Featured Research

from universities, journals, and other organizations

Reliable communication, unreliable networks

Date:
August 5, 2013
Source:
Massachusetts Institute of Technology
Summary:
A new model of wireless networks that better represents the real world could lead to more robust communications protocols.

Now that the Internet's basic protocols are more than 30 years old, network scientists are increasingly turning their attention to ad hoc networks -- communications networks set up, on the fly, by wireless devices -- where unsolved problems still abound.

Related Articles


Most theoretical analyses of ad hoc networks have assumed that the communications links within the network are stable. But that often isn't the case with real-world wireless devices -- as anyone who's used a cellphone knows.

At the Association for Computing Machinery's Symposium on Principles of Distributed Computing in July, past and present researchers from the Theory of Distributed Systems Group at MIT's Computer Science and Artificial Intelligence Laboratory presented a new framework for analyzing ad hoc networks in which the quality of the communications links fluctuates. Within that framework, they provide mathematical bounds on the efficiency with which messages can propagate through the network, and they describe new algorithms that can achieve maximal efficiency.

"There's been a discrepancy between the theory, with its idealized models, and the reality of wireless networks," says Nancy Lynch, the NEC Professor of Software Science and Engineering at MIT and head of the Theory of Distributed Systems Group. "When people start designing theoretical algorithms, they tend to rely too heavily on the specific assumptions of the models. So the algorithms tend to be unrealistic and fragile."

In the past, some researchers have tried to model the unreliability of network links as random fluctuations. "But if you assume real randomness, then you can count on the randomness," Lynch says. "Somehow you can use that in your algorithm. Maybe randomness itself is giving you an assumption that's too strong."

Adversarial relationships

So Lynch and her coauthors on the new paper -- Mohsen Ghaffari, a graduate student in electrical engineering and computer science, and Cal Newport, a former graduate student in Lynch's group who's now an assistant professor of computer science at Georgetown University -- instead modeled the fluctuations in the links' quality as the willful manipulations of an "adversary." The adversary can't control all the links in the network: Some will remain up throughout the execution of the communication algorithm. But he can change the bandwidth of the others at will. And the network designer doesn't know in advance which links are reliable and which aren't.

"Your algorithm needs to work for all possible adversaries, some of which are benign and some of which might be doing the worst possible thing for your algorithm," Newport says. "In other words, it needs to work for all possible strategies for controlling the network."

In a paper that appeared two years ago, Newport, Lynch and colleagues assumed a very powerful adversary indeed -- one that knew in advance every decision that every node in the network would make while trying to disseminate a message. In that context, they proved, efficient communication is impossible.

In the new paper, they weakened the adversary significantly. He may know exactly how the communications algorithm works, and he may intentionally try to thwart it, but he has to determine his pattern of link manipulation in advance, before the algorithm begins to run. Even this weakened adversary, however, has the potential to be much more disruptive than the types of interference that real-world wireless networks are likely to encounter -- such as doors opening and closing, people turning on microwaves, or rain falling.

Lynch, Newport and Ghaffari examined two types of message dissemination. In the first, a single node of the network is trying to broadcast a message to all other nodes. In that case, they found, efficient communication is possible, even in the adversary's presence.

Geometrical supposition

The second case is that in which a number of nodes are each transmitting messages, and every one of their immediate neighbors has to receive a message from at least one transmitter. As it turns out, many common problems in the analysis of ad hoc networks boil down to this one.

Here, the researchers found that the adversary's presence can thwart efficient communication -- but only if the network has an odd shape, in which a central node is connected to many nearby nodes that aren't connected to each other. That type of network layout is improbable in the real world: If two wireless devices are close enough to a third to communicate with it, they're likely to be able to communicate with each other, too.

Once the researchers added another assumption -- that two devices connected to a third will at least sometimes be able to establish links with each other, too -- efficient communication again becomes possible.

In both cases, the researchers' communication algorithms were able to thwart the adversary by using randomness. One of the problems with designing communications protocols for ad hoc wireless networks is that if two nearby nodes begin transmitting at the same time at the same frequency, they can interfere with each other, preventing either transmission from being received. The best-performing protocols thus assign each node a probability of transmitting during any one round of communication (where a round is defined by the time it takes for a node to send a message to its immediate neighbors).

The MIT researchers' algorithms adhere to this basic scheme -- but rather than cycling through a prescribed sequence of steadily shrinking probabilities, they scramble the sequence up. In the case of the local broadcast, each separate message has to have its own unique sequence of probabilities. So clusters of nodes also temporarily elect local leaders that coordinate the probabilities for different transmitters. The researchers were able to show, however, that this extra computation didn't slow communication egregiously.

"This whole direction of trying to capture unreliability in terms of adversarial effects is a very good direction, something that hasn't been addressed very much so far," says Magnús Halldórsson, a professor in the School of Computer Science at Reykjavik University and one of the organizers of the Symposium on Principles of Distributed Computing. "And it looks like it will be a key issue in the study of wireless networks."

Halldórsson cautions that the researchers' assumptions may not apply in some plausible real-world scenarios. For instance, interference in one ad hoc network could be caused by transmissions in another, which might adjust its broadcast strategy when it, too, detects a conflict. "It's not necessarily the case that it's completely oblivious to your operation," he says. "We probably need to explore this a bit further." But, he adds, an oblivious adversary "is still quite a natural assumption in many scenarios."


Story Source:

The above story is based on materials provided by Massachusetts Institute of Technology. The original article was written by Larry Hardesty. Note: Materials may be edited for content and length.


Cite This Page:

Massachusetts Institute of Technology. "Reliable communication, unreliable networks." ScienceDaily. ScienceDaily, 5 August 2013. <www.sciencedaily.com/releases/2013/08/130805131113.htm>.
Massachusetts Institute of Technology. (2013, August 5). Reliable communication, unreliable networks. ScienceDaily. Retrieved October 25, 2014 from www.sciencedaily.com/releases/2013/08/130805131113.htm
Massachusetts Institute of Technology. "Reliable communication, unreliable networks." ScienceDaily. www.sciencedaily.com/releases/2013/08/130805131113.htm (accessed October 25, 2014).

Share This



More Computers & Math News

Saturday, October 25, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Real-Life Transformer Robot Walks, Then Folds Into a Car

Real-Life Transformer Robot Walks, Then Folds Into a Car

Buzz60 (Oct. 24, 2014) — Brave Robotics and Asratec teamed with original Transformers toy company Tomy to create a functional 5-foot-tall humanoid robot that can march and fold itself into a 3-foot-long sports car. Jen Markham has the story. Video provided by Buzz60
Powered by NewsLook.com
Microsoft Riding High On Strong Surface, Cloud Performance

Microsoft Riding High On Strong Surface, Cloud Performance

Newsy (Oct. 24, 2014) — Microsoft's Q3 earnings showed its tablets and cloud services are really hitting their stride. Video provided by Newsy
Powered by NewsLook.com
The Best Apps to Organize Your Life

The Best Apps to Organize Your Life

Buzz60 (Oct. 23, 2014) — Need help organizing your bills, schedules and other things? Ko Im (@konakafe) has the best apps to help you stay on top of it all! Video provided by Buzz60
Powered by NewsLook.com
Nike And Apple Team Up To Create Wearable ... Something

Nike And Apple Team Up To Create Wearable ... Something

Newsy (Oct. 23, 2014) — For those looking for wearable tech that's significantly less nerdy than Google Glass, Nike CEO Mark Parker says don't worry, It's on the way. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
 
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:  

Breaking News:

Strange & Offbeat Stories

 

Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:  

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile iPhone Android Web
Follow Facebook Twitter Google+
Subscribe RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins