致损失,延迟获得请求的带宽也会导致损失。我们假设一个泊松到达过程,到达率对所收取的价格敏感。客户端请求带宽的时间呈指数分布,那么客户端空闲的时间也呈指数分布;然后客户端离开或者在空闲期结束后再次请求带宽。服务提供者试图根据其当前状态收取适当的价格,并决定是否接受更多的客户,从而使其收入最大化。由于会施加惩罚,因此此类解决方案还会自动平衡服务提供者之间的负载,从而提高对客户机的服务质量。我们提出的解决方案使服务提供商的收入最大化。然后用仿真方法对解决方案进行比较。仿真结果表明,与简单的启发式解决方案相比,我们分析的解决方案显著提高了客户的服务质量,增加了服务提供商的收入。
{"title":"Pricing with Bandwidth Guarantees for Clients with multi-ISP Connections","authors":"Rohit Tripathi, G. Barua","doi":"10.1145/2684464.2684497","DOIUrl":"https://doi.org/10.1145/2684464.2684497","url":null,"abstract":"The increase in internet coverage and decrease in internet access price has resulted in demand for good internet service. Clients want some guarantee in internet access quality. In this paper, we present a model in which clients are guaranteed connection and bandwidth and if clients do not get the service they request, the service provider pays a penalty to the clients. We consider a system of internet clients with multiple internet service provider (ISP) connections to a set of ISPs. When a client arrives, an ISP has to decide whether to accept the client, and then the price to charge from the client for the duration of its connection. Rejection of a client results in a penalty and delay in getting the requested bandwidth also incurs a penalty. We assume a Poisson arrival process with the rate of arrival sensitive to the price being charged. A client requests bandwidth for a time that is exponentially distributed, then the client is idle for a time that is also exponentially distributed; and then either the client departs or requests bandwidth again after the idle period is over. A service provider tries to maximize its income by charging appropriate prices based on its current state and deciding whether to accept more clients or not. Since penalties are imposed, such solutions also automatically balance load among service providers, and so the quality of service to clients improves. We present solutions that maximize the income of service providers. The solutions are then compared using simulation. Simulation results show that our analysed solution significantly improve quality of service of clients and increase the income of service providers as compared to a simple heuristic based solution that is otherwise could to be used.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124972426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Self-stabilizing Power-law Networks 自稳定幂律网络
T. Alsulaiman, Andrew Berns, Sukumar Ghosh
Power-law graphs model the interconnections in various types of large-scale networks ranging from physical and biological systems to man-made social networks and web graphs. In these graphs, the degree distribution of the nodes obeys the power-law property: the fraction of nodes P(k) having a degree k closely follows the rule P(k) ∞ k−-γ. In the domain of man-made systems, if the topology of a power-law network gets altered due to failures or adversarial attacks, then remedial actions to restore the power-law property are very important. This paper presents self-stabilizing algorithms for maintaining the power-law property in a network of processes. These algorithms allow spontaneous restoration of the power-law property from any initial connected configuration. The algorithms consist of three modular components: a detection component to detect the violation of the power-law property, an interim topology creation component, and a repair component to build the final graph. We propose two different interim topologies, a clique and a linear graph. We then present two different techniques for rebuilding the power-law topology -- a probabilistic approach based on the preferential attachment model, which stabilizes in O(log n) communication rounds with a link complexity of O(n) per process, and a deterministic approach that introduces the novel data structure Bridge Tree and stabilizes in O(n) communication rounds with a much lower link complexity.
幂律图模拟了从物理和生物系统到人工社会网络和网络图的各种类型的大规模网络中的相互联系。在这些图中,节点的度分布服从幂律性质:具有k度的节点P(k)的分数密切遵循规则P(k)∞k−-γ。在人工系统领域,如果幂律网络的拓扑结构由于故障或对抗性攻击而发生改变,那么恢复幂律性质的补救措施是非常重要的。本文提出了过程网络中保持幂律性质的自稳定算法。这些算法允许自发恢复幂律性质从任何初始连接配置。该算法由三个模块组成:检测幂律性质的检测组件、临时拓扑创建组件和构建最终图的修复组件。我们提出了两种不同的过渡拓扑,一个团和一个线性图。然后,我们提出了重建幂律拓扑的两种不同技术——一种基于优先依恋模型的概率方法,该方法在O(log n)轮通信中稳定,每个进程的链路复杂度为O(n);另一种确定性方法引入了新的数据结构桥树,并在O(n)轮通信中稳定,链路复杂度低得多。
{"title":"Self-stabilizing Power-law Networks","authors":"T. Alsulaiman, Andrew Berns, Sukumar Ghosh","doi":"10.1145/2684464.2684485","DOIUrl":"https://doi.org/10.1145/2684464.2684485","url":null,"abstract":"Power-law graphs model the interconnections in various types of large-scale networks ranging from physical and biological systems to man-made social networks and web graphs. In these graphs, the degree distribution of the nodes obeys the power-law property: the fraction of nodes P(k) having a degree k closely follows the rule P(k) ∞ k−-γ. In the domain of man-made systems, if the topology of a power-law network gets altered due to failures or adversarial attacks, then remedial actions to restore the power-law property are very important. This paper presents self-stabilizing algorithms for maintaining the power-law property in a network of processes. These algorithms allow spontaneous restoration of the power-law property from any initial connected configuration. The algorithms consist of three modular components: a detection component to detect the violation of the power-law property, an interim topology creation component, and a repair component to build the final graph. We propose two different interim topologies, a clique and a linear graph. We then present two different techniques for rebuilding the power-law topology -- a probabilistic approach based on the preferential attachment model, which stabilizes in O(log n) communication rounds with a link complexity of O(n) per process, and a deterministic approach that introduces the novel data structure Bridge Tree and stabilizes in O(n) communication rounds with a much lower link complexity.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132391029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security-Aware Dynamic Lightpath Allocation Scheme for WDM Networks WDM网络安全感知的动态光路分配方案
A. Jaekel, S. Bandyopadhyay, Saja Al-Mamoori, Sriharsha Varanasi
In recent years, there is growing recognition of the need to develop suitable mechanisms for reducing the adverse effects of malicious attacks such as high power jamming and tapping attacks. A number of recent papers have proposed static lightpath allocation approaches that take such security issues into consideration. Most of these approaches consider the routing problem separately from the wavelength assignment problem. In this paper we propose a new security-aware ILP formulation, as well as an efficient heuristic for the complete security-aware dynamic routing and wavelength assignment (RWA) problem. To the best of our knowledge, this is the first such work to jointly consider in-band and out-of-band attacks, for either static or dynamic case.
近年来,越来越多的人认识到需要开发合适的机制来减少恶意攻击(如高功率干扰和窃听攻击)的不利影响。最近的一些论文提出了静态光路分配方法,考虑到这些安全问题。这些方法大多将路由问题与波长分配问题分开考虑。在本文中,我们提出了一个新的安全感知的ILP公式,以及一个有效的启发式的完全安全感知动态路由和波长分配(RWA)问题。据我们所知,这是第一个共同考虑带内和带外攻击的工作,无论是静态还是动态情况。
{"title":"Security-Aware Dynamic Lightpath Allocation Scheme for WDM Networks","authors":"A. Jaekel, S. Bandyopadhyay, Saja Al-Mamoori, Sriharsha Varanasi","doi":"10.1145/2684464.2684502","DOIUrl":"https://doi.org/10.1145/2684464.2684502","url":null,"abstract":"In recent years, there is growing recognition of the need to develop suitable mechanisms for reducing the adverse effects of malicious attacks such as high power jamming and tapping attacks. A number of recent papers have proposed static lightpath allocation approaches that take such security issues into consideration. Most of these approaches consider the routing problem separately from the wavelength assignment problem. In this paper we propose a new security-aware ILP formulation, as well as an efficient heuristic for the complete security-aware dynamic routing and wavelength assignment (RWA) problem. To the best of our knowledge, this is the first such work to jointly consider in-band and out-of-band attacks, for either static or dynamic case.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129198694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Fast Lock-Free Internal Binary Search Tree 一个快速无锁内部二叉搜索树
Arunmoezhi Ramachandran, N. Mittal
We present a new lock-free algorithm for concurrent manipulation of a binary search tree in an asynchronous shared memory system that supports search, insert and delete operations. It combines ideas from two recently proposed lock-free algorithms: one of them provides good performance for a read-dominated workload and the other one for a write-dominated workload. Specifically, it uses internal representation of a search tree (as in the first one) and is based on marking edges instead of nodes (as in the second one). Our experiments indicate that our new lock-free algorithm outperforms other lock-free algorithms in most cases providing up to 35% improvement in some cases over the next best algorithm.
