首页> 外文学位 >Throughput-Optimal Routing in Adversarial Networks.
【24h】

Throughput-Optimal Routing in Adversarial Networks.

机译:对抗网络中的吞吐量优化路由。

获取原文
获取原文并翻译 | 示例

摘要

Reliance on networks as a means to transmit communication between sources has exploded in the past two decades, e.g. via wireless networks, satellite communication, and the Internet. With such a pervasive presence in our every day lives, it is not surprising that there has been a corresponding explosion in research concerned with routing protocols that perform well in a variety of network settings. Motivated by understanding theoretical bounds in routing performance, we explore in this dissertation the feasibility of routing in highly unreliable networks.;We begin by modeling a network as a graph with vertices representing nodes and edges representing the links between them, and consider two forms of unreliability: unpredictable edge-failures, and deliberate deviation from protocol specifications by corrupt nodes. The first form of unpredictability represents networks with dynamic topology, whose links may be constantly going up and down; while the second form represents malicious insiders attempting to disrupt communication by deliberately disobeying routing rules, by e.g. introducing junk messages or deleting or altering messages. Within these networks, we focus on end-to-end communication between a sending node and a receiving node, and evaluate routing protocols on the basis of through-put performance.;This dissertation is split between four main chapters, representing four different network models demonstrating increasing levels of unreliability. The first of these is a synchronous network consisting of honest nodes and with dynamic topology (with certain connectivity assumptions which restrict the frequency of link failures between nodes). In this network setting, we present a routing protocol that enjoys provably optimal throughput performance. The next chapter allows for corrupt nodes, and we present a protocol that (asymptotically) matches the throughput performance of the optimal protocol in the honest node network model, concluding that the extra security against misbehaving nodes can be achieved "for free.";Motivated by the fact that most networks encountered in practice are asynchronous, we next consider a network model that demonstrates both asynchronicity as well as eliminating the connectivity assumptions , but assumes that the nodes in the network behave honestly . Because no connectivity assumptions are made in this network setting, an absolute guarantee of throughput performance is not possible. Instead, we utilize competitive analysis to measure the efficiency of a given protocol by comparing its performance to that of an ideal off-line protocol, the latter having perfect information to future edge failures and able to route optimally based on this extra information. We use competitive analysis to prove matching upper and lower bounds on achievable throughput performance in this network setting.;Finally, we combine our results of the above network models to construct a protocol for a network model that simultaneously demonstrates all forms of unreliability: asynchronous, local control, dynamic topology with no connectivity assumptions, and susceptible to malicious nodes. We construct a routing protocol for this highly unreliable network setting, and use competitive analysis to prove this protocol achieves optimal throughput performance.
机译:在过去的二十年中,例如,在过去的十年中,对网络的依赖日益增长。通过无线网络,卫星通信和互联网。在我们日常生活中如此普遍存在的情况下,有关路由协议的研究在各种网络环境中表现良好就不足为奇了。通过理解路由性能的理论界限,本文探讨了在高度不可靠的网络中进行路由的可行性。我们首先将网络建模为一个图形,其中顶点表示节点,边表示它们之间的链接,并考虑两种形式的不可靠:不可预测的边缘故障,以及由于损坏的节点故意偏离协议规范的情况。不可预测性的第一种形式表示具有动态拓扑的网络,其链接可能会不断地上升和下降。而第二种形式则表示恶意内部人员试图通过故意违反路由规则来破坏通信,例如引入垃圾邮件或删除或更改邮件。在这些网络中,我们着重于发送节点和接收节点之间的端到端通信,并根据吞吐量性能评估路由协议。本文分为四个主要章节,分别代表四种不同的网络模型。展示了越来越高的不可靠性。其中的第一个是由诚实节点组成的同步网络,并具有动态拓扑(具有某些连接性假设,这些条件限制了节点之间链路故障的频率)。在此网络设置中,我们提出了一种路由协议,该协议具有可证明的最佳吞吐量性能。下一章将介绍损坏的节点,并且我们提出一种协议,该协议(渐近地)与诚实节点网络模型中最佳协议的吞吐量性能相匹配,从而得出结论,可以“免费”获得针对行为异常的节点的额外安全性。通过实践中遇到的大多数网络都是异步的事实,我们接下来考虑一个网络模型,该模型既可以显示异步性,又可以消除连接性假设,但假设网络中的节点行为诚实。由于在此网络设置中未做出连接假设,因此无法绝对保证吞吐量性能。相反,我们通过竞争性分析将给定协议的性能与理想的离线协议的性能进行比较,从而评估给定协议的效率,后者对于未来的边缘故障具有完善的信息,并能够基于此额外信息进行最佳路由。我们使用竞争性分析来证明在此网络设置下可达到的吞吐量性能匹配的上限和下限。最后,我们结合以上网络模型的结果,为网络模型构建协议,该协议同时演示了所有形式的不可靠性:异步,本地控制,没有连接性假设的动态拓扑,并且容易受到恶意节点的攻击。我们针对此高度不可靠的网络设置构造了路由协议,并使用竞争分析法证明了该协议可实现最佳吞吐量性能。

著录项

  • 作者

    Bunn, Paul Howard.;

  • 作者单位

    University of California, Los Angeles.;

  • 授予单位 University of California, Los Angeles.;
  • 学科 Mathematics.;Computer Science.
  • 学位 Ph.D.
  • 年度 2010
  • 页码 312 p.
  • 总页数 312
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号