scispace - formally typeset
Search or ask a question

Showing papers on "Node (networking) published in 2011"


Journal ArticleDOI
TL;DR: The need for an alternative strategy, where low power nodes are overlaid within a macro network, creating what is referred to as a heterogeneous network is discussed, and a high-level overview of the 3GPP LTE air interface, network nodes, and spectrum allocation options is provided, along with the enabling mechanisms.
Abstract: As the spectral efficiency of a point-to-point link in cellular networks approaches its theoretical limits, with the forecasted explosion of data traffic, there is a need for an increase in the node density to further improve network capacity. However, in already dense deployments in today's networks, cell splitting gains can be severely limited by high inter-cell interference. Moreover, high capital expenditure cost associated with high power macro nodes further limits viability of such an approach. This article discusses the need for an alternative strategy, where low power nodes are overlaid within a macro network, creating what is referred to as a heterogeneous network. We survey current state of the art in heterogeneous deployments and focus on 3GPP LTE air interface to describe future trends. A high-level overview of the 3GPP LTE air interface, network nodes, and spectrum allocation options is provided, along with the enabling mechanisms for heterogeneous deployments. Interference management techniques that are critical for LTE heterogeneous deployments are discussed in greater detail. Cell range expansion, enabled through cell biasing and adaptive resource partitioning, is seen as an effective method to balance the load among the nodes in the network and improve overall trunking efficiency. An interference cancellation receiver plays a crucial role in ensuring acquisition of weak cells and reliability of control and data reception in the presence of legacy signals.

1,734 citations


Patent
Christopher A. Tillman1
28 Sep 2011
TL;DR: In Ad Hoc Networking, Charles Perkins has compiled a series of technical papers about networking on the fly from a variety of laboratories and experts that explains the latest thinking on how mobile devices can best discover, identify, and communicate with other devices in the vicinity.
Abstract: Embodiments disclosed herein relate to ad hoc networking. An embodiment includes computing a routing score for a source node based on at least hardware capabilities of the source node, applications available to the source node, and networking capabilities of the source node. The embodiment further includes receiving at the source node, one or more routing scores from intermediate nodes directly or indirectly connected to the source node, and sending the data to the destination node based on at least the routing scores received from each intermediate node and one or more route paths associated with each intermediate node.

1,378 citations


Journal ArticleDOI
TL;DR: This work introduces a novel architecture that reduces the usually required large number of elements to a single nonlinear node with delayed feedback and proves that delay-dynamical systems, even in their simplest manifestation, can perform efficient information processing.
Abstract: Novel methods for information processing are highly desired in our information-driven society. Inspired by the brain's ability to process information, the recently introduced paradigm known as 'reservoir computing' shows that complex networks can efficiently perform computation. Here we introduce a novel architecture that reduces the usually required large number of elements to a single nonlinear node with delayed feedback. Through an electronic implementation, we experimentally and numerically demonstrate excellent performance in a speech recognition benchmark. Complementary numerical studies also show excellent performance for a time series prediction benchmark. These results prove that delay-dynamical systems, even in their simplest manifestation, can perform efficient information processing. This finding paves the way to feasible and resource-efficient technological implementations of reservoir computing.

1,121 citations


Proceedings ArticleDOI
28 Mar 2011
TL;DR: This work study the notion of competing campaigns in a social network and address the problem of influence limitation where a "bad" campaign starts propagating from a certain node in the network and use the concept of limiting campaigns to counteract the effect of misinformation.
Abstract: In this work, we study the notion of competing campaigns in a social network and address the problem of influence limitation where a "bad" campaign starts propagating from a certain node in the network and use the notion of limiting campaigns to counteract the effect of misinformation. The problem can be summarized as identifying a subset of individuals that need to be convinced to adopt the competing (or "good") campaign so as to minimize the number of people that adopt the "bad" campaign at the end of both propagation processes. We show that this optimization problem is NP-hard and provide approximation guarantees for a greedy solution for various definitions of this problem by proving that they are submodular. We experimentally compare the performance of the greedy method to various heuristics. The experiments reveal that in most cases inexpensive heuristics such as degree centrality compare well with the greedy approach. We also study the influence limitation problem in the presence of missing data where the current states of nodes in the network are only known with a certain probability and show that prediction in this setting is a supermodular problem. We propose a prediction algorithm that is based on generating random spanning trees and evaluate the performance of this approach. The experiments reveal that using the prediction algorithm, we are able to tolerate about 90% missing data before the performance of the algorithm starts degrading and even with large amounts of missing data the performance degrades only to 75% of the performance that would be achieved with complete data.

