71,387 research outputs found
Approximating the generalized terminal backup problem via half-integral multiflow relaxation
We consider a network design problem called the generalized terminal backup
problem. Whereas earlier work investigated the edge-connectivity constraints
only, we consider both edge- and node-connectivity constraints for this
problem. A major contribution of this paper is the development of a strongly
polynomial-time 4/3-approximation algorithm for the problem. Specifically, we
show that a linear programming relaxation of the problem is half-integral, and
that the half-integral optimal solution can be rounded to a 4/3-approximate
solution. We also prove that the linear programming relaxation of the problem
with the edge-connectivity constraints is equivalent to minimizing the cost of
half-integral multiflows that satisfy flow demands given from terminals. This
observation presents a strongly polynomial-time algorithm for computing a
minimum cost half-integral multiflow under flow demand constraints
WAN design with demand, hop limit and path diversity constraints
This thesis presents a challenging telecommunication network design problem, in which the network designer has to assure not only connectivity, but also some degree of performance guarantee and survivability to the solution. We introduce a topological and capacity design, with node-pair constraints of heterogeneous bounds. These constraints take into account the throughput, the number of node-disjoint paths, and the maximum number of hops. Moreover, the capacity to place on each link is chosen from a pool of available cable types, each with its maximum capacity and fixed cost, in other words the cost function is stepwise with respect to capacity usage. The solution space of the problem in study is composed by each one of the node-pair demands. An in-depth combinatorial study was done, leading to the development of a new coding for geneti
Performance Analysis and Design of Mobile Ad-Hoc Networks
We focus on the performance analysis and design of a wireless ad-hoc network using a virtual-circuit or reservation based medium access layer. In a reservation based MAC network, source nodes reserve a session's link capacity end-to-end over the entire path before sending traffic over the established path. An example of a generic reservation based MAC protocol is Unifying Slot Assignment Protocol (USAP). Any reservation based medium access protocol (including USAP) uses a simple set of rules to determine the cells or timeslots available at a node to reserve link capacity along the path to the next node. Given inputs of node locations, traffic pattern between nodes and link propagation matrices, we develop models to estimate blocking probability and throughput for reservation based wireless ad-hoc networks. These models are based on extending reduced load loss network models for a wireless network.
For generic USAP with multiple frequency channels, the key effect of multiuser interference on a link is modeled via reduced available link capacity where the effects of transmissions and receptions in the link neighborhood are modeled using USAP reservation rules. We compare our results with simulation and obtain good results using our extended reduced load loss network models but with reduced available link capacity distribution obtained by simulation. For the case of generic USAP using a single frequency channel, we develop models for unicast traffic using reduced load loss network models but with the sharing of the wireless medium between a node and its neighbors modeled by considering cliques of neighboring interfering links around a particular link. We compare results of this model with simulation and show good match. We also develop models to calculate source-destination throughput for the reservation MAC as used in the Joint Tactical Radio System to support both unicast and multicast traffic. These models are based on extending reduced load loss network models for wireless multicast traffic with the sharing of the wireless medium between a node and its (upto 2 hop) neighbors modeled by considering cliques of interfering nodes around a particular node. We compare results of this model with simulation and show good match with simulation. Once we have developed models to estimate throughput and blocking probabilities, we use these models to optimize total network throughput. In order to optimize total throughput, we compute throughput sensitivities of the reduced load loss network model using an implied cost formulation and use these sensitivities to choose the routing probabilities among multiple paths so that total network throughput is maximized.
