Free Essay

Optimal Packet Routing Scheme with Multiple Sources and Multiple Destinations

In:

Submitted By ulahoti
Words 2950
Pages 12
Project Report CS239: Computational Geometry

Optimal Packet Routing Scheme with Multiple Sources and Multiple Destinations

Submitted by

(403-134-387)
Winter 2004

Input / Problem
The idea of the problem originates from the need of online companies like amazon, netflix, etc, to send the merchandize purchased by customers. The customers are located at different places. How these packets are routed so as to minimize the cost is a big problem. Most of the times these stores have multiple distribution centers or outlets from where the demand can be met. Thus the problem takes the shape of multiple source, multiple, multiple destinations.

Given
‘n’ Source points (Distribution centers), and ‘m’ destination/consumer points. Location of the distribution and destination points described in their (x,y) co-ordinates. The measure of cost is the distance metric (length of the route).

Output
The output of the problem would be, which distribution center would serve which destination points and how the packet would be routed to minimize cost. Note: If the routes are represented as a graph then the graph would be a disconnected graph, depending on what destination nodes are served by which distribution center node.

What is known?
The general case of this problem, without any restrictions, can be modeled as Steiner Tree problem. It is a well known problem and its computation has been shown to be NPHard, by Garey, Graham and Johnson (1976).

Approach
In this analysis, I am considering the following 3 problems. 1. Multiple source Minimum Spanning Tree (M ST) 2. Multiple source Steiner Tree 3. Multiple source Traveling Salesman Problem (TSP) Multiple source TSP problem refers to the case where we have only one vehicle per distribution center, and it has to cover all the customers or destination points. The other two problems refer to the case where we have unlimited number of resources (in terms of vehicles and man power needed to transmit them) and the path followed can be forked. The difference between the first two cases is where the path can be forked. In 1st case, it can be forked at a destination point only. While in 2nd case it can be forked at any point. All these problems are considered in Euclidean space. In this project I am targeting the first 2 problems. I have solved the first problem deterministically in O(nlogn) time. And I am presenting a heuristic for the 2nd problem. The heuristic take MST as a starting point and iteratively improves the solution.

In the subsequent analysis, the number of vertices V is equal to sum of number of sources ‘n’, and number of destination/consumers ‘m’.

Multiple Sources Euclidean Minimum Spanning Tree Algorithm
The algorithm works the same way as a standard Euclidean M inimum Spanning Tree (EMSpT). The only difference is in joining the spanning trees, as in Kruskal’s algorithm. All the nodes connected to a source, are assigned the source number of that source. As shown in the figure below. A number ‘0’ indicates that the nodes are not connected to any source. Only 2 types of merging is allowed, 1. Between two spanning trees, with number ‘0’. The new spanning tree also has ID ‘0’. 2. Between two spanning trees, one numbered ‘0’ and other has a source ID. The nodes of the merged spanning tree take the ID of the source. Spanning trees with different source IDs are not merged. Algorithm

1. Find the Delaunay triangulation for a given set V. 2. Assign ID ‘0’ to all the nodes, and source IDs to respective source nodes. 3. Find the Minimum Spanning Tree, using Kruskal’s Algorithm and using the above rules for merging. (See figure 1 below).

(a) (b) Figure 1. (a) Partial solution for EMSpT, (b) Showing merging of two different subgraphs, and assignment of ID to subgraphs. Optimality of this algorithm follows from the proof of Kruskal’s Algorithm. Complexity The complexity of the algorithm is O(VlogV). Calculating the Delaunay Triangulation takes O(VlogV) time. And the Delaunay Triangulation represent a planar graph, which can have 3V – 6, edges in the worst case. So the number of edges is O(V). So the Kruskal’s algorithm also takes O(VlogV) time. So the overall time complexity is O(VlogV).

Multiple source Euclidean Minimum Steiner Trees
Background Details about Steiner Tree First I will define the Euclidean Steiner tree problem. Given a set of fixed points V={v1,v2, ... ,vn} in the Euclidean plane, called terminals, and asks for the shortest straight-line graph spanning V. The solution takes the form of a tree, called a Euclidean Minimum Steiner tree (EMStT). Contrary to the minimum spanning tree problem, connections in EMStT's are not required to be between the terminals only. Additional intersections, called Steiner points, can be introduced to obtain shorter spanning networks. The distance metric, that I will be using is L2 metric, i.e. Euclidean Distance. Where the distance between two points u = (ux, uy) and v = (vx, vy), is defined as

d (u , v) = (u x − vx ) 2 + ( u y − v y ) 2
Euclidean minimum Steiner tree can also be defined for other metrics also. A lot of work has been in the area of Rectilinear minimum Steiner trees, where the distance metric is L1. Euclidean Steiner tree problem applications span a wide range, from design of VLSI circuits, to modeling the evolution of species in biology to modeling soap films for grids of wires; from the design of collections of data to the design of heating or air-conditioning systems in buildings; and from the creation of oil and gas pipelines to the creation of communication networks, electrical power distribution networks, road and railway lines. The Euclidean mimimum spanning tree (EMSpT) can be used as an approximate Steiner tree. The supremum (over all terminal sets V) of the ratio between the minimum spanning tree length and Steiner minimum tree length is denoted as Steiner ratio. It can be proved [2] that the Steiner ratio ? for the Euclidean problem satisfies the following formula:

ρ = sup

V ⊂R2

w( EMSpT (V )) 2 = ≈ 1.1547 w( EMStT (V )) 3

So, EMSpT length does not exceed that of an EMStT by more than 15.47% in the worst case. Therefore, the EMSpT is generally taken a standard against which other approximation algorithms or heuristics are compared, also it is often the starting point of many heuristics and approximation algorithms, since it atleast guarantees that you are not off from the optimal by more than 15.47%. Equilateral triangles represent the best improvement where the gain of EMStT over EMSpT is 15.47%.

Next, I mention some properties of Steiner Trees, which are used in this report. It is known [2, 6], that the Steiner minimum trees have the following properties: • All Steiner points are incident with exactly 3 edges making 120° with each other (i.e. they have degree 3 with respect to the edges used in the tree). • ESMT's for n terminals have at most n- 2 Steiner points. • Every non Steiner point has degree 1 or 2. It can also have degree three, only when all the 3 edges make angle of 120°, among themselves. • No point in Steiner tree, (Steiner and non-Steiner) have degree more than 3. Another interesting property, that we use in our solution and which most other Steiner tree solutions use, is based on the answer of the following question. Q. Given three points in the plane, find a fourth point such that the sum of its distances to the three given points is a minimum. This problem was solved by Torricelli in 1640, which said “Circles circumscribing the equilateral triangles constructed on the sides of and outside the triangle ? (P1,P2,P3) intersect at the point X that is sought, called the Torricelli point.” (Figure 1 (a)). Further, the lines from the Torricelli point to the given points Pi subtend angles of 120o. [3] Simpson, in "Doctrine and Application of Fluxions", 1750, proved that the three lines joining the outside vertices of the equilateral triangles defined above to the opposite vertices of the given triangle intersect at the Torricelli point. The three lines are called Simpson lines. (Figure 2 (b)) [3]

(a) (b) Figure 2 Different methods to obtain Torricelli point. X is the Torricelli point for triangle P1P2P3.

Heinen, in 1834 proved that the lengths of the three Simpson lines are equal and equal to the minimum sum of distances. Heinen also proved that for a triangle in which one angle is greater than or equal to 120o, the vertex of this angle is the minimizing point. [3] Figure 3 below shows another method to calculate the Torricelli point. In the figure, a, b and c are the given vertices. We construct an equilateral triangle ? abd, and circumscribe it. The Torricelli point, is the point of intersection of line segment cd and the circumcircle of equilateral triangle ? abd. And the line cd is also the Simpson line.