761 citations


Journal ArticleDOI
TL;DR: This work seeks to combine the notions of "social trust" derived from social networks with "quality-of-service (QoS) trust"derived from information and communication networks to obtain a composite trust metric.
Abstract: Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when collaboration or cooperation is critical to achieving mission and system goals such as reliability, availability, scalability, and reconfigurability. In defining and managing trust in a military MANET, we must consider the interactions between the composite cognitive, social, information and communication networks, and take into account the severe resource constraints (e.g., computing power, energy, bandwidth, time), and dynamics (e.g., topology changes, node mobility, node failure, propagation channel conditions). We seek to combine the notions of "social trust" derived from social networks with "quality-of-service (QoS) trust" derived from information and communication networks to obtain a composite trust metric. We discuss the concepts and properties of trust and derive some unique characteristics of trust in MANETs, drawing upon social notions of trust. We provide a survey of trust management schemes developed for MANETs and discuss generally accepted classifications, potential attacks, performance metrics, and trust metrics in MANETs. Finally, we discuss future research areas on trust management in MANETs based on the concept of social and cognitive networks.

691 citations


Journal ArticleDOI
01 Mar 2011
TL;DR: Issues in WSNs are outlined,PSO is introduced, and its suitability for WSN applications is discussed, and a brief survey of how PSO is tailored to address these issues is presented.
Abstract: Wireless-sensor networks (WSNs) are networks of autonomous nodes used for monitoring an environment. Developers of WSNs face challenges that arise from communication link failures, memory and computational constraints, and limited energy. Many issues in WSNs are formulated as multidimensional optimization problems, and approached through bioinspired techniques. Particle swarm optimization (PSO) is a simple, effective, and computationally efficient optimization algorithm. It has been applied to address WSN issues such as optimal deployment, node localization, clustering, and data aggregation. This paper outlines issues in WSNs, introduces PSO, and discusses its suitability for WSN applications. It also presents a brief survey of how PSO is tailored to address these issues.

644 citations


Posted Content
TL;DR: In this article, the authors analyzed the convergence of gradient-based distributed optimization algorithms that base their updates on delayed stochastic gradient information and showed that the delay is asymptotically negligible.
Abstract: We analyze the convergence of gradient-based optimization algorithms that base their updates on delayed stochastic gradient information. The main application of our results is to the development of gradient-based distributed optimization algorithms where a master node performs parameter updates while worker nodes compute stochastic gradients based on local information in parallel, which may give rise to delays due to asynchrony. We take motivation from statistical problems where the size of the data is so large that it cannot fit on one computer; with the advent of huge datasets in biology, astronomy, and the internet, such problems are now common. Our main contribution is to show that for smooth stochastic problems, the delays are asymptotically negligible and we can achieve order-optimal convergence results. In application to distributed optimization, we develop procedures that overcome communication bottlenecks and synchronization requirements. We show $n$-node architectures whose optimization error in stochastic problems---in spite of asynchronous delays---scales asymptotically as $\order(1 / \sqrt{nT})$ after $T$ iterations. This rate is known to be optimal for a distributed system with $n$ nodes even in the absence of delays. We additionally complement our theoretical results with numerical experiments on a statistical machine learning task.

