-
Application of S-band for Protection in Multi-band Flexible-Grid Optical Networks
Authors:
Varsha Lohani,
Anjali Sharma,
Yatindra Nath Singh
Abstract:
The core network is experiencing bandwidth capacity constraints as internet traffic grows. As a result, the notion of a Multi-band flexible-grid optical network was established to increase the lifespan of an optical core network. In this paper, we use the C+L band for working traffic transmission and the S-band for protection against failure. Furthermore, we compare the proposed method with the ex…
▽ More
The core network is experiencing bandwidth capacity constraints as internet traffic grows. As a result, the notion of a Multi-band flexible-grid optical network was established to increase the lifespan of an optical core network. In this paper, we use the C+L band for working traffic transmission and the S-band for protection against failure. Furthermore, we compare the proposed method with the existing ones.
△ Less
Submitted 2 April, 2024;
originally announced April 2024.
-
Protected Working Groups-based Resilient Resource Provisioning in MCF-enabled SDM-EONs
Authors:
Anjali Sharma,
Varsha Lohani,
Yatindra Nath Singh
Abstract:
Space Division Multiplexed- Elastic Optical Networks using Multicore Fibers are a promising and viable solution to meet the increasing heterogeneous bandwidth demands. The extra capacity gained due to spatial parameters in SDM-EONs could encounter detrimental losses if any link fails and timely restoration is not done. This paper proposes a Protected and Unprotected Working Core Groups assignment…
▽ More
Space Division Multiplexed- Elastic Optical Networks using Multicore Fibers are a promising and viable solution to meet the increasing heterogeneous bandwidth demands. The extra capacity gained due to spatial parameters in SDM-EONs could encounter detrimental losses if any link fails and timely restoration is not done. This paper proposes a Protected and Unprotected Working Core Groups assignment (PWCG/ UPWCG) scheme for differentiated connection requests in multicore fiber-enabled SDM-EONs. A PWCG is inherently protected by resources in a Dedicated Spare Core Group (DSCG). First, we divide the cores into three groups using traffic and crosstalk considerations. In the second step, we use the obtained core groups for resource provisioning in dynamic network scenarios. The effectiveness of our proposed technique is compared with a Link Disjoint Path Protection (LDPP) technique, and the simulation study verifies our assertions and the findings.
△ Less
Submitted 20 November, 2023;
originally announced November 2023.
-
Credit Blockchain for Faster Transactions in P2P Energy Trading
Authors:
Amit kumar Vishwakarma,
Yatindra Nath Singh
Abstract:
P2P trading of energy can be a good alternative to incentivize distributed non-conventional energy production and meet the burgeoning energy demand. For efficient P2P trading, a free market for trading needs to be established while ensuring the information reliability, security, and privacy. Blockchain has been used to provide this framework, but it consumes very high energy and is slow. Further,…
▽ More
P2P trading of energy can be a good alternative to incentivize distributed non-conventional energy production and meet the burgeoning energy demand. For efficient P2P trading, a free market for trading needs to be established while ensuring the information reliability, security, and privacy. Blockchain has been used to provide this framework, but it consumes very high energy and is slow. Further, until now, no blockchain model has considered the role of conventional electric utility companies in P2P trading. In this paper, we have introduced a credit blockchain that reduces energy consumption by employing a new mechanism to update transactions and increases speed by providing interest free loans to buyers. This model also integrates the electric utility companies within the P2P trading framework, thereby increasing members trading options. We have also discussed the pricing strategies for trading. All the above assertions have been verified through simulations, demonstrating that this model will promote P2P trading by providing enhanced security, speed, and greater trading options. The proposed model will also help trade energy at prices beneficial for both sellers and buyers.
△ Less
Submitted 21 November, 2023; v1 submitted 13 October, 2023;
originally announced October 2023.
-
Generalized Distance Metric for Various DHT Routing Algorithms in Peer-to-Peer Networks
Authors:
Rashmi Kushwaha,
Shreyas Kulkarni,
Yatindra Nath Singh
Abstract:
We present a generalized distance metric that can be used to implement routing strategies and identify routing table entries to reach the root node for a given key, in a DHT (Distributed Hash Table) network based on either Chord, Kademlia, Tapestry, or Pastry. The generalization shows that all the above four DHT algorithms are in fact, the same algorithm but with different parameters in distance r…
▽ More
We present a generalized distance metric that can be used to implement routing strategies and identify routing table entries to reach the root node for a given key, in a DHT (Distributed Hash Table) network based on either Chord, Kademlia, Tapestry, or Pastry. The generalization shows that all the above four DHT algorithms are in fact, the same algorithm but with different parameters in distance representation. We also proposes that nodes can have routing tables of varying sizes based on their memory capabilities but with the fact that each node must have at least two entries, one for the node closest from it, and the other for the node from whom it is closest in each ring components for all the algorithms. Messages will always reach the correct root nodes by following the above rule. We also further observe that in any network, if the distance metric to define the root node in the DHT is same at all the nodes, then the root node for a key will also be the same, irrespective of the size of the routing table at different nodes.
△ Less
Submitted 28 February, 2024; v1 submitted 24 March, 2023;
originally announced March 2023.
-
Availability-Aware Dynamic RSA with Protection using Consecutive Sub-Channels
Authors:
Varsha Lohani,
Anjali Sharma,
Yatindra Nath Singh
Abstract:
Flexible grid Optical Networks provide efficient spectrum utilization by employing the mechanisms to provide flexibility in the optical channel (spectrum slot) sizes. One of the research problems in Flexible grid Optical Networks is their survivability against failure. On the other hand, p-Cycles have not found practical use due to the significant compute time required for finding optimal configur…
▽ More
Flexible grid Optical Networks provide efficient spectrum utilization by employing the mechanisms to provide flexibility in the optical channel (spectrum slot) sizes. One of the research problems in Flexible grid Optical Networks is their survivability against failure. On the other hand, p-Cycles have not found practical use due to the significant compute time required for finding optimal configuration for the size of networks seen in real-life. Therefore, for real-time scenarios, we can write heuristics which can assign protection to the new working paths without disturbing the existing traffic on all the other routes in flexible grid networks. The provisioning of protection to each link or path of the lightpath requests can be done using Dynamic Cycles (D-Cycles) or Dynamic Shared Backup Resource Protection (D-SBRP). However, protecting each link or path can lead to the wastage of the resources in the network.
△ Less
Submitted 10 June, 2022;
originally announced June 2022.