Figure 3. Another method to obtain Torricelli point S. These properties would be used to find the Torricelli point in the proposed algorithm. Based on the above discussion, if number of vertices is 3, i.e. |V| = 3 we can directly construct the EMStT. 1. If the maximum angle is less than 120o, then the Torricelli point is the Steiner point, and the EMStT consists of 3 edges, with the Steiner point joined to the other 3 vertices. 2. If the maximum angle in the triangle is more than 120o, then the EMStT is the graph with 2 edges, with the vertex with maximum angle, joined to the other 2 vertices. Algorithm to obtain Multiple source Euclidean Minimum Steiner Trees First step is to partition the 2D plane into separate regions, so as to decide what destination points would be served by which distribution center. For the partition of the space, I using the nodes partition obtained by running Multiple source MST problem (described earlier). The reasoning behind this is that, if a point belongs to a particular spanning tree in Multiple source EMSpT, then in the Multiple source EMStT that point will belong to EMStT for that source only. Lets say a node ‘a’ from EMSpT of source x, joins EMStT of source y. Then the length of the edge that will join it to another node in EMStT of source y, will be more than edge with which it was joined in EMSpT of source x. As otherwise in the first place when constructing Multiple source EMSpT, it would have joined EMSpT of source y. Also the point closest to node ‘a’ in EMStT of source y would be a terminal node not a Steiner node, as Steiner points are with in the triangle formed by the three nodes they are joining, such that they subtend 120o , on all the edges of the triangle.

Thus any point outside this triangle will be closer to one of the nodes linked to the Steiner point, then to the Steiner point. Next I describe the reasoning to choose Delaunay Triangulation As mentioned earlier, equilateral triangles, represent the case for the best improvement in cost of EMStT over EMSpT. All angles in equilateral triangles are equal to 60° and they maximize the minimal angle. Since, by [4], any Delaunay triangulation of V maximizes the minimal angle over all triangulations of V, Delaunay triangulation is taken as the starting point. We use Delaunay triangulation, to generate MST, but we will get a better initial approximation if we replace each of the triangles with their EMStTs. EMStTs for triangles in which one of the angle is more than 120o is 2 edge graph with edges from the vertex of the angle to other 2 vertices. And for those triangles where all angles are less than 120o, we can find EMStT using method described earlier. Next I describe my algorithm for constructing EMStT. This algorithm would be applied to each of the partitioned sets. Here V refers to the number of nodes in the partition being considered. 1. Find the Delaunay triangulation for a given set V (Figure 4(a)) 2. For all triangles with angle less than 120°, replace the triangle with EMStT of triangle vertices. i.e a Steiner point will be added to each of the triangles with all the angles less than 120°, and 3 edges joining the Steiner point to the 3 vertices of the triangle and we are removing the edges of the triangle (Delaunay Edges). (Figure 4(b), (c)). One triangle where all the angles are not less than 120o doesn’t have a Steiner point inside the triangle. 3. Determine the Euclidean minimum spanning tree EMSpT for a graph found by Step 2. (Figure 4(d)) 4. Scan the resultant graph for Steiner points with degree 1 and 2 a. For each Steiner points with degree one, remove the Steiner point along with the edge connecting it. b. For each Steiner points with degree 2, remove the Steiner point and along with the two edges, and add an edge between the vertices, to which the Steiner point was connected The result of this operation is shown in Figure 4(e). 5. Start scanning the resultant spanning tree from an end (a leaf). a. For every angle of every node that is less than 120°, generate EMStT, for the nodes forming the angle. b. Remove the edges that formed the angle. Figure 4(f) shows the result of first scan through the spanning graph and 4(g) shows the result of 2nd scan. In the 2n d scan the Steiner points, only move slightly in their vicinity. The new Steiner points have to be found as all the angles at the Steiner point (a), is not 120o, due to the new Steiner point (b). Now when a new Steiner point is found for (a), this will change the angle at (b), and we have to find a new Steiner point for (b). 6. Repeat the step 5 until all the angles are more than or equal to 120°, or amount of improvement in cost reduces below the threshold