558 citations


Journal ArticleDOI
15 Apr 2011
TL;DR: The Markov Random Walk model is applied to rank a network node based on its resource and topological attributes and shows that the topology-aware node rank is a better resource measure and the proposed RW-based algorithms increase the long-term average revenue and acceptance ratio.
Abstract: Virtualizing and sharing networked resources have become a growing trend that reshapes the computing and networking architectures. Embedding multiple virtual networks (VNs) on a shared substrate is a challenging problem on cloud computing platforms and large-scale sliceable network testbeds. In this paper we apply the Markov Random Walk (RW) model to rank a network node based on its resource and topological attributes. This novel topology-aware node ranking measure reflects the relative importance of the node. Using node ranking we devise two VN embedding algorithms. The first algorithm maps virtual nodes to substrate nodes according to their ranks, then embeds the virtual links between the mapped nodes by finding shortest paths with unsplittable paths and solving the multi-commodity flow problem with splittable paths. The second algorithm is a backtracking VN embedding algorithm based on breadth-first search, which embeds the virtual nodes and links during the same stage using node ranks. Extensive simulation experiments show that the topology-aware node rank is a better resource measure and the proposed RW-based algorithms increase the long-term average revenue and acceptance ratio compared to the existing embedding algorithms.

503 citations


Journal ArticleDOI
TL;DR: The topology of the network completely characterizes the resilience of linear iterative strategies to this kind of malicious behavior and it is shown that node xi is guaranteed to be able to calculate any arbitrary function of all node values when the number of malicious nodes is f or less.
Abstract: Given a network of interconnected nodes, each with its own value (such as a measurement, position, vote, or other data), we develop a distributed strategy that enables some or all of the nodes to calculate any arbitrary function of the node values, despite the actions of malicious nodes in the network. Our scheme assumes a broadcast model of communication (where all nodes transmit the same value to all of their neighbors) and utilizes a linear iteration where, at each time-step, each node updates its value to be a weighted average of its own previous value and those of its neighbors. We consider a node to be malicious or faulty if, instead of following the predefined linear strategy, it updates its value arbitrarily at each time-step (perhaps conspiring with other malicious nodes in the process). We show that the topology of the network completely characterizes the resilience of linear iterative strategies to this kind of malicious behavior. First, when the network contains 2f or fewer vertex-disjoint paths from some node xj to another node xi , we provide an explicit strategy for f malicious nodes to follow in order to prevent node xi from receiving any information about xj's value. Next, if node xi has at least 2f+1 vertex-disjoint paths from every other (non-neighboring) node, we show that xi is guaranteed to be able to calculate any arbitrary function of all node values when the number of malicious nodes is f or less. Furthermore, we show that this function can be calculated after running the linear iteration for a finite number of time-steps (upper bounded by the number of nodes in the network) with almost any set of weights (i.e., for all weights except for a set of measure zero).

500 citations


Journal ArticleDOI
TL;DR: This paper proposes a new procedure to obtain a convex overapproximation in the form of a polytopic system with norm-bounded additive uncertainty and derives stability results in terms of linear matrix inequalities (LMIs).
Abstract: In this paper, we study the stability of networked control systems (NCSs) that are subject to time-varying transmission intervals, time-varying transmission delays, and communication constraints. Communication constraints impose that, per transmission, only one node can access the network and send its information. The order in which nodes send their information is orchestrated by a network protocol, such as, the Round-Robin (RR) and the Try-Once-Discard (TOD) protocol. In this paper, we generalize the mentioned protocols to novel classes of so-called “periodic” and “quadratic” protocols. By focusing on linear plants and controllers, we present a modeling framework for NCSs based on discrete-time switched linear uncertain systems. This framework allows the controller to be given in discrete time as well as in continuous time. To analyze stability of such systems for a range of possible transmission intervals and delays, with a possible nonzero lower bound, we propose a new procedure to obtain a convex overapproximation in the form of a polytopic system with norm-bounded additive uncertainty. We show that this approximation can be made arbitrarily tight in an appropriate sense. Based on this overapproximation, we derive stability results in terms of linear matrix inequalities (LMIs). We illustrate our stability analysis on the benchmark example of a batch reactor and show how this leads to tradeoffs between different protocols, allowable ranges of transmission intervals and delays. In addition, we show that the exploitation of the linearity of the system and controller leads to a significant reduction in conservatism with respect to existing approaches in the literature.

