Spelling suggestions: "subject:"devicedevice communmunication"" "subject:"devicedevice commoncommunication""
1 |
Secure device-to-device communication in LTE-AAlam, M., Yang, D., Rodriguez, Jonathan, Abd-Alhameed, Raed 04 1900 (has links)
No / Enabling D2D communications over LTE-A networks can provide many benefits in terms of throughput, energy consumption, traffic load, and so on. It also enables new commercial services such as location-based advertising. For
these reasons, D2D communications has become a hot topic in both the academic and industrial communities. However, many research works are focused on node discovery, radio resource management, and other aspects, while the issue of
security is less addressed. In this article, we intend to provide an overview of the security architecture, threads, and requirements. Based on these requirements, we propose several potential solutions by reusing the existing security
mechanisms. Promising topics related to secure D2D communications for future research are also discussed.
|
2 |
System Design for Opportunistic NetworksKouyoumdjieva, Sylvia T. January 2015 (has links)
Device-to-device communication has been suggested as a complement to traditional cellular networks as a means of offloading cellular traffic. In this thesis we explore a solution for device-to-device communication based on opportunistic content distribution in a content-centric network. Communication opportunities arise as mobile nodes roam around in an area and occasionally enter in direct communication range with one another. We consider a node to be a pedestrian equipped with a mobile device and explore the properties of opportunistic communication in the context of content dissemination in urban areas. The contributions of this thesis lie in three areas. We first study human mobility as one of the main enablers of opportunistic communication. We introduce traces collected from a realistic pedestrian mobility simulator and demonstrate that the performance of opportunistic networks is not very sensitive to the accurate estimation of the probability distributions of mobility parameters. However, capturing the space in which mobility occurs may be of high importance. Secondly, we design and implement a middleware for opportunistic content-centric networking, and we evaluate it via a small-scale testbed, as well as through extensive simulations. We conclude that energy-saving mechanisms should be part of the middleware design, while caching should be considered only as an add-on feature. Thirdly, we present and evaluate three different energy-saving mechanisms in the context of opportunistic networking: a dual-radio architecture, an asynchronous duty-cycling scheme, and an energy-aware algorithm which takes into account node selfishness. We evaluate our proposals analytically and via simulations. We demonstrate that when a critical mass of participants is available, the performance of the opportunistic network is comparable to downloading contents directly via the cellular network in terms of energy consumption while offloading large traffic volumes from the operator. / <p>QC 20151120</p>
|
3 |
Exploiting two-user superimposed signals for wireless communication systemsCui, Wen 04 January 2021 (has links)
Wireless communication systems are growing at an unprecedented pace, making the wireless spectrum at a premium, especially as billions of new Internet-of-Things (IoT) devices worldwide are demanding wireless connections. To accommodate the ever-growing spectrum demand, a promising solution is Non-Orthogonal Multiple Access (NOMA) that enables two users to communicate with the same spectrum resource at the same time, while decoding the two-user superimposed signal at the receiver. By doing this, the previously detrimental wireless interference caused by two concurrent transmitters becomes decodable at the receiver, potential for higher utilization of the wireless spectrum. Existing NOMA technologies, however, rely on strict power control to sequentially decode the two-user superimposed signal, which is infeasible for many IoT devices that are heterogeneous and often low-cost. In contrast, in this dissertation, we propose new NOMA schemes that are designed for wireless communication systems and can decode the two-user superimposed signals without power control.
This dissertation makes four major contributions. First, it presents the first design to implement dynamic signal offsets tracking and reacting schemes to detect and decode two-user superimposed signals, robust against hardware imperfections and feasible for heterogeneous IoT devices. Second, by investigating the relationship between the channel condition and the bit-error-rate (BER) in decoding superimposed signals, we design a reliable NOMA scheme to combat dynamic channel conditions that are inevitable in many practical scenarios and may cause severe decoding errors. Third, considering the wireless communication systems in mobile scenarios, mobility is a vital feature of many applications but can cause severe signal variations and make the hardware offsets harder to predict, resulting in an unreliable decoding performance. To address this, we develop a diversity transmission and smart combining scheme to achieve high reliable decoding performance. Finally, we combine rotation coding to transmit and decode the superimposed signal to achieve both high spectrum efficiency and high reliability performance.
