SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Elysium Technologies Private Limited
            Approved by ISO 9001:2008 and AICTE for SKP Training
            Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai
            http://www.elysiumtechnologies.com, info@elysiumtechnologies.com



        IEEE FINAL YEAR PROJECTS 2012 – 2013
                                NETWORKS
Corporate Office: Madurai
    227-230, Church road, Anna nagar, Madurai – 625 020.
    0452 – 4390702, 4392702, +9199447933980
    Email: info@elysiumtechnologies.com, elysiumtechnologies@gmail.com
    Website: www.elysiumtechnologies.com

Branch Office: Trichy
    15, III Floor, SI Towers, Melapudur main road, Trichy – 620 001.
    0431 – 4002234, +919790464324.
    Email: trichy@elysiumtechnologies.com, elysium.trichy@gmail.com.
    Website: www.elysiumtechnologies.com

Branch Office: Coimbatore
    577/4, DB Road, RS Puram, Opp to KFC, Coimbatore – 641 002.
    +919677751577
    Website: Elysiumtechnologies.com, Email: info@elysiumtechnologies.com

Branch Office: Kollam
    Surya Complex, Vendor junction, Kollam – 691 010, Kerala.
    0474 – 2723622, +919446505482.
    Email: kerala@elysiumtechnologies.com.
    Website: www.elysiumtechnologies.com

Branch Office: Cochin
    4th Floor, Anjali Complex, near south over bridge, Valanjambalam,
    Cochin – 682 016, Kerala.
    0484 – 6006002, +917736004002.
    Email: kerala@elysiumtechnologies.com, Website: www.elysiumtechnologies.com

        IEEE Final Year Projects 2012 |Student Projects | Networks Projects
Elysium Technologies Private Limited
                           Approved by ISO 9001:2008 and AICTE for SKP Training
                           Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai
                           http://www.elysiumtechnologies.com, info@elysiumtechnologies.com




                                   NETWORKS                                                        2012 - 2013
EGC
        A Game-Theoretic Approach to Anonymous Networking
5301


       Anonymous wireless networking is studied when an adversary monitors the transmission timing of an unknown subset
       of the network nodes. For a desired quality of service (QoS), as measured by network throughput, the problem of
       maximizing anonymity is investigated from a game-theoretic perspective. Quantifying anonymity using conditional
       entropy of the routes given the adversary's observation, the problem of optimizing anonymity is posed as a two-player
       zero-sum game between the network designer and the adversary: The task of the adversary is to choose a subset of
       nodes to monitor so that anonymity of routes is minimum, whereas the task of the network designer is to maximize
       anonymity by choosing a subset of nodes to evade flow detection by generating independent transmission schedules. In
       this two-player game, it is shown that a unique saddle-point equilibrium exists for a general category of finite networks.
       At the saddle point, the strategy of the network designer is to ensure that any subset of nodes monitored by the
       adversary reveals an identical amount of information about the routes. For a specific class of parallel relay networks, the
       theory is applied to study the optimal performance tradeoffs and equilibrium strategies. In particular, when the nodes
       employ transmitter-directed signaling, the tradeoff between throughput and anonymity is characterized analytically as a
       function of the network parameters and the fraction of nodes monitored. The results are applied to study the
       relationships between anonymity, the fraction of monitored relays, and the fraction of hidden relays in large networks.




EGC    A Theory for the Connectivity Discovered by Routing Protocols
5302


       Route-vector protocols, such as the Border Gateway Protocol (BGP), have nodes elect and exchange routes in order to
       discover paths over which to send traffic. We ask the following: What is the minimum number of links whose failure
       prevents a route-vector protocol from finding such paths? The answer is not obvious because routing policies prohibit
       some paths from carrying traffic and because, on top of that, a route-vector protocol may hide paths the routing policies
       would allow. We develop an algebraic theory to address the above and related questions. In particular, we characterize a
       broad class of routing policies for which we can compute in polynomial time the minimum number of links whose failure
       leaves a route-vector protocol without a communication path from one given node to another. The theory is applied to a
       publicly available description of the Internet topology to quantify how much of its intrinsic connectivity is lost due to the
       traditional customer-provider, peer-peer routing policies and how much can be regained with simple alternative policies




                      IEEE Final Year Projects 2012 |Student Projects | Networks Projects
Elysium Technologies Private Limited
                            Approved by ISO 9001:2008 and AICTE for SKP Training
                            Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai
                            http://www.elysiumtechnologies.com, info@elysiumtechnologies.com



EGC      Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS
5303     Attacks

        Denial-of-service (DoS) attacks are considered within the province of a shared channel model in which attack rates may
        be large but are bounded and client request rates vary within fixed bounds. In this setting, it is shown that clients can
        adapt effectively to an attack by increasing their request rate based on timeout windows to estimate attack rates. The
        server will be able to process client requests with high probability while pruning out most of the attack by selective
        random sampling. The protocol introduced here, called Adaptive Selective Verification (ASV), is shown to use bandwidth
        efficiently and does not require any server state or assumptions about network congestion. The main results of the
        paper are a formulation of optimal performance and a proof that ASV is optimal.

EGC
         Balancing Reliability and Utilization in Dynamic Spectrum Access 3 Results returned
5304


         Future wireless networks will dynamically access spectrum to maximize its utilization. Conventional design of dynamic
         spectrum access focuses on maximizing spectrum utilization, but faces the problem of degraded reliability due to
         unregulated demands and access behaviors. Without providing proper reliability guarantee, dynamic spectrum access
         is unacceptable to many infrastructure networks and services. In this paper, we propose SPARTA, a new architecture
         for dynamic spectrum access that balances access reliability and spectrum utilization. SPARTA includes two
         complementary techniques: proactive admission control performed by a central entity to determine the set of wireless
         nodes to be supported with only statistical information of their spectrum demands, and online adaptation performed by
         admitted wireless nodes to adjust their instantaneous spectrum usage to time-varying demand. Using both theoretical
         analysis and simulation, we show that SPARTA fulfills the reliability requirements while dynamically multiplexing
         spectrum demands to improve utilization. Compared to conventional solutions, SPARTA improves spectrum utilization
         by 80%-200%. Finally, SPARTA also allows service providers to explore the tradeoff between utilization and reliability to
         make the best use of the spectrum. To our best knowledge, our work is the first to identify and address such a tradeoff.