475 citations


Journal ArticleDOI
TL;DR: A cooperative wireless network in the presence of one or more eavesdroppers, and node cooperation for achieving physical (PHY) layer based security is considered, and an analytical solution is obtained for the DF scheme with a single eavesdropper and the multivariate problem is reduced to a problem of one variable.
Abstract: We consider a cooperative wireless network in the presence of one or more eavesdroppers, and exploit node cooperation for achieving physical (PHY) layer based security. Two different cooperation schemes are considered. In the first scheme, cooperating nodes retransmit a weighted version of the source signal in a decode-and-forward (DF) fashion. In the second scheme, referred to as cooperative jamming (CJ), while the source is transmitting, cooperating nodes transmit weighted noise to confound the eavesdropper. We investigate two objectives: i) maximization of the achievable secrecy rate subject to a total power constraint and ii) minimization of the total power transmit power under a secrecy rate constraint. For the first design objective, we obtain the exact solution for the DF scheme for the case of a single or multiple eavasdroppers, while for the CJ scheme with a single eavesdropper we reduce the multivariate problem to a problem of one variable. For the second design objective, existing work introduces additional constraints in order to reduce the degree of difficulty, thus resulting in suboptimal solutions. Our work raises those constraints, and obtains either an analytical solution for the DF scheme with a single eavesdropper, or reduces the multivariate problem to a problem of one variable for the CJ scheme with a single eavesdropper. Numerical results are presented to illustrate the proposed results and compare them to existing work.

Proceedings ArticleDOI
11 Apr 2011
TL;DR: This work investigates the problem of discovering the Most Popular Route (MPR) between two locations by observing the traveling behaviors of many previous users, and proposes a Maximum Probability Product algorithm to discover the MPR from a transfer network based on the popularity indicators in a breadth-first manner.
Abstract: The booming industry of location-based services has accumulated a huge collection of users' location trajectories of driving, cycling, hiking, etc. In this work, we investigate the problem of discovering the Most Popular Route (MPR) between two locations by observing the traveling behaviors of many previous users. This new query is beneficial to travelers who are asking directions or planning a trip in an unfamiliar city/area, as historical traveling experiences can reveal how people usually choose routes between locations. To achieve this goal, we firstly develop a Coherence Expanding algorithm to retrieve a transfer network from raw trajectories, for indicating all the possible movements between locations. After that, the Absorbing Markov Chain model is applied to derive a reasonable transfer probability for each transfer node in the network, which is subsequently used as the popularity indicator in the search phase. Finally, we propose a Maximum Probability Product algorithm to discover the MPR from a transfer network based on the popularity indicators in a breadth-first manner, and we illustrate the results and performance of the algorithm by extensive experiments.

Patent
07 Jan 2011
TL;DR: In this paper, a method for managing control channel interference is proposed, which includes a first access node performing at least one of blanking and transmitting at lower than nominal transmit power on at least a portion of a control channel.
Abstract: A method for managing control channel interference is provided. The method includes a first access node performing at least one of blanking and transmitting at lower than nominal transmit power on at least a portion of a control channel. The method further includes the first access node applying at least one of blanking and transmitting at lower than nominal transmit power only on the control region of chosen subframes, wherein a second access node transmits the control region of the chosen subframes at nominal transmit power.

Journal ArticleDOI
TL;DR: It is found that methods based on the degree-corrected stochastic block model are consistent under a wider class of models and that modularity-type methods require parameter constraints for consistency, whereas likelihood-based methods do not.
Abstract: Community detection is a fundamental problem in network analysis, with applications in many diverse areas. The stochastic block model is a common tool for model-based community detection, and asymptotic tools for checking consistency of community detection under the block model have been recently developed. However, the block model is limited by its assumption that all nodes within a community are stochastically equivalent, and provides a poor fit to networks with hubs or highly varying node degrees within communities, which are common in practice. The degree-corrected stochastic block model was proposed to address this shortcoming and allows variation in node degrees within a community while preserving the overall block community structure. In this paper we establish general theory for checking consistency of community detection under the degree-corrected stochastic block model and compare several community detection criteria under both the standard and the degree-corrected models. We show which criteria are consistent under which models and constraints, as well as compare their relative performance in practice. We find that methods based on the degree-corrected block model, which includes the standard block model as a special case, are consistent under a wider class of models and that modularity-type methods require parameter constraints for consistency, whereas likelihood-based methods do not. On the other hand, in practice, the degree correction involves estimating many more parameters, and empirically we find it is only worth doing if the node degrees within communities are indeed highly variable. We illustrate the methods on simulated networks and on a network of political blogs.

Journal ArticleDOI
TL;DR: By utilizing the predictable mobility patterns of underwater objects, a scheme, called Scalable Localization scheme with Mobility Prediction (SLMP), for underwater sensor networks is proposed, and results show that SLMP can greatly reduce localization communication cost while maintaining relatively high localization coverage and localization accuracy.
Abstract: Due to harsh aqueous environments, non-negligible node mobility and large network scale, localization for large-scale mobile underwater sensor networks is very challenging. In this paper, by utilizing the predictable mobility patterns of underwater objects, we propose a scheme, called Scalable Localization scheme with Mobility Prediction (SLMP), for underwater sensor networks. In SLMP, localization is performed in a hierarchical way, and the whole localization process is divided into two parts: anchor node localization and ordinary node localization. During the localization process, every node predicts its future mobility pattern according to its past known location information, and it can estimate its future location based on the predicted mobility pattern. Anchor nodes with known locations in the network will control the localization process in order to balance the trade-off between localization accuracy, localization coverage, and communication cost. We conduct extensive simulations, and our results show that SLMP can greatly reduce localization communication cost while maintaining relatively high localization coverage and localization accuracy.

Journal ArticleDOI
TL;DR: In this paper, a cooperative tracking adaptive controller is designed based on each node maintaining a neural network parametric approximator and suitably tuning it to guarantee stability and performance, and a Lyapunov-based proof shows the ultimate boundedness of the tracking error.
Abstract: This paper studies synchronization to a desired trajectory for multi-agent systems with second-order integrator dynamics and unknown nonlinearities and disturbances. The agents can have different dynamics and the treatment is for directed graphs with fixed communication topologies. The command generator or leader node dynamics is also nonlinear and unknown. Cooperative tracking adaptive controllers are designed based on each node maintaining a neural network parametric approximator and suitably tuning it to guarantee stability and performance. A Lyapunov-based proof shows the ultimate boundedness of the tracking error. A simulation example with nodes having second-order Lagrangian dynamics verifies the performance of the cooperative tracking adaptive controller. Copyright © 2010 John Wiley & Sons, Ltd.

Journal ArticleDOI
01 Jun 2011
TL;DR: This paper investigates the cooperative tracking control problem for a group of Lagrangian vehicle systems with directed communication graph topology and proposes a design method for a distributed adaptive protocol which guarantees that all the networked systems synchronize to the motion of a target system.
Abstract: This paper investigates the cooperative tracking control problem for a group of Lagrangian vehicle systems with directed communication graph topology. All the vehicles can have different dynamics. A design method for a distributed adaptive protocol is given which guarantees that all the networked systems synchronize to the motion of a target system. The dynamics of the networked systems, as well as the target system, are all assumed unknown. A neural network (NN) is used at each node to approximate the distributed dynamics. The resulting protocol consists of a simple decentralized proportional-plus-derivative term and a nonlinear term with distributed adaptive tuning laws at each node. The case with nonconstant NN approximation error is considered. There, a robust term is added to suppress the external disturbances and the approximation errors of the NNs. Simulation examples are included to demonstrate the effectiveness of the proposed algorithms.

Journal ArticleDOI
TL;DR: Through both theoretical analysis and numerical results, it is shown that SHAC prolongs the network lifetime significantly against the other clustering protocols such as LEACH-C and EECS.
Abstract: WSNs (Wireless Sensor Networks) can collect reliable and accurate information in distant and hazardous environments, and can be used in National Defence, Military Affairs, Industrial Control, Environmental Monitor, Traffic Management, Medical Care, Smart Home, etc. The sensor whose resources are limited is cheap, and depends on battery to supply electricity, so it’s important for routing to efficiently utilize its power. In this paper, an energy-efficient Single-Hop Active Clustering (SHAC) algorithm is proposed for wireless sensor networks. The core of SHAC has three parts. Firstly, a timer mechanism is introduced to select tentative cluster-heads. By analyzing relation between time of timer and residual energy, it is known that time of timer is inversely proportional to residual energy of nodes so a timer mechanism can balance the residual energy of the whole network nodes which improves the network energy efficiency. Secondly, a cost function is proposed to balance energy-efficient of each node. Finally, an active clustering algorithm is proposed for single-hop homogeneous networks. Through both theoretical analysis and numerical results, it is shown that SHAC prolongs the network lifetime significantly against the other clustering protocols such as LEACH-C and EECS. Under general instance, SHAC may prolong the lifetime by up to 50% against EECS.

