Construct the routing tables at each of the nodes

Assignment Help Computer Network Security
Reference no: EM131146508

Part -1:

Question 1. We have discussed Dijkstra's algorithm in class for computing the shortest paths from any source node to all other nodes in a network. The first step is to codify the network information, i.e., how do we represent the link costs? One way is to use a matrix representation. If the link costs have been expressed as a matrix C, then the (i, j)th element of the matrix gives the cost of the link between i and j (obviously, if i = j, Cif = 0, for all i). For example, the cost matrix for the network shown in Fig. 1 is (first row/column is for node A, second row/column is for node B, etc.):

525_matrix.jpg

You can assume that the user would not make any error in entering the link cost matrix (i.e., the matrix would be symmetric, non-negative, and al elements along the leading diagonal will be 0). That is, your code does not need to check for potential errors in the link cost matrix.

Write a function computeDijkstra(sourceID,C)' which takes as inputs the source node ID and the link cost matrix and returns the final best cost vector and the final predecessor vector.

For example, referring to slide-38 of Chapter-5 notes, your out¬put arguments should be [0,2,3,1,2,4] and [A, A, E, A, D, El or [1,1,5,1,4,5] if you label each node by a numeric, i.e., [A, B, C, D, E] -4 [1,2,3,4,5].

The pseudocode is available on slide-36 of Chapter-5 notes.

If you cannot implement the predecessor vector, just try to return the final cost vector. You can earn up to 50 points if you do so correctly.

You cannot use built in functions which directly compute the shortest path tree or implement Dijkstra's algorithm.

Here's a MATLAB tip. Suppose x = [2, 3, 1, 4, 5]. Executing (a,b) = min(x) returns a=1 and b=3. The parameter b therefore returns the position in x where the minimum is found.

283_Graph.jpg

Figure 1: Network for Problem 1.

NOTE: You should email me your codes with instructions on how to rim than.

Part -2:

Question 1. Consider the 6-node network shown in Fig. 1. The numbers shown next to the edges (links) represent the link costs. Using Dijkstra's algorithm, find out the minimum cost paths from node. A to all other nodes in the network. In your homework, you should include a table similar to the one shown on slide 38 of Chapter-5 notes (make sure to show both the minimum cost vector p as well as the predecessor vector).

1800_Fig.jpg

Question 2. In some cases, link costs reflect reliabilities. In this case, the definition of a best cost path changes. For example, the reliability of the path A -+ B -> C is defined as: r(ABC) = r(A13) x r(BC), i.e., the reliability of a path is the product of the reliabilities of the hops constituting the path. In addition, the reliability measure of a link is a number between 0 (actually, a very very small number, say, 10 'Du) and 1. If the reliability of a link is 0.8, you can interpret that as `the probability that the link will fail is 0.2'. In contrast, if the link costs were to be viewed as dollar costs (or even delays in seconds), you would add up the costs of the hops constituting a path to obtain the cost of that path.

When link costs are modeled as reliabilities, a certain mathematical transformation allows you to convert products of individual reliahilities to sums of transformed reli-abilities. What is that transformation? After the transformation, what is the nature of all link costs (maximum and minimum limits)? In Dijkstra's algorithm, we seek to find paths which minimize the sum of link costs. Noting that finding the minimum of -x (where x is an arbitrary variable) is equivalent to finding the maximum of x, explain how you could adapt Dijkstra'a algorithm when link costs reflect reliabilities. After you have thought it out, find the most reliable paths from node A to all other nodes for the network shown in Figure 2.

Even though you are not being asked to do anything about this, it is worth¬while to note that there's an alternate definition of the reliability of a path. Just as a chain is only as strong as its weakest link, the reliability of a path is sometimes also defined as the minimum of the reliabilities of the hops constituting a path. Under this definition, if the reliability of the link (A, B) is 0.8 and the reliability of the link (13,C) is 0.2, then the reliability of the path (A 44 B 44 C) is the minimum of 0.8 and 0.2, or, 0.2. By the definition of the first paragraph, however, the reliability of the path (A H B <4 C) is 0.8 x 0.2 = 0.16.

