902 research outputs found
Resource Allocation in Communication and Social Networks
abstract: As networks are playing an increasingly prominent role in different aspects of our lives, there is a growing awareness that improving their performance is of significant importance. In order to enhance performance of networks, it is essential that scarce networking resources be allocated smartly to match the continuously changing network environment. This dissertation focuses on two different kinds of networks - communication and social, and studies resource allocation problems in these networks. The study on communication networks is further divided into different networking technologies - wired and wireless, optical and mobile, airborne and terrestrial. Since nodes in an airborne network (AN) are heterogeneous and mobile, the design of a reliable and robust AN is highly complex. The dissertation studies connectivity and fault-tolerance issues in ANs and proposes algorithms to compute the critical transmission range in fault free, faulty and delay tolerant scenarios. Just as in the case of ANs, power optimization and fault tolerance are important issues in wireless sensor networks (WSN). In a WSN, a tree structure is often used to deliver sensor data to a sink node. In a tree, failure of a node may disconnect the tree. The dissertation investigates the problem of enhancing the fault tolerance capability of data gathering trees in WSN. The advent of OFDM technology provides an opportunity for efficient resource utilization in optical networks and also introduces a set of novel problems, such as routing and spectrum allocation (RSA) problem. This dissertation proves that RSA problem is NP-complete even when the network topology is a chain, and proposes approximation algorithms. In the domain of social networks, the focus of this dissertation is study of influence propagation in presence of active adversaries. In a social network multiple vendors may attempt to influence the nodes in a competitive fashion. This dissertation investigates the scenario where the first vendor has already chosen a set of nodes and the second vendor, with the knowledge of the choice of the first, attempts to identify a smallest set of nodes so that after the influence propagation, the second vendor's market share is larger than the first.Dissertation/ThesisPh.D. Computer Science 201
A self-healing framework for WSNs : detection and recovery of faulty sensor nodes and unreliable wireless links
Proponemos un marco conceptual para acoplar técnicas de auto-organización y técnicas de autocuración.
A este marco se le llama de auto-curación y es capaz de hacer frente a enlaces
inalámbricos inestables y nodos defectuosos. Dividimos el marco en dos componentes
principales: la auto-organización y auto-curación. En el componente de auto-organización,
nosotros construimos una topología de árbol que determine las rutas hacia el sumidero. En el
componente de auto-curación, la topología del árbol se adapta a ambos tipos de fallas siguiendo
tres pasos: recopilación de información, detección de fallas, y la recuperación de fallos. En el
paso de recopilación de información, los nodos determinan el estado actual de la red mediante
la recopilación de información de la capa MAC. En el paso de detección de fallas, los nodos
analizan la información recopilada y detectan nodos/enlaces defectuosos. En el paso de
recuperación de fallos, los nodos recuperan la topología del árbol mediante la sustitución de
componentes defectuosos con redundantes (es decir, componentes de respaldo). Este marco
permite una red con resiliencia que se recupera sin agotar los recursos de la red.We propose a conceptual framework for putting together self-organizing and self-healing
techniques. This framework is called the self-healing framework and it is capable of coping with
unstable wireless links and faulty nodes. We divide the framework into two major components:
selforganization and self-healing. In the self-organization component, we build a tree topology
that determines routing paths towards the sink. In the self-healing component, the tree
topology copes with both types of failures by following three steps: information collection, fault
detection, and fault recovery. In the information collection step, the nodes determine the
current status of the network by gathering information from the MAC layer. In the fault
detection step, the nodes analyze the collected information and detect faulty nodes/links. In
the fault recovery step, the nodes recover the tree topology by replacing the faulty components
with redundant ones (i.e., backup components). This framework allows a resilient network that
recovers itself without depleting the network resources.Doctor en IngenieríaDoctorad
Datacenter Traffic Control: Understanding Techniques and Trade-offs
Datacenters provide cost-effective and flexible access to scalable compute
and storage resources necessary for today's cloud computing needs. A typical
datacenter is made up of thousands of servers connected with a large network
and usually managed by one operator. To provide quality access to the variety
of applications and services hosted on datacenters and maximize performance, it
deems necessary to use datacenter networks effectively and efficiently.
Datacenter traffic is often a mix of several classes with different priorities
and requirements. This includes user-generated interactive traffic, traffic
with deadlines, and long-running traffic. To this end, custom transport
protocols and traffic management techniques have been developed to improve
datacenter network performance.
In this tutorial paper, we review the general architecture of datacenter
networks, various topologies proposed for them, their traffic properties,
general traffic control challenges in datacenters and general traffic control
objectives. The purpose of this paper is to bring out the important
characteristics of traffic control in datacenters and not to survey all
existing solutions (as it is virtually impossible due to massive body of
existing research). We hope to provide readers with a wide range of options and
factors while considering a variety of traffic control mechanisms. We discuss
various characteristics of datacenter traffic control including management
schemes, transmission control, traffic shaping, prioritization, load balancing,
multipathing, and traffic scheduling. Next, we point to several open challenges
as well as new and interesting networking paradigms. At the end of this paper,
we briefly review inter-datacenter networks that connect geographically
dispersed datacenters which have been receiving increasing attention recently
and pose interesting and novel research problems.Comment: Accepted for Publication in IEEE Communications Surveys and Tutorial
- …