 EGC
          Concise Lookup Tables for IPv4 and IPv6 Longest Prefix Matching in Scalable Routers
 5305


        We present a distinct longest prefix matching (LPM) lookup scheme able to achieve exceedingly concise lookup tables
        (CoLT), suitable for scalable routers. Based on unified hash tables for handling both IPv4 and IPv6 simultaneously, CoLT
        excels over previous mechanisms in: 1) lower on-chip storage for lookup tables; 2) simpler table formats to enjoy richer
        prefix aggregation and easier implementation; and 3) most importantly, deemed the only design able to accommodate
        both IPv4 and IPv6 addresses uniformly and effectively. As its hash tables permit multiple possible buckets to hold each
        prefix (following a migration rule to avoid false positives altogether), CoLT exhibits the best memory efficiency and can
        launch parallel search over tables during every LPM lookup, involving fewer cycles per lookup when on-chip memory is
        used to implement hash tables. With 16 (or 32) on-chip SRAM blocks clocked at 500 MHz (achievable in today's 65-nm


                      IEEE Final Year Projects 2012 |Student Projects | Networks Projects

EGC      Design of Wireless Sensor Networks for Mobile Target Detection
5306
Elysium Technologies Private Limited
                            Approved by ISO 9001:2008 and AICTE for SKP Training
                            Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai
                            http://www.elysiumtechnologies.com, info@elysiumtechnologies.com


        technology), it takes 2 (or 1.6) cycles on average to complete a lookup, yielding 250 (or 310+) millions of packets per
        second (MPPS) mean throughput. Being hash-oriented, CoLT well supports incremental table updates, besides its high
        table utilization and lookup throughput.




        We consider surveillance applications through wireless sensor networks (WSNs) where the areas to be monitored are
        fully accessible and the WSN topology can be planned a priori to maximize application efficiency. We propose an
        optimization framework for selecting the positions of wireless sensors to detect mobile targets traversing a given area.
        By leveraging the concept of path exposure as a measure of detection quality, we propose two problem versions: the
        minimization of the sensors installation cost while guaranteeing a minimum exposure, and the maximization of the
        exposure of the least-exposed path subject to a budget on the sensors installation cost. We present compact mixed-
        integer linear programming formulations for these problems that can be solved to optimality for reasonable-sized
        network instances. Moreover, we develop Tabu Search heuristics that are able to provide near-optimal solutions of the
        same instances in short computing time and also tackle large size instances. The basic versions are extended to
        account for constraints on the wireless connectivity as well as heterogeneous devices and nonuniform sensing. Finally,
        we analyze an enhanced exposure definition based on mobile target detection probability.


 EGC      Declarative Policy-Based Adaptive Mobile Ad Hoc Networking
 5307


        This paper presents DAWN, a declarative platform that creates highly adaptive policy-based mobile ad hoc network
        (MANET) protocols. DAWN leverages declarative networking techniques to achieve extensible routing and forwarding
        using declarative languages. We make the following contributions. First, we demonstrate that traditional MANET
        protocols can be expressed in a concise fashion as declarative networks and policy-driven adaptation can be specified
        in the same language to dictate the dynamic selection of different protocols based on various network and traffic
        conditions. Second, we propose interprotocol forwarding techniques that ensure packets are able to seamlessly
        traverse across clusters of nodes running different protocols selected based on their respective policies. Third, we have
        developed a full-fledged implementation of DAWN using the RapidNet declarative networking system. We experimentally
        validate a variety of policy-based adaptive MANETs in various dynamic settings using a combination of ns-3 simulations
        and deployment on the ORBIT testbed. Our experimental results demonstrate that hybrid protocols developed using
        DAWN outperform traditional MANET routing protocols and are able to flexibly and dynamically adapt their routing
        mechanisms to achieve a good tradeoff between bandwidth utilization and route quality. We further demonstrate
        DAWN's capabilities to achieve interprotocol forwarding across different protocols..

EGC
5308     Differentiated Quality-of-Recovery in Survivable Optical Mesh Networks Using p -
         Structures

        This paper investigates design methods of protection schemes in survivable WDM networks that use preconfigured


                      IEEE Final Year Projects 2012 |Student Projects | Networks Projects
Elysium Technologies Private Limited
                           Approved by ISO 9001:2008 and AICTE for SKP Training
                           Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai
                           http://www.elysiumtechnologies.com, info@elysiumtechnologies.com


       protection structures (p-structures) in order to provide different quality-of-recovery (QoR) classes within 100% resilient
       single-link protection schemes. QoR differentiation is a practical and effective approach in order to strike different
       balances among protection cost, recovery delay, and management complexity. Based on the degree of pre-cross
       connectivity of the protection structures, we develop three design approaches of shared protection capacity schemes
       based on the following: 1) fully pre-cross-connected p-structures (fp-structures); 2) partially pre-cross-connected p-
       structures (pp-structures); and 3) dynamically reconfigured p -structures (dp -structures). In order to identify the optimal
       combinations of protection structures to meet the requirements of the three QoR classes, we use a column generation
       (CG) model that we solve using large-scale optimization techniques. Our CG decomposition approach is based on the
       separation processes of the design and selection of the protection structures. In the design process of the protection
       structures, the shape and protection capability of each p-structure is decided dynamically during the selection process
       depending on the network topology and the targeted QoR parameters. Extensive experiments are carried out on several
       data instances with different design constraints in order to measure the protection capacity cost and the recovery delay
       for the three QoR classes



EGC
         Distributed Resource Allocation Based on Queue Balancing in Multihop Cognitive Radio
5309
         Networks

       Cognitive radio (CR) allows unlicensed users to access the licensed spectrum opportunistically (i.e., when the spectrum
       is left unused by the licensed users) to enhance the spectrum utilization efficiency. In this paper, the problem of
       allocating resources (channels and transmission power) in multihop CR networks is modeled as a multicommodity flow
       problem with the dynamic link capacity resulting from dynamic resource allocation, which is in sharp contrast with
       existing flow-control approaches that assume fixed link capacity. Based on queue-balancing network flow control that is
       ideally suited for handling dynamically changing spectrum availability in CR networks, we propose a distributed scheme
       (installed and operational in each node) for optimal resource allocation without exchanging spectrum dynamics
       information between remote nodes. Considering the power masks, each node makes resource-allocation decisions
       based on current or past local information from neighboring nodes to satisfy the throughput requirement of each flow.
       Parameters of these proposed schemes are configured to maintain the network stability. The performance of the
       proposed scheme for both asynchronous and synchronous scenarios is analyzed comparatively. Both cases of
       sufficient and insufficient network capacity are considered.


EGC
         Max-Min Fairness in 802.11 Mesh Networks
5310


       In this paper, we establish that the rate region of a large class of IEEE 802.11 mesh networks is log-convex, immediately
       allowing standard utility fairness methods to be generalized to this class of networks. This creates a solid theoretical
       underpinning for fairness analysis and resource allocation in this practically important class of networks. For the special
       case of max-min fairness, we use this new insight to obtain an almost complete characterization of the fair rate
       allocation and a remarkably simple, practically implementable method for achieving max-min fairness in 802.11 mesh


                      IEEE Final Year Projects 2012 |Student Projects | Networks Projects
Elysium Technologies Private Limited
                           Approved by ISO 9001:2008 and AICTE for SKP Training
                           Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai
                           http://www.elysiumtechnologies.com, info@elysiumtechnologies.com


       networks.


