scispace - formally typeset
Search or ask a question

Showing papers in "arXiv: Networking and Internet Architecture in 2010"


Journal ArticleDOI
TL;DR: A new data aggregation algorithm named Recursive Converging Quartiles (RCQ) is used to merge data to eliminate duplicates, filter out invalid readings and summarise them into a simpler form which significantly reduce the amount of data to be transmitted to the sink and thus saving energy.
Abstract: Sensor networks are currently an active research area mainly due to the potential of their applications. In this paper we investigate the use of Wireless Sensor Networks (WSN) for air pollution monitoring in Mauritius. With the fast growing industrial activities on the island, the problem of air pollution is becoming a major concern for the health of the population. We proposed an innovative system named Wireless Sensor Network Air Pollution Monitoring System (WAPMS) to monitor air pollution in Mauritius through the use of wireless sensors deployed in huge numbers around the island. The proposed system makes use of an Air Quality Index (AQI) which is presently not available in Mauritius. In order to improve the efficiency of WAPMS, we have designed and implemented a new data aggregation algorithm named Recursive Converging Quartiles (RCQ). The algorithm is used to merge data to eliminate duplicates, filter out invalid readings and summarise them into a simpler form which significantly reduce the amount of data to be transmitted to the sink and thus saving energy. For better power management we used a hierarchical routing protocol in WAPMS and caused the motes to sleep during idle time.

286 citations


Journal ArticleDOI
TL;DR: This work proposes policies for distributed learning and access which achieve order-optimal cognitive system throughput under self play, i.e., when implemented at all the secondary users, and proposes a policy whose sum regret grows only slightly faster than logarithmic in the number of transmission slots.
Abstract: The problem of distributed learning and channel access is considered in a cognitive network with multiple secondary users. The availability statistics of the channels are initially unknown to the secondary users and are estimated using sensing decisions. There is no explicit information exchange or prior agreement among the secondary users. We propose policies for distributed learning and access which achieve order-optimal cognitive system throughput (number of successful secondary transmissions) under self play, i.e., when implemented at all the secondary users. Equivalently, our policies minimize the regret in distributed learning and access. We first consider the scenario when the number of secondary users is known to the policy, and prove that the total regret is logarithmic in the number of transmission slots. Our distributed learning and access policy achieves order-optimal regret by comparing to an asymptotic lower bound for regret under any uniformly-good learning and access policy. We then consider the case when the number of secondary users is fixed but unknown, and is estimated through feedback. We propose a policy in this scenario whose asymptotic sum regret which grows slightly faster than logarithmic in the number of transmission slots.

280 citations


Journal ArticleDOI
TL;DR: A WBAN infrastructure that provides solutions to on-demand, emergency, and normal traffic, and a need for new power-efficient solu-tions towards in-body and on-body sensor networks are presented.
Abstract: Recent advances in Micro-Electro-Mechanical Systems (MEMS) technology, integrated circuits, and wireless communication have allowed the realization of Wireless Body Area Networks (WBANs). WBANs promise unobtrusive ambulatory health monitoring for a long period of time and provide real-time updates of the patient's status to the physician. They are widely used for ubiquitous healthcare, entertainment, and military applications. This paper reviews the key aspects of WBANs for numerous applications. We present a WBAN infrastructure that provides solutions to on-demand, emergency, and normal traffic. We further discuss in-body antenna design and low-power MAC protocol for WBAN. In addition, we briefly outline some of the WBAN applications with examples. Our discussion realizes a need for new power-efficient solutions towards in-body and on-body sensor networks.

