We introduce the dynamic policy routing (DPR) model that captures the propagation of route updates under arbitrary changes in topology or path preferences. DPR introduces the notion of causation chains where the route...
详细信息
ISBN:
(纸本)9781424446353
We introduce the dynamic policy routing (DPR) model that captures the propagation of route updates under arbitrary changes in topology or path preferences. DPR introduces the notion of causation chains where the route flap at one node causes a flap at the next node along the chain.
We obtain the robust Nash equilibrium (RNE) for a wide range of multi-user communications networks under uncertainty by utilizing the robust optimization theory for the worst-case uncertainties. To do so, we consider ...
详细信息
We obtain the robust Nash equilibrium (RNE) for a wide range of multi-user communications networks under uncertainty by utilizing the robust optimization theory for the worst-case uncertainties. To do so, we consider the uncertainty as a distance between the estimated and the actual values of the system parameters as a general norm function, and utilize the finite-dimensions variational inequalities (VI) to derive the conditions for existence and uniqueness of RNE. Two effects of uncertainty on the performance of the system are investigated: the difference between the achieved social utility at the RNE and the Nash equilibrium (NE) of the nominal game, and the distance between the deployed strategies of users at the RNE and at the NE. We quantify these two effects for the cases of unique NE and multiple NEs, and show that when the NE is unique, the achieved social utility at the RNE is always less than that of the NE. Interestingly, the worst-case robustness approach may lead to a higher social utility at the RNE in the multiple NEs scenario. Considering uncertainty at RNE introduces coupling between users, and hence, developing distributed algorithms for reaching RNE is more challenging as compared to the NE in the nominal game. However, for some special forms of utilities and norm functions, we propose simultaneous and sequential distributed algorithms; and investigate the performance of the robust game for power control in interference channels, and for flow control in Jackson networks.
We study an approach for sharing channels to improve network utilization in packet-switched cellular networks. This scheme exploits unused resources in neighboring cells without the need for global coordination. We fo...
详细信息
We study an approach for sharing channels to improve network utilization in packet-switched cellular networks. This scheme exploits unused resources in neighboring cells without the need for global coordination. We formulate a minimax approach to optimizing the allocation of channels in this sharing scheme. We develop a distributed algorithm to achieve this objective and study its convergence. We illustrate, via simulation results, that the distributed channel sharing scheme performs better than the fixed channel scheme over a wide variety of traffic conditions.
In this presentation, we introduce a fast restoration scheme against a link or node failure. Specifically, we apply this scheme to VP (Virtual Path) restoration in ATM (Asynchronous Transfer Mode) networks. Proposed r...
详细信息
ISBN:
(纸本)0780343514
In this presentation, we introduce a fast restoration scheme against a link or node failure. Specifically, we apply this scheme to VP (Virtual Path) restoration in ATM (Asynchronous Transfer Mode) networks. Proposed restoration scheme operates on VP-based ATM network. This scheme is a distributed algorithm performed concurrently by network nodes neighboring failed node or link. When a node or link fails, restoration is performed according to the pre-assigned local, regional, and end-to-end restoration scheme. For this, we assigned a restoration level to each network nodes and VPs, respectively. Also, we devise and construct a VP loop, and fast restoration is performed along this loop. This loop is expanded when a failure occurs, and this expanded loop is used for the restoration of the failed VP connection. We define the required VP loop architecture, restoration messages, and restoration procedures. Proposed algorithm is simulated and compared with general flooding restoration scheme. Results show that the proposed loop-expanding restoration scheme can achieve fast restoration goal with a lower burden to network.
The generation of transmission schedules for self-organizing radio networks by traffic sensitive algorithms is described. A centralized traffic algorithm is used as a basis for the comparison of other algorithms. This...
详细信息
The generation of transmission schedules for self-organizing radio networks by traffic sensitive algorithms is described. A centralized traffic algorithm is used as a basis for the comparison of other algorithms. This algorithm is based on a suggestion made by Ephremides and Truong (see IEEE INFOCOM 1988, p.1119) to construct a priority rule based on traffic requirements. Although it is not possible to implement this algorithm in a distributed form, a distributed algorithm using nodal degree to determine priority among nodes is presented and shown to produce results closer to those of the preferred traffic-based algorithm than id-number-based priority does.< >
We consider an extended committee coordination problem in an autonomous decentralized social environment. The basic committee coordination problem and a distributed algorithm, as a solution to this problem in a distri...
