559 research outputs found

    Distributed Deterministic Broadcasting in Uniform-Power Ad Hoc Wireless Networks

    Full text link
    Development of many futuristic technologies, such as MANET, VANET, iThings, nano-devices, depend on efficient distributed communication protocols in multi-hop ad hoc networks. A vast majority of research in this area focus on design heuristic protocols, and analyze their performance by simulations on networks generated randomly or obtained in practical measurements of some (usually small-size) wireless networks. %some library. Moreover, they often assume access to truly random sources, which is often not reasonable in case of wireless devices. In this work we use a formal framework to study the problem of broadcasting and its time complexity in any two dimensional Euclidean wireless network with uniform transmission powers. For the analysis, we consider two popular models of ad hoc networks based on the Signal-to-Interference-and-Noise Ratio (SINR): one with opportunistic links, and the other with randomly disturbed SINR. In the former model, we show that one of our algorithms accomplishes broadcasting in O(Dlog2n)O(D\log^2 n) rounds, where nn is the number of nodes and DD is the diameter of the network. If nodes know a priori the granularity gg of the network, i.e., the inverse of the maximum transmission range over the minimum distance between any two stations, a modification of this algorithm accomplishes broadcasting in O(Dlogg)O(D\log g) rounds. Finally, we modify both algorithms to make them efficient in the latter model with randomly disturbed SINR, with only logarithmic growth of performance. Ours are the first provably efficient and well-scalable, under the two models, distributed deterministic solutions for the broadcast task.Comment: arXiv admin note: substantial text overlap with arXiv:1207.673

    Rendezvous of Distance-aware Mobile Agents in Unknown Graphs

    Get PDF
    We study the problem of rendezvous of two mobile agents starting at distinct locations in an unknown graph. The agents have distinct labels and walk in synchronous steps. However the graph is unlabelled and the agents have no means of marking the nodes of the graph and cannot communicate with or see each other until they meet at a node. When the graph is very large we want the time to rendezvous to be independent of the graph size and to depend only on the initial distance between the agents and some local parameters such as the degree of the vertices, and the size of the agent's label. It is well known that even for simple graphs of degree Δ\Delta, the rendezvous time can be exponential in Δ\Delta in the worst case. In this paper, we introduce a new version of the rendezvous problem where the agents are equipped with a device that measures its distance to the other agent after every step. We show that these \emph{distance-aware} agents are able to rendezvous in any unknown graph, in time polynomial in all the local parameters such the degree of the nodes, the initial distance DD and the size of the smaller of the two agent labels l=min(l1,l2)l = \min(l_1, l_2). Our algorithm has a time complexity of O(Δ(D+logl))O(\Delta(D+\log{l})) and we show an almost matching lower bound of Ω(Δ(D+logl/logΔ))\Omega(\Delta(D+\log{l}/\log{\Delta})) on the time complexity of any rendezvous algorithm in our scenario. Further, this lower bound extends existing lower bounds for the general rendezvous problem without distance awareness

    Fault-Tolerant Aggregation: Flow-Updating Meets Mass-Distribution

    Get PDF
    Flow-Updating (FU) is a fault-tolerant technique that has proved to be efficient in practice for the distributed computation of aggregate functions in communication networks where individual processors do not have access to global information. Previous distributed aggregation protocols, based on repeated sharing of input values (or mass) among processors, sometimes called Mass-Distribution (MD) protocols, are not resilient to communication failures (or message loss) because such failures yield a loss of mass. In this paper, we present a protocol which we call Mass-Distribution with Flow-Updating (MDFU). We obtain MDFU by applying FU techniques to classic MD. We analyze the convergence time of MDFU showing that stochastic message loss produces low overhead. This is the first convergence proof of an FU-based algorithm. We evaluate MDFU experimentally, comparing it with previous MD and FU protocols, and verifying the behavior predicted by the analysis. Finally, given that MDFU incurs a fixed deviation proportional to the message-loss rate, we adjust the accuracy of MDFU heuristically in a new protocol called MDFU with Linear Prediction (MDFU-LP). The evaluation shows that both MDFU and MDFU-LP behave very well in practice, even under high rates of message loss and even changing the input values dynamically.Comment: 18 pages, 5 figures, To appear in OPODIS 201

    Mobile agent rendezvous: A survey

    Get PDF
    Abstract. Recent results on the problem of mobile agent rendezvous on distributed networks are surveyed with an emphasis on outlining the various approaches taken by researchers in the theoretical computer science community.