Proceedings ArticleDOI
15 May 2011
TL;DR: The necessary enhancements over existing performance evaluation frameworks are discussed, such that the energy efficiency of the entire network comprising component, node and network level contributions can be quantified.
Abstract: In order to quantify the energy savings in wireless networks, the power consumption of the entire system needs to be captured and an appropriate energy efficiency evaluation framework must be defined. In this paper, the necessary enhancements over existing performance evaluation frameworks are discussed, such that the energy efficiency of the entire network comprising component, node and network level contributions can be quantified. The most important addendums over existing frameworks include a sophisticated power model for various base station (BS) types, which maps the RF output power radiated at the antenna elements to the total supply power of a BS site. We also consider an approach to quantify the energy efficiency of large geographical areas by using the existing small scale deployment models along with long term traffic models. Finally, the proposed evaluation framework is applied to quantify the energy efficiency of the downlink of a 3GPP LTE radio access network.

Journal ArticleDOI
TL;DR: An overview of macroscopic node models found in the literature is provided, explaining both their contributions and shortcomings, and specific macroscopy node model instances for unsignalized and signalized intersections are proposed.
Abstract: Node models for macroscopic simulation have attracted relatively little attention in the literature. Nevertheless, in dynamic network loading (DNL) models for congested road networks, node models are as important as the extensively studied link models. This paper provides an overview of macroscopic node models found in the literature, explaining both their contributions and shortcomings. A formulation defining a generic class of first order macroscopic node models is presented, satisfying a list of requirements necessary to produce node models with realistic, consistent results. Defining a specific node model instance of this class requires the specification of a supply constraint interaction rule and (optionally) node supply constraints. Following this theoretical discussion, specific macroscopic node model instances for unsignalized and signalized intersections are proposed. These models apply an oriented capacity proportional distribution of the available supply over the incoming links of a node. A computationally efficient algorithm to solve the node models exactly is included.

Journal ArticleDOI
TL;DR: A new platform called Integrated WSN Solution for Precision Agriculture, which efficiently integrates crop data acquisition, data transmission to the end-user and video-surveillance tasks, and the only cost-effective technology employed is IEEE 802.15.4.

Proceedings ArticleDOI
04 Jun 2011
TL;DR: A new lightweight topology-aware QOS architecture is proposed that provides service guarantees for applications such as consolidated servers on CMPs and real-time SOCs and consumes 45% less area and 29% less power than a state-of-the-art QOS-enabled NOC without these features.
Abstract: Today's chip-level multiprocessors (CMPs) feature up to a hundred discrete cores, and with increasing levels of integration, CMPs with hundreds of cores, cache tiles, and specialized accelerators are anticipated in the near future. In this paper, we propose and evaluate technologies to enable networks-on-chip (NOCs) to support a thousand connected components (Kilo-NOC) with high area and energy efficiency, good performance, and strong quality-of-service (QOS) guarantees. Our analysis shows that QOS support burdens the network with high area and energy costs. In response, we propose a new lightweight topology-aware QOS architecture that provides service guarantees for applications such as consolidated servers on CMPs and real-time SOCs. Unlike prior NOC quality-of-service proposals which require QOS support at every network node, our scheme restricts the extent of hardware support to portions of the die, reducing router complexity in the rest of the chip. We further improve network area- and energy-efficiency through a novel flow control mechanism that enables a single-network, low-cost elastic buffer implementation. Together, these techniques yield a heterogeneous Kilo-NOC architecture that consumes 45% less area and 29% less power than a state-of-the-art QOS-enabled NOC without these features.

