Broadcasting in Wireless Networks

Size: px
Start display at page:

Download "Broadcasting in Wireless Networks"

Transcription

1 Université du Québec en Outaouais, Canada 1/46

2 Outline Intro Known Ad hoc GRN 1 Introduction 2 Networks with known topology 3 Ad hoc networks 4 Geometric radio networks 2/46

3 Outline Intro Known Ad hoc GRN 1 Introduction 2 Networks with known topology 3 Ad hoc networks 4 Geometric radio networks 3/46

4 Radio network A radio network is modeled as a graph whose nodes are stations or sensors that can transmit and receive. A directed edge (uv) means that v can be reached by the transmitter of u. Nodes send messages in synchronous rounds. In every round every node acts either as a transmitter or as a receiver. A transmitter sends a message to all its out-neighbors. 4/46

5 Radio network A node gets a message in a given round, if and only if, it acts as a receiver and exactly one of its in-neighbors transmits in this round. If at least two in-neighbors of a receiving node u transmit simultaneously in a given round, none of the messages is received by u in this round. In this case it is said that a collision occurred at u. 5/46

6 Collision detection If nodes can distinguish collision from silence, we say that collision detection is available. 6/46

7 Geometric radio network The set of nodes (sensors, stations) is modeled as points in the plane. Every node u has a range r u depending on the power of its transmitter, and it can reach all nodes at distance at most r u from it. The collection of nodes equipped with ranges determines a directed graph on the set of nodes, called a geometric radio network (GRN), in which a directed edge (uv) exists if node v can be reached from u. If the power of all transmitters is the same then all ranges are equal and the corresponding GRN is symmetric. 7/46

8 Geometric radio network The set of nodes (sensors, stations) is modeled as points in the plane. Every node u has a range r u depending on the power of its transmitter, and it can reach all nodes at distance at most r u from it. The collection of nodes equipped with ranges determines a directed graph on the set of nodes, called a geometric radio network (GRN), in which a directed edge (uv) exists if node v can be reached from u. If the power of all transmitters is the same then all ranges are equal and the corresponding GRN is symmetric. 7/46

9 Geometric radio network The set of nodes (sensors, stations) is modeled as points in the plane. Every node u has a range r u depending on the power of its transmitter, and it can reach all nodes at distance at most r u from it. The collection of nodes equipped with ranges determines a directed graph on the set of nodes, called a geometric radio network (GRN), in which a directed edge (uv) exists if node v can be reached from u. If the power of all transmitters is the same then all ranges are equal and the corresponding GRN is symmetric. 7/46

10 Geometric radio network The set of nodes (sensors, stations) is modeled as points in the plane. Every node u has a range r u depending on the power of its transmitter, and it can reach all nodes at distance at most r u from it. The collection of nodes equipped with ranges determines a directed graph on the set of nodes, called a geometric radio network (GRN), in which a directed edge (uv) exists if node v can be reached from u. If the power of all transmitters is the same then all ranges are equal and the corresponding GRN is symmetric. 7/46

11 Applications The radio network model is applicable to wireless networks using a single frequency. The model of geometric radio networks is applicable to wireless networks where stations are located in a flat region without large obstacles. In such a terrain, the signal of a transmitter reaches receivers at the same distance in all directions, i.e., the set of potential receivers of a transmitter is a disc. 8/46

12 Applications The radio network model is applicable to wireless networks using a single frequency. The model of geometric radio networks is applicable to wireless networks where stations are located in a flat region without large obstacles. In such a terrain, the signal of a transmitter reaches receivers at the same distance in all directions, i.e., the set of potential receivers of a transmitter is a disc. 8/46

13 Applications The radio network model is applicable to wireless networks using a single frequency. The model of geometric radio networks is applicable to wireless networks where stations are located in a flat region without large obstacles. In such a terrain, the signal of a transmitter reaches receivers at the same distance in all directions, i.e., the set of potential receivers of a transmitter is a disc. 8/46

14 Broadcasting Broadcasting is one of the fundamental tasks in network communication. Broadcasting One node of the network, called the source, has to transmit a message to all other nodes. Remote nodes are informed via intermediate nodes, along directed paths in the network. In this talk we restrict attention to deterministic broadcasting algorithms. 9/46

15 Performance measure One of the basic performance measures of a broadcasting scheme is the total time, i.e., the number of rounds it uses to perform the task. Parameters: n number of nodes, D eccentricity of the source. 10/46

16 Outline Intro Known Ad hoc GRN 1 Introduction 2 Networks with known topology 3 Ad hoc networks 4 Geometric radio networks 11/46

17 Centralized broadcasting Broadcasting in networks whose nodes have complete knowledge of the topology is equivalent to centralized broadcasting in which all transmissions are scheduled in advance by a central monitor. 12/46

18 Time of centralized broadcasting Two problems: Existence of short randomized schemes Given a graph G with a source s, prove the existence of a randomized broadcasting scheme with short expected time. Efficient construction of short deterministic schemes Construct a polynomial deterministic algorithm that, given a graph G with a source s, outputs a short deterministic broadcasting scheme for this graph. 13/46

19 Time of centralized broadcasting Chlamtac, Weinstein (IEEE Trans, Commun. 1991): polynomially constructible deterministic O(D log 2 (n/d)) scheme Gaber, Mansour (SODA 1995): randomized scheme with expected time O(D + log 5 n) polynomially constructible deterministic O(D + log 6 n) scheme Elkin, Kortsarz (SODA 2005): randomized scheme with expected time O(D + log 4 n) polynomially constructible deterministic O(D + log 5 n) scheme 14/46