To demonstrate our contributions, we derive the theoretical relationship of the BER under different practical settings, validate the performance with simulations, and conduct experiments using software-defined radio based platforms with static indoor, outdoor scenarios and mobile scenarios. The experimental results demonstrate that, compared with the state-of-the-art methods, our schemes can achieve higher reliability and spectrum efficiency in decoding the superimposed signal for wireless communication systems without power control. / Graduate
|
4 |
Modeling, analysis, and optimization of multi-tier cellular networksSakr, Ahmed 02 February 2017 (has links)
Multi-tier cellular networks have led to a paradigm shift in the deployment of base stations (BSs) where macrocell BSs are overlaid with smaller and lower power BSs such as microcells, picocells, and femtocells. Stochastic geometry has been proven to be an effective tool to capture such heterogeneity and uncertainties in deployment of cellular BSs. In stochastic geometry, random spatial models are used to model multi-tier cellular networks where the locations of BSs is each tier is assumed to be drawn from a point process with the appropriate spatial density. This thesis proposes stochastic geometry-based approaches to analyze, model, and optimize multi-tier cellular networks under several setups and technologies. First, I propose a novel location-aware cross-tier cooperation scheme that aim at improving the performance of users with low signal-to-interference-plus-noise ratio (SINR). Second, I study the performance of cognitive device-to-device (D2D) communication in multi-channel downlink-uplink cellular network with energy harvesting. For the coexistence between cellular and D2D transmissions, I propose a spectrum access policy for cellular BSs to avoid using D2D channels when possible. Third, I investigate the feasibility of energy harvesting from ambient RF interference in multi-tier uplink cellular networks. For this setup, I capture randomness in the network topology and the battery dynamics. Fourth, I extend multi-tier uplink cellular networks to consider the case when users do not necessarily associate with the nearest BS (i.e., flexible cell association). Finally, I compare between different cell association criteria including coupled and decoupled cell association for uplink and downlink transmissions in multi-tier full-duplex cellular networks. For all network setups, I use stochastic geometry to derive simple and closed-form expressions to evaluate the performance in terms of several metrics, e.g., outage probability, mean rate, transmission probability, success probability, and load per BS. I also highlight main tradeoffs in different networks and provide guidelines to optimize different performance metrics by carefully tuning fundamental network design parameters. / February 2017
|
5 |
Supporting device-to-device search and sharing of hyper-localized dataMichel, Jonas Reinhardt 08 September 2015 (has links)
Supporting emerging mobile applications in densely populated environments requires connecting mobile users and their devices with the surrounding digital landscape. Specifically, the volume of digitally-available data in such computing spaces presents an imminent need for expressive mechanisms that enable humans and applications to share and search for relevant information within their digitally accessible physical surroundings. Device-to-device communications will play a critical role in facilitating transparent access to proximate digital resources. A wide variety of approaches exist that support device-to-device dissemination and query-driven data access. Very few, however, capitalize on the contextual history of the shared data itself to distribute additional data or to guide queries. This dissertation presents Gander, an application substrate and mobile middleware designed to ease the burden associated with creating applications that require support for sharing and searching of hyper-localized data in situ. Gander employs a novel trajectory-driven model of spatiotemporal provenance that enriches shared data with its contextual history -- annotations that capture data's geospatial and causal history across a lifetime of device-to-device propagation. We demonstrate the value of spatiotemporal data provenance as both a tool for improving ad hoc routing performance and for driving complex application behavior. This dissertation discusses the design and implementation of Gander's middleware model, which abstracts away tedious implementation details by enabling developers to write high-level rules that govern when, where, and how data is distributed and to execute expressive queries across proximate digital resources. We evaluate Gander within several simulated large-scale environments and one real-world deployment on the UT Austin campus. The goal of this research is to provide formal constructs realized within a software framework that ease the software engineering challenges encountered during the design and deployment of several applications in emerging mobile environments. / text
