This paper studies load balancing for multipath Internet routing. We focus on hash-based load balancing algorithms that work on the flow level to avoid packet reordering which is detrimental for the throughput of tran...
详细信息
ISBN:
(纸本)9781424404247
This paper studies load balancing for multipath Internet routing. We focus on hash-based load balancing algorithms that work on the flow level to avoid packet reordering which is detrimental for the throughput of transport layer protocols like TCP. We propose a classification of hash-based load balancing algorithms, review existing ones and suggest new ones. Dynamic algorithms can actively react to load imbalances which causes route changes for some flows and thereby again packet reordering. Therefore, we investigate the load balancing accuracy. and flow reassignment rate of load balancing algorithms. Our exhaustive simulation experiments show that these performance measures depend significantly on the traffic properties and on the algorithms themselves. As a consequence, our results should be taken into account for the application of load balancing in practice.
Localization is an important issue for Wireless sensor Networks in a wireless sensor network. A mobile sensor may change its position rapidly and thus require localization calls frequently. It is important to control ...
详细信息
ISBN:
(数字)9783540683803
ISBN:
(纸本)9783540683797
Localization is an important issue for Wireless sensor Networks in a wireless sensor network. A mobile sensor may change its position rapidly and thus require localization calls frequently. It is important to control the number of localization calls, as it is rather expensive. The existing schemes for reducing the frequency of localization calls for mobile sensors uses the technique of extrapolation which involves simple arithmetic calculations. We propose a technique to control the localization that gives much better result. The proposed method involves very low arithmetic computation overheads. We find analytical expressions for the estimated error if the rate of localizations is specified. Simulation studies are carried out to compare the performances of the proposed method with the methods proposed by Tilak et al.
Wireless sensor networks (WSNs) typically exploit a single base station for collecting data and coordinating activities. However, decentralized architectures are rapidly emerging, as witnessed by wireless sensor and a...
详细信息
In the population protocol model introduced by Angluin et al. [2], a collection of agents, which are modelled by finite state machines, move around unpredictably and have pairwise interactions. The ability of such sys...
详细信息
We consider the problem of estimating vector-valued variables from noisy "relative" measurements. The measurement model can be expressed in terms of a graph, whose nodes correspond to the variables being est...
详细信息
In this paper, a novel Multi-agent control system with fuzzy inference learning and its physical testbed are presented. In the Multi-agent system, distributed controlling, monitoring and cooperative learning are achie...
详细信息
ISBN:
(纸本)3540380914
In this paper, a novel Multi-agent control system with fuzzy inference learning and its physical testbed are presented. In the Multi-agent system, distributed controlling, monitoring and cooperative learning are achieved through ubiquitous computing paradigm. The physical testbed named distributed Embedded Intelligence Room (DEIR) is equipped with a fair amount of embedded devices interconnected in three types of physical networks, namely LonWorks network, RS-485 network and IP network. The changes of environment states and user actions are recorded by software agents and are processed by fuzzy inference learning algorithm to form fuzzy rules that capture user behaviour. With these rules, fuzzy logic controllers can perform user preferred control actions. Comparative analysis shows our control system has achieved noticeable improvement in control accuracy compared to the other offline control system.
Resource constrained systems often are programmed using an event-based model. Many applications do not lend themselves well to an event-based approach, but preemptive multithreading pre-allocates resources that cannot...
详细信息
Ad hoc Wireless sensor Networks derive much of their promise from their potential for autonomously monitoring remote or physically inaccessible locations [3]. As we begin to deploy sensor networks in real world applic...
详细信息
ISBN:
(纸本)9781424404988
Ad hoc Wireless sensor Networks derive much of their promise from their potential for autonomously monitoring remote or physically inaccessible locations [3]. As we begin to deploy sensor networks in real world applications [8], concerns are being raised about the fidelity and integrity of the sensor network data. In this paper, we motivate and propose an online algorithm that leverages Competitive Learning Neural Network for characterization of a dynamic, unknown environment. Based on the proposed characterization sensor networks can autonomously construct multimodal views of their environments and derive the conditions for verifying data integrity over time.
In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secret keys[5], [6], [10], authenticate all co...
详细信息
ISBN:
(纸本)9781424404247
In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secret keys[5], [6], [10], authenticate all communications with cryptographic functions[8], and also apply secure information aggregation schemes[13] or hop-by-hop filtering methods[14], [16]. However, these security measures can take considerable overhead in terms of storage, communication and computation, which are scarce resources in sensor nodes. Previously proposed security measures can only resist against a limited number of compromised nodes, which we define as the resistance level. In this paper, we propose a separate solution to any security measure. This technique either significantly reduces the overhead, or increases the resistance level without increasing overhead. The solution is based on a new "Mixed Multi-Channel" (MMC) architecture. In this design, each node can only use one fixed channel. The whole network is thus divided into multiple "planes" by the different planes. Exploiting the characteristics of multi-channel communication, a series of methods are proposed, such as MMC-1, MMC-k and MMC-r. We then present designs to integrate the methods with current security measures, and analyze their resistance level and energy conservation.
User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network deployment in which sensors may provide u...
详细信息
暂无评论