提出了一种新的无锁算法,用于异步共享内存系统中二叉搜索树的并发操作,该算法支持搜索、插入和删除操作。它结合了最近提出的两种无锁算法的思想:其中一种算法为以读为主的工作负载提供了良好的性能,另一种算法为以写为主的工作负载提供了良好的性能。具体来说,它使用搜索树的内部表示(如第一个),并且基于标记边缘而不是节点(如第二个)。我们的实验表明,我们的新无锁算法在大多数情况下优于其他无锁算法,在某些情况下比次优算法提高了35%。
{"title":"A Fast Lock-Free Internal Binary Search Tree","authors":"Arunmoezhi Ramachandran, N. Mittal","doi":"10.1145/2684464.2684472","DOIUrl":"https://doi.org/10.1145/2684464.2684472","url":null,"abstract":"We present a new lock-free algorithm for concurrent manipulation of a binary search tree in an asynchronous shared memory system that supports search, insert and delete operations. It combines ideas from two recently proposed lock-free algorithms: one of them provides good performance for a read-dominated workload and the other one for a write-dominated workload. Specifically, it uses internal representation of a search tree (as in the first one) and is based on marking edges instead of nodes (as in the second one). Our experiments indicate that our new lock-free algorithm outperforms other lock-free algorithms in most cases providing up to 35% improvement in some cases over the next best algorithm.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126096138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Randomized Rendezvous Algorithms for Agents on a Ring with Different Speeds 不同速度环上agent的随机交会算法
E. Kranakis, D. Krizanc, Fraser MacQuarie, S. Shende
We provide randomized rendezvous algorithms for two synchronous robots in a bi-directional ring of length n (n is a real number): the robots are equipped with identical chronometers, execute identical algorithms, but have different speeds u, 1 (where u > 1). In general, neither of the robots are aware of their own speed but in some cases they may be aware either of the magnitude of u or some quantity of time that depends on u, n. The robots start by choosing a direction uniformly and independently at random. Given integer k ≥ 0, we design algorithms that have the two robots alternate for k + 1 rounds between choosing the direction at random followed by walking for a predetermined time. In the last round the robots walk until rendezvous. The first algorithm, RV0, works with one random bit per robot and consists of a single round: after choosing their initial directions the robots never change direction. Rendezvous is established in u·n/2(u2−1) expected time and this is shown to be optimal among all randomized algorithms employing a single random bit during their execution. The second algorithm RV1(k), for k ≥ 1, has the two robots alternate for k + 1 rounds between choosing the direction at random followed by walking for a predetermined time u/u + 1; in the last step the robots walk until rendezvous. Among all algorithms that use k + 1 random bits we establish a sharp threshold; for u ≤ 2, RV1(k) is optimal in terms of expected rendezvous time while for u > 2, RV0 is optimal. Further, we provide new randomized rendezvous algorithms employing more random bits and analyze their expected rendezvous time depending on the knowledge of the robots about the length n of the ring and their speeds (u > 1).
