392 research outputs found
Dimmer: Self-Adaptive Network-Wide Flooding with Reinforcement Learning
The last decade saw an emergence of Synchronous Transmissions (ST) as an
effective communication paradigm in low-power wireless networks. Numerous ST
protocols provide high reliability and energy efficiency in normal wireless
conditions, for a large variety of traffic requirements. Recently, with the
EWSN dependability competitions, the community pushed ST to harsher and
highly-interfered environments, improving upon classical ST protocols through
the use of custom rules, hand-tailored parameters, and additional
retransmissions. The results are sophisticated protocols, that require prior
expert knowledge and extensive testing, often tuned for a specific deployment
and envisioned scenario. In this paper, we explore how ST protocols can benefit
from self-adaptivity; a self-adaptive ST protocol selects itself its best
parameters to (1) tackle external environment dynamics and (2) adapt to its
topology over time. We introduce Dimmer as a self-adaptive ST protocol. Dimmer
builds on LWB and uses Reinforcement Learning to tune its parameters and match
the current properties of the wireless medium. By learning how to behave from
an unlabeled dataset, Dimmer adapts to different interference types and
patterns, and is able to tackle previously unseen interference. With Dimmer, we
explore how to efficiently design AI-based systems for constrained devices, and
outline the benefits and downfalls of AI-based low-power networking. We
evaluate our protocol on two deployments of resource-constrained nodes
achieving 95.8% reliability against strong, unknown WiFi interference. Our
results outperform baselines such as non-adaptive ST protocols (27%) and PID
controllers, and show a performance close to hand-crafted and more
sophisticated solutions, such as Crystal (99%)
Routing in Delay Tolerant Networks
Delay-tolerant networks (DTNs) have the great potential to connecting devices and regions of the world that are presently under-served by current networks. A vital challenge for Delay Tolerant Networks is to determine the routes through the network without ever having an end to end path, or knowing which routers will be connected at any given instant of time. The problem has an added constraint of limited size of buffers at each node. This situation limits the applicability of traditional routing techniques which categorize lack of path as failure of nodes and try to seek for existing end-to-end path. Approaches have been proposed which focus either on epidemic message replication or on previously known information about the connectivity schedule. The epidemic approach, which is basically a flooding technique, of replicating messages to all nodes has a very high overhead and does not perform well with increasing load. It can, however, operate without any prior information on the network configuration. On the other hand, the alternatives, i.e., having a prior knowledge about the connectivity, seems to be infeasible for a self-configuring network.
In this project we try to maximize the message delivery rate without compromising on the amount of message discarded. The amount of message discarded has a direct relation to the bandwidth used and the battery consumed. The more the message discarded more is the bandwidth used and battery consumed by every node in transmitting the message. At the same time, with the increase in the number of messages discarded, the cost for processing every message increases and this adversely affects the nodes. Therefore, we have proposed an algorithm where the messages are disseminated faster into the network with lesser number of replication of individual messages. The history of encounter of a node with other nodes gives noisy but valuable information about the network topology. Using this history, we try to route the packets from one node to another using an algorithm that depends on each node’s present available neighbours/contact and the nodes which it has encountered in the recent past. We have also focused on passing the messages to those nodes which are on the move away from the source/forwarder node, as the nodes moving away have a greater probability of disseminating the messages throughout the network and hence increases chances of delivering the message to the destination
Quantum Monte Carlo for large chemical systems: Implementing efficient strategies for petascale platforms and beyond
Various strategies to implement efficiently QMC simulations for large
chemical systems are presented. These include: i.) the introduction of an
efficient algorithm to calculate the computationally expensive Slater matrices.
This novel scheme is based on the use of the highly localized character of
atomic Gaussian basis functions (not the molecular orbitals as usually done),
ii.) the possibility of keeping the memory footprint minimal, iii.) the
important enhancement of single-core performance when efficient optimization
tools are employed, and iv.) the definition of a universal, dynamic,
fault-tolerant, and load-balanced computational framework adapted to all kinds
of computational platforms (massively parallel machines, clusters, or
distributed grids). These strategies have been implemented in the QMC=Chem code
developed at Toulouse and illustrated with numerical applications on small
peptides of increasing sizes (158, 434, 1056 and 1731 electrons). Using 10k-80k
computing cores of the Curie machine (GENCI-TGCC-CEA, France) QMC=Chem has been
shown to be capable of running at the petascale level, thus demonstrating that
for this machine a large part of the peak performance can be achieved.
Implementation of large-scale QMC simulations for future exascale platforms
with a comparable level of efficiency is expected to be feasible
Roaming Real-Time Applications - Mobility Services in IPv6 Networks
Emerging mobility standards within the next generation Internet Protocol,
IPv6, promise to continuously operate devices roaming between IP networks.
Associated with the paradigm of ubiquitous computing and communication, network
technology is on the spot to deliver voice and videoconferencing as a standard
internet solution. However, current roaming procedures are too slow, to remain
seamless for real-time applications. Multicast mobility still waits for a
convincing design. This paper investigates the temporal behaviour of mobile
IPv6 with dedicated focus on topological impacts. Extending the hierarchical
mobile IPv6 approach we suggest protocol improvements for a continuous
handover, which may serve bidirectional multicast communication, as well. Along
this line a multicast mobility concept is introduced as a service for clients
and sources, as they are of dedicated importance in multipoint conferencing
applications. The mechanisms introduced do not rely on assumptions of any
specific multicast routing protocol in use.Comment: 15 pages, 5 figure
- …