(a) Delaunay Triangulation

(b) Steiner Points in qualifying Triangles

(c) Edges added associated with Steiner Pts

(d) MST for graph in (c)

(e) Removal of unnecessary Steiner points

(f) First scan through the graph

(g) Second scan through the graph Figure 4. Different steps in Algorithm to find Euclidean Minimum Steiner Tree

Claim After first iteration of step 5, the resultant Steiner tree will have the same number of Steiner points as there will be in optimal Steiner tree. Claim is based on the way the algorithm works. As subsequent iterations of step 5 only move the Steiner points in their vicinity. No new Steiner points are created. The refinement in Steiner Tree is local. The decrease in cost of the Steiner tree relative to the cost of Steiner tree of previous iteration will diminish at every iteration. And eventually it will converge to the optimal Steiner tree. The algorithm guarantees that the optimal solution would be reached, as at every iteration we are decreasing cost. The issue is how well it converges? Time Complexity If |V| = n, then the Delaunay triangulation can be constructed in O(n log n) time. The expected number of triangles created is at most 9n+1 [4] and thus Step 2 needs O(n) time. Step 3 needs O(n log n) time to construct EMSpT. Step 4 would take O(n) time, as we just need to scan the spanning tree once or just look at all the Steiner points. Time complexity of each iteration of step 5 is O(n). As the number of angles that have to be considered is O(n), also at each step constant amount of work is required. Actual complexity will depend on how many times the loop is executed. In order to determine how many times the loop is executed, we can set a threshold. If the percentage gain over the previous iteration falls below the threshold, then we stop iterating the step 5. To determine, how well does it perform in actual applications we need to do simulations to test its performance. I expect it to be within O(n). So the time complexity should not be worse then O(n2). Future Work We need to perform computational tests for the proposed heuristic. And the parameters that will have to be measured will be amount of time taken by the proposed heuristic to converge and also how much beyond the optimal it is after every scan of the Steiner tree. We would also need to compare the results with other algorithms and heuristics. One of the most common program which finds the optimal solution for Steiner Tree is geosteiner [5,6], it has the best performance among Steiner tree programs which computes optimal Steiner tree. Another problem that I wanted to consider was to change the cost dependant on the traffic on the path, not just the distance metric, i.e. the number of packets transmitted on a particular path.

Reference: [1] M. R. Garey, R. L. Graham and D. S. Johnson, Some NP-complete geometric problems, Eighth Annual Symposium of Theory of Computing, pp 10-22 (May 1976). [2] Hwang, F.K., Richards, D.S., Winter, P.: The Steiner Tree Problem. North-Holland, Amsterdam, 1992. [3] http://www.ces.clemson.edu/~pmdrn/Dearing/location/totalcost.pdf [4] De Berg, M., van Kreveld, M., Overmars, M. and Schwarzkopf, Computational

Geometry:Algorithms and Applications . Springer-Verlag, Berlin, 2000 (2nd rev. ed.).
[5] http://www.diku.dk/geosteiner/ [6] Winter P., Zachariasen M., Euclidean Steiner Minimum Trees: An Improved Exact Algorithm, Networks, 1997

Similar Documents

Free Essay

Routing Approaches of Delay Tolerant Networks

...©2010 International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 17 Routing Approaches in Delay Tolerant Networks: A Survey R. J. D'Souza National Institute of Technology Karnataka, Surathkal, India Johny Jose National Institute of Technology Karnataka, Surathkal, India ABSTRACT Delay Tolerant Networks (DTNs) have evolved from Mobile Ad Hoc Networks (MANET). It is a network, where contemporaneous connectivity among all nodes doesn’t exist. This leads to the problem of how to route a packet from one node to another, in such a network. This problem becomes more complex, when the node mobility also is considered. The researchers have attempted to address this issue for over a decade. They have found that communication is possible in such a challenged network. The design of routing protocol for such networks is an important issue. This work surveys the literature and classifies the various routing approaches. discontinuity in the network. There are also methods that have employed additional mobile nodes, to provide better message delivery. Researchers are even exploring how the social interaction of humans can be utilized for routing in a DTN. This survey has made an extensive study of the various routing strategies taken by the researchers in the past few years. We have classified them based on the type of knowledge used for routing. 2. FLOODING BASED APPROACHES Knowledge about the network helps in deciding the best next hop. It can happen that the...

