The paper addresses the problem of broadcasting messages in a reliable manner within a practical asynchronous system where processes and channels may crash and recover. In this crash-recovery model, we present meaning...
详细信息
The paper addresses the problem of broadcasting messages in a reliable manner within a practical asynchronous system where processes and channels may crash and recover. In this crash-recovery model, we present meaningful specifications of reliable broadcast and we describe algorithms that implement those specifications. Our approach is modular and incremental. It is modular in the sense that we give the properties of reliable broadcast separately, and then consider their composition. It is incremental in the sense that we show how to automatically transform any reliable broadcast algorithm that implements a given specification into one that implements a stronger specification. In particular we show how to reuse, in a crash-recovery model, reliable broadcast algorithms that were initially designed in a simpler crash-stop model.
In this paper, we consider the problem of real-time multimedia transmission among several peers (users). The peers use a heterogeneous wireless multi-hop mesh network for the delivery of these high-bandwidth streams. ...
详细信息
In this paper, we consider the problem of real-time multimedia transmission among several peers (users). The peers use a heterogeneous wireless multi-hop mesh network for the delivery of these high-bandwidth streams. One of the main challenges of the considered problem is the division of the scarce wireless resources among the various peers. To address this problem, we propose an efficient, distributed and collaborative framework for wireless resource exchanges that enables peers to divide available wireless resources among themselves based on their quality of service (QoS) requirements, the underlying channel conditions and network topology. The scalable coding of the video content and decomposition of video flows into various sub-flows (priorities) allow peers to transfer the video at different quality levels, depending on the network load. Users collaboratively decide which of their sub-flows to admit, and which paths these sub-flows should be transmitted on in order to maximize a system defined utility. Our results show that with user collaboration, these distributed algorithms provide system and user performance comparable to a centralized exhaustive implementation.
This paper presents a simple routing protocol based on topology control and cost-forwarding that improves the life-time of a Wireless Sensor Network in the usual convergecast pattern, by allowing the nodes to choose b...
详细信息
This paper presents a simple routing protocol based on topology control and cost-forwarding that improves the life-time of a Wireless Sensor Network in the usual convergecast pattern, by allowing the nodes to choose between two predefined power-levels to forward data towards the sink. The proposed protocol takes advantage of non-homogeneous topologies, where the nodes are grouped in clouds. Nodes use the highest power only when necessary, like for bridging the distance between two clouds. Within the clouds, only low-power links are used. The underlying distributed algorithm is shown to converge and finds, for each node of the network, an efficient path to the sink.
The motivation for this paper is to analyze the effect of information uncertainty on the design and performance of protocols. The paper considers two types of situations. The first is when different nodes in the netwo...
详细信息
The motivation for this paper is to analyze the effect of information uncertainty on the design and performance of protocols. The paper considers two types of situations. The first is when different nodes in the network have bounded knowledge about what other nodes know. The second, called common knowledge about inconsistent beliefs, is when the information is inconsistent but everyone knows it. Situations of bounded or inconsistent information arise naturally in networks because the state of these systems changes and nodes take time to learn of those changes. The specific problem that the paper explores is the relaying of packets in a simple butterfly network. Despite its apparent simplicity, this problem enables to illustrate key features of situations of uncertain knowledge that arise in networks. The paper presents two impossibility facts and one possibility fact, in the latter of which a scheme that enables optimal coordination given persisting imperfection in knowledge is introduced.
In this paper, we propose a new explicit multicast protocol for MANET, called EM2NET. The objective of EM2NET is to efficiently support large number of small multicast groups in MANETs. EM2NET strikes a nice balance b...
详细信息
In this paper, we propose a new explicit multicast protocol for MANET, called EM2NET. The objective of EM2NET is to efficiently support large number of small multicast groups in MANETs. EM2NET strikes a nice balance between the characteristics of explicit multicast protocols (e.g., Xcast and E2M) and these of tree/mesh-based multicast protocols (e.g., ODMRP and MAODV). Indeed, it combines the encoding of destinations addresses in the packet header and the maintenance of multicast state information in carefully selected nodes. Simulations show that EM2NET outperforms (a) explicit multicast protocols and (b) tree/mesh based protocols in the case of small size multicast groups.
We present multi-DisPeL, a penalty-based local search distributed algorithm which is able to solve coarse-grained distributed constraint satisfaction problems (DisCSPs) efficiently. Multi-DisPeL uses penalties on valu...
详细信息
ISBN:
(纸本)9780769530277
We present multi-DisPeL, a penalty-based local search distributed algorithm which is able to solve coarse-grained distributed constraint satisfaction problems (DisCSPs) efficiently. Multi-DisPeL uses penalties on values in order to escape local optima during problem solving rather than the popular weights on constraints. We also introduce DisBO-wd, a stochastic algorithm based on DisBO (distributed breakout) which includes a weight decay mechanism. We compare multi-DisPeL and DisBO-wd with other algorithms and show, empirically, that they are more efficient and at least as effective as state of the art algorithms in some problem classes.
distributed algorithms for average consensus in directed graphs are typically asymptotic in the literature. In this work, we propose a protocol to distributively reach average consensus in a finite number of steps on ...
详细信息
ISBN:
(纸本)9781467357159
distributed algorithms for average consensus in directed graphs are typically asymptotic in the literature. In this work, we propose a protocol to distributively reach average consensus in a finite number of steps on interconnection topologies that form strongly connected directed graphs (digraphs). The average consensus value can be computed, based exclusively on local observations at each component, by running a protocol that requires each component to observe and store its own value over a finite and minimal number of steps, and to have knowledge of the number of its out-going links (i.e., the number of components to which it sends information). The proposed algorithm is demonstrated via illustrative examples.
Energy related research in wireless ad hoc sensor networks (WASNs) is focusing on energy saving techniques in the application-, protocol-, service-, or hardware-level. Little has been done to manage the finite amount ...
详细信息
Energy related research in wireless ad hoc sensor networks (WASNs) is focusing on energy saving techniques in the application-, protocol-, service-, or hardware-level. Little has been done to manage the finite amount of energy for a given (possibly optimally-designed) set of applications, protocols and hardware. Given multiple candidate applications (i.e., distributed algorithms in a WASN) of different energy costs and different user rewards, how does one manage a finite energy amount? Where does one provide energy, so as to maximize the useful work done (i.e. maximize user rewards)? We formulate the problem at the node-level, by having system-level "hints" from the applications. In order to tackle the central problem we first identify the energy consumption patterns of applications in WASNs, we propose ways for real-time measurements of the energy consumption by individual applications, and we solve the problem of estimating the extra energy consumption that a new application brings to a set of executing applications. Having these tools at our disposal, and by properly abstracting the problem we present an optimal admission control policy and a post-admission policing mechanism at the node-level. The admission policy can achieve up to 48% increase in user rewards compared to the absence of energy management, for a variety of application mixes.
An approach to analyzing self-stabilization based on the finite-state machine model is presented. A finite-state machine is used to model the behavior of each node in a distributed system. when the self-stabilizing al...
详细信息
An approach to analyzing self-stabilization based on the finite-state machine model is presented. A finite-state machine is used to model the behavior of each node in a distributed system. when the self-stabilizing algorithms are applied. The approach is useful for analyzing the correctness of self-stabilizing algorithms and their time complexity. A self-stabilizing algorithm for finding maximal matching is used as an example to show how the finite-state machine model is applied. A simpler proof for the correctness and an upper bound of the time complexity tighter than the one proved by a variant function are attained.< >
We consider a multi-agent network of second-order dynamics and study its resilient consensus taking account of cyber security issues. In our setting, some of the agents may be malicious whose aim is to prevent other n...
详细信息
ISBN:
(纸本)9781479978878
We consider a multi-agent network of second-order dynamics and study its resilient consensus taking account of cyber security issues. In our setting, some of the agents may be malicious whose aim is to prevent other normal agents from reaching consensus. They may do so by not following the given control laws and behaving arbitrarily. It is assumed that the total number of such agents in the network is known. The normal agents are equipped with a simple algorithm where neighbors taking the largest and smallest values are ignored to avoid being influenced by malicious agents. We address this problem when the inter-agent communication have bounded time-varying delays with an emphasis on networks of vehicles. Topological conditions in terms of graph robustness are developed.
暂无评论