scispace - formally typeset
Search or ask a question

Showing papers on "Network topology published in 2008"


Journal ArticleDOI
17 Aug 2008
TL;DR: This paper shows how to leverage largely commodity Ethernet switches to support the full aggregate bandwidth of clusters consisting of tens of thousands of elements and argues that appropriately architected and interconnected commodity switches may deliver more performance at less cost than available from today's higher-end solutions.
Abstract: Today's data centers may contain tens of thousands of computers with significant aggregate bandwidth requirements. The network architecture typically consists of a tree of routing and switching elements with progressively more specialized and expensive equipment moving up the network hierarchy. Unfortunately, even when deploying the highest-end IP switches/routers, resulting topologies may only support 50% of the aggregate bandwidth available at the edge of the network, while still incurring tremendous cost. Non-uniform bandwidth among data center nodes complicates application design and limits overall system performance.In this paper, we show how to leverage largely commodity Ethernet switches to support the full aggregate bandwidth of clusters consisting of tens of thousands of elements. Similar to how clusters of commodity computers have largely replaced more specialized SMPs and MPPs, we argue that appropriately architected and interconnected commodity switches may deliver more performance at less cost than available from today's higher-end solutions. Our approach requires no modifications to the end host network interface, operating system, or applications; critically, it is fully backward compatible with Ethernet, IP, and TCP.

3,549 citations


Journal ArticleDOI
01 Jul 2008
TL;DR: The question posed here is: Can one build a network operating system at significant scale?
Abstract: As anyone who has operated a large network can attest, enterprise networks are difficult to manage. That they have remained so despite significant commercial and academic efforts suggests the need for a different network management paradigm. Here we turn to operating systems as an instructive example in taming management complexity. In the early days of computing, programs were written in machine languages that had no common abstractions for the underlying physical resources. This made programs hard to write, port, reason about, and debug. Modern operating systems facilitate program development by providing controlled access to high-level abstractions for resources (e.g., memory, storage, communication) and information (e.g., files, directories). These abstractions enable programs to carry out complicated tasks safely and efficiently on a wide variety of computing hardware. In contrast, networks are managed through low-level configuration of individual components. Moreover, these configurations often depend on the underlying network; for example, blocking a user’s access with an ACL entry requires knowing the user’s current IP address. More complicated tasks require more extensive network knowledge; forcing guest users’ port 80 traffic to traverse an HTTP proxy requires knowing the current network topology and the location of each guest. In this way, an enterprise network resembles a computer without an operating system, with network-dependent component configuration playing the role of hardware-dependent machine-language programming. What we clearly need is an “operating system” for networks, one that provides a uniform and centralized programmatic interface to the entire network. Analogous to the read and write access to various resources provided by computer operating systems, a network operating system provides the ability to observe and control a network. A network operating system does not manage the network itself; it merely provides a programmatic interface. Applications implemented on top of the network operating system perform the actual management tasks. The programmatic interface should be general enough to support a broad spectrum of network management applications. Such a network operating system represents two major conceptual departures from the status quo. First, the network operating system presents programs with a centralized programming model; programs are written as if the entire network were present on a single machine (i.e., one would use Dijkstra to compute shortest paths, not Bellman-Ford). This requires (as in [3, 8, 14] and elsewhere) centralizing network state. Second, programs are written in terms of high-level abstractions (e.g., user and host names), not low-level configuration parameters (e.g., IP and MAC addresses). This allows management directives to be enforced independent of the underlying network topology, but it requires that the network operating system carefully maintain the bindings (i.e., mappings) between these abstractions and the low-level configurations. Thus, a network operating system allows management applications to be written as centralized programs over highlevel names as opposed to the distributed algorithms over low-level addresses we are forced to use today. While clearly a desirable goal, achieving this transformation from distributed algorithms to centralized programming presents significant technical challenges, and the question we pose here is: Can one build a network operating system at significant scale?