我们提供了两个同步机器人在长度为n (n为实数)的双向环中的随机交会算法:机器人配备相同的计时器,执行相同的算法,但具有不同的速度u, 1(其中u > 1)。一般来说,两个机器人都不知道自己的速度,但在某些情况下,它们可能知道u的大小或取决于u, n的时间量。机器人开始时均匀独立地随机选择方向。给定整数k≥0,我们设计算法,让两个机器人在随机选择方向之间交替k + 1轮,然后在预定时间内行走。在最后一轮中,机器人一直走到会合点。第一种算法,RV0,每个机器人使用一个随机比特,由一个回合组成:在选择了它们的初始方向后,机器人永远不会改变方向。交会建立在u·n/2(u2−1)预期时间内,并且在执行过程中使用单个随机比特的所有随机算法中,这被证明是最优的。第二种算法RV1(k),当k≥1时,两个机器人随机选择方向,然后步行预定时间u/u + 1,交替k + 1轮;在最后一步,机器人走到会合点。在所有使用k + 1个随机比特的算法中,我们建立了一个尖锐的阈值;当u≤2时,RV1(k)以期望交会时间为最优,当u > 2时,RV0为最优。此外,我们提供了采用更多随机比特的新的随机交会算法,并根据机器人对环长度n和速度(u > 1)的了解分析了它们的预期交会时间。
{"title":"Randomized Rendezvous Algorithms for Agents on a Ring with Different Speeds","authors":"E. Kranakis, D. Krizanc, Fraser MacQuarie, S. Shende","doi":"10.1145/2684464.2684468","DOIUrl":"https://doi.org/10.1145/2684464.2684468","url":null,"abstract":"We provide randomized rendezvous algorithms for two synchronous robots in a bi-directional ring of length n (n is a real number): the robots are equipped with identical chronometers, execute identical algorithms, but have different speeds u, 1 (where u > 1). In general, neither of the robots are aware of their own speed but in some cases they may be aware either of the magnitude of u or some quantity of time that depends on u, n. The robots start by choosing a direction uniformly and independently at random. Given integer k ≥ 0, we design algorithms that have the two robots alternate for k + 1 rounds between choosing the direction at random followed by walking for a predetermined time. In the last round the robots walk until rendezvous. The first algorithm, RV0, works with one random bit per robot and consists of a single round: after choosing their initial directions the robots never change direction. Rendezvous is established in u·n/2(u2−1) expected time and this is shown to be optimal among all randomized algorithms employing a single random bit during their execution. The second algorithm RV1(k), for k ≥ 1, has the two robots alternate for k + 1 rounds between choosing the direction at random followed by walking for a predetermined time u/u + 1; in the last step the robots walk until rendezvous. Among all algorithms that use k + 1 random bits we establish a sharp threshold; for u ≤ 2, RV1(k) is optimal in terms of expected rendezvous time while for u > 2, RV0 is optimal. Further, we provide new randomized rendezvous algorithms employing more random bits and analyze their expected rendezvous time depending on the knowledge of the robots about the length n of the ring and their speeds (u > 1).","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130387717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Distributed Computation of Sparse Cuts via Random Walks 基于随机游动的稀疏切割分布计算
Atish Das Sarma, A. R. Molla, Gopal Pandurangan
A sparse cut of a graph is a partition of the vertices into two disjoint subsets such that the ratio of the number of edges across the two subsets divided by the sum of degrees of vertices in the smaller side is minimum. Finding sparse cuts is an important tool in analyzing large-scale distributed networks such as the Internet and Peer-to-Peer networks, as well as large-scale graphs such as the web graph, online social communities, and VLSI circuits. Sparse cuts are useful in graph clustering and partitioning among numerous other applications. In distributed communication networks, they are useful for topology maintenance and for designing better search and routing algorithms. In this paper, we focus on developing a fast distributed algorithm for computing sparse cuts in networks. Given an undirected n-node network G with conductance φ, the goal is to find a cut set whose conductance is close to φ. We present a distributed algorithm that finds a cut set with sparsity Õ(√φ) (Õ hides polylog n factors). Our algorithm works in the CONGEST distributed computing model and outputs a cut of conductance at most Õ (√φ) with high probability, in Õ(1/b(1/φ + n)log2) rounds, where b is balance of the cut of given conductance. In particular, to find a sparse cut of constant balance, our algorithm takes O((1/φ + n)log2 n) rounds. Our algorithm can also be used to output a local cluster, i.e., a subset of vertices near a given source node, and whose conductance is within a quadratic factor of the best possible cluster around the specified node. Our distributed algorithm can work without knowledge of the optimal φ value (with only a log n factor slowdown) and hence can be used to find approximate conductance values both globally and with respect to a given source node. Our algorithm uses random walks as a key subroutine and is fully decentralized and uses lightweight local computations. We also give a lower bound on the time needed for any distributed algorithm to compute any non-trivial sparse cut --- any distributed approximation algorithm (for any nontrivial approximation ratio) for computing sparsest cut will take Ω (√n + D) rounds, where D is the diameter of the graph. Our algorithm can be used to find sparse cuts (and their conductance values) and to identify well-connected clusters and critical edges in distributed networks. This in turn can be helpful in the design, analysis, and maintenance of topologically-aware networks.