|
6 |
Device-device communication and multihop transmission for future cellular networksAmate, Ahmed Mohammed January 2015 (has links)
The next generation wireless networks i.e. 5G aim to provide multi-Gbps data traffic, in order to satisfy the increasing demand for high-definition video, among other high data rate services, as well as the exponential growth in mobile subscribers. To achieve this dramatic increase in data rates, current research is focused on improving the capacity of current 4G network standards, based on Long Term Evolution (LTE), before radical changes are exploited which could include acquiring additional/new spectrum. The LTE network has a reuse factor of one; hence neighbouring cells/sectors use the same spectrum, therefore making the cell edge users vulnerable to inter-cell interference. In addition, wireless transmission is commonly hindered by fading and pathloss. In this direction, this thesis focuses on improving the performance of cell edge users in LTE and LTE-Advanced (LTE-A) networks by initially implementing a new Coordinated Multi-Point (CoMP) algorithm to mitigate cell edge user interference. Subsequently Device-to-Device (D2D) communication is investigated as the enabling technology for maximising Resource Block (RB) utilisation in current 4G and emerging 5G networks. It is demonstrated that the application, as an extension to the above, of novel power control algorithms, to reduce the required D2D TX power, and multihop transmission for relaying D2D traffic, can further enhance network performance. To be able to develop the aforementioned technologies and evaluate the performance of new algorithms in emerging network scenarios, a beyond-the-state-of-the-art LTE system-level simulator (SLS) was implemented. The new simulator includes Multiple-Input Multiple-Output (MIMO) antenna functionalities, comprehensive channel models (such as Wireless World initiative New Radio II i.e. WINNER II) and adaptive modulation and coding schemes to accurately emulate the LTE and LTE-A network standards. Additionally, a novel interference modelling scheme using the 'wrap around' technique was proposed and implemented that maintained the topology of flat surfaced maps, allowing for use with cell planning tools while obtaining accurate and timely results in the SLS compared to the few existing platforms. For the proposed CoMP algorithm, the adaptive beamforming technique was employed to reduce interference on the cell edge UEs by applying Coordinated Scheduling (CoSH) between cooperating cells. Simulation results show up to 2-fold improvement in terms of throughput, and also shows SINR gain for the cell edge UEs in the cooperating cells. Furthermore, D2D communication underlaying the LTE network (and future generation of wireless networks) was investigated. The technology exploits the proximity of users in a network to achieve higher data rates with maximum RB utilisation (as the technology reuses the cellular RB simultaneously), while taking some load off the Evolved Node B (eNB) i.e. by direct communication between User Equipment (UE). Simulation results show that the proximity and transmission power of D2D transmission yields high performance gains for a D2D receiver, which was demonstrated to be better than that of cellular UEs with better channel conditions or in close proximity to the eNB in the network. The impact of interference from the simultaneous transmission however impedes the achievable data rates of cellular UEs in the network, especially at the cell edge. Thus, a power control algorithm was proposed to mitigate the impact of interference in the hybrid network (network consisting of both cellular and D2D UEs). It was implemented by setting a minimum SINR threshold so that the cellular UEs achieve a minimum performance, and equally a maximum SINR threshold to establish fairness for the D2D transmission as well. Simulation results show an increase in the cell edge throughput and notable improvement in the overall SINR distribution of UEs in the hybrid network. Additionally, multihop transmission for D2D UEs was investigated in the hybrid network: traditionally, the scheme is implemented to relay cellular traffic in a homogenous network. Contrary to most current studies where D2D UEs are employed to relay cellular traffic, the use of idle nodes to relay D2D traffic was implemented uniquely in this thesis. Simulation results show improvement in D2D receiver throughput with multihop transmission, which was significantly better than that of the same UEs performance with equivalent distance between the D2D pair when using single hop transmission.
