Security-Aware Beacon Based Network Monitoring

Size: px
Start display at page:

Download "Security-Aware Beacon Based Network Monitoring"

Transcription

1 Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan {sasaki, liang, Abstract The active beacon based network monitoring tries to estimate the transfer delay of a link e by the difference of round-trip times from a beacon host to the two endpoints of e. For efficiency, we consider the problem of placing a minimum set of beacons to monitor all links of a given TCP/IP network e.g., the Internet. We propose an idea called L-beacon, i.e., a beacon can monitor only links within L hops. We show it generalizes previous studies for the so-called simple beacon (Kumar and Kaur 06) with L = 0 and the locally flexible beacon with L = 1 (Horton and Lopez-Ortiz 03). We observe that a larger L results in a smaller number of beacons but has higher security risk. Thus finding an L of good trade-off is important. For this, we studied a number of networks including real ISP networks (the Rocketfuel data) and smallworld scale-free networks, and found that, surprisingly enough, a small L = seems a good choice. Efficient algorithms for this NP-hard problem are also provided. I. INTRODUCTION Monitoring the status of a link is an important task in network management. Among many proposals, active beacon based monitoring is interesting due to its simplicity, in which a beacon (i.e. a host or a router equipped with the beacon function) checks the status of a link e by sending probe packets to the two endpoints of e and estimates the transfer delay of e by the difference of the two round-trip times. Denoting the round-trip time from some host (beacon) A to another H by rtt(a, H), it is natural to estimate the transfer time of a link e = (B, C) (using a beacon A) by 1 rrt(a, C) rrt(a, B). (1) 2 (It is if B or C or both are not reachable from A.) See an illustration in Fig. 1. rtt(a, B) TCP/IP network beacon A B C rtt(a, C) delay link e Fig. 1. Estimating the transfer delay of a link (B, C) from a beacon A. Notice that round-trip times can be obtained by the standard ICMP protocol (e.g., by the ping software), thus the above estimation is easy to implement. But clearly (1) is appropriate only if the two probes from A to B and C share the same A B or A C route. If the two probes did not share such a route, however, then in general (1) may be meaningless. For example, consider links in Fig. 2. For (B, C), two ping probes from the beacon A to B and to C may be routed in different ways, and in that case, estimation by (1) has little meaning. In fact, in Fig. 2, there is no way for A to know if link (B, C) is functional or not, i.e., A cannot monitor (B, C) correctly. beacon A ping C ping B C? Fig. 2. An illustration of the relationship between routing and Estimation (1). We see link (B, C) cannot be correctly estimated by beacon A. Thus given a beacon, there may exist links not suitable for it to monitor (by suitable we mean the estimation by (1) is appropriate for any routing). Therefore, given a network (e.g., the Internet), it is interesting to know how many beacons are necessary and where to place them in order to monitor all links. Of course this depends on how many links (how far) a beacon can monitor. The problem of finding a smallest set of beacons for a given network and a given type of beacons is called the beacon placement problem in the literature. Previously there were a few studies. Kumar and Kaur [7] studied the so-called simple beacon, which can monitor only adjacent links and bridge links, where a bridge is a link whose removal disconnects the network (notice bridges can be monitored by any one of beacons). Simple beacon is the easiest to implement ping is enough. On the other hand, Horton and Lopez-Ortiz [6] studied the so-called locally flexible beacon, which can further specify the first hop on the path to the target host. Clearly locally flexible beacon can monitor more links than simple beacon, but it is more complicated. The beacon placement problems for both these beacons are known to be NP-hard ([6], [7]). We generalize their ideas. Given an L 0, we propose the L-beacon whose monitorable area is limited to links within L hops, i.e., an L-beacon can specify the first at most L hops on the path to the target host. Therefore a simple beacon is (basically) a 0-beacon, and a locally flexible beacon is (basically) a 1-beacon. Moreover, we consider to limit to a B