20 Time of centralized broadcasting Chlamtac, Weinstein (IEEE Trans, Commun. 1991): polynomially constructible deterministic O(D log 2 (n/d)) scheme Gaber, Mansour (SODA 1995): randomized scheme with expected time O(D + log 5 n) polynomially constructible deterministic O(D + log 6 n) scheme Elkin, Kortsarz (SODA 2005): randomized scheme with expected time O(D + log 4 n) polynomially constructible deterministic O(D + log 5 n) scheme 14/46

21 Time of centralized broadcasting Chlamtac, Weinstein (IEEE Trans, Commun. 1991): polynomially constructible deterministic O(D log 2 (n/d)) scheme Gaber, Mansour (SODA 1995): randomized scheme with expected time O(D + log 5 n) polynomially constructible deterministic O(D + log 6 n) scheme Elkin, Kortsarz (SODA 2005): randomized scheme with expected time O(D + log 4 n) polynomially constructible deterministic O(D + log 5 n) scheme 14/46

22 Time of centralized broadcasting continued Gasieniec, Peleg, Xin (PODC 2005): randomized scheme with expected time O(D + log 2 n) polynomially constructible deterministic O(D + log 3 n) scheme Kowalski, Pelc (Distr. Comp. 2007) polynomially constructible deterministic O(D + log 2 n) scheme optimal in view of the lower bound Ω(log 2 n) by Alon, Bar-Noy, Linial, Peleg (JCSS 1991). 15/46

23 Time of centralized broadcasting continued Gasieniec, Peleg, Xin (PODC 2005): randomized scheme with expected time O(D + log 2 n) polynomially constructible deterministic O(D + log 3 n) scheme Kowalski, Pelc (Distr. Comp. 2007) polynomially constructible deterministic O(D + log 2 n) scheme optimal in view of the lower bound Ω(log 2 n) by Alon, Bar-Noy, Linial, Peleg (JCSS 1991). 15/46

24 Outline Intro Known Ad hoc GRN 1 Introduction 2 Networks with known topology 3 Ad hoc networks 4 Geometric radio networks 16/46

25 Symmetric networks with known neighborhood Assumptions: Every node knows its own label and labels of all neighbors The network is symmetric No collision detection [Bar-Yehuda, Goldreich, Itai: JCSS 1992] claimed a linear lower bound in this model for deterministic broadcasting in networks of constant diameter. This claim is incorrect. 17/46

26 Symmetric networks with known neighborhood Assumptions: Every node knows its own label and labels of all neighbors The network is symmetric No collision detection [Bar-Yehuda, Goldreich, Itai: JCSS 1992] claimed a linear lower bound in this model for deterministic broadcasting in networks of constant diameter. This claim is incorrect. 17/46

27 Symmetric networks with known neighborhood [Kowalski, Pelc: FOCS 2002] Theorem. There exists a deterministic broadcasting algorithm working in sublinear time in all symmetric networks of diameter o(log log n). However, Theorem. Every deterministic broadcasting algorithm requires time Ω( 4 n) on some n-node network of diameter 4. 18/46

28 Symmetric networks with known neighborhood [Kowalski, Pelc: FOCS 2002] Theorem. There exists a deterministic broadcasting algorithm working in sublinear time in all symmetric networks of diameter o(log log n). However, Theorem. Every deterministic broadcasting algorithm requires time Ω( 4 n) on some n-node network of diameter 4. 18/46

29 Symmetric networks with known neighborhood This lower bound has been strengthened by Brito, Gafni, Vaya: STACS 2004 Theorem. Every deterministic broadcasting algorithm requires time Ω( n) on some n-node network of diameter 4. 19/46

30 Symmetric ad hoc networks Assumptions: Every node knows only its own label The network is symmetric No collision detection 20/46

31 Symmetric ad hoc networks Here we have tight bounds on deterministic broadcasting time. [Chlebus, Gasieniec, Gibbons, Pelc, Rytter: SODA 2000] Theorem. There exists a deterministic broadcasting algorithm working in time O(n) in all symmetric n-node networks. [Kowalski, Pelc: SIROCCO 2003] Theorem. Every deterministic broadcasting algorithm requires time Ω(n) on some n-node network of constant diameter. 21/46

32 Arbitrary ad hoc networks Assumptions: Every node knows only its own label The network is arbitrary No collision detection Notation: n number of nodes, D eccentricity of the source 22/46

33 Deterministic broadcasting in arbitrary ad hoc networks folklore: O(n 2 ) Chlebus, Gasieniec, Gibbons, Pelc, Rytter (SODA 2000): O(n 11/6 ) De Marco, Pelc (IPL 2001): O(n 5/3 log 1/3 n) Chlebus, Gasieniec, Ostlin, Robson (ICALP 2000): O(n 3/2 ) Chrobak, Gasieniec, Rytter (FOCS 2000): O(n log 2 n) Kowalski, Pelc (STACS 2003): O(n log n log D) Czumaj, Rytter (FOCS 2003): O(n log 2 D) De Marco (SODA 2008): O(n log n log log n) 23/46

34 Deterministic broadcasting in arbitrary ad hoc networks folklore: O(n 2 ) Chlebus, Gasieniec, Gibbons, Pelc, Rytter (SODA 2000): O(n 11/6 ) De Marco, Pelc (IPL 2001): O(n 5/3 log 1/3 n) Chlebus, Gasieniec, Ostlin, Robson (ICALP 2000): O(n 3/2 ) Chrobak, Gasieniec, Rytter (FOCS 2000): O(n log 2 n) Kowalski, Pelc (STACS 2003): O(n log n log D) Czumaj, Rytter (FOCS 2003): O(n log 2 D) De Marco (SODA 2008): O(n log n log log n) 23/46