-
Optimal Slot Size under Various Bandwidth Distributions in the Flexible-grid Optical Networks
Authors:
Varsha Lohani,
Anjali Sharma,
Yatindra Nath Singh
Abstract:
Flexible grid Optical Networks are efficient mechanism to provide flexibility in the optical spectrum utilization. For such networks, the slot width size as specified by the ITU-T G.694.1 is 12.5 GHz. However, one should question if it is the optimal grid size? In this paper, under different bandwidth distribution scenarios, we review which slot size give appropriate spectrum efficiency. Moreover,…
▽ More
Flexible grid Optical Networks are efficient mechanism to provide flexibility in the optical spectrum utilization. For such networks, the slot width size as specified by the ITU-T G.694.1 is 12.5 GHz. However, one should question if it is the optimal grid size? In this paper, under different bandwidth distribution scenarios, we review which slot size give appropriate spectrum efficiency. Moreover, we present a study of the slot sizes with varying incoming traffic having some bandwidth requirement under different scenarios.
△ Less
Submitted 14 December, 2021;
originally announced December 2021.
-
Dynamic Routing and Spectrum Assignment based on the Availability of Consecutive Sub-channels in Flexi-grid Optical Networks
Authors:
Varsha Lohani,
Anjali Sharma,
Yatindra Nath Singh
Abstract:
Using Optical Orthogonal Frequency Multiplexing (O-OFDM), variable bandwidth channels can be created in Elastic Optical Networks (EON). This allows the use of spectrum more efficiently by allocating integral multiple of basic bandwidth slots to the lightpath requests. Consequently, such networks are also called flexible grid optical networks. It also adds a constraint of kee** all the allocated…
▽ More
Using Optical Orthogonal Frequency Multiplexing (O-OFDM), variable bandwidth channels can be created in Elastic Optical Networks (EON). This allows the use of spectrum more efficiently by allocating integral multiple of basic bandwidth slots to the lightpath requests. Consequently, such networks are also called flexible grid optical networks. It also adds a constraint of kee** all the allocated slots together when deciding the routes for the requests. This constraint called the contiguity constraint makes the routing and spectrum algorithms more challenging. In any network, the lightpath requests will arrive and depart dynamically and will invariably lead to spectrum fragmentation, and hence network will have a reduction in maximum possible utilization due to increased blocking probability. In this paper, we have presented an improvised RSA algorithm that leads to lesser fragmentation. It is evident from the results that the presented RSA algorithm uses adaptive parameters to reduce the blocking probability and fragmentation compared to other algorithms reported in the recent past.
△ Less
Submitted 2 October, 2021; v1 submitted 16 May, 2021;
originally announced May 2021.
-
A Vectored Fragmentation Metric for Elastic Optical Networks
Authors:
Anjali Sharma,
Varsha Lohani,
Yatindra Nath Singh
Abstract:
When circuits are set up and dismantled dynamically in elastic optical networks, spectrum tends to become fragmented in the fiber links. The fragmentation limits the available path choices and may lead to significant blocking of connection requests. There are two types of fragmentation in the network spectrum in the links due to contiguity constraints and over the paths due to continuity. Study of…
▽ More
When circuits are set up and dismantled dynamically in elastic optical networks, spectrum tends to become fragmented in the fiber links. The fragmentation limits the available path choices and may lead to significant blocking of connection requests. There are two types of fragmentation in the network spectrum in the links due to contiguity constraints and over the paths due to continuity. Study of fragmentation and its management is essential to operate the networks efficiently. This paper proposes a vectored fragmentation metric for characterizing the fragmentation, which covers both types of fragmentation. We discuss the characteristics of this metric in both transient and steady-state of the dynamic network. We also test the proposed metric for connection requests granularity range, arrival rates and holding times, to establish functionality of this metric. We also compare the link-based fragmentation metric with our Vectored Fragmentation Metric to understand the better representation.
△ Less
Submitted 17 February, 2021;
originally announced February 2021.
-
Sub-Graph p-cycle formation for span failures in all-Optical Networks
Authors:
Varsha Lohani,
Anjali Sharma,
Yatindra Nath Singh
Abstract:
p-Cycles offer ring-like switching speed and mesh-like spare capacity efficiency for protecting network against link failures. This makes them extremely efficient and effective protection technique. p-Cycles can also protect all the links in a network against simultaneous failures of multiple links. But it has been mostly studied for single link failure scenarios in the networks with the objective…
▽ More
p-Cycles offer ring-like switching speed and mesh-like spare capacity efficiency for protecting network against link failures. This makes them extremely efficient and effective protection technique. p-Cycles can also protect all the links in a network against simultaneous failures of multiple links. But it has been mostly studied for single link failure scenarios in the networks with the objective to minimize spare capacity under the condition of100% restorability. For large networks, use of p-cycles is difficult because their optimization requires an excessive amount of time as the number of variables in the corresponding Integer Linear Program (ILP) increase with the increase in the network size. In a real-time network situation,setting up a highly efficient protection in a short time is essential.Thus, we introduce a network sub-graphing approach, in which a network is segmented into smaller parts based on certain network attributes. Then, an optimal solution is found for each sub-graph. Finally, the solutions for all the sub-graphs is combined to get a sub-optimal solution for the whole network. We achieved better computational efficiency at the expense of marginal spare capacity increases with this approach.
△ Less
Submitted 15 February, 2021;
originally announced February 2021.
-
On Partial Coverage and Connectivity Relationship in Deterministic WSN Topologies
Authors:
Rameshwar Nath Tripathi,
Kumar Gaurav,
Yatindra Nath Singh
Abstract:
The primary function of a sensor network is to perform the sensing task. For proper sensing, the coverage and connectivity property of the network must be maintained. Relationship between coverage and connectivity has been extensively investigated for full coverage scenarios. But, investing in full coverage incurs unnecessary cost when partial coverage is sufficient. In this work, we focus on the…
▽ More
The primary function of a sensor network is to perform the sensing task. For proper sensing, the coverage and connectivity property of the network must be maintained. Relationship between coverage and connectivity has been extensively investigated for full coverage scenarios. But, investing in full coverage incurs unnecessary cost when partial coverage is sufficient. In this work, we focus on the relationship between partial coverage and connectivity. We find the conditions when partial coverage implies connectivity as a function of coverage fraction. This condition facilitates the network designers to configure the connected network for desired coverage fraction.
△ Less
Submitted 2 September, 2019;
originally announced September 2019.