146 citations


Posted Content
TL;DR: This paper proposes a unified homogeneous quadratically constrained quadratic program (QCQP) formulation that can be applied to all three scenarios, in which different levels of CSI knowledge give rise to either deterministic or probabilistic interference-temperature constraints.
Abstract: In this paper, we study the optimal secondary-link beamforming pattern that balances between the SU's throughput and the interference it causes to PUs in MIMO cognitive radio networks. In particular, we aim to maximize the throughput of the SU, while keeping the interference temperature at the primary receivers below a certain threshold. Unlike traditional MIMO systems, SUs may not have the luxury of knowing the channel state information (CSI) on the links to PUs. This presents a key challenge for a secondary transmitter to steer interference away from primary receivers. In this paper, we consider three scenarios, namely when the secondary transmitter has complete, partial, or no knowledge about the channels to the primary receivers. In particular, when complete CSI is not available, the interference-temperature constraints are to be satisfied with high probability, thus resulting in chance constraints that are typically hard to deal with. Our contribution is fourfold. First, by analyzing the distributional characteristics of MIMO channels, we propose a unified homogeneous QCQP formulation that can be applied to all three scenarios. The homogeneous QCQP formulation, though non-convex, is amenable to semidefinite programming (SDP) relaxation methods. Secondly, we show that the SDP relaxation admits no gap when the number of primary links is no larger than two. Thirdly, we propose a randomized polynomial-time algorithm for constructing a near-optimal solution to the QCQP problem when there are more than two primary links. Finally, we show that when the secondary transmitter has no CSI on the links to primary receivers, the optimal solution to the QCQP problem can be found by a simple matrix eigenvalue-eigenvector computation, which can be done much more efficiently than solving the QCQP directly.

145 citations


Posted Content
TL;DR: In this paper, backup resources are pooled and shared across multiple virtual infrastructures, and intelligently embedded in the physical infrastructure to reduce the physical footprint of virtual backups while guaranteeing reliability.
Abstract: In a virtualized infrastructure where physical resources are shared, a single physical server failure will terminate several virtual servers and crippling the virtual infrastructures which contained those virtual servers. In the worst case, more failures may cascade from overloading the remaining servers. To guarantee some level of reliability, each virtual infrastructure, at instantiation, should be augmented with backup virtual nodes and links that have sufficient capacities. This ensures that, when physical failures occur, sufficient computing resources are available and the virtual network topology is preserved. However, in doing so, the utilization of the physical infrastructure may be greatly reduced. This can be circumvented if backup resources are pooled and shared across multiple virtual infrastructures, and intelligently embedded in the physical infrastructure. These techniques can reduce the physical footprint of virtual backups while guaranteeing reliability.

143 citations


Posted Content
TL;DR: The focus of this paper is to explore the main RFID components, i.e. the tag, antenna and reader, to produce a model for mobile technology implementation of hospital patients’ movement process.
Abstract: RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use RFID for various applications such as personal/vehicle access control, departmental store security, equipment tracking, baggage, fast food establishments, logistics, etc. The enhancement in RFID technology has brought advantages that are related to resource optimization, increased efficiency within business processes, and enhanced customer care, overall improvements in business operations and healthcare. Our research is part of a big project; its aim is to produce a model for mobile technology implementation of hospital patients’ movement process. However, the focus of this paper is to explore the main RFID components, i.e. the tag, antenna and reader. The results of the investigations conducted on the three RFID components will be used to develop our research model.

121 citations


Posted Content
TL;DR: This paper proposes GAC: a hybrid GPS/accelerometer/compass scheme that depends mainly on using the low-energy accelerometer and compass sensors and uses the GPS infrequently for synchronization.
Abstract: Adding location to the available information enables a new category of applications. With the constrained battery on cell phones, energy-efficient localization becomes an important challenge. In this paper we introduce a low-energy calibration-free localization scheme based on the available internal sensors in many of today's phones. We start by energy profiling the different sensors that can be used for localization. Based on that, we propose GAC: a hybrid GPS/accelerometer/compass scheme that depends mainly on using the low-energy accelerometer and compass sensors and uses the GPS infrequently for synchronization. We implemented our system on Android-enabled cell phones and evaluated it in both highways and intra-city driving environments. Our results show that the proposed hybrid scheme has an exponential saving in energy, with a linear loss in accuracy compared to the GPS accuracy. We also evaluate the effect of the different parameters on the energy-accuracy tradeoff.

104 citations


Posted Content
TL;DR: In this article, a multigraph sampling method was proposed to exploit the relationships between OSN users, such as membership in the same group or participation in the event, by performing a random walk on their union multigraph.
Abstract: State-of-the-art techniques for probability sampling of users of online social networks (OSNs) are based on random walks on a single social relation (typically friendship). While powerful, these methods rely on the social graph being fully connected. Furthermore, the mixing time of the sampling process strongly depends on the characteristics of this graph. In this paper, we observe that there often exist other relations between OSN users, such as membership in the same group or participation in the same event. We propose to exploit the graphs these relations induce, by performing a random walk on their union multigraph. We design a computationally efficient way to perform multigraph sampling by randomly selecting the graph on which to walk at each iteration. We demonstrate the benefits of our approach through (i) simulation in synthetic graphs, and (ii) measurements of this http URL - an Internet website for music with social networking features. More specifically, we show that multigraph sampling can obtain a representative sample and faster convergence, even when the individual graphs fail, i.e., are disconnected or highly clustered.