|
7 |
Towards enhancing information dissemination in wireless networksAGARWAL, Rachit 02 September 2013 (has links) (PDF)
In public warning message systems, information dissemination across the network is a critical aspect that has to be addressed. Dissemination of warning messages should be such that it reaches as many nodes in the network in a short time. In communication networks those based on device to device interactions, dissemination of the information has lately picked up lot of interest and the need for self organization of the network has been brought up. Self organization leads to local behaviors and interactions that have global effects and helps in addressing scaling issues. The use of self organized features allows autonomous behavior with low memory usage. Some examples of self organization phenomenon that are observed in nature are Lateral Inhibition and Flocking. In order to provide self organized features to communication networks, insights from such naturally occurring phenomenon is used. Achieving small world properties is an attractive way to enhance information dissemination across the network. In small world model rewiring of links in the network is performed by altering the length and the direction of the existing links. In an autonomous wireless environment such organization can be achieved using self organized phenomenon like Lateral inhibition and Flocking and beamforming (a concept in communication). Towards this, we first use Lateral Inhibition, analogy to Flocking behavior and beamforming to show how dissemination of information can be enhanced. Lateral Inhibition is used to create virtual regions in the network. Then using the analogy of Flocking rules, beam properties of the nodes in the regions are set. We then prove that small world properties are achieved using average path length metric. However, the proposed algorithm is applicable to static networks and Flocking and Lateral Inhibition concepts, if used in a mobile scenario, will be highly complex in terms of computation and memory. In a mobile scenario such as human mobility aided networks, the network structure changes frequently. In such conditions dissemination of information is highly impacted as new connections are made and old ones are broken. We thus use stability concept in mobile networks with beamforming to show how information dissemination process can be enhanced. In the algorithm, we first predict the stability of a node in the mobile network using locally available information and then uses it to identify beamforming nodes. In the algorithm, the low stability nodes are allowed to beamform towards the nodes with high stability. The difference between high and low stability nodes is based on threshold value. The algorithm is developed such that it does not require any global knowledge about the network and works using only local information. The results are validated using how quickly more number of nodes receive the information and different state of the art algorithms. We also show the effect of various parameters such as number of sources, number of packets, mobility parameters and antenna parameters etc. on the information dissemination process in the network. In realistic scenarios however, the dynamicity in the network is not only related to mobility. Dynamic conditions also arise due to change in density of nodes at a given time. To address effect of such scenario on the dissemination of information related to public safety in a metapopulation, we use the concepts of epidemic model, beamforming and the countrywide mobility pattern extracted from the $D4D$ dataset. Here, we also propose the addition of three latent states to the existing epidemic model ($SIR$ model). We study the transient states towards the evolution of the number of devices having the information and the difference in the number of devices having the information when compared with different cases to evaluate the results. Through the results we show that enhancements in the dissemination process can be achieved in the addressed scenario
|
8 |
Analysis on MIMO relaying scenarios in wireless communication systemsJayasinghe, L. K. (Laddu Keeth Saliya) 02 February 2015 (has links)
Abstract
The thesis concentrates on evaluating and improving performances of various multiple-input multiple-output (MIMO) relaying scenarios that are particularly relevant to future wireless systems. A greater emphasis is placed on important practical situations, considering relay deployments, availability of channel state information (CSI), limitations of spectrum, and information secrecy.
