124 research outputs found

    Disjoint path protection in multi-hop wireless networks with interference constraints

    Get PDF
    We consider the problem of providing protection against failures in wireless networks by using disjoint paths. Disjoint path routing is commonly used in wired networks for protection, but due to the interference between transmitting nodes in a wireless setting, this approach has not been previously examined for wireless networks. In this paper, we develop a non-disruptive and resource-efficient disjoint path scheme that guarantees protection in wireless networks by utilizing capacity "recapturing" after a failure. Using our scheme, protection can oftentimes be provided for all demands using no additional resources beyond what was required without any protection. We show that the problem of disjoint path protection in wireless networks is not only NP-hard, but in fact remains NP-hard to approximate. We provide an ILP formulation to find an optimal solution, and develop corresponding time-efficient algorithms. Our approach utilizes 87% less protection resources on average than the traditional disjoint path routing scheme. For the case of 2-hop interference, which corresponds to the IEEE 802.11 standard, our protection scheme requires only 8% more resources on average than providing no protection whatsoever.National Science Foundation (U.S.) (CNS-1116209)National Science Foundation (U.S.) (CNS-1017800)United States. Defense Threat Reduction Agency (HDTRA-09-1-005

    Diff-Max: Separation of routing and scheduling in backpressure-based wireless networks

    Get PDF
    Original manuscript September 19, 2012Backpressure routing and scheduling, with throughput-optimal operation guarantee, is a promising technique to improve throughput in wireless multi-hop networks. Although backpressure is conceptually viewed as layered, the decisions of routing and scheduling are made jointly, which imposes several challenges in practice. In this work, we present Diff-Max, an approach that separates routing and scheduling and has three strengths: (i) Diff-Max improves throughput significantly, (ii) the separation of routing and scheduling makes practical implementation easier by minimizing cross-layer operations; i.e., routing is implemented in the network layer and scheduling is implemented in the link layer, and (iii) the separation of routing and scheduling leads to modularity; i.e., routing and scheduling are independent modules in Diff-Max, and one can continue to operate even if the other does not. Our approach is grounded in a network utility maximization (NUM) formulation and its solution. Based on the structure of Diff-Max, we propose two practical schemes: Diff-subMax and wDiff-subMax. We demonstrate the benefits of our schemes through simulation in ns-2.National Science Foundation (U.S.) (Grant CNS-0915988)United States. Office of Naval Research (Grant N00014-12-1-0064)United States. Army Research Office. Multidisciplinary University Research Initiative (Grant W911NF-08-1-0238

    Optimal Control for Generalized Network-Flow Problems

    Get PDF
    We consider the problem of throughput-optimal packet dissemination, in the presence of an arbitrary mix of unicast, broadcast, multicast, and anycast traffic, in an arbitrary wireless network. We propose an online dynamic policy, called Universal Max-Weight (UMW), which solves the problem efficiently. To the best of our knowledge, UMW is the first known throughput-optimal policy of such versatility in the context of generalized network flow problems. Conceptually, the UMW policy is derived by relaxing the precedence constraints associated with multi-hop routing and then solving a min-cost routing and max-weight scheduling problem on a virtual network of queues. When specialized to the unicast setting, the UMW policy yields a throughput-optimal cycle-free routing and link scheduling policy. This is in contrast with the well-known throughput-optimal back-pressure (BP) policy which allows for packet cycling, resulting in excessive latency. Extensive simulation results show that the proposed UMW policy incurs a substantially smaller delay as compared with the BP policy. The proof of throughput-optimality of the UMW policy combines ideas from the stochastic Lyapunov theory with a sample path argument from adversarial queueing theory and may be of independent theoretical interest

    Scheduling over time varying channels with hidden state information

    Get PDF
    We consider the problem of scheduling transmissions over a wireless downlink when channel state information (CSI) is not available to the transmitter. We assume channel states are time varying and evolve according to a Markov Chain. We show that using current QLI does not stabilize the system due to correlations between backlog and channel state. We show that the throughput optimal scheduling policy in this context must use delayed queue length information (QLI). We characterize the extent to which QLI must be delayed as a function of the channel state statistics.National Science Foundation (U.S.) (Grant CNS-1217048)United States. Office of Naval Research (Grant N00014-12-1-0064

