Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Qunfeng Dong is active.

Publication


Featured researches published by Qunfeng Dong.


mobile ad hoc networking and computing | 2005

Minimum energy reliable paths using unreliable wireless links

Qunfeng Dong; Suman Banerjee; Micah Adler; Archan Misra

We address the problem of energy-efficient reliable wireless communication in the presence of unreliable or lossy wireless link layers in multi-hop wireless networks. Prior work [1] has provided an optimal energy efficient solution to this problem for the case where link layers implement perfect reliability. However, a more common scenario --- a link layer that is not perfectly reliable, was left as an open problem. In this paper we first present two centralized algorithms, BAMER and GAMER, that optimally solve the minimum energy reliable communication problem in presence of unreliable links. Subsequently we present a distributed algorithm, DAMER, that approximates the performance of the centralized algorithm and leads to significant performance improvement over existing single-path or multi-path based techniques.


information processing in sensor networks | 2005

Maximizing system lifetime in wireless sensor networks

Qunfeng Dong

Maximizing system lifetime in battery-powered wireless sensor networks with power aware topology control protocols and routing protocols has received intensive research. In the past, this problem has been mostly studied from the indirect perspective of energy conservation. Although this leads to solutions that help extend network lifetime, energy conservation is not the same problem as network lifetime maximization. Some researchers have formally studied network lifetime maximization problems, based on the assumption that energy is only consumed by packet transmission. However, it is well known that in many cases energy is significantly consumed during idle periods and overhearing. In this paper, we try to present a survey and formal analysis of a variety of network lifetime maximization problems in different energy consumption models. In particular, we identify different energy consumption models, define a variety of fundamental network lifetime maximization problems in individual energy consumption models, and formally analyze their complexities. Polynomial time algorithms are presented for tractable problems, and NP-hardness proofs are presented for intractable problems.


measurement and modeling of computer systems | 2006

Packet classifiers in ternary CAMs can be smaller

Qunfeng Dong; Suman Banerjee; Jia Wang; Dheeraj Agrawal; Ashutosh Shukla

Serving as the core component in many packet forwarding, differentiating and filtering schemes, packet classification continues to grow its importance in todays IP networks. Currently, most vendors use Ternary CAMs (TCAMs) for packet classification. TCAMs usually use brute-force parallel hardware to simultaneously check for all rules. One of the fundamental problems of TCAMs is that TCAMs suffer from range specifications because rules with range specifications need to be translated into multiple TCAM entries. Hence, the cost of packet classification will increase substantially as the number of TCAM entries grows. As a result, network operators hesitate to configure packet classifiers using range specifications. In this paper, we optimize packet classifier configurations by identifying semantically equivalent rule sets that lead to reduced number of TCAM entries when represented in hardware. In particular, we develop a number of effective techniques, which include: trimming rules, expanding rules, merging rules, and adding rules. Compared with previously proposed techniques which typically require modifications to the packet processor hardware, our scheme does not require any hardware modification, which is highly preferred by ISPs. Moreover, our scheme is complementary to previous techniques in that those techniques can be applied on the rule sets optimized by our scheme. We evaluate the effectiveness and potential of the proposed techniques using extensive experiments based on both real packet classifiers managed by a large tier-1 ISP and synthetic data generated randomly. We observe significant reduction on the number of TCAM entries that are needed to represent the optimized packet classifier configurations.


acm/ieee international conference on mobile computing and networking | 2007

Practical network coding in wireless networks

Qunfeng Dong; Jianming Wu; Wenjun Hu; Jon Crowcroft

Network coding is seen as a promising technique to improve network throughput. In this paper, we study two important problems in localized network coding in wireless networks, which only requires each node to know about and coordinate with one-hop neighbors. In particular, we first establish a condition that is both necessary and sufficient for useful coding to be possible. We show this condition is much weaker than expected, and hence allows a variety of coding schemes to suit different network conditions and application preferences. Based on the understanding we establish, we are able to design a robust coding technique called loop coding that can improve network throughput and TCP throughput simultaneously.


Computer Networks | 2008

Load balancing in large-scale RFID systems

Qunfeng Dong; Ashutosh Shukla; Vivek Shrivastava; Dheeraj Agrawal; Suman Banerjee; Koushik Kar

A radio frequency identifier (RFID) system consists of inexpensive, uniquely-identifiable tags that are mounted on physical objects, and readers that track these tags (and hence these physical objects) through RF communication. In this paper we, therefore, address this load balancing problem for readers - given a set of tags that are within range of each reader, which of these tags should each reader be responsible for such that the cost for monitoring tags across the different readers is balanced, while guaranteeing that each tag is monitored by at least one reader. We show that a generalized variant of the load balancing problem is NP-hard and hence present a 2-approximation centralized algorithm. We next present an optimal centralized solution for a specialized variant. Subsequently, we present a localized distributed algorithm that is probabilistic in nature and closely matches the performance of the centralized algorithms. Our results demonstrate that our schemes achieve very good performance even in highly dynamic large-scale RFID systems.


