Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing最新文献

筛选
英文 中文
On the performance of largest-deficit-first for scheduling real-time traffic in wireless networks 基于最大赤字优先的无线网络实时流量调度性能研究
Xiaohan Kang, Weina Wang, J. J. Jaramillo, Lei Ying
{"title":"On the performance of largest-deficit-first for scheduling real-time traffic in wireless networks","authors":"Xiaohan Kang, Weina Wang, J. J. Jaramillo, Lei Ying","doi":"10.1145/2491288.2491298","DOIUrl":"https://doi.org/10.1145/2491288.2491298","url":null,"abstract":"This paper considers the problem of scheduling real-time traffic in wireless networks. We consider an ad hoc wireless network with general interference and general one-hop traffic. Each packet is associated with a deadline and will be dropped if it is not transmitted before the deadline expires. The number of packet arrivals in each time slot and the length of a deadline are both stochastic and follow certain distributions. We only allow a fraction of packets to be dropped. At each link, we assume the link keeps track of the difference between the minimum number of packets that need to be delivered and the number of packets that are actually delivered, which we call deficit. The largest-deficit-first (LDF) policy schedules links in descending order according to their deficit values, which is a variation of the largest-queue-first (LQF) policy for non-real-time traffic. We prove that the efficiency ratio of LDF can be lower bounded by a quantity that we call the real-time local-pooling factor (R-LPF). We further prove that given a network with interference degree β, the R-LPF is at least 1/(β+1), which in the case of the one-hop interference model translates into an R-LPF of at least 1/3.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129080399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Heavy-traffic-optimal scheduling with regular service guarantees in wireless networks 无线网络中有规律业务保障的大流量最优调度
Bin Li, Ruogu Li, A. Eryilmaz
{"title":"Heavy-traffic-optimal scheduling with regular service guarantees in wireless networks","authors":"Bin Li, Ruogu Li, A. Eryilmaz","doi":"10.1145/2491288.2491304","DOIUrl":"https://doi.org/10.1145/2491288.2491304","url":null,"abstract":"We consider the design of throughput-optimal scheduling policies in multi-hop wireless networks that also possess good mean delay performance and provide regular service for all links -- critical metrics for real-time applications. To that end, we study a parametric class of maximum-weight type scheduling policies with parameter α ≥ 0, called Regular Service Guarantee (RSG) Algorithm, where each link weight consists of its own queue-length and a counter that tracks the time since the last service. This policy has been shown to be throughput-optimal and to provide more regular service as the parameter α increases, however at the cost of increasing mean delay. This motivates us to investigate whether satisfactory service regularity and low mean-delay can be simultaneously achieved by the RSG Algorithm by carefully selecting its parameter α. To that end, we perform a novel Lyapunov-drift based analysis of the steady-state behavior of the stochastic network. Our analysis reveals that the RSG Algorithm can minimize the total mean queue-length to establish mean delay optimality under heavily-loaded conditions as long as α scales no faster than the order of 1/5√∈, where ∈ measures the closeness of the network load to the boundary of the capacity region. To the best of our knowledge, this is the first work that provides regular service to all links while also achieving heavy-traffic optimality in mean queue-lengths.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126465989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Energy-efficient fault-tolerant data storage & processing in dynamic networks 动态网络中高能效容错数据存储与处理
Chien-An Chen, M. Won, R. Stoleru, G. Xie
{"title":"Energy-efficient fault-tolerant data storage & processing in dynamic networks","authors":"Chien-An Chen, M. Won, R. Stoleru, G. Xie","doi":"10.1145/2491288.2491325","DOIUrl":"https://doi.org/10.1145/2491288.2491325","url":null,"abstract":"With the advance of mobile devices, cloud computing has enabled people to access data and computing resources without spatiotemporal constraints. A common assumption is that mobile devices are well connected to remote data centers and the data centers securely store and process data. However, for systems like mobile cloud deployed in infrastructureless dynamic networks (i.e., with frequent topology changes because of node failure/unavailability and mobility), reliability and energy efficiency remain largely unaddressed challenges. To address these issues, we develop the first 'k-out-of-n computing' framework that ensures nodes retrieve or process data stored in mobile cloud with minimum energy consumption as long as k out of n storage/processing nodes are accessible. We demonstrate the feasibility and performance of our framework through both hardware implementation and extensive simulations.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124452483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Informative counting: fine-grained batch authentication for large-scale RFID systems 信息计数:大规模RFID系统的细粒度批量认证
