Institute for Systems Research Technical Reports

Permanent URI for this collectionhttp://hdl.handle.net/1903/4376

This archive contains a collection of reports generated by the faculty and students of the Institute for Systems Research (ISR), a permanent, interdisciplinary research unit in the A. James Clark School of Engineering at the University of Maryland. ISR-based projects are conducted through partnerships with industry and government, bringing together faculty and students from multiple academic departments and colleges across the university.

Browse

Search Results

Now showing 1 - 3 of 3
  • Thumbnail Image
    Item
    Distributed Opportunistic Scheduling for Wireless Ad-Hoc Networks with Block-Fading Model
    (2013) Chen, Hua; Baras, John
    In this paper, we study a distributed opportunistic scheduling problem to exploit the channel fluctuations in wireless ad-hoc networks. In this problem, channel probing is followed by a transmission scheduling procedure executed independently within each link in the network. We study this problem for the popular block-fading channel model, where channel dependencies are inevitable between different time instances during the channel probing phase. Different from existing works, we explicitly consider this type of channel dependencies and its impact on the transmission scheduling and hence the system performance. We use optimal stopping theory to formulate this problem, but at carefully chosen time instances at which effective decisions are made. The problem can then be solved by a new stopping rule problem where the observations are independent between different time instances. Since the stopping rule problem has an implicit horizon determined by the network size, we first characterize the system performance using backward induction. We develop one recursive approach to solve the problem and show that the computational complexity is linear with respect to network size. Due to its computational complexity, we present an approximated approach for performance analysis and develop a metric to check how good the approximation is. We characterize the achievable system performance if we ignore the finite horizon constraint and design stopping rules based on the infinite horizon analysis nevertheless. We present an improved protocol to reduce the probing costs which requires no additional cost. We characterize the performance improvement and the energy savings in terms of the probing signals. We show numerical results based on our mathematical analysis with various settings of parameters.
  • Thumbnail Image
    Item
    Distributed Trust Evaluation in Ad-Hoc Networks
    (2004) Theodorakopoulos, Georgios; Baras, John S.; ISR; CSHCN
    An important concept in network security is trust, interpreted as a relation among entities that participate in various protocols. Trust relations are based on evidence related to the previous interactions of entities within a protocol. In this work, we are focusing on the evaluation process of trust evidence in Ad Hoc Networks. Because of the dynamic nature of Ad Hoc Networks, trust evidence may be uncertain and incomplete. Also, no pre-established infrastructure can be assumed. The process is formulated as a path problem on a directed graph, where nodes represent entities, and edges represent trust relations. We show that two nodes can establish an indirect trust relation without previous direct interaction. The results are robust in the presence of attackers. We give intuitive requirements for any trust evaluation algorithm. The performance of the scheme is evaluated on various topologies.
  • Thumbnail Image
    Item
    Bandwidth Calculation in a TDMA-based Ad Hoc Network
    (2000) Zhu, Chenxi; Corson, M. Scott; Corson, M. Scott; ISR; CSHCN
    Bandwidth calculation for Quality-of-Service (QoS) routing in an ad hocnetwork employing Time-Division-Multiple-Access (TDMA) is studied.

    Certain constraints of TDMA transmission in a wireless network requirescareful scheduling among the nodes in order to achieve conflict-free operations. These constraints also make the calculation of the end-to-end bandwidth along a path non-trivial. These calculationsare essential for QoS routing which requires a certain amount of bandwidth available on a route.

    We prove the problem of calculating the maximal end-to-end bandwidth along a given a path in a TDMA network is NP-complete, and develop an efficient bandwidth calculation scheme. We also show how the bandwidth calculation scheme can be usedwith the Ad-hoc On-demand Distance Vector protocol (AODV) to perform QoSrouting.