2 small number of L is important for network security. Speaking more clearly, an L-beacon works in a way similar (but not equal, see the next Section) to the source routing protocols, which are considered unsafe for the Internet because (as there is no limitation on the hops) a cracker can investigate the topology of an internal network. However, if we (the routers) can limit the maximum number of hops to, e.g., L =, then a cracker can hardly do anything, because the limitation restricts his/her reachable area to hosts within L hops. The rest of this paper is organized as follows. We formulate the problem and show the NP-hardness in Section II. Then we give an exact and an approximate algorithms for this problem in Section III. The experimental results are discussed in Section IV, and finally we conclude in Section V. Related works. We note there is a related approach which, supposing at any time routes follow the shortest paths, requires much smaller number of beacons, see [1], [2], [8]. However, it is known that this assumption is too strong that it is not available on the Internet. Furthermore, this approach has to re-calculate the beacon set if the routing tree changes, which is said to happen every 20 minutes on the Internet. Therefore it is mainly of theoretical interest and its application is limited to small networks only. On the other hand, passive monitoring is another interesting approach, which does not send probe packets but collects data passing the beacon, see, e.g., [9] for example. This approach minimizes the affect to the network traffic, but obviously links with no beacon placed cannot be monitored. II. THE BEACON PLACEMENT PROBLEM FORMULATION In this section, we give a formulation of the problem and show it is NP-hard in general. We model networks as connected undirected graphs but directed or unconnected graphs are easy too. We assume the next packet forwarding rules. 1. A beacon-probe packet with the first k (k L) hops specified is routed exactly following the specification for k hops. It is discarded if there is no (direct) link between two successive hops. 2. A packet to an adjacent node is forwarded directly if there is no hop specification. 3. Otherwise it is forwarded following the default route. Notice the first rule is similar but not equal to source routing. It differs from the loose source routing as loose source routing is not required to follow specified hops exactly. On the other hand, the strict source routing follows the specification but it discards the packet after k hops. We consider that, by choosing an appropriate L, this novel routing can reduce the difficulty of network monitoring while avoiding similar security problems shared by the source routing protocols. In order to find an appropriate L, we must solve the problem of finding a smallest set of beacons that can monitor all links for a given network and an L. Let x i = 1 denote a node i is a beacon (otherwise x i = 0), and let B L (v) V denote the set of nodes reachable from a node v by at most L hops. Then we can formulate the problem as the next Integer Programming problem, where V and E denote the set of nodes (hosts, routers, etc) and the set of links, respectively. L-beacon placement problem: minimize subject to i V x i i B L (u) B L (v) x i 1, x i {0, 1}, i V. (u, v) E As shown in [7] and [6], this problem is NP-hard for L = 0 and L = 1. Similarly to [6], we can show the NP-hardness for any L 2 by reduction from the set cover problem (see []) which, given a base set U = {a 1, a 2,..., a n } and subsets S 1, S 2,..., S m U, asks to find a minimum T {S 1, S 2,..., S m } satisfying Si T S i = U. The reduction is as follows (see Fig. 3 for an illustration). For each S j, define a node n j. For each a i, define nodes u i0,..., u il 1, v i0,..., v il 1, link e i = (u i0, v i0 ) and links (u ik, u ik+1 ), (v ik, v ik+1 ), 0 k L 2. Connect n j to u il 1 and v il 1 if a i S j. Add 2L+1 nodes n 0, n m+1,..., n m+2l and 2L+1 links (n 0, n m+1 ), (n 0, n m+2l ), (n m+k, n m+k+1 ), 1 k 2L 1. Finally join n 0 to all n j with 1 j m. u u 11 u 1L 1 e 1 v v 11 v 1L 1 u 20 u 21 u 2L 1 e 2 v 20 v 21 v 2L 1 u n0 u n1 u nl 1 e n v n0 v n1 v nl 1 n 1 n 2 n 0 n m+1 n m+l n m n m+2l n m+l+1 Fig. 3. An illustration of the NP-hardness proof for L-beacon placement problem by reduction from the set cover problem. It is obvious that, to monitor all links belong to the simple cycle n 0 n m+1 n m+2l n 0, we must place (at least) one beacon at some node on the cycle. Without loss of generality, assume it is n 0. Then all links are monitorable except for (u i0, v i0 ), 1 i n. To monitor links (u i0, v i0 ) (corresponding to a i ), we must choose (at least) one node in some cycle u i0 u il 1 n j v il 1 v i0 u i0. Again, we may assume without loss of generality that it is n j (corresponding to S j ). Then it is easy to see that a feasible beacon set constructed in this way corresponds to a set cover, and vice versa. Thus the L-beacon placement problem is NP-hard for all L 0.

