Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective

Size: px
Start display at page:

Download "Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective"

Transcription

1 Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective Yang Song, Starsky H.Y. Wong, and Kang-Won Lee Wireless Networking Research Group IBM T. J. Watson Research Center Mobicom 2011 Research was sponsored by US Army Research and UK Ministry of Defense under W911NF / 19

2 Overview 1 Motivation 2 Gateway Selection Game 3 Equilibrium Selective Learning 4 Performance Evaluation 5 Conclusions 2 / 19

3 Coalition Networks with Multiple Domains Scenario: - Coalition networks with heterogenous groups. - Inter-connected via wireless links, e.g., IEEE , WiMAX, UAV, satellite, 3G/4G etc. Example: Joint military missions, US-UK Disaster rescue teams, fire-fighters and police officers Wireless sensor networks of different organizations, e.g., Internet of Things (IoT), Smart Planet Solutions 3 / 19

4 Interoperability Issue 4 / 19

5 Interoperability Issue Problems: Inter-domain communication is non-trivial for heterogenous domains Different network protocol, security schemes, policies Security and policy enforcement, traffic analysis 4 / 19

6 Interoperability Issue Problems: Solution: Inter-domain communication is non-trivial for heterogenous domains Different network protocol, security schemes, policies Security and policy enforcement, traffic analysis 4 / 19

7 Interoperability Issue Problems: Inter-domain communication is non-trivial for heterogenous domains Different network protocol, security schemes, policies Solution: Designate gateway nodes Gateways S1 D1 D2 Security and policy enforcement, traffic analysis S2 Domain A Domain B 4 / 19

8 Cost Efficient Gateway Selection Gateways Source Domain A Destination Domain B Domain C Each pair of nodes has a cost, e.g., routing metric cost, such as hop count, RIP, AODV etc. Euclidean distance ETX, ETT, RTT Energy consumption etc. 5 / 19

9 Cost Efficient Gateway Selection Gateways Source Domain A Destination Domain B Domain C Each pair of nodes has a cost, e.g., routing metric cost, such as hop count, RIP, AODV etc. Euclidean distance ETX, ETT, RTT Energy consumption etc. For a single domain Intra-domain cost 5 / 19

10 Cost Efficient Gateway Selection Gateways Source Domain A Destination Domain B Domain C Each pair of nodes has a cost, e.g., routing metric cost, such as hop count, RIP, AODV etc. Euclidean distance ETX, ETT, RTT Energy consumption etc. For a single domain Intra-domain cost For the network Inter-domain backbone cost 5 / 19

11 Cost Efficient Gateway Selection Gateways Source Domain A Destination Domain B Domain C Each pair of nodes has a cost, e.g., routing metric cost, such as hop count, RIP, AODV etc. Euclidean distance ETX, ETT, RTT Energy consumption etc. For a single domain For the network Intra-domain cost + Inter-domain backbone cost Question: How to select the set of gateways s.t. the overall cost is minimized? 5 / 19

12 Challenges Gateways Destination Domain B Source Domain A Domain C 6 / 19

13 Challenges Gateways Destination Domain B Combinatorial nature of solution space Source Domain A Domain C 6 / 19

14 Challenges Gateways Destination Domain B Combinatorial nature of solution space Source Domain A Domain C Distributed solution 6 / 19

15 Challenges Gateways Source Domain A Destination Domain B Domain C Combinatorial nature of solution space Each domain may designate gateway for its own benefit (self-interested / lack of coordination) Distributed solution 6 / 19

16 Challenges Gateways Source Domain A Destination Domain B Domain C Combinatorial nature of solution space Each domain may designate gateway for its own benefit (self-interested / lack of coordination) Distributed solution Equilibrium efficiency 6 / 19

17 Challenges Gateways Source Domain A Destination Domain B Domain C Combinatorial nature of solution space Each domain may designate gateway for its own benefit (self-interested / lack of coordination) Reluctance in revealing its own intra-domain topology Distributed solution Equilibrium efficiency 6 / 19

18 Challenges Gateways Source Domain A Destination Domain B Domain C Combinatorial nature of solution space Each domain may designate gateway for its own benefit (self-interested / lack of coordination) Reluctance in revealing its own intra-domain topology Distributed solution Equilibrium efficiency Local information only 6 / 19

19 Challenges Gateways Source Domain A Destination Domain B Domain C Combinatorial nature of solution space Each domain may designate gateway for its own benefit (self-interested / lack of coordination) Reluctance in revealing its own intra-domain topology Distributed solution Equilibrium efficiency Local information only potential game theory & equilibrium selective learning 6 / 19

20 Network Model M : the set of domains in the coalition network N m : the set of nodes in the domain gm i = 1: node i is selected as the gateway node and gm i = 0 o.w. and i m = argmax i Nm gm i be the selected gateway node g m = {gm,g 1 m, 2,g m Nm }: the gateway selection strategy of domain m s = {g 1,g 2,,g M }: the joint gateway selection profile of the network Satellite/UAV/3G/4G link: cost η (expensive), to enforce always-on connectivity A pair of node i and j: c(i,j) 0 is the associated symmetric link cost, c(i,j) = η if out of range c (i,j) min(c (i,j),η) 7 / 19

