Hacia el diseño de un módulo social-inspirado para la toma de decisiones de los nodos de una red Ad Hoc
DOI:
https://doi.org/10.18046/syt.v14i36.2212Palabras clave:
Red Ad Hoc, toma de decisiones, recursos, nodo.Resumen
Este artículo presenta el estado del arte preparado en un proyecto de investigación que propone la construcción de un módulo de software en nodos inalámbricos que adquieran la capacidad de decidir sobre su ingreso (o no ingreso) a una red Ad Hoc, y sobre la cantidad de recursos que van a aportar a ella, si deciden entrar, considerando datos que le proporciona la red acerca de los recursos disponibles y la cantidad de nodos, y acerca de parámetros internos como CPU, disco duro y procesador, entre otros, mediante un modelo matemático de toma de decisiones. El módulo debe poder interactuar con un intérprete en un nivel inferior y una entidad de nivel superior que equivale a un sistema distribuido. La investigación está enmarcada en el Sistema de Cómputo del grupo TLÖN de la Universidad Nacional de Colombia, el cual busca la aplicación de un paradigma social-inspirado en redes Ad Hoc.
Referencias
Bitam, S., Mellouk, A., & Zeadally, S. (2014). Bio-inspired routing algorithms survey for vehicular ad hoc networks. IEEE Communications Survey Tutorials, 17(2), 843-867.
Buchegger, S., & Le Boudec, J. Y. (2005). Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine, 43(7), 101-107.
Chowdhury, F. N. (1993). Decision making with neural networks. In Proceedings of Southeastcon ’93. IEEE.
Dudkowski, D. Marrón, P. J. & Rothermel, K. (2006). An efficient resilience mechanism for data centric storage in mobile ad hoc networks. In Proceedings - IEEE International Conference on Mobile Data Management. IEEE. doi:10.1109/MDM.2006.33
Economides, A. A. & Silvester, J. A. (1991). Multi-objective routing in integrated services networks: A game theory approach. In INFOCOM ’91. Proceedings. Tenth Annual Joint Conference of the IEEE Computer and Communications Societies. Networking in the 90s (pp. 1220-1227). IEEE
Fitzek, F. & Katz, M. (2014). Mobile clouds: Exploiting distributed resources in wireless, mobile and social networks. New Delhi, India: PUB.
Gebali, F. (2009). Cross-Layer Modeling of Wireless Ad Hoc Networks in the Presence of Channel Noise. In Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE.
Hatzivasilis, G. & Manifavas, C. (2012). Building trust in ad hoc distributed resource-sharing networks using reputation-based systems. In Proceedings of the 2012 16th Panhellenic Conference on Informatics, PCI 2012 (pp. 416–421). IEEE.
Johnson., D, Aichele, C., & Ntlatlapa, N. (2008). Simple pragmatic approach to mesh routing using BATMAN. In 2nd IFIP International Symposium on Wireless Communications and Information Technology in Developing Countries, CSIR, Pretoria, South Africa, 6-7 October (p. 10).
Kumar-Sarkar, S., Basavaraju, T., & Puttamadappa, C. (2013). Ad Hoc mobile wireless network: principles, protocols and applications. Boca Raton, FL: CRC.
Lindner, M., Wunderlich, S., & Eckelmann, S. (2011). B.A.T.M.A.N (Better Approach to Mobile Ad-Hoc Network) [online]. Retrieved from: http://www.open-mesh.org
Loo, J., Lloret, J., & Hamilton, J. (2012). Mobile ad hoc networks: current status and future trends. Boca Raton, FL: CRC.
Lu, S., Miao, Q., & Fang, J. (2008). Effects of network topology on decision-making in a biological network model. In First International Conference on Intelligent Networks and Intelligent Systems, 2008. ICINIS ’08 (pp. 197-200).
Luce, R. D. & Raiffa, H. (1989). Games and decisions: Introduction and critical survey. New York, NY: Dover.
Maldonado, C.E. & Gómez, N.A. (2011). Sistemas bio-inspirados: un marco teórico para la ingeniería de sistemas complejos. Bogotá, Colombia: Universidad del Rosario.
Miura-ko, R., Yolken, B., Mitchel, J., & Bambos, N. (2008). Security decision-making among interdependent organizations. In IEEE 21st. Computer Security Foundations Symposium, 2008. CSF ’08 (pp. 66-80). IEEE.
Monk, S. (2013). Raspberry Pi cookbook: Software and hardware problems and solutions. Sebastopol, CA: O’Reilly Media.
Nagel, T. (1973). Rawls on justice. Philosophical Review, 82(2), 220-234.
Ni, J. & Yang, S.X. (2011). Bioinspired neural network for real-time cooperative hunting by multirobots in unknown environments. IEEE Transactions in Neural Networks, 22(12), 2062-2077.
Niswar, M., Sabri, A., Warni, E., Musa, M. (2013). Memory sharing management on virtual private server. In 2013 International Conference on ICT for Smart Society (ICISS). IEEE. doi:10.1109/ICTSS.2013.6588079
Oehlman, F. (2011). Simulation of the ‘Better Approach to Mobile Adhoc Networking Protocol (thesis). Technische Universit¨at Munchen: Germany.