-
Going Viral: The Epidemiological Strategy of Referral Marketing
Authors:
Sayantari Ghosh,
Saumik Bhattacharya,
Kumar Gaurav,
Yatindra Nath Singh
Abstract:
By now, Internet word-of-mouth marketing has established its importance for almost every kind of products. When word-of-mouth spread of a marketing campaign goes viral, the success of its strategy has been proved to be path-breaking for the firms. The current study is designed to extend knowledge about customer response to these campaigns, and is focused on the motivations that lead them to differ…
▽ More
By now, Internet word-of-mouth marketing has established its importance for almost every kind of products. When word-of-mouth spread of a marketing campaign goes viral, the success of its strategy has been proved to be path-breaking for the firms. The current study is designed to extend knowledge about customer response to these campaigns, and is focused on the motivations that lead them to different responses. Primary goal of this study is to investigate the reasons that drive this dynamics and to generate a justified theoretical framework of diffusion dynamics of viral marketing campaigns. A rigorous analysis of data obtained through a questionnaire-based survey helped us to understand how people, who are from different age group, sex and locations, define and evaluate the encounter with a referral campaign online, in similar and unique logical ways. The key finding was a conceptual framework of customer motivation which in turn dictates the dynamics of the campaign. We have identified important themes related to customer motives, like significance of: incentives and ease, inherent forgetting, reminders from peers compared to company's remarketing mails, trust and brand value etc. Drawing an analogy with differential equation-based models of infectious disease spread, this paper further provides some initial evidence that participation in viral marketing campaigns has several consumer related dynamical factors which can be incorporated in an epidemiological model for mathematical treatment, to indicate key operational factors in ensuring an effective spread of the marketing campaign.
△ Less
Submitted 11 August, 2018;
originally announced August 2018.
-
Impact Zone Analysis of p-Cycle
Authors:
Pallavi Athe,
Yatindra Nath Singh
Abstract:
Pre-configured cycle (p-Cycle) method has been studied in literature extensively for optical network protection. A large p-cycle has high capacity efficiency and can protect a large number of nodes against the single link failure scenarios. All the links protected by such a p-cycle lose protection when the p-cycle is consumed to restore traffic after a failure. As the probability of multiple link…
▽ More
Pre-configured cycle (p-Cycle) method has been studied in literature extensively for optical network protection. A large p-cycle has high capacity efficiency and can protect a large number of nodes against the single link failure scenarios. All the links protected by such a p-cycle lose protection when the p-cycle is consumed to restore traffic after a failure. As the probability of multiple link failure is high for a large network, it also means that with higher probability, on the second failure, protection may not be there for the failed link. Thus, if the number of links protected by a p-cycle is large, it makes the network unprotected with high probability on the advent of the second failure. In this paper, we study the impact zone due to a first link failure in the various configurations of the p-cycles. The study gives insight into how to choose the p-cycle configuration to reduce the impact zone while using minimum spare capacity. We propose few methods and compare them to show how the impact zone analysis can be used to improve the fault tolerance in an optical network.
△ Less
Submitted 21 June, 2018;
originally announced June 2018.
-
Analysis of Average Consensus Algorithm for Asymmetric Regular Networks
Authors:
Sateeshkrishna Dhuli,
Y. N. Singh
Abstract:
Average consensus algorithms compute the global average of sensor data in a distributed fashion using local sensor nodes. Simple execution, decentralized philosophy make these algorithms suitable for WSN scenarios. Most of the researchers have studied the average consensus algorithms by modeling the network as an undirected graph. But, WSNs in practice consist of asymmetric links and the undirecte…
▽ More
Average consensus algorithms compute the global average of sensor data in a distributed fashion using local sensor nodes. Simple execution, decentralized philosophy make these algorithms suitable for WSN scenarios. Most of the researchers have studied the average consensus algorithms by modeling the network as an undirected graph. But, WSNs in practice consist of asymmetric links and the undirected graph cannot model the asymmetric links. Therefore, these studies fail to study the actual performance of consensus algorithms on WSNs. In this paper, we model the WSN as a directed graph and derive the explicit formulas of the ring, torus, $r$-nearest neighbor ring, and $m$-dimensional torus networks. Numerical results subsequently demonstrate the accuracy of directed graph modeling. Further, we study the effect of asymmetric links, the number of nodes, network dimension, and node overhead on the convergence rate of average consensus algorithms.
△ Less
Submitted 18 August, 2018; v1 submitted 11 June, 2018;
originally announced June 2018.
-
Convergence Rate Analysis for Periodic Gossip Algorithms in Wireless Sensor Networks
Authors:
S. Kouachi,
Sateeshkrishna Dhuli,
Y. N. Singh
Abstract:
Periodic gossip algorithms have generated a lot of interest due to their ability to compute the global statistics by using local pairwise communications among nodes. Simple execution, robustness to topology changes, and distributed nature make these algorithms quite suitable for wireless sensor networks (WSN). However, these algorithms converge to the global statistics after certain rounds of pair…
▽ More
Periodic gossip algorithms have generated a lot of interest due to their ability to compute the global statistics by using local pairwise communications among nodes. Simple execution, robustness to topology changes, and distributed nature make these algorithms quite suitable for wireless sensor networks (WSN). However, these algorithms converge to the global statistics after certain rounds of pair-wise communications. A significant challenge for periodic gossip algorithms is difficult to predict the convergence rate for large-scale networks. To facilitate the convergence rate evaluation, we study a one-dimensional lattice network model. In this scenario, to derive the explicit formula for convergence rate, we have to obtain a closed form expression for second largest eigenvalue of perturbed pentadiagonal matrices. In our approach, we derive the explicit expressions of eigenvalues by exploiting the theory of recurrent sequences. Unlike the existing methods in the literature, this is a direct method which avoids the theory of orthogonal polynomials [18]. Finally, we derive the explicit expressions for convergence rate of the average periodic gossip algorithm in one-dimensional WSNs. We analyze the convergence rate by considering the linear weight updating approach and investigate the impact of gossip weights on the convergence rates for a different number of nodes. Further, we also study the effect of link failures on the convergence rate for average periodic gossip algorithms.
△ Less
Submitted 14 August, 2018; v1 submitted 7 May, 2018;
originally announced May 2018.
-
Simplified Biased Contribution Index (SBCI): A Mechanism to Make P2P Network Fair and Efficient for Resource Sharing
Authors:
Sateesh Kumar Awasthi,
Yatindra Nath Singh
Abstract:
To balance the load and to discourage the free-riding in peer-to-peer (P2P) networks, many incentive mechanisms and policies have been proposed in recent years. Global peer ranking is one such mechanism. In this mechanism, peers are ranked based on a metric called contribution index. Contribution index is defined in such a manner that peers are motivated to share the resources in the network. Fair…
▽ More
To balance the load and to discourage the free-riding in peer-to-peer (P2P) networks, many incentive mechanisms and policies have been proposed in recent years. Global peer ranking is one such mechanism. In this mechanism, peers are ranked based on a metric called contribution index. Contribution index is defined in such a manner that peers are motivated to share the resources in the network. Fairness in the terms of upload to download ratio in each peer can be achieved by this method. However, calculation of contribution index is not trivial. It is computed distributively and iteratively in the entire network and requires strict clock synchronization among the peers. A very small error in clock synchronization may lead to wrong results. Furthermore, iterative calculation requires a lot of message overhead and storage capacity, which makes its implementation more complex. In this paper, we are proposing a simple incentive mechanism based on the contributions of peers, which can balance the upload and download amount of resources in each peer. It does not require iterative calculation, therefore, can be implemented with lesser message overhead and storage capacity without requiring strict clock synchronization. This approach is efficient as there are very less rejections among the cooperative peers. It can be implemented in a truly distributed fashion with $O(N)$ time complexity per peer.