EGC     Multicast Performance With Hierarchical Cooperation
5311


       It has been shown in a previous version of this paper that hierarchical cooperation achieves a linear throughput scaling
       for unicast traffic, which is due to the advantage of long-range concurrent transmissions and the technique of
       distributed multiple-input-multiple-output (MIMO). In this paper, we investigate the scaling law for multicast traffic with
       hierarchical cooperation, where each of the n nodes communicates with k randomly chosen destination nodes.
       Specifically, we propose a new class of scheduling policies for multicast traffic. By utilizing the hierarchical cooperative
       MIMO transmission, our new policies can obtain an aggregate throughput of Ω(( [( n)/( k)])1-ε) for any ε >; 0. This
       achieves a gain of nearly √{[( n)/( k)]} compared to the noncooperative scheme in Li 's work (Proc. ACM MobiCom, 2007,
       pp. 266-277). Among all four cooperative strategies proposed in our paper, one is superior in terms of the three
       performance metrics: throughput, delay, and energy consumption. Two factors contribute to the optimal performance:
       multihop MIMO transmission and converge-based scheduling. Compared to the single-hop MIMO transmission strategy,
       the multihop strategy achieves a throughput gain of ( [( n)/( k)])[(h-1)/( h(2h-1))] and meanwhile reduces the energy
       consumption by k[( α-2)/ 2] times approximately, where h >; 1 is the number of the hierarchical layers, and α >; 2 is the
       path-loss exponent. Moreover, to schedule the traffic with the converge multicast instead of the pure multicast strategy,
       we can dramatically reduce the delay by a factor of about ( [( n)/( k)])[(h)/ 2]. Our optimal cooperative strategy achieves
       an approximate delay-throughput tradeoff D(n,k)/T(n,k)=Θ(k) when h&- x2192; ∞. This tradeoff ratio is identical to that of
       noncooperative scheme, while the throughput is greatly improved.


EGC    Efficient Network Tomography for Internet Topology Discovery
5312


       Randomized Accurate and timely identification of the router-level topology of the Internet is one of the major unresolved
       problems in Internet research. Topology recovery via tomographic inference is potentially an attractive complement to
       standard methods that use TTL-limited probes. Unfortunately, limitations of prior tomographic techniques make timely
       resolution of large-scale topologies impossible due to the requirement of an infeasible number of measurements. In this
       paper, we describe new techniques that aim toward efficient tomographic inference for accurate router-level topology
       measurement. We introduce methodologies based on Depth-First Search (DFS) ordering that clusters end-hosts based
       on shared infrastructure and enables the logical tree topology of a network to be recovered accurately and efficiently.
       We evaluate the capabilities of our algorithms in large-scale simulation and find that our methods will reconstruct
       topologies using less than 2% of the measurements required by exhaustive methods and less than 15% of the
       measurements needed by the current state-of-the-art tomographic approach. We also present results from a study of the
       live Internet where we show our DFS-based methodologies can recover the logical router-level topology more accurately
       and with fewer probes than prior techniques.

EGC    Greedy Geographic Routing in Large-Scale Sensor Networks: A Minimum Network
5313
       Decomposition Approach
                      IEEE Final Year Projects 2012 |Student Projects | Networks Projects
Elysium Technologies Private Limited
                            Approved by ISO 9001:2008 and AICTE for SKP Training
                            Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai
                            http://www.elysiumtechnologies.com, info@elysiumtechnologies.com



        In geographic (or geometric) routing, messages are by default routed in a greedy manner: The current node always
        forwards a message to its neighbor node that is closest to the destination. Despite its simplicity and general efficiency,
        this strategy alone does not guarantee delivery due to the existence of local minima (or dead ends). Overcoming local
        minima requires nodes to maintain extra nonlocal state or to use auxiliary mechanisms. We study how to facilitate
        greedy forwarding by using a minimum amount of such nonlocal states in topologically complex networks. Specifically,
        we investigate the problem of decomposing a given network into a minimum number of greedily routable components
        (GRCs), where greedy routing is guaranteed to work. We approach it by considering an approximate version of the
        problem in a continuous domain, with a central concept called the greedily routable region (GRR). A full characterization
        of GRR is given concerning its geometric properties and routing capability. We then develop simple approximate
        algorithms for the problem. These results lead to a practical routing protocol that has a routing stretch below 7 in a
        continuous domain, and close to 1 in several realistic network settings.

 EGC      Polynomial-Time Algorithms for Multi rate Any path Routing in Wireless Multihop
 5314     Networks

        In this paper, we present a new routing paradigm that generalizes opportunistic routing for wireless multihop networks.
        In multirate anypath routing, each node uses both a set of next-hops and a selected transmission rate to reach a
        destination. Using this rate, a packet is broadcast to the nodes in the set, and one of them forwards the packet on to the
        destination. To date, there is no theory capable of jointly optimizing both the set of next-hops and the transmission rate
        used by each node. We solve this by introducing two polynomial-time routing algorithms and provide the proof of their
        optimality. The proposed algorithms have roughly the same running time as regular shortest-path algorithms and are
        therefore suitable for deployment in routing protocols. We conducted measurements in an 802.11b testbed network, and
        our trace-driven analysis shows that multirate anypath routing is on average 80% better than 11-Mbps anypath routing,
        with a factor of 6.4 improvements in the best case. If the rate is fixed at 1 Mbps instead, performance improves by a
        factor of 5.4 on average.


EGC
5315
        On Identifying Additive Link Metrics Using Linearly Independent Cycles and Paths


        Abstract— In this paper, we study the problem of identifying constant additive link metrics using linearly independent
        monitoring cycles and paths. A monitoring cycle starts and ends at the same monitoring station, while a monitoring path
        starts and ends at distinct monitoring stations. We show that three-edge connectivity is a necessary and sufficient
        condition to identify link metrics using one monitoring station and employing monitoring cycles. We develop a
        polynomial-time algorithm to compute the set of linearly independent cycles. For networks that are less than three-edge-
        connected, we show how the minimum number of monitors required and their placement may be computed. For
        networks with symmetric directed links, we show the relationship between the number of monitors employed, the
        number of directed links for which metric is known a priori, and the identifiability for the remaining links. To the best of
        our knowledge, this is the first work that derives the necessary and sufficient conditions on the network topology for

                       IEEE Final Year Projects 2012 |Student Projects | Networks Projects
Elysium Technologies Private Limited
                             Approved by ISO 9001:2008 and AICTE for SKP Training
                           Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai
                           http://www.elysiumtechnologies.com, info@elysiumtechnologies.com


       identifying additive link metrics and develops a polynomial-time algorithm to compute linearly independent cycles and
       paths.
EGC
       Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
5316


       In this paper, we study periodic query scheduling for data aggregation with minimum delay under various wireless
       interference models. Given a set Q of periodic aggregation queries, each query Qi ∈ Q has its own period pi and the
       subset of source nodes Si containing the data. We first propose a family of efficient and effective real-time scheduling
       protocols that can answer every job of each query task Qi ∈ Q within a relative delay O(pi) under resource constraints by
       addressing the following tightly coupled tasks: routing, transmission plan constructions, node activity scheduling, and
       packet scheduling. Based on our protocol design, we further propose schedulability test schemes to efficiently and
       effectively test whether, for a set of queries, each query job can be finished within a finite delay. Our theoretical analysis
       shows that our methods achieve at least a constant fraction of the maximum possible total utilization for query tasks,
       where the constant depends on wireless interference models. We also conduct extensive simulations to validate the
       proposed protocol and evaluate its practical performance. The simulations corroborate our theoretical analysis.