96 citations


Posted Content
TL;DR: This work designs a stochastic model for the case when demands are generated continually and scheduling decisions are taken online, and focuses on long-term average cost.
Abstract: The smart power grid aims at harnessing information and communication technologies to enhance reliability and enforce sensible use of energy. Its realization is geared by the fundamental goal of effective management of demand load. In this work, we envision a scenario with real-time communication between the operator and consumers. The grid operator controller receives requests for power demands from consumers, with different power requirement, duration, and a deadline by which it is to be completed. The objective is to devise a power demand task scheduling policy that minimizes the grid operational cost over a time horizon. The operational cost is a convex function of instantaneous power consumption and reflects the fact that each additional unit of power needed to serve demands is more expensive as demand load increases.First, we study the off-line demand scheduling problem, where parameters are fixed and known. Next, we devise a stochastic model for the case when demands are generated continually and scheduling decisions are taken online and focus on long-term average cost. We present two instances of power consumption control based on observing current consumption. First, the controller may choose to serve a new demand request upon arrival or to postpone it to the end of its deadline. Second, the additional option exists to activate one of the postponed demands when an active demand terminates. For both instances, the optimal policies are threshold based. We derive a lower performance bound over all policies, which is asymptotically tight as deadlines increase. We propose the Controlled Release threshold policy and prove it is asymptotically optimal. The policy activates a new demand request if the current power consumption is less than a threshold, otherwise it is queued. Queued demands are scheduled when their deadline expires or when the consumption drops below the threshold.

92 citations


Posted Content
TL;DR: This work presents the first implementation of a well-known vehicle mobility model integrated with a quality network simulator to ns-3, the next generation of the popular ns-2 networking simulator.
Abstract: The study of vehicular ad-hoc networks (VANETs) requires efficient and accurate simulation tools. As the mobility of vehicles and driver behavior can be affected by network messages, these tools must include a vehicle mobility model integrated with a quality network simulator. We present the first implementation of a well-known vehicle mobility model to ns-3, the next generation of the popular ns-2 networking simulator. Vehicle mobility and network communication are integrated through events. User-created event handlers can send network messages or alter vehicle mobility each time a network message is received and each time vehicle mobility is updated by the model. To aid in creating simulations, we have implemented a straight highway model that manages vehicle mobility, while allowing for various user customizations. We show that the results of our implementation of the mobility model matches that of the model's author and provide an example of using our implementation in ns-3.

91 citations


Posted Content
TL;DR: In this paper, a probabilistic RSSI-based fingerprinting location determina- tion system for GSM phones is presented. And the authors evaluate the effect of changing the different system parameters on the accuracy-complexity tradeoff.
Abstract: Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, cell phone localization has become an important research problem. In this paper, we present CellSense, a prob- abilistic RSSI-based fingerprinting location determina- tion system for GSM phones.We discuss the challenges of implementing a probabilistic fingerprinting local- ization technique in GSM networks and present the details of the CellSense system and how it addresses the challenges. To evaluate our proposed system, we implemented CellSense on Android-based phones. Re- sults for two different testbeds, representing urban and rural environments, show that CellSense provides at least 23.8% enhancement in accuracy in rural areas and at least 86.4% in urban areas compared to other RSSI-based GSMlocalization systems. This comes with a minimal increase in computational requirements. We also evaluate the effect of changing the different system parameters on the accuracy-complexity tradeoff.

Posted Content
TL;DR: In this article, the authors identify the content publishers of more than 55k torrents in two major BitTorrent portals and examine their behavior, showing that a small fraction of publishers are responsible for 66% of published content and 75% of downloads.
Abstract: BitTorrent is the most popular P2P content delivery application where individual users share various type of content with tens of thousands of other users. The growing popularity of BitTorrent is primarily due to the availability of valuable content without any cost for the consumers. However, apart from required resources, publishing (sharing) valuable (and often copyrighted) content has serious legal implications for user who publish the material (or publishers). This raises a question that whether (at least major) content publishers behave in an altruistic fashion or have other incentives such as financial. In this study, we identify the content publishers of more than 55k torrents in 2 major BitTorrent portals and examine their behavior. We demonstrate that a small fraction of publishers are responsible for 66% of published content and 75% of the downloads. Our investigations reveal that these major publishers respond to two different profiles. On one hand, antipiracy agencies and malicious publishers publish a large amount of fake files to protect copyrighted content and spread malware respectively. On the other hand, content publishing in BitTorrent is largely driven by companies with financial incentive. Therefore, if these companies lose their interest or are unable to publish content, BitTorrent traffic/portals may disappear or at least their associated traffic will significantly reduce.