△ Less
Submitted 26 February, 2017;
originally announced February 2017.
-
Double Link Failure Protection using a Single P-cycle
Authors:
Pallavi Athe,
Yatindra Nath Singh
Abstract:
In this letter, we investigate survivability in optical networks for protection from two simultaneous link failures. Failure probability of two links with overlap** protection can be high if these links are geographically close. In a network with deterministic single link protection, simultaneous failure of two links may lead to partial or full loss of traffic on the failed links. Two link failu…
▽ More
In this letter, we investigate survivability in optical networks for protection from two simultaneous link failures. Failure probability of two links with overlap** protection can be high if these links are geographically close. In a network with deterministic single link protection, simultaneous failure of two links may lead to partial or full loss of traffic on the failed links. Two link failure protection will make the network more resilient by protecting double failures having overlap** protection. A method for achieving double fault tolerance is double cycle method (DB); it uses two pre-configured cycles (p-cycles) to protect a link. Single p-cycle (SG) method, which uses one p-cycle to protect a link from two simultaneous link failure is introduced in this letter. Integer linear programs (ILP) are formulated for the SG method as well as DB method. It has been observed that the SG method provides a solution to bigger networks with lesser computational resources as compared to the DB method.
△ Less
Submitted 3 May, 2017; v1 submitted 4 January, 2017;
originally announced January 2017.
-
Analysis of Network Robustness for Finite Sized Wireless Sensor Networks
Authors:
Sateeshkrishna Dhuli,
Chakravarthy Gopi,
Yatindra Nath Singh
Abstract:
Studying network robustness for wireless sensor networks(WSNs) is an exciting topic of research as sensor nodes often fail due to hardware degradation, resource constraints, and environmental changes. The application of spectral graph theory to networked systems has generated several important results. However, previous research has often failed to consider the network parameters, which is crucial…
▽ More
Studying network robustness for wireless sensor networks(WSNs) is an exciting topic of research as sensor nodes often fail due to hardware degradation, resource constraints, and environmental changes. The application of spectral graph theory to networked systems has generated several important results. However, previous research has often failed to consider the network parameters, which is crucial to study the real network applications. Network criticality is one of the effective metrics to quantify the network robustness against such failures and attacks. In this work, we derive the exact formulas of network criticality for WSNs using r-nearest neighbor networks and we show the effect of nearest neighbors and network dimension on robustness using analytical and numerical evaluations. Furthermore, we also show how symmetric and static approximations can wrongly designate the network robustness when implemented to WSNs.
△ Less
Submitted 1 April, 2021; v1 submitted 22 September, 2016;
originally announced September 2016.
-
Biased Contribution Index: A Simpler Mechanism to Maintain Fairness in Peer to Peer Network
Authors:
Sateesh Kumar Awasthi,
Yatindra Nath Singh
Abstract:
To maintain fairness, in the terms of resources shared by an individual peer, a proper incentive policy is required in a peer to peer network. This letter proposes, a simpler mechanism to rank the peers based on their resource contributions to the network. This mechanism will suppress the free riders from downloading the resources from the network. Contributions of the peers are biased in such a w…
▽ More
To maintain fairness, in the terms of resources shared by an individual peer, a proper incentive policy is required in a peer to peer network. This letter proposes, a simpler mechanism to rank the peers based on their resource contributions to the network. This mechanism will suppress the free riders from downloading the resources from the network. Contributions of the peers are biased in such a way that it can balance the download and upload amount of resources at each peer. This mechanism can be implemented in a distributed system and it converges much faster than the other existing approaches.
△ Less
Submitted 2 June, 2016;
originally announced June 2016.
-
Generalized Analysis of Convergence of Absolute Trust in Peer to Peer Networks
Authors:
Sateesh Kumar Awasthi,
Yatindra Nath Singh
Abstract:
Open and anonymous nature of peer to peer networks provides an opportunity to malicious peers to behave unpredictably in the network. This leads the lack of trust among the peers. To control the behavior of peers in the network, reputation system can be used. In a reputation system, aggregation of trust is a primary issue. Algorithm for aggregation of trust should be designed such that, it can con…
▽ More
Open and anonymous nature of peer to peer networks provides an opportunity to malicious peers to behave unpredictably in the network. This leads the lack of trust among the peers. To control the behavior of peers in the network, reputation system can be used. In a reputation system, aggregation of trust is a primary issue. Algorithm for aggregation of trust should be designed such that, it can converge to a certain finite value. Absolute Trust is one of the algorithm, which is used for the aggregation of trust in peer to peer networks. In this letter, we present the generalized analysis of convergence of the Absolute Trust algorithm.
△ Less
Submitted 2 March, 2016;
originally announced March 2016.
-
Absolute Trust: Algorithm for Aggregation of Trust in Peer-to- Peer Networks
Authors:
Sateesh Kumar Awasthi,
Yatindra Nath Singh
Abstract:
To mitigate the attacks by malicious peers and to motivate the peers to share the resources in peer-to-peer networks, several reputation systems have been proposed in the past. In most of them, the peers evaluate other peers based on their past interactions and then aggregate this information in the whole network. However such an aggregation process requires approximations in order to converge at…
▽ More
To mitigate the attacks by malicious peers and to motivate the peers to share the resources in peer-to-peer networks, several reputation systems have been proposed in the past. In most of them, the peers evaluate other peers based on their past interactions and then aggregate this information in the whole network. However such an aggregation process requires approximations in order to converge at some global consensus. It may not be the true reflection of past behavior of the peers. Moreover such type of aggregation gives only the relative ranking of peers without any absolute evaluation of their past. This is more significant when all the peers responding to a query, are malicious. In such a situation, we can only know that who is better among them without knowing their rank in the whole network. In this paper, we are proposing a new algorithm which accounts for the past behavior of the peers and will estimate the absolute value of the trust of peers. Consequently, we can suitably identify them as a good peers or malicious peers. Our algorithm converges at some global consensus much faster by choosing suitable parameters. Because of its absolute nature it will equally load all the peers in network. It will also reduce the inauthentic download in the network which was not possible in existing algorithms.
△ Less
Submitted 7 January, 2016;
originally announced January 2016.