ieee international conference computer and communications | 2006

Throughput Optimization and Fair Bandwidth Allocation in Multi-Hop Wireless LANs

Qunfeng Dong; Suman Banerjee; Benyuan Liu

There is an inherent well-known conflict between fairness and throughput that arises in many networking scenarios. A number of researchers have studied this problem in the context of (single-hop) wireless local area networks (WLANs), where clients directly exchange traffic with access points (APs). More recently, researchers have proposed multi-hop extensions to WLANs where client traffic is forwarded via a series of client-client links. In this paper, we show that the objective of improving throughput without sacrificing fairness can be much better met in multi-hop WLANs. We decouple this objective into two separate but related problems. First, we need an algorithm to organize clients into a multi-hop structure such that fair bandwidth allocation within this structure leads to improved throughput. Second, we need algorithms for performing fair bandwidth allocation within the determined multi-hop structure. In this paper, we first design optimal fair bandwidth allocation algorithms for both max-min throughput fairness and max-min time fairness in multi-hop WLANs. Subsequently, we design an efficient algorithm to find desirable multi-hop structures. With slight modifications, our results in this paper can be generalized to other multi-hop wireless networks as well. Our proposed solutions seamlessly integrate with legacy devices and hence are incrementally deployable. Simulation results demonstrate that our solutions can effectively improve throughput (by up to 114% or more) as well as network coverage while preserving fairness.


international conference on network protocols | 2005

Efficient probabilistic packet marking

Qunfeng Dong; Suman Banerjee; Micah Adler

Probabilistic packet marking is a general technique which routers can use to reveal internal network information to end-hosts. Such information is probabilistically set by the routers in headers of regular IP packets on their way to destinations. A number of potential applications have been identified, such as IP traceback, congestion control, robust routing algorithms, dynamic network reconfiguration, and locating Internet bottlenecks, etc. In this paper, we define EPPM, an efficient general probabilistic packet marking scheme with a wide range of potential applications, of which locating Internet bottlenecks and IP traceback are investigated as two representative examples to demonstrate its effectiveness. Our proposed scheme imposes only a single-bit overhead in the IP packet headers. More importantly, it significantly reduces the number of IP packets required to convey the relevant information when compared to the prior best known scheme (almost by two orders of magnitude)


international conference on computer communications | 2008

Building Robust Nomadic Wireless Mesh Networks Using Directional Antennas

Qunfeng Dong; Yigal Bejerano

Recently, wireless mesh technology has been used for military applications and fast recovery networks, referred to as nomadic wireless mesh networks (NWMNs). In such systems, wireless routers, termed nodes, are mounted on top of vehicles or vessels, which may change their location according to application needs; and the nodes are required to establish a reliable wireless mesh network. For improving network performance, some vendors use directional antennas, and the mesh topology comprises of point-to-point connections between adjacent nodes. The number of point-to-point connections of a node is upper-bounded by the number of directional radios it has, which is typically a small constant. This raises the need to build robust (i.e., two-node/edge- connected) mesh networks with bounded node degree, regardless of node locations. In this paper, we present simple elegant schemes for constructing such efficient and robust wireless mesh networks with provably small constant degree bounds. Our extensive simulations show our schemes build robust and efficient topologies for various settings with node degree bounded by 4 and small hop-count distance between nodes and gateways.


ieee international conference computer and communications | 2007

Load Balancing in Large-Scale RFID Systems

Qunfeng Dong; Ashutosh Shukla; Vivek Shrivastava; Dheeraj Agrawal; Suman Banerjee; Koushik Kar

A radio frequency identifier (RFID) system consists of inexpensive, uniquely-identifiable tags that are mounted on physical objects, and readers that track these tags (and hence these physical objects) through RF communication. In this paper we, therefore, address this load balancing problem for readers - given a set of tags that are within range of each reader, which of these tags should each reader be responsible for such that the cost for monitoring tags across the different readers is balanced, while guaranteeing that each tag is monitored by at least one reader. We show that a generalized variant of the load balancing problem is NP-hard and hence present a 2-approximation centralized algorithm. We next present an optimal centralized solution for a specialized variant. Subsequently, we present a localized distributed algorithm that is probabilistic in nature and closely matches the performance of the centralized algorithms. Our results demonstrate that our schemes achieve very good performance even in highly dynamic large-scale RFID systems.


international conference on computer communications | 2009

Distributed Construction of Fault Resilient High Capacity Wireless Networks with Bounded Node Degree

Yigal Bejerano; Qunfeng Dong

Embodiments described include methods of determining neighboring nodes with which to link a subject node in a wireless communication network. Depending on the network preferences, the links between neighbor nodes and the subject node may include high capacity links or fault resilient high capacity links. The number of neighboring nodes may be as high as ten in a fault resilient high capacity network and five or less for a high capacity network.

Collaboration


Dive into the Qunfeng Dong's collaboration.

Top Co-Authors

Avatar

Suman Banerjee

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar

Dheeraj Agrawal

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar

Ashutosh Shukla

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar

Micah Adler

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Benyuan Liu

University of Massachusetts Lowell

View shared research outputs
Top Co-Authors

Avatar

Jianming Wu

University of Wisconsin-Madison

View shared research outputs
Top Co-Authors

Avatar

Koushik Kar

University of Maryland

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge