Proceedings of the 16th International Conference on Distributed Computing and Networking最新文献

筛选
英文 中文
Multi Criteria Decision Analysis assisted Routing in Wireless Sensor Network using Fuzzy rules 基于模糊规则的多准则决策分析辅助无线传感器网络路由
S. Bhunia, Bijoy Das, N. Mukherjee
{"title":"Multi Criteria Decision Analysis assisted Routing in Wireless Sensor Network using Fuzzy rules","authors":"S. Bhunia, Bijoy Das, N. Mukherjee","doi":"10.1145/2684464.2684499","DOIUrl":"https://doi.org/10.1145/2684464.2684499","url":null,"abstract":"Wireless sensor network is a self-organizing wireless network system which has enabled densely deployment of nodes. These wireless sensors gather and forward data. But finding an efficient route is a challenge while the nodes communicate for data transmission. A routing algorithm, FMCR, is proposed in this paper. A well-known operations research technique, multi-criteria decision analysis, is used in this proposed scheme. Here multiple criteria, such as residual energy, packet transmission frequency and hop count are taken into account. In order to assign the weighted values on each criterion, Fuzzy rules are applied on heuristic properties like node density, dead nodes and delay. The best route is selected using Weighted Product Model (WPM). This scheme has been implemented using TinyOS, an event-driven operating system designed for wireless sensor network.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132349932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Boruvka-Incremental Power Greedy Heuristic for Strong Minimum Energy Topology in Wireless Sensor Networks 无线传感器网络强最小能量拓扑的boruvka -增量功率贪心启发式算法
B. S. Panda, B. K. Bhatta, Deepak Mishra, S. De
{"title":"Boruvka-Incremental Power Greedy Heuristic for Strong Minimum Energy Topology in Wireless Sensor Networks","authors":"B. S. Panda, B. K. Bhatta, Deepak Mishra, S. De","doi":"10.1145/2684464.2684490","DOIUrl":"https://doi.org/10.1145/2684464.2684490","url":null,"abstract":"Given a set of sensors, the strong minimum energy topology (SMET) problem is to assign transmission range to each sensor node so that the sum of the transmission range for all the sensor is minimum subject to the constraint that the network is strongly connected (there is a directed path between every pair of nodes in the Network). This problem is known to be NP-hard. As this problem has lots of practical applications, several approximation algorithms and heuristics have been proposed. In this paper, we propose a new heuristic called Boruvka-incremental power greedy heuristic based on the Boruvka algorithm for the minimum spanning tree (MST) problem for solving the SMET problem. We compare the performance of the Boruvka-incremental power greedy heuristic with Kruskal-incremental power greedy heuristic and Prim-incremental power greedy heuristic. Extensive simulation results illustrate that Boruvka heuristic outperforms the Kruskal-incremental power greedy heuristic and Prim-incremental power greedy heuristic. We have also proved that apart from providing significant improvement in terms of average power savings, Boruvka incremental power greedy heuristic takes O(n) time for planar graphs as compared to O(n log n) time taken by Kruskal-incremental power greedy heuristic and O(n2) time taken by Prim-incremental power greedy heuristic, where n is the number of nodes in the network.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131621044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An adaptive P2P overlay for MANETs 一个自适应的P2P覆盖的manet
M. Seddiki, Mahfoud Benchaïba
{"title":"An adaptive P2P overlay for MANETs","authors":"M. Seddiki, Mahfoud Benchaïba","doi":"10.1145/2684464.2684496","DOIUrl":"https://doi.org/10.1145/2684464.2684496","url":null,"abstract":"In recent years, many researchers have focused on the deployment of Peer-To-Peer (or P2P) applications over Mobile-Adhoc NETworks (or MANETs) motivated by the common characteristics shared between the P2P overlay and the MANET underlay such as decentralization, self-organization and dynamic topology. However, conventional P2P overlays which consist on virtual connections between peers are usually constructed without considering the physical underlay. This causes a considerable mismatch between the P2P overlay and the network underlay and leads to unnecessary network traffic and inefficient paths between overlay neighbors. In this paper, we propose an adaptive overlay over MANET. The objective of our proposal is to build an unstructured overlay with the consideration of the MANET underlay topology. Simulation results show that our overlay likely-matches and fits the MANET underlay.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131578000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Controlling Unfairness due to Physical Layer Capture and Channel Bonding in 802.11n+s Wireless Mesh Networks 802.11n+s无线Mesh网络中物理层捕获和信道绑定导致的不公平控制
Sandip Chakraborty, Sukumar Nandi