3 III. ALGORITHMS FOR THE L-BEACON PLACEMENT PROBLEM To solve the problem, we propose an exact and an approximate algorithm. First, let us show the exact algorithm, which is effective for small instances. In the previous section, we have formulated the problem as an Integer Programming problem, thus we can use the CPLEX software ( to solve this problem. Generally this is not a polynomial time algorithm but we can still use it to treat small networks. Moreover, we can use it to roughly estimate the next approximate algorithm. We need to calculate B L (v) for all v V. This can be done by a Breadth-First Search starting from v and stops by depth L. Before doing that, however, recall that bridge links can be monitored by any beacon, thus we can first determine and omit them to reduce the computation time (this preprocessing is used by the approximate algorithm too). Notice that there may exist two kinds of bridge links: the leaf bridges and nonleaf bridges. The removal of a leaf bridge results in an isolated node, whereas a non-leaf bridge does not (see Fig. 4 for an illustration). Clearly we can safely remove leaf bridges (and the isolated nodes), but not non-leaf bridges since otherwise the monitorable area of beacons may be broken. Both kinds of bridge links can be easily determined by a Depth-First Search Fig. 4. An illustration of two kinds of bridges. Links (8, 14) and (11, 1) are leaf bridges, whereas (1, 2), (1, 3) and (2, 4) are non-leaf bridges. So far we have shown the exact algorithm. On the other hand, since the beacon placement problem is NP-hard, we cannot expect any exact algorithm can treat large networks. Hence we also propose the following approximate algorithm, which greedily finds nodes that can monitor as many links as possible until all links are covered. Let A(u) denote the set of links adjoin node v. Algorithm Greedy Input: a connected undirected graph G = (V, E) with no leaf bridges, a non-leaf bridge set E 1, an L 0. Output: a set B of beacons. begin B = E = E E 1 Calculate B L (v) for all v V while E do Find a v V B maximizing E ( ) u B L (v) A(u) E = E u B L (v) A(u) 12 B = B {v} end end Finally we remark the lower bound on the optimal value, which is used to evaluate the solutions of the approximate algorithm. We use the Linear Programming relaxation of the problem, which relaxes the condition x i {0, 1} by x i [0, 1]. The optimal value of this relaxation is a lower bound of the optimal value of the original problem, and it can be found much faster using CPLEX. IV. EXPERIMENTAL RESULTS To evaluate the proposed algorithms and find a good L, we studied a number of networks including real ISP networks of the Rocketfuel data ( research/networking/rocketfuel/) and small-world scale-free networks generated by GTgraph-rmat ( edu/ kamesh/gtgraph/, see also [3]). All were tested on a PC with Intel Xeon 2.33GHz CPU, 2GB RAM and 64bit Linux CentOS. For CPLEX, we used the.2 version. The timeout for calculation was set to 1200 seconds, i.e., 20 minutes. First, let us see the data of Rocketfuel. We list the instances with their numbers of nodes in the next table. We note that not all of them are connected. TABLE I DETAILS OF THE ROCKETFUEL INSTANCES ANS Name #nodes Telstra (Australia) Sprintlink (US) EBONE (Europe) Verio (US) Tiscali (Europe) Level 3 (US) Exodus (US) VSNL (India) Abovenet (US) AT&T (US) Even for the largest instance, our algorithms solved it within a few seconds. Thus the running time is omitted here. The experimental results are listed in Table II, Table III and Fig.. TABLE II RESULTS FOR THE ROCKETFUEL INSTANCES, WHERE L = 0 ANS #nodes Optimal #beacons #beacons by Greedy Table II compares the obtained values of the numbers of beacons by the exact algorithm and the greedy algorithm. We

4 note that the previous study [7] used the same data but they could give only a greedy approximate algorithm. Thus we have obtained the optimal solutions for the first time. Notice our greedy algorithm performs fairly good. Since the numbers of nodes are different among the Rocketfuel instances, we use the percentages of #beacons/#nodes to evaluate the effectiveness of L-beacons. First, Table III shows the maximum (max), the minimum (min) and the average (avg) of the ratios in %. Percentage of beacons (0 * #beacons / #nodes) TABLE III #BEACONS/#NODES RATIOS (IN %) FOR THE ROCKETFUEL DATA L max min avg Fig. shows the detailed ratios for all L and all instances ANS 1221 ANS 1239 ANS 17 ANS 2914 ANS 327 ANS 336 ANS 3967 ANS 47 ANS 6461 ANS L Fig.. All #beacons/#nodes ratios for the Rocketfuel data. From these results for the Rocketfuel data, we can see that L 2 are not suitable for the link monitoring task. They are easier to implement and more secure, but they require a lot of beacons, e.g., L = 2 asks an average of 1.3% hosts to act as beacons. On the other hand, it is easy to see that L = seems a good choice. This can further be confirmed by the next experiment. That is, since the Rocketfuel data contain only small or medium size networks, we tried huge, connected, small-world and scale-free instances generated by GTgraph, which are considered as good models for the Internet. First we tested our exact algorithm. This time it can solve instances with at most 00 nodes, see the next table (we remark that, for the networks of Rocketfuel data, the unconnectedness of them greatly reduced the computation complexity. For GTgraph data, however, 00 nodes seems a barrier for the exact algorithm.). Notice the values for L are omitted because an optimal solution has been found for L = 4. Again, we can see the greedy algorithm works well. TABLE IV RESULTS FOR A 00-NODE GTGRAPH-GENERATED NETWORK Exact algorithm Greedy algorithm L optimal #beacons time (s) #beacons time (s) Since the exact algorithm cannot solve larger instances but we still want to estimate our greedy algorithm, we compare it with the lower bound (see the previous section for the method) of the optimal value. This time we can solve networks with about 000 nodes, see the next table. Again, the values for L 7 are omitted and we can see our greedy algorithm is fast and is quite accurate. TABLE V RESULTS FOR A 000-NODE GTGRAPH-GENERATED NETWORK L Lower bound of #beacons time (s) Greedy time (s) Finally we studied huge instances with 4,, 6 and 7 nodes. For these instances, the lower bound calculation algorithm did not work (timeout), hence we show only the results of the greedy algorithm. The next figure shows the results calculated within 20 minutes. We also calculated the result for 6 nodes and L = 4, (with longer running time). The average ratios of #beacons/#nodes are 27.8%, 6.7% and 1.64% for L = 0, 1, 2 respectively, whereas it is 0.0% for L =. Again, we can see that L 2 result in a lot of beacons, whereas L = can get a good trade-off. Percentage of beacons (0 * #beacons / #nodes) nodes 0000 nodes 1e+06 nodes 1e+07 nodes L Fig. 6. Results for instances with 000 and more nodes.