-
Loop Free Multipath Routing Algorithm
Authors:
Rashmi Singh,
Yatindra Nath Singh,
Anita Yadav
Abstract:
Single path routing that is currently used in the internet routers,is easy to implement as it simplifies the routing tables and packet flow paths. However it is not optimal and has shortcomings in utilizing the network resources optimally, load balancing & fast recovery in case of faults (fault tolerance). The given algorithm resolves all these problems by using all possible multiple paths for tra…
▽ More
Single path routing that is currently used in the internet routers,is easy to implement as it simplifies the routing tables and packet flow paths. However it is not optimal and has shortcomings in utilizing the network resources optimally, load balancing & fast recovery in case of faults (fault tolerance). The given algorithm resolves all these problems by using all possible multiple paths for transfer of information, while retaining loop-free property. We have proposed a new dynamic loop-free multipath routing algorithm which improves network throughput and network resource utilization, reduces average transmission delay, and is not affected by faults in the links and router nodes. The main idea of this algorithm is to maintain multiple possible next hops for a destination along with weights. At every node, the traffic to a destination is split among multiple next hops in proportion to the estimated weights. The number of multiple next hops also changes depending on the traffic conditions, but it is never less than one.
△ Less
Submitted 6 January, 2016;
originally announced January 2016.
-
Resource allocation in Peer-to-Peer Networks: A Control-Theoretical Perspective
Authors:
Nitin Singha,
Ruchir Gupta,
Yatindra Nath Singh
Abstract:
P2P system rely on voluntary allocation of resources by its members due to absence of any central controlling authority. This resource allocation can be viewed as classical control problem where feedback is the amount of resource received, which controls the output i.e. the amount of resources shared back to the network by the node. The motivation behind the use of control system in resource alloc…
▽ More
P2P system rely on voluntary allocation of resources by its members due to absence of any central controlling authority. This resource allocation can be viewed as classical control problem where feedback is the amount of resource received, which controls the output i.e. the amount of resources shared back to the network by the node. The motivation behind the use of control system in resource allocation is to exploit already existing tools in control theory to improve the overall allocation process and thereby solving the problem of freeriding and whitewashing in the network. At the outset, we have derived the transfer function to model the P2P system. Subsequently, through the simulation results we have shown that transfer function was able to provide optimal value of resource sharing for the peers during the normal as well as high degree of overloading in the network. Thereafter we verified the accuracy of the transfer function derived by comparing its output with the simulated P2P network. To demonstrate how control system reduces free riding it has been shown through simulations how the control systems penalizes the nodes indulging in different levels of freeriding. Our proposed control system shows considerable gain over existing state of art algorithm. This improvement is achieved through PI action of controller. Since low reputation peers usually subvert reputation system by whitewashing. We propose and substantiate a technique modifying transfer function such that systems' sluggishness becomes adaptive in such a way that it encourage genuine new comers to enter network and discourages member peers to whitewash.
△ Less
Submitted 24 December, 2015; v1 submitted 26 September, 2015;
originally announced September 2015.
-
A Parameter-free Affinity Based Clustering
Authors:
Bhaskar Mukhoty,
Ruchir Gupta,
Y. N. Singh
Abstract:
Several methods have been proposed to estimate the number of clusters in a dataset; the basic ideal behind all of them has been to study an index that measures inter-cluster separation and intra-cluster cohesion over a range of cluster numbers and report the number which gives an optimum value of the index. In this paper we propose a simple, parameter free approach that is like human cognition to…
▽ More
Several methods have been proposed to estimate the number of clusters in a dataset; the basic ideal behind all of them has been to study an index that measures inter-cluster separation and intra-cluster cohesion over a range of cluster numbers and report the number which gives an optimum value of the index. In this paper we propose a simple, parameter free approach that is like human cognition to form clusters, where closely lying points are easily identified to form a cluster and total number of clusters are revealed. To identify closely lying points, affinity of two points is defined as a function of distance and a threshold affinity is identified, above which two points in a dataset are likely to be in the same cluster. Well separated clusters are identified even in the presence of outliers, whereas for not so well separated dataset, final number of clusters are estimated and the detected clusters are merged to produce the final clusters. Experiments performed with several large dimensional synthetic and real datasets show good results with robustness to noise and density variation within dataset.
△ Less
Submitted 11 January, 2016; v1 submitted 20 July, 2015;
originally announced July 2015.
-
Analysis of Average Travel Time for Stateless Opportunistic Routing Techniques
Authors:
Sateeshkrishna Dhuli,
Yatindra Nath Singh
Abstract:
Wireless network applications, such as, searching, routing, self stabilization and query processing can be modeled as random walks on graphs. Stateless Opportunistic routing technique is a robust distributed routing technique based on random walk approach, where nodes transfer the packets to one of their direct neighbors uniformly, until the packets reach their destinations. Simplicity in executio…
▽ More
Wireless network applications, such as, searching, routing, self stabilization and query processing can be modeled as random walks on graphs. Stateless Opportunistic routing technique is a robust distributed routing technique based on random walk approach, where nodes transfer the packets to one of their direct neighbors uniformly, until the packets reach their destinations. Simplicity in execution, fault tolerance, low overhead and robustness to topology changes made it more suitable to wireless sensor networks scenarios. But the main disadvantage of stateless opportunistic routing is estimating and studying the effect of network parameters on the packet latency. In this work, we derived the analytical expressions for mean latency or average packet travel time for r-nearest neighbor cycle, r-nearest neighbor torus networks. Further, we derived the generalized expression for mean latency for m-dimensional r- nearest neighbor torus networks and studied the effect of number of nodes, nearest neighbors and network dimension on average packet travel time.
△ Less
Submitted 9 December, 2014;
originally announced December 2014.
-
Network Criticality Analysis for Finite Sized Wireless Sensor Networks
Authors:
Sateeshkrishna Dhuli,
Yatindra Nath Singh
Abstract:
The topology of a sensor network changes very frequently due to node failures because of power constraints or physical destruction. Robustness to topology changes is one of the important design factors of wireless sensor networks which makes them suitable to military, communications, health and surveillance applications. Network criticality is a measure which capture the properties of network robu…
▽ More
The topology of a sensor network changes very frequently due to node failures because of power constraints or physical destruction. Robustness to topology changes is one of the important design factors of wireless sensor networks which makes them suitable to military, communications, health and surveillance applications. Network criticality is a measure which capture the properties of network robustness to environmental changes. In this work, we derived the analytical formulas for network criticality, normalized network criticality and studied the network robustness for r-nearest neighbor cycle and r-nearest neighbor torus networks. Further, we compared our analytical results with simulation results and studied the effect of number of nodes, nearest neighbors and network dimension on the network criticality and normalized network criticality.
△ Less
Submitted 30 March, 2021; v1 submitted 9 December, 2014;
originally announced December 2014.