1,681 citations


Journal ArticleDOI
31 Mar 2008
TL;DR: This paper simplifies virtual link embedding by allowing the substrate network to split a virtual link over multiple substrate paths and employing path migration to periodically re-optimize the utilization of the substrates network.
Abstract: Network virtualization is a powerful way to run multiple architectures or experiments simultaneously on a shared infrastructure. However, making efficient use of the underlying resources requires effective techniques for virtual network embedding--mapping each virtual network to specific nodes and links in the substrate network. Since the general embedding problem is computationally intractable, past research restricted the problem space to allow efficient solutions, or focused on designing heuristic algorithms. In this paper, we advocate a different approach: rethinking the design of the substrate network to enable simpler embedding algorithms and more efficient use of resources, without restricting the problem space. In particular, we simplify virtual link embedding by: i) allowing the substrate network to split a virtual link over multiple substrate paths and ii) employing path migration to periodically re-optimize the utilization of the substrate network. We also explore node-mapping algorithms that are customized to common classes of virtual-network topologies. Our simulation experiments show that path splitting, path migration,and customized embedding algorithms enable a substrate network to satisfy a much larger mix of virtual networks

1,247 citations


Journal ArticleDOI
TL;DR: Results confirm the unique benefits for future generations of CMPs that can be achieved by bringing optics into the chip in the form of photonic NoCs, as well as a comparative power analysis of a photonic versus an electronic NoC.
Abstract: The design and performance of next-generation chip multiprocessors (CMPs) will be bound by the limited amount of power that can be dissipated on a single die We present photonic networks-on-chip (NoC) as a solution to reduce the impact of intra-chip and off-chip communication on the overall power budget A photonic interconnection network can deliver higher bandwidth and lower latencies with significantly lower power dissipation We explain why on-chip photonic communication has recently become a feasible opportunity and explore the challenges that need to be addressed to realize its implementation We introduce a novel hybrid micro-architecture for NoCs combining a broadband photonic circuit-switched network with an electronic overlay packet-switched control network We address the critical design issues including: topology, routing algorithms, deadlock avoidance, and path-setup/tear-down procedures We present experimental results obtained with POINTS, an event-driven simulator specifically developed to analyze the proposed idea, as well as a comparative power analysis of a photonic versus an electronic NoC Overall, these results confirm the unique benefits for future generations of CMPs that can be achieved by bringing optics into the chip in the form of photonic NoCs

873 citations


Proceedings Article
16 Apr 2008
TL;DR: It is shown that even simple schemes for sleeping or rate-adaptation can offer substantial savings and that both sleeping and rate adaptation are valuable depending (primarily) on the power profile of network equipment and the utilization of the network itself.
Abstract: We present the design and evaluation of two forms of power management schemes that reduce the energy consumption of networks. The first is based on putting network components to sleep during idle times, reducing energy consumed in the absence of packets. The second is based on adapting the rate of network operation to the offered workload, reducing the energy consumed when actively processing packets. For real-world traffic workloads and topologies and using power constants drawn from existing network equipment, we show that even simple schemes for sleeping or rate-adaptation can offer substantial savings. For instance, our practical algorithms stand to halve energy consumption for lightly utilized networks (10-20%). We show that these savings approach the maximum achievable by any algorithms using the same power management primitives. Moreover this energy can be saved without noticeably increasing loss and with a small and controlled increase in latency (<10ms). Finally, we show that both sleeping and rate adaptation are valuable depending (primarily) on the power profile of network equipment and the utilization of the network itself.

726 citations


Journal ArticleDOI
Feng Xiao1, Long Wang1
TL;DR: In this paper, a distributed consensus algorithm for continuous-time multi-agent systems with discontinuous information transmission is proposed, where the consensus control strategy is implemented based on the state information of each agent's neighbors at some discrete times.
Abstract: The paper studies asynchronous consensus problems of continuous-time multi-agent systems with discontinuous information transmission. The proposed consensus control strategy is implemented based on the state information of each agent's neighbors at some discrete times. The asynchrony means that each agent's update times, at which the agent adjusts its dynamics, are independent of others'. Furthermore, it is assumed that the communication topology among agents is time-dependent and the information transmission is with bounded time-varying delays. If the union of the communication topology across any time interval with some given length contains a spanning tree, the consensus problem is shown to be solvable. The analysis tool developed in this paper is based on nonnegative matrix theory and graph theory. The main contribution of this paper is to provide a valid distributed consensus algorithm that overcomes the difficulties caused by unreliable communication channels, such as intermittent information transmission, switching communication topology, and time-varying communication delays, and therefore has its obvious practical applications. Simulation examples are provided to demonstrate the effectiveness of the theoretical results.