OpenWrt Community (2016). OpenWrt: Wireless Freedom [online]. Retrieved from: . [Accessed: 02-Mar-2016].http://openwrt.org
Orozco, A.M. & Llano, G. (2014). OSA: a vanet application focused on fuel saving and reduction of CO2 emissions. Sistemas & Telemática, 12(9), 25-47.
Orozco, A.M., Llano, G., & Michoud, R. (2012). Redes vehiculares Ad-hoc: aplicaciones basadas en simulación. Ingenium, 6(12), 11-22.
Ortiz-Triviño, J. & Ospina-López, J. P. (2015). Caracterización de un clúster y sus recursos en una red Ad Hoc a partir de la distribución geométrica truncada. Revista Universidad Santo Tomás, 12(1), 68-75.
Ortiz-Triviño, J. E. & Hernández,G. (2011). Cálculo de algunas medidas estadísticas para evaluar el desempeño de redes Ad Hoc. Ingeniería y Competitividad, 8( 1), 15-21.
Raspbian Community (2012). Raspbian [online].Retrieved from: https://www.raspbian.org/
Ray, S., Carruthers, J.B., & Starobinski, D. (2005). Evaluation of the masked node problem in ad hoc wireless LANs. IEEE Transactions in Mobile Computing, 4(5), 430-442.
Rezaei, B.A., Sarshar, N., & Roychowdhury, V. P. (2010). Distributed resource sharing in low-latency wireless ad hoc networks. IEEE/ACM Transactions on Networking, 18(1), 190-201.
Rosen, R. (2014).Linux kernel networking: Implementation and theory. New York, NY: Apress.
Rosenblum, M. (2004). The reincarnation of virtual machines. Queue, 2(5), 34.
Roughgarden, T. (2010). Algorithmic game theory. Commununications of the ACM, 53(7), 78.
Saaty, T. L. (1990). How to make a decision: The analytic hierarchy process. Eur. J. Oper. Res., 48(1), 9-26.
Salehi, M. J., Khalaj, B. H., Katz, M., Fazelnia, G., Karimi, P., & Del Ser, J. (2012). Mobile clouds: How to find opportunities. In 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) ( pp. 170-172). IEEE.
Stewart and, A. J. & Plotkin, J. B. (2013). From extortion to generosity, evolution in the Iterated Prisoner’s Dilemma. Proceedings of the National Academy of Sciences, 110(38), 15348-15353.
Támara, l.J. & Alzate, M.A. (2011). Control of admission for Ad Hoc mobile network based on estimates available bandwidth. Bogotá, Colombia: PUB.
Texas Instruments [TI] (2016). BeagleBoard [online]. Retrieved from: https://beagleboard.org/black
Thanapal, P. & Saleem-Durai, M.A. (2014). A survey of mobile cloud computing for extending energy of mobile devices. Appl. Mech. Mater., 573, 549-555.
Toh, C. K., Kim, D., Oh, S., & Yoo, H. (2010, February). The controversy of selfish nodes in ad hoc networks. In 2010 The 12th International Conference on Advanced Communication Technology (ICACT), (Vol. 2, pp. 1087-1092). IEEE.
Turocy, T. L. & Von-Stengel, B. (2003). Game theory. In Encyclopedia of Information Systems (pp. 403-420). London, UK: Academic Press.
Tversky, A. & Shafir, E. (1992). Choice under conflict: The dynamics of deferred decision. Psychol. Sci., 3(6), 358-361.
Tversky, A. (1972). Elimination by aspects: A theory of choice. Psychol. Rev., 79(4), 281-299.
Villalba, L.J.G., Canas, D.R., & Orozco, A.L.S. (2010). Bio-inspired routing protocol for mobile ad hoc networks. IET Communications, 4(18), 2187-2195.
Wang, S. H. & Archer, N. PO. (1998). A neural network based fuzzy set model for organizational decision making. IEEE Transactions on Systems, Man, and Cybernetics: Part C (Applications& Reviews), 28(2), 194-203.
Ward, B. (2014). How Linux works: What every superuser should know [2a ed.]. San Francisco, CA: No Starch Press.
Xu, J., Wang, L., Li, Y., Qin, Z., & Zhu, M. (2011). An experimental study of BATMAN performance in a campus deployment of wireless mesh networks. In Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011 (pp. 341-342). IEEE.
Zadeh, L.A. (1996). Fuzzy logic = computing with words. IEEE Transactions in Fuzzy Systems, 4(2), 103-111.
Zarate-Ceballos, H. & Ortiz-Triviño, J. E. (2012). Mesh networks, communications emergency response. Int. J. Eng. Technol., 2(2), 509-514.
Zarate-Ceballos, H., Sánchez-Cifuentes, J.F., Ospina-López, J.P., & Ortiz-Triviño, J.E. (2015). Sistema de telecomunicaciones social-inspirado mediante comunidades de agentes. In Congreso Internacional de Computación Colombia-México, 2015 (pp. 56-63). Bogotá, Colombia: Fabbecor
Descargas
Publicado
Número
Sección
Licencia
Esta publicación está licenciada bajo los términos de la licencia CC BY 4.0 (https://creativecommons.org/licenses/by/4.0/deed.es)