Professional Documents
Culture Documents
Distribution of Traffic For Multiple-Path Routing Based On Portfolio Selection Theory 2011-2012
Distribution of Traffic For Multiple-Path Routing Based On Portfolio Selection Theory 2011-2012
Distribution of Traffic For Multiple-Path Routing Based On Portfolio Selection Theory 2011-2012
2011-2012
Chapter 1
Introduction
1.1 Network jamming
In any underlying network there may be chance of occurring the jamming in the available paths because of more than one sender using the same paths to transmit the data packet or if one source node sending the different files to different receivers in this case there may be a chance of using the same paths then also jamming occur. By using jammers devices also jamming occur in the network. In cell phone terminology a jammer is a device that blocks the transmissions by creating interference. The jammer emits the signals in the same frequency range that cell phones uses and within the range of a jammer a cell phone user may lose their signal. In this project considering only the aware of jamming when the data packets using the same path among the available paths when they are transmitted and not considering the external jammer devices to make jamming in the underlying network .
2011-2012
2011-2012
And relate the expected investment return on the financial portfolio to the estimated end-to-end success rates and the investment risk of the portfolio to the estimated success rate covariance matrix. And note that the correlation between related assets in the financial portfolio corresponds to the correlation between non-disjoint routing paths.
2011-2012
The majority of anti-jamming techniques make use of diversity. For example, anti-jamming protocols may employ multiple frequency bands, different MAC channels, or multiple routing paths. Such diversity techniques help to curb the effects of the jamming attack. Here considering the anti-jamming diversity based on the use of multiple routing paths. To make effective use of this routing diversity, however, each source node must be able to make an intelligent allocation of traffic across the available paths while considering the potential effect of jamming on the resulting data throughput. In order to characterize the effect of jamming on throughput, each source must collect information on the impact of the jamming attack in various parts of the network. And show that in multi-source networks, this centralized optimization problem can be solved using a distributed algorithm.
1.8 Objectives
Formulate the problem of allocating traffic across multiple routing paths in the presence of jamming as a lossy network flow optimization problem and map the optimization problem to that of asset allocation using portfolio selection theory.
To show that the multi-source multiple-path optimal traffic allocation can be computed at the source nodes using a distributed algorithm based on decomposition in network utility maximization (NUM).
Propose methods which allow individual network nodes to locally characterize the jamming impact and aggregate this information for the source nodes. Demonstrate that the use of portfolio selection theory allows the data sources to balance the expected data throughput with the uncertainty in achievable traffic rates.
2011-2012