Dirk Bradler’s research while affiliated with Technical University of Darmstadt and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (23)


Figure 1: Research Challenges to Shape the Future Internet  
SHAPING THE FUTURE INTERNET
  • Article
  • Full-text available

September 2013

·

298 Reads

·

3 Citations

·

Alexander Behring

·

Dirk Bradler

·

[...]

·

Thorsten Strufe

The Internet of Things (IoT) and the Internet of Services (IoS) are two well-known exemplars of the emerging 'Internet variants'. These variants will be tightly interwoven yet specific with respect to the supporting technologies needed. The present paper discusses the five variants identified as essential by the authors: IoT, IoS, Internet-of-Humans, Internet-of-Crowds, and Internet-of-Clouds. For each variant, a non-comprehensive set of research challenges is cited and related to the state of the art and to ongoing projects of the lab.

Download

Autonomous aggregation in location aware ad hoc wireless networks

February 2013

·

37 Reads

Wireless Communications and Mobile Computing

Gossip‐based epidemic protocols are used to aggregate data in distributed systems. This fault‐tolerant approach neither require maintenance of any global network state nor knowledge of network structure. However, although gossip‐based aggregation algorithms scale well for graphs with good expansion, their efficiency for sparse graphs is unexamined. In this paper, we analyze the feasibility and efficiency of a gossip aggregation protocol in wireless networks with low expansion. We propose a modification of the existing aggregation algorithm for use in locality‐aware, sparse, and static wireless networks. Our protocol terminates autonomously, uses less bandwidth than the original version, and removes the need for the leader election process while counting network nodes. Aggregates are calculated only over nodes placed in the vicinity, and nodes communicate only with their immediate neighbors by using a wireless broadcast. We evaluate our approach by simulation on sparse, irregular graphs with low expansion for the simplified system model. Furthermore, we analytically assess the worst‐case convergence time of this protocol for sparse wireless networks and also for the simplified system model. The proposed protocol can be used in the monitoring and alarming applications in wireless networks. Copyright © 2012 John Wiley & Sons, Ltd.


kTC - Robust and Adaptive Wireless Ad-Hoc Topology Control

July 2012

·

50 Reads

·

33 Citations

Topology control for Wireless Sensor Networks (WSN) is a frequently tackled challenge, for which no satisfying general solution for realistic deployments has been found to the current day. Aiding to minimize unnecessary transmissions, it nevertheless represents a crucial function of WSN, in the light of their pursuit of efficiency. kTC is a new WSN topology control that unlike prior art neither relies on location information, nor on complex geometric structures, which could leave doubts about a practical feasibility. Even though location-free approaches have been proposed to circumvent systematic problems, they do not address issues like robustness and adaptability satisfyingly, which may lead to disconnection in real world deployments. kTC is a location-free approach that adapts topologies dynamically in face of changing environmental influences. It is based on a local, pattern-based heuristic, and transmitting only two messages per node to construct the topology it is highly scalable. The graphs kTC creates are symmetric, connected, and planar; they have bounded degree and nodes are θ-separated. Simulative evaluations indicate that kTC outperforms known topology control schemes. A preliminary deployment on a sensor testbed corroborates the obtained results and acts as proof of concept for kTC.


BridgeFinder: Finding communication bottlenecks in distributed environments

February 2011

·

78 Reads

·

3 Citations

Nodes in mobile networks are usually unevenly distributed over space. Several dense clusters of nodes are interconnected by a few nodes in sparsely occupied areas. Removing vital nodes along such bridges would partition the network and severely reduce the overall connectivity. Consequently, detecting and protecting those few vital nodes is crucial for keeping the network operational. In order to achieve this task, we present our novel approach: BridgeFinder. Most importantly, BridgeFinder allows us to calculate good estimates for global graph measures, while operating as a fully distributed algorithm and causing only very little messaging overhead. It is based on an extended gossiping protocol and is significantly faster and more precise than existing mechanisms. The results of our extensive evaluation show that BridgeFinder is indeed very effective in detecting the few crucial for the network operation nodes.


Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks

January 2011

·

25 Reads

·

11 Citations

Topology adaptation is a vital operation in technological networks. It is frequently implemented as either an external process or a distributed online optimization that relies on gathering knowledge on the overall state of the system. In this work we propose MBO, a novel approach that uses network motifs (a local, stochastic metric) for distributed topology optimization of arbitrary, adaptable networks. In order to give a proof of concept we chose to optimize structured Peer-to-Peer overlays towards a fair load balancing. MBO is parametrized using target motif signatures of networks, which are derived from exemplary, generated topologies with the desired properties - a fair load balancing in the demonstrated case. Extensive simulations indicate that for CAN and Kademlia, two different types of P2P systems, MBO leads to a well balanced load, while being minimally intrusive.


PathFinder: Efficient Lookups and Efficient Search in Peer-to-Peer Networks

January 2011

·

12 Reads

·

5 Citations

Lecture Notes in Computer Science

Peer-to-Peer networks are divided into two main classes: unstructured and structured. Overlays from the first class are better suited for exhaustive search, whereas those from the second class offer very efficient key-value lookups. In this paper we present a novel overlay, PathFinder, which combines the advantages of both classes within one single overlay for the first time. Our evaluation shows that PathFinder is comparable or even better in terms of lookup and complex query performance than existing peer-to-peer overlays and scales to millions of nodes.


Figure 1. Roofnet MIT 2 
Figure 2. Derived graph of wireless APs in Manhattan, New York 
City Mesh–Resilient First Responder Communication

January 2011

·

152 Reads

·

10 Citations

Communication between first responders is vital to the success of large scale disaster management. But communication technologies used by first responders today do not scale well due to heterogeneity, point-to-point connections, and centralized communication structures. As the popularity of devices equipped with Wi-Fi grows, the number of access points (APs) in city centers increases as well. This communication infrastructure exists and should be used in city wide disasters as it is readily available in areas with high population density. In this paper, we investigate Wi-Fi access points in 5 major cities deployed in stores, bars, and restaurants. We want to answer the question if these APs can be used as a mesh networking backbone in disaster response. The main contributions of this paper are (i) the surveyed and analyzed public Wi-Fi layout of five major cities and (ii) the connectivity analysis of the city wide network topology.


Figure 5. Convergence time (measured in number of algorithm rounds) for the node count aggregate in boxes of size k*R × k*R, for the ε = 5%.
Figure 6. Convergence time for the node count aggregate in boxes of size k*R × k*R for the 80th and 90th percentile of boxes, compared to the times needed by the grid-chain and grid topologies. ε = 5%.
Figure 7. Accuracy of aggregates for self-stabilization with T=5 and delta=0.1, for different box sizes k*R.
Self-organized aggregation in irregular wireless networks

November 2010

·

65 Reads

·

5 Citations

Gossip-based epidemic protocols are used to aggregate data in distributed systems. This fault-tolerant approach does neither require maintenance of any global network state nor knowledge of network structure. However, although gossip-based aggregation algorithms scale well for graphs with good expansion, their efficiency for sparse graphs is unexamined. In this paper we analyze the feasibility and efficiency of a gossip aggregation protocol in wireless networks with low expansion. We propose a modification of the existing aggregation algorithm for use in locality-aware, sparse, static wireless networks. Our protocol terminates autonomously, uses less bandwidth than the original version, and removes the need for the leader election process while counting network nodes. Aggregates are calculated only over nodes placed in the vicinity, and nodes communicate only with their immediate neighbors by using a wireless broadcast. We evaluate our approach by simulation on sparse, irregular graphs with low expansion for the simplified system model. Furthermore, we analytically assess the worst-case convergence time of this protocol for sparse wireless networks and also for the simplified system model.



Table 1 . Implemented network models 
Table 2 . Implemented P2P networks 
Table 3 . Implemented Metrics 
Table 5 . Runtime for ErdösRényi with average degree 50 
GTNA - A framework for the graph-theoretic network analysis

April 2010

·

178 Reads

·

9 Citations

Concise and reliable graph-theoretic analysis of complex networks today is a cumbersome task, consisting essentially of the adaptation of intricate libraries for each specific problem instance. The growing number of complex metrics that have been proposed in the last years, which mainly gain significance due to the increasing computational capabilities at hand, have led to important new insights in the field. However, they have solely been implemented as single algorithms, each specialized for the purpose of calculating exactly the targeted metric for a selected type of network graph. A comprehensive, extensible tool for the concise evaluation of graphs is currently not available. For this purpose we introduce the Graph-Theoretic Network Analyzer (GTNA), an efficient, Java-based toolkit for the comprehensive analysis of complex network graphs. GTNA, while already including the main metrics that are used to analyze the complex networks in computer science today, is simple to extend through a well defined plugin interface for metrics, network descriptions and network generator models. Throughout the paper we present the design and simple extensibility of GTNA, as well as the network models and metrics that are already implemented and give examples of its scalability and performance.