-
Exact Analysis of Synchronizability for Complex Networks using Regular Graphs
Authors:
Sateeshkrishna Dhuli,
Y. N. Singh
Abstract:
Network synchronization is an emerging phenomenon in complex networks. The spectrum of Laplacian matrix will be immensely helpful for getting the network dynamics information. Especially, network synchronizability is characterized by the ratio of second smallest eigen value to largest eigen value of the Laplacian matrix. We study the synchronization of complex networks modeled by regular graphs. W…
▽ More
Network synchronization is an emerging phenomenon in complex networks. The spectrum of Laplacian matrix will be immensely helpful for getting the network dynamics information. Especially, network synchronizability is characterized by the ratio of second smallest eigen value to largest eigen value of the Laplacian matrix. We study the synchronization of complex networks modeled by regular graphs. We obtained the analytical expressions for network synchronizability for r-nearest neighbor cycle and r-nearest neighbor torus. We have also derived the generalized expression for synchronizability for m-dimensional r-nearest neigh- bor torus. The obtained analytical results agree with the simulation results and shown the effect of network dimension, number of nodes and overhead on syn- chronizability and connectivity in complex networks. This work provides the basic analytical tools for managing and controlling the synchronization in the fi- nite sized complex networks and also given the generalized expressions for eigen values of Laplacian matrix for multi dimensional r- nearest neighbor networks.
△ Less
Submitted 17 November, 2014;
originally announced November 2014.
-
Convergence Analysis for Regular Wireless Consensus Networks
Authors:
Sateeshkrishna Dhuli,
Kumar Gaurav,
Y. N. Singh
Abstract:
Average consensus algorithms can be implemented over wireless sensor networks (WSN), where global statistics can be computed using communications among sensor nodes locally. Simple execution, robustness to global topology changes due to frequent node failures and underlying distributed philosophy has made consensus algorithms more suitable to WSNs. Since these algorithms are iterative in nature, t…
▽ More
Average consensus algorithms can be implemented over wireless sensor networks (WSN), where global statistics can be computed using communications among sensor nodes locally. Simple execution, robustness to global topology changes due to frequent node failures and underlying distributed philosophy has made consensus algorithms more suitable to WSNs. Since these algorithms are iterative in nature, their performance is characterized by convergence speed. We study the convergence of the average consensus algorithms for WSNs using regular graphs. We obtained the analytical expressions for optimal consensus and convergence parameters which decides the convergence time for r-nearest neighbor cycle and torus networks. We have also derived the generalized expression for optimal consensus and convergence parameters for m-dimensional r-nearest neighbor torus networks. The obtained analytical results agree with the simulation results and shown the effect of network dimension, number of nodes and transmission radius on convergence time. This work provides the basic analytical tools for managing and controlling the performance of average consensus algorithm in the finite sized practical networks.
△ Less
Submitted 22 September, 2016; v1 submitted 4 November, 2014;
originally announced November 2014.
-
Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks
Authors:
Ruchir Gupta,
Abhijeet C. Maali,
Yatindra Nath Singh
Abstract:
Real life networks are generally modelled as scale free networks. Information diffusion in such networks in decentralised environment is a difficult and resource consuming affair. Gossip algorithms have come up as a good solution to this problem. In this paper, we have proposed Adaptive First Push Then Pull gossip algorithm. We show that algorithm works with minimum cost when the transition round…
▽ More
Real life networks are generally modelled as scale free networks. Information diffusion in such networks in decentralised environment is a difficult and resource consuming affair. Gossip algorithms have come up as a good solution to this problem. In this paper, we have proposed Adaptive First Push Then Pull gossip algorithm. We show that algorithm works with minimum cost when the transition round to switch from Adaptive Push to Adaptive Pull is close to Round(log(N)). Furthermore, we compare our algorithm with Push, Pull and First Push Then Pull and show that the proposed algorithm is the most cost efficient in Scale Free networks.
△ Less
Submitted 22 October, 2013;
originally announced October 2013.
-
Approaches to Maintain Bi-connectivity for Resilience in Overlaid Multicasting
Authors:
Ashutosh Singh,
Yatindra Nath Singh
Abstract:
Application layer multicast (ALM) also called Overlay Multicast, is an attractive alternative solution to most of the problems associated with IP multicast. In ALM, multicast-related functionalities are moved to end-hosts. Application layer multicast builds a peer-to-peer (P2P) overlay topology consisting of end-to-end unicast connections between end-hosts. The key advantages, overlays offer, are…
▽ More
Application layer multicast (ALM) also called Overlay Multicast, is an attractive alternative solution to most of the problems associated with IP multicast. In ALM, multicast-related functionalities are moved to end-hosts. Application layer multicast builds a peer-to-peer (P2P) overlay topology consisting of end-to-end unicast connections between end-hosts. The key advantages, overlays offer, are flexibility, adaptability and ease of deployment [1]. The general approach to build an application layer multicast architecture involves tracking network characteristics and building appropriate topologies by allowing the end users to self organize into logical overlay networks for efficient data delivery. The major concern in designing ALM protocol is the mechanism to build and maintain a topology and to route data efficiently and reliably in this topology. We propose here a two-fold dynamic overlay tree construction and maintenance scheme in which a mesh-like topology is first built, where an arriving host connects to two already connected hosts. This ensures that two node and link disjoint paths are always maintained between every possible pair of nodes. Once the mesh is formed, on top of it, a single or multiple data delivery tree(s) are built using a suitable protocol. An algorithm is run in the nodes of the overlay topology to maintain the biconnectivity by inserting new links and deleting the redundant links as a continuous process.
△ Less
Submitted 2 March, 2017; v1 submitted 16 October, 2013;
originally announced October 2013.
-
Multipath Approach for Reliability in Query Network based Overlaid Multicasting
Authors:
Ashutosh Singh,
Yatindra Nath Singh
Abstract:
In Application layer multicast (ALM) also called Overlay Multicast, multicast-related functionalities are moved to end-hosts. The key advantages, overlays offers, are flexibility, adaptability and ease of deployment [1]. Application layer multicast builds a peer-to-peer (P2P) overlay multicast tree topology consisting of end-to-end unicast connections between end-hosts. End users self organize the…
▽ More
In Application layer multicast (ALM) also called Overlay Multicast, multicast-related functionalities are moved to end-hosts. The key advantages, overlays offers, are flexibility, adaptability and ease of deployment [1]. Application layer multicast builds a peer-to-peer (P2P) overlay multicast tree topology consisting of end-to-end unicast connections between end-hosts. End users self organize themselves into logical overlay networks for efficient data delivery. Major concern in designing ALM protocol is how to build and maintain a topology, to route data efficiently and reliably. We propose here a scheme in which the topology is built incrementally while maintaining dual feeds of the media stream to any node from the source with minimum differential delay in receiving packets from both alternatives. We have made the assumption of availability of a P2P query search network. This enables building of multicast tree directly as an overlay. There is no need of maintaining an overlaid mesh and running multicast routing protocol to maintain a multicast tree in this mesh. Thus the scheme is much more simplified than in the earlier work on multicast overlay mesh creation and management and then creation and management of multicast trees using this mesh.
△ Less
Submitted 14 September, 2013;
originally announced September 2013.