Posted Content
TL;DR: The paper discusses about classification of WSN and challenges of the Next Generation WSN, and the two approaches are discussed: Ultra-Low-Power Networks and Energy Harvesting.
Abstract: Wireless Sensor Networks (WSNs) have gained worldwide attention in recent years, particularly with the proliferation in Micro-Electro-Mechanical Systems (MEMS) technology which has facilitated the development of smart sensors. The paper discusses about classification of WSN and challenges of the Next Generation WSN. One of the major challenges of Next Generation WSN is reduction of power consumption. The two approaches are discussed: Ultra-Low-Power Networks and Energy Harvesting. The paper also discusses about some major applications as designing low cost secured Intelligent Buildings, In-Home Health care and Agriculture.

Proceedings ArticleDOI
TL;DR: Push-and-track as mentioned in this paper is a content dissemination framework that harnesses ad hoc communication opportunities to minimize the load on the wireless infrastructure while guaranteeing tight delivery delays, which achieves this through a control loop that collects user-sent acknowledgements to determine if new copies need to be reinjected into the network through the 3G interface.
Abstract: Major wireless operators are nowadays facing network capacity issues in striving to meet the growing demands of mobile users. At the same time, 3G-enabled devices increasingly benefit from ad hoc radio connectivity (e.g., Wi-Fi). In this context of hybrid connectivity, we propose Push-and-track, a content dissemination framework that harnesses ad hoc communication opportunities to minimize the load on the wireless infrastructure while guaranteeing tight delivery delays. It achieves this through a control loop that collects user-sent acknowledgements to determine if new copies need to be reinjected into the network through the 3G interface. Push-and-Track includes multiple strategies to determine how many copies of the content should be injected, when, and to whom. The short delay-tolerance of common content, such as news or road traffic updates, make them suitable for such a system. Based on a realistic large-scale vehicular dataset from the city of Bologna composed of more than 10,000 vehicles, we demonstrate that Push-and-Track consistently meets its delivery objectives while reducing the use of the 3G network by over 90%.

Posted Content
TL;DR: The capacity achievability proof uses the drift-plus-penalty method of Lyapunov optimization, and provides full details for the case when network states obey a decaying memory property, which holds for finite state ergodic systems and more general systems.
Abstract: We consider stability and network capacity in discrete time queueing systems. Relationships between four common notions of stability are described. Specifically, we consider rate stability, mean rate stability, steady state stability, and strong stability. We then consider networks of queues with random events and control actions that can be implemented over time to affect arrivals and service at the queues. The control actions also generate a vector of additional network attributes. We characterize the network capacity region, being the closure of the set of all rate vectors that can be supported subject to network stability and to additional time average attribute constraints. We show that (under mild technical assumptions) the capacity region is the same under all four stability definitions. Our capacity achievability proof uses the drift-plus-penalty method of Lyapunov optimization, and provides full details for the case when network states obey a decaying memory property, which holds for finite state ergodic systems and more general systems.

Journal ArticleDOI
TL;DR: In this paper, the authors outline the WBAN requirements that are important for the design of a low-power MAC protocol and study low power MAC protocols proposed/investigated for WBAN with emphasis on their strengths and weaknesses.
Abstract: The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satisfy the stringent WBAN requirements including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent WBAN requirements.

Posted Content
TL;DR: This paper presents a cluster based counter-measure for the wormhole attack, that alleviates these drawbacks and efficiently mitigates the worm hole attack in MANET.
Abstract: In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad hoc networks is often equated with strong and feasible node authentication and lightweight cryptography. Unfortunately, the wormhole attack can hardly be defeated by crypto graphical measures, as wormhole attackers do not create separate packets. They simply replay packets already existing on the network, which pass the cryptographic checks. Existing works on wormhole detection have often focused on detection using specialized hardware, such as directional antennas, etc. In this paper, we present a cluster based counter-measure for the wormhole attack, that alleviates these drawbacks and efficiently mitigates the wormhole attack in MANET. Simulation results on MATLab exhibit the effectiveness of the proposed algorithm in detecting wormhole attacks.

