Você está na página 1de 5

Distribution of Traffic for Multiple-Path Routing Based on Portfolio Selection Theory

2011-2012

Chapter 1

Introduction
1.1 Network jamming
In any underlying network there may be chance of occurring the jamming in the available paths because of more than one sender using the same paths to transmit the data packet or if one source node sending the different files to different receivers in this case there may be a chance of using the same paths then also jamming occur. By using jammers devices also jamming occur in the network. In cell phone terminology a jammer is a device that blocks the transmissions by creating interference. The jammer emits the signals in the same frequency range that cell phones uses and within the range of a jammer a cell phone user may lose their signal. In this project considering only the aware of jamming when the data packets using the same path among the available paths when they are transmitted and not considering the external jammer devices to make jamming in the underlying network .

1.2 Jamming behavior


A state resulting from too many packets contending for limited resources for example link bandwidth and buffer space on routers or switches which may force the router/switch to discard the packets. In any underlying network there may be chance of occurring the jamming in the available paths because of more than one sender using the same paths to transmit the data packet or if one source node sending the different files to different receivers in this case there may be a chance of using the same paths then also jamming occur it leads to the loss of data packets and also reduces total data throughput. It disturbs the wired/wireless communication. Any network resource management strategy that has, as its goal, the alleviation or avoidance of jamming and aware of jamming. This mechanism may be implemented on the routers/switches inside the network, by the hosts at the edges of the network or by a combination of both.

MTech (CE), SJBIT, Bangalore-60

Distribution of Traffic for Multiple-Path Routing Based on Portfolio Selection Theory

2011-2012

1.3 Multiple path routing


Multipath routing is the routing technique of using multiple alternative paths through a network, which can yield a variety of benefits such as tolerance, increased bandwidth, or improved security. The multiple paths computed might be overlapped, edge-disjointed or node-disjointed with each other. 1.3.1 Multipath routing in wireless networks To improve performance or fault tolerance CMR (Concurrent Multipath Routing) is often taken to mean simultaneous management and utilization of multiple available paths for the transmission of streams of data emanating from an application or multiple applications. In this form, each stream is assigned a separate path, uniquely to the extent supported by the number of paths available. If there are more streams than available paths, some streams will share paths. This provides better utilization of available bandwidth by creating multiple active transmission queues. It also provides a measure of fault tolerance in that, should a path fail, only the traffic assigned to that path is affected, the other paths continuing to serve their stream flows; there is also, ideally, an alternative path immediately available upon which to continue or restart the interrupted stream. This method provides better transmission performance and fault tolerance by providing: Simultaneous, parallel transport over multiple carriers. Load balancing over available assets.

1.4 Portfolio selection theory


In Markowitzs portfolio selection theory, an investor is interested in allocating funds to a set of financial assets that have uncertain future performance. The expected performance of each investment at the time of the initial allocation is expressed in terms of return and risk. The return on the asset corresponds to the value of the asset and measures the growth of the investment. The risk of the asset corresponds to the variance in the value of the asset and measures the degree of variation or uncertainty in the investments growth and describes the desired analogy by mapping this allocation of funds to financial assets to the allocation of traffic to routing paths.

MTech (CE), SJBIT, Bangalore-60

Distribution of Traffic for Multiple-Path Routing Based on Portfolio Selection Theory

2011-2012

And relate the expected investment return on the financial portfolio to the estimated end-to-end success rates and the investment risk of the portfolio to the estimated success rate covariance matrix. And note that the correlation between related assets in the financial portfolio corresponds to the correlation between non-disjoint routing paths.

1.5 Dynamic source routing protocol


The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely selforganizing and self-configuring, without the need for any existing network infrastructure or administration. The protocol is composed of the two mechanisms of Route Discovery and Route Maintenance, which work together to allow nodes to discover and maintain source routes to arbitrary destinations in the ad hoc network. The use of source routing allows packet routing to be trivially loop-free, avoids the need for up-to-date routing information forwarded. 1.5.1 Benefits of Dynamic Source Routing Protocol The Dynamic Source Routing Protocol has the following advantages. The node have the information about the networks The DSR reduce the packet loss and latency time The node maintains the route status and path for data transfer The node maintains the rote status and path for data transfer The node automatically handles the cache updation process in the intermediate nodes through which packets are

1.6 Project overview


The problem of jamming in multiple path routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. Formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. MTech (CE), SJBIT, Bangalore-60
3

Distribution of Traffic for Multiple-Path Routing Based on Portfolio Selection Theory

2011-2012

The majority of anti-jamming techniques make use of diversity. For example, anti-jamming protocols may employ multiple frequency bands, different MAC channels, or multiple routing paths. Such diversity techniques help to curb the effects of the jamming attack. Here considering the anti-jamming diversity based on the use of multiple routing paths. To make effective use of this routing diversity, however, each source node must be able to make an intelligent allocation of traffic across the available paths while considering the potential effect of jamming on the resulting data throughput. In order to characterize the effect of jamming on throughput, each source must collect information on the impact of the jamming attack in various parts of the network. And show that in multi-source networks, this centralized optimization problem can be solved using a distributed algorithm.

1.7 Problem statement


Distribution of traffic for multiple path routing based on portfolio selection theory when jamming is occur and also responsiveness about jamming in intermediate network nodes in the underlying network and also characterizing the jamming impact.

1.8 Objectives

Formulate the problem of allocating traffic across multiple routing paths in the presence of jamming as a lossy network flow optimization problem and map the optimization problem to that of asset allocation using portfolio selection theory.

To show that the multi-source multiple-path optimal traffic allocation can be computed at the source nodes using a distributed algorithm based on decomposition in network utility maximization (NUM).

Propose methods which allow individual network nodes to locally characterize the jamming impact and aggregate this information for the source nodes. Demonstrate that the use of portfolio selection theory allows the data sources to balance the expected data throughput with the uncertainty in achievable traffic rates.

MTech (CE), SJBIT, Bangalore-60

Distribution of Traffic for Multiple-Path Routing Based on Portfolio Selection Theory

2011-2012

MTech (CE), SJBIT, Bangalore-60

Você também pode gostar