35 Deterministic broadcasting in arbitrary ad hoc networks folklore: O(n 2 ) Chlebus, Gasieniec, Gibbons, Pelc, Rytter (SODA 2000): O(n 11/6 ) De Marco, Pelc (IPL 2001): O(n 5/3 log 1/3 n) Chlebus, Gasieniec, Ostlin, Robson (ICALP 2000): O(n 3/2 ) Chrobak, Gasieniec, Rytter (FOCS 2000): O(n log 2 n) Kowalski, Pelc (STACS 2003): O(n log n log D) Czumaj, Rytter (FOCS 2003): O(n log 2 D) De Marco (SODA 2008): O(n log n log log n) 23/46

36 Deterministic broadcasting in arbitrary ad hoc networks folklore: O(n 2 ) Chlebus, Gasieniec, Gibbons, Pelc, Rytter (SODA 2000): O(n 11/6 ) De Marco, Pelc (IPL 2001): O(n 5/3 log 1/3 n) Chlebus, Gasieniec, Ostlin, Robson (ICALP 2000): O(n 3/2 ) Chrobak, Gasieniec, Rytter (FOCS 2000): O(n log 2 n) Kowalski, Pelc (STACS 2003): O(n log n log D) Czumaj, Rytter (FOCS 2003): O(n log 2 D) De Marco (SODA 2008): O(n log n log log n) 23/46

37 Deterministic broadcasting in arbitrary ad hoc networks folklore: O(n 2 ) Chlebus, Gasieniec, Gibbons, Pelc, Rytter (SODA 2000): O(n 11/6 ) De Marco, Pelc (IPL 2001): O(n 5/3 log 1/3 n) Chlebus, Gasieniec, Ostlin, Robson (ICALP 2000): O(n 3/2 ) Chrobak, Gasieniec, Rytter (FOCS 2000): O(n log 2 n) Kowalski, Pelc (STACS 2003): O(n log n log D) Czumaj, Rytter (FOCS 2003): O(n log 2 D) De Marco (SODA 2008): O(n log n log log n) 23/46

38 Deterministic broadcasting in arbitrary ad hoc networks folklore: O(n 2 ) Chlebus, Gasieniec, Gibbons, Pelc, Rytter (SODA 2000): O(n 11/6 ) De Marco, Pelc (IPL 2001): O(n 5/3 log 1/3 n) Chlebus, Gasieniec, Ostlin, Robson (ICALP 2000): O(n 3/2 ) Chrobak, Gasieniec, Rytter (FOCS 2000): O(n log 2 n) Kowalski, Pelc (STACS 2003): O(n log n log D) Czumaj, Rytter (FOCS 2003): O(n log 2 D) De Marco (SODA 2008): O(n log n log log n) 23/46

39 Deterministic broadcasting in arbitrary ad hoc networks folklore: O(n 2 ) Chlebus, Gasieniec, Gibbons, Pelc, Rytter (SODA 2000): O(n 11/6 ) De Marco, Pelc (IPL 2001): O(n 5/3 log 1/3 n) Chlebus, Gasieniec, Ostlin, Robson (ICALP 2000): O(n 3/2 ) Chrobak, Gasieniec, Rytter (FOCS 2000): O(n log 2 n) Kowalski, Pelc (STACS 2003): O(n log n log D) Czumaj, Rytter (FOCS 2003): O(n log 2 D) De Marco (SODA 2008): O(n log n log log n) 23/46

40 Deterministic broadcasting in arbitrary ad hoc networks folklore: O(n 2 ) Chlebus, Gasieniec, Gibbons, Pelc, Rytter (SODA 2000): O(n 11/6 ) De Marco, Pelc (IPL 2001): O(n 5/3 log 1/3 n) Chlebus, Gasieniec, Ostlin, Robson (ICALP 2000): O(n 3/2 ) Chrobak, Gasieniec, Rytter (FOCS 2000): O(n log 2 n) Kowalski, Pelc (STACS 2003): O(n log n log D) Czumaj, Rytter (FOCS 2003): O(n log 2 D) De Marco (SODA 2008): O(n log n log log n) 23/46

41 Lower bounds Bruschi, Del Pinto (Distr. Comp. 1997): Ω(D log n) Clementi, Monti, Silvestri (SODA 2001): Ω(n log D) 24/46

42 Outline Intro Known Ad hoc GRN 1 Introduction 2 Networks with known topology 3 Ad hoc networks 4 Geometric radio networks 25/46

43 Knowledge radius For a fixed real s 0, called the knowledge radius, it is assumed that each node knows the part of the network within the circle of radius s centered at it, i.e., it knows the positions, labels and ranges of all nodes at distance at most s. Problem [Dessmark, Pelc: SPAA 2001] How the size of the knowledge radius influences deterministic broadcasting time in GRN? 26/46

44 Notation Intro Known Ad hoc GRN n - number of nodes D - eccentricity of the source, i.e., the maximum length of all shortest paths in the graph from the source to all other nodes. s - knowledge radius R - finite set of ranges labels of nodes are integers from the set 1,..., M, where M O(n) 27/46

45 Knowledge of nodes Every node knows the set of ranges the upper bound M on the labels positions, labels and ranges of all nodes within the knowledge radius no collision detection capability 28/46

46 Knowledge of nodes Every node knows the set of ranges the upper bound M on the labels positions, labels and ranges of all nodes within the knowledge radius no collision detection capability 28/46