-
Design of Two Dimensional Unipolar (Optical) Orthogonal Codes Through One Dimensional Unipolar (Optical) Orthogonal Codes
Authors:
Ram Chandra Singh Chauhan,
Yatindra Nath Singh,
Rachna Asthana
Abstract:
In this paper, an algorithm for construction of multiple sets of two dimensional (2D) or matrix unipolar (optical) orthogonal codes has been proposed. Representations of these 2D codes in difference of positions representation (DoPR) have also been discussed along-with conventional weighted positions representation (WPR) of the code. This paper also proposes less complex methods for calculation of…
▽ More
In this paper, an algorithm for construction of multiple sets of two dimensional (2D) or matrix unipolar (optical) orthogonal codes has been proposed. Representations of these 2D codes in difference of positions representation (DoPR) have also been discussed along-with conventional weighted positions representation (WPR) of the code. This paper also proposes less complex methods for calculation of auto-correlation as well as cross-correlation constraints within set of matrix codes. The multiple sets of matrix codes provide flexibility for selection of optical orthogonal codes set in wavelength-hop** time-spreading (WHTS) optical code division multiple access (CDMA) system.
△ Less
Submitted 9 September, 2013;
originally announced September 2013.
-
A Search Algorithm to Find Multiple Sets of One Dimensional Unipolar (Optical) Orthogonal Codes with Same Code-length and Low Weight
Authors:
R. C. S. Chauhan,
Y. N. Singh,
R. Asthana
Abstract:
This paper describes a search algorithm to find multiple sets of one dimensional unipolar (optical) orthogonal codes characterized by parameters, binary code sequence of length (n bits) and weight w (number of bit 1s in the sequence) as well as auto-correlation and cross-correlation constraint respectively for the codes within a set. For a given code length n and code weight w all possible differe…
▽ More
This paper describes a search algorithm to find multiple sets of one dimensional unipolar (optical) orthogonal codes characterized by parameters, binary code sequence of length (n bits) and weight w (number of bit 1s in the sequence) as well as auto-correlation and cross-correlation constraint respectively for the codes within a set. For a given code length n and code weight w all possible difference sets, with auto-correlation constraints lying from 1 to w-1 can be designed with distinct code serial number. For given cross-correlation constraint from 1 to w-1 Multiple sets can be searched out of the codes with auto-correlation constraints less than or equal to given auto-correlation constraint using proposed algorithm. The searched multiple sets can be sorted as having number of codes not less than the upper bound of the sets given by Johnson bound. These one dimensional unipolar orthogonal codes have their application in incoherent optical code division multiple access systems.
△ Less
Submitted 9 September, 2013;
originally announced September 2013.
-
Design of Minimum Correlated, Maximal Clique Sets of One-Dimensional Uni-polar (Optical) Orthogonal Codes
Authors:
Ram Chandra Singh Chauhan,
Yatindra Nath Singh,
Rachna Asthana
Abstract:
This paper proposes an algorithm to search a family of multiple sets of minimum correlated one dimensional uni-polar (optical) orthogonal codes (1-DUOC) or optical orthogonal codes (OOC) with fixed as well as variable code parameters. The cardinality of each set is equal to upper bound. The codes within a set can be searched for general values of code length, code weight, auto-correlation constrai…
▽ More
This paper proposes an algorithm to search a family of multiple sets of minimum correlated one dimensional uni-polar (optical) orthogonal codes (1-DUOC) or optical orthogonal codes (OOC) with fixed as well as variable code parameters. The cardinality of each set is equal to upper bound. The codes within a set can be searched for general values of code length, code weight, auto-correlation constraint and cross-correlation constraint. Each set forms a maximal clique of the codes within given range of correlation properties . These one-dimensional uni-polar orthogonal codes can find their application as signature sequences for spectral spreading purpose in incoherent optical code division multiple access (CDMA) systems.
△ Less
Submitted 1 September, 2013;
originally announced September 2013.
-
A Reputation Based Framework to Avoid Free-riding in Unstructured Peer-to-Peer network
Authors:
Ruchir Gupta,
Yatindra Nath singh
Abstract:
Free riding is a major problem in peer-to-peer networks. Reputation management systems are generally proposed to overcome this problem. In this paper we have discussed a possible way of resource allocation on the basis of reputation management system i.e. probabilistic allocation based on reputation. This seems to be a better way for allocation of resources because in this case nodes that do not h…
▽ More
Free riding is a major problem in peer-to-peer networks. Reputation management systems are generally proposed to overcome this problem. In this paper we have discussed a possible way of resource allocation on the basis of reputation management system i.e. probabilistic allocation based on reputation. This seems to be a better way for allocation of resources because in this case nodes that do not have very good reputation about each other, may also serve each other at least some amount of resource with finite probability. This avoids disconnect between them. Algorithms are presented for optimizing the shared capacity, reputation based probabilistic allocation that is optimal for a node, and formation of interest groups on the basis of similarity between interests of nodes.
△ Less
Submitted 25 July, 2013;
originally announced July 2013.
-
Avoiding Whitewashing in Unstructured Peer-to-Peer Resource Sharing Network
Authors:
Ruchir Gupta,
Yatindra Nath Singh
Abstract:
In peer-to-peer file sharing network, it is hard to distinguish between a legitimate newcomer and a whitewasher. This makes whitewashing a big problem in peer-to-peer networks. Although the problem of whitewashing can be solved using permanent identities, it may take away the right of anonymity for users. In this paper, we a have proposed a novel algorithm to avoid this problem when network uses f…
▽ More
In peer-to-peer file sharing network, it is hard to distinguish between a legitimate newcomer and a whitewasher. This makes whitewashing a big problem in peer-to-peer networks. Although the problem of whitewashing can be solved using permanent identities, it may take away the right of anonymity for users. In this paper, we a have proposed a novel algorithm to avoid this problem when network uses free temporary identities. In this algorithm, the initial reputation is adjusted according to the level of whitewashing in the network.
△ Less
Submitted 18 July, 2013;
originally announced July 2013.
-
Trust Estimation in Peer-to-Peer Network Using BLUE
Authors:
Ruchir Gupta,
Yatindra Nath Singh
Abstract:
In peer-to-peer networks, free riding is a major problem. Reputation management systems can be used to overcome this problem. Reputation estimation methods generally do not consider the uncertainties in the inputs. We propose a reputation estimation method using BLUE (Best Linear Unbiased estimator) estimator that consider uncertainties in the input variables.
In peer-to-peer networks, free riding is a major problem. Reputation management systems can be used to overcome this problem. Reputation estimation methods generally do not consider the uncertainties in the inputs. We propose a reputation estimation method using BLUE (Best Linear Unbiased estimator) estimator that consider uncertainties in the input variables.
△ Less
Submitted 5 April, 2013;
originally announced April 2013.
