In this paper, we propose a permission-based message efficient mutual exclusion (MUTEX) algorithm for mobile ad hoc networks (MANETs). To reduce messages cost, the algorithm uses the "look-ahead" technique, ...
详细信息
In this paper, we propose a permission-based message efficient mutual exclusion (MUTEX) algorithm for mobile ad hoc networks (MANETs). To reduce messages cost, the algorithm uses the "look-ahead" technique, which enforces MUTEX only among the hosts currently competing for the critical section. We propose mechanisms to handle dozes and disconnections of mobile hosts. The assumption of FIFO channel in the original "look-ahead" technique is also relaxed. The proposed algorithm can also tolerate link or host failures, using timeout-based mechanisms. Both analytical and simulation results show that the proposed algorithm works well under various conditions, especially when the mobility is high or load level is low. To our knowledge, this is the first permission-based MUTEX algorithm for MANETs. (C) 2007 Elsevier B.V. All rights reserved.
Estimating distances in the Internet has been studied in the recent years due to its ability to improve the performance of many applications, e.g., in the peer-to-peer realm. One scalable approach to estimate distance...
详细信息
Estimating distances in the Internet has been studied in the recent years due to its ability to improve the performance of many applications, e.g., in the peer-to-peer realm. One scalable approach to estimate distances between nodes is to embed the nodes in some d dimensional geometric space and to use the pair distances in this space as the estimate for the real distances. Several algorithms were suggested in the past to do this in low dimensional Euclidean spaces. It was noted in recent years that the Internet structure has a highly connected core and long stretched tendrils, and that most of the routing paths between nodes in the tendrils pass through the core. Therefore, we suggest in this work, to embed the Internet distance metric in a hyperbolic space where routes are bent toward the center. We found that if the curvature, that defines the extend of the bending, is selected in the adequate range, the accuracy of Internet distance embedding can be improved. We demonstrate the strength of our hyperbolic embedding with two applications: selecting the closest server and building an application level multicast tree. For the latter, we present a distributed algorithm for building geometric multicast trees that achieve good trade-offs between delay (stretch) and load (stress). We also present a new efficient centralized embedding algorithm that enables the accurate embedding of short distances, something that have never been done before.
Efficient and accurate sensor deployment is a critical requirement for the development of wireless sensor networks. Recently, distributed energy-efficient self-deployment algorithms, such as the intelligent deployment...
详细信息
Efficient and accurate sensor deployment is a critical requirement for the development of wireless sensor networks. Recently, distributed energy-efficient self-deployment algorithms, such as the intelligent deployment and clustering algorithm (IDCA) and the distributed self-spreading algorithm (DSSA), have been proposed to offer almost uniform distribution for sensor deployment by employing a synergistic combination of cluster structuring and a peer-to-peer deployment scheme. However, both DSSA and IDCA suffer from unnecessary movements that have arisen from an inappropriate design in partial force. To improve the performance of self-deployment algorithms, a uniform and energy-efficient deployment algorithm (UEEDA) is proposed in this paper. Simulation results demonstrate that the proposed UEEDA outperforms both DSSA and IDCA in terms of uniformity and algorithm convergence speed. Copyright (C) 2007 John Wiley & Sons, Ltd.
We study efficient interference-aware joint routing and TDMA link scheduling for a multihop wireless network to maximize its throughput. Efficient link scheduling can greatly reduce the interference effect of close-by...
详细信息
We study efficient interference-aware joint routing and TDMA link scheduling for a multihop wireless network to maximize its throughput. Efficient link scheduling can greatly reduce the interference effect of close-by transmissions. Unlike the previous studies that often assume a unit disk graph (UDG) model, we assume that different terminals could have different transmission ranges and different interference ranges. In our model, it is also possible that a communication link may not exist due to barriers or is not used by a predetermined routing protocol, while the transmission of a node always result interference to all nonintended receivers within its interference range. Using a mathematical formulation, we develop interference-aware joint routing and synchronized TDMA link schedulings that optimize the networking throughput subject to various constraints. Our linear programming formulation will find a flow routing whose achieved throughput is at least a constant fraction of the optimum, and the achieved fairness is also a constant fraction of the requirement. Then, by assuming known link capacities and link traffic loads, we study link scheduling under the request-to-send and clear-to-send (RTS/CTS) interference model and the protocol interference model (PrIM) with fixed transmission power. For both models, we present both efficient centralized and distributed algorithms that use timeslots within a constant factor of the optimum. We also present efficient distributed algorithms whose performances are still comparable with optimum, but with much less communications. We prove that the timeslots needed by our faster distributed algorithms are only at most O(min(log n, log psi)) for RTS/CTS interference model and PrIM. Our theoretical results are corroborated by extensive simulation studies.