47 Large knowledge radius Theorem. The minimum time to perform broadcasting in an arbitrary GRN with source eccentricity D and knowledge radius s > max(r) (or with global knowledge of the network) is Θ(D). This should be contrasted with broadcasting in non-geometric radio networks: there are networks with bounded D requiring time Ω(log 2 n) to broadcast, with full knowledge of the network. 29/46

48 Large knowledge radius Theorem. The minimum time to perform broadcasting in an arbitrary GRN with source eccentricity D and knowledge radius s > max(r) (or with global knowledge of the network) is Θ(D). This should be contrasted with broadcasting in non-geometric radio networks: there are networks with bounded D requiring time Ω(log 2 n) to broadcast, with full knowledge of the network. 29/46

49 Knowledge radius zero Theorem. It is possible to broadcast in arbitrary n-node GRN with knowledge radius zero in time O(n). The above upper bound for GRN should be contrasted with the lower bound [Bruschi, Del Pinto 1997] showing that some graphs require broadcasting time Ω(n log n). These graphs are not GRN. 30/46

50 Knowledge radius zero Theorem. It is possible to broadcast in arbitrary n-node GRN with knowledge radius zero in time O(n). The above upper bound for GRN should be contrasted with the lower bound [Bruschi, Del Pinto 1997] showing that some graphs require broadcasting time Ω(n log n). These graphs are not GRN. 30/46

51 Knowledge radius zero The reason for a longer broadcasting time is really not the topology of the graph but the difference in knowledge available to nodes. Theorem. If each node knows only its label and range but not its position then there exists a family of GRN requiring broadcasting time Ω(n log n). 31/46

52 Knowledge radius zero The reason for a longer broadcasting time is really not the topology of the graph but the difference in knowledge available to nodes. Theorem. If each node knows only its label and range but not its position then there exists a family of GRN requiring broadcasting time Ω(n log n). 31/46

53 The model with collision detection Here we have tight bounds for symmetric networks. Theorem. In the model with collision detection and knowledge radius zero it is possible to broadcast in any n-node symmetric GRN of diameter D in time O(D + log n). Theorem. For any broadcasting algorithm with collision detection and knowledge radius zero, there exist n-node symmetric GRN of diameter 2 for which this algorithm requires time Ω(log n). 32/46

54 The model with collision detection Here we have tight bounds for symmetric networks. Theorem. In the model with collision detection and knowledge radius zero it is possible to broadcast in any n-node symmetric GRN of diameter D in time O(D + log n). Theorem. For any broadcasting algorithm with collision detection and knowledge radius zero, there exist n-node symmetric GRN of diameter 2 for which this algorithm requires time Ω(log n). 32/46

55 The model without collision detection For the model without collision detection it is possible to maintain complexity O(D + log n) of broadcasting. However, we need a stronger assumption concerning knowledge radius: it is no longer 0, but positive, although arbitrarily small. Theorem. In the model without collision detection, it is possible to broadcast in any n-node symmetric GRN of diameter D in time O(D + log n), for any positive constant knowledge radius. 33/46

56 The model without collision detection For the model without collision detection it is possible to maintain complexity O(D + log n) of broadcasting. However, we need a stronger assumption concerning knowledge radius: it is no longer 0, but positive, although arbitrarily small. Theorem. In the model without collision detection, it is possible to broadcast in any n-node symmetric GRN of diameter D in time O(D + log n), for any positive constant knowledge radius. 33/46

57 Unit Disc Graphs (UDG) [Emek, Gasieniec, Kantor, Pelc, Peleg, Su: PODC 2007] All ranges equal 1 (UDG networks are symmetric) Nodes don t have labels but each node knows its own coordinates All nodes know the minimum Euclidean distance d between all nodes no collision detection 34/46

58 Parameters Intro Known Ad hoc GRN Broadcasting time depends on two parameters: diameter D (same order of magnitude as source eccentricity) the granularity g = 1/d of the network. 35/46

59 Two broadcasting models In the conditional wake up model, the nodes other than the source are initially idle and cannot transmit until they receive the source message for the first time (and subsequently wake up). In the spontaneous wake up model, all nodes are assumed to be awake when the source transmits for the first time, and may contribute to the broadcasting process by transmitting control messages even before they received the source message. 36/46

60 Two broadcasting models In the conditional wake up model, the nodes other than the source are initially idle and cannot transmit until they receive the source message for the first time (and subsequently wake up). In the spontaneous wake up model, all nodes are assumed to be awake when the source transmits for the first time, and may contribute to the broadcasting process by transmitting control messages even before they received the source message. 36/46

61 Results for the conditional wake up Theorem. There exists an algorithm that completes broadcast in time O(Dg) in any UDG radio network of diameter D and granularity g. Theorem. Any broadcasting algorithm for UDG radio networks in the conditional wake up model has running time Ω(D g) on some network of diameter D and granularity g. 37/46

62 Results for the conditional wake up Theorem. There exists an algorithm that completes broadcast in time O(Dg) in any UDG radio network of diameter D and granularity g. Theorem. Any broadcasting algorithm for UDG radio networks in the conditional wake up model has running time Ω(D g) on some network of diameter D and granularity g. 37/46

63 Results for the spontaneous wake up We show two broadcasting algorithms: one working in time O(D + g 2 ) and the other in time O(D log g). These algorithms are based on completely different ideas and, depending on parameter values, one or the other may be more efficient. The combined algorithm obtained by interleaving these two algorithms completes broadcast in time O (min {D + g 2, D log g}). This time turns out to be optimal. 38/46

64 Results for the spontaneous wake up We show two broadcasting algorithms: one working in time O(D + g 2 ) and the other in time O(D log g). These algorithms are based on completely different ideas and, depending on parameter values, one or the other may be more efficient. The combined algorithm obtained by interleaving these two algorithms completes broadcast in time O (min {D + g 2, D log g}). This time turns out to be optimal. 38/46

