We consider the problem of maintaining communication between the nodes of a data network and a central station in the presence of frequent topological changes as, for example, in mobile packet radio networks. We argue...
详细信息
We consider the problem of maintaining communication between the nodes of a data network and a central station in the presence of frequent topological changes as, for example, in mobile packet radio networks. We argue that flooding schemes have significant drawbacks for such networks, and propose a general class of distributed algorithms for establishing new loop-free routes to the station for any node left without a route due to changes in the network topology. By virtue of built-in redundancy, the algorithms are typically activated very infrequently and, even when they are, they do not involve any communication within the portion of the network that has not been materially affected by a topological change.
A distance-k dominating set D of a directed graph G is a set of vertices such that for every vertex v of G, there is a vertex u is an element of D and the distance between u and v is at most k. Minimum distance-k domi...
详细信息
A distance-k dominating set D of a directed graph G is a set of vertices such that for every vertex v of G, there is a vertex u is an element of D and the distance between u and v is at most k. Minimum distance-k dominating set is especially important in communication networks for distributed data structures and for server placement. In this paper, we show that there is a unique minimum distance-k dominating set for k = 1, 2 in a directed split-star, which has recently been developed as a new model of the interconnection network for parallel and distributed computing systems. Moreover, we shall present simple distributed algorithms for finding such sets. (C) 2003 Elsevier Science (USA). All rights reserved.
Operator placement plays a key role in reducing the aggregate network overhead within a wireless sensor network (WSN) to extend battery life and the longevity of the network. Consequently, optimal algorithms for the o...
详细信息
Operator placement plays a key role in reducing the aggregate network overhead within a wireless sensor network (WSN) to extend battery life and the longevity of the network. Consequently, optimal algorithms for the operator placement problem (OPP) are of paramount importance to WSN performance. Unfortunately, the OPP becomes NP-complete when capacity constraints on the WSN nodes are taken into account. There are many algorithms in the literature that tackle the OPP;however, most of them consider tree-structured query graphs without limitations regarding the operators hosted by the WSN nodes. Therefore, there is a need to propose sophisticated approaches such that the problem is solved in an effective fashion. In this paper, we propose a fully distributed approach that takes into account the WSN node capacity constraints. The proposed approach is thoroughly evaluated through simulations and the results reveal that the proposed approach is superior to several state-of-the-art algorithms, such as DRA, DBA, MCFA, dFNS, and GRAL* found in the literature.
Rate adaptive media streams bear similarities to both elastic (e.g., file transfer) and inelastic (e.g., voice) network traffic classes. As such a service model for streaming media should incorporate characteristics o...
详细信息
Rate adaptive media streams bear similarities to both elastic (e.g., file transfer) and inelastic (e.g., voice) network traffic classes. As such a service model for streaming media should incorporate characteristics of both classes: guaranteed minimum rates (for minimally acceptable quality of service (QoS)) and an efficient mechanism for intelligently allocating excess capacity among the competing streams. In this paper we apply the system decomposition Kelly (Charging and rate control for elastic traffic. European Transactions on Communications 8:33-37, 1997) and distributed algorithms framework Kelly et al. (Rate control in communication networks: shadow prices, proportional fairness, and stability. J Oper Res Soc 49:237-252, 1998), developed by Frank Kelly et al. in the context of elastic traffic, to a service model for rate adaptive media streams. Our aim is to allocate excess capacity among competing streams so as to maximize a weighted client-average QoS, where each client QoS is defined as the time-average utility of the instantaneous received rate. We develop the corresponding system decomposition and distributed algorithms appropriate for rate adaptive media streams. Two distinct classes of distributed algorithms are derived: i) a distributed algorithm for dynamic adaptation, where the instantaneous subscription level of each stream is adjusted in response to network updates on route congestion levels, and ii) a distributed algorithm for static adaptation. The stationary point of the static adaptation algorithm is an admission policy that assigns each stream a fixed (in time) transmission rate as a function of the stream volume (the total number of bits associated with the media object). Our results, consistent with earlier work Weber and de Veciana (Rate adaptive multimedia streams: optimization and admisssion control. IEEE/ACM Trans Netw 13(6):1275-1288, December 2005a), confirm the intuitive idea that client average QoS is maximized by granting preferen
In this paper, we study the optimization problems for a group of agents whose individual objective functions and constraints may depend on the variables of neighboring agents. Several algorithms are proposed based on ...
详细信息
ISBN:
(纸本)9781538613955
In this paper, we study the optimization problems for a group of agents whose individual objective functions and constraints may depend on the variables of neighboring agents. Several algorithms are proposed based on operator splitting techniques that can iteratively converge to an optimal primal (or dual) solution of the optimization problems. Then, via random coordinate updates, asynchronous implementations of the algorithms are developed with low computation and communication complexity and guaranteed almost sure convergence to an optimal solution. Numerical results are presented to illustrate the proposed algorithms.
