A. Chaintreau, Pan Hui, J. Crowcroft, C. Diot, Richard Gass, James Scott
{"title":"Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms","authors":"A. Chaintreau, Pan Hui, J. Crowcroft, C. Diot, Richard Gass, James Scott","doi":"10.1109/INFOCOM.2006.172","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.172","url":null,"abstract":"Studying transfer opportunities between wireless devices carried by humans, we observe that the distribution of the inter-contact time, that is the time gap separating two contacts of the same pair of devices, exhibits a heavy tail such as one of a power law, over a large range of value. This observation is confirmed on six distinct experimental data sets. It is at odds with the exponential decay implied by most mobility models. In this paper, we study how this new characteristic of human mobility impacts a class of previously proposed forwarding algorithms. We use a simplified model based on the renewal theory to study how the parameters of the distribution impact the delay performance of these algorithms. We make recommendation for the design of well founded opportunistic forwarding algorithms, in the context of human carried devices.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134574890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Performance Modeling of IEEE 802.11 Based Wireless Networks: A Unified Framework and Its Applications","authors":"K. Medepalli, F. Tobagi","doi":"10.1109/INFOCOM.2006.219","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.219","url":null,"abstract":"We present a simple analytical model for IEEE 802.11 based wireless networks that effectively captures the important network performance characteristics such as throughput, delay and fairness. Several new insights relevant to network design are obtained by considering simple special cases of the model. Key features of our unified model include the ability to handle hidden/exposed terminals, directional antennas, multiple channels and arbitrary traffic matrices. The analytical framework is first applied to study the saturation throughput in a multi-hop setting. The associated flow starvation problem is investigated in detail and it is found that Exponential Backoff (EB) plays a much smaller role in flow starvation when compared to the minimum contention window (CWmin). We then illustrate applicability of our model to address key network design questions such as determining the feasibility of a particular traffic matrix and identifying bottlenecks. We also apply the framework to study the important problem of improving throughput and fairness in a multi-hop setting. It is observed from our results that a MAC protocol that adapts its minimum contention window CWmin is of greater utility than one that adapts to a value between fixed CWmin and CWmax (as the current EB in IEEE 802.11 does). Finally, guided by the model, we present a simple heuristic called Effective Contention Indicator (ECI) which identifies, to first-order, links experiencing severe contention.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"535 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133036356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Reporting","authors":"S. Olariu, I. Stojmenovic","doi":"10.1109/INFOCOM.2006.296","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.296","url":null,"abstract":"This paper investigates theoretical aspects of the uneven energy depletion phenomenon recently noticed in sink-based wireless sensor networks. We consider uniformly distributed sensors, each sending roughly the same number of reports toward the closest sink. We assume an energy consumption model governed by the relation E = d +c where d, (d ≤ tx), is the transmission distance, α ≥ 2 is the power attenuation, c is a technology-dependent positive constant, and tx is the maximum transmission range of sensors. Our results are multifold. First, we show that for α > 2, all sensors whose distance to the sink is min{tx, ( 2c α−2 ) 1 α } should transmit directly to the sink. Interestingly, this limit does not depend on the size of the network, expressed as the largest distance R from a sensor to the closest sink. Next, we prove that in order to minimize the total amount of energy spent on routing along a path originating at a sensor in a corona and ending at the sink, all the coronas must have the same width, equal to the above expression. This choice, however, leads to uneven energy depletion and to the creation of energy holes. We show that for α > 2 the uneven energy depletion can be prevented by judicious system design, resulting in balanced energy expenditure across the network. We describe an iterative process for determining the sizes of coronas. Their optimal sizes (and corresponding transmission radii) and the number of coronas depend on R. As expected, the width of coronas in energy-balanced sensor network increases. Finally, we show that for α = 2, the uneven energy depletion phenomenon is intrinsic to the system and no routing strategy can avoid the creation of an energy hole around the sink.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132122143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Landmark-Based Information Storage and Retrieval in Sensor Networks","authors":"Qing Fang, Jie Gao, L. Guibas","doi":"10.1109/INFOCOM.2006.115","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.115","url":null,"abstract":"For a wide variety of sensor network environments, location information is unavailable or expensive to obtain. We propose a location-free, lightweight, distributed, and data-centric storage/retrieval scheme for information producers and information consumers in sensor networks. Our scheme is built upon the Gradient Landmark-Based Distributed Routing protocol (GLIDER) [8], a two-level routing scheme where sensor nodes are partitioned into tiles by their graph distances to a small set of local landmarks so that localized and efficient routing can be achieved inside and across tiles. Our information storage and retrieval scheme uses two ideas on top of the GLIDER hierarchy — a distributed hash table on the combinatorial tile adjacency graph and a double-ruling scheme within each tile. Queries follow a path that will provably reach the data replicated by the producer(s). We show that this scheme compares favorably with previously proposed schemes, such as Geographic Hash Tables (GHT), providing comparable data storage performance and better locality-aware data retrieval performance. More importantly, this scheme uses no geographic information, makes few assumptions on the network model, and achieves better load balancing and structured data processing and aggregation even for sensor fields with complex geometric shapes and non-trivial topology.