35 research outputs found

    Consensus in multi-agent systems with non-periodic sampled-data exchange and uncertain network topology

    Full text link
    In this paper consensus in second-order multi-agent systems with a non-periodic sampled-data exchange among agents is investigated. The sampling is random with bounded inter-sampling intervals. It is assumed that each agent has exact knowledge of its own state at any time instant. The considered local interaction rule is PD-type. Sufficient conditions for stability of the consensus protocol to a time-invariant value are derived based on LMIs. Such conditions only require the knowledge of the connectivity of the graph modeling the network topology. Numerical simulations are presented to corroborate the theoretical results.Comment: arXiv admin note: substantial text overlap with arXiv:1407.300

    A reinforcement learning approach for attack graph analysis

    Get PDF

    Betweenness Centrality as a Driver of Preferential Attachment in the Evolution of Research Collaboration Networks

    Full text link
    We analyze whether preferential attachment in scientific coauthorship networks is different for authors with different forms of centrality. Using a complete database for the scientific specialty of research about "steel structures," we show that betweenness centrality of an existing node is a significantly better predictor of preferential attachment by new entrants than degree or closeness centrality. During the growth of a network, preferential attachment shifts from (local) degree centrality to betweenness centrality as a global measure. An interpretation is that supervisors of PhD projects and postdocs broker between new entrants and the already existing network, and thus become focal to preferential attachment. Because of this mediation, scholarly networks can be expected to develop differently from networks which are predicated on preferential attachment to nodes with high degree centrality.Comment: Journal of Informetrics (in press

    Path computation in multi-layer networks: Complexity and algorithms

    Full text link
    Carrier-grade networks comprise several layers where different protocols coexist. Nowadays, most of these networks have different control planes to manage routing on different layers, leading to a suboptimal use of the network resources and additional operational costs. However, some routers are able to encapsulate, decapsulate and convert protocols and act as a liaison between these layers. A unified control plane would be useful to optimize the use of the network resources and automate the routing configurations. Software-Defined Networking (SDN) based architectures, such as OpenFlow, offer a chance to design such a control plane. One of the most important problems to deal with in this design is the path computation process. Classical path computation algorithms cannot resolve the problem as they do not take into account encapsulations and conversions of protocols. In this paper, we propose algorithms to solve this problem and study several cases: Path computation without bandwidth constraint, under bandwidth constraint and under other Quality of Service constraints. We study the complexity and the scalability of our algorithms and evaluate their performances on real topologies. The results show that they outperform the previous ones proposed in the literature.Comment: IEEE INFOCOM 2016, Apr 2016, San Francisco, United States. To be published in IEEE INFOCOM 2016, \<http://infocom2016.ieee-infocom.org/\&g

    Voice Packet Performance Estimation through Step Network Using OPNET

    Full text link
    VoIP transfer voice over networks such as LAN. This technology is growing rapidly due to support of existing network infrastructure at low cost. Various simulations have been done and it is observed that by increasing the VoIP client, packet length and traffic arrival rate the performance of step network affected. In the current work packet dropped, packet received, voice traffic sent and end-to-end delay is estimated for various queuing disciplines like PQ, FIFO and WFQ. It is depicted that queuing disciplines effects the applications performance and utilization of resources.Comment: 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS). arXiv admin note: text overlap with arXiv:1701.0479

    Communication-constrained feedback stability and Multi-agent System consensusability in Networked Control Systems

    Get PDF
    With the advances in wireless communication, the topic of Networked Control Systems (NCSs) has become an interesting research subject. Moreover, the advantages they offer convinced companies to implement and use data networks for remote industrial control and process automation. Data networks prove to be very efficient for controlling distributed systems, which would otherwise require complex wiring connections on large or inaccessible areas. In addition, they are easier to maintain and more cost efficient. Unfortunately, stability and performance control is always going to be affected by network and communication issues, such as band-limited channels, quantization errors, sampling, delays, packet dropouts or system architecture. The first part of this research aims to study the effects of both input and output quantization on an NCS. Both input and output quantization errors are going to be modeled as sector bounded multiplicative uncertainties, the main goal being the minimization of the quantization density, while maintaining feedback stability. Modeling quantization errors as uncertainties allows for robust optimal control strategies to be applied in order to study the accepted uncertainty levels, which are directly related to the quantization levels. A new feedback law is proposed that will improve closed-loop system stability by increasing the upper bound of allowed uncertainty, and thus allowing the use of a coarser quantizer. Another aspect of NCS deals with coordination of the independent agents within a Multi-agent System (MAS). This research addresses the consensus problem for a set of discrete-time agents communicating through a network with directed information flow. It examines the combined effect of agent dynamics and network topology on agents\u27 consensusability. Given a particular consensus protocol, a sufficient condition is given for agents to be consensusable. This condition requires the eigenvalues of the digraph modeling the network topology to be outer bounded by a fan-shaped area determined by the Mahler measure of the agents\u27 dynamics matrix

    Performance Comparison of Different Load Balancing Algorithms in Cloud Computing

    Get PDF
    Cloud computing offers economical, scalable, and instantaneous computing resources to enterprises, allowing them to manage substantial traffic volumes and cater to a multitude of users. But the need for effective load balancing techniques has grown significantly as cloud computing becomes more and more popular. To guarantee the best possible performance, availability, and dependability of apps and services, load balancing is a crucial component of cloud computing. This paper offers a comparative study of different cloud computing technologies and load balancing strategies. We present a performance comparison of software-based load balancing; our analysis compares various service broker policies, such as closest distance, optimized, and reconfigurable, with algorithms such as round robin, throttled, and equally spread. Overall, this paper helps readers understand load balancing mechanisms in cloud computing
    corecore