EGC    Power Control for Cognitive Radio Networks: Axioms, Algorithms, and Analysis
5317


       The deployment of cognitive radio networks enables efficient spectrum sharing and opportunistic spectrum access. It
       also presents new challenges to the classical problem of interference management in wireless networks. This paper
       develops an axiomatic framework for power allocation in cognitive radio networks based on four goals: QoS protection
       to primary users, opportunism to secondary users, admissibility to secondary users, and autonomous operation by
       individual users. Two additional goals, licensing and versatility, which are desirable rather than essential, are also
       presented. A general class of Duo Priority Class Power Control (DPCPC) policies that satisfy such goals is introduced.
       Through theoretical analysis and simulation, it is shown that a specific interference-aware power-control algorithm
       reaches such goals.


EGC
5318
       Reliable Collective Communications With Weighted SRLGs in Optical Networks

       In this paper, we study the problem of reliable collective communication (broadcast or gossip) with the objective of
       maximizing the reliability of the collective communication. The need for collective communication arises in many
       problems of parallel and distributed computing, including Grid or cloud computing and database management. We
       describe the network model, formulate the reliable collective communication problem, prove that the maximum reliable
       collective communication problem is NP-hard, and provide an integer linear program (ILP) formulation for the problem.
       We then provide a greedy approximation algorithm to construct collective communication (through a spanning tree) that
       achieves an approximation ratio of 1 + ln(|V|+α|E|-1) , where α is the average number of shared link risk groups (SRLGs)
       along links, and |V| and |E| are the total number of vertices and edges of the network, respectively. Simulations


                      IEEE Final Year Projects 2012 |Student Projects | Networks Projects
Elysium Technologies Private Limited
                           Approved by ISO 9001:2008 and AICTE for SKP Training
                           Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai
                           http://www.elysiumtechnologies.com, info@elysiumtechnologies.com


       demonstrate that our approximation algorithm achieves good performance in both small and large networks and that, in
       almost 95% of total cases, our algorithm outperforms the modified minimum spanning tree algorithms.




EGC    Router Support for Fine-Grained Latency Measurements
5319



       An increasing number of datacenter network applications, including automated trading and high-performance
       computing, have stringent end-to-end latency requirements where even microsecond variations may be intolerable. The
       resulting fine-grained measurement demands cannot be met effectively by existing technologies, such as SNMP,
       NetFlow, or active probing. We propose instrumenting routers with a hash-based primitive that we call a Lossy
       Difference Aggregator (LDA) to measure latencies down to tens of microseconds even in the presence of packet loss.
       Because LDA does not modify or encapsulate the packet, it can be deployed incrementally without changes along the
       forwarding path. When compared to Poisson-spaced active probing with similar overheads, our LDA mechanism
       delivers orders of magnitude smaller relative error; active probing requires 50-60 times as much bandwidth to deliver
       similar levels of accuracy. Although ubiquitous deployment is ultimately desired, it may be hard to achieve in the shorter
       term; we discuss a partial deployment architecture called mPlane using LDAs for intrarouter measurements and
       localized segment measurements for interrouter measurements..


EGC
5320
       Q-CSMA: Queue-Length-Based CSMA/CA Algorithms for Achieving Maximum
       Throughput and Low Delay in Wireless

       Recently, it has been shown that carrier-sense multiple access (CSMA)-type random access algorithms can achieve the
       maximum possible throughput in ad hoc wireless networks. However, these algorithms assume an idealized continuous-
       time CSMA protocol where collisions can never occur. In addition, simulation results indicate that the delay performance
       of these algorithms can be quite bad. On the other hand, although some simple heuristics (such as greedy maximal
       scheduling) can yield much better delay performance for a large set of arrival rates, in general they may only achieve a
       fraction of the capacity region. In this paper, we propose a discrete-time version of the CSMA algorithm. Central to our
       results is a discrete-time distributed randomized algorithm that is based on a generalization of the so-called Glauber
       dynamics from statistical physics, where multiple links are allowed to update their states in a single timeslot. The
       algorithm generates collision-free transmission schedules while explicitly taking collisions into account during the
       control phase of the protocol, thus relaxing the perfect CSMA assumption. More importantly, the algorithm allows us to
       incorporate heuristics that lead to very good delay performance while retaining the throughput-optimality property.


EGC     Scalable Lookahead Regular Expression Detection System for Deep Packet Inspection
5321




                     IEEE Final Year Projects 2012 |Student Projects | Networks Projects
Elysium Technologies Private Limited
                           Approved by ISO 9001:2008 and AICTE for SKP Training
                           Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai
                           http://www.elysiumtechnologies.com, info@elysiumtechnologies.com


       Regular expressions (RegExes) are widely used, yet their inherent complexity often limits the total number of RegExes
       that can be detected using a single chip for a reasonable throughput. This limit on the number of RegExes impairs the
       scalability of today's RegEx detection systems. The scalability of existing schemes is generally limited by the traditional
       detection paradigm based on per-character-state processing and state transition detection. The main focus of existing
       schemes is on optimizing the number of states and the required transitions, but not on optimizing the suboptimal
       character-based detection method. Furthermore, the potential benefits of allowing out-of-sequence detection, instead of
       detecting components of a RegEx in the order of appearance, have not been explored. Lastly, the existing schemes do
       not provide ways to adapt to the evolving RegExes. In this paper, we propose Lookahead Finite Automata (LaFA) to
       perform scalable RegEx detection. LaFA requires less memory due to these three contributions: 1) providing specialized
       and optimized detection modules to increase resource utilization; 2) systematically reordering the RegEx detection
       sequence to reduce the number of concurrent operations; 3) sharing states among automata for different RegExes to
       reduce resource requirements. Here, we demonstrate that LaFA requires an order of magnitude less memory compared
       to today's state-of-the-art RegEx detection systems. Using LaFA, a single-commodity field programmable gate array
       (FPGA) chip can accommodate up to 25  000 (25 k) RegExes. Based on the throughput of our LaFA prototype on
       FPGA, we estimate that a 34-Gb/s throughput can be achieved.


EGC
       Spatio-Temporal Compressive Sensing and Internet Traffic Matrices (Extended
5322
       Version)

       Denial-of-service (DoS) attacks are considered within the province of a shared channel model in which attack rates may
       be large but are bounded and client request rates vary within fixed bounds. In this setting, it is shown that clients can
       adapt effectively to an attack by increasing their request rate based on timeout windows to estimate attack rates. The
       server will be able to process client requests with high probability while pruning out most of the attack by selective
       random sampling. The protocol introduced here, called Adaptive Selective Verification (ASV), is shown to use bandwidth
       efficiently and does not require any server state or assumptions about network congestion. The main results of the
       paper are a formulation of optimal performance and a proof that ASV is optimal.