详细信息
We consider an extended committee coordination problem in an autonomous decentralized social environment. The basic committee coordination problem and a distributed algorithm, as a solution to this problem in a distributed environment, are presented by K.M. Chandy and J. Misra (1988). The algorithm guarantees the synchronous and exclusion properties of the problem and is fair (i.e. starvation-free) and makes progress (i.e. deadlock-free). In an autonomous decentralized social environment, besides the above mentioned properties, some social properties, such as individual preference, privacy protection, and stable assignment, are required to be considered and guaranteed. We extend the committee coordination problem by introducing some social properties, such as individual preference and stable assignment and give a decentralized social algorithm as a solution to this extended problem. The algorithm guarantees not only the synchronous and exclusion properties but also individual preference and stable assignment properties.< >
Label switched networks have become increasingly attractive to both network providers and customers. By creating aggregate, bandwidth-reserved flows, these networks offer routing flexibility, predictable bandwidth usa...
详细信息
ISBN:
(纸本)0769514294
Label switched networks have become increasingly attractive to both network providers and customers. By creating aggregate, bandwidth-reserved flows, these networks offer routing flexibility, predictable bandwidth usage, and quality-of-service (QoS) provisioning. This flexibility in routing enables fault-persistent QoS reservations, where connectivity, and allotted bandwidth remains available, even if some links or network nodes fail. The automatic switch-over from a now-defunct path to a new, working path is known as restoration. Restoring bandwidth-guaranteed paths requires allocation of resources on backup paths that will be used in the event of faults. In this paper, we investigate distributed algorithms for routing with backup restoration. Specifically, we propose a new concept of backup load distribution matrix that captures partial network state, greatly reducing the amount of routing information maintained and transmitted while achieving efficient bandwidth usage. We present and simulate two new distributed routing algorithms, which provide significant improvements in rejection rates and provide substantial savings in bandwidth used and call setup time compared to existing algorithms.
Tree-based backbone establishment and maintenance in mobile ad hoc - delay tolerant networks is often operated through the use of traversing tokens. A study and framework are proposed here for various token traversal ...
详细信息
Tree-based backbone establishment and maintenance in mobile ad hoc - delay tolerant networks is often operated through the use of traversing tokens. A study and framework are proposed here for various token traversal strategies on tree-based backbones. The proposed strategies execute in a distributed and purely decentralized manner, and require only 1-hop knowledge. Aiming at providing the highest robustness and quality of services, these token-traversal strategies are studied in particular with an algorithm for merging and maintaining the different trees based on the quality of the nodes. For the robustness aspect, the use of a trust-based evaluation framework is assumed and the weights of the different nodes are based on their quality of cooperation. Three cost functions are implemented in order to evaluate the trust based framework proposed, including another function for evaluating tree-convergence time. Results and comparison charts are provided to illustrate the trade-off between the various strategies in terms of performance, cost (memory and communication) and robustness.
Building application level multicast (ALM) for media streaming, we had better keep the invariability of source to-end delay (S2EDelay) of any node on the tree, so as to avoid delay jitter problem. In this paper, we pr...
详细信息
Building application level multicast (ALM) for media streaming, we had better keep the invariability of source to-end delay (S2EDelay) of any node on the tree, so as to avoid delay jitter problem. In this paper, we proposed an aggregation-based ALM architecture, which aggregates the unstable nodes within a local area into a relative stable aggregation node Anode, and then builds tree by Anodes. Anode shields node's dynamicity inside and behaves as a stable one outside. To build the architecture, we first proposed an Anode structure by n-dimension anti-cube, and proposed a distributed algorithm to bind the logic view and physical view of an Anode dynamically by the differentiation and assimilation operations, which maintain the integrality of the logic view while the physical view changes dynamically. Experiment results indicate that our algorithm can keep the S2EDelay invariability of the built ALM tree effectively.
Virtual backbone formation is a popular approach to reduce the routing overhead and increase the network scalability in the wireless ad hoc networks. Most of the centralized and distributed algorithms aim at minimizin...
详细信息
Virtual backbone formation is a popular approach to reduce the routing overhead and increase the network scalability in the wireless ad hoc networks. Most of the centralized and distributed algorithms aim at minimizing the size of the virtual backbone. However, if every node of the network has a cost for handling the additional responsibilities as backbone node, goal of the backbone construction algorithm should be the minimization of the total cost. In this paper, we propose a distributed low cost backbone construction algorithm with the message complexity of O(n). Simulation results show that the proposed algorithm is cost and message efficient.
暂无评论