Posted Content
TL;DR: Borders are derived on the mixing time of a generalization of Glauber dynamics where multiple links update their states in parallel and the fugacity of each link can be different.
Abstract: Glauber dynamics is a powerful tool to generate randomized, approximate solutions to combinatorially difficult problems. It has been used to analyze and design distributed CSMA (Carrier Sense Multiple Access) scheduling algorithms for multi-hop wireless networks. In this paper we derive bounds on the mixing time of a generalization of Glauber dynamics where multiple links are allowed to update their states in parallel and the fugacity of each link can be different. The results can be used to prove that the average queue length (and hence, the delay) under the parallel Glauber dynamics based CSMA grows polynomially in the number of links for wireless networks with bounded-degree interference graphs when the arrival rate lies in a fraction of the capacity region. We also show that in specific network topologies, the low-delay capacity region can be further improved.

Posted Content
TL;DR: This paper provides polynomial-time distributed network codes that are information-theoretically rate-optimal for this scenario, improving on the rates achievable in prior work by Ngai and corrects an error by a subset of the authors.
Abstract: We consider the problem of communicating information over a network secretly and reliably in the presence of a hidden adversary who can eavesdrop and inject malicious errors. We provide polynomial-time, rate-optimal distributed network codes for this scenario, improving on the rates achievable in previous work. Our main contribution shows that as long as the sum of the adversary's jamming rate Zo and his eavesdropping rate Zi is less than the network capacity C, (i.e., Zo+Zi

Posted Content
TL;DR: Three integrated network architectures are introduced which, while increasing the access capacity, they also reduce the deployment and operational costs and are offered possible approaches to their solution.
Abstract: Integrated femtocell/macrocell networks, comprising a conventional cellular network overlaid with femtocells, offer an economically appealing way to improve coverage, quality of service, and access network capacity. The key element to successful femtocells/macrocell integration lies in its self-organizing capability. Provisioning of quality of service is the main technical challenge of the femtocell/macrocell integrated networks, while the main administrative challenge is the choice of the proper evolutionary path from the existing macrocellular networks to the integrated network. In this article, we introduce three integrated network architectures which, while increasing the access capacity, they also reduce the deployment and operational costs. Then, we discuss a number of technical issues, which are key to making such integration a reality, and we offer possible approaches to their solution. These issues include efficient frequency and interference management, quality of service provisioning of the xDSL-based backhaul networks, and intelligent handover control.

Book ChapterDOI
TL;DR: This paper studies economic utilities and quality of service (QoS) in a two-sided non-neutral market where Internet service providers charge content providers (CPs) for the content delivery.
Abstract: This paper studies the economic utilities and the quality of service (QoS) in a two-sided non-neutral market where Internet service providers (ISPs) charge content providers (CPs) for the content delivery. We propose new models on a two-sided market which involves a CP, an ISP, end users and advertisers. The CP may have either the subscription revenue model (charging end users) or the advertisement revenue model (charging advertisers). We formulate the interactions between the ISP and the CP as a noncooperative game problem for the former and an optimization problem for the latter. Our analysis shows that the revenue model of the CP plays a significant role in a non-neutral Internet. With the subscription model, both the ISP and the CP receive better (or worse) utilities as well as QoS in the presence of side payment at the same time. However, with the advertisement model, the side payment impedes the CP from investing on its contents.

Posted Content
TL;DR: It is suggested that the continued development of these hardware, software, and analytical tools, in concert, offer an exciting sensor-network solution to monitoring of animal populations which could realistically scale over larger areas and time spans.
Abstract: Studying animal movement and distribution is of critical importance to addressing environmental challenges including invasive species, infectious diseases, climate and land-use change. Motion sensitive camera traps offer a visual sensor to record the presence of a broad range of species providing location -specific information on movement and behavior. Modern digital camera traps that record video present new analytical opportunities, but also new data management challenges. This paper describes our experience with a terrestrial animal monitoring system at Barro Colorado Island, Panama. Our camera network captured the spatio-temporal dynamics of terrestrial bird and mammal activity at the site - data relevant to immediate science questions, and long-term conservation issues. We believe that the experience gained and lessons learned during our year long deployment and testing of the camera traps as well as the developed solutions are applicable to broader sensor network applications and are valuable for the advancement of the sensor network research. We suggest that the continued development of these hardware, software, and analytical tools, in concert, offer an exciting sensor-network solution to monitoring of animal populations which could realistically scale over larger areas and time spans.