Words: 6818 - Pages: 28

Free Essay

Optimal Power Allocation in Multi-Relay Mimo Cooperative Networks: Theory and Algorithms

...Optimal Power Allocation in Multi-Relay MIMO Cooperative Networks: Theory and Algorithms Abstract Cooperative networking is known to have significant potential in increasing network capacity and transmission reliability. Although there have been extensive studies on applying cooperative networking in multi-hop ad hoc networks, most works are limited to the basic three-node relay scheme and single-antenna systems. These two limitations are interconnected and both are due to a limited theoretical understanding of the optimal power allocation structure in MIMO cooperative networks (MIMO-CN). In this paper, we study the structural properties of the optimal power allocation in MIMO-CN with per-node power constraints. More specifically, we show that the optimal power allocations at the source and each relay follow a matching structure in MIMO-CN. This result generalizes the power allocation result under the basic three-node setting to the multi-relay setting, for which the optimal power allocation structure has been heretofore unknown. We further quantify the performance gain due to cooperative relay and establish a connection between cooperative relay and pure relay. Finally, based on these structural insights, we reduce the MIMO-CN rate maximization problem to an equivalent scalar formulation. We then propose a global optimization method to solve this simplified and equivalent problem. Architecture Existing System In Existing System, the multi-hop ad hoc networks...

Words: 1026 - Pages: 5

Premium Essay

Advantages Of Ad Hoc Network

...Useful when number of traffic session is much lower than the number of nodes. . No routing structure created a priori. Two key methods for route discovery: . Source routing . Backward routing . Introduce delay. Examples: AODV Ad hoc on demand distance vector routing Route Discovery Process . Source node initiates path discoverer process by broadcasting RREQ. . RREQ is forwarded until it reaches an intermediate node that has recent route information about the destination or till it reaches the destination. . The RREQ uses sequence numbers to ensure that the routes are loop free and reply contains latest information only. 15 Route Reply Process . When a node forwards a route request packet to its neighbor; it also records in the table the node from which the first copy of the request came. . This table is used to construct the reverse path for the RREQ. . As the RREQ traverses back to the source, the nodes along the path enter the forward route into their tables. . If one of the intermediate nodes move then the moved nodes neighbor realizes the link failure and sends a link failure notification to its upstream neighbors and so on till it reaches the source. . Route Error Packets are used to erase broken...

Words: 4647 - Pages: 19

Free Essay

Multicast Capacity in Manet with Infrastructure Support

...Jiao Tong University, China Email: {199012315171, xtian, qfbzcx, yelohuang, xwang8}@sjtu.edu.cn ! Abstract—We study the multicast capacity under a network model featuring both node’s mobility and infrastructure support. Combinations between mobility and infrastructure, as well as multicast transmission and infrastructure, have already been showed effective ways to increase it. In this work, we jointly consider the impact of the above three factors on network capacity. We assume that m static base stations and n mobile users are placed in an ad hoc network. A general mobility model is adopted, such that each user moves within a bounded distance from its home-point with an arbitrary pattern. In addition, each mobile node serves as a source of multicast transmission, which results in a total number of n multicast transmissions. We focus on the situations in which base stations actually benefit the capacity improvement, and find that multicast capacity in a mobile hybrid network falls into several regimes. For each regime, reachable upper and lower bounds are derived. Our work contains theoretical analysis of multicast capacity in hybrid networks and provides guidelines for the design of real hybrid system combing cellular and ad hoc networks. 1 Index Terms—Wireless ad hoc network; multicast capacity; mobility; infrastructure; hybrid network; scaling law; that each moving node is located within a circle of radius 1/f (n) [3]. By mapping the network to a generalized random geometric...