688 citations


Journal ArticleDOI
TL;DR: A new multilevel converter topology that has many steps with fewer power electronic switches results in reduction of the number of switches, losses, installation area, and converter cost.
Abstract: This paper introduces a new multilevel converter topology that has many steps with fewer power electronic switches. The proposed circuit consists of series-connected submultilevel converters blocks. The optimal structures of this topology are investigated for various objectives, such as minimum number of switches and capacitors, and minimum standing voltage on switches for producing maximum output voltage steps. A new algorithm for determination of dc voltage sourcespsila magnitudes has also been presented. The proposed topology results in reduction of the number of switches, losses, installation area, and converter cost. The operation and performance of the proposed multilevel converter has been verified by the simulation and experimental results of a single-phase 53-level multilevel converter.

645 citations


Journal ArticleDOI
01 Jun 2008
TL;DR: The dragonfly topology is introduced which uses a group of high-radix routers as a virtual router to increase the effective radix of the network and the use of selective virtual-channel discrimination and theUse of credit round-trip latency to both sense and signal channel congestion gives throughput and latency that approaches that of an ideal adaptive routing algorithm.
Abstract: Evolving technology and increasing pin-bandwidth motivate the use of high-radix routers to reduce the diameter, latency, and cost of interconnection networks. High-radix networks, however, require longer cables than their low-radix counterparts. Because cables dominate network cost, the number of cables, and particularly the number of long, global cables should be minimized to realize an efficient network. In this paper, we introduce the dragonfly topology which uses a group of high-radix routers as a virtual router to increase the effective radix of the network. With this organization, each minimally routed packet traverses at most one global channel. By reducing global channels, a dragonfly reduces cost by 20% compared to a flattened butterfly and by 52% compared to a folded Clos network in configurations with ≥ 16K nodes.We also introduce two new variants of global adaptive routing that enable load-balanced routing in the dragonfly. Each router in a dragonfly must make an adaptive routing decision based on the state of a global channel connected to a different router. Because of the indirect nature of this routing decision, conventional adaptive routing algorithms give degraded performance. We introduce the use of selective virtual-channel discrimination and the use of credit round-trip latency to both sense and signal channel congestion. The combination of these two methods gives throughput and latency that approaches that of an ideal adaptive routing algorithm.

641 citations


Journal ArticleDOI
TL;DR: Several state-of-the-art algorithms and techniques are presented and compared that aim to address the coverage-connectivity issue in wireless sensor networks.

508 citations


Journal ArticleDOI
TL;DR: The test results indicate that the new network KDE is more appropriate than standard planar KDE for density estimation of traffic accidents, since the latter covers space beyond the event context (network space) and is likely to overestimate the density values.

498 citations


Journal ArticleDOI
TL;DR: This paper introduces the first distributed polynomial-time rate-optimal network codes that work in the presence of Byzantine nodes, and presents algorithms that target adversaries with different attacking capabilities.
Abstract: Network coding substantially increases network throughput. But since it involves mixing of information inside the network, a single corrupted packet generated by a malicious node can end up contaminating all the information reaching a destination, preventing decoding. This paper introduces distributed polynomial-time rate-optimal network codes that work in the presence of Byzantine nodes. We present algorithms that target adversaries with different attacking capabilities. When the adversary can eavesdrop on all links and jam links, our first algorithm achieves a rate of , where is the network capacity. In contrast, when the adversary has limited eavesdropping capabilities, we provide algorithms that achieve the higher rate of . Our algorithms attain the optimal rate given the strength of the adversary. They are information-theoretically secure. They operate in a distributed manner, assume no knowledge of the topology, and can be designed and implemented in polynomial time. Furthermore, only the source and destination need to be modified; nonmalicious nodes inside the network are oblivious to the presence of adversaries and implement a classical distributed network code. Finally, our algorithms work over wired and wireless networks.