                      IEEE Final Year Projects 2012 |Student Projects | Networks Projects

Weitere ähnliche Inhalte

Kürzlich hochgeladen

How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17Celine George
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...CaraSkikne1
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice documentXsasf Sfdfasd
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphNetziValdelomar1
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfYu Kanazawa / Osaka University
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...Nguyen Thanh Tu Collection
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationMJDuyan
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 

Kürzlich hochgeladen (20)

How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17
 
5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...5 charts on South Africa as a source country for international student recrui...
5 charts on South Africa as a source country for international student recrui...
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice document
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a Paragraph
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 11 - GLOBAL SUCCESS - NĂM HỌC 2023-2024 - HK...
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive Education
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 

Empfohlen

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

Empfohlen (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Ieee projects 2012 2013 - Networks

  • 1. Elysium Technologies Private Limited Approved by ISO 9001:2008 and AICTE for SKP Training Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai http://www.elysiumtechnologies.com, info@elysiumtechnologies.com IEEE FINAL YEAR PROJECTS 2012 – 2013 NETWORKS Corporate Office: Madurai 227-230, Church road, Anna nagar, Madurai – 625 020. 0452 – 4390702, 4392702, +9199447933980 Email: info@elysiumtechnologies.com, elysiumtechnologies@gmail.com Website: www.elysiumtechnologies.com Branch Office: Trichy 15, III Floor, SI Towers, Melapudur main road, Trichy – 620 001. 0431 – 4002234, +919790464324. Email: trichy@elysiumtechnologies.com, elysium.trichy@gmail.com. Website: www.elysiumtechnologies.com Branch Office: Coimbatore 577/4, DB Road, RS Puram, Opp to KFC, Coimbatore – 641 002. +919677751577 Website: Elysiumtechnologies.com, Email: info@elysiumtechnologies.com Branch Office: Kollam Surya Complex, Vendor junction, Kollam – 691 010, Kerala. 0474 – 2723622, +919446505482. Email: kerala@elysiumtechnologies.com. Website: www.elysiumtechnologies.com Branch Office: Cochin 4th Floor, Anjali Complex, near south over bridge, Valanjambalam, Cochin – 682 016, Kerala. 0484 – 6006002, +917736004002. Email: kerala@elysiumtechnologies.com, Website: www.elysiumtechnologies.com IEEE Final Year Projects 2012 |Student Projects | Networks Projects
  • 2. Elysium Technologies Private Limited Approved by ISO 9001:2008 and AICTE for SKP Training Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai http://www.elysiumtechnologies.com, info@elysiumtechnologies.com NETWORKS 2012 - 2013 EGC A Game-Theoretic Approach to Anonymous Networking 5301 Anonymous wireless networking is studied when an adversary monitors the transmission timing of an unknown subset of the network nodes. For a desired quality of service (QoS), as measured by network throughput, the problem of maximizing anonymity is investigated from a game-theoretic perspective. Quantifying anonymity using conditional entropy of the routes given the adversary's observation, the problem of optimizing anonymity is posed as a two-player zero-sum game between the network designer and the adversary: The task of the adversary is to choose a subset of nodes to monitor so that anonymity of routes is minimum, whereas the task of the network designer is to maximize anonymity by choosing a subset of nodes to evade flow detection by generating independent transmission schedules. In this two-player game, it is shown that a unique saddle-point equilibrium exists for a general category of finite networks. At the saddle point, the strategy of the network designer is to ensure that any subset of nodes monitored by the adversary reveals an identical amount of information about the routes. For a specific class of parallel relay networks, the theory is applied to study the optimal performance tradeoffs and equilibrium strategies. In particular, when the nodes employ transmitter-directed signaling, the tradeoff between throughput and anonymity is characterized analytically as a function of the network parameters and the fraction of nodes monitored. The results are applied to study the relationships between anonymity, the fraction of monitored relays, and the fraction of hidden relays in large networks. EGC A Theory for the Connectivity Discovered by Routing Protocols 5302 Route-vector protocols, such as the Border Gateway Protocol (BGP), have nodes elect and exchange routes in order to discover paths over which to send traffic. We ask the following: What is the minimum number of links whose failure prevents a route-vector protocol from finding such paths? The answer is not obvious because routing policies prohibit some paths from carrying traffic and because, on top of that, a route-vector protocol may hide paths the routing policies would allow. We develop an algebraic theory to address the above and related questions. In particular, we characterize a broad class of routing policies for which we can compute in polynomial time the minimum number of links whose failure leaves a route-vector protocol without a communication path from one given node to another. The theory is applied to a publicly available description of the Internet topology to quantify how much of its intrinsic connectivity is lost due to the traditional customer-provider, peer-peer routing policies and how much can be regained with simple alternative policies IEEE Final Year Projects 2012 |Student Projects | Networks Projects
  • 3. Elysium Technologies Private Limited Approved by ISO 9001:2008 and AICTE for SKP Training Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai http://www.elysiumtechnologies.com, info@elysiumtechnologies.com EGC Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS 5303 Attacks Denial-of-service (DoS) attacks are considered within the province of a shared channel model in which attack rates may be large but are bounded and client request rates vary within fixed bounds. In this setting, it is shown that clients can adapt effectively to an attack by increasing their request rate based on timeout windows to estimate attack rates. The server will be able to process client requests with high probability while pruning out most of the attack by selective random sampling. The protocol introduced here, called Adaptive Selective Verification (ASV), is shown to use bandwidth efficiently and does not require any server state or assumptions about network congestion. The main results of the paper are a formulation of optimal performance and a proof that ASV is optimal. EGC Balancing Reliability and Utilization in Dynamic Spectrum Access 3 Results returned 5304 Future wireless networks will dynamically access spectrum to maximize its utilization. Conventional design of dynamic spectrum access focuses on maximizing spectrum utilization, but faces the problem of degraded reliability due to unregulated demands and access behaviors. Without providing proper reliability guarantee, dynamic spectrum access is unacceptable to many infrastructure networks and services. In this paper, we propose SPARTA, a new architecture for dynamic spectrum access that balances access reliability and spectrum utilization. SPARTA includes two complementary techniques: proactive admission control performed by a central entity to determine the set of wireless nodes to be supported with only statistical information of their spectrum demands, and online adaptation performed by admitted wireless nodes to adjust their instantaneous spectrum usage to time-varying demand. Using both theoretical analysis and simulation, we show that SPARTA fulfills the reliability requirements while dynamically multiplexing spectrum demands to improve utilization. Compared to conventional solutions, SPARTA improves spectrum utilization by 80%-200%. Finally, SPARTA also allows service providers to explore the tradeoff between utilization and reliability to make the best use of the spectrum. To our best knowledge, our work is the first to identify and address such a tradeoff. EGC Concise Lookup Tables for IPv4 and IPv6 Longest Prefix Matching in Scalable Routers 5305 We present a distinct longest prefix matching (LPM) lookup scheme able to achieve exceedingly concise lookup tables (CoLT), suitable for scalable routers. Based on unified hash tables for handling both IPv4 and IPv6 simultaneously, CoLT excels over previous mechanisms in: 1) lower on-chip storage for lookup tables; 2) simpler table formats to enjoy richer prefix aggregation and easier implementation; and 3) most importantly, deemed the only design able to accommodate both IPv4 and IPv6 addresses uniformly and effectively. As its hash tables permit multiple possible buckets to hold each prefix (following a migration rule to avoid false positives altogether), CoLT exhibits the best memory efficiency and can launch parallel search over tables during every LPM lookup, involving fewer cycles per lookup when on-chip memory is used to implement hash tables. With 16 (or 32) on-chip SRAM blocks clocked at 500 MHz (achievable in today's 65-nm IEEE Final Year Projects 2012 |Student Projects | Networks Projects EGC Design of Wireless Sensor Networks for Mobile Target Detection 5306
