Inferring network topologies in MANETs applied to service redeployment

S. Silvestri, B. Holbert, P. Novotny, T. La Porta, A. Wolf, A. Swami

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

The heterogeneous and dynamic nature of tactical coalition networks poses several challenges to common network management tasks, due to the lack of complete and accurate network information. In this paper, we consider the problem of redeploying services in mobile tactical networks. We propose M-iTop, an algorithm for inferring the network topology when only partial information is available. M-iTop initially constructs a virtual topology that overestimates the number of network components, and then repeatedly merges links in this topology to resolve it towards the structure of the true network. We perform extensive simulations and show that M-iTop enables an efficient redeployment of services over the network despite the limitation of partial information.

Original languageEnglish
Title of host publication24th International Conference on Computer Communications and Networks, ICCCN 2015
ISBN (Electronic)9781479999644
DOIs
StatePublished - Oct 2 2015
Event24th International Conference on Computer Communications and Networks, ICCCN 2015 - Las Vegas, United States
Duration: Aug 3 2015Aug 6 2015

Publication series

NameProceedings - International Conference on Computer Communications and Networks, ICCCN
Volume2015-October
ISSN (Print)1095-2055

Conference

Conference24th International Conference on Computer Communications and Networks, ICCCN 2015
Country/TerritoryUnited States
CityLas Vegas
Period8/3/158/6/15

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

Keywords

  • Partial information
  • Service redeployment
  • Topology inference

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint

Dive into the research topics of 'Inferring network topologies in MANETs applied to service redeployment'. Together they form a unique fingerprint.

Cite this