Citations (18)


... Thus far, security issues of pervasive systems have been investigated in a broad range of application contexts and scenarios[80]. Within this thesis, we use the real life context of emergency responses as our major application scenario 5. Presented findings result from discussions and experiences with German emergency workers, ranging from executive levels over trainers to volunteers, build upon available technical standards[141,164], benefit from an exchange with the scientific research community[72,231,32,31,29]as well as from extensive literature studies, e.g.[223,47]. The remainder of this section is structured as follows: after a brief introduction to area of emergency response, we depict how pervasive ICT may effectively support response and rescue-related actions. ...

Reference:

Multilaterally Secure Pervasive Cooperation
Peer-to-Peer Concepts for Emergency First Response
  • Citing Article
  • June 2010

... We further distinguish two large families of topology control mechanisms [14]: triangle-based (TriangleBased) and cone-based topology control mechanisms (ConeBased), from which a specific topology control mechanism is exclusively selected. In general, a triangle-based topology control mechanism removes a link from the logical topology if this link is the weightmaximal link of a triangle in the input topology and if the triangle fulfills some additional algorithm-specific predicate (kTC [15] with parameter k and CTCA [16]). A cone-based topology control mechanism partitions the area around the node into disjoint cones and only preserves a fixed number of links per cone based on an algorithm-specific predicate (CBTC [17] with parameter c and LSΘGG [18]). ...

kTC - Robust and Adaptive Wireless Ad-Hoc Topology Control
  • Citing Conference Paper
  • July 2012

... Although the results of the observed variables can change from one scenario to another, the improvement in terms of information availability and dissemination speed will be important almost in any case. Determining accurately the magnitude of this improvement will require the development of a simulation tool that considers the three mandatory models proposed by Bradler et al. [48]: the work scenario, the nodes movement and the communication network. This challenge will be addressed as part of the future work. ...

First response communication sandbox
  • Citing Article
  • April 2008

... In contrast to the very ambitious and intriguing technology-driven studies [18][19][20][21] and analyses of EOC-work [2,4,5,7,14], this paper is an attempt to approach these environments with a focus on what people actually do as part of work [22] in the situation room. This shift of perspective allows us to look beyond specific technologies present in this environment and instead focus on the actual work that these technologies should aim to support. ...

Towards Computer Support of Paper Workflows in Emergency Management

... Every emergency relief starts with a group of people reaching the affected area after the incident. The first responders need to communicate among themselves to locate people, move medics, send support teams, and coordinate their efforts [46]. They also need to send and retrieve data to/from a central command. ...

City Mesh–Resilient First Responder Communication

... In order to illustrate the challenges involved in providing real-time communication support on OppNets, we will use the disaster relief efforts as study scenario. Counting on communication support in this scenario is mandatory to allow coordination and collaboration among the involved people [3], [4], and thus reduce the impact of extreme events on the civil population. Next we briefly characterize this application domain, and then discuss the main proposals that could be used to provide communication support to first responders working in the field. ...

Towards a distributed crisis response communication system

... A P2P mechanism for sending multicast messages has been published in [BKM09b]; alternative approaches are presented in [KTL + 09]. The simulation environment has been published in [BPSM08] and [BKM09a], as well as an example An example application for first responders in [BKK09]. The mechanism for identifying critical ...

Demonstration of First Response Communication Sandbox

... Identifying such bridge nodes is of great importance to improve resiliency of the network and to protect the network against attacks. In our previous work we developed a decentralised mechanism to identify such bridge nodes (Bradler et al., 2011). In the field, once such critical nodes are identified, we could place additional infrastructure to assist network topology in that place and to prevent network partitioning. ...

BridgeFinder: Finding communication bottlenecks in distributed environments

... kTC matches a triangle pattern, followed by removing high-weight edges from found triangles. Many more pattern-based algorithms exist, requiring the devices to match triangle patterns [9,12,22,26,31] or other patterns [6-9, 14, 18, 20, 23, 24, 29, 30] in their neighborhood. ...

Leveraging Network Motifs for the Adaptation of Structured Peer-to-Peer-Networks
  • Citing Conference Paper
  • January 2011