21 Gateway Selection Game For each single domain Minimize (Local information and observation only) U m (g m,g m ) = c i i m,i N m ( i, i ) m + n m,n M ( ) c im,în (1) 8 / 19

22 Gateway Selection Game For each single domain Minimize (Local information and observation only) U m (g m,g m ) = c i i m,i N m ( i, i ) m + n m,n M ( ) c im,în (1) Gateways Destination Domain B Player: each domain m M Strategy space: N m Source Domain A Domain C 8 / 19

23 Gateway Selection Game For each single domain Minimize (Local information and observation only) U m (g m,g m ) = c i i m,i N m ( i, i ) m + n m,n M ( ) c im,în (1) Gateways Source Destination Domain B Player: each domain m M Strategy space: N m Questions Domain A Domain C 8 / 19

24 Gateway Selection Game For each single domain Minimize (Local information and observation only) U m (g m,g m ) = c i i m,i N m ( i, i ) m + n m,n M ( ) c im,în (1) Gateways Source Domain A Destination Domain B Domain C Player: each domain m M Strategy space: N m Questions Agreement? Existence of NE 8 / 19

25 Gateway Selection Game For each single domain Minimize (Local information and observation only) U m (g m,g m ) = c i i m,i N m ( i, i ) m + n m,n M ( ) c im,în (1) Gateways Source Domain A Destination Domain B Domain C Player: each domain m M Strategy space: N m Questions Agreement? Existence of NE Performance? Efficiency of NE 8 / 19

26 Gateway Selection Game For each single domain Minimize (Local information and observation only) U m (g m,g m ) = c i i m,i N m ( i, i ) m + n m,n M ( ) c im,în (1) Gateways Destination Domain B Player: each domain m M Strategy space: N m Source Domain A Domain C For overall network Questions Agreement? Existence of NE Performance? Efficiency of NE Minimize (intra-domain cost + cost of backbone communication links) R(s) = m c i i m,i N m ( i, i m )+ c ( i m,în) MCG(s) ) ( im,în. (2) 8 / 19

27 Existence of Nash Equilibrium Theorem The gateway selection game has a Nash equilibrium, which minimizes, either locally or globally, the following function F(s) = m c i i m,i N m ( i, i m )+ ( i m,î n) CCG(s) c ( ) i m,î n. (3) 9 / 19

28 Existence of Nash Equilibrium Theorem The gateway selection game has a Nash equilibrium, which minimizes, either locally or globally, the following function F(s) = m c i i m,i N m ( i, i m )+ ( i m,î n) CCG(s) c ( ) i m,î n. (3) Nash equilibrium may not be unique Multiple Nash equilibria have different performance 9 / 19

29 Existence of Nash Equilibrium Theorem The gateway selection game has a Nash equilibrium, which minimizes, either locally or globally, the following function F(s) = m c i i m,i N m ( i, i m )+ ( i m,î n) CCG(s) c ( ) i m,î n. (3) Nash equilibrium may not be unique Multiple Nash equilibria have different performance To capture the (in)efficiency of Nash equilibrium, Price of Anarchy and Price of Stability are introduced value of best equilibrium Price of Stability = value of optimal solution 9 / 19

30 For M = 2 Efficiency of Nash Equilibria For two player gateway selection games, the best Nash Equilibrium is the global network optimum solution, i.e., the price of stability is / 19

31 For M = 2 Efficiency of Nash Equilibria For two player gateway selection games, the best Nash Equilibrium is the global network optimum solution, i.e., the price of stability is 1. For M 3 For M 3, if the link cost metric c(a,b) satisfies the triangle inequality, the price of stability is always / 19

32 For M = 2 Efficiency of Nash Equilibria For two player gateway selection games, the best Nash Equilibrium is the global network optimum solution, i.e., the price of stability is 1. For M 3 For M 3, if the link cost metric c(a,b) satisfies the triangle inequality, the price of stability is always 1. All else If the triangle inequality does not hold, the price of stability of an M -player gateway selection game is at most (1+δ), where ( ) η M M 3 2 δ = ( min m M min gm i i m(g m),i N m c i, i ). (4) m (g m ) 10 / 19

33 B-logit: Binary Logit Algorithm B-logit: For every time slot t: 11 / 19

34 B-logit: Binary Logit Algorithm B-logit: For every time slot t: Randomly select one of the players, say m, to update its gateway selection while other domains remain unchanged. 11 / 19

35 B-logit: Binary Logit Algorithm B-logit: For every time slot t: Randomly select one of the players, say m, to update its gateway selection while other domains remain unchanged. Denote the current gateway selection of domain m as g m(t). Domain m randomly selects a node in its domain as the gateway candidate. Denote the candidate gateway selection strategy by g m. Domain m updates as and = Pr(g m(t +1) = g m) (5) exp Um( gm,g m(t))/τ exp Um( gm,g m(t))/τ +exp Um(gm(t),g m(t))/τ Pr(g m(t +1) = g m(t)) = 1 Pr(g m(t +1) = g m) (6) where τ is a small positive constant, a.k.a., the smoothing factor of the algorithm. 11 / 19

36 B-logit: Binary Logit Algorithm B-logit: For every time slot t: Randomly select one of the players, say m, to update its gateway selection while other domains remain unchanged. Denote the current gateway selection of domain m as g m(t). Domain m randomly selects a node in its domain as the gateway candidate. Denote the candidate gateway selection strategy by g m. Domain m updates as and = Pr(g m(t +1) = g m) (5) exp Um( gm,g m(t))/τ exp Um( gm,g m(t))/τ +exp Um(gm(t),g m(t))/τ Pr(g m(t +1) = g m(t)) = 1 Pr(g m(t +1) = g m) (6) where τ is a small positive constant, a.k.a., the smoothing factor of the algorithm. It is known that as τ 0, B-logit converges to the best Nash equilibrium with arbitrarily high probability. 11 / 19

37 , 1. Motivation 2. Gateway Selection Game 3. Equilibrium Selection Learning 4. Evaluation 5. Conclusions Proof (sketch) x1, y x 1 1, y2 x1, y3 x2, y1 x3, y1 xc l, y1 xc l, y2 xc l, y3 x, y 1 c l x2, y2 x2, y3 x2, y c l xc l yc l Note Pr(s s ) 1 1 exp U(s )/τ M N m exp Um( gm,g m (t))/τ Um(gm(t),g +exp m (t))/τ Verify π(s exp F(s )/τ ) = s S exp F(s)/τ satisfies the detailed balance equation, i.e., π(s )Pr(s s ) = π(s )Pr(s s ) B-logit algorithm induces a reversible, irreducible, and aperiodic Markov chain and it is the unique steady state distribution. By taking τ 0, we have π(s ) 1, where s = argmin s S F(s) 12 / 19

38 Generalization of B-logit 13 / 19

39 Generalization of B-logit γ-logit algorithm family (Γ): γ-logit shares the same structure as B-logit except in (5), where the probability is calculated as Pr(g m(t +1) = g m) = exp Um( gm,g m(t))/τ γ(s,s ) (7) where s = {g m(t),g m(t)} and s = { g m,g m(t)} are two gateway selection profiles in S, and γ satisfies 1 Symmetry γ(s,s ) = γ(s,s ), s S,s S, 2 Feasibility ( ) γ(s,s ) max exp Um(s )/τ,exp Um(s )/τ. B-logit is a special case of γ-logit algorithm with γ ( s,s ) = γ ( s,s ) = exp Um(s )/τ +exp Um(s )/τ. 13 / 19

40 Theorem Every γ-logit algorithm in Γ is equilibrium selective, i.e., converging to the global minimizer of the potential function asymptotically. 14 / 19

41 Theorem Every γ-logit algorithm in Γ is equilibrium selective, i.e., converging to the global minimizer of the potential function asymptotically. Which is better? 14 / 19

42 Theorem Every γ-logit algorithm in Γ is equilibrium selective, i.e., converging to the global minimizer of the potential function asymptotically. Which is better? Each γ-logit algorithm induces a Markov chain with different transition probability matrix, where P i,j (γ) Pr ( s i s j) = 1 1 M N m exp U(sj )/τ γ(s i,s j ) 14 / 19

43 Theorem Every γ-logit algorithm in Γ is equilibrium selective, i.e., converging to the global minimizer of the potential function asymptotically. Which is better? Each γ-logit algorithm induces a Markov chain with different transition probability matrix, where P i,j (γ) Pr ( s i s j) = 1 1 M N m exp U(sj )/τ γ(s i,s j ) The mixing rate of a Markov chain is determined by the second largest eigenvalue modulus (SLEM), i.e., µ(p(γ)) = max ( λ 2 (P(γ)), λ S (P(γ)) ). The smaller µ(p(γ)) is, the faster. 14 / 19

44 MAX-logit: For every time slot t: Solution: MAX-logit Algorithm Randomly select one of the players, say m, to update its gateway selection while other domains remain unchanged. Denote the current gateway selection of domain m as g m(t). Domain m randomly selects a node in its domain as the gateway candidate. Denote the candidate gateway selection strategy by g m. Domain m updates as Pr(g m(t +1) = g m) = exp Um( gm,g m(t))/τ max(exp Um(s )/τ,exp Um(s )/τ ). 15 / 19

45 MAX-logit: For every time slot t: Solution: MAX-logit Algorithm Randomly select one of the players, say m, to update its gateway selection while other domains remain unchanged. Denote the current gateway selection of domain m as g m(t). Domain m randomly selects a node in its domain as the gateway candidate. Denote the candidate gateway selection strategy by g m. Domain m updates as Pr(g m(t +1) = g m) = exp Um( gm,g m(t))/τ max(exp Um(s )/τ,exp Um(s )/τ ). Denote µ MAX as the second largest eigenvalue modulus associated with MAX-logit algorithm. Theorem Denote µ(p(γ)) as the second largest eigenvalue modulus induced by an arbitrary γ-logit algorithm in Γ. We have µ MAX µ(p(γ)). 15 / 19

46 Evaluation setup M domains where each domain has N nodes For each domain, nodes are randomly deployed in a round area with radius 125m, centered at a random point within the square field of m 2 Link cost: 1 Euclidean distance: Network optimum solution is the best Nash (γ-logit algorithms converge to the network optimum solution) 2 Random cost: γ-logit algorithm converges to the approximate 1 + δ solution (Nash equilibrium) 3 Randomly select p% of the links in the network and add random cost offset which is uniformly distributed between 0 and 5% of the original cost Global link cost η = 500, M = 2,3,4 τ = / 19

47 Euclidean Distance Scenarios p% = 0% 2, 3, 4 domains where each domain has 20 nodes Global network cost MAX logit B logit OPT Iteration steps Global network cost MAX logit B logit OPT Iteration steps Global network cost MAX logit B logit OPT Iteration steps 17 / 19

48 Euclidean Distance Scenarios p% = 0% 2, 3, 4 domains where each domain has 20 nodes Global network cost MAX logit B logit OPT Iteration steps Global network cost MAX logit B logit OPT Iteration steps Nodes per domain 2 domains 3 domains 4 domains 5 nodes 16.06% 24.52% 33.85% 10 nodes 25.00% 29.81% 28.55% 20 nodes 11.96% 20.19% 20.36% 30 nodes 5.87% 16.46% 17.60% Global network cost MAX logit B logit OPT Iteration steps Average over 5000 sample runs Performance improvement declines when no. of nodes increases 17 / 19

49 Random Cost Scenarios p = 50, i.e., 50% of the links in the network are associated with random link cost 2, 3, 4 domains where each domain has 20 nodes Global network cost MAX logit 4000 B logit 3500 OPT Iteration steps Global network cost MAX logit BOUND B logit OPT Iteration steps Global network cost BOUND MAX logit 9000 B logit OPT Iteration steps 18 / 19

50 Random Cost Scenarios p = 50, i.e., 50% of the links in the network are associated with random link cost 2, 3, 4 domains where each domain has 20 nodes Global network cost MAX logit B logit OPT Iteration steps Global network cost BOUND MAX logit B logit OPT Iteration steps Nodes per domain 2 domains 3 domains 4 domains 5 nodes 21.84% 24.46% 27.38% 10 nodes 21.00% 21.44% 21.56% 20 nodes 9.54% 9.13% 5.47% 30 nodes 1.90% 1.93% 2.24% Global network cost BOUND MAX logit B logit 7000 OPT Iteration steps Table: Convergence rate improvement by MAX-logit when p = / 19

51 Conclusions Interactive gateway selection by multiple domains in coalition networks In a potential game framework, the existence and inefficiency of Nash equilibria are characterized (two domains, multi-domains) Equilibrium selective learning: generalized B-logit into γ-logit, or Γ Propose MAX-logit which converges to the best Nash equilibrium at the fastest speed in Γ Other applications of potential games in power control, channel allocation, spectrum sharing content distribution etc. 19 / 19

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

EDA ad hoc B program. CORASMA project COgnitive RAdio for dynamic Spectrum MAnagement Contract N B-781-IAP4-GC

EDA ad hoc B program. CORASMA project COgnitive RAdio for dynamic Spectrum MAnagement Contract N B-781-IAP4-GC EDA ad hoc B program CORASMA project COgnitive RAdio for dynamic Spectrum MAnagement Contract N B-781-IAP4-GC Learning algorithms for power and frequency allocation in clustered ad hoc networks Luca ROSE,

More information

4.6 Linear Programming duality

4.6 Linear Programming duality 4.6 Linear Programming duality To any minimization (maximization) LP we can associate a closely related maximization (minimization) LP. Different spaces and objective functions but in general same optimal

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

The Max-Distance Network Creation Game on General Host Graphs

The Max-Distance Network Creation Game on General Host Graphs The Max-Distance Network Creation Game on General Host Graphs 13 Luglio 2012 Introduction Network Creation Games are games that model the formation of large-scale networks governed by autonomous agents.

