Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows
#1

Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows

Abstract:


We study multicast in a noncooperative environment where information flows selfishly route themselves through the cheapest paths available. The main challenge is to enforce such selfish multicast flows to stabilize at a socially optimal operating point incurring minimum total edge cost, through appropriate cost allocation and other economic measures, with replicable and encodable properties of information flows considered. We show that known cost allocation schemes are not sufficient. We relate the taxes toVCGpayment schemes and discuss an efficient primal-dual algorithm that simultaneously computes the taxes, the cost allocation, and the optimal multicast flow, with potential of fully distributed implementations.




Algorithm / Technique used:

An Efficient Primal-Dual Algorithm.




Algorithm Description:

We formulate the min-cost multicast problem into a pair of primal and dual linear programs, based on the aforementioned multicast feasibility result with network coding due to Ahlswede et al. and propose to allocate edge costs based on the shadow prices of flow merging constraints. We show that a Nash Equilibrium exists and that any optimal multicast flow has a corresponding cost allocation which makes it a Nash flow. The flow-cost pair at Nash Equilibrium also achieves a balanced budget, i.e., the total charges to flows exactly equal the total cost incurred at edges across the network.


Existing System:

Conventionally, most network protocols assume that the network entities that participate in the network activities will always behave as instructed. However, in practice, most network entities will try to maximize their own benefits instead of altruistically contribute to the network by following the prescribed protocols, which is known as selfish. Thus, new protocols should be designed for the non-cooperative network, which is composed of selfish entities. In this paper, we specifically show how to design strategy proof multicast protocols for non-cooperative networks such that these selfish entities will follow the protocols out of their own interests. By assuming that a group of receivers is willing to pay to receive the multicast service, we specifically give a general framework to decide whether it is possible, and how if possible to transform an existing multicast protocol to a strategy proof multicast protocol. We then show how the payments to those relay entities are shared fairly among all receivers so that it encourages collaboration among receivers. As a running example, we show how to design the strategy proof multicast protocol for the currently used core-based multicast structure.

Proposed System:


We provide a shadow-price-based cost allocation for networks without capacity limits and show that it enforces minimum-cost multicast. This improves previous result where a 2-approximate multicast flow is enforced. For capacitated networks, computing cost allocation by ignoring edge capacities will not yield correct results. We show that an edge tax scheme can be combined with a cost allocation to strictly enforce optimal multicast flows in this more realistic case. If taxes are not desirable, they can be returned to flows while maintaining weak enforcement of the optimal flow.


Hardware Requirements:

¢ System : Pentium IV 2.4 GHz.
¢ Hard Disk : 40 GB.
¢ Floppy Drive : 1.44 Mb.
¢ Monitor : 15 VGA Colour.
¢ Mouse : Logitech.
¢ Ram : 256 Mb.


Software Requirements:


¢ Operating system : - Windows XP Professional.
¢ Coding Language : - Java.
¢ Tool Used : - Eclipse.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: selfish node detection instruments, tapestry against polygamy, call flows in gsm ppt, academics against athletics, a policy enforcing mechanism for ad hoc networks, against, a policy enforcing mechanism for trusted adhoc networks,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Enforcing Minimum-Cost Multicast Routing against Selfish Information Flows - by computer science topics - 02-07-2010, 06:26 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Opportunistic Routing in Multi-radio Multi-channel Multi-hop Wireless Networks seminar class 4 3,599 17-10-2017, 02:48 PM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 816 15-02-2017, 11:01 AM
Last Post: jaseela123d
  Protecting Location Privacy in Sensor Networks Against a Global Eavesdropper 1 786 15-02-2017, 11:00 AM
Last Post: jaseela123d
  A New Cell-Counting-Based Attack against Tor 1 744 14-02-2017, 11:26 AM
Last Post: ijasti
  STUDENT INFORMATION SYSTEM IN JAVA project topics 14 10,648 19-08-2015, 11:28 PM
Last Post: Guest
  An Acknowledgement-Based Approach for the Detection of routing misbehavior in MANETs mechanical engineering crazy 2 2,991 26-05-2015, 03:04 PM
Last Post: seminar report asees
  INTELLECTUAL INFORMATION SYSTEM USING GPS+GSM smart paper boy 3 2,019 10-04-2015, 09:52 AM
Last Post: seminar report asees
  An Acknowledgment-Based Approach For The Detection Of Routing Misbehavior In MANETs electronics seminars 7 4,741 27-01-2015, 12:09 AM
Last Post: Guest
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 3,594 10-01-2015, 11:13 PM
Last Post: Guest
  ENQUIRY INFORMATION ON INSTITUTE full report seminar topics 1 2,230 10-11-2014, 09:15 PM
Last Post: Guest

Forum Jump: