Advertisement

Modeling Self-organized Application Spreading

  • Ádám Horváth
  • Károly Farkas
Conference paper
  • 377 Downloads
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 63)

Abstract

Information spreading in self-organized networks is a frequently investigated research topic today; however, investigating the characteristics of application spreading by exploiting the direct connections between the user devices has not been widely studied yet. In this paper, we present our spreading model, in which we use Closed Queuing Networks to model the application spreading process. In this model, we capture the users’ behavior, as well. We also give some simulation results to demonstrate the usage of our model.

Keywords

application spreading self-organized networks mathematical modeling 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Robertazzi, T.G.: Computer Networks and Systems: Queuing Theory and Performance Evaluation. Springer, New York (1994)CrossRefGoogle Scholar
  2. 2.
    Plattner, B., Farkas, K.: Supporting Real-Time Applications in Mobile Mesh Networks. In: MeshNets 2005 Workshop, Budapest, Hungary (2005)Google Scholar
  3. 3.
    Čapkun, S., Buttyán, L., Hubaux, J.-P.: Self-Organized Public-Key Manegement for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 2(1) (2006)Google Scholar
  4. 4.
    Hu, Y.-C., Johnson, D.B., Perrig, A.: Secure Efficient Distance Vector Routing in Mobile Wireless Ad Hoc Networks. In: 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), Callicoon, New York, USA (2002)Google Scholar
  5. 5.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: 8th ACM International Conference on Mobile Computing and Networking (MobiCom), Atlanta, Georgia, USA (2002)Google Scholar
  6. 6.
    Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., Belding-Royer, E.M.: A Secure Routing Protocol for Ad Hoc Networks. In: 10th IEEE International Conference on Network Protocols (ICNP), Paris, France (2002)Google Scholar
  7. 7.
    Cohen, B.: Incentives Build Robustness in BitTorrent. In: 1st Workshop on Economics of Peer-to-Peer Systems, UC Berkeley, California, USA (2003)Google Scholar
  8. 8.
    Wang, Y., Chakrabarti, D., Wang, C., Faloutsos, C.: Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint. In: 22nd International Symposium on Reliable Distributed Systems (SRDS 2003), Florence, Italy, pp. 25–34 (2003)Google Scholar
  9. 9.
    Pastor-Satorras, R., Vespignani, A.: Epidemic Spreading in Scale-Free Networks. Phys. Rev. Lett. 86, 3200 (2001)CrossRefGoogle Scholar
  10. 10.
    Fu, F., Liu, L., Wang, L.: Information Propagation in a Novel Hierarchical Network. In: 46th IEEE Conference on Decision and Control, New Orleans, USA (2007)Google Scholar
  11. 11.
    Khelil, A., Becker, C., Tian, J., Rothermel, K.: An Epidemic Model for Information Diffusion in MANETs. In: 5th ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, Atlanta, Georgia, USA (2002)Google Scholar
  12. 12.
    Sekkas, O., Piguet, D., Anagnostopoulos, C., Kotsakos, D., Alyfantis, D., Kassapoglou-Faist, C., Hadjiethymiades, S.: Probabilistic Information Dissemination for MANETs: the IPAC Approach. In: 20th Tyrrhenian Workshop on Digital Communications, Pula, Italy (2009)Google Scholar
  13. 13.
    Karyotis, V., Kakalis, A., Papavassiliou, S.: Malware-Propagative Mobile Ad Hoc Networks:Asymptotic Behavior Analysis. Journal of Computer Science and Technology 23(3), 389–399 (2008)CrossRefGoogle Scholar
  14. 14.
    Huang, E., Hu, W., Crowcroft, J., Wassel, I.: Towards Commercial Mobile Ad Hoc Network Application: A Radio Dispatch System. In: 9th Annual International Conference on Mobile Computing and Networking, San Diego, California, USA (2003)Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2011

Authors and Affiliations

  • Ádám Horváth
    • 1
  • Károly Farkas
    • 1
    • 2
  1. 1.University of West HungarySopronHungary
  2. 2.Budapest University of Technology and EconomicsBudapestHungary

Personalised recommendations