More information

On the Interaction and Competition among Internet Service Providers

On the Interaction and Competition among Internet Service Providers On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers

More information

Computational Game Theory and Clustering

Computational Game Theory and Clustering Computational Game Theory and Clustering Martin Hoefer mhoefer@mpi-inf.mpg.de 1 Computational Game Theory? 2 Complexity and Computation of Equilibrium 3 Bounding Inefficiencies 4 Conclusion Computational

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Adaptive Search with Stochastic Acceptance Probabilities for Global Optimization

Adaptive Search with Stochastic Acceptance Probabilities for Global Optimization Adaptive Search with Stochastic Acceptance Probabilities for Global Optimization Archis Ghate a and Robert L. Smith b a Industrial Engineering, University of Washington, Box 352650, Seattle, Washington,

More information

Multi-radio Channel Allocation in Multi-hop Wireless Networks

Multi-radio Channel Allocation in Multi-hop Wireless Networks 1 Multi-radio Channel Allocation in Multi-hop Wireless Networks Lin Gao, Student Member, IEEE, Xinbing Wang, Member, IEEE, and Youyun Xu, Member, IEEE, Abstract Channel allocation was extensively investigated

More information

A New Nature-inspired Algorithm for Load Balancing

A New Nature-inspired Algorithm for Load Balancing A New Nature-inspired Algorithm for Load Balancing Xiang Feng East China University of Science and Technology Shanghai, China 200237 Email: xfeng{@ecusteducn, @cshkuhk} Francis CM Lau The University of

More information

The Random Waypoint Mobility Model with Uniform Node Spatial Distribution

The Random Waypoint Mobility Model with Uniform Node Spatial Distribution Noname manuscript No. (will be inserted by the editor) The Random Waypoint Mobility Model with Uniform Node Spatial Distribution Dieter Mitsche Giovanni Resta Paolo Santi Abstract In this paper, we tackle

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity

Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Load Balancing Routing Algorithm among Multiple Gateways in MANET with Internet Connectivity Yonghang Yan*, Linlin Ci*, Ruiping Zhang**, Zhiming Wang* *School of Computer Science, Beiing Institute of Technology,

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Game Theory: Supermodular Games 1

Game Theory: Supermodular Games 1 Game Theory: Supermodular Games 1 Christoph Schottmüller 1 License: CC Attribution ShareAlike 4.0 1 / 22 Outline 1 Introduction 2 Model 3 Revision questions and exercises 2 / 22 Motivation I several solution

More information

Network Formation and Routing by Strategic Agents using Local Contracts

Network Formation and Routing by Strategic Agents using Local Contracts Network Formation and Routing by Strategic Agents using Local Contracts Elliot Anshelevich 1 and Gordon Wilfong 2 1 Department of Computer Science, Rensselaer Polytechnic Institute, Troy, NY. 2 Bell Labs,

More information

Price of Anarchy in Non-Cooperative Load Balancing

Price of Anarchy in Non-Cooperative Load Balancing Price of Anarchy in Non-Cooperative Load Balancing U Ayesta 1,3, O Brun 2, BJ Prabhu 2 1 BCAM, Basque Center for Applied Mathematics, 48160 Derio, Spain 2 CNRS ; LAAS ; 7 avenue du colonel Roche, 31077

More information

EQ-BGP: an efficient inter-domain QoS routing protocol

EQ-BGP: an efficient inter-domain QoS routing protocol EQ-BGP: an efficient inter-domain QoS routing protocol Andrzej Beben Institute of Telecommunications Warsaw University of Technology Nowowiejska 15/19, 00-665 Warsaw, Poland abeben@tele.pw.edu.pl Abstract

More information

Adaptive Online Gradient Descent

Adaptive Online Gradient Descent Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650

More information

FOR decades, it has been the responsibility of the network

FOR decades, it has been the responsibility of the network IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 4, AUGUST 2006 725 On Selfish Routing in Internet-Like Environments Lili Qiu, Yang Richard Yang, Yin Zhang, and Scott Shenker Abstract A recent trend in

More information

Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

LECTURE 4. Last time: Lecture outline

LECTURE 4. Last time: Lecture outline LECTURE 4 Last time: Types of convergence Weak Law of Large Numbers Strong Law of Large Numbers Asymptotic Equipartition Property Lecture outline Stochastic processes Markov chains Entropy rate Random

More information

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA ssharma5@ncsu.edu Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction

More information

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks

A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks A Hierarchical Structure based Coverage Repair in Wireless Sensor Networks Jie Wu Computer Science & Engineering Department Florida Atlantic University Boca Raton, FL 3343, USA E-mail: jie@cse.fau.edu

More information

Characterization and Modeling of Packet Loss of a VoIP Communication

Characterization and Modeling of Packet Loss of a VoIP Communication Characterization and Modeling of Packet Loss of a VoIP Communication L. Estrada, D. Torres, H. Toral Abstract In this work, a characterization and modeling of packet loss of a Voice over Internet Protocol

More information

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing Dynamic Routing Protocols II OSPF Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. 1 Distance Vector vs. Link State Routing With distance

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling

Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling Change Management in Enterprise IT Systems: Process Modeling and Capacity-optimal Scheduling Praveen K. Muthusamy, Koushik Kar, Sambit Sahu, Prashant Pradhan and Saswati Sarkar Rensselaer Polytechnic Institute

More information

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network Middle-East Journal of Scientific Research 15 (9): 1290-1294, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.15.9.11514 Fast and Secure Data Transmission by Using Hybrid Protocols

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

Designing a Predictable Internet Backbone with Valiant Load-Balancing

Designing a Predictable Internet Backbone with Valiant Load-Balancing Designing a Predictable Internet Backbone with Valiant Load-Balancing ui Zhang-Shen and ick McKeown Computer Systems Laboratory, Stanford University, Stanford, CA 94305-9030, USA {rzhang, nickm}@stanford.edu

More information

Virtual Landmarks for the Internet

Virtual Landmarks for the Internet Virtual Landmarks for the Internet Liying Tang Mark Crovella Boston University Computer Science Internet Distance Matters! Useful for configuring Content delivery networks Peer to peer applications Multiuser

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

Energy Optimal Routing Protocol for a Wireless Data Network

Energy Optimal Routing Protocol for a Wireless Data Network Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.

More information

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering

More information

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK http:// PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK Anjali Sahni 1, Ajay Kumar Yadav 2 1, 2 Department of Electronics and Communication Engineering, Mewar Institute,

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Network Traffic Modelling

Network Traffic Modelling University of York Dissertation submitted for the MSc in Mathematics with Modern Applications, Department of Mathematics, University of York, UK. August 009 Network Traffic Modelling Author: David Slade

More information

An Optimization Approach for Cooperative Communication in Ad Hoc Networks

An Optimization Approach for Cooperative Communication in Ad Hoc Networks An Optimization Approach for Cooperative Communication in Ad Hoc Networks Carlos A.S. Oliveira and Panos M. Pardalos University of Florida Abstract. Mobile ad hoc networks (MANETs) are a useful organizational

More information

Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks

Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks Seyit Ahmet Çamtepe Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 Email: camtes@cs.rpi.edu

More information

Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani

Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement Xiaoqiao Meng, Vasileios Pappas, Li Zhang IBM T.J. Watson Research Center Presented by: Payman Khani Overview:

More information

Cooperative Virtual Machine Management for Multi-Organization Cloud Computing Environment

Cooperative Virtual Machine Management for Multi-Organization Cloud Computing Environment Cooperative Virtual Machine Management for Multi-Organization Cloud Computing Environment Dusit Niyato, Zhu Kun, and Ping Wang School of Computer Engineering, Nanyang Technological University (NTU), Singapore

More information

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Routing and Peering in a Competitive Internet

Routing and Peering in a Competitive Internet Routing and Peering in a Competitive Internet Ramesh Johari Stanford University rjohari@stanford.edu John N. Tsitsiklis MIT jnt@mit.edu Abstract Today s Internet is a loose federation of independent network

More information

10 Evolutionarily Stable Strategies

10 Evolutionarily Stable Strategies 10 Evolutionarily Stable Strategies There is but a step between the sublime and the ridiculous. Leo Tolstoy In 1973 the biologist John Maynard Smith and the mathematician G. R. Price wrote an article in

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Security Scheme for Distributed DoS in Mobile Ad Hoc Networks Sugata Sanyal 1, Ajith Abraham 2, Dhaval Gada 3, Rajat Gogri 3, Punit Rathod 3, Zalak Dedhia 3 and Nirali Mody 3 1 School of Technology and

More information

Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks

Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks Diego Bohman, Matthias Frank, Peter Martini, Christoph Scholz Institute of Computer Science IV, University of Bonn, Römerstraße

More information

THIRD-GENERATION (3G) wide-area wireless networks

THIRD-GENERATION (3G) wide-area wireless networks 1020 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006 Market Sharing Games Applied to Content Distribution in Ad Hoc Networks Michel X. Goemans, Li (Erran) Li, Vahab S. Mirrokni,

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

Security in Ad Hoc Network

Security in Ad Hoc Network Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

Optimal Resource Allocation for Disaster Recovery

Optimal Resource Allocation for Disaster Recovery This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 00 proceedings. Optimal Resource Allocation for Disaster

More information

On Selfish Routing in Internet-Like Environments

On Selfish Routing in Internet-Like Environments 1 On Selfish Routing in Internet-Like Environments Lili Qiu Yang Richard Yang Yin Zhang Scott Shenker UT Austin Yale University UT Austin UC Berkeley lili@cs.utexas.edu yry@cs.yale.edu yzhang@cs.utexas.edu

More information

Sensors & Transducers 2015 by IFSA Publishing, S. L. http://www.sensorsportal.com

Sensors & Transducers 2015 by IFSA Publishing, S. L. http://www.sensorsportal.com Sensors & Transducers 2015 by IFSA Publishing, S. L. http://www.sensorsportal.com A Dynamic Deployment Policy of Slave Controllers for Software Defined Network Yongqiang Yang and Gang Xu College of Computer

More information

Numerical Analysis Lecture Notes

Numerical Analysis Lecture Notes Numerical Analysis Lecture Notes Peter J. Olver 5. Inner Products and Norms The norm of a vector is a measure of its size. Besides the familiar Euclidean norm based on the dot product, there are a number

