Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Konstantinos Psounis is active.

Publication


Featured researches published by Konstantinos Psounis.


IEEE ACM Transactions on Networking | 2008

Efficient routing in intermittently connected mobile networks: the multiple-copy case

Thrasyvoulos Spyropoulos; Konstantinos Psounis; Cauligi S. Raghavendra

Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks (VANETs), etc. In this context, conventional routing schemes would fail, because they try to establish complete end-to-end paths, before any data is sent. To deal with such networks researchers have suggested to use flooding-based routing schemes. While flooding-based schemes have a high probability of delivery, they waste a lot of energy and suffer from severe contention which can significantly degrade their performance. With this in mind, we look into a number of ldquosingle-copyrdquo routing schemes that use only one copy per message, and hence significantly reduce the resource requirements of flooding-based algorithms. We perform a detailed exploration of the single-copy routing space in order to identify efficient single-copy solutions that (i) can be employed when low resource usage is critical, and (ii) can help improve the design of general routing schemes that use multiple copies. We also propose a theoretical framework that we use to analyze the performance of all single-copy schemes presented, and to derive upper and lower bounds on the delay of any scheme.


international conference on computer communications | 2000

CHOKe - a stateless active queue management scheme for approximating fair bandwidth allocation

Rong Pan; Balaji Prabhakar; Konstantinos Psounis

We investigate the problem of providing a fair bandwidth allocation to each of n flows that share the outgoing link of a congested router. The buffer at the outgoing link is a simple FIFO, shared by packets belonging to the n flows. We devise a simple packet dropping scheme, called CHOKe, that discriminates against the flows which submit more packets per second than is allowed by their fair share. By doing this, the scheme aims to approximate the fair queueing policy. Since it is stateless and easy to implement, CHOKe controls unresponsive or misbehaving flows with a minimum overhead.


mobile ad hoc networking and computing | 2006

Performance analysis of mobility-assisted routing

Thrasyvoulos Spyropoulos; Konstantinos Psounis; Cauligi S. Raghavendra

Traditionally, ad hoc networks have been viewed as a connected graph over which end-to-end routing paths had to be established.Mobility was considered a necessary evil that invalidates paths and needs to be overcome in an intelligent way to allow for seamless ommunication between nodes.However, it has recently been recognized that mobility an be turned into a useful ally, by making nodes carry data around the network instead of transmitting them. This model of routing departs from the traditional paradigm and requires new theoretical tools to model its performance. A mobility-assisted protocol forwards data only when appropriate relays encounter each other, and thus the time between such encounters, called hitting or meeting time, is of high importance.In this paper, we derive accurate closed form expressions for the expected encounter time between different nodes, under ommonly used mobility models. We also propose a mobility model that can successfully capture some important real-world mobility haracteristics, often ignored in popular mobility models, and alculate hitting times for this model as well. Finally, we integrate this results with a general theoretical framework that can be used to analyze the performance of mobility-assisted routing schemes. We demonstrate that derivative results oncerning the delay of various routing s hemes are very accurate, under all the mobility models examined. Hence, this work helps in better under-standing the performance of various approaches in different settings, and an facilitate the design of new, improved protocols.


acm special interest group on data communication | 2006

Interference-aware fair rate control in wireless sensor networks

Sumit Rangwala; Ramakrishna Gummadi; Ramesh Govindan; Konstantinos Psounis

In a wireless sensor network of N nodes transmitting data to a single base station, possibly over multiple hops, what distributed mechanisms should be implemented in order to dynamically allocate fair and efficient transmission rates to each node? Our interferenceaware fair rate control (IFRC) detects incipient congestion at a node by monitoring the average queue length, communicates congestion state to exactly the set of potential interferers using a novel low-overhead congestion sharing mechanism, and converges to a fair and efficient rate using an AIMD control law. We evaluate IFRC extensively on a 40-node wireless sensor network testbed. IFRC achieves a fair and efficient rate allocation that is within 20-40% of the optimal fair rate allocation on some network topologies. Its rate adaptation mechanism is highly effective: we did not observe a single instance of queue overflow in our many experiments. Finally, IFRC can be extended easily to support situations where only a subset of the nodes transmit, where the network has multiple base stations, or where nodes are assigned different transmission weights.