In any network scenario, MANETs can get disconnected into clusters. As part of the MANET design problem, we look at the problem of establishing network connectivity and satisfying required traffic capacity between disconnected clusters by placing a minimum number of advantaged high flying Aerial Platforms (APs) as relay nodes at appropriate places. We also extend the connectivity solution in order to make the network single AP survivable. The problem of providing both connectivity and required capacity between disconnected ground clusters (which contain nodes that can communicate directly with each other) is formulated as a summation-form clustering problem of the ground clusters with the APs along with inter-AP distance constraints that make the AP network connected and with complexity costs that take care of ground cluster to AP capacity constraints. The resultant clustering problem is solved using Deterministic Annealing to find (near) globally optimal solutions for the minimum number and locations of the APs to establish connectivity and provide required traffic capacity between disconnected clusters. The basic connectivity constraints are extended to include conditions that make the resultant network survivable to a single AP failure. In order to make the network single AP survivable, we extend the basic connectivity solution by adding another summation form constraint so that the AP network forms a biconnected network and also by making sure that each ground cluster is connected to atleast two APs. We establish the validity of our algorithms by comparing them with optimal exhaustive search algorithms and show that our algorithms are near-optimal for the problem of establishing connectivity between disconnected clusters
Dynamic Interference Mitigation for Generalized Partially Connected Quasi-static MIMO Interference Channel
Recent works on MIMO interference channels have shown that interference
alignment can significantly increase the achievable degrees of freedom (DoF) of
the network. However, most of these works have assumed a fully connected
interference graph. In this paper, we investigate how the partial connectivity
can be exploited to enhance system performance in MIMO interference networks.
We propose a novel interference mitigation scheme which introduces constraints
for the signal subspaces of the precoders and decorrelators to mitigate "many"
interference nulling constraints at a cost of "little" freedoms in precoder and
decorrelator design so as to extend the feasibility region of the interference
alignment scheme. Our analysis shows that the proposed algorithm can
significantly increase system DoF in symmetric partially connected MIMO
interference networks. We also compare the performance of the proposed scheme
with various baselines and show via simulations that the proposed algorithms
could achieve significant gain in the system performance of randomly connected
interference networks.Comment: 30 pages, 10 figures, accepted by IEEE Transaction on Signal
Processin
Determination of RF source power in WPSN using modulated backscattering
A wireless sensor network (WSN) is a wireless network consisting of spatially
distributed autonomous devices using sensors to cooperatively monitor physical
or environmental conditions, such as temperature, sound, vibration, pressure,
motion or pollutants, at different locations. During RF transmission energy
consumed by critically energy-constrained sensor nodes in a WSN is related to
the life time system, but the life time of the system is inversely proportional
to the energy consumed by sensor nodes. In that regard, modulated
backscattering (MB) is a promising design choice, in which sensor nodes send
their data just by switching their antenna impedance and reflecting the
incident signal coming from an RF source. Hence wireless passive sensor
networks (WPSN) designed to operate using MB do not have the lifetime
constraints. In this we are going to investigate the system analytically. To
obtain interference-free communication connectivity with the WPSN nodes number
of RF sources is determined and analyzed in terms of output power and the
transmission frequency of RF sources, network size, RF source and WPSN node
characteristics. The results of this paper reveal that communication coverage
and RF Source Power can be practically maintained in WPSN through careful
selection of design parametersComment: 10 pages; International Journal on Soft Computing (IJSC) Vol.3, No.1
(2012). arXiv admin note: text overlap with arXiv:1001.5339 by other author
Understanding Internet topology: principles, models, and validation
Building on a recent effort that combines a first-principles approach to modeling router-level connectivity with a more pragmatic use of statistics and graph theory, we show in this paper that for the Internet, an improved understanding of its physical infrastructure is possible by viewing the physical connectivity as an annotated graph that delivers raw connectivity and bandwidth to the upper layers in the TCP/IP protocol stack, subject to practical constraints (e.g., router technology) and economic considerations (e.g., link costs). More importantly, by relying on data from Abilene, a Tier-1 ISP, and the Rocketfuel project, we provide empirical evidence in support of the proposed approach and its consistency with networking reality. To illustrate its utility, we: 1) show that our approach provides insight into the origin of high variability in measured or inferred router-level maps; 2) demonstrate that it easily accommodates the incorporation of additional objectives of network design (e.g., robustness to router failure); and 3) discuss how it complements ongoing community efforts to reverse-engineer the Internet
- …