More information

A Real-time Group Auction System for Efficient Allocation of Cloud Internet Applications

A Real-time Group Auction System for Efficient Allocation of Cloud Internet Applications IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. XX, NO. XX 1 A Real-time Group Auction System for Efficient Allocation of Cloud Internet Applications Chonho Lee, Ping Wang, Dusit Niyato Abstract Increasing

More information

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007 Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007 James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

Eliminating the Communication Black Spots in Future Disaster Recovery Networks

Eliminating the Communication Black Spots in Future Disaster Recovery Networks Eliminating the Communication Black Spots in Future Disaster Recovery Networks Eliane Bodanese 1, Liljana Gavrilovska 2, Veselin Rakocevic 3, Robert Stewart 4 1 Electronic Engineering Department, Queen

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

Existence of pure Nash equilibria (NE): Complexity of computing pure NE: Approximating the social optimum: Empirical results:

Existence of pure Nash equilibria (NE): Complexity of computing pure NE: Approximating the social optimum: Empirical results: Existence Theorems and Approximation Algorithms for Generalized Network Security Games V.S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun, Ravi Sundaram, College of Computer & Information Science, Northeastern

More information

Manipulability of the Price Mechanism for Data Centers

Manipulability of the Price Mechanism for Data Centers Manipulability of the Price Mechanism for Data Centers Greg Bodwin 1, Eric Friedman 2,3,4, and Scott Shenker 3,4 1 Department of Computer Science, Tufts University, Medford, Massachusetts 02155 2 School

More information

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage Lecture 8: Routing I Distance-vector Algorithms CSE 3: Computer Networks Stefan Savage This class New topic: routing How do I get there from here? Overview Routing overview Intra vs. Inter-domain routing

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008 63 1063-6692/$25.00 2008 IEEE

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008 63 1063-6692/$25.00 2008 IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008 63 Efficient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case Thrasyvoulos Spyropoulos, Student Member, IEEE,

More information

A Sublinear Bipartiteness Tester for Bounded Degree Graphs

A Sublinear Bipartiteness Tester for Bounded Degree Graphs A Sublinear Bipartiteness Tester for Bounded Degree Graphs Oded Goldreich Dana Ron February 5, 1998 Abstract We present a sublinear-time algorithm for testing whether a bounded degree graph is bipartite

More information

CPC/CPA Hybrid Bidding in a Second Price Auction

CPC/CPA Hybrid Bidding in a Second Price Auction CPC/CPA Hybrid Bidding in a Second Price Auction Benjamin Edelman Hoan Soo Lee Working Paper 09-074 Copyright 2008 by Benjamin Edelman and Hoan Soo Lee Working papers are in draft form. This working paper

More information

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights

More information

Minimum Cost Wireless Broadband Overlay Network Planning

Minimum Cost Wireless Broadband Overlay Network Planning Minimum Cost Wireless Broadband Overlay Network Planning Peng Lin, Hung Ngo, ChunMing Qiao Department of Computer Science and Engineering State University of New York at Buffalo Buffalo, NY 0 Email: {penglin,hungngo,qiao}@cse.buffalo.edu

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

An Asymptotically Minimal Node-degree Topology for Load-Balanced Architectures

An Asymptotically Minimal Node-degree Topology for Load-Balanced Architectures An Asymptotically Minimal ode-degree Topology for Load-Balanced Architectures Zhenhua Liu, Xiaoping Zhang, Youjian Zhao, Hongtao Guan Department of Computer Science and Technology, Tsinghua University

More information

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Enterprise VoIP Services over Mobile Ad-Hoc Technologies Enterprise VoIP Services over Mobile Ad-Hoc Technologies 1 System Architecture Figure 1 illustrates the system architecture. We can divide it into 2 parts. One is the Mobile VoIP Box (MVB) node and the

More information

Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks

Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks Vamseedhar R. Reddyvari Electrical Engineering Indian Institute of Technology Kanpur Email: vamsee@iitk.ac.in

More information

On the effect of forwarding table size on SDN network utilization

On the effect of forwarding table size on SDN network utilization IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz

More information

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing Routing Protocols scale: with 200 million destinations: can t store all dest s in routing tables! routing table exchange would swamp links! Hierarchical Routing Our routing study thus far - idealization

More information

Cooperative Multiple Access for Wireless Networks: Protocols Design and Stability Analysis

Cooperative Multiple Access for Wireless Networks: Protocols Design and Stability Analysis Cooperative Multiple Access for Wireless Networks: Protocols Design and Stability Analysis Ahmed K. Sadek, K. J. Ray Liu, and Anthony Ephremides Department of Electrical and Computer Engineering, and Institute

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

A Game Theoretical Approach to Gateway Selections in Multi-domain Wireless Networks

A Game Theoretical Approach to Gateway Selections in Multi-domain Wireless Networks 1 A Game Theoretial Approah to Gateway Seletions in Multi-domain Wireless Networks Yang Song, Starsky H.Y. Wong and Kang-Won Lee IBM Researh, Hawthorne, NY Email: {yangsong, hwong, kangwon}@us.ibm.om Abstrat

More information

Validating the System Behavior of Large-Scale Networked Computers

Validating the System Behavior of Large-Scale Networked Computers Validating the System Behavior of Large-Scale Networked Computers Chen-Nee Chuah Robust & Ubiquitous Networking (RUBINET) Lab http://www.ece.ucdavis.edu/rubinet Electrical & Computer Engineering University

More information

Mobile Network Analysis - Hole Healing

Mobile Network Analysis - Hole Healing , pp.143-150 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.15 Decentralized Mobile Sensor Navigation for Hole Healing Policy in Wireless Hybrid Sensor Networks Fu-Tian Lin 1, 2, Chu-Sing Yang 1, Tien-Wen

More information

Graph Theoretic Models and Tools for the Analysis of Dynamic Wireless Multihop Networks

Graph Theoretic Models and Tools for the Analysis of Dynamic Wireless Multihop Networks Graph Theoretic Models and Tools for the Analysis of Dynamic Wireless Multihop Networks Guoqiang Mao School of Electrical and Information Engineering The University of Sydney National ICT Australia Limited[1],

More information

Compact Representations and Approximations for Compuation in Games

Compact Representations and Approximations for Compuation in Games Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways

A Dynamically Configurable Topology Control for Hybrid Ad Hoc Networks with Internet Gateways ynamically onfigurable Topology ontrol for Hybrid d Hoc Networks with Internet ateways eun-hee ho and Young-ae Ko raduate School of Information & ommunication, jou University, Republic of Korea {khzho,

More information

LOGICAL TOPOLOGY DESIGN Practical tools to configure networks

LOGICAL TOPOLOGY DESIGN Practical tools to configure networks LOGICAL TOPOLOGY DESIGN Practical tools to configure networks Guido. A. Gavilanes February, 2010 1 Introduction to LTD " Design a topology for specific requirements " A service provider must optimize its

More information

1 Nonzero sum games and Nash equilibria

1 Nonzero sum games and Nash equilibria princeton univ. F 14 cos 521: Advanced Algorithm Design Lecture 19: Equilibria and algorithms Lecturer: Sanjeev Arora Scribe: Economic and game-theoretic reasoning specifically, how agents respond to economic

More information

Medial Axis Construction and Applications in 3D Wireless Sensor Networks

Medial Axis Construction and Applications in 3D Wireless Sensor Networks Medial Axis Construction and Applications in 3D Wireless Sensor Networks Su Xia, Ning Ding, Miao Jin, Hongyi Wu, and Yang Yang Presenter: Hongyi Wu University of Louisiana at Lafayette Outline Introduction

More information

Distributed Selfish Load Balancing on Networks

Distributed Selfish Load Balancing on Networks Distributed Selfish Load Balancing on Networks Petra Berenbrink Martin Hoefer Thomas Sauerwald Abstract We study distributed load balancing in networks with selfish agents In the simplest model considered

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

Discrete Strategies in Keyword Auctions and their Inefficiency for Locally Aware Bidders

Discrete Strategies in Keyword Auctions and their Inefficiency for Locally Aware Bidders Discrete Strategies in Keyword Auctions and their Inefficiency for Locally Aware Bidders Evangelos Markakis Orestis Telelis Abstract We study formally two simple discrete bidding strategies in the context

More information

Mediated Equilibria in Load-Balancing Games

Mediated Equilibria in Load-Balancing Games Mediated Equilibria in Load-Balancing Games Joshua R. Davis, David Liben-Nowell, Alexa Sharp, and Tom Wexler Carleton College; Northfield, MN Oberlin College; Oberlin, OH joshuadavis@q.com, dlibenno@carleton.edu,

More information

A Game-Theoretic Model and Algorithm for Load Balancing in Distributed Systems

A Game-Theoretic Model and Algorithm for Load Balancing in Distributed Systems In Proc of the 6th IEEE International Parallel and Distributed Processing Symposium (IPDPS 2002, Workshop on Advances in Parallel and Distributed Computational Models (APDCM 02, April 5, 2002, Fort Lauderdale,

More information

Inter-domain Routing. Outline. Border Gateway Protocol

Inter-domain Routing. Outline. Border Gateway Protocol Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small

More information

MetroNet6 - Homeland Security IPv6 R&D over Wireless

MetroNet6 - Homeland Security IPv6 R&D over Wireless MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

DECENTRALIZED LOAD BALANCING IN HETEROGENEOUS SYSTEMS USING DIFFUSION APPROACH

DECENTRALIZED LOAD BALANCING IN HETEROGENEOUS SYSTEMS USING DIFFUSION APPROACH DECENTRALIZED LOAD BALANCING IN HETEROGENEOUS SYSTEMS USING DIFFUSION APPROACH P.Neelakantan Department of Computer Science & Engineering, SVCET, Chittoor pneelakantan@rediffmail.com ABSTRACT The grid

More information