Words: 6686 - Pages: 27

Free Essay

Accoustic Communication

...monitoring tasks over a given area. In this paper, several fundamental key aspects of underwater acoustic communications are investigated. Different architectures for two-dimensional and three-dimensional underwater sensor networks are discussed, and the underwater channel is characterized. The main challenges for the development of efficient networking solutions posed by the underwater environment are detailed at all layers of the protocol stack. Furthermore, open research issues are discussed and possible solution approaches are outlined. I. I NTRODUCTION Ocean bottom sensor nodes are deemed to enable applications for oceanographic data collection, pollution monitoring, offshore exploration and tactical surveillance applications. Multiple Unmanned or Autonomous Underwater Vehicles (UUVs, AUVs), equipped with underwater sensors, will also find application in exploration of natural undersea resources and gathering of...

Words: 4664 - Pages: 19

Premium Essay

Sql Quiz

...of the document here. The abstract is typically a short summary of the contents of the document. Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.] | Internetworking Basics An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. The following articles provide information about internetworking basics: * Internetworking Basics * Introduction to LAN Protocols * Introduction to WAN Technologies * Bridging and Switching Basics * Routing Basics * Network Management Basics * Open System Interconnection Protocols LAN Technologies A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. The following articles provide information different LAN technologies: * Ethernet Technologies * Token Ring/IEEE 802.5 WAN Technologies A WAN is a data communications network that covers a relatively broad geographic area and that often uses...

Words: 217433 - Pages: 870

Free Essay

Rpr Technology

...Resilient Packet Ring Technology 1 CHAPTER 1 INTRODUCTION 1.1 Background: The nature of the public network has changed. Demand for Internet Protocol (IP) data is growing at a compound annual rate of between 100% and 800%1, while voice demand remains stable. What was once a predominantly circuit switched network handling mainly circuit switched voice traffic has become a circuit-switched network handling mainly IP data. Because the nature of the traffic is not well matched to the underlying technology, this network is proving very costly to scale. User spending has not increased proportionally to the rate of bandwidth increase, and carrier revenue growth is stuck at the lower end of 10% to 20% per year. The result is that carriers are building themselves out of business. Over the last 10 years, as data traffic has grown both in importance and volume, technologies such as frame relay, ATM, and Point-to-Point Protocol (PPP) have been developed to force fit data onto the circuit network. While these protocols provided virtual connections-a useful approach for many services-they have proven too inefficient, costly and complex to scale to the levels necessary to satisfy the insatiable demand for data services. More recently, Gigabit Ethernet (GigE) has been adopted by many network service providers as a way to network user data without the burden of SONET/SDH and ATM. GigE has shortcomings when applied in carrier networks were recognized and for these problems, a technology...

Words: 5466 - Pages: 22

Premium Essay

Ccna

...CCNA Notes Introduction Cisco offers two options for obtaining the CCNA certification:   Pass Exam 640-802 OR Pass Exam 640-822 AND Exam 640-816 While you can use these notes to prepare for either exam, the notes are geared towards passing the single exam. I recommend you study all of the material and take the single exam option rather than taking two exams. Cisco Device Icons  The following table lists the specific icons Cisco uses to represent network devices and connections. Represents Icon Hub Bridge Switch Router Access point Network cloud Ethernet connection Serial Line connection Wireless connection Virtual Circuit The OSI Model As you study this section, answer the following questions:       What is the OSI model and why is it important in understanding networking? How does the third OSI model layer relate to administering routers? Which OSI model layer is concerned with MAC addresses? What protocols correspond to the Presentation and Session layers? What is the difference between the TCP and UDP protocols? What is the EIA/TIA 232 protocol concerned with? This section covers the following exam objectives:    103. Use the OSI and TCP/IP models and their associated protocols to explain how data flows in a network 105. Describe the purpose and basic operation of the protocols in the OSI and TCP models 110. Identify and correct common network problems at layers 1, 2, 3 and 7 using a layered model approach ...