5 V. CONCLUSION In this paper, we proposed the idea of L-beacon to monitor links with consideration of network security. This generalizes previous studies on L = 0, 1. We gave an exact and an approximate algorithms to solve the NP-hard L-beacon placement problem, and experimental results on real ISP networks and small-world, scale-free networks show they work well. We note that a larger L can reduce the number of necessary beacons but with higher security risk. From our experiments, we found L = could efficiently reduce the number of beacons while keeping the network secure. ACKNOWLEDGMENT This work is partially supported by the Ministry of Education, Culture, Sports, Science and Technology of Japan. REFERENCES [1] Y. Bejerano, R. Rastogi. Robust Monitoring of Link Delays and Faults in IP Networks, IEEE/ACM Trans. on Networking, vol. 14, no. (2006), [2] Y. Breitbart, F. Dragan, H. Gobjuka. Effective Network Monitoring, in Proc. ICCCN 04 (2004). [3] D. Chakrabarti, Y. Zhan, C. Faloutsos. R-MAT: A Recursive Model for Graph Mining, in Proc. SIAM Intl. Conf. on Data Mining, [4] CPLEX, [] M. R. Garey, D. S. Johnson. Computers and Intractability: A guide to the theory of NP-completeness. W. H. Freeman, San Francisco (1999). [6] J. D. Horton, A. Lopez-Ortiz. On the number of distributed measurement points for network tomography, in Proc. ACM ICM 03 (2003), [7] R. Kumar, J. Kaur. Practical Beacon Placement for Link Monitoring Using Network Tomography, in Proc. IEEE JSAC - SAMPLING 2006 (2006). [8] J. Moulierac, M. Molnar. Active Monitoring of Link Delays in Case of Asymmetric Routes, in Proc. IEEE ICNICONSMCL 06 (2006), 1 6. [9] K. Suha, Y. Guob, J. Kurosea, D. Towsley. Locating network monitors: Complexity, heuristics, and coverage, Computer Communications 29 (2006),

Effective Network Monitoring

Effective Network Monitoring Effective Network Monitoring Yuri Breitbart, Feodor Dragan, Hassan Gobjuka Department of Computer Science Kent State University Kent, OH 44242 {yuri,dragan,hgobjuka}@cs.kent.edu 1 Abstract Various network

More information

THE last two decades have witnessed an exponential

THE last two decades have witnessed an exponential IEEE JSAC - SAMPLING 2006 1 Practical Beacon Placement for Link Monitoring Using Network Tomography Ritesh Kumar and Jasleen Kaur Abstract Recent interest in using tomography for network monitoring has

More information

JOURNAL OF NETWORKS, VOL. 4, NO. 7, SEPTEMBER 2009 657

JOURNAL OF NETWORKS, VOL. 4, NO. 7, SEPTEMBER 2009 657 JOURNAL OF NETWORKS, VOL. 4, NO. 7, SEPTEMBER 2009 657 Effective Monitor Placement in Internet Networks Yuri Breitbart Feodor F. Dragan Hassan Gobjuka Department of Computer Science Department of Computer

More information

Binary vs Analogue Path Monitoring in IP Networks

Binary vs Analogue Path Monitoring in IP Networks Binary vs Analogue Path Monitoring in IP Networks Hung X. Nguyen and Patrick Thiran School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland {hung.nguyen, patrick.thiran}@epfl.ch

More information

Detecting Anomalies Using End-to-End Path Measurements

Detecting Anomalies Using End-to-End Path Measurements Detecting Anomalies Using End-to-End Path Measurements K. V. M. Naidu Debmalya Panigrahi Rajeev Rastogi Bell Labs Research India, Bangalore MIT Bell Labs Research India, Bangalore Abstract In this paper,

More information

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004

JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS. Received December May 12, 2003; revised February 5, 2004 Scientiae Mathematicae Japonicae Online, Vol. 10, (2004), 431 437 431 JUST-IN-TIME SCHEDULING WITH PERIODIC TIME SLOTS Ondřej Čepeka and Shao Chin Sung b Received December May 12, 2003; revised February

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

On the k-path cover problem for cacti

On the k-path cover problem for cacti On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China zeminjin@eyou.com, x.li@eyou.com Abstract In this paper we

More information

On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks

On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks 1 Technion - Computer Science Department - Tehnical Report CS-01-0 - 01 On the Trade-Off between Control Plane Load and Data Plane Efficiency in Software Defined Networks Abstract Software Defined Networking

More information

Link Identifiability in Communication Networks with Two Monitors

Link Identifiability in Communication Networks with Two Monitors Link Identifiability in Communication Networks with Two Monitors Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, and Don Towsley Imperial College, London, UK. Email: {l.ma10, kin.leung}@imperial.ac.uk