Initially, the performance of a non-coherent amplify-and-forward (AF) MIMO relaying is analyzed when the relay is deployed with the relay-to-destination channel having a line-of-sight (LoS) path. The main attention is given to analyzing the performance of orthogonal space-time block coded based non-coherent AF MIMO system. Exact expressions of statistical parameters and performance metrics are derived considering the instantaneous signal-to-noise ratio (SNR) received at the destination. These performance metrics reveal that a strong LoS component in relay-destination channel always limits the performance promised by MIMO scattering environment when both nodes have multiple antennas.
The thesis also considers scenarios in MIMO two-way relaying (TWR) with physical layer network coding (PNC) mapping at the relay. PNC mapping becomes complex with multiple streams being combined at the relay node. Joint precoder-decoder schemes are considered to ease this, and various studies are carried out depending on the CSI. The zero-forcing criterion is used at the nodes when perfect CSI is available. For the imperfect CSI scenario, a robust joint precoder-decoder design is considered. The precoder and decoder matrices are obtained by solving optimization problems, which are formulated to maximize sum-rate and minimize weighted mean square error (WMSE) under transmit power constraints on the nodes.
Next, a precoder-decoder scheme for MIMO underlay device-to-device (D2D) communication system is investigated by considering two D2D modes; PNC based D2D and direct D2D. The joint design is based on minimizing mean square error (MSE) which is useful to mitigate interference, and to improve the performance of both D2D and cellular communications. Distributed and centralized algorithms are proposed considering bi-directional communication in both D2D and cellular communications. System performance is discussed with two transmit mode selection schemes as dynamic and static selection schemes. The results show that the PNC based D2D mode extends the coverage area of D2D communication.
Finally, secure beamforming schemes for the PNC based MIMO TWR systems are investigated when multiple eavesdroppers are attempting to intercept the user information. The CSI of the user-to-eavesdropper channels is imperfect at the users. The channel estimation errors are assumed with both ellipsoidal bound and Gaussian Markov uncertainty models. Robust optimization problems are formulated considering both scenarios to design beamforming vectors at the users and relay. Numerical results suggest that the proposed algorithms converge fast and provide higher security. / Tiivistelmä
Tässä väitöskirjassa keskitytään arvioimaan ja parantamaan suorituskykyä useissa moniantennitoistinjärjestelmissä, jotka ovat ajankohtaisia tulevaisuuden langattomissa verkoissa. Erityisesti työssä analysoidaan tärkeitä käytännön tilanteita, sisältäen toistimien sijoittamisen, kanavatiedon saatavuuden, rajoitetun taajuuskaistan ja tiedon salauksen.
Aluksi epäkoherentin, vahvistavan ja jatkolähettävän moniantennitoistimen suorituskykyä analysoidaan tilanteessa, jossa toistin on sijoitettu siten, että kohteeseen on suora yhteys. Suorituskyvyn arvioinnin pääkohteena on ortogonaalinen tila-aika-tason lohkokoodattu epäkoherentti vahvistava ja jatkolähettävä moniantennitoistin. Työssä johdetaan tarkat lausekkeet tilastollisille parametreille ja suorituskykymittareille ottaen huomioon hetkellinen signaalikohinasuhde vastaanottimessa. Nämä suorituskykymittarit ilmaisevat, että toistimen ja kohteen välillä oleva vahva suoran yhteyden komponentti rajoittaa sitä suorituskykyä, jota moniantennijärjestelmän hajontaympäristö ennustaa.
Työssä tutkitaan myös kahdensuuntaisia moniantennitoistimia, jotka käyttävät fyysisen kerroksen verkkokoodausta. Koodauksesta tulee monimutkaista, kun monia datavirtoja yhdistetään toistimessa. Tämän helpottamiseksi käytetään yhdistettyä esikoodaus-dekoodausmenetelmää, jota tutkitaan erilaisten kanavatietojen tapauksissa. Täydellisen kanavatiedon tapauksessa käytetään nollaanpakotuskriteeriä. Epätäydellisen kanavatiedon tapauksessa käytetään robustia yhdistettyä esikoodaus-dekoodausmenetelmää. Esikoodaus- ja dekoodausmatriisit saadaan ratkaisemalla optimointiongelmat. Nämä ongelmat on muodostettu maksimoimaan summadatanopeus, ja minimoimaan painotettu keskineliövirhe, kun optimointirajoitteina ovat solmujen lähetystehot.
Seuraavaksi esikoodaus-dekoodausmenetelmää tutkitaan moniantennijärjestelmässä, jossa käytetään kahdentyyppistä laitteesta-laitteeseen (D2D) kommunikaatiomenetelmää: fyysisen kerroksen verkkokoodaukseen pohjautuvaa D2D- ja suoraa D2D-kommunikaatiota. Yhteissuunnittelu perustuu keskineliövirheen minimointiin, joka on hyödyllistä, kun halutaan vähentää häiriötä ja parantaa molempien verkkojen suorituskykyä. Työssä ehdotetaan hajautettuja ja keskitettyjä algoritmeja tilanteessa, jossa käytetään kaksisuuntaista kommunikaatiota molemmissa verkoissa. Järjestelmän suorituskykyä arvioidaan, kun käytetään kahta eri lähetystilan valintaa, dynaamista ja staattista. Tulokset osoittavat, että fyysisen kerroksen verkkokoodaukseen pohjautuva D2D kasvattaa D2D-kommunikaatiojärjestelmän kantamaa.
Lopuksi, turvallisia keilanmuodostustekniikoita arvioidaan fyysisen kerroksen verkkokoodaukseen pohjautuvassa kahdensuuntaisessa moniantennitoistinjärjestelmässä, kun useat salakuuntelijat yritävät siepata käyttäjätiedon. Käyttäjillä on epäideaalinen kanavatieto heidän ja salakuuntelijoiden välisten linkkien kanavista. Kanavatiedon estimointivirheitä arvioidaan ellipsoidisella ja Gauss-Markov-epävarmuusmallilla. Robustit optimointiongelmat, joissa suunnitellaan keilanmuodostusvektorit käyttäjän ja toistimen välille, muodostetaan molemmille malleille. Numeeriset tulokset osoittavat, että ehdotetut algoritmit konvergoituvat nopeasti ja tarjoavat korkeamman turvallisuuden.
|
9 |
Towards enhancing information dissemination in wireless networks / Vers une amélioration de la diffusion des informations dans les réseaux sans-filsAgarwal, Rachit 02 September 2013 (has links)
Dans les systèmes d'alertes publiques, l’étude de la diffusion des informations dans le réseau est essentielle. Les systèmes de diffusion des messages d'alertes doivent atteindre beaucoup de nœuds en peu de temps. Dans les réseaux de communication basés sur les interactions “device to device”, on s'est récemment beaucoup intéressé à la diffusion des informations et le besoin d'auto-organisation a été mis en évidence. L'auto-organisation conduit à des comportements locaux et des interactions qui ont un effet sur le réseau global et présentent un avantage de scalabilité. Ces réseaux auto-organisés peuvent être autonomes et utiliser peu d'espace mémoire. On peut développer des caractères auto-organisés dans les réseaux de communication en utilisant des idées venant de phénomènes naturels. Il semble intéressant de chercher à obtenir les propriétés des “small world” pour améliorer la diffusion des informations dans le réseau. Dans les modèles de “small world” on réalise un recâblage des liens dans le réseau en changeant la taille et la direction des liens existants. Dans un environnement sans-fils autonome une organisation de ce type peut être créée en utilisant le flocking, l'inhibition latérale et le “beamforming”. Dans ce but, l'auteur utilise d'abord l'analogie avec l'inhibition latérale, le flocking et le “beamforming” pour montrer comment la diffusion des informations peut être améliorée. L'analogue de l'inhibition latérale est utilisé pour créer des régions virtuelles dans le réseau. Puis en utilisant l'analogie avec les règles du flocking, on caractérise les propriétés des faisceaux permettant aux nœuds de communiquer dans les régions. Nous prouvons que les propriétés des “small world” sont vérifiées en utilisant la mesure des moyennes des longueurs des chemins. Cependant l'algorithme proposé est valable pour les réseaux statiques alors que dans les cas introduisant de la mobilité, les concepts d'inhibition latérale et de flocking nécessiteraient beaucoup plus de temps. Dans le cas d'un réseau mobile la structure du réseau change fréquemment. Certaines connexions intermittentes impactent fortement la diffusion des informations. L'auteur utilise le concept de stabilité avec le “beamforming” pour montrer comment on peut améliorer la diffusion des informations. Dans son algorithme il prévoit d'abord la stabilité du nœud en utilisant des informations locales et il utilise ce résultat pour identifier les nœuds qui réaliseront du beamforming. Dans l'algorithme, les nœuds de stabilité faible sont autorisés à faire du beamforming vers les nœuds de forte stabilité. La frontière entre forte et faible stabilité est fixée par un seuil. Cet algorithme ne nécessite pas une