{"title":"Multi Criteria Decision Analysis assisted Routing in Wireless Sensor Network using Fuzzy rules","authors":"S. Bhunia, Bijoy Das, N. Mukherjee","doi":"10.1145/2684464.2684499","DOIUrl":"https://doi.org/10.1145/2684464.2684499","url":null,"abstract":"Wireless sensor network is a self-organizing wireless network system which has enabled densely deployment of nodes. These wireless sensors gather and forward data. But finding an efficient route is a challenge while the nodes communicate for data transmission. A routing algorithm, FMCR, is proposed in this paper. A well-known operations research technique, multi-criteria decision analysis, is used in this proposed scheme. Here multiple criteria, such as residual energy, packet transmission frequency and hop count are taken into account. In order to assign the weighted values on each criterion, Fuzzy rules are applied on heuristic properties like node density, dead nodes and delay. The best route is selected using Weighted Product Model (WPM). This scheme has been implemented using TinyOS, an event-driven operating system designed for wireless sensor network.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132349932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Boruvka-Incremental Power Greedy Heuristic for Strong Minimum Energy Topology in Wireless Sensor Networks","authors":"B. S. Panda, B. K. Bhatta, Deepak Mishra, S. De","doi":"10.1145/2684464.2684490","DOIUrl":"https://doi.org/10.1145/2684464.2684490","url":null,"abstract":"Given a set of sensors, the strong minimum energy topology (SMET) problem is to assign transmission range to each sensor node so that the sum of the transmission range for all the sensor is minimum subject to the constraint that the network is strongly connected (there is a directed path between every pair of nodes in the Network). This problem is known to be NP-hard. As this problem has lots of practical applications, several approximation algorithms and heuristics have been proposed. In this paper, we propose a new heuristic called Boruvka-incremental power greedy heuristic based on the Boruvka algorithm for the minimum spanning tree (MST) problem for solving the SMET problem. We compare the performance of the Boruvka-incremental power greedy heuristic with Kruskal-incremental power greedy heuristic and Prim-incremental power greedy heuristic. Extensive simulation results illustrate that Boruvka heuristic outperforms the Kruskal-incremental power greedy heuristic and Prim-incremental power greedy heuristic. We have also proved that apart from providing significant improvement in terms of average power savings, Boruvka incremental power greedy heuristic takes O(n) time for planar graphs as compared to O(n log n) time taken by Kruskal-incremental power greedy heuristic and O(n2) time taken by Prim-incremental power greedy heuristic, where n is the number of nodes in the network.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131621044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An adaptive P2P overlay for MANETs","authors":"M. Seddiki, Mahfoud Benchaïba","doi":"10.1145/2684464.2684496","DOIUrl":"https://doi.org/10.1145/2684464.2684496","url":null,"abstract":"In recent years, many researchers have focused on the deployment of Peer-To-Peer (or P2P) applications over Mobile-Adhoc NETworks (or MANETs) motivated by the common characteristics shared between the P2P overlay and the MANET underlay such as decentralization, self-organization and dynamic topology. However, conventional P2P overlays which consist on virtual connections between peers are usually constructed without considering the physical underlay. This causes a considerable mismatch between the P2P overlay and the network underlay and leads to unnecessary network traffic and inefficient paths between overlay neighbors. In this paper, we propose an adaptive overlay over MANET. The objective of our proposal is to build an unstructured overlay with the consideration of the MANET underlay topology. Simulation results show that our overlay likely-matches and fits the MANET underlay.