More information

HYBRID GENETIC ALGORITHMS FOR SCHEDULING ADVERTISEMENTS ON A WEB PAGE

HYBRID GENETIC ALGORITHMS FOR SCHEDULING ADVERTISEMENTS ON A WEB PAGE HYBRID GENETIC ALGORITHMS FOR SCHEDULING ADVERTISEMENTS ON A WEB PAGE Subodha Kumar University of Washington subodha@u.washington.edu Varghese S. Jacob University of Texas at Dallas vjacob@utdallas.edu

More information

(a) (b) (a) A network example. (b) The associated graph. Fig. 2. Three possible VPN configurations for the example in Fig. 1.

(a) (b) (a) A network example. (b) The associated graph. Fig. 2. Three possible VPN configurations for the example in Fig. 1. IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 775 On the Cost of Virtual Private Networks Reuven Cohen, Senior Member, IEEE, and Gideon Kaempfer Abstract A virtual private network (VPN)

More information

Finding Ethernet-Type Network Topology is Not Easy

Finding Ethernet-Type Network Topology is Not Easy Finding Ethernet-Type Network Topology is Not Easy Hassan Gobjuka, Yuri Breitbart Department of Computer Science Kent State University Kent, OH 44242 {hgobjuka,yuri}@cs.kent.edu 1 Abstract In this paper

More information

Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography

Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography Distributed Sensor Networks Volume 2015, Article ID 512463, 6 pages http://dx.doi.org/10.1155/2015/512463 Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography Xiaojin

More information

Joint Optimization of Monitor Location and Network Anomaly Detection

Joint Optimization of Monitor Location and Network Anomaly Detection Joint Optimization of Monitor Location and Network Anomaly Detection Emna Salhi, Samer Lahoud, Bernard Cousin ATNET Research Team, IRISA University of Rennes I, France {emna.salhi, samer.lahoud, bernard.cousin}@irisa.fr

More information

Traffic Engineering in SDN/OSPF Hybrid Network

Traffic Engineering in SDN/OSPF Hybrid Network 2014 IEEE 22nd International Conference on Network Protocols Traffic Engineering in SDN/OSPF Hybrid Network Yingya Guo, Zhiliang Wang, Xia Yin, Xingang Shi,and Jianping Wu Department of Computer Science

More information

Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring

Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring Minimizing Probing Cost and Achieving Identifiability in Probe Based Network Link Monitoring Qiang Zheng, Student Member, IEEE, and Guohong Cao, Fellow, IEEE Department of Computer Science and Engineering

More information

Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design

Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design Bicolored Shortest Paths in Graphs with Applications to Network Overlay Design Hongsik Choi and Hyeong-Ah Choi Department of Electrical Engineering and Computer Science George Washington University Washington,

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs

Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Approximated Distributed Minimum Vertex Cover Algorithms for Bounded Degree Graphs Yong Zhang 1.2, Francis Y.L. Chin 2, and Hing-Fung Ting 2 1 College of Mathematics and Computer Science, Hebei University,

More information

Portable Bushy Processing Trees for Join Queries

Portable Bushy Processing Trees for Join Queries Reihe Informatik 11 / 1996 Constructing Optimal Bushy Processing Trees for Join Queries is NP-hard Wolfgang Scheufele Guido Moerkotte 1 Constructing Optimal Bushy Processing Trees for Join Queries is NP-hard

More information

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. The Best-fit Heuristic for the Rectangular Strip Packing Problem: An Efficient Implementation

MATHEMATICAL ENGINEERING TECHNICAL REPORTS. The Best-fit Heuristic for the Rectangular Strip Packing Problem: An Efficient Implementation MATHEMATICAL ENGINEERING TECHNICAL REPORTS The Best-fit Heuristic for the Rectangular Strip Packing Problem: An Efficient Implementation Shinji IMAHORI, Mutsunori YAGIURA METR 2007 53 September 2007 DEPARTMENT

More information

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

More information

IEEE/ACM TRANSACTIONS ON NETWORKING 1

IEEE/ACM TRANSACTIONS ON NETWORKING 1 IEEE/ACM TRANSACTIONS ON NETWORKING 1 Latency Equalization as a New Network Service Primitive Minlan Yu, Student Member, IEEE, Marina Thottan, Member, IEEE, ACM, and Li (Erran) Li, Senior Member, IEEE

More information

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents

More information

Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks

Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks Akshay Kumar *, R. K. Ghosh, Maitreya Natu *Student author Indian Institute of Technology, Kanpur, India Tata Research

More information

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths

Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,

More information

Tracers Placement for IP Traceback against DDoS Attacks

Tracers Placement for IP Traceback against DDoS Attacks Tracers Placement for IP Traceback against DDoS Attacks Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-Min Yu, Wen Ouyang, Ching-Hsien Hsu, and Yu-Guang Chen Department of Computer Science and Information