{"title":"Controlling Unfairness due to Physical Layer Capture and Channel Bonding in 802.11n+s Wireless Mesh Networks","authors":"Sandip Chakraborty, Sukumar Nandi","doi":"10.1145/2684464.2684486","DOIUrl":"https://doi.org/10.1145/2684464.2684486","url":null,"abstract":"This paper analyzes the effect of physical layer capture (PLC) and channel bonding over high throughput wireless mesh backbone network built over IEEE 802.11n+s standard. With the help of PLC, a signal can be recovered from channel noise and interference if the difference between the received signal strengths is more than a predefined threshold. It is well known that PLC can affect fairness during channel access by biasing towards the link with better signal strength. In this paper, we show that in the presence of channel bonding, high throughput links always suffer due to PLC, that ensues severe unfairness in a mesh backbone network. As a consequence, the performance of the network drops significantly from its actual capacity. This paper presents an adaptive bonding opportunity and channel reservation scheme to mitigate from network unfairness in an IEEE 802.11n+s mesh network. The performance of the proposed scheme is analyzed and evaluated using a 13 node mesh networking testbed. It has been observed that the adaptive bonding opportunity and channel reservation performs significantly better in terms of fairness compared to the standard, and results in a notable performance improvement for end-to-end flow parameters.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124145999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mobility Aware Event Dissemination in VANET VANET中机动感知事件传播
J. Mukherjee, Arobinda Gupta
{"title":"Mobility Aware Event Dissemination in VANET","authors":"J. Mukherjee, Arobinda Gupta","doi":"10.1145/2684464.2684498","DOIUrl":"https://doi.org/10.1145/2684464.2684498","url":null,"abstract":"Many future VANET applications will be event-driven and will require events of different kinds to be delivered to vehicles en route in time. In this work, we propose a publish-subscribe based communication framework for a service provider (SP) that utilizes its roadside units (RSUs) to deliver relevant events to moving vehicles. Vehicles subscribe to a SP for specific types of events; the events are also reported to the SP. The SP delivers the events to the subscribed vehicles within the validity periods of both the subscriptions and the events through RSUs placed along the route of the vehicles. The problem is referred as the Minimum Cost Event Placement Problem [10] that schedules the placement of events in RSUs for different time intervals so that the events are delivered to the subscribed vehicles while incurring minimum cost of utilization of the RSUs. In this paper, we give a ln n approximation algorithm for the problem, where n is the number of subscriptions. We then propose a centralized online algorithm to solve the problem. A lower bound on the cost of utilization of the RSUs for a given set of subscriptions and events is presented next. Detailed simulation results in realistic city traffic scenarios are presented to show the performance of the algorithms.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123132052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TADL: A Trust-Aware Dynamic Location-Based Protocol Suite For Discovering Multiple Paths in MANETs 一种基于信任感知的动态位置协议套件,用于发现manet中的多条路径
Helen Bakhsh, Ning Zhang, A. Carpenter
{"title":"TADL: A Trust-Aware Dynamic Location-Based Protocol Suite For Discovering Multiple Paths in MANETs","authors":"Helen Bakhsh, Ning Zhang, A. Carpenter","doi":"10.1145/2684464.2684491","DOIUrl":"https://doi.org/10.1145/2684464.2684491","url":null,"abstract":"This paper describes the design and evaluation of a multiple path discovery protocol suite aimed at finding a set of most trust-worthy paths for routing higher priority traffic towards a destination node with minimum overhead costs. The protocol suite, called a the Trust-Aware Dynamic Location-based (TADL) protocol suite, has taken three measures to optimize the path discovery outcome: (a) it uses a directional approach to broadcast route request packets to a destination, (b) it adjust the size of the searching area dynamically in response to the underlying network conditions, and (c) it uses trust values to govern the selection of neighbours in path formation and to reduce the overhead incurred in trust estimation, we have adopted a direct trust model. Measures (a) and (b) are take to minimise the level of broadcast traffic injected into the network in order to accomplish the path discovery task, and measure (c) is taken to ensure that the paths discovered are of best quality in terms of reliable packet deliveries. TADL is evaluated, using simulation, against the LAR protocol that has only implemented (a) (i.e. LAR only uses a location-based directional broadcast approach) under various network conditions. Our simulation study shows that TADL outperforms LAR in terms of reducing the routing overheads in the network. This overhead reduction can have a positive effect on QoS making the TADL more effective and efficient in providing QoS.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129906244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Universal Approach to Data Center Network Design 数据中心网络设计的通用方法
Aditya Akella, Theophilus A. Benson, B. Chandrasekaran, Cheng Huang, B. Maggs, D. Maltz