    Network protection with guaranteed recovery times using recovery domains

    Get PDF
    We consider the problem of providing network protection that guarantees the maximum amount of time that flow can be interrupted after a failure. This is in contrast to schemes that offer no recovery time guarantees, such as IP rerouting, or the prevalent local recovery scheme of Fast ReRoute, which often over-provisions resources to meet recovery time constraints. To meet these recovery time guarantees, we provide a novel and flexible solution by partitioning the network into failure-independent “recovery domains”, where within each domain, the maximum amount of time to recover from a failure is guaranteed. We show the recovery domain problem to be NP-Hard, and develop an optimal solution in the form of an MILP for both the case when backup capacity can and cannot be shared. This provides protection with guaranteed recovery times using up to 45% less protection resources than local recovery. We demonstrate that the network-wide optimal recovery domain solution can be decomposed into a set of easier to solve subproblems. This allows for the development of flexible and efficient solutions, including an optimal algorithm using Lagrangian relaxation, which simulations show to converge rapidly to an optimal solution. Additionally, an algorithm is developed for when backup sharing is allowed. For dynamic arrivals, this algorithm performs better than the solution that tries to greedily optimize for each incoming demand.National Science Foundation (U.S.) (NSF grant CNS-1017800)National Science Foundation (U.S.) (grant CNS-0830961)United States. Defense Threat Reduction Agency (grant HDTRA-09-1-005)United States. Defense Threat Reduction Agency (grant HDTRA1-07-1-0004)United States. Air Force (Air Force contract # FA8721-05-C-0002

    Providing protection in multi-hop wireless networks

    Get PDF
    We consider the problem of providing protection against failures in wireless networks subject to interference constraints. Typically, protection in wired networks is provided through the provisioning of backup paths. This approach has not been previously considered in the wireless setting due to the prohibitive cost of backup capacity. However, we show that in the presence of interference, protection can often be provided with no loss in throughput. This is due to the fact that after a failure, links that previously interfered with the failed link can be activated, thus leading to a “recapturing” of some of the lost capacity. We provide both an ILP formulation for the optimal solution, as well as algorithms that perform close to optimal. More importantly, we show that providing protection in a wireless network uses as much as 72% less protection resources as compared to similar protection schemes designed for wired networks, and that in many cases, no additional resources for protection are needed.National Science Foundation (U.S.) (Grant CNS-1116209)National Science Foundation (U.S.) (Grant CNS-0830961)United States. Defense Threat Reduction Agency (Grant HDTRA-09-1-005)United States. Air Force (Contract FA8721-05-C-0002

    Assessing the effect of geographically correlated failures on interconnected power-communication networks

    Get PDF
    We study the reliability of power transmission networks under regional disasters. Initially, we quantify the effect of large-scale non-targeted disasters and their resulting cascade effects on power networks. We then model the dependence of data networks on the power systems and consider network reliability in this dependent network setting. Our novel approach provides a promising new direction for modeling and designing networks to lessen the effects of geographical disasters.National Science Foundation (U.S.). (grant CNS-1017800)National Science Foundation (U.S.). (grant CNS-0830961)United States. Defense Threat Reduction Agency (HDTRA-09-1-005 )United States. Defense Threat Reduction Agency (HDTRA-1-13-10021

    Optimal channel probing in communication systems: The two-channel case

    Get PDF
    We consider a multi-channel communication system in which a transmitter has access to two channels, but does not know the state of either channel. We model the channel state using an ON/OFF Markovian model, and allow the transmitter to probe one of the channels at predetermined probing intervals to decide over which channel to transmit. For models in which the transmitter must transmit over the probed channel, it has been shown that a myopic policy that probes the channel most likely to be ON is optimal. In this work, we allow the transmitter to select a channel over which to transmit that is not necessarily the one it probed. We show that in the case where the two channels are i.i.d, all probing policies yield equal reward. We extend this problem to dynamically choose when to probe based on the results of previous probes, and characterize the optimal policy, as well as provide a LP in terms of state action frequencies to find the optimal policy.National Science Foundation (U.S.) (Grant CNS-0915988)National Science Foundation (U.S.) (Grant CNS-1217048)United States. Army Research Office. Multidisciplinary University Research Initiative (Grant W911NF-08-1-0238

    Network Reliability under Random Circular Cuts

    Get PDF
    Optical fiber networks consist of fibers that are laid out along physical terrestrial paths. As such, they are vulnerable to geographical physical failures, such as earthquakes and Electromagnetic Pulse (EMP) attacks. Moreover, such disasters can lead to multiple, geographically correlated, failures on the fiber network. Thus, the geographical layout of the fiber infrastructure has a critical impact on the robustness of the network in the face of such geographical physical failures. In this paper, we develop tools to analyze network connectivity after a `random' geographic disaster. The random location of the disaster allows us to model situations where the physical failures are not targeted attacks. In particular, we consider disasters that take the form of a `randomly' located disk in a plane. Using results from geometric probability, we are able to approximate some network performance metrics to such a disaster in polynomial time. We present some numerical results that make clear geographically correlated failures are fundamentally different from independent failures and then discuss network design in the context of random disk-cuts.National Science Foundation (U.S.) (Grant CNS-0830961)National Science Foundation (U.S.) (Grant CNS-1017800)United States. Defense Threat Reduction Agency (Grant HDTRA1-07-1-0004)United States. Defense Threat Reduction Agency (Grant HDTRA-09-1-005
    • …
    corecore