图的稀疏切割是将顶点划分为两个不相交的子集,使得两个子集上的边数除以较小边的顶点度数之和的比率最小。寻找稀疏切割是分析大规模分布式网络(如Internet和p2p网络)以及大规模图(如web图、在线社会社区和VLSI电路)的重要工具。在许多其他应用中,稀疏切割在图聚类和分区中很有用。在分布式通信网络中,它们可用于拓扑维护和设计更好的搜索和路由算法。在本文中,我们致力于开发一种快速的分布式算法来计算网络中的稀疏切割。给定一个无向n节点网络G,其电导为φ,目标是找到一个电导接近φ的切集。我们提出了一种分布式算法,它可以找到一个稀疏性为Õ(√φ)的切集(Õ隐藏了多log n个因子)。我们的算法在CONGEST分布式计算模型中工作,并在Õ(1/b(1/φ + n)log2)轮中以高概率输出至多Õ(√φ)的电导切割,其中b是给定电导切割的平衡。特别是,为了找到一个常数平衡的稀疏切割,我们的算法需要O((1/φ + n)log2 n)轮。我们的算法也可以用于输出一个局部簇,即在给定源节点附近的一个顶点子集,其电导在指定节点周围最佳可能簇的二次因子内。我们的分布式算法可以在不知道最优φ值的情况下工作(只有log n因素的减速),因此可以用来找到全局和给定源节点的近似电导值。我们的算法使用随机游走作为关键子程序,并且是完全分散的,并使用轻量级的局部计算。我们还给出了任何分布式算法计算任何非平凡稀疏切割所需时间的下界——计算最稀疏切割的任何分布式近似算法(对于任何非平凡近似比)将需要Ω(√n + D)轮,其中D是图的直径。我们的算法可用于寻找稀疏切割(及其电导值),并识别分布式网络中连接良好的簇和临界边。这反过来又有助于拓扑感知网络的设计、分析和维护。
{"title":"Distributed Computation of Sparse Cuts via Random Walks","authors":"Atish Das Sarma, A. R. Molla, Gopal Pandurangan","doi":"10.1145/2684464.2684474","DOIUrl":"https://doi.org/10.1145/2684464.2684474","url":null,"abstract":"A sparse cut of a graph is a partition of the vertices into two disjoint subsets such that the ratio of the number of edges across the two subsets divided by the sum of degrees of vertices in the smaller side is minimum. Finding sparse cuts is an important tool in analyzing large-scale distributed networks such as the Internet and Peer-to-Peer networks, as well as large-scale graphs such as the web graph, online social communities, and VLSI circuits. Sparse cuts are useful in graph clustering and partitioning among numerous other applications. In distributed communication networks, they are useful for topology maintenance and for designing better search and routing algorithms. In this paper, we focus on developing a fast distributed algorithm for computing sparse cuts in networks. Given an undirected n-node network G with conductance φ, the goal is to find a cut set whose conductance is close to φ. We present a distributed algorithm that finds a cut set with sparsity Õ(√φ) (Õ hides polylog n factors). Our algorithm works in the CONGEST distributed computing model and outputs a cut of conductance at most Õ (√φ) with high probability, in Õ(1/b(1/φ + n)log2) rounds, where b is balance of the cut of given conductance. In particular, to find a sparse cut of constant balance, our algorithm takes O((1/φ + n)log2 n) rounds. Our algorithm can also be used to output a local cluster, i.e., a subset of vertices near a given source node, and whose conductance is within a quadratic factor of the best possible cluster around the specified node. Our distributed algorithm can work without knowledge of the optimal φ value (with only a log n factor slowdown) and hence can be used to find approximate conductance values both globally and with respect to a given source node. Our algorithm uses random walks as a key subroutine and is fully decentralized and uses lightweight local computations. We also give a lower bound on the time needed for any distributed algorithm to compute any non-trivial sparse cut --- any distributed approximation algorithm (for any nontrivial approximation ratio) for computing sparsest cut will take Ω (√n + D) rounds, where D is the diameter of the graph. Our algorithm can be used to find sparse cuts (and their conductance values) and to identify well-connected clusters and critical edges in distributed networks. This in turn can be helpful in the design, analysis, and maintenance of topologically-aware networks.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114707881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SAGE-PRoPHET: A Security Aided and Group Encounter based PRoPHET Routing Protocol for Dissemination of Post Disaster Situational Data SAGE-PRoPHET:一种基于安全辅助和群体遭遇的灾后情景数据传播先知路由协议