In this paper we study the unsplittable flow problem (UFP) on tree networks in a distributed setting. We have a set of processors (or agents) and a set of tree networks defined over some vertex set. Each processor can...
详细信息
ISBN:
(纸本)9780769549712
In this paper we study the unsplittable flow problem (UFP) on tree networks in a distributed setting. We have a set of processors (or agents) and a set of tree networks defined over some vertex set. Each processor can access a subset of the tree networks. Each edge in each of the tree networks is associated with a capacity. Each processor has a demand specified as a pair of vertices.. and.., along with a profit and a height;the processor wishes to send data between.. and.. and requires bandwidth equal to its height. Towards that goal, the processor needs to select a tree network accessible to it. A feasible solution selects a subset of demands and schedules each selected demand on a tree network accessible to the processor owning the demand. The requirement is that for any tree network and any edge in the network, the sum of heights of demands scheduled on the network and passing through the edge must not exceed the capacity offered by the edge. The goal is to output a solution having the maximum aggregate profit. Prior work has addressed the above problem in a distributed setting for the special case where all the edge capacities are uniform, say one unit. The main contributions of this paper is to address the general case where the edge capacities can be non-uniform and arbitrary. For this case, we present distributed algorithms with poly-logarithmic approximation ratio.
We consider the problem of computing local clusters in large graphs distributed across nodes in a network using two different models of distributed computation. We give a distributed algorithm that computes a local cl...
详细信息
ISBN:
(纸本)9783319267845;9783319267838
We consider the problem of computing local clusters in large graphs distributed across nodes in a network using two different models of distributed computation. We give a distributed algorithm that computes a local cluster in time that depends only logarithmically on the size of the graph in the CONGEST model. In particular, when the conductance of the optimal local cluster is known, the algorithm runs in time entirely independent of the size of the graph and depends only on error bounds for approximation. We also show that the local cluster problem can be computed in the k-machine distributed model in sublinear time. The speedup of our local cluster algorithms is mainly due to the use of our distributed algorithm for heat kernel pagerank.
By considering the existence of bridge sensor nodes that lose the capability of sensing, the average bridge consensus problem aims to achieve the average of selective observations only from sensing nodes while bridge ...
详细信息
ISBN:
(纸本)9781509021826
By considering the existence of bridge sensor nodes that lose the capability of sensing, the average bridge consensus problem aims to achieve the average of selective observations only from sensing nodes while bridge nodes play the role of relaying information. We note that traditional average consensus algorithms achieve the global average of states from all nodes in the network, which are not directly applied here. In this paper we present two distributed algorithms for solving the bridge consensus problem on fixed-tree networks in finite time and a class of time-varying networks exponentially fast, respectively. Both theoretical and numerical results are provided for validations of the proposed algorithms.
This paper considers the problem of distributively verifying and ensuring strong connectivity of directed networks. Strong connectivity of a directed graph associated with the communication network topology is crucial...
详细信息
ISBN:
(纸本)9781665436595
This paper considers the problem of distributively verifying and ensuring strong connectivity of directed networks. Strong connectivity of a directed graph associated with the communication network topology is crucial in ensuring the convergence of many distributed algorithms. Specifically, inspired by maximum consensus algorithm, we first propose a distributed algorithm that enables nodes in a networked system to verify strong connectivity of a directed graph. Then, given an arbitrary weakly connected directed graph, we develop a distributed algorithm to augment additional links to ensure the directed graph's strong connectivity. Both algorithms are implemented without requiring information of the overall network topology and are scalable (linearly with the number of nodes) as they only require finite storage and converge in finite number of steps. Finally, the proposed distributed algorithms are demonstrated via several examples.
Since its inception, the concept of network coordinates has been proposed to solve a wide variety of problems such as overlay optimization, network routing, network localization, and network modeling. However, two pra...
详细信息
ISBN:
(纸本)9781605583341
Since its inception, the concept of network coordinates has been proposed to solve a wide variety of problems such as overlay optimization, network routing, network localization, and network modeling. However, two practical problems significantly limit the applications of network coordinates today. First, how can network coordinates be stabilized without losing accuracy so that they can be cached by applications? Second, how can network coordinates be secured Such that legitimate nodes' coordinates are not impacted by misbehaving nodes? Although these problems have been discussed extensively, solving them in decentralized network coordinates systems remains an open problem. This paper presents new distributed algorithms to solve the coordinates stability and security problems. For the stability problem, we propose an error elimination model that can achieve stability without hurting accuracy. A novel algorithm based on this model is presented. For the security problem, we show that recently proposed statistical detection mechanisms cannot achieve an acceptable level of security against even simple attacks. We propose to address the security problem in two parts. First, we show how the computation of coordinates can be protected by a customized Byzantine fault detection algorithm. Second, we adopt a triangle inequality violation detection algorithm to protect delay measurements. These algorithms can be integrated together to provide stable and secure network coordinates.
暂无评论