Wei Gong, Kebin Liu, Xin Miao, Q. Ma, Zheng Yang, Yunhao Liu
{"title":"Informative counting: fine-grained batch authentication for large-scale RFID systems","authors":"Wei Gong, Kebin Liu, Xin Miao, Q. Ma, Zheng Yang, Yunhao Liu","doi":"10.1145/2491288.2491299","DOIUrl":"https://doi.org/10.1145/2491288.2491299","url":null,"abstract":"Many algorithms have been introduced to deterministically authenticate Radio Frequency Identification (RFID) tags, while little work has been done to address the scalability issue in batch authentications. Deterministic approaches verify them one by one, and the communication overhead and time cost grow linearly with increasing size of tags. We design a fine-grained batch authentication scheme, INformative Counting (INC), which achieves sublinear authentication time and communication cost in batch verifications. INC also provides authentication results with accurate estimates of the number of counterfeiting tags and genuine tags, while previous batch authentication methods merely provide 0/1 results indicating the existence of counterfeits. We conduct detailed theoretical analysis and extensive experiments to examine this design and the results show that INC significantly outperforms previous work in terms of effectiveness and efficiency.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125859466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Adaptive channel bonding in multicarrier wireless networks 多载波无线网络中的自适应信道绑定
Pei Huang, Xi Yang, Li Xiao
{"title":"Adaptive channel bonding in multicarrier wireless networks","authors":"Pei Huang, Xi Yang, Li Xiao","doi":"10.1145/2491288.2491328","DOIUrl":"https://doi.org/10.1145/2491288.2491328","url":null,"abstract":"To support high data rate applications such as multimedia streaming, the ongoing standardization of the next generation Wi-Fi increases the channel bonding from 40 MHz in 802.11n to 80, and even 160 MHz under certain conditions in 802.11ac. However, inefficiency and unfairness issues arise when devices that use different channel widths coexist in a contention domain. A device with channel bonding has to wait until all bonded channels to be idle to commence a transmission while narrow channel interferers have more channel access opportunities. To address the inefficiency and unfairness issues in channel bonding, we propose an adaptive channel bonding (ACB) protocol in which a node is allowed to initiate a transmission as long as a narrow channel is available and gradually increase channel width during transmission whenever a new narrow channel becomes available. ACB aggregates all available narrow channels as one wide channel, removing the need of setting guard bands between contiguous narrow channels. A challenge in the design is the communication over uncertain channels. To enable fast spectrum agreement between transmitter and receiver, a partial spectrum correlation method is introduced. ACB also considers the severe contention in a wide band of spectrum. When new channels become available, multiple nodes may contend for them. A compound preamble is designed to make collisions detectable in the frequency domain and a parallel bitwise arbitration mechanism is introduced to quickly resolve the collisions in the time domain. We implemented and evaluated the ACB through the GNU Radio/USRP platform. Experimental results show that ACB can well address the inefficiency and unfairness issues caused by heterogeneous radio coexistence.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121187512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Community based cooperative content caching in social wireless networks 社交无线网络中基于社区的协作内容缓存
Mahmoud Taghizadeh, S. Biswas
{"title":"Community based cooperative content caching in social wireless networks","authors":"Mahmoud Taghizadeh, S. Biswas","doi":"10.1145/2491288.2491318","DOIUrl":"https://doi.org/10.1145/2491288.2491318","url":null,"abstract":"This paper presents a conceptual framework of social community based cooperative caching for minimizing electronic content provisioning cost in Mobile Social Wireless Networks (MSWNET). Drawing motivation from Amazon's Kindle electronic book delivery model, this paper develops practical network, service, and pricing models which are then used for creating an optimal cooperative caching strategy based on social community abstraction in wireless networks.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131456101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Practical opportunistic routing in high-speed multi-rate wireless mesh networks 高速多速率无线网状网络中的实用机会路由
Wei Hu, Jin Xie, Zhenghao Zhang