65 Results for the spontaneous wake up Theorem. Any broadcasting algorithm for UDG radio networks in the spontaneous wake up model has running time Ω (min {D + g 2, D log g}) on some network of diameter D and granularity g. 39/46

66 Separation of models Our results give a provable separation between the conditional and the spontaneous wake up models for broadcasting in UDG radio networks: for networks of small diameter (e.g., D bounded or polylogarithmic in g) the lower bound for the conditional wake up model is significantly larger than the upper bound for the spontaneous wake up model. 40/46

67 Separation of models Our results give a provable separation between the conditional and the spontaneous wake up models for broadcasting in UDG radio networks: for networks of small diameter (e.g., D bounded or polylogarithmic in g) the lower bound for the conditional wake up model is significantly larger than the upper bound for the spontaneous wake up model. 40/46

68 Closing the gap [Emek, Kantor, Peleg: PODC 2008] Theorem. Any broadcasting algorithm for UDG radio networks in the conditional wake up model has running time Ω(Dg) on some network of diameter D and granularity g. Hence the opimal broadcasting time in the conditional wake up model is Θ(Dg). 41/46

69 Missing and inaccurate information The assumptions that each node knows the density of the network knows exactly its own position in the plane. are unrealistic in many situations. Does removing them influence broadcasting time? 42/46

70 Missing and inaccurate information The assumptions that each node knows the density of the network knows exactly its own position in the plane. are unrealistic in many situations. Does removing them influence broadcasting time? 42/46

71 Missing and inaccurate information [Fusco, Pelc: DISC 2008] Assume that density is unknown and nodes perceive their position with some unknown error margin ɛ. This combination of missing and inaccurate information substantially changes the problem: the main new challenge becomes fast broadcasting in sparse networks (with constant density), when optimal time is O(D). Nevertheless, under our very weak scenario... 43/46

72 Missing and inaccurate information [Fusco, Pelc: DISC 2008] Assume that density is unknown and nodes perceive their position with some unknown error margin ɛ. This combination of missing and inaccurate information substantially changes the problem: the main new challenge becomes fast broadcasting in sparse networks (with constant density), when optimal time is O(D). Nevertheless, under our very weak scenario... 43/46

73 Missing and inaccurate information [Fusco, Pelc: DISC 2008] Assume that density is unknown and nodes perceive their position with some unknown error margin ɛ. This combination of missing and inaccurate information substantially changes the problem: the main new challenge becomes fast broadcasting in sparse networks (with constant density), when optimal time is O(D). Nevertheless, under our very weak scenario... 43/46

74 Missing and inaccurate information Theorem There exists a broadcasting algorithm that maintains optimal time O (min {D + g 2, D log g}) for all networks of unknown diameter D and granularity g (previously obtained with exact positions and known granularity), if each node perceives its position with error margin ɛ = αd, for any (unknown) constant α < 1, and the source knows that it is not the only 2 node in the network. 44/46

75 Missing and inaccurate information If the source does not have this information then the minimum time of an algorithm working correctly for all networks, and hence stopping if the source is alone, turns out to be Θ(D + g 2 ). Thus, somewhat surprisingly, the mere stopping requirement for the special case of the lonely source causes an exponential increase in broadcasting time, for networks of any density and any small diameter. Finally, if ɛ 1 d, then broadcasting is impossible. 2 45/46

76 Missing and inaccurate information If the source does not have this information then the minimum time of an algorithm working correctly for all networks, and hence stopping if the source is alone, turns out to be Θ(D + g 2 ). Thus, somewhat surprisingly, the mere stopping requirement for the special case of the lonely source causes an exponential increase in broadcasting time, for networks of any density and any small diameter. Finally, if ɛ 1 d, then broadcasting is impossible. 2 45/46

77 Missing and inaccurate information If the source does not have this information then the minimum time of an algorithm working correctly for all networks, and hence stopping if the source is alone, turns out to be Θ(D + g 2 ). Thus, somewhat surprisingly, the mere stopping requirement for the special case of the lonely source causes an exponential increase in broadcasting time, for networks of any density and any small diameter. Finally, if ɛ 1 d, then broadcasting is impossible. 2 45/46

78 Open problems 1 What is the optimal broadcasting and gossiping time in arbitrary ad hoc radio networks? 2 Is it possible to broadcast in time o(n) in arbitrary n-node GRN with eccentricity D sublinear in n, for knowledge radius zero? Note: in view of our results it is possible to broadcast in time O(n). 46/46

Faster Deterministic Gossiping in Directed Ad Hoc Radio Networks

Faster Deterministic Gossiping in Directed Ad Hoc Radio Networks Faster Deterministic Gossiping in Directed Ad Hoc Radio Networks Leszek Ga sieniec 1, Tomasz Radzik 2, and Qin Xin 1 1 Department of Computer Science, University of Liverpool, Liverpool L69 7ZF, UK {leszek,qinxin}@csc.liv.ac.uk

More information

Competitive Analysis of On line Randomized Call Control in Cellular Networks

Competitive Analysis of On line Randomized Call Control in Cellular Networks Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising

More information

Efficient Distributed Multiple-Message Broadcasting in Unstructured Wireless Networks

Efficient Distributed Multiple-Message Broadcasting in Unstructured Wireless Networks Efficient Distributed Multiple-Message Broadcasting in Unstructured Wireless Networks Dongxiao Yu, Qiang-Sheng Hua, Yuexuan Wang, Jiguo Yu and Francis C.M. Lau Department of Computer Science, The University

More information

A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs

A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs A Log-Star Distributed Maximal Independent Set Algorithm for Growth-Bounded Graphs Johannes Schneider, Roger Wattenhofer {jschneid, wattenhofer}@tik.ee.ethz.ch Computer Engineering and Networks Laboratory

More information

Maximal Independent Sets in Multichannel Radio Networks

Maximal Independent Sets in Multichannel Radio Networks Maximal Independent Sets in Multichannel Radio Networks Sebastian Daum Dept. of Comp. Science U. of Freiburg, Germany Freiburg, Germany sdaum@cs.uni-freiburg.de Fabian Kuhn Dept. of Comp. Science U. of

More information

Deterministic Neighbourhood Learning in Ad Hoc Wireless Radio Networks. Avery Miller

Deterministic Neighbourhood Learning in Ad Hoc Wireless Radio Networks. Avery Miller Deterministic Neighbourhood Learning in Ad Hoc Wireless Radio Networks by Avery Miller A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department

More information

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory

CSC2420 Fall 2012: Algorithm Design, Analysis and Theory CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015

ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving

More information

Offline sorting buffers on Line

Offline sorting buffers on Line Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

More information

Attacks on neighbor discovery

Attacks on neighbor discovery Cryptographic Protocols (EIT ICT MSc) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu

More information

FAST INFORMATION SPREADING IN GRAPHS WITH LARGE WEAK CONDUCTANCE

FAST INFORMATION SPREADING IN GRAPHS WITH LARGE WEAK CONDUCTANCE FAST INFORMATION SPREADING IN GRAPHS WITH LARGE WEAK CONDUCTANCE KEREN CENSOR-HILLEL AND HADAS SHACHNAI Abstract. Gathering data from nodes in a network is at the heart of many distributed applications,

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed

More information

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are

More information

6.852: Distributed Algorithms Fall, 2009. Class 2

6.852: Distributed Algorithms Fall, 2009. Class 2 .8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications

Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Jie Gao Department of Computer Science Stanford University Joint work with Li Zhang Systems Research Center Hewlett-Packard

More information

Load Balancing. Load Balancing 1 / 24

Load Balancing. Load Balancing 1 / 24 Load Balancing Backtracking, branch & bound and alpha-beta pruning: how to assign work to idle processes without much communication? Additionally for alpha-beta pruning: implementing the young-brothers-wait

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

Locating and repairing faults in a network with mobile agents

Locating and repairing faults in a network with mobile agents Locating and repairing faults in a networ with mobile agents Colin Cooper 1, Ralf Klasing 2, and Tomasz Radzi 1 1 Department of Computer Science, King s College, London WC2R 2LS, UK, {Colin.Cooper, Tomasz.Radzi}@cl.ac.u

More information

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information

Cycles and clique-minors in expanders

Cycles and clique-minors in expanders Cycles and clique-minors in expanders Benny Sudakov UCLA and Princeton University Expanders Definition: The vertex boundary of a subset X of a graph G: X = { all vertices in G\X with at least one neighbor

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

WIRELESS communication channels have the characteristic

WIRELESS communication channels have the characteristic 512 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 3, MARCH 2009 Energy-Efficient Decentralized Cooperative Routing in Wireless Networks Ritesh Madan, Member, IEEE, Neelesh B. Mehta, Senior Member,

More information

Distributed Computing over Communication Networks: Maximal Independent Set

Distributed Computing over Communication Networks: Maximal Independent Set Distributed Computing over Communication Networks: Maximal Independent Set What is a MIS? MIS An independent set (IS) of an undirected graph is a subset U of nodes such that no two nodes in U are adjacent.

More information

1 Formulating The Low Degree Testing Problem

1 Formulating The Low Degree Testing Problem 6.895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Linearity Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz In the last lecture, we proved a weak PCP Theorem,

More information

Diversity Coloring for Distributed Data Storage in Networks 1

Diversity Coloring for Distributed Data Storage in Networks 1 Diversity Coloring for Distributed Data Storage in Networks 1 Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Pasadena, CA 9115, U.S.A. {jax, bruck}@paradise.caltech.edu Abstract

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

Distance Degree Sequences for Network Analysis

Distance Degree Sequences for Network Analysis Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation

More information

Adaptive Online Gradient Descent

Adaptive Online Gradient Descent Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650

More information

Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks

Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks Seyit Ahmet Çamtepe Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 Email: camtes@cs.rpi.edu

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

A Negative Result Concerning Explicit Matrices With The Restricted Isometry Property

A Negative Result Concerning Explicit Matrices With The Restricted Isometry Property A Negative Result Concerning Explicit Matrices With The Restricted Isometry Property Venkat Chandar March 1, 2008 Abstract In this note, we prove that matrices whose entries are all 0 or 1 cannot achieve

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With

More information

Protocol Design for Neighbor Discovery in AD-HOC Network

Protocol Design for Neighbor Discovery in AD-HOC Network International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 915-922 International Research Publication House http://www.irphouse.com Protocol Design for

More information

What Cannot Be Computed Locally!