Proceedings ArticleDOI
06 Jun 2011
TL;DR: The design of MD-HBase is presented, a scalable data management system for LBSs that builds two standard index structures–the K-d tree and the Quad treeâ€"over a range partitioned Key-value store and allows efficient multi-dimensional query processing.
Abstract: The ubiquity of location enabled devices has resulted in a wide proliferation of location based applications and services. To handle the growing scale, database management systems driving such location based services (LBS) must cope with high insert rates for location updates of millions of devices, while supporting efficient real-time analysis on latest location. Traditional DBMSs, equipped with multi-dimensional index structures, can efficiently handle spatio-temporal data. However, popular open source relational database systems are overwhelmed by the high insertion rates, real-time querying requirements, and terabytes of data that these systems must handle. On the other hand, Key-value stores can effectively support large scale operation, but do not natively support multi-attribute accesses needed to support the rich querying functionality essential for the LBSs. We present MD-HBase, a scalable data management system for LBSs that bridges this gap between scale and functionality. Our approach leverages a multi-dimensional index structure layered over a Key-value store. The underlying Key-value store allows the system to sustain high insert throughput and large data volumes, while ensuring fault-tolerance, and high availability. On the other hand, the index layer allows efficient multi-dimensional query processing. We present the design of MD-HBase that builds two standard index structuresâ€"the K-d tree and the Quad treeâ€"over a range partitioned Key-value store. Our prototype implementation using HBase, a standard open-source Key-value store, can handle hundreds of thousands of inserts per second using a modest 16 node cluster, while efficiently processing multidimensional range queries and nearest neighbor queries in real-time with response times as low as hundreds of milliseconds.

Journal ArticleDOI
TL;DR: This paper presents an energy-efficient opportunistic routing strategy, denoted as EEOR, and extensive simulations in TOSSIM show that the protocol EEOR performs better than the well-known ExOR protocol in terms of the energy consumption, the packet loss ratio, and the average delivery delay.
Abstract: Opportunistic routing, has been shown to improve the network throughput, by allowing nodes that overhear the transmission and closer to the destination to participate in forwarding packets, i.e., in forwarder list. The nodes in forwarder list are prioritized and the lower priority forwarder will discard the packet if the packet has been forwarded by a higher priority forwarder. One challenging problem is to select and prioritize forwarder list such that a certain network performance is optimized. In this paper, we focus on selecting and prioritizing forwarder list to minimize energy consumption by all nodes. We study both cases where the transmission power of each node is fixed or dynamically adjustable. We present an energy-efficient opportunistic routing strategy, denoted as EEOR. Our extensive simulations in TOSSIM show that our protocol EEOR performs better than the well-known ExOR protocol (when adapted in sensor networks) in terms of the energy consumption, the packet loss ratio, and the average delivery delay.

Journal ArticleDOI
TL;DR: It is shown that classic centrality measures from the static setting can be extended in a computationally convenient manner and communicability indices can be computed to summarize the ability of each node to broadcast and receive information.
Abstract: Many natural and technological applications generate time-ordered sequences of networks, defined over a fixed set of nodes; for example, time-stamped information about "who phoned who" or "who came into contact with who" arise naturally in studies of communication and the spread of disease. Concepts and algorithms for static networks do not immediately carry through to this dynamic setting. For example, suppose A and B interact in the morning, and then B and C interact in the afternoon. Information, or disease, may then pass from A to C, but not vice versa. This subtlety is lost if we simply summarize using the daily aggregate network given by the chain A-B-C. However, using a natural definition of a walk on an evolving network, we show that classic centrality measures from the static setting can be extended in a computationally convenient manner. In particular, communicability indices can be computed to summarize the ability of each node to broadcast and receive information. The computations involve basic operations in linear algebra, and the asymmetry caused by time's arrow is captured naturally through the noncommutativity of matrix-matrix multiplication. Illustrative examples are given for both synthetic and real-world communication data sets. We also discuss the use of the new centrality measures for real-time monitoring and prediction.