Journal ArticleDOI
TL;DR: The more representative of routing protocols, analysis of individual characteristics and advantages and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad Hoc Networks.
Abstract: Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time, and we discuss in this paper the distinct characteristics of traditional wired networks, including network configuration may change at any time, there is no direction or limit the movement and so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these actions communicate with each other path, An ideal choice way the agreement should not only be able to find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this paper, the more representative of routing protocols, analysis of individual characteristics and advantages and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad Hoc Networks.

Posted Content
Zhong Fan1
TL;DR: In this paper, a distributed framework for demand response and user adaptation in smart grid networks is proposed, where pricing information is very useful to regulate user demand and hence balance network load, and user preference is modeled as a willingness to pay parameter which can be seen as an indicator of differential quality of service.
Abstract: This paper proposes a distributed framework for demand response and user adaptation in smart grid networks. In particular, we borrow the concept of congestion pricing in Internet traffic control and show that pricing information is very useful to regulate user demand and hence balance network load. User preference is modeled as a willingness to pay parameter which can be seen as an indicator of differential quality of service. Both analysis and simulation results are presented to demonstrate the dynamics and convergence behavior of the algorithm.

Posted Content
TL;DR: Through two case studies related to network connectivity on the expected number of isolated nodes and on the vanishing of components of finite order respectively, some subtle but important differences are demonstrated between the infinite network model and the dense and extended network models.
Abstract: Connectivity and capacity are two fundamental properties of wireless multi-hop networks. The scalability of these properties has been a primary concern for which asymptotic analysis is a useful tool. Three related but logically distinct network models are often considered in asymptotic analyses, viz. the dense network model, the extended network model and the infinite network model, which consider respectively a network deployed in a fixed finite area with a sufficiently large node density, a network deployed in a sufficiently large area with a fixed node density, and a network deployed in $\Re^{2}$ with a sufficiently large node density. The infinite network model originated from continuum percolation theory and asymptotic results obtained from the infinite network model have often been applied to the dense and extended networks. In this paper, through two case studies related to network connectivity on the expected number of isolated nodes and on the vanishing of components of finite order k>1 respectively, we demonstrate some subtle but important differences between the infinite network model and the dense and extended network models. Therefore extra scrutiny has to be used in order for the results obtained from the infinite network model to be applicable to the dense and extended network models. Asymptotic results are also obtained on the expected number of isolated nodes, the vanishingly small impact of the boundary effect on the number of isolated nodes and the vanishing of components of finite order k>1 in the dense and extended network models using a generic random connection model.

Posted Content
TL;DR: Different state-of-the-art protocols both in MAC and routing domains that have been proposed for WSNs are discussed to achieve the overall goal of prolonging the network lifetime.
Abstract: Wireless Sensor Networks are basically used for gathering information needed by smart environments but they are particularly useful in unattended situations where terrain, climate and other environmental constraints may hinder in the deployment of wired/conventional networks. Unlike traditional networks, these sensor networks do not have a continuous power supply at their disposal. Rather the individual sensors are battery operated and the lifetime of the individual sensors and thus the overall network depend heavily on duty cycle of these sensors. Analysis on WSNs shows that communication module is the main part which consumes most of the sensor energy and that is why energy conservation is the major optimization goal. Since routing protocols and MAC protocols directly access the communication module therefore the design of protocols in these two domains should take into account the energy conservation goal. In this paper, we discuss different state-of-the-art protocols both in MAC and routing domains that have been proposed for WSNs to achieve the overall goal of prolonging the network lifetime. The routing protocols in WSNs are generally categorized into three groups - data centric, hierarchical and location-based but we focus on only the first two categories because location-based routing protocols generally require a prior knowledge about sensors location which most of the times is not available due to random deployment of the sensors. We then discuss how schedule-based and contention-based MAC protocols can contribute to achieve optimal utilization of the limited energy resource by avoiding or reducing the chances of collisions and thus the need for retransmission.

Posted Content
TL;DR: The first half of the paper presents a survey of different IP traceback techniques like packet marking that help a forensic investigator to identify the true sources of the attacking IP packets.
Abstract: Network forensics deals with the capture, recording and analysis of network events in order to discover evidential information about the source of security attacks in a court of law This paper discusses the different tools and techniques available to conduct network forensics Some of the tools discussed include: eMailTrackerPro – to identify the physical location of an email sender; Web Historian – to find the duration of each visit and the files uploaded and downloaded from the visited website; packet sniffers like Ethereal – to capture and analyze the data exchanged among the different computers in the network The second half of the paper presents a survey of different IP traceback techniques like packet marking that help a forensic investigator to identify the true sources of the attacking IP packets We also discuss the use of Honeypots and Honeynets that gather intelligence about the enemy and the tools and tactics of network intruders

Posted Content
TL;DR: An overview of what PLC can deliver today by surveying its history and describing the most recent technological advances in the area is provided and the Smart Grid control and traffic modeling problem is reviewed to achieve a better understanding of the communications requirements.
Abstract: Is Power Line Communications (PLC) a good candidate for Smart Grid applications? The objective of this paper is to address this important question. To do so we provide an overview of what PLC can deliver today by surveying its history and describing the most recent technological advances in the area. We then address Smart Grid applications as instances of sensor networking and network control problems and discuss the main conclusion one can draw from the literature on these subjects. The application scenario of PLC within the Smart Grid is then analyzed in detail. Since a necessary ingredient of network planning is modeling, we also discuss two aspects of engineering modeling that relate to our question. The first aspect is modeling the PLC channel through fading models. The second aspect we review is the Smart Grid control and traffic modeling problem which allows us to achieve a better understanding of the communications requirements. Finally, this paper reports recent studies on the electrical and topological properties of a sample power distribution network. Power grid topological studies are very important for PLC networking as the power grid is not only the information source \textit{but also} the information delivery system - a unique feature when PLC is used for the Smart Grid.

Posted Content
TL;DR: In this article, the authors proposed a distributed broadcast algorithm that achieves near-optimal broadcast rate under arbitrary node degree bounds, i.e., the number of neighbors a node can simultaneously connect to is upper-bounded.
Abstract: We study the problem of maximizing the broadcast rate in peer-to-peer (P2P) systems under \emph{node degree bounds}, i.e., the number of neighbors a node can simultaneously connect to is upper-bounded. The problem is critical for supporting high-quality video streaming in P2P systems, and is challenging due to its combinatorial nature. In this paper, we address this problem by providing the first distributed solution that achieves near-optimal broadcast rate under arbitrary node degree bounds, and over arbitrary overlay graph. It runs on individual nodes and utilizes only the measurement from their one-hop neighbors, making the solution easy to implement and adaptable to peer churn and network dynamics. Our solution consists of two distributed algorithms proposed in this paper that can be of independent interests: a network-coding based broadcasting algorithm that optimizes the broadcast rate given a topology, and a Markov-chain guided topology hopping algorithm that optimizes the topology. Our distributed broadcasting algorithm achieves the optimal broadcast rate over arbitrary P2P topology, while previously proposed distributed algorithms obtain optimality only for P2P complete graphs. We prove the optimality of our solution and its convergence to a neighborhood around the optimal equilibrium under noisy measurements or without time-scale separation assumptions. We demonstrate the effectiveness of our solution in simulations using uplink bandwidth statistics of Internet hosts.

Posted Content
TL;DR: In this paper, the authors study several solutions to the late-comer problem by means of packet level simulations and simple analysis, in the investigation process, they individuate the root cause for LEDBAT unfairness and propose effective countermeasures.
Abstract: BitTorrent developers have recently introduced a new application layer congestion control algorithm based on UDP framing at transport layer and currently under definition at the IETF LEDBAT Working Group. LEDBAT is a delay-based protocol which aims at offering a "lower than Best Effort" data transfer service, with a lower priority with respect to elastic TCP and interactive traffic (e.g., VoIP, game). However, in its current specification, LEDBAT is affected by a late-comer advantage: indeed the last flow arriving at the bottleneck is more aggressive due to a wrong estimation of the base delay and finally takes over all resources. In this work, we study several solutions to the late-comer problem by means of packet level simulations and simple analysis: in the investigation process, we individuate the root cause for LEDBAT unfairness and propose effective countermeasures.