Journal ArticleDOI
TL;DR: Whether this MAC scheme meets the design constraints of low-power and low-cost sensor networks is analyzed, and a detailed analytical evaluation of its performance in a star topology network, for uplink and acknowledged uplink traffic is provided.
Abstract: Advances in low-power and low-cost sensor networks have led to solutions mature enough for use in a broad range of applications varying from health monitoring to building surveillance. The development of those applications has been stimulated by the finalization of the IEEE 802.15.4 standard, which defines the medium access control (MAC) and physical layer for sensor networks. One of the MAC schemes proposed is slotted carrier sense multiple access with collision avoidance (CSMA/CA), and this paper analyzes whether this scheme meets the design constraints of those low-power and low-cost sensor networks. The paper provides a detailed analytical evaluation of its performance in a star topology network, for uplink and acknowledged uplink traffic. Both saturated and unsaturated periodic traffic scenarios are considered. The form of the analysis is similar to that of Bianchi for IEEE 802.11 DCF only in the use of a per user Markov model to capture the state of each user at each moment in time. The key assumptions to enable this important simplification and the coupling of the per user Markov models are however different, as a result of the very different designs of the 802.15.4 and 802.11 carrier sensing mechanisms. The performance predicted by the analytical model is very close to that obtained by simulation. Throughput and energy consumption analysis is then performed by using the model for a range of scenarios. Some design guidelines are derived to set the 802.15.4 parameters as function of the network requirements.

Journal ArticleDOI
TL;DR: By employing a linear matrix inequality method, it is proved that all the nodes in the network achieve average consensus asymptotically for appropriate communication delays if the network topology is connected.

Journal ArticleDOI
17 Aug 2008
TL;DR: The experiments show that SEATTLE efficiently handles network failures and host mobility, while reducing control overhead and state requirements by roughly two orders of magnitude compared with Ethernet bridging.
Abstract: IP networks today require massive effort to configure and manage. Ethernet is vastly simpler to manage, but does not scale beyond small local area networks. This paper describes an alternative network architecture called SEATTLE that achieves the best of both worlds: The scalability of IP combined with the simplicity of Ethernet. SEATTLE provides plug-and-play functionality via flat addressing, while ensuring scalability and efficiency through shortest-path routing and hash-based resolution of host information. In contrast to previous work on identity-based routing, SEATTLE ensures path predictability and stability, and simplifies network management. We performed a simulation study driven by real-world traffic traces and network topologies, and used Emulab to evaluate a prototype of our design based on the Click and XORP open-source routing platforms. Our experiments show that SEATTLE efficiently handles network failures and host mobility, while reducing control overhead and state requirements by roughly two orders of magnitude compared with Ethernet bridging.

Journal ArticleDOI
TL;DR: A rigorous analysis of six variants of the genomewide protein interaction network for Saccharomyces cerevisiae demonstrated that the majority of hubs are essential due to their involvement in Essential Complex Biological Modules, a group of densely connected proteins with shared biological function that are enriched in essential proteins.
Abstract: The centrality-lethality rule, which notes that high-degree nodes in a protein interaction network tend to correspond to proteins that are essential, suggests that the topological prominence of a protein in a protein interaction network may be a good predictor of its biological importance. Even though the correlation between degree and essentiality was confirmed by many independent studies, the reason for this correlation remains illusive. Several hypotheses about putative connections between essentiality of hubs and the topology of protein–protein interaction networks have been proposed, but as we demonstrate, these explanations are not supported by the properties of protein interaction networks. To identify the main topological determinant of essentiality and to provide a biological explanation for the connection between the network topology and essentiality, we performed a rigorous analysis of six variants of the genomewide protein interaction network for Saccharomyces cerevisiae obtained using different techniques. We demonstrated that the majority of hubs are essential due to their involvement in Essential Complex Biological Modules, a group of densely connected proteins with shared biological function that are enriched in essential proteins. Moreover, we rejected two previously proposed explanations for the centrality-lethality rule, one relating the essentiality of hubs to their role in the overall network connectivity and another relying on the recently published essential protein interactions model.