More information

Factors to Consider When Designing a Network

Factors to Consider When Designing a Network Quality of Service Routing for Supporting Multimedia Applications Zheng Wang and Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom ABSTRACT

More information

Robust Monitoring of Link Delays and Faults in IP Networks

Robust Monitoring of Link Delays and Faults in IP Networks Robust Monitoring of Link Delays and Faults in IP Networks Yigal Bejerano and Rajeev Rastogi Bell Laboratories, Lucent Technologies 600 Mountain Avenue, Murray Hill, NJ 07974 Email: {bej,rastogi}@research.bell-labs.com

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing

Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing Multi-layer MPLS Network Design: the Impact of Statistical Multiplexing Pietro Belotti, Antonio Capone, Giuliana Carello, Federico Malucelli Tepper School of Business, Carnegie Mellon University, Pittsburgh

More information

On Optimal Monitor Placement for Localizing Node Failures via Network Tomography

On Optimal Monitor Placement for Localizing Node Failures via Network Tomography On Optimal Monitor Placement for Localizing Node Failures via Network Tomography Liang Ma, Ting He, Ananthram Swami, Don Towsley, and Kin K. Leung IBM T. J. Watson Research Center, Yorktown, NY, USA. Email:

More information

On the effect of forwarding table size on SDN network utilization

On the effect of forwarding table size on SDN network utilization IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz

More information

Analysis of Internet Topologies

Analysis of Internet Topologies Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British

More information

Discrete Applied Mathematics. The firefighter problem with more than one firefighter on trees

Discrete Applied Mathematics. The firefighter problem with more than one firefighter on trees Discrete Applied Mathematics 161 (2013) 899 908 Contents lists available at SciVerse ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam The firefighter problem with

More information

An Optimization Approach for Cooperative Communication in Ad Hoc Networks

An Optimization Approach for Cooperative Communication in Ad Hoc Networks An Optimization Approach for Cooperative Communication in Ad Hoc Networks Carlos A.S. Oliveira and Panos M. Pardalos University of Florida Abstract. Mobile ad hoc networks (MANETs) are a useful organizational

More information

The K-Observer Problem in Computer Networks

The K-Observer Problem in Computer Networks The K-Observer Problem in Computer Networks H. B. Acharya 1, Taehwan Choi 1, Rida A. Bazzi 2, and Mohamed G. Gouda 1,3 1 The University of Texas at Austin, USA 2 Arizona State University, USA 3 The National

More information

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are

More information

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: natu@cis.udel.edu

More information

Multiple Spanning Tree Protocol (MSTP), Multi Spreading And Network Optimization Model

Multiple Spanning Tree Protocol (MSTP), Multi Spreading And Network Optimization Model Load Balancing of Telecommunication Networks based on Multiple Spanning Trees Dorabella Santos Amaro de Sousa Filipe Alvelos Instituto de Telecomunicações 3810-193 Aveiro, Portugal dorabella@av.it.pt Instituto

More information

Connected Identifying Codes for Sensor Network Monitoring

Connected Identifying Codes for Sensor Network Monitoring Connected Identifying Codes for Sensor Network Monitoring Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email:

More information

Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks

Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks Rahul Urgaonkar IBM TJ Watson Research Center Yorktown Heights, NY 10598 Email: rurgaon@us.ibm.com Prithwish Basu and Saikat Guha

More information

Generating models of a matched formula with a polynomial delay

Generating models of a matched formula with a polynomial delay Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

Monitor Placement for Maximal Identifiability in Network Tomography

Monitor Placement for Maximal Identifiability in Network Tomography Monitor Placement for Maximal Identifiability in Network Tomography Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, and Don Towsley Imperial College, London, UK. Email: {l.ma10, kin.leung}@imperial.ac.uk

More information

Probe Station Placement for Robust Monitoring of Networks

Probe Station Placement for Robust Monitoring of Networks Probe Station Placement for Robust Monitoring of Networks Maitreya Natu Dept. of Computer and Information Science University of Delaware Newark, DE, USA, 97 Email: natu@cis.udel.edu Adarshpal S. Sethi

More information

Maximizing Restorable Throughput in MPLS Networks Reuven Cohen, Senior Member, IEEE, and Gabi Nakibly, Member, IEEE

Maximizing Restorable Throughput in MPLS Networks Reuven Cohen, Senior Member, IEEE, and Gabi Nakibly, Member, IEEE 568 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2, APRIL 2010 Maximizing Restorable Throughput in MPLS Networks Reuven Cohen, Senior Member, IEEE, and Gabi Nakibly, Member, IEEE Abstract MPLS recovery

More information

Fairness in Routing and Load Balancing

Fairness in Routing and Load Balancing Fairness in Routing and Load Balancing Jon Kleinberg Yuval Rabani Éva Tardos Abstract We consider the issue of network routing subject to explicit fairness conditions. The optimization of fairness criteria

