484 research outputs found
Noisy Beeping Networks
We introduce noisy beeping networks, where nodes have limited communication
capabilities, namely, they can only emit energy or sense the channel for
energy. Furthermore, imperfections may cause devices to malfunction with some
fixed probability when sensing the channel, which amounts to deducing a noisy
received transmission. Such noisy networks have implications for
ultra-lightweight sensor networks and biological systems.
We show how to compute tasks in a noise-resilient manner over noisy beeping
networks of arbitrary structure. In particular, we transform any algorithm that
assumes a noiseless beeping network (of size ) into a noise-resilient
version while incurring a multiplicative overhead of only in its
round complexity, with high probability. We show that our coding is optimal for
some tasks, such as node-coloring of a clique.
We further show how to simulate a large family of algorithms designed for
distributed networks in the CONGEST() model over a noisy beeping network.
The simulation succeeds with high probability and incurs an asymptotic
multiplicative overhead of in the
round complexity, where is the maximal degree of the network. The
overhead is tight for certain graphs, e.g., a clique. Further, this simulation
implies a constant overhead coding for constant-degree networks
Quasi-Optimal Leader Election Algorithms in Radio Networks with Loglogarithmic Awake Time Slots
A radio network (RN) is a distributed system consisting of radio stations. We design and analyze two distributed leader election protocols in RN where the number of radio stations is unknown. The first algorithm runs under the assumption of {\it limited collision detection}, while the second assumes that {\it no collision detection} is available. By ``limited collision detection'', we mean that if exactly one station sends (broadcasts) a message, then all stations (including the transmitter) that are listening at this moment receive the sent message. By contrast, the second no-collision-detection algorithm assumes that a station cannot simultaneously send and listen signals. Moreover, both protocols allow the stations to keep asleep as long as possible, thus minimizing their awake time slots (such algorithms are called {\it energy-efficient}). Both randomized protocols in RN areshown to elect a leader in expected time, with no station being awake for more than time slots. Therefore, a new class of efficient algorithms is set up that match the time lower-bound established by Kushilevitz and Mansour
Exploiting spontaneous transmissions for broadcasting and leader election in radio networks
We study two fundamental communication primitives: broadcasting and leader election in the classical model of multi-hop radio networks with unknown topology and without collision detection mechanisms. It has been known for almost 20 years that in undirected networks with n nodes and diameter D, randomized broadcasting requires Ω(D log n/D + log2 n) rounds, assuming that uninformed nodes are not allowed to communicate (until they are informed). Only very recently, Haeupler and Wajc (PODC'2016) showed that this bound can be improved for the model with spontaneous transmissions, providing an O(D log n log log n/log D + logO(1) n)-time broadcasting algorithm. In this article, we give a new and faster algorithm that completes broadcasting in O(D log n/log D + logO(1) n) time, succeeding with high probability. This yields the first optimal O(D)-time broadcasting algorithm whenever n is polynomial in D.
Furthermore, our approach can be applied to design a new leader election algorithm that matches the performance of our broadcasting algorithm. Previously, all fast randomized leader election algorithms have used broadcasting as a subroutine and their complexity has been asymptotically strictly larger than the complexity of broadcasting. In particular, the fastest previously known randomized leader election algorithm of Ghaffari and Haeupler (SODA'2013) requires O(D log n/D min {log log n, log n/D} + logO(1) n)-time, succeeding with high probability. Our new algorithm again requires O(D log n/log D + logO(1) n) time, also succeeding with high probability
Primary User Emulation Attacks in Cognitive Radio - An Experimental Demonstration and Analysis
Cognitive radio networks rely on the ability to avoid primary users, owners of the frequency, and prevent collisions for effective communication to take place. Additional malicious secondary users, jammers, may use a primary user emulation attacks to take advantage of the secondary user\u27s ability to avoid primary users and cause excessive and unexpected disruptions to communications. Two jamming/anti-jamming methods are investigated on Ettus Labs USRP 2 radios. First, pseudo-random channel hopping schemes are implemented for jammers to seek-and-disrupt secondary users while secondary users apply similar schemes to avoid all primary user signatures. In the second method the jammer uses adversarial bandit algorithms to avoid channels already heavily disrupted from primary user communications and concentrate efforts on channels heavily populated by secondary user communications. In addition the secondary users apply similar methods to avoid channels heavily occupied by jammers and primary users. The performance of these users is compared with and without the algorithm through channel delay, impact of algorithm on probability density functions, and user collision rate. Conclusions on made on the effectiveness of each technique
Optimal Initialization and Gossiping Algorithms for Random Radio Networks
The initialization problem, also known as naming, consists to give a unique identifier ranging from to to a set of indistinguishable nodes in a given network. We consider a network where nodes (processors) are randomly deployed in a square (resp. cube) . We assume that the time is slotted and the network is synchronous, two nodes are able to communicate if they are within distance at most of of each other ( is the transmitting/receiving range). Moreover, if two or more neighbors of a processor transmit concurrently at the same time slot, then would not receive either messages. We suppose also that the anonymous nodes know neither the topology of the network nor the number of nodes in the network. Under this extremal scenario, we first show how the transmitting range of the deployed processors affects the typical characteristics of the network. Then, by allowing the nodes to transmit at various ranges we design sub-linear randomized initialization protocols~: In the two, resp. three, dimensional case, our randomized initialization algorithms run in , resp. , time slots. These latter protocols are based upon an optimal gossiping algorithm which is of independent interest
- …