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"107 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113969419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS, Properties and Views to Achieve Dynamic Adaptivity","authors":"S. Mussino, M. Riva","doi":"10.1109/INFOCOM.2006.81","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.81","url":null,"abstract":"This paper presents our work in the context of the adaptive resource management (ARM) internal research project at the University of Milano-Bicocca, Italy. The project addresses those information systems that aim to adapt themselves dynamically and automatically in order to satisfy user requests with different levels of quality by managing properly their available resources.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115289745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Dual Channel MAC Protocol for IEEE802.11 Ad-Hoc Networks","authors":"P. Ng, D. Edwards, S. Liew","doi":"10.1109/INFOCOM.2006.70","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.70","url":null,"abstract":"In this paper, we propose a link-directionality-based dual channel MAC protocol in an attempt to double the capacities of networks using the single-channel 802.11 protocol. Simulations show that the proposed scheme can achieve more than 78% of our targeted capacities. We believe this is a first paper in the literature to propose a MAC protocol to transmit RTS/DATA and CTS/ACK of a link in different channels. This yields a large potential for multiplying the network capacities of ad-hoc networks by using only two channels.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capturing the Variability of Internet Flows Across Time","authors":"Jörg Wallerich, A. Feldmann","doi":"10.1109/INFOCOM.2006.37","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.37","url":null,"abstract":"More and more traffic management techniques, including accounting and load adaptive routing, try to take advantage of the fact that traffic demands are consistent with Zipf's law. By treating a few large volume demands differently they try to capture most of the traffic. This relies on the implicit assumption that traffic demands are persistent in volume over time; meaning that their volume does not change drastically over time. As this assumption has been shown to be incorrect we in this paper focus on how Internet flows behave over time. Accordingly, this paper examines the characteristics of volatility in a qualitative way by characterizing the components that are responsible for changes in the cast of heavy hitters over time.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127308774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TCP as an Implementation of Age-Based Scheduling: Fairness and Performance","authors":"A. Kherani, R. Nunez-queija","doi":"10.1109/INFOCOM.2006.103","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.103","url":null,"abstract":"We show that different flavors of TCP may be viewed as implementations of age-based scheduling disciplines. By parameterizing the scheduling disciplines of interest we are able to position variants of TCP in a wide spectrum having FCFS (first-come first-served) and LAS (least attained service first) as extremal policies, and including PS (processor sharing) as an intermediate case. We argue that for highly loaded systems, providing a fair bandwidth allocation among all users is secondary to ensuring network stability. So as to isolate protocol fairness from congestion effects, we therefore focus on scenarios with infinite buffers. This way, asymmetries in capacity shares are the consequences of the protocol only, and not affected by the packet loss process. The model, however, is flexible enough to include finite buffers with random packet loss as a special case (for example to capture Active Queue Management). The results are helpful in studying fairness and performance concerned with transmission protocols in communication networks. For persistent HTTP connections we study the distributions of the transmission rates and the relative fairness index under various assumptions on the file size distributions and scheduling disciplines. For infinite file sizes, we show that protocols that increase priority more than linearly with the attained service asymptotically behave similar to FCFS. In contrast, protocols with at most linearly increasing (or even decreasing) priority, with TCP's Congestion Avoidance mechanism as the most prominent example, converge to PS scheduling (even in absence of losses). When the priority is exactly linear in the attained service, such as for scalable TCP and TCP's slow start phase, the shares remain constant in between file initiations and completions.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127393353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relayed Multicast Scheme in IEEE 802.11 Wireless LAN Systems","authors":"K. Yoon, Y. Kim","doi":"10.1109/INFOCOM.2006.78","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.78","url":null,"abstract":"We propose a novel multicast scheme that can provide quality-of-service (QoS) to multicast service over IEEE 802.11 wireless LANs by utilizing MAC layer relay. We develop the distributed relay node selection algorithm and the relay channel selection algorithm. The effectiveness of proposed scheme is examined by simulation. Simulation results show that the proposed relayed multicast significantly improves throughput and delay performance.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126960576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BPB: A Novel Approach for Obtaining Network Path Characteristics in Non-Cooperative Environments","authors":"Sven Hessler","doi":"10.1109/INFOCOM.2006.68","DOIUrl":"https://doi.org/10.1109/INFOCOM.2006.68","url":null,"abstract":"Due to the growth of unresponsive UDP traffic in the Internet, it becomes increasingly important for ISPs to amply shape the traffic that leaves their network. Ideally, flows should be forced to be TCP-friendly; to this end, knowledge about certain end-to-end path characteristics is needed. We present a suitable mechanism (the Burst-PiggyBack (BPB) technique) that obtains the necessary information at a device that is located close to the sender without requiring any changes at the communicating peers or in routers. The method's hypothesis is that an injected probe packet at the end of a burst is treated similar to the burst.","PeriodicalId":163725,"journal":{"name":"Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125101341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}