What Cannot Be Computed Locally! What Cannot Be Computed Locally! Fabian Kuhn Dept. of Computer Science ETH Zurich 8092 Zurich, Switzerland uhn@inf.ethz.ch Thomas Moscibroda Dept. of Computer Science ETH Zurich 8092 Zurich, Switzerland

More information

Data Streams A Tutorial

Data Streams A Tutorial Data Streams A Tutorial Nicole Schweikardt Goethe-Universität Frankfurt am Main DEIS 10: GI-Dagstuhl Seminar on Data Exchange, Integration, and Streams Schloss Dagstuhl, November 8, 2010 Data Streams Situation:

More information

A Practical Scheme for Wireless Network Operation

A Practical Scheme for Wireless Network Operation A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

A Brief Introduction to Property Testing

A Brief Introduction to Property Testing A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Analysis of Algorithms, I

Analysis of Algorithms, I Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications

More information

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks

A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks A Graph-Center-Based Scheme for Energy-Efficient Data Collection in Wireless Sensor Networks Dajin Wang Department of Computer Science Montclair State University, Upper Montclair, NJ 07043, USA wang@pegasus.montclair.edu

More information

Load balancing in a heterogeneous computer system by self-organizing Kohonen network

Load balancing in a heterogeneous computer system by self-organizing Kohonen network Bull. Nov. Comp. Center, Comp. Science, 25 (2006), 69 74 c 2006 NCC Publisher Load balancing in a heterogeneous computer system by self-organizing Kohonen network Mikhail S. Tarkov, Yakov S. Bezrukov Abstract.

More information

High degree graphs contain large-star factors

High degree graphs contain large-star factors High degree graphs contain large-star factors Dedicated to László Lovász, for his 60th birthday Noga Alon Nicholas Wormald Abstract We show that any finite simple graph with minimum degree d contains a

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

An Approximation Algorithm for Bounded Degree Deletion

An Approximation Algorithm for Bounded Degree Deletion An Approximation Algorithm for Bounded Degree Deletion Tomáš Ebenlendr Petr Kolman Jiří Sgall Abstract Bounded Degree Deletion is the following generalization of Vertex Cover. Given an undirected graph

More information

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental

More information

Connected Identifying Codes for Sensor Network Monitoring

Connected Identifying Codes for Sensor Network Monitoring Connected Identifying Codes for Sensor Network Monitoring Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email:

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

LLS : a Locality Aware Location Service for Mobile Ad Hoc Networks

LLS : a Locality Aware Location Service for Mobile Ad Hoc Networks LLS : a Locality Aware Location Service for Mobile Ad Hoc Networks Ittai Abraham ittaia@cs.huji.ac.il Danny Dolev dolev@cs.huji.ac.il School of Computer Science and Engineering Hebrew University of Jerusalem

More information

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation

Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Load Balancing in Periodic Wireless Sensor Networks for Lifetime Maximisation Anthony Kleerekoper 2nd year PhD Multi-Service Networks 2011 The Energy Hole Problem Uniform distribution of motes Regular,

More information

Solving Geometric Problems with the Rotating Calipers *

Solving Geometric Problems with the Rotating Calipers * Solving Geometric Problems with the Rotating Calipers * Godfried Toussaint School of Computer Science McGill University Montreal, Quebec, Canada ABSTRACT Shamos [1] recently showed that the diameter of

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Leader Election Algorithms for Multi-channel Wireless Networks

Leader Election Algorithms for Multi-channel Wireless Networks Leader Election Algorithms for Multi-channel Wireless Networks Tarun Bansal, Neeraj Mittal, and S. Venkatesan Department of Computer Science The University of Texas at Dallas Richardson, TX 75080, USA

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

Introduction to Z-Wave. An Introductory Guide to Z-Wave Technology

Introduction to Z-Wave. An Introductory Guide to Z-Wave Technology Introduction to Z-Wave An Introductory Guide to Z-Wave Technology Table of Contents Z-Wave Overview and Functionality... 3 Z-Wave Technology Quick Overview... 3 Radio Specifications... 3 Network and Topology...

More information

Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs

Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs Strictly Localized Construction of Planar Bounded-Degree Spanners of Unit Disk Graphs Iyad A. Kanj Ljubomir Perković Ge Xia Abstract We describe a new distributed and strictly-localized approach for constructing

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Optimizing the Placement of Integration Points in Multi-hop Wireless Networks

Optimizing the Placement of Integration Points in Multi-hop Wireless Networks Optimizing the Placement of Integration Points in Multi-hop Wireless Networks Lili Qiu, Ranveer Chandra, Kamal Jain, and Mohammad Mahdian ABSTRACT Efficient integration of a multi-hop wireless network

More information

On the Many-to-One Transport Capacity of a Dense Wireless Sensor Network and the Compressibility of Its Data

On the Many-to-One Transport Capacity of a Dense Wireless Sensor Network and the Compressibility of Its Data On the Many-to-One Transport Capacity of a Dense Wireless Sensor etwork and the Compressibility of Its Data Daniel Marco, Enrique J. Duarte-Melo Mingyan Liu, David L. euhoff University of Michigan, Ann

More information

Data Caching in Networks with Reading, Writing and Storage Costs

Data Caching in Networks with Reading, Writing and Storage Costs Data Caching in Networks with Reading, 1 Writing and Storage Costs Himanshu Gupta Computer Science Department Stony Brook University Stony Brook, NY 11790 Email: hgupta@cs.sunysb.edu Bin Tang Computer

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

SIMS 255 Foundations of Software Design. Complexity and NP-completeness

SIMS 255 Foundations of Software Design. Complexity and NP-completeness SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 mdw@cs.berkeley.edu 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity

More information

The Load-Distance Balancing Problem

The Load-Distance Balancing Problem The Load-Distance Balancing Problem Edward Bortnikov Samir Khuller Yishay Mansour Joseph (Seffi) Naor Yahoo! Research, Matam Park, Haifa 31905 (Israel) Department of Computer Science, University of Maryland,

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

ECE/CS 372 introduction to computer networks. Lecture 13

ECE/CS 372 introduction to computer networks. Lecture 13 ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:

More information

A Numerical Study on the Wiretap Network with a Simple Network Topology

A Numerical Study on the Wiretap Network with a Simple Network Topology A Numerical Study on the Wiretap Network with a Simple Network Topology Fan Cheng and Vincent Tan Department of Electrical and Computer Engineering National University of Singapore Mathematical Tools of

More information

How Asymmetry Helps Load Balancing

How Asymmetry Helps Load Balancing How Asymmetry Helps oad Balancing Berthold Vöcking nternational Computer Science nstitute Berkeley, CA 947041198 voecking@icsiberkeleyedu Abstract This paper deals with balls and bins processes related

More information

FRIEND: A PREHANDSHAKING NEIGHBOR DISCOVERY PROTOCOL FOR WIRELESS AD HOC NETWORKS

FRIEND: A PREHANDSHAKING NEIGHBOR DISCOVERY PROTOCOL FOR WIRELESS AD HOC NETWORKS FRIEND: A PREHANDSHAKING NEIGHBOR DISCOVERY PROTOCOL FOR WIRELESS AD HOC NETWORKS 1 Ramya S, Research scholar, M.Tech CNE (PT), NIE, Mysore 2 Dr. Phaneendra H D, Professor, Dept. of ISE, NIE, Mysore ABSTRACT-

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

Social Media Mining. Graph Essentials

Social Media Mining. Graph Essentials Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures

More information

Moving Target Search. 204 Automated Reasoning

Moving Target Search. 204 Automated Reasoning Moving Target Search Toru Ishida NTT Communications and Information Processing Laboratories 1-2356, Take, Yokosuka, 238-03, JAPAN ishida%nttkb.ntt.jp@relay.cs.net Richard E. Korf Computer Science Department

More information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Lawrence Ong School of Electrical Engineering and Computer Science, The University of Newcastle, Australia Email: lawrence.ong@cantab.net

More information

Interference Reduction in Wireless Networks Using Graph Coloring Methods

Interference Reduction in Wireless Networks Using Graph Coloring Methods Interference Reduction in Wireless Networks Using Graph Coloring Methods Andrew Chickadel Computing Research Department of Computer Science Villanova University Villanova, PA 19085 Andrew.Chickadel@villanova.edu

More information

Locating Randomly Selected Destinations in Large Multi-hop Wireless Networks

Locating Randomly Selected Destinations in Large Multi-hop Wireless Networks Locating Randomly Selected Destinations in Large Multi-hop Wireless Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7148, USA E-mail: jing@cs.uno.edu Abstract.

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor

Ph.D. Thesis. Judit Nagy-György. Supervisor: Péter Hajnal Associate Professor Online algorithms for combinatorial problems Ph.D. Thesis by Judit Nagy-György Supervisor: Péter Hajnal Associate Professor Doctoral School in Mathematics and Computer Science University of Szeged Bolyai

More information

Factoring & Primality

Factoring & Primality Factoring & Primality Lecturer: Dimitris Papadopoulos In this lecture we will discuss the problem of integer factorization and primality testing, two problems that have been the focus of a great amount

More information

An Empirical Study of Two MIS Algorithms

An Empirical Study of Two MIS Algorithms An Empirical Study of Two MIS Algorithms Email: Tushar Bisht and Kishore Kothapalli International Institute of Information Technology, Hyderabad Hyderabad, Andhra Pradesh, India 32. tushar.bisht@research.iiit.ac.in,

More information

How To Find An Optimal Search Protocol For An Oblivious Cell

How To Find An Optimal Search Protocol For An Oblivious Cell The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,

More information

Impact Of Interference On Multi-hop Wireless Network Performance

Impact Of Interference On Multi-hop Wireless Network Performance Impact Of Interference On Multi-hop Wireless Network Performance Kamal Jain Jitendra Padhye Venkata N. Padmanabhan Lili Qiu Microsoft Research One Microsoft Way, Redmond, WA 98052. {kamalj, padhye, padmanab,

More information

Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak

Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak Non-Black-Box Techniques In Crytpography Introduction Thesis for the Ph.D degree Boaz Barak A computer program (or equivalently, an algorithm) is a list of symbols a finite string. When we interpret a

More information

Spatially Limited Contention for Multi-Hop Wireless Networks

Spatially Limited Contention for Multi-Hop Wireless Networks Spatially Limited Contention for Multi-Hop Wireless Networks Fikret Sivrikaya, Sahin Albayrak DAI-Labor / TU Berlin, Germany Bülent Yener Rensselaer Polytechnic Institute, NY, USA Abstract With rapid developments

More information

Location Information Services in Mobile Ad Hoc Networks

Location Information Services in Mobile Ad Hoc Networks Location Information Services in Mobile Ad Hoc Networks Tracy Camp, Jeff Boleng, Lucas Wilcox Department of Math. and Computer Sciences Colorado School of Mines Golden, Colorado 841 Abstract In recent

More information

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0

Research Article ISSN 2277 9140 Copyright by the authors - Licensee IJACIT- Under Creative Commons license 3.0 INTERNATIONAL JOURNAL OF ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY An international, online, open access, peer reviewed journal Volume 2 Issue 2 April 2013 Research Article ISSN 2277 9140 Copyright

More information

Location of Mobile Terminals Using Time Measurements and Survey Points

Location of Mobile Terminals Using Time Measurements and Survey Points IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 4, JULY 2003 999 Location of Mobile Terminals Using Time Measurements and Survey Points Michael McGuire, Member, IEEE, Konstantinos N. Plataniotis,

More information

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed

More information

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology

More information

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003 Graph models for the Web and the Internet Elias Koutsoupias University of Athens and UCLA Crete, July 2003 Outline of the lecture Small world phenomenon The shape of the Web graph Searching and navigation

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information