Words: 73801 - Pages: 296

Premium Essay

Shiva

...GOMEZ MONTENEGRO LAYOUT 5/18/10 11:46 AM Page 92 CONSUMER COMMUNICATIONS AND NETWORKING Wireless Home Automation Networks: A Survey of Architectures and Technologies Carles Gomez and Josep Paradells, Technical University of Catalonia ABSTRACT Wireless home automation networks comprise wireless embedded sensors and actuators that enable monitoring and control applications for home user comfort and efficient home management. This article surveys the main current and emerging solutions that are suitable for WHANs, including ZigBee, Z-Wave, INSTEON, Wavenis, and IP-based technology. INTRODUCTION In recent years, wireless sensor and actuator networks have gained high momentum, receiving significant attention from academia, industry, and standards development organizations. One of the primary application domains of this technology is home automation. Wireless home automation networks (WHANs) enable monitoring and control applications for home user comfort and efficient home management. A WHAN typically comprises several types of severely constrained embedded devices, which may be battery powered and are equipped with low-power radio frequency (RF) transceivers. The use of RF communication allows flexible addition or removal of devices to or from the network and reduces installation costs since wired solutions require conduits or cable trays. However, the dynamics of radio propagation, resource limitations, and the mobility of some devices...

Words: 6485 - Pages: 26

Premium Essay

Network Support for Ip Traceback

...226 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Network Support for IP Traceback Stefan Savage, David Wetherall, Member, IEEE, Anna Karlin, and Tom Anderson Abstract--This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back toward their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or "spoofed," source addresses. In this paper, we describe a general purpose traceback mechanism based on probabilistic packet marking in the network. Our approach allows a victim to identify the network path(s) traversed by attack traffic without requiring interactive operational support from Internet Service Providers (ISPs). Moreover, this traceback can be performed "post mortem"--after an attack has completed. We present an implementation of this technology that is incrementally deployable, (mostly) backward compatible, and can be efficiently implemented using conventional technology. Index Terms--Computer network management, computer network security, network servers, stochastic approximation, wide-area networks. I. INTRODUCTION D ENIAL-OF-SERVICE attacks consume the resources of a remote host or network, thereby denying or degrading service to legitimate users. Such attacks are among the hardest security problems to address because they are simple to implement, difficult to prevent, and very difficult...

Words: 11860 - Pages: 48

Premium Essay

Cognitive Radio Network

...POWER ALLOCATION FOR THE NETWORK CODED COGNITIVE COOPERATIVE NETWORK by Major Awal Uddin Ahmed (ID: 1003) Major Md Shariful Islam(ID: 1004) Major K M Hasnut Zamil (ID: 1006) A Project Report submitted to the department of Electrical Electronic and Communication Engineering in partial fulfillment of the requirements for the degree of Bachelor of Engineering in Electrical Electronic and Communication Engineering Advisor: M. Shamim Kaiser Military Institute of Science and Technology Mirpur Cantonment, Dhaka December 2010 To Our Beloved Parents ii DECLARATION This thesis is a presentation of my original research work. Wherever contributions of others are involved, every effort is made to indicate this clearly, with due reference to the literature, and acknowledgement of collaborative research and discussions. The work was done under the guidance of Dr. M. Shamim Kaiser, at the Mililary Institute of Science and Technology (MIST), Mirpur Cantonment, Dhaka. (Major Awal Uddin Ahmed (ID: 1003)) (Major Md Shariful Islam(ID: 1004)) (Major K M Hasnut Zamil (ID: 1006)) iii CERTIFICATE This is to certify that the thesis entitled POWER ALLOCATION FOR THE NETWORK CODED COGNITIVE COOPERATIVE NETWORK and submitted by Major Awal Uddin Ahmed (ID: 1003), Major Md Shariful Islam(ID: 1004), Major K M Hasnut Zamil (ID: 1006) for the degree of Bachelor of Engineering in Electrical Electronics and Communication Engineering. They embody original work under my supervision...

Words: 9257 - Pages: 38

Free Essay

Computer Networking

...Multiplexing (FDM) 2.3.3. Time Division Multiplexing (TDM) 2.3.4. Concentration 2.4. Physical Layer Standards 2.4.1. RS-232 2.4.2. CCITT X.21 2.5. Further Reading 2.6. Summary 2.7. Exercises 3. The Data Link Layer 3.1 Link Protocol Types 3.1.1. Synchronous Protocols 3.1.2. Asynchronous Protocols 3.1.3. Master-Slave Protocols 3.1.4. Peer-to-Peer Protocols 3.2. Link Protocol Functions 3.2.1. Acknowledgments 3.2.2. Timers 3.2.3. Error Checking 3.2.4. Retransmission 3.2.5. Flow Control 3.3. Sliding Window Protocol 3.4. Data Link Layer Standards 3.4.1. BSC 3.4.2. HDLC 3.5. Further Reading 3.6. Summary 3.7. Exercises 4. The Network Layer 4.1. Network Services 4.2. Switching Methods 4.2.1. Circuit Switching 4.2.2. Packet Switching 4.3. Packet Handling 4.3.1. Packet Structure 4.3.2. Routing 4.3.3. Congestion Control 4.3.4. Error Handling 4.4. Internetworking 4.4.1. Network Sublayers...

Words: 60074 - Pages: 241

Premium Essay

Hello

...Securing Cisco Routers (SECR) Glossary A AAA ABEND Access Access attacks Authentication, Authorization, Accounting. Allows all facets of user security to be defined on a central server. Abnormal END. Abnormal termination of software. 1.) In dealing with network security it is an all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. An all-encompassing term that refers to unauthorized data manipulation, system access, or privileged escalation. Unauthorized data retrieval is simply reading, writing, copying, or moving files that are not intended to be accessible to the intruder. Limiting the flow of information from the resources of a system to only the authorized persons or systems in the network. See ACE. access control Access Control Entry access control list See ACL. access device access layer Access Method Hardware component used in your signaling controller system: access server or mux. The point at which local end users are allowed into the network. 1.) Generally, the way in which network devices access the network medium. 2.) Software within an SNA processor that controls the flow of information through a network. Defines access rights and privileges for the network users. The access policy should provide guidelines for connecting external networks, connecting devices to a network, and adding new software to systems. The remote computer system which connects a personal computer to the Internet. Access Virtual...

Words: 23221 - Pages: 93

Premium Essay

Research

...Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States SEVENTH EDITION Data Communications and Computer Networks A Business User’s Approach Curt M. White DePaul University Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White Editor-In-Chief: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Editorial Assistant: Courtney Bavaro Marketing Director: Keri Witman Marketing Manager: Adam Marsh Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Media Editor: Chris Valentine Art and Cover Direction, Production Management, and Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance...

Words: 234459 - Pages: 938

Free Essay

Test

...Chapter 1: Introduction to Computer Networks and Data Communications TRUE/FALSE 1. Data is information that has been translated into a form that is more conducive to storage, transmission, and calculation. ANS: T 2. ANS: F PTS: 1 Some people call computer terminals thick-client workstations. PTS: 1 3. A type of microcomputer-to-local area network connection that is growing in popularity is the wireless connection. ANS: T PTS: 1 4. To communicate with the Internet using a dial-up modem, a user’s computer must connect to another computer that is already communicating with the Internet. ANS: T PTS: 1 5. It is not possible to connect two local area networks so that they can share peripherals as well as software. ANS: F PTS: 1 6. Metropolitan area networks can transfer data at fast, LAN speeds but over smaller geographic regions than typically associated with a local area network. ANS: F 7. ANS: T 8. networks. ANS: T 9. ANS: F PTS: 1 The Internet is not a single network but a collection of thousands of networks. PTS: 1 One of the most explosive areas of growth in recent years has been cellular phone PTS: 1 By the 1970s, telephone systems carried more computer data than voice. PTS: 1 10. Network architectures are cohesive layers of protocols defining a set of communication services. ANS: T PTS: 1 11. The OSI model tells us what kind of wire or what kind of connector to use to connect the pieces of a network...

Words: 46505 - Pages: 187