Journal ArticleDOI
TL;DR: The interesting question of why at all such simple models can describe aspects of biology despite their simplicity is discussed, and prospects of Boolean models in exploratory dynamical models for biological circuits and their mutants will be discussed.
Abstract: Computer models are valuable tools towards an understanding of the cell's biochemical regulatory machinery. Possible levels of description of such models range from modelling the underlying biochemical details to top-down approaches, using tools from the theory of complex networks. The latter, coarse-grained approach is taken where regulatory circuits are classified in graph-theoretical terms, with the elements of the regulatory networks being reduced to simply nodes and links, in order to obtain architectural information about the network. Further, considering dynamics on networks at such an abstract level seems rather unlikely to match dynamical regulatory activity of biological cells. Therefore, it came as a surprise when recently examples of discrete dynamical network models based on very simplistic dynamical elements emerged which in fact do match sequences of regulatory patterns of their biological counterparts. Here I will review such discrete dynamical network models, or Boolean networks, of biological regulatory networks. Further, we will take a look at such models extended with stochastic noise, which allow studying the role of network topology in providing robustness against noise. In the end, we will discuss the interesting question of why at all such simple models can describe aspects of biology despite their simplicity. Finally, prospects of Boolean models in exploratory dynamical models for biological circuits and their mutants will be discussed.

Journal ArticleDOI
TL;DR: In this paper, the average consensus problem in directed networks of agents with both switching topology and time-delay is studied and the stability analysis is performed based on a proposed Lyapunov-Krasovskii function.
Abstract: This paper is devoted to the study of the average-consensus problem in directed networks of agents with both switching topology and time-delay. The stability analysis is performed based on a proposed Lyapunov–Krasovskii function. Sufficient conditions in terms of linear matrix inequalities (LMIs) are given to guarantee the average consensus under arbitrary switching of the network topology even if the time-delay is time-varying. Numerical simulations show the effectiveness of our theoretical results.

Journal ArticleDOI
TL;DR: A framework for the design of collective behaviors for groups of identical mobile agents based on decentralized simultaneous estimation and control is described, which derives conditions which guarantee that the formation statistics are driven to desired values, even in the presence of a changing network topology.
Abstract: We describe a framework for the design of collective behaviors for groups of identical mobile agents. The approach is based on decentralized simultaneous estimation and control, where each agent communicates with neighbors and estimates the global performance properties of the swarm needed to make a local control decision. Challenges of the approach include designing a control law with desired convergence properties, assuming each agent has perfect global knowledge; designing an estimator that allows each agent to make correct estimates of the global properties needed to implement the controller; and possibly modifying the controller to recover desired convergence properties when using the estimates of global performance. We apply this framework to the problem of controlling the moment statistics describing the location and shape of a swarm. We derive conditions which guarantee that the formation statistics are driven to desired values, even in the presence of a changing network topology.

Journal ArticleDOI
TL;DR: This work addresses the challenge of distributed motion algorithms that guarantee connectivity of the overall network using a key control decomposition of graphs as combinatorial objects and shows that the resulting motion always ensures connectivity ofThe network, while it reconfigures toward certain secondary objectives.
Abstract: Control of mobile networks raises fundamental and novel problems in controlling the structure of the resulting dynamic graphs. In particular, in applications involving mobile sensor networks and multiagent systems, a great new challenge is the development of distributed motion algorithms that guarantee connectivity of the overall network. Motivated by the inherently discrete nature of graphs as combinatorial objects, we address this challenge using a key control decomposition. First, connectivity control of the network structure is performed in the discrete space of graphs and relies on local estimates of the network topology used, along with algebraic graph theory, to verify link deletions with respect to connectivity. Tie breaking, when multiple such link deletions can violate connectivity, is achieved by means of gossip algorithms and distributed market-based control. Second, motion control is performed in the continuous configuration space, where nearest-neighbor potential fields are used to maintain existing links in the network. Integration of the earlier controllers results in a distributed, multiagent, hybrid system, for which we show that the resulting motion always ensures connectivity of the network, while it reconfigures toward certain secondary objectives. Our approach can also account for communication time delays as well as collision avoidance and is illustrated in nontrivial computer simulations.

Journal ArticleDOI
TL;DR: Two simple topology-prediction methods using a recently published experimental scale of position-specific amino acid contributions to the free energy of membrane insertion that perform on a par with the current best statistics-based topology predictors are presented.
Abstract: The current best membrane-protein topology-prediction methods are typically based on sequence statistics and contain hundreds of parameters that are optimized on known topologies of membrane proteins. However, because the insertion of transmembrane helices into the membrane is the outcome of molecular interactions among protein, lipids and water, it should be possible to predict topology by methods based directly on physical data, as proposed >20 years ago by Kyte and Doolittle. Here, we present two simple topology-prediction methods using a recently published experimental scale of position-specific amino acid contributions to the free energy of membrane insertion that perform on a par with the current best statistics-based topology predictors. This result suggests that prediction of membrane-protein topology and structure directly from first principles is an attainable goal, given the recently improved understanding of peptide recognition by the translocon.

Journal ArticleDOI
TL;DR: A simple controllability condition is derived for the leader-follower network of dynamic agents linked via neighbor rules, which indicates that the controllable of the whole network does not need to rely on that of the network for every specific topology.
Abstract: This note studies the controllability of a leader-follower network of dynamic agents linked via neighbor rules. The leader is a particular agent acting as an external input to steer the other member agents. Based on switched control system theory, we derive a simple controllability condition for the network with switching topology, which indicates that the controllability of the whole network does not need to rely on that of the network for every specific topology. This merit provides convenience and flexibility in design and application of multiagent networks. For the fixed topology case, we show that the network is uncontrollable whenever the leader has an unbiased action on every member, regardless of the connectivity of the members themselves. This gives new insight into the relation between the controllability and the connectivity of the leader-follower network. We also give a formula for formation control of the network.

Journal ArticleDOI
01 Sep 2008-EPL
TL;DR: It is shown that an appropriate small-world topology can restore synchronized behavior provided information transmission delays are either short or long, and within the intermediate delay region, which is characterized by anti-phase synchronization and clustering, differences in the network topology do not notably affect the synchrony of neuronal activity.
Abstract: Synchronization transitions are investigated in small-world neuronal networks that are locally modeled by the Rulkov map with additive spatiotemporal noise. In particular, we investigate the impact of different information transmission delays and rewiring probability. We show that short delays induce zigzag fronts of excitations, whereas intermediate delays can further detriment synchrony in the network due to a dynamic clustering anti-phase synchronization transition. Detailed investigations reveal, however, that for longer delay lengths the synchrony of excitations in the network can again be enhanced due to the emergence of in-phase synchronization. In addition, we show that an appropriate small-world topology can restore synchronized behavior provided information transmission delays are either short or long. On the other hand, within the intermediate delay region, which is characterized by anti-phase synchronization and clustering, differences in the network topology do not notably affect the synchrony of neuronal activity.

Journal ArticleDOI
TL;DR: These findings indicate that hidden geometries underlying these real networks are a plausible explanation for their observed topologies and, in particular, for their self-similarity with respect to the degree-based renormalization.
Abstract: We demonstrate that the self-similarity of some scale-free networks with respect to a simple degree-thresholding renormalization scheme finds a natural interpretation in the assumption that network nodes exist in hidden metric spaces. Clustering, i.e., cycles of length three, plays a crucial role in this framework as a topological reflection of the triangle inequality in the hidden geometry. We prove that a class of hidden variable models with underlying metric spaces are able to accurately reproduce the self-similarity properties that we measured in the real networks. Our findings indicate that hidden geometries underlying these real networks are a plausible explanation for their observed topologies and, in particular, for their self-similarity with respect to the degree-based renormalization.

Patent
26 Sep 2008
TL;DR: In this article, a view of current state of the network is maintained where the current state characterizes network topology and network constituents, including network entities and network elements residing in or on the network.
Abstract: Systems and methods for managing a network are described. A view of current state of the network is maintained where the current state of the network characterizes network topology and network constituents, including network entities and network elements residing in or on the network. Events are announced that correspond to changes in the state of the network and one or more network elements can be configured accordingly. Methods for managing network traffic are described that ensure forwarding and other actions taken by network elements implement globally declared network policy and refer to high-level names, independently of network topology and the location of network constituents. Methods for discovering network constituents are described, whereby are automatically configured. Routing may be performed using ACL and packets can be intercepted to permit host to continue in sleep mode. The methods are applicable to virtual environments.

Journal ArticleDOI
TL;DR: This paper adopts an optimal filtering approach to fusing local sensor data into a global model of the environment based on the use of proportional-integral average consensus estimators, whereby information from each mobile sensor diffuses through the communication network.
Abstract: Cooperating mobile sensors can be used to model environmental functions such as the temperature or salinity of a region of ocean. In this paper, we adopt an optimal filtering approach to fusing local sensor data into a global model of the environment. Our approach is based on the use of proportional-integral (PI) average consensus estimators, whereby information from each mobile sensor diffuses through the communication network. As a result, this approach is scalable and fully decentralized, and allows changing network topologies and anonymous agents to be added and subtracted at any time. We also derive control laws for mobile sensors to move to maximize their sensory information relative to current uncertainties in the model. The approach is demonstrated by simulations including modeling ocean temperature.

Proceedings ArticleDOI
01 Nov 2008
TL;DR: CORE uses FreeBSD network stack virtualization to extend physical networks for planning, testing and development, without the need for expensive hardware deployments, and scales to network topologies consisting of over a hundred virtual nodes emulated on a typical server computer.
Abstract: We present CORE (common open research emulator), a real-time network emulator that allows rapid instantiation of hybrid topologies composed of both real hardware and virtual network nodes. CORE uses FreeBSD network stack virtualization to extend physical networks for planning, testing and development, without the need for expensive hardware deployments. We evaluate CORE in wired and wireless settings, and compare performance results with those obtained on physical network deployments. We show that CORE scales to network topologies consisting of over a hundred virtual nodes emulated on a typical server computer, sending and receiving traffic totaling over 300,000 packets per second. We demonstrate the practical usability of CORE in a hybrid wired-wireless scenario composed of both physical and emulated nodes, carrying live audio and video streams.

Patent
30 Dec 2008
TL;DR: In this article, the authors present a method for sending a provisioning instruction including a device identifier from an external management entity to a network device, associating the device identifier with a virtual resource and sending a portion of the provisioning instructions to the network device.
Abstract: In one embodiment, a method includes receiving a provisioning instruction including a device identifier from an external management entity, receiving the device identifier from a network device, associating the provisioning instruction the network device, and sending a portion of the provisioning instruction to the network device. The device identifier being associated with a virtual resource. The associating is based on the device identifier of the virtual resource and a device identifier of a network device. The portion of the provisioning instruction is sent to the network device based on the associating.

Journal ArticleDOI
TL;DR: This paper extends recent optimal minimum-mean-square-error (MMSE) and signal-to-noise ratio (SNR) designs of relay networks to the corresponding multiple-input-multiple-output (MIMO) scenarios, whereby the source, relays and destination comprise multiple antennas.
Abstract: Relay networks have received considerable attention recently, especially when limited size and power resources impose constraints on the number of antennas within a wireless sensor network. In this context, signal processing techniques play a fundamental role, and optimality within a given relay architecture can be achieved under several design criteria. In this paper, we extend recent optimal minimum-mean-square-error (MMSE) and signal-to-noise ratio (SNR) designs of relay networks to the corresponding multiple-input-multiple-output (MIMO) scenarios, whereby the source, relays and destination comprise multiple antennas. We investigate maximum SNR solutions subject to power constraints and zero-forcing (ZF) criteria, as well as approximate MMSE equalizers with specified target SNR and power constraint at the receiver. We also maximize the transmission rate between the source and destination subject to power constraint at the receiver.

Proceedings ArticleDOI
01 Jun 2008
TL;DR: A novel asynchronous low-voltage signaling scheme is presented that makes the wafer-scale approach feasible by limiting the total power consumption while simultaneously providing a flexible, programmable network topology.
Abstract: This paper introduces a novel design of an artificial neural network tailored for wafer-scale integration. The presented VLSI implementation includes continuous-time analog neurons with up to 16 k inputs. A novel interconnection and routing scheme allows the mapping of a multitude of network models derived from biology on the VLSI neural network while maintaining a high resource usage. A single 20 cm wafer contains about 60 million synapses. The implemented neurons are highly accelerated compared to biological real time. The power consumption of the dense interconnection network providing the necessary communication bandwidth is a critical aspect of the system integration. A novel asynchronous low-voltage signaling scheme is presented that makes the wafer-scale approach feasible by limiting the total power consumption while simultaneously providing a flexible, programmable network topology.

Journal ArticleDOI
TL;DR: A thermodynamic framework for addressing consensus problems for nonlinear multiagent dynamical systems with fixed and switching topologies is developed and distributed nonlinear static and dynamic controller architectures for multiagent coordination are presented.