{"title":"A Universal Approach to Data Center Network Design","authors":"Aditya Akella, Theophilus A. Benson, B. Chandrasekaran, Cheng Huang, B. Maggs, D. Maltz","doi":"10.1145/2684464.2684505","DOIUrl":"https://doi.org/10.1145/2684464.2684505","url":null,"abstract":"This paper proposes an approach to the design of large-scale general-purpose data center networks based on the notions of volume and area universality introduced by Leiserson in the 1980's in the context of VLSI design. In particular, we suggest that the principle goal of the network designer should be to build a single network that is provably competitive, for any application, with any network that can be built for the same amount of money. After describing our approach, we survey the technology choices available to network designers today, and examine several existing commercial data center networks. In the most recent of these networks resources are allocated roughly as we suggest in this paper.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125833957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Analysis of Floating Index Caching Technique for P2P Overlay Index Propagation P2P覆盖索引传播的浮动索引缓存技术分析
K. Haribabu, C. Hota
{"title":"Analysis of Floating Index Caching Technique for P2P Overlay Index Propagation","authors":"K. Haribabu, C. Hota","doi":"10.1145/2684464.2684489","DOIUrl":"https://doi.org/10.1145/2684464.2684489","url":null,"abstract":"The paper proposes an indexing scheme known as Floating Index Caching. In Floating Index caching, queries carry a summarized index of contents of the peers that are on its way. Each node snoops on the queries passing through it. Queries are sent in the network using ether flooding or random-walk methods. When a query arrives at a node, indexes can be further added to the query or existing indexes replaced with new indexes. In this paper, we classify propagation schemes as depth-wise and breadth-wise, combined with flooding and random-walk methods. Through experimental evaluations, we found that Floating Index Caching with random walkers has the best returns as far as index dissemination is considered. Breadth-wise spreading of indexes through random-walk utilized 54% of the query traffic effectively to spread the indexes. This method has spread indexes of 77% of the nodes onto more than 50% of the network.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125721094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving Energy Efficiency of IO-Intensive MapReduce Jobs 提高io密集型MapReduce作业的能效
Nidhi Tiwari, S. Sarkar, M. Indrawan, U. Bellur
{"title":"Improving Energy Efficiency of IO-Intensive MapReduce Jobs","authors":"Nidhi Tiwari, S. Sarkar, M. Indrawan, U. Bellur","doi":"10.1145/2684464.2684484","DOIUrl":"https://doi.org/10.1145/2684464.2684484","url":null,"abstract":"Map-Reduce is a popular data-parallel programming model for varied analysis of huge volumes of data. While a multicore and many CPU HPC infrastructure can be used to improve parallelism of map-reduce tasks, IO-bandwidth limitations may make them ineffective. IO-intensive activities are essential in any MapReduce cluster. In HPC nodes, IO-intensive jobs get queued at the IO-resources while the CPU remain underutilized, resulting in a poor performance, high power consumption and thus, energy inefficiency. In this paper, we investigate which power management setting can be used to improve the energy efficiency of IO-intensive MapReduce jobs by performing a thorough empirical study. Our analysis indicates that a constant CPU frequency can reduce the energy consumption of an IO-intensive job, while improving its performance. Consequently, we build a set of regression models to predict the energy consumption of IO-intensive jobs at a CPU frequency for a given input data volume. We obtained same set of models, with different coefficients, for two different types of IO-intensive jobs, which substantiates the suitability of identified models. These models predict respective outcomes with 80% accuracy for 80% of the new test cases.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126854203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Constant Space Self-Stabilizing Center Finding in Anonymous Tree Networks 匿名树网络的常空间自稳定中心查找
A. Datta, L. Larmore, T. Masuzawa
{"title":"Constant Space Self-Stabilizing Center Finding in Anonymous Tree Networks","authors":"A. Datta, L. Larmore, T. Masuzawa","doi":"10.1145/2684464.2684466","DOIUrl":"https://doi.org/10.1145/2684464.2684466","url":null,"abstract":"It is known that there is no self-stabilizing silent distributed algorithm for finding the center (or centers) of an anonymous tree network that uses less than O(log diam) space per process, where diam is the diameter of the tree. In this paper, a self-stabilizing, but non-silent, distributed algorithm, STC, for this problem is given, which takes O(diam) rounds under the unfair daemon and uses O(1) space per process. The method is to first construct a silent O(1)-space algorithm for the problem that works under the synchronous daemon, provided it has a clean start. A transformer is then constructed, which transforms any tree algorithm which is silent under the synchronous algorithm given a clean start into an equivalent non-silent self-stabilizing algorithm with the same asymptotic space complexity. The desired center finding algorithm, CSTC, is then obtained by applying the transformer to STC.","PeriodicalId":298587,"journal":{"name":"Proceedings of the 16th International Conference on Distributed Computing and Networking","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132695898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信