    Rendezvous of Heterogeneous Mobile Agents in Edge-weighted Networks

    Get PDF
    We introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal times for the other agent. The goal of the agents is to meet on an edge or a node of the graph. In this scenario, we study the time required by the agents to meet, compared to the meeting time TOPTT_{OPT} in the offline scenario in which the agents have complete knowledge about each others speed characteristics. When no additional assumptions are made, we show that rendezvous in our model can be achieved after time O(nTOPT)O(n T_{OPT}) in a nn-node graph, and that such time is essentially in some cases the best possible. However, we prove that the rendezvous time can be reduced to Θ(TOPT)\Theta (T_{OPT}) when the agents are allowed to exchange Θ(n)\Theta(n) bits of information at the start of the rendezvous process. We then show that under some natural assumption about the traversal times of edges, the hardness of the heterogeneous rendezvous problem can be substantially decreased, both in terms of time required for rendezvous without communication, and the communication complexity of achieving rendezvous in time Θ(TOPT)\Theta (T_{OPT})

    Byzantine Gathering in Networks

    Full text link
    This paper investigates an open problem introduced in [14]. Two or more mobile agents start from different nodes of a network and have to accomplish the task of gathering which consists in getting all together at the same node at the same time. An adversary chooses the initial nodes of the agents and assigns a different positive integer (called label) to each of them. Initially, each agent knows its label but does not know the labels of the other agents or their positions relative to its own. Agents move in synchronous rounds and can communicate with each other only when located at the same node. Up to f of the agents are Byzantine. A Byzantine agent can choose an arbitrary port when it moves, can convey arbitrary information to other agents and can change its label in every round, in particular by forging the label of another agent or by creating a completely new one. What is the minimum number M of good agents that guarantees deterministic gathering of all of them, with termination? We provide exact answers to this open problem by considering the case when the agents initially know the size of the network and the case when they do not. In the former case, we prove M=f+1 while in the latter, we prove M=f+2. More precisely, for networks of known size, we design a deterministic algorithm gathering all good agents in any network provided that the number of good agents is at least f+1. For networks of unknown size, we also design a deterministic algorithm ensuring the gathering of all good agents in any network but provided that the number of good agents is at least f+2. Both of our algorithms are optimal in terms of required number of good agents, as each of them perfectly matches the respective lower bound on M shown in [14], which is of f+1 when the size of the network is known and of f+2 when it is unknown

    Developing a tool to assess trainees during crisis management training for major risks

    Get PDF
    International audienceOften based on simulation exercises, crisis management training helps prepare decision-makers to manage crises better. However, this training has definite limits in terms of trainee assessment and the feed-back given during the debriefing phase. This paper presents a method for better organising the assessment of trainees involved in a real time crisis management training exercises and for giving them feedback during the debriefing phase. The approach presented is based on creating a typology of training objectives in order to or-ganise the assessment. The assessment includes expected outcomes techniques as well as the human and or-ganisational factors that can be observed within a group. The assessment tools developed were then experi-mented within crisis management exercises completed with trainees. Beyond the basic results, these tools helped redefine the basic roles played by observers and trainers during training exercises

    Results from the Antarctic Muon and Neutrino Detector Array (AMANDA)

    Full text link
    We show new results from both the older and newer incarnations of AMANDA (AMANDA-B10 and AMANDA-II, respectively). These results demonstrate that AMANDA is a functioning, multipurpose detector with significant physics and astrophysics reach. They include a new higher-statistics measurement of the atmospheric muon neutrino flux and preliminary results from searches for a variety of sources of ultrahigh energy neutrinos: generic point sources, gamma-ray bursters and diffuse sources producing muons in the detector, and diffuse sources producing electromagnetic or hadronic showers in or near the detector.Comment: Invited talk at the XXth International Conference on Neutrino Physics and Astrophysics (Neutrino 2002), Munich, Germany, May 25-30, 200

    Strangeness Enhancement in p+Ap+A and S+AS+A Interactions at SPS Energies

    Full text link
    The systematics of strangeness enhancement is calculated using the HIJING and VENUS models and compared to recent data on pp\,pp\,, pA\,pA\, and AA\,AA\, collisions at CERN/SPS energies (200AGeV200A\,\, GeV\,). The HIJING model is used to perform a {\em linear} extrapolation from pppp to AAAA. VENUS is used to estimate the effects of final state cascading and possible non-conventional production mechanisms. This comparison shows that the large enhancement of strangeness observed in S+AuS+Au collisions, interpreted previously as possible evidence for quark-gluon plasma formation, has its origins in non-equilibrium dynamics of few nucleon systems. % Strangeness enhancement %is therefore traced back to the change in the production dynamics %from pppp to minimum bias pSpS and central SSSS collisions. A factor of two enhancement of Λ0\Lambda^{0} at mid-rapidity is indicated by recent pSpS data, where on the average {\em one} projectile nucleon interacts with only {\em two} target nucleons. There appears to be another factor of two enhancement in the light ion reaction SSSS relative to pSpS, when on the average only two projectile nucleons interact with two target ones.Comment: 29 pages, 8 figures in uuencoded postscript fil
    corecore