{"title":"Practical opportunistic routing in high-speed multi-rate wireless mesh networks","authors":"Wei Hu, Jin Xie, Zhenghao Zhang","doi":"10.1145/2491288.2491310","DOIUrl":"https://doi.org/10.1145/2491288.2491310","url":null,"abstract":"Opportunistic Routing (OR) has been proven effective for wireless mesh networks. However, the existing OR protocols cannot meet all the requirements for high-speed, multi-rate wireless mesh networks, including: running on commodity Wi-Fi interface, supporting TCP, low complexity, supporting multiple link layer data rates, and exploiting partial packets. In this paper, we propose Practical Opportunistic Routing (POR), a new OR protocol that meets all above requirements. The key features of POR include: packet forwarding based on a per-packet feedback mechanism, block-based partial packet recovery, multi-hop link rate adaptation, and a novel path cost calculation which enables good path selection by considering the ability of nodes to select appropriate data rates to match the channel conditions. We implement POR within the Click modular router and our experiments in a 16-node wireless testbed confirm that POR achieves significantly better performance than the compared protocols for both UDP and TCP traffic.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127929211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
SMASHER: a strategy-proof combinatorial auction mechanism for heterogeneous channel redistribution SMASHER:异构渠道再分配的无策略组合拍卖机制
Zhenzhe Zheng, Fan Wu, Guihai Chen
{"title":"SMASHER: a strategy-proof combinatorial auction mechanism for heterogeneous channel redistribution","authors":"Zhenzhe Zheng, Fan Wu, Guihai Chen","doi":"10.1145/2491288.2491330","DOIUrl":"https://doi.org/10.1145/2491288.2491330","url":null,"abstract":"Auction is believed to be an effective way to solve or relieve the problem of radio spectrum shortage, by dynamically redistributing idle wireless channels of primary users to secondary users. However, to design a practical channel auction mechanism, we have to consider five challenges, including strategy-proofness, channel spatial reusability, channel heterogeneity, bid diversity, and social welfare maximization. Unfortunately, none of the existing works fully considered the five design challenges. In this paper, we present the first in-depth study on the problem of dynamic channel redistribution by jointly considering the five design challenges, and present SMASHER, which is a Strategy-proof coMbinatorial Auction mechaniSm for HEterogeneous channel Redistribution. Our analyses show that SMASHER achieves both strategy-proofness and approximately efficient social welfare.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128628165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Quantize-map-forward (QMF) relaying: an experimental study 量子化前向映射(QMF)中继:一种实验研究
M. Duarte, Ayan Sengupta, Siddhartha Brahma, C. Fragouli, S. Diggavi
{"title":"Quantize-map-forward (QMF) relaying: an experimental study","authors":"M. Duarte, Ayan Sengupta, Siddhartha Brahma, C. Fragouli, S. Diggavi","doi":"10.1145/2491288.2491307","DOIUrl":"https://doi.org/10.1145/2491288.2491307","url":null,"abstract":"We present the design and experimental evaluation of a wireless system that exploits relaying in the context of WiFi. We opt for WiFi given its popularity and wide spread use for a number of applications, such as smart homes. Our testbed consists of three nodes, a source, a relay and a destination, that operate using the physical layer procedures of IEEE802.11. We deploy three main competing strategies that have been proposed for relaying, Decode-and-Forward (DF), Amplify-and-Forward (AF) and Quantize-Map-Forward (QMF). QMF is the most recently introduced of the three, and although it was shown in theory to approximately achieve the capacity of arbitrary wireless networks, its performance in practice had not been evaluated. We present in this work experimental results---to the best of our knowledge, the first ones---that compare QMF, AF and DF in a realistic indoor setting. We find that QMF is a competitive scheme to the other two, offering in some cases up to 12% throughput benefits and up to 60% improvement in frame error-rates over the next best scheme.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128775874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Minimum makespan workload dissemination in DTNs: making full utilization of computational surplus around ddn中最小完工时间工作负载分配:充分利用周围的计算剩余
S. Zhang, Jie Wu, Sanglu Lu
{"title":"Minimum makespan workload dissemination in DTNs: making full utilization of computational surplus around","authors":"S. Zhang, Jie Wu, Sanglu Lu","doi":"10.1145/2491288.2491327","DOIUrl":"https://doi.org/10.1145/2491288.2491327","url":null,"abstract":"This paper poses the following problem: given a task that originates at some node in a Delay Tolerant Network (DTN), how are we to disseminate the workload during pairwise contacts to minimize the makespan? We first investigate the scenario in which each node has access to an oracle that knows global and future knowledge of node mobility, and we propose a centralized polynomial-time optimal algorithm. We then develop a distributed dissemination protocol, D2, which maintains r-hop neighborhood information at individual nodes. D2 makes dissemination decisions based on the estimations of the potential computational capacities and the future workloads of DTN nodes. Using trace-driven simulations, we show that, D2 with only 1-hop information is already near-optimal in a wide variety of environments, and the performance gap becomes smaller as the amount of information maintained at individual nodes increases.","PeriodicalId":234414,"journal":{"name":"Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116388108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信