More information

Collapse by Cascading Failures in Hybrid Attacked Regional Internet

Collapse by Cascading Failures in Hybrid Attacked Regional Internet Collapse by Cascading Failures in Hybrid Attacked Regional Internet Ye Xu and Zhuo Wang College of Information Science and Engineering, Shenyang Ligong University, Shenyang China xuy.mail@gmail.com Abstract

More information

WITH THE RAPID growth of the Internet, overlay networks

WITH THE RAPID growth of the Internet, overlay networks 2182 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 12, DECEMBER 2006 Network Topology Inference Based on End-to-End Measurements Xing Jin, Student Member, IEEE, W.-P. Ken Yiu, Student

More information

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services Ming Zhang, Chi Zhang Vivek Pai, Larry Peterson, Randy Wang Princeton University Motivation Routing anomalies are

More information

How To Solve A Minimum Set Covering Problem (Mcp)

How To Solve A Minimum Set Covering Problem (Mcp) Measuring Rationality with the Minimum Cost of Revealed Preference Violations Mark Dean and Daniel Martin Online Appendices - Not for Publication 1 1 Algorithm for Solving the MASP In this online appendix

More information

Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html

Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE

More information

On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003

On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003 On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude

More information

Diversity Coloring for Distributed Data Storage in Networks 1

Diversity Coloring for Distributed Data Storage in Networks 1 Diversity Coloring for Distributed Data Storage in Networks 1 Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Pasadena, CA 9115, U.S.A. {jax, bruck}@paradise.caltech.edu Abstract

More information

Analysis of Algorithms I: Binary Search Trees

Analysis of Algorithms I: Binary Search Trees Analysis of Algorithms I: Binary Search Trees Xi Chen Columbia University Hash table: A data structure that maintains a subset of keys from a universe set U = {0, 1,..., p 1} and supports all three dictionary

More information

Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures

Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures T. Anji Kumar anji5678@gmail.com Dept. of IT/ UCEV JNTUK Vizianagaram, 535003, India Dr MHM Krishna Prasad Dept.

More information

A Constraint Programming based Column Generation Approach to Nurse Rostering Problems

A Constraint Programming based Column Generation Approach to Nurse Rostering Problems Abstract A Constraint Programming based Column Generation Approach to Nurse Rostering Problems Fang He and Rong Qu The Automated Scheduling, Optimisation and Planning (ASAP) Group School of Computer Science,

More information

Establishing a Mobile Conference Call Under Delay and Bandwidth Constraints

Establishing a Mobile Conference Call Under Delay and Bandwidth Constraints Establishing a Mobile Conference Call Under Delay and Bandwidth Constraints Amotz Bar-Noy Computer and Information Science Department Brooklyn College, CUNY, New York Email: amotz@sci.brooklyn.cuny.edu

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints

Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints Towards Efficient Large-Scale VPN Monitoring and Diagnosis under Operational Constraints Yao Zhao, Zhaosheng Zhu, Yan Chen Northwestern University {yzhao,zzh3,ychen}@cs.northwestern.edu Dan Pei, Jia Wang

More information

Routing in Line Planning for Public Transport

Routing in Line Planning for Public Transport Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany MARC E. PFETSCH RALF BORNDÖRFER Routing in Line Planning for Public Transport Supported by the DFG Research

More information

Introduction to LAN/WAN. Network Layer

Introduction to LAN/WAN. Network Layer Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services

More information

What cannot be measured on the Internet? Yvonne-Anne Pignolet, Stefan Schmid, G. Trédan. Misleading stars

What cannot be measured on the Internet? Yvonne-Anne Pignolet, Stefan Schmid, G. Trédan. Misleading stars : What cannot be measured on the Internet? Yvonne-Anne Pignolet, Stefan Schmid, Gilles Tredan How accurate are network maps? Why? To develop/adapt protocols to Internet PaDIS, RMTP To understand the impact

More information

Optimal NetFlow Deployment in IP Networks

Optimal NetFlow Deployment in IP Networks Optimal NetFlow Deployment in IP Networks Hui Zang 1 and Antonio Nucci 2 1 Sprint Advanced Technology Laboratories 1 Adrian Court, Burlingame, CA, USA hzang@sprintlabs.com 2 Narus, Inc. 500 Logue Avenue,

More information

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort

More information

Analysis of Internet Topologies: A Historical View

Analysis of Internet Topologies: A Historical View Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

Introduction to Logic in Computer Science: Autumn 2006

Introduction to Logic in Computer Science: Autumn 2006 Introduction to Logic in Computer Science: Autumn 2006 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today Now that we have a basic understanding

More information

Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?

Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects? Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects? Juan Caballero, Theocharis Kampouris, Dawn Song, Jia Wang Carnegie Mellon University UC Berkeley AT&T

More information

SIGMOD RWE Review Towards Proximity Pattern Mining in Large Graphs

SIGMOD RWE Review Towards Proximity Pattern Mining in Large Graphs SIGMOD RWE Review Towards Proximity Pattern Mining in Large Graphs Fabian Hueske, TU Berlin June 26, 21 1 Review This document is a review report on the paper Towards Proximity Pattern Mining in Large

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

A Working Knowledge of Computational Complexity for an Optimizer

A Working Knowledge of Computational Complexity for an Optimizer A Working Knowledge of Computational Complexity for an Optimizer ORF 363/COS 323 Instructor: Amir Ali Ahmadi TAs: Y. Chen, G. Hall, J. Ye Fall 2014 1 Why computational complexity? What is computational

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,

More information

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks

Graph Theory and Complex Networks: An Introduction. Chapter 08: Computer networks Graph Theory and Complex Networks: An Introduction Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 08: Computer networks Version: March 3, 2011 2 / 53 Contents

More information

A hierarchical multicriteria routing model with traffic splitting for MPLS networks

A hierarchical multicriteria routing model with traffic splitting for MPLS networks A hierarchical multicriteria routing model with traffic splitting for MPLS networks João Clímaco, José Craveirinha, Marta Pascoal jclimaco@inesccpt, jcrav@deecucpt, marta@matucpt University of Coimbra

More information

{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen

{p t [D1t(p t ) + D2t(p t )]}. Proposition 1. With a dynamic centralized pricing mechanism, p cen On Profitability and Efficiency of Wireless Mesh Networks Fang Fang, College of Business Administration, Cal State San Marcos, fangfang@csusm.edu; Lili Qiu, Department of Computer Science, The Univ of

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Path Optimization in Computer Networks

Path Optimization in Computer Networks Path Optimization in Computer Networks Roman Ciloci Abstract. The main idea behind path optimization is to find a path that will take the shortest amount of time to transmit data from a host A to a host

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

Discovering High-Impact Routing Events Using Traceroutes

Discovering High-Impact Routing Events Using Traceroutes ISCC 2015 IEEE Symposium on Computers and Communications Discovering High-Impact Routing Events Using Traceroutes Dept. of Engineering, Roma Tre University, Italy July 7th, 2015 Larnaca, Cyprus Joint work

More information

Traceroute-Based Topology Inference without Network Coordinate Estimation

Traceroute-Based Topology Inference without Network Coordinate Estimation Traceroute-Based Topology Inference without Network Coordinate Estimation Xing Jin, Wanqing Tu Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water

More information

Data Caching in Networks with Reading, Writing and Storage Costs

Data Caching in Networks with Reading, Writing and Storage Costs Data Caching in Networks with Reading, 1 Writing and Storage Costs Himanshu Gupta Computer Science Department Stony Brook University Stony Brook, NY 11790 Email: hgupta@cs.sunysb.edu Bin Tang Computer

More information

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video

More information

Measurement-aware Monitor Placement and Routing

Measurement-aware Monitor Placement and Routing Measurement-aware Monitor Placement and Routing A Joint Optimization Approach for Network-Wide Measurements Guanyao Huang 1 Chia-Wei Chang Chen-Nee Chuah 1 Bill Lin 1 University of California at Davis,

More information

On Selfish Routing in Internet-Like Environments

On Selfish Routing in Internet-Like Environments 1 On Selfish Routing in Internet-Like Environments Lili Qiu Yang Richard Yang Yin Zhang Scott Shenker UT Austin Yale University UT Austin UC Berkeley lili@cs.utexas.edu yry@cs.yale.edu yzhang@cs.utexas.edu

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks

Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks Jing (Selena) He, Shouling Ji, Yi Pan, Zhipeng Cai Department of Computer Science, Georgia State University, Atlanta, GA, USA, {jhe9,

More information

Offline sorting buffers on Line

Offline sorting buffers on Line Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

More information

A Note on Maximum Independent Sets in Rectangle Intersection Graphs

A Note on Maximum Independent Sets in Rectangle Intersection Graphs A Note on Maximum Independent Sets in Rectangle Intersection Graphs Timothy M. Chan School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada tmchan@uwaterloo.ca September 12,

More information

Router Group Monitoring: Making Traffic Trajectory Error Detection More Efficient

Router Group Monitoring: Making Traffic Trajectory Error Detection More Efficient Router Group Monitoring: Making Traffic Trajectory Error Detection More Efficient Bo Zhang Guohui Wang Angela Yun Zhu T. S. Eugene Ng Department of Computer Science Rice University Abstract Detecting errors

More information

Managing End-to-end Network performance via. Optimized Monitoring Strategies

Managing End-to-end Network performance via. Optimized Monitoring Strategies Managing End-to-end Network performance via Optimized Monitoring Strategies H. Cenk Ozmutlu hco@uludag.edu.tr Dept. of Industrial Engineering School of Engineering and Architecture Uludag University Gorukle,

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Strategic planning in LTL logistics increasing the capacity utilization of trucks

Strategic planning in LTL logistics increasing the capacity utilization of trucks Strategic planning in LTL logistics increasing the capacity utilization of trucks J. Fabian Meier 1,2 Institute of Transport Logistics TU Dortmund, Germany Uwe Clausen 3 Fraunhofer Institute for Material

More information