  • 4. Elysium Technologies Private Limited Approved by ISO 9001:2008 and AICTE for SKP Training Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai http://www.elysiumtechnologies.com, info@elysiumtechnologies.com technology), it takes 2 (or 1.6) cycles on average to complete a lookup, yielding 250 (or 310+) millions of packets per second (MPPS) mean throughput. Being hash-oriented, CoLT well supports incremental table updates, besides its high table utilization and lookup throughput. We consider surveillance applications through wireless sensor networks (WSNs) where the areas to be monitored are fully accessible and the WSN topology can be planned a priori to maximize application efficiency. We propose an optimization framework for selecting the positions of wireless sensors to detect mobile targets traversing a given area. By leveraging the concept of path exposure as a measure of detection quality, we propose two problem versions: the minimization of the sensors installation cost while guaranteeing a minimum exposure, and the maximization of the exposure of the least-exposed path subject to a budget on the sensors installation cost. We present compact mixed- integer linear programming formulations for these problems that can be solved to optimality for reasonable-sized network instances. Moreover, we develop Tabu Search heuristics that are able to provide near-optimal solutions of the same instances in short computing time and also tackle large size instances. The basic versions are extended to account for constraints on the wireless connectivity as well as heterogeneous devices and nonuniform sensing. Finally, we analyze an enhanced exposure definition based on mobile target detection probability. EGC Declarative Policy-Based Adaptive Mobile Ad Hoc Networking 5307 This paper presents DAWN, a declarative platform that creates highly adaptive policy-based mobile ad hoc network (MANET) protocols. DAWN leverages declarative networking techniques to achieve extensible routing and forwarding using declarative languages. We make the following contributions. First, we demonstrate that traditional MANET protocols can be expressed in a concise fashion as declarative networks and policy-driven adaptation can be specified in the same language to dictate the dynamic selection of different protocols based on various network and traffic conditions. Second, we propose interprotocol forwarding techniques that ensure packets are able to seamlessly traverse across clusters of nodes running different protocols selected based on their respective policies. Third, we have developed a full-fledged implementation of DAWN using the RapidNet declarative networking system. We experimentally validate a variety of policy-based adaptive MANETs in various dynamic settings using a combination of ns-3 simulations and deployment on the ORBIT testbed. Our experimental results demonstrate that hybrid protocols developed using DAWN outperform traditional MANET routing protocols and are able to flexibly and dynamically adapt their routing mechanisms to achieve a good tradeoff between bandwidth utilization and route quality. We further demonstrate DAWN's capabilities to achieve interprotocol forwarding across different protocols.. EGC 5308 Differentiated Quality-of-Recovery in Survivable Optical Mesh Networks Using p - Structures This paper investigates design methods of protection schemes in survivable WDM networks that use preconfigured IEEE Final Year Projects 2012 |Student Projects | Networks Projects
  • 5. Elysium Technologies Private Limited Approved by ISO 9001:2008 and AICTE for SKP Training Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai http://www.elysiumtechnologies.com, info@elysiumtechnologies.com protection structures (p-structures) in order to provide different quality-of-recovery (QoR) classes within 100% resilient single-link protection schemes. QoR differentiation is a practical and effective approach in order to strike different balances among protection cost, recovery delay, and management complexity. Based on the degree of pre-cross connectivity of the protection structures, we develop three design approaches of shared protection capacity schemes based on the following: 1) fully pre-cross-connected p-structures (fp-structures); 2) partially pre-cross-connected p- structures (pp-structures); and 3) dynamically reconfigured p -structures (dp -structures). In order to identify the optimal combinations of protection structures to meet the requirements of the three QoR classes, we use a column generation (CG) model that we solve using large-scale optimization techniques. Our CG decomposition approach is based on the separation processes of the design and selection of the protection structures. In the design process of the protection structures, the shape and protection capability of each p-structure is decided dynamically during the selection process depending on the network topology and the targeted QoR parameters. Extensive experiments are carried out on several data instances with different design constraints in order to measure the protection capacity cost and the recovery delay for the three QoR classes EGC Distributed Resource Allocation Based on Queue Balancing in Multihop Cognitive Radio 5309 Networks Cognitive radio (CR) allows unlicensed users to access the licensed spectrum opportunistically (i.e., when the spectrum is left unused by the licensed users) to enhance the spectrum utilization efficiency. In this paper, the problem of allocating resources (channels and transmission power) in multihop CR networks is modeled as a multicommodity flow problem with the dynamic link capacity resulting from dynamic resource allocation, which is in sharp contrast with existing flow-control approaches that assume fixed link capacity. Based on queue-balancing network flow control that is ideally suited for handling dynamically changing spectrum availability in CR networks, we propose a distributed scheme (installed and operational in each node) for optimal resource allocation without exchanging spectrum dynamics information between remote nodes. Considering the power masks, each node makes resource-allocation decisions based on current or past local information from neighboring nodes to satisfy the throughput requirement of each flow. Parameters of these proposed schemes are configured to maintain the network stability. The performance of the proposed scheme for both asynchronous and synchronous scenarios is analyzed comparatively. Both cases of sufficient and insufficient network capacity are considered. EGC Max-Min Fairness in 802.11 Mesh Networks 5310 In this paper, we establish that the rate region of a large class of IEEE 802.11 mesh networks is log-convex, immediately allowing standard utility fairness methods to be generalized to this class of networks. This creates a solid theoretical underpinning for fairness analysis and resource allocation in this practically important class of networks. For the special case of max-min fairness, we use this new insight to obtain an almost complete characterization of the fair rate allocation and a remarkably simple, practically implementable method for achieving max-min fairness in 802.11 mesh IEEE Final Year Projects 2012 |Student Projects | Networks Projects