Souvik Basu, S. Bhattacharjee, Siuli Roy, S. Bandyopadhyay
In this paper, we propose SAGE-PRoPHET, a security enhanced PRoPHET routing protocol that enables secure dissemination of post disaster situational messages using history of group encounters. Post disaster rescue and relief operations are essentially group based, where volunteers and rescue workers, belonging to different rescue groups, relay situational information relevant to their group to their respective relief camps, in multiple hops on a peer-to-peer basis. Now, it is evidently better to route situational information, destined for a relief camp of a particular group, through volunteers of that group or who has a history of encountering volunteers of that group frequently. Such history of encounters based routing resembles the PRoPHET routing protocol for delay tolerant networks that forwards messages intended to a particular receiver through those nodes that encounter that receiver frequently. However, to use PRoPHET for such group based routing of group specific messages the protocol needs to be tuned to use history of group encounters rather than individual encounters. On the other hand, PRoPHET assumes that nodes in the network are trusted and cooperate towards message forwarding. Such assumption turns out inaccurate in presence of malicious nodes that may severely impede the delivery, accuracy and timeliness of situational messages. Therefore, integrating proper security components with PRoPHET is extremely important. Our proposed protocol adapts PRoPHET for post disaster group encounter based routing and enhances it by incorporating certain security elements into it to provide full security against possible attacks by malicious nodes in the network. Simulation results show that our proposed protocol, in a disaster scenario, offers better performance in comparison to other well known routing protocols.
在本文中,我们提出了SAGE-PRoPHET,这是一种安全性增强的PRoPHET路由协议,可以使用群体遭遇历史安全地传播灾后情景信息。灾后救援行动本质上是以小组为基础的,志愿者和救援人员,属于不同的救援小组,在点对点的基础上,通过多次跳跃,将与他们小组相关的情景信息传递给各自的救援营地。现在,通过该组织的志愿者或经常遇到该组织志愿者的人来传递情景信息显然更好,这些信息将被送到特定群体的救济营。这种基于相遇历史的路由类似于用于容忍延迟网络的PRoPHET路由协议,它通过那些经常遇到特定接收者的节点来转发打算发送给该接收者的消息。然而,要将PRoPHET用于这种基于组的特定于组的消息路由,需要对协议进行调优,以使用组遭遇的历史记录,而不是单个遭遇。另一方面,PRoPHET假设网络中的节点是可信的,并且在消息转发方面进行合作。在存在恶意节点的情况下,这种假设被证明是不准确的,因为恶意节点可能严重阻碍情景消息的传递、准确性和及时性。因此,将适当的安全组件集成到PRoPHET中是非常重要的。我们提出的协议适应了基于灾后组遭遇路由的PRoPHET,并通过将某些安全元素纳入其中来增强它,以提供针对网络中恶意节点可能攻击的完全安全性。仿真结果表明,在灾难场景下,与其他已知的路由协议相比,我们提出的协议提供了更好的性能。
{"title":"SAGE-PRoPHET: A Security Aided and Group Encounter based PRoPHET Routing Protocol for Dissemination of Post Disaster Situational Data","authors":"Souvik Basu, S. Bhattacharjee, Siuli Roy, S. Bandyopadhyay","doi":"10.1145/2684464.2684492","DOIUrl":"https://doi.org/10.1145/2684464.2684492","url":null,"abstract":"In this paper, we propose SAGE-PRoPHET, a security enhanced PRoPHET routing protocol that enables secure dissemination of post disaster situational messages using history of group encounters. Post disaster rescue and relief operations are essentially group