ieee international conference computer and communications | 2007

Modeling Time-Variant User Mobility in Wireless Mobile Networks

Wei-jen Hsu; Thrasyvoulos Spyropoulos; Konstantinos Psounis; Ahmed Helmy

Realistic mobility models are important to understand the performance of routing protocols in wireless ad hoc networks, especially when mobility-assisted routing schemes are employed, which is the case, for example, in delay-tolerant networks (DTNs). In mobility-assisted routing, messages are stored in mobile nodes and carried across the network with nodal mobility. Hence, the delay involved in message delivery is tightly coupled with the properties of nodal mobility. Currently, commonly used mobility models are simplistic random i.i.d. model that do not reflect realistic mobility characteristics. In this paper we propose a novel time-variant community mobility model. In this model, we define communities that are visited often by the nodes to capture skewed location visiting preferences, and use time periods with different mobility parameters to create periodical re-appearance of nodes at the same location. We have clearly observed these two properties based on analysis of empirical WLAN traces. In addition to the proposal of a realistic mobility model, we derive analytical expressions to highlight the impact on the hitting time and meeting times if these mobility characteristics are incorporated. These quantities in turn determine the packet delivery delay in mobility-assisted routing settings. Simulation studies show our expressions have error always under 20%, and in 80% of studied cases under 10%.


IEEE Communications Surveys and Tutorials | 1999

Active networks: Applications, security, safety, and architectures

Konstantinos Psounis

Active networks represent a new approach to network architecture. Routers can perform computations on user data, while packets can carry programs to be executed on routers and possibly change their state. Currently, the research community is divided concerning the usefulness of active networks. On the one hand, active networks provide a much more flexible network infrastructure, with increased capabilities. On the other hand, they are obviously more complex than traditional networks and raise considerable security issues. The purpose of this article is to provide a broad survey on active networks. The first goal is to highlight their efficiency in a variety of applications. After presenting some key points on each application, we discuss some current experimental technologies and assess the usefulness of active networks in congestion control, multicasting, caching, and network management. The second goal is to address the security issues that active networks raise: the problem is defined, and techniques for solving it are presented and elaborated upon with a description of a specific implementation of a secure environment and related performance measures. Issues related to the design of a programming language for active networks are also discussed. The third goal is to classify active network architectures based on their design approach. Thus an inclusive presentation of currently proposed architectures, which focuses on their design attributes, capabilities, performance, and security, is given.


IEEE ACM Transactions on Networking | 2009

Modeling spatial and temporal dependencies of user mobility in wireless mobile networks

Wei-jen Hsu; Thrasyvoulos Spyropoulos; Konstantinos Psounis; Ahmed Helmy

Realistic mobility models are fundamental to evaluate the performance of protocols in mobile ad hoc networks. Unfortunately, there are no mobility models that capture the non-homogeneous behaviors in both space and time commonly found in reality, while at the same time being easy to use and analyze. Motivated by this, we propose a time-variant community mobility model, referred to as the TVC model, which realistically captures spatial and temporal correlations. We devise the communities that lead to skewed location visiting preferences, and time periods that allow us to model time dependent behaviors and periodic reappearances of nodes at specific locations. To demonstrate the power and flexibility of the TVC model, we use it to generate synthetic traces that match the characteristics of a number of qualitatively different mobility traces, including wireless LAN traces, vehicular mobility traces, and human encounter traces. More importantly, we show that, despite the high level of realism achieved, our TVC model is still theoretically tractable. To establish this, we derive a number of important quantities related to protocol performance, such as the average node degree, the hitting time, and the meeting time, and provide examples of how to utilize this theory to guide design decisions in routing protocols.


international conference on vehicular electronics and safety | 2008

IEEE 802.11p performance evaluation and protocol enhancement

Yi Wang; Akram Ahmed; Bhaskar Krishnamachari; Konstantinos Psounis

The IEEE 802.11p wireless access in vehicular environment (WAVE) protocol providing for vehicle-to-infrastructure and vehicle-to-vehicle radio communication is currently under standardization. We provide an NS-2 simulation study of the proposed IEEE 802.11p MAC protocol focusing on vehicle-to-infrastructure communication. We show that the specified MAC parameters for this protocol can lead to undesired throughput performance because the backoff window sizes are not adaptive to dynamics in the numbers of vehicles attempting to communicate. We propose two solutions to this problem. One is a centralized approach where exact information about the number of concurrent transmitting vehicles is used to calculate the optimal window size, and the other is a distributed approach in which vehicles use local observations to adapt the window size.We show that these schemes can provide significant improvements over the standard MAC protocol under dense and dynamic conditions.


ACM Transactions on Sensor Networks | 2006

Modeling spatially correlated data in sensor networks

Apoorva Jindal; Konstantinos Psounis

The physical phenomena monitored by sensor networks, for example, forest temperature or water contamination, usually yield sensed data that are strongly correlated in space. With this in mind, researchers have designed a large number of sensor network protocols and algorithms that attempt to exploit such correlations.There is an increasing need to synthetically generate large traces of spatially correlated data representing a wide range of conditions to carefully study the performance of these algorithms. Further, a mathematical model for generating synthetic traces would provide guidelines for designing more efficient algorithms. These reasons motivate us to obtain a simple and accurate model of spatially correlated sensor network data.The proposed model is Markovian in nature and can capture correlation in data irrespective of the node density, the number of source nodes, or the topology. We describe a rigorous mathematical procedure and a simple practical method to extract the model parameters from real traces. We also show how to efficiently generate synthetic traces on a given topology using these parameters. The correctness of the model is verified by statistically comparing synthetic and real data. Further, the model is validated by comparing the performance of algorithms whose behavior depends on the degree of spatial correlation in data, under real and synthetic traces. The real traces are obtained from remote sensing data, publicly available sensor data, and sensor networks that we deploy. We show that the proposed model is more general and accurate than the commonly used jointly Gaussian model. Finally, we create tools that can be easily used by researchers to synthetically generate traces of any size and degree of correlation.


acm/ieee international conference on mobile computing and networking | 2008

Understanding congestion control in multi-hop wireless mesh networks

Sumit Rangwala; Apoorva Jindal; Ki-Young Jang; Konstantinos Psounis; Ramesh Govindan

Complex interference in static multi-hop wireless mesh networks can adversely affect transport protocol performance. Since TCP does not explicitly account for this, starvation and unfairness can result from the use of TCP over such networks. In this paper, we explore mechanisms for achieving fair and efficient congestion control for multi-hop wireless mesh networks. First, we design an AIMD-based rate-control protocol called Wireless Control Protocol (WCP) which recognizes that wireless congestion is a neighborhood phenomenon, not a node-local one, and appropriately reacts to such congestion. Second, we design a distributed rate controller that estimates the available capacity within each neighborhood, and divides this capacity to contending flows, a scheme we call Wireless Control Protocol with Capacity estimation (WCPCap). Using analysis, simulations, and real deployments, we find that our designs yield rates that are both fair and efficient, and achieve near optimal goodputs for all the topologies that we study. WCP achieves this level of performance while being extremely easy to implement. Moreover, WCPCap achieves the max-min rates for our topologies, while still being distributed and amenable to real implementation.

Collaboration


Dive into the Konstantinos Psounis's collaboration.

Top Co-Authors

Avatar

Apoorva Jindal

University of Southern California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Antonios Michaloliakos

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Fragkiskos Papadopoulos

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Giuseppe Caire

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ramesh Govindan

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Leana Golubchik

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Matthew A. Clark

University of Southern California

View shared research outputs
Researchain Logo
Decentralizing Knowledge