  • 6. Elysium Technologies Private Limited Approved by ISO 9001:2008 and AICTE for SKP Training Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai http://www.elysiumtechnologies.com, info@elysiumtechnologies.com networks. EGC Multicast Performance With Hierarchical Cooperation 5311 It has been shown in a previous version of this paper that hierarchical cooperation achieves a linear throughput scaling for unicast traffic, which is due to the advantage of long-range concurrent transmissions and the technique of distributed multiple-input-multiple-output (MIMO). In this paper, we investigate the scaling law for multicast traffic with hierarchical cooperation, where each of the n nodes communicates with k randomly chosen destination nodes. Specifically, we propose a new class of scheduling policies for multicast traffic. By utilizing the hierarchical cooperative MIMO transmission, our new policies can obtain an aggregate throughput of Ω(( [( n)/( k)])1-ε) for any ε >; 0. This achieves a gain of nearly √{[( n)/( k)]} compared to the noncooperative scheme in Li 's work (Proc. ACM MobiCom, 2007, pp. 266-277). Among all four cooperative strategies proposed in our paper, one is superior in terms of the three performance metrics: throughput, delay, and energy consumption. Two factors contribute to the optimal performance: multihop MIMO transmission and converge-based scheduling. Compared to the single-hop MIMO transmission strategy, the multihop strategy achieves a throughput gain of ( [( n)/( k)])[(h-1)/( h(2h-1))] and meanwhile reduces the energy consumption by k[( α-2)/ 2] times approximately, where h >; 1 is the number of the hierarchical layers, and α >; 2 is the path-loss exponent. Moreover, to schedule the traffic with the converge multicast instead of the pure multicast strategy, we can dramatically reduce the delay by a factor of about ( [( n)/( k)])[(h)/ 2]. Our optimal cooperative strategy achieves an approximate delay-throughput tradeoff D(n,k)/T(n,k)=Θ(k) when h&- x2192; ∞. This tradeoff ratio is identical to that of noncooperative scheme, while the throughput is greatly improved. EGC Efficient Network Tomography for Internet Topology Discovery 5312 Randomized Accurate and timely identification of the router-level topology of the Internet is one of the major unresolved problems in Internet research. Topology recovery via tomographic inference is potentially an attractive complement to standard methods that use TTL-limited probes. Unfortunately, limitations of prior tomographic techniques make timely resolution of large-scale topologies impossible due to the requirement of an infeasible number of measurements. In this paper, we describe new techniques that aim toward efficient tomographic inference for accurate router-level topology measurement. We introduce methodologies based on Depth-First Search (DFS) ordering that clusters end-hosts based on shared infrastructure and enables the logical tree topology of a network to be recovered accurately and efficiently. We evaluate the capabilities of our algorithms in large-scale simulation and find that our methods will reconstruct topologies using less than 2% of the measurements required by exhaustive methods and less than 15% of the measurements needed by the current state-of-the-art tomographic approach. We also present results from a study of the live Internet where we show our DFS-based methodologies can recover the logical router-level topology more accurately and with fewer probes than prior techniques. EGC Greedy Geographic Routing in Large-Scale Sensor Networks: A Minimum Network 5313 Decomposition Approach IEEE Final Year Projects 2012 |Student Projects | Networks Projects
  • 7. Elysium Technologies Private Limited Approved by ISO 9001:2008 and AICTE for SKP Training Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai http://www.elysiumtechnologies.com, info@elysiumtechnologies.com In geographic (or geometric) routing, messages are by default routed in a greedy manner: The current node always forwards a message to its neighbor node that is closest to the destination. Despite its simplicity and general efficiency, this strategy alone does not guarantee delivery due to the existence of local minima (or dead ends). Overcoming local minima requires nodes to maintain extra nonlocal state or to use auxiliary mechanisms. We study how to facilitate greedy forwarding by using a minimum amount of such nonlocal states in topologically complex networks. Specifically, we investigate the problem of decomposing a given network into a minimum number of greedily routable components (GRCs), where greedy routing is guaranteed to work. We approach it by considering an approximate version of the problem in a continuous domain, with a central concept called the greedily routable region (GRR). A full characterization of GRR is given concerning its geometric properties and routing capability. We then develop simple approximate algorithms for the problem. These results lead to a practical routing protocol that has a routing stretch below 7 in a continuous domain, and close to 1 in several realistic network settings. EGC Polynomial-Time Algorithms for Multi rate Any path Routing in Wireless Multihop 5314 Networks In this paper, we present a new routing paradigm that generalizes opportunistic routing for wireless multihop networks. In multirate anypath routing, each node uses both a set of next-hops and a selected transmission rate to reach a destination. Using this rate, a packet is broadcast to the nodes in the set, and one of them forwards the packet on to the destination. To date, there is no theory capable of jointly optimizing both the set of next-hops and the transmission rate used by each node. We solve this by introducing two polynomial-time routing algorithms and provide the proof of their optimality. The proposed algorithms have roughly the same running time as regular shortest-path algorithms and are therefore suitable for deployment in routing protocols. We conducted measurements in an 802.11b testbed network, and our trace-driven analysis shows that multirate anypath routing is on average 80% better than 11-Mbps anypath routing, with a factor of 6.4 improvements in the best case. If the rate is fixed at 1 Mbps instead, performance improves by a factor of 5.4 on average. EGC 5315 On Identifying Additive Link Metrics Using Linearly Independent Cycles and Paths Abstract— In this paper, we study the problem of identifying constant additive link metrics using linearly independent monitoring cycles and paths. A monitoring cycle starts and ends at the same monitoring station, while a monitoring path starts and ends at distinct monitoring stations. We show that three-edge connectivity is a necessary and sufficient condition to identify link metrics using one monitoring station and employing monitoring cycles. We develop a polynomial-time algorithm to compute the set of linearly independent cycles. For networks that are less than three-edge- connected, we show how the minimum number of monitors required and their placement may be computed. For networks with symmetric directed links, we show the relationship between the number of monitors employed, the number of directed links for which metric is known a priori, and the identifiability for the remaining links. To the best of our knowledge, this is the first work that derives the necessary and sufficient conditions on the network topology for IEEE Final Year Projects 2012 |Student Projects | Networks Projects