Task scheduling continues to be one of the most challenging problems in both parallel and distributed computing environments. In this paper, we present a task scheduling algorithm, which uses duplication, to optimally...
详细信息
Task scheduling continues to be one of the most challenging problems in both parallel and distributed computing environments. In this paper, we present a task scheduling algorithm, which uses duplication, to optimally schedule any application represented in the form of a directed acyclic graph (DAG). It has a time complexity of O(d vertical bar V vertical bar(3)), where vertical bar V vertical bar represents the number of tasks and d the maximum indegree of tasks. (C) 2007 Elsevier B.V. All rights reserved.
We consider the problem of maximizing the lifetime of a given multicast connection in mobile ad hoc networks (MANETs) that use omnidirectional antennas and have limited energy resources. Unlike most multicast algorith...
详细信息
We consider the problem of maximizing the lifetime of a given multicast connection in mobile ad hoc networks (MANETs) that use omnidirectional antennas and have limited energy resources. Unlike most multicast algorithms that use centralized greedy algorithms to achieve maximum lifetime in static ad hoc networks, we present two distributed multicast algorithms, i.e., basic energy-efficient multicast (BEEM) and distributed maximum lifetime multicast (DMLM), for the same optimization problem in MANETs. Our distributed algorithms also explore the localized operations to take advantage of the power saving offered by the wireless multicast advantage property in mobile networks. The extensive simulation results have shown that our DMLM algorithm outperforms other proposals in terms of multicast lifetime under different node mobilities.
The Do-All problem is about scheduling t similar and independent tasks to be performed by p processors prone to crashes. We assume that the distributed system is synchronous with processors communicating by message pa...
详细信息
The Do-All problem is about scheduling t similar and independent tasks to be performed by p processors prone to crashes. We assume that the distributed system is synchronous with processors communicating by message passing. Crashes are determined by a fully adaptive adversary that is restricted only by an upper bound f on the number of crashes. The complexity of algorithms is measured by work and communication, where work is defined as the number of available-processor steps, and communication as the number of point-to-point messages. We develop a randomized algorithm with W = O(t + p. log(2) p/log log p) expected work and O((p/p-f)(3.4) W) expected communication, for an arbitrary number f < p of crashes. (C) 2008 Elsevier B.V. All rights reserved.
This paper describes a novel gradient descent algorithm for the constrained optimization of spreading sequence design in the uplink of CDMA systems that use codeword adaptation. We prove that the proposed algorithm co...
详细信息
This paper describes a novel gradient descent algorithm for the constrained optimization of spreading sequence design in the uplink of CDMA systems that use codeword adaptation. We prove that the proposed algorithm converges to the optimal sequence. In addition, the paper demonstrates the convergence of the parallel distributed optimization which is confirmed by simulations. Parallel optimization ensures faster convergence and thus reduces computational load. The performance of the parallel algorithm is improved as the number of active users increases.
In order to enforce the sensing performance of mobile sensor network (MSN), an enhanced self-deployment (ESD) algorithm is proposed in this paper. By designing the virtual repulsive force between nodes, the movement e...
详细信息
ISBN:
(纸本)9780769534800
In order to enforce the sensing performance of mobile sensor network (MSN), an enhanced self-deployment (ESD) algorithm is proposed in this paper. By designing the virtual repulsive force between nodes, the movement equation and the virtual attracting-field in the sensing area, the problems of the network partition and coverage holes which are aroused by conventional potential-field-based deployment approach is solved. Simulation results show that ESD algorithm exhibits excellent performance and expands the generalization of MSN greatly.
We consider a network of randomly-deployed, low-cost sensors and a single powerful sink node. A partition-based localization algorithm is proposed in which the sink node imparts sector-based location information throu...
详细信息
We consider a network of randomly-deployed, low-cost sensors and a single powerful sink node. A partition-based localization algorithm is proposed in which the sink node imparts sector-based location information through the phased-array transmission of a series of beacons. One-hop neighbor information is used by each sensor in a series of sector-partitioning routines to identify the sub-sector in which it resides. A geographic routing algorithm is then proposed which uses the sector-based localization results as the basis for a routing algorithm. Simulation results indicate that the performance of our localization algorithm improves with node density, and that the performance of the combined localization and routing algorithm in the presence of severe measurement noise is comparable with that provided by the same routing algorithm using perfect location information.
暂无评论