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131578000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Controlling Unfairness due to Physical Layer Capture and Channel Bonding in 802.11n+s Wireless Mesh Networks","authors":"Sandip Chakraborty, Sukumar Nandi","doi":"10.1145/2684464.2684486","DOIUrl":"https://doi.org/10.1145/2684464.2684486","url":null,"abstract":"This paper analyzes the effect of physical layer capture (PLC) and channel bonding over high throughput wireless mesh backbone network built over IEEE 802.11n+s standard. With the help of PLC, a signal can be recovered from channel noise and interference if the difference between the received signal strengths is more than a predefined threshold. It is well known that PLC can affect fairness during channel access by biasing towards the link with better signal strength. In this paper, we show that in the presence of channel bonding, high throughput links always suffer due to PLC, that ensues severe unfairness in a mesh backbone network. As a consequence, the performance of the network drops significantly from its actual capacity. This paper presents an adaptive bonding opportunity and channel reservation scheme to mitigate from network unfairness in an IEEE 802.11n+s mesh network. The performance of the proposed scheme is analyzed and evaluated using a 13 node mesh networking testbed. It has been observed that the adaptive bonding opportunity and channel reservation performs significantly better in terms of fairness compared to the standard, and results in a notable performance improvement for end-to-end flow parameters.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124145999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobility Aware Event Dissemination in VANET","authors":"J. Mukherjee, Arobinda Gupta","doi":"10.1145/2684464.2684498","DOIUrl":"https://doi.org/10.1145/2684464.2684498","url":null,"abstract":"Many future VANET applications will be event-driven and will require events of different kinds to be delivered to vehicles en route in time. In this work, we propose a publish-subscribe based communication framework for a service provider (SP) that utilizes its roadside units (RSUs) to deliver relevant events to moving vehicles. Vehicles subscribe to a SP for specific types of events; the events are also reported to the SP. The SP delivers the events to the subscribed vehicles within the validity periods of both the subscriptions and the events through RSUs placed along the route of the vehicles. The problem is referred as the Minimum Cost Event Placement Problem [10] that schedules the placement of events in RSUs for different time intervals so that the events are delivered to the subscribed vehicles while incurring minimum cost of utilization of the RSUs. In this paper, we give a ln n approximation algorithm for the problem, where n is the number of subscriptions. We then propose a centralized online algorithm to solve the problem. A lower bound on the cost of utilization of the RSUs for a given set of subscriptions and events is presented next. Detailed simulation results in realistic city traffic scenarios are presented to show the performance of the algorithms.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123132052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TADL: A Trust-Aware Dynamic Location-Based Protocol Suite For Discovering Multiple Paths in MANETs","authors":"Helen Bakhsh, Ning Zhang, A. Carpenter","doi":"10.1145/2684464.2684491","DOIUrl":"https://doi.org/10.1145/2684464.2684491","url":null,"abstract":"This paper describes the design and evaluation of a multiple path discovery protocol suite aimed at finding a set of most trust-worthy paths for routing higher priority traffic towards a destination node with minimum overhead costs. The protocol suite, called a the Trust-Aware Dynamic Location-based (TADL) protocol suite, has taken three measures to optimize the path discovery outcome: (a) it uses a directional approach to broadcast route request packets to a destination, (b) it adjust the size of the searching area dynamically in response to the underlying network conditions, and (c) it uses trust values to govern the selection of neighbours in path formation and to reduce the overhead incurred in trust estimation, we have adopted a direct trust model. Measures (a) and (b) are take to minimise the level of broadcast traffic injected into the network in order to accomplish the path discovery task, and measure (c) is taken to ensure that the paths discovered are of best quality in terms of reliable packet deliveries. TADL is evaluated, using simulation, against the LAR protocol that has only implemented (a) (i.e. LAR only uses a location-based directional broadcast approach) under various network conditions. Our simulation study shows that TADL outperforms LAR in terms of reducing the routing overheads in the network. This overhead reduction can have a positive effect on QoS making the TADL more effective and efficient in providing QoS.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129906244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aditya Akella, Theophilus A. Benson, B. Chandrasekaran, Cheng Huang, B. Maggs, D. Maltz