based, where volunteers and rescue workers, belonging to different rescue groups, relay situational information relevant to their group to their respective relief camps, in multiple hops on a peer-to-peer basis. Now, it is evidently better to route situational information, destined for a relief camp of a particular group, through volunteers of that group or who has a history of encountering volunteers of that group frequently. Such history of encounters based routing resembles the PRoPHET routing protocol for delay tolerant networks that forwards messages intended to a particular receiver through those nodes that encounter that receiver frequently. However, to use PRoPHET for such group based routing of group specific messages the protocol needs to be tuned to use history of group encounters rather than individual encounters. On the other hand, PRoPHET assumes that nodes in the network are trusted and cooperate towards message forwarding. Such assumption turns out inaccurate in presence of malicious nodes that may severely impede the delivery, accuracy and timeliness of situational messages. Therefore, integrating proper security components with PRoPHET is extremely important. Our proposed protocol adapts PRoPHET for post disaster group encounter based routing and enhances it by incorporating certain security elements into it to provide full security against possible attacks by malicious nodes in the network. Simulation results show that our proposed protocol, in a disaster scenario, offers better performance in comparison to other well known routing protocols.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125808569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Opportunistic Spectrum Access in CR Network in Licensed and Unlicensed Channels CR网络在许可和非许可信道中的机会性频谱接入
R. Yadav, R. Misra, Utkarsh Gupta, Sourabh Bhagat
Cognitive radio networks (CRNs) is an emerging paradigm to exploit the spectrum holes very intelligently. In CRNs, it is important to use the under-utilized spectrum very effectively without affecting the primary users. However, the sudden appearance of the primary user forces the secondary user (SU) to hand-off to another available channel to continue it's transmission. CR system performances highly depend on the spectrum access behaviour of licensed users. Minimizing spectrum hand-off, blocking probability and dropping probability of secondary users (SUs) are the most challenging task in CRNs. Most of the existing dynamic spectrum access (DSA) schemes consider only licensed spectrum for the secondary users traffic without considering the transmissions also in the unlicensed bands. Thus to reduce dropping and blocking probabilities of secondary users, we extended classical schemes i.e. random access as well as reservation based channel access which consider unlicensed bands also. An analytical model based on 4-dimensional Markov chains is developed for random access as well as reservation access schemes that consider channel access opportunities in both licensed and unlicensed band. We studied opportunistic channel access problem for finite number of primary and secondary users. In addition, the hand-off, dropping and blocking probabilities of secondary users are derived as performance metrics and compared with the random scheme and reservation based schemes that do not considers unlicensed bands.
认知无线电网络(crn)是一种非常智能地利用频谱漏洞的新兴范例。在crn中,重要的是在不影响主要用户的情况下非常有效地利用未充分利用的频谱。但是,主用户的突然出现迫使辅助用户(SU)切换到另一个可用的信道继续传输。CR系统的性能在很大程度上取决于授权用户的频谱接入行为。最小化从用户的频谱切换、阻塞概率和丢弃概率是crn中最具挑战性的任务。现有的动态频谱接入(DSA)方案大多只考虑二级用户的授权频谱,而不考虑非授权频段的传输。因此,为了减少二次用户的丢失和阻塞概率,我们扩展了经典方案,即随机访问和基于保留的信道访问,也考虑了未许可的频带。基于四维马尔可夫链建立了随机接入和保留接入方案的分析模型,同时考虑了许可频段和非许可频段的信道接入机会。研究了有限主、次用户条件下的机会信道接入问题。此外,导出了辅助用户的切换、丢弃和阻塞概率作为性能指标,并与不考虑未许可频段的随机方案和基于保留的方案进行了比较。
{"title":"Opportunistic Spectrum Access in CR Network in Licensed and Unlicensed Channels","authors":"R. Yadav, R. Misra, Utkarsh Gupta, Sourabh Bhagat","doi":"10.1145/2684464.2684500","DOIUrl":"https://doi.org/10.1145/2684464.2684500","url":null,"abstract":"Cognitive radio networks (CRNs) is an emerging paradigm to exploit the spectrum holes very intelligently. In CRNs, it is important to use the under-utilized spectrum very effectively without affecting the primary users. However, the sudden appearance of the primary user forces the secondary user (SU) to hand-off to another available channel to continue it's transmission. CR system performances highly depend on the spectrum access behaviour of licensed users. Minimizing spectrum hand-off, blocking probability and dropping probability of secondary users (SUs) are the most challenging task in CRNs. Most of the existing dynamic spectrum access (DSA) schemes consider only licensed spectrum for the secondary users traffic without considering the transmissions also in the unlicensed bands. Thus to reduce dropping and blocking probabilities of secondary users, we extended classical schemes i.e. random access as well as reservation based channel access which consider unlicensed bands also. An analytical model based on 4-dimensional Markov chains is developed for random access as well as reservation access schemes that consider channel access opportunities in both licensed and unlicensed band. We studied opportunistic channel access problem for finite number of primary and secondary users. In addition, the hand-off, dropping and blocking probabilities of secondary users are derived as performance metrics and compared with the random scheme and reservation based schemes that do not considers unlicensed bands.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129757041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Solving Consensus in Opportunistic Networks 解决机会主义网络中的共识问题
Abdulkader Benchi, P. Launay, F. Guidec
Opportunistic networks are partially connected wireless ad hoc networks, in which pairwise unpredicted transient contacts between mobile devices are the only opportunities for these devices to exchange information or services. Ensuring the coordination of multiple parts of a distributed application in such conditions is a challenge. This paper presents a system that can solve consensus problems in an opportunistic network. This system combines an implementation of the One-Third Rule (OTR) algorithm with a communication layer that supports network-wide, content-driven message dissemination based on controlled epidemic routing. Experimental results obtained with a small flotilla of smartphones are also presented, that validate the system and demonstrate that consensus can be solved effectively in an opportunistic network.
机会网络是部分连接的无线自组织网络,其中移动设备之间的两两不可预测的瞬时接触是这些设备交换信息或服务的唯一机会。在这种情况下,确保分布式应用程序的多个部分的协调是一个挑战。本文提出了一个解决机会主义网络中共识问题的系统。该系统将三分之一规则(OTR)算法的实现与通信层相结合,该通信层支持基于受控流行病路由的网络范围内内容驱动的消息传播。本文还介绍了在一小部分智能手机上获得的实验结果,验证了该系统,并证明了在机会主义网络中可以有效地解决共识问题。
{"title":"Solving Consensus in Opportunistic Networks","authors":"Abdulkader Benchi, P. Launay, F. Guidec","doi":"10.1145/2684464.2684479","DOIUrl":"https://doi.org/10.1145/2684464.2684479","url":null,"abstract":"Opportunistic networks are partially connected wireless ad hoc networks, in which pairwise unpredicted transient contacts between mobile devices are the only opportunities for these devices to exchange information or services. Ensuring the coordination of multiple parts of a distributed application in such conditions is a challenge. This paper presents a system that can solve consensus problems in an opportunistic network. This system combines an implementation of the One-Third Rule (OTR) algorithm with a communication layer that supports network-wide, content-driven message dissemination based on controlled epidemic routing. Experimental results obtained with a small flotilla of smartphones are also presented, that validate the system and demonstrate that consensus can be solved effectively in an opportunistic network.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116695631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
Proceedings of the 16th International Conference on Distributed Computing and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1