-
DSAT-MAC : Dynamic Slot Allocation based TDMA MAC protocol for Cognitive Radio Networks
Authors:
Rajeev K. Shakya,
Satyam Agarwal,
Y. N. Singh,
Nishchal K. Verma,
Amitabha Roy
Abstract:
Cognitive Radio Networks (CRN) have enabled us to efficiently reuse the underutilized radio spectrum. The MAC protocol in CRN defines the spectrum usage by sharing the channels efficiently among users. In this paper we propose a novel TDMA based MAC protocol with dynamically allocated slots. Most of the MAC protocols proposed in the literature employ Common Control Channel (CCC) to manage the reso…
▽ More
Cognitive Radio Networks (CRN) have enabled us to efficiently reuse the underutilized radio spectrum. The MAC protocol in CRN defines the spectrum usage by sharing the channels efficiently among users. In this paper we propose a novel TDMA based MAC protocol with dynamically allocated slots. Most of the MAC protocols proposed in the literature employ Common Control Channel (CCC) to manage the resources among Cognitive Radio (CR) users. Control channel saturation in case of large number of CR users is one of the main drawbacks of the CCC based MAC protocols. In contrast with CCC based MAC protocols, DSAT-MAC protocol is based on the TDMA mechanism, without using any CCC for control information exchange. The channels are divided into time slots and CR users send their control or data packets over their designated slot. The protocol ensures that no slot is left vacant. This guarantees full use of the available spectrum. The protocol includes the provision for Quality of Service, where real-time and safety critical data is transmitted with highest priority and least delay. The protocol also ensures a fair sharing of available spectrum among the CR users, with the mechanism to regulate the transmission of malicious nodes. Energy saving techniques are also presented for longer life of battery operated CR nodes. Theoretical analysis and simulations over ns-2 of the proposed protocol reveal that the protocol performs better in various CR adhoc network applications.
△ Less
Submitted 17 January, 2013;
originally announced January 2013.
-
Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
Authors:
Ruchir Gupta,
Y. N. Singh
Abstract:
Reputation aggregation in peer to peer networks is generally a very time and resource consuming process. Moreover, most of the methods consider that a node will have same reputation with all the nodes in the network, which is not true. This paper proposes a reputation aggregation algorithm that uses a variant of gossip algorithm called differential gossip. In this paper, estimate of reputation is…
▽ More
Reputation aggregation in peer to peer networks is generally a very time and resource consuming process. Moreover, most of the methods consider that a node will have same reputation with all the nodes in the network, which is not true. This paper proposes a reputation aggregation algorithm that uses a variant of gossip algorithm called differential gossip. In this paper, estimate of reputation is considered to be having two parts, one common component which is same with every node, and the other one is information received from immediate neighbours based on the neighbours' direct interaction with the node. The differential gossip is fast and requires less amount of resources. This mechanism allows computation of independent reputation value by a node, of every other node in the network, for each node. The differential gossip trust has been investigated for a power law network formed using preferential attachment \emph{(PA)} Model. The reputation computed using differential gossip trust shows good amount of immunity to the collusion. We have verified the performance of the algorithm on the power law networks of different sizes ranging from 100 nodes to 50,000 nodes.
△ Less
Submitted 28 January, 2014; v1 submitted 16 October, 2012;
originally announced October 2012.
-
Nonlinear spread of rumor and inoculation strategies in the nodes with degree dependent tie strength in complex networks
Authors:
Anurag Singh,
Yatindra Nath Singh
Abstract:
In earlier rumor spreading models, at each time step nodes contact all of their neighbors. In more realistic scenario it is possible that a node may contact only some of its neighbors to spread the rumor. Therefore it is must in real world complex networks, the classic rumor spreading model need to be modified to consider the dependence of rumor spread rate on the degree of the spreader and the in…
▽ More
In earlier rumor spreading models, at each time step nodes contact all of their neighbors. In more realistic scenario it is possible that a node may contact only some of its neighbors to spread the rumor. Therefore it is must in real world complex networks, the classic rumor spreading model need to be modified to consider the dependence of rumor spread rate on the degree of the spreader and the informed nodes. We have given a modified rumor spreading model to accommodate these facts. This new model, has been studied for rumor spreading in complex networks in this work. Nonlinear rumor spread exponent $α$ and degree dependent tie strength exponent $β$ in any complex network gives rumor threshold as some finite value. In the present work, the modified rumor spreading model has been studied in scale free networks. It is also found that if $ α$ and $ β$ parameters are tuned to appropriate value, the rumor threshold becomes independent of network size. In any social network, rumors can spread may have undesirable effect. One of the possible solutions to control rumor spread, is to inoculate a certain fraction of nodes against rumors. The inoculation can be done randomly or in a targeted fashion. We have used modified rumor spreading model over scale free networks to investigate the efficacy of inoculation. Random and targeted inoculation schemes have been applied. It has been observed that rumor threshold in random inoculation scheme is greater than the rumor threshold in the model without any inoculation scheme. But random inoculation is not that much effective. The rumor threshold in targeted inoculation is very high than the rumor threshold in the random inoculation in suppressing the rumor.
△ Less
Submitted 29 August, 2012;
originally announced August 2012.
-
Optimizing Channel Access for Event-Driven Wireless Sensor Networks: Analysis and Enhancements
Authors:
Rajeev K. Shakya,
Yatindra Nath Singh,
Nishchal K. Verma
Abstract:
We study the problem of medium access control in domain of event-driven wireless sensor networks (WSNs). In this kind of WSN, sensor nodes send data to sink node only when an event occurs in the monitoring area. The nodes in this kind of WSNs encounter correlated traffic as a subset of nodes start sending data by sensing a common event simultaneously. We wish to rethink of medium access control (M…
▽ More
We study the problem of medium access control in domain of event-driven wireless sensor networks (WSNs). In this kind of WSN, sensor nodes send data to sink node only when an event occurs in the monitoring area. The nodes in this kind of WSNs encounter correlated traffic as a subset of nodes start sending data by sensing a common event simultaneously. We wish to rethink of medium access control (MAC) for this type of traffic characteristics. For WSNs, many existing MAC protocols utilize the basic CSMA/CA strategy such as IEEE 802.11 Binary Exponential Backoff (BEB) algorithm to handle the collisions among packets when more than one node need to access the channel. We show that this BEB algorithm does not work well without incurring access delay or performance degradation due to increased number of collisions and retransmissions when nodes encounter correlated traffic. Based on above observations in mind, We present a Adaptive Random Backoff (ARB) algorithm that is capable of mitigating the impact of correlated traffic and capable of minimizing the chance of collisions. ARB is based on minor modifications of BEB. We show using numerical analysis that our proposals improve the channel access in terms of latency, throughput, and frame drop** probability as compared with IEEE 802.11 DCF. Simulations using NS-2 network simulator are conducted to validate the analytical results.
△ Less
Submitted 20 May, 2012; v1 submitted 27 March, 2012;
originally announced March 2012.