01 Mar 2011
TL;DR: The first system for network-level power profiling of low-power wireless systems using power state tracking to estimate system power consumption and a structure called energy capsules to attribute energy consumption to activities such as packet transmissions and receptions is presented.
Abstract: Low-power wireless networks are quickly becoming a critical part of our everyday infrastructure Power consumption is a critical concern, but power measurement and estimation is a challenge We present Powertrace, which to the best of our knowledge is the first system for network-level power profiling of low-power wireless systems Powertrace uses power state tracking to estimate system power consumption and a structure called energy capsules to attribute energy consumption to activities such as packet transmissions and receptions With Powertrace, the power consumption of a system can be broken down into individual activities which allows us to answer questions such as “How much energy is spent forwarding packets for node X?”, “How much energy is spent on control traffic and how much on critical data?”, and “How much energy does application X account for?” Experiments show that Powertrace is accurate to 94% of the energy consumption of a device To demonstrate the usefulness of Powertrace, we use it to experimentally analyze the power behavior of the proposed IETF standard IPv6 RPL routing protocol and a sensor network data collection protocol Through using Powertrace, we find the highest power consumers and are able to reduce the power consumption of data collection with 24% It is our hope that Powertrace will help the community to make empirical energy evaluation a widely used tool in the low-power wireless research community toolbox

Journal ArticleDOI
TL;DR: This work addresses the problem of securing distributed storage systems against eavesdropping and adversarial attacks, and gives upper bounds on the maximum amount of information that can be stored safely on the system.
Abstract: We address the problem of securing distributed storage systems against eavesdropping and adversarial attacks. An important aspect of these systems is node failures over time, necessitating, thus, a repair mechanism in order to maintain a desired high system reliability. In such dynamic settings, an important security problem is to safeguard the system from an intruder who may come at different time instances during the lifetime of the storage system to observe and possibly alter the data stored on some nodes. In this scenario, we give upper bounds on the maximum amount of information that can be stored safely on the system. For an important operating regime of the distributed storage system, which we call the bandwidth-limited regime, we show that our upper bounds are tight and provide explicit code constructions. Moreover, we provide a way to short list the malicious nodes and expurgate the system.

Journal ArticleDOI
01 Jan 2011
TL;DR: In this paper, a multi-channel MAC protocol, called MC-LMAC, is proposed to maximize the throughput of WSNs by coordinating transmissions over multiple frequency channels by taking advantage of interference and contention-free parallel transmissions on different channels.
Abstract: In traditional wireless sensor network (WSN) applications, energy efficiency may be considered to be the most important concern whereas utilizing bandwidth and maximizing throughput are of secondary importance. However, recent applications, such as structural health monitoring, require high amounts of data to be collected at a faster rate. We present a multi-channel MAC protocol, MC-LMAC, designed with the objective of maximizing the throughput of WSNs by coordinating transmissions over multiple frequency channels. MC-LMAC takes advantage of interference and contention-free parallel transmissions on different channels. It is based on scheduled access which eases the coordination of nodes, dynamically switching their interfaces between channels and makes the protocol operate effectively with no collisions during peak traffic. Time is slotted and each node is assigned the control over a time slot to transmit on a particular channel. We analyze the performance of MC-LMAC with extensive simulations in Glomosim. MC-LMAC exhibits significant bandwidth utilization and high throughput while ensuring an energy-efficient operation. Moreover, MC-LMAC outperforms the contention-based multi-channel MMSN protocol, a cluster-based channel assignment method, and the single-channel CSMA in terms of data delivery ratio and throughput for high data rate, moderate-size networks of 100 nodes at different densities.

Journal ArticleDOI
TL;DR: A novel prediction-based data collection protocol is proposed, in which a double-queue mechanism is designed to synchronize the prediction data series of the sensor node and the sink node, and therefore, the cumulative error of continuous predictions is reduced.

Patent
09 Feb 2011
TL;DR: In this article, the authors propose a cooperation between each data center and a WAN to enable effective power-saving implementation, load distribution, or fault countermeasure processing, where each node located at a boundary point between the WAN and another network is provided with a network address translation (NAT) function that can be set dynamically to avoid address duplication due to virtual machine migration.
Abstract: In cooperation between each data center and a WAN, virtual machine migration is carried out without interruption in processing so as to enable effective power-saving implementation, load distribution, or fault countermeasure processing Each node located at a boundary point between the WAN and another network is provided with a network address translation (NAT) function that can be set dynamically to avoid address duplication due to virtual machine migration Alternatively, each node included in the WAN is provided with a network virtualization function; and there are implemented a virtual network connected to a data center for including a virtual machine before migration, and a virtual network connected to a data center for including the virtual machine after migration, thereby allowing coexistent provision of identical addresses Thus, the need for changing network routing information at the time of virtual machine migration can be eliminated, and a setting change for migration accomplished quickly