5 research outputs found
Receiver-Based Flow Control for Networks in Overload
We consider utility maximization in networks where the sources do not employ
flow control and may consequently overload the network. In the absence of flow
control at the sources, some packets will inevitably have to be dropped when
the network is in overload. To that end, we first develop a distributed,
threshold-based packet dropping policy that maximizes the weighted sum
throughput. Next, we consider utility maximization and develop a receiver-based
flow control scheme that, when combined with threshold-based packet dropping,
achieves the optimal utility. The flow control scheme creates virtual queues at
the receivers as a push-back mechanism to optimize the amount of data delivered
to the destinations via back-pressure routing. A novel feature of our scheme is
that a utility function can be assigned to a collection of flows, generalizing
the traditional approach of optimizing per-flow utilities. Our control policies
use finite-buffer queues and are independent of arrival statistics. Their
near-optimal performance is proved and further supported by simulation results.Comment: 14 pages, 4 figures, 5 tables, preprint submitted to IEEE INFOCOM
201
Device-Centric Cooperation in Mobile Networks
The increasing popularity of applications such as video streaming in today's
mobile devices introduces higher demand for throughput, and puts a strain
especially on cellular links. Cooperation among mobile devices by exploiting
both cellular and local area connections is a promising approach to meet the
increasing demand. In this paper, we consider that a group of cooperative
mobile devices, exploiting both cellular and local area links and within
proximity of each other, are interested in the same video content. Traditional
network control algorithms introduce high overhead and delay in this setup as
the network control and cooperation decisions are made in a source-centric
manner. Instead, we develop a device-centric stochastic cooperation scheme. Our
device-centric scheme; DcC allows mobile devices to make control decisions such
as flow control, scheduling, and cooperation without loss of optimality. Thanks
to being device-centric, DcC reduces; (i) overhead; i.e., the number of control
packets that should be transmitted over cellular links, so cellular links are
used more efficiently, and (ii) the amount of delay that each packet
experiences, which improves quality of service. The simulation results
demonstrate the benefits of DcC
In-Network Congestion Control for Multirate Multicast
We present a novel control scheme that dynamically optimizes multirate multicast. By computing the differential backlog at every node, our scheme adaptively allocates transmission rates per session/user pair in order to maximize throughput. An important feature of the proposed scheme is that it does not require source cooperation or centralized calculations. This methodology leads to efficient and distributed algorithms that scale gracefully and can be embraced by low-cost wireless devices. Additionally, it is shown that maximization of sum utility is possible by the addition of a virtual queue at each destination node of the multicast groups. The virtual queue captures the desire of the individual user and helps in making the correct resource allocation to optimize total utility. Under the operation of the proposed schemes backlog sizes are deterministically bounded, which provides delay guarantees on delivered packets. To illustrate its practicality, we present a prototype implementation in the NITOS wireless testbed. The experimental results verify that the proposed schemes achieve maximum performance while maintaining low complexity.National Science Foundation (U.S.) (grant CNS-0915988)National Science Foundation (U.S.) (grant CNS-1116209)United States. Office of Naval Research (grant N00014-12-1-0064
A control theoretic approach for security of cyber-physical systems
In this dissertation, several novel defense methodologies for cyber-physical systems have been proposed. First, a special type of cyber-physical system, the RFID system, is considered for which a lightweight mutual authentication and ownership management protocol is proposed in order to protect the data confidentiality and integrity. Then considering the fact that the protection of the data confidentiality and integrity is insufficient to guarantee the security in cyber-physical systems, we turn to the development of a general framework for developing security schemes for cyber-physical systems wherein the cyber system states affect the physical system and vice versa. After that, we apply this general framework by selecting the traffic flow as the cyber system state and a novel attack detection scheme that is capable of capturing the abnormality in the traffic flow in those communication links due to a class of attacks has been proposed. On the other hand, an attack detection scheme that is capable of detecting both sensor and actuator attacks is proposed for the physical system in the presence of network induced delays and packet losses. Next, an attack detection scheme is proposed when the network parameters are unknown by using an optimal Q-learning approach. Finally, this attack detection and accommodation scheme has been further extended to the case where the network is modeled as a nonlinear system with unknown system dynamics --Abstract, page iv