connaissance globale du réseau, mais utilise des données locales. Les résultats sont validés en étudiant le temps au bout duquel plus de nœuds reçoivent l'information et en comparant avec d'autres algorithmes de la littérature. Cependant, dans les réseaux réels, les changements de structure ne sont pas dus qu'à la mobilité, mais également à des changements de la densité des nœuds à un moment donné. Pour tenir compte de l'influence de tels événements sur la diffusion des informations concernant la sécurité publique, l'auteur utilise les concepts de modèle de métapopulation, épidémiologiques, “beamforming” et mobilité géographique obtenu à partir de données D4D. L'auteur propose la création de trois états latents qu'il ajoute au modèle épidémiologique connu: SIR. L'auteur étudie les états transitoires en analysant l'évolution du nombre de postes ayant reçu les informations et compare les résultats concernant ce nombre dans les différents cas. L'auteur démontre ainsi que le scenario qu'il propose permet d'améliorer le processus de diffusion des informations. Il montre aussi les effets de différents paramètres comme le nombre de sources, le nombre de paquets, les paramètres de mobilité et ceux qui caractérisent les antennes sur la diffusion des informations / In public warning message systems, information dissemination across the network is a critical aspect that has to be addressed. Dissemination of warning messages should be such that it reaches as many nodes in the network in a short time. In communication networks those based on device to device interactions, dissemination of the information has lately picked up lot of interest and the need for self organization of the network has been brought up. Self organization leads to local behaviors and interactions that have global effects and helps in addressing scaling issues. The use of self organized features allows autonomous behavior with low memory usage. Some examples of self organization phenomenon that are observed in nature are Lateral Inhibition and Flocking. In order to provide self organized features to communication networks, insights from such naturally occurring phenomenon is used. Achieving small world properties is an attractive way to enhance information dissemination across the network. In small world model rewiring of links in the network is performed by altering the length and the direction of the existing links. In an autonomous wireless environment such organization can be achieved using self organized phenomenon like Lateral inhibition and Flocking and beamforming (a concept in communication). Towards this, we first use Lateral Inhibition, analogy to Flocking behavior and beamforming to show how dissemination of information can be enhanced. Lateral Inhibition is used to create virtual regions in the network. Then using the analogy of Flocking rules, beam properties of the nodes in the regions are set. We then prove that small world properties are achieved using average path length metric. However, the proposed algorithm is applicable to static networks and Flocking and Lateral Inhibition concepts, if used in a mobile scenario, will be highly complex in terms of computation and memory. In a mobile scenario such as human mobility aided networks, the network structure changes frequently. In such conditions dissemination of information is highly impacted as new connections are made and old ones are broken. We thus use stability concept in mobile networks with beamforming to show how information dissemination process can be enhanced. In the algorithm, we first predict the stability of a node in the mobile network using locally available information and then uses it to identify beamforming nodes. In the algorithm, the low stability nodes are allowed to beamform towards the nodes with high stability. The difference between high and low stability nodes is based on threshold value. The algorithm is developed such that it does not require any global knowledge about the network and works using only local information. The results are validated using how quickly more number of nodes receive the information and different state of the art algorithms. We also show the effect of various parameters such as number of sources, number of packets, mobility parameters and antenna parameters etc. on the information dissemination process in the network. In