{"title":"A Universal Approach to Data Center Network Design","authors":"Aditya Akella, Theophilus A. Benson, B. Chandrasekaran, Cheng Huang, B. Maggs, D. Maltz","doi":"10.1145/2684464.2684505","DOIUrl":"https://doi.org/10.1145/2684464.2684505","url":null,"abstract":"This paper proposes an approach to the design of large-scale general-purpose data center networks based on the notions of volume and area universality introduced by Leiserson in the 1980's in the context of VLSI design. In particular, we suggest that the principle goal of the network designer should be to build a single network that is provably competitive, for any application, with any network that can be built for the same amount of money. After describing our approach, we survey the technology choices available to network designers today, and examine several existing commercial data center networks. In the most recent of these networks resources are allocated roughly as we suggest in this paper.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125833957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Floating Index Caching Technique for P2P Overlay Index Propagation","authors":"K. Haribabu, C. Hota","doi":"10.1145/2684464.2684489","DOIUrl":"https://doi.org/10.1145/2684464.2684489","url":null,"abstract":"The paper proposes an indexing scheme known as Floating Index Caching. In Floating Index caching, queries carry a summarized index of contents of the peers that are on its way. Each node snoops on the queries passing through it. Queries are sent in the network using ether flooding or random-walk methods. When a query arrives at a node, indexes can be further added to the query or existing indexes replaced with new indexes. In this paper, we classify propagation schemes as depth-wise and breadth-wise, combined with flooding and random-walk methods. Through experimental evaluations, we found that Floating Index Caching with random walkers has the best returns as far as index dissemination is considered. Breadth-wise spreading of indexes through random-walk utilized 54% of the query traffic effectively to spread the indexes. This method has spread indexes of 77% of the nodes onto more than 50% of the network.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125721094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Energy Efficiency of IO-Intensive MapReduce Jobs","authors":"Nidhi Tiwari, S. Sarkar, M. Indrawan, U. Bellur","doi":"10.1145/2684464.2684484","DOIUrl":"https://doi.org/10.1145/2684464.2684484","url":null,"abstract":"Map-Reduce is a popular data-parallel programming model for varied analysis of huge volumes of data. While a multicore and many CPU HPC infrastructure can be used to improve parallelism of map-reduce tasks, IO-bandwidth limitations may make them ineffective. IO-intensive activities are essential in any MapReduce cluster. In HPC nodes, IO-intensive jobs get queued at the IO-resources while the CPU remain underutilized, resulting in a poor performance, high power consumption and thus, energy inefficiency. In this paper, we investigate which power management setting can be used to improve the energy efficiency of IO-intensive MapReduce jobs by performing a thorough empirical study. Our analysis indicates that a constant CPU frequency can reduce the energy consumption of an IO-intensive job, while improving its performance. Consequently, we build a set of regression models to predict the energy consumption of IO-intensive jobs at a CPU frequency for a given input data volume. We obtained same set of models, with different coefficients, for two different types of IO-intensive jobs, which substantiates the suitability of identified models. These models predict respective outcomes with 80% accuracy for 80% of the new test cases.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126854203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constant Space Self-Stabilizing Center Finding in Anonymous Tree Networks","authors":"A. Datta, L. Larmore, T. Masuzawa","doi":"10.1145/2684464.2684466","DOIUrl":"https://doi.org/10.1145/2684464.2684466","url":null,"abstract":"It is known that there is no self-stabilizing silent distributed algorithm for finding the center (or centers) of an anonymous tree network that uses less than O(log diam) space per process, where diam is the diameter of the tree. In this paper, a self-stabilizing, but non-silent, distributed algorithm, STC, for this problem is given, which takes O(diam) rounds under the unfair daemon and uses O(1) space per process. The method is to first construct a silent O(1)-space algorithm for the problem that works under the synchronous daemon, provided it has a clean start. A transformer is then constructed, which transforms any tree algorithm which is silent under the synchronous algorithm given a clean start into an equivalent non-silent self-stabilizing algorithm with the same asymptotic space complexity. The desired center finding algorithm, CSTC, is then obtained by applying the transformer to STC.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132695898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}