  • 8. Elysium Technologies Private Limited Approved by ISO 9001:2008 and AICTE for SKP Training Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai http://www.elysiumtechnologies.com, info@elysiumtechnologies.com identifying additive link metrics and develops a polynomial-time algorithm to compute linearly independent cycles and paths. EGC Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks 5316 In this paper, we study periodic query scheduling for data aggregation with minimum delay under various wireless interference models. Given a set Q of periodic aggregation queries, each query Qi ∈ Q has its own period pi and the subset of source nodes Si containing the data. We first propose a family of efficient and effective real-time scheduling protocols that can answer every job of each query task Qi ∈ Q within a relative delay O(pi) under resource constraints by addressing the following tightly coupled tasks: routing, transmission plan constructions, node activity scheduling, and packet scheduling. Based on our protocol design, we further propose schedulability test schemes to efficiently and effectively test whether, for a set of queries, each query job can be finished within a finite delay. Our theoretical analysis shows that our methods achieve at least a constant fraction of the maximum possible total utilization for query tasks, where the constant depends on wireless interference models. We also conduct extensive simulations to validate the proposed protocol and evaluate its practical performance. The simulations corroborate our theoretical analysis. EGC Power Control for Cognitive Radio Networks: Axioms, Algorithms, and Analysis 5317 The deployment of cognitive radio networks enables efficient spectrum sharing and opportunistic spectrum access. It also presents new challenges to the classical problem of interference management in wireless networks. This paper develops an axiomatic framework for power allocation in cognitive radio networks based on four goals: QoS protection to primary users, opportunism to secondary users, admissibility to secondary users, and autonomous operation by individual users. Two additional goals, licensing and versatility, which are desirable rather than essential, are also presented. A general class of Duo Priority Class Power Control (DPCPC) policies that satisfy such goals is introduced. Through theoretical analysis and simulation, it is shown that a specific interference-aware power-control algorithm reaches such goals. EGC 5318 Reliable Collective Communications With Weighted SRLGs in Optical Networks In this paper, we study the problem of reliable collective communication (broadcast or gossip) with the objective of maximizing the reliability of the collective communication. The need for collective communication arises in many problems of parallel and distributed computing, including Grid or cloud computing and database management. We describe the network model, formulate the reliable collective communication problem, prove that the maximum reliable collective communication problem is NP-hard, and provide an integer linear program (ILP) formulation for the problem. We then provide a greedy approximation algorithm to construct collective communication (through a spanning tree) that achieves an approximation ratio of 1 + ln(|V|+α|E|-1) , where α is the average number of shared link risk groups (SRLGs) along links, and |V| and |E| are the total number of vertices and edges of the network, respectively. Simulations IEEE Final Year Projects 2012 |Student Projects | Networks Projects
  • 9. Elysium Technologies Private Limited Approved by ISO 9001:2008 and AICTE for SKP Training Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai http://www.elysiumtechnologies.com, info@elysiumtechnologies.com demonstrate that our approximation algorithm achieves good performance in both small and large networks and that, in almost 95% of total cases, our algorithm outperforms the modified minimum spanning tree algorithms. EGC Router Support for Fine-Grained Latency Measurements 5319 An increasing number of datacenter network applications, including automated trading and high-performance computing, have stringent end-to-end latency requirements where even microsecond variations may be intolerable. The resulting fine-grained measurement demands cannot be met effectively by existing technologies, such as SNMP, NetFlow, or active probing. We propose instrumenting routers with a hash-based primitive that we call a Lossy Difference Aggregator (LDA) to measure latencies down to tens of microseconds even in the presence of packet loss. Because LDA does not modify or encapsulate the packet, it can be deployed incrementally without changes along the forwarding path. When compared to Poisson-spaced active probing with similar overheads, our LDA mechanism delivers orders of magnitude smaller relative error; active probing requires 50-60 times as much bandwidth to deliver similar levels of accuracy. Although ubiquitous deployment is ultimately desired, it may be hard to achieve in the shorter term; we discuss a partial deployment architecture called mPlane using LDAs for intrarouter measurements and localized segment measurements for interrouter measurements.. EGC 5320 Q-CSMA: Queue-Length-Based CSMA/CA Algorithms for Achieving Maximum Throughput and Low Delay in Wireless Recently, it has been shown that carrier-sense multiple access (CSMA)-type random access algorithms can achieve the maximum possible throughput in ad hoc wireless networks. However, these algorithms assume an idealized continuous- time CSMA protocol where collisions can never occur. In addition, simulation results indicate that the delay performance of these algorithms can be quite bad. On the other hand, although some simple heuristics (such as greedy maximal scheduling) can yield much better delay performance for a large set of arrival rates, in general they may only achieve a fraction of the capacity region. In this paper, we propose a discrete-time version of the CSMA algorithm. Central to our results is a discrete-time distributed randomized algorithm that is based on a generalization of the so-called Glauber dynamics from statistical physics, where multiple links are allowed to update their states in a single timeslot. The algorithm generates collision-free transmission schedules while explicitly taking collisions into account during the control phase of the protocol, thus relaxing the perfect CSMA assumption. More importantly, the algorithm allows us to incorporate heuristics that lead to very good delay performance while retaining the throughput-optimality property. EGC Scalable Lookahead Regular Expression Detection System for Deep Packet Inspection 5321 IEEE Final Year Projects 2012 |Student Projects | Networks Projects
  • 10. Elysium Technologies Private Limited Approved by ISO 9001:2008 and AICTE for SKP Training Singapore | Madurai | Trichy | Coimbatore | Cochin | Kollam | Chennai http://www.elysiumtechnologies.com, info@elysiumtechnologies.com Regular expressions (RegExes) are widely used, yet their inherent complexity often limits the total number of RegExes that can be detected using a single chip for a reasonable throughput. This limit on the number of RegExes impairs the scalability of today's RegEx detection systems. The scalability of existing schemes is generally limited by the traditional detection paradigm based on per-character-state processing and state transition detection. The main focus of existing schemes is on optimizing the number of states and the required transitions, but not on optimizing the suboptimal character-based detection method. Furthermore, the potential benefits of allowing out-of-sequence detection, instead of detecting components of a RegEx in the order of appearance, have not been explored. Lastly, the existing schemes do not provide ways to adapt to the evolving RegExes. In this paper, we propose Lookahead Finite Automata (LaFA) to perform scalable RegEx detection. LaFA requires less memory due to these three contributions: 1) providing specialized and optimized detection modules to increase resource utilization; 2) systematically reordering the RegEx detection sequence to reduce the number of concurrent operations; 3) sharing states among automata for different RegExes to reduce resource requirements. Here, we demonstrate that LaFA requires an order of magnitude less memory compared to today's state-of-the-art RegEx detection systems. Using LaFA, a single-commodity field programmable gate array (FPGA) chip can accommodate up to 25  000 (25 k) RegExes. Based on the throughput of our LaFA prototype on FPGA, we estimate that a 34-Gb/s throughput can be achieved. EGC Spatio-Temporal Compressive Sensing and Internet Traffic Matrices (Extended 5322 Version) Denial-of-service (DoS) attacks are considered within the province of a shared channel model in which attack rates may be large but are bounded and client request rates vary within fixed bounds. In this setting, it is shown that clients can adapt effectively to an attack by increasing their request rate based on timeout windows to estimate attack rates. The server will be able to process client requests with high probability while pruning out most of the attack by selective random sampling. The protocol introduced here, called Adaptive Selective Verification (ASV), is shown to use bandwidth efficiently and does not require any server state or assumptions about network congestion. The main results of the paper are a formulation of optimal performance and a proof that ASV is optimal. IEEE Final Year Projects 2012 |Student Projects | Networks Projects