realistic scenarios however, the dynamicity in the network is not only related to mobility. Dynamic conditions also arise due to change in density of nodes at a given time. To address effect of such scenario on the dissemination of information related to public safety in a metapopulation, we use the concepts of epidemic model, beamforming and the countrywide mobility pattern extracted from the $D4D$ dataset. Here, we also propose the addition of three latent states to the existing epidemic model ($SIR$ model). We study the transient states towards the evolution of the number of devices having the information and the difference in the number of devices having the information when compared with different cases to evaluate the results. Through the results we show that enhancements in the dissemination process can be achieved in the addressed scenario
|
10 |
Content Distribution in Social GroupsAggarwal, Saurabh January 2014 (has links) (PDF)
We study Social Groups consisting of self-interested inter-connected nodes looking for common content. We can observe Social Groups in various socio-technological networks, such as Cellular Network assisted Device-to-Device communications, Cloud assisted Peer-to-Peer Networks, hybrid Peer-to-Peer Content Distribution Networks and Direct Connect Networks. Each node wants to acquire a universe of segments at least cost. Nodes can either access an expensive link to the content distributor for downloading data segments, or use the well-connected low cost inter-node network for exchanging segments among themselves.
Activation of an inter-node link requires cooperation among the participating nodes and reduces the cost of downloading for the nodes. However, due to uploading costs, Non-Reciprocating Nodes are reluctant to upload segments, in spite of their interest in downloading segments from others. We define the Give-and-Take (GT) criterion, which prohibits non-reciprocating behaviour in Social Groups for all nodes at all instants. In the “Full Exchange” case studied, two nodes can exchange copies of their entire segment sets, if each node gains at least one new segment from the other.
Incorporating the GT criterion in the Social Group, we study the problem of downloading the universe at least cost, from the perspective of a new node having no data segments. We analyze this NP-hard problem, and propose algorithms for choosing the initial segments to be downloaded from the content distributor and the sequence of nodes for exchange. We compare the performance of these algorithms with a few existing P2P downloading strategies in terms of cost and running time.
In the second problem, we attempt to reduce the load on the content distributor by choosing a schedule of inter-node link activations such that the number of nodes with the universe is maximized. Link activation decisions are taken by a central entity, the facilitator, for achieving the social optimum. We present the asymptotically optimal Randomized algorithm. We also present other algorithms, such as the Greedy Links algorithm and the Polygon algorithm, which are optimal under special scenarios of interest. We compare the performances of all proposed algorithms with the optimal value of the objective. We observe that computationally intensive algorithms exhibit better performance.
Further, we consider the problem of decentralized scheduling of links. The decisions of link activations are made by the participating nodes in a distributed manner. While conforming to the GT criterion for inter-node exchanges, each node's objective is to maximize its utility. Each node tries to find a pairing partner by preferentially exploring nodes for link formation. Unpaired nodes choose to download a segment using the expensive link with Segment Aggressiveness Probability (SAP). We present linear complexity decentralized algorithms for nodes to choose their best strategy. We present a decentralized randomized algorithm that works in the absence of the facilitator and performs close to optimal for large number of nodes. We define the Price of Choice to benchmark performance of Social Groups (consisting of non-aggressive nodes) with the optimal. We evaluate the performance of various algorithms and characterize the behavioural regime that will yield best results for node and Social Group as well.
|
Page generated in 0.109 seconds