2486_Fig1.jpg

Question 3. The network shown in Figure 3 is in operation. Distance vector protocol is used for routing.

(a) Construct the routing tables at each of the five nodes.

(b) Subsequently, the cost of the link (A, D) changes to 5. Node D is the first to detect this and updates its routing table. It then sends out an advertisement to nodes A, C and E. In response, nodes A, C and E update their own routing tables and inform their neighbors (i.e., node A sends to B and D; node C sends to B, D and B; and node E sends to C and D). This process continues until routes/costs have stabilized. If you think this through, you will see that node A's first two routing table updates are in response to: (i) an update from D, and then, (ii) an update from B.

Construct the routing tables at A after each of these two steps. In order to answer this, you might have to construct the routing tables at other nodes.

844_fig2.jpg

Reference no: EM131146508

Questions Cloud

Determine the payback period for the new machine : Problem A Hamlet Company is considering the purchase of a new machine that would cost USD 300,000 and would have an estimated useful life of 10 years with no salvage value. The new machine is expected to have annual before-tax cash inflows of USD 100..
Find the what is wrong with the executive statement : If our earnings go down, our stockholders are hurt because stock prices will fall, and our managers will be hurt because their bonuses are tied to earnings." What is wrong with the executive's statement?
Define two of the regulatory bodies the pol falls under : List four forms of basic recommended personal protective equipment (PPE) that can be used when collecting specimens from patients. Why is proper hand washing an important consideration when working in the laboratory and with patients?
Using creativity and innovation as leadership strategy : Many successful organizations are using creativity and innovation as a leadership strategy to differentiate their organization and position them for success. Select a recent article from current events (past 90 days) that highlights an organization t..
Construct the routing tables at each of the nodes : Construct the routing tables at each of the five nodes - Write a function computeDijkstra(sourceID,C)' which takes as inputs the source node ID and the link cost matrix and returns the final best cost vector and the final predecessor vector.
Determine the equilibrium position and the frequency : The schematic diagram of a centrifugal governor is shown in Fig. 2.70. The length of each rod is l, the mass of each ball is m, and the free length of the spring is h. If the shaft speed is ω determine the equilibrium position and the frequency fo..
How quality customer service can impact organization culture : This question provides you with an opportunity to analyze the advantages of an organization that offers quality customer service. First, describe what it means to you to provide quality customer service for both internal customers and also externa..
Why does your selected managers organisation exist : Why does your selected manager's organisation exist? Who are the customers it serves, and what products/services does it provide them with? Based on what you have learned from interviews, observation, and any other research that you have carried out ..
What was the corporations net sales : What was the corporation's net sales, cost of goods sold, and gross profit?- What was the corporate tax rate?- What was the corporation's net interest expense?

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Incremental evaluation of a system

TCB subsets are said to leverage purely hierarchical domains ordered by privilege and explain the relation between these domains and protection rings.

  Find information about threats and malware active today

From the first e-Activity, analyze the selected two (2) resources that are available for security professionals to find information about threats and / or malware active today

  Determine the category of computer crimes

Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Provide a rationale to support your response.

  What are the key backup considerations in the scenario

Over the years, the networks and IT infrastructure at Altona Manufacturing have grown through individual projects. What are the key backup considerations in the scenario?

  Major information security threats

Assignment: Write a 3-to 4-page paper on at least three major information security threats that a specific organization you choose faces today

  How a company-wide policy program could help the situation

Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.

  Write a research paper about hids or antivirus systems

Write a Research Paper about HIDS or Antivirus Systems. The focus of the reseach paper is Host Intrusion Detection Systems (HIDS) or AntiVirus Systems.

  Arbitrary number system with the independent

Consider an arbitrary number system with the independent digits as 0, 1 and X. What is the radix of this number system? List the first 10 numbers in this number system.

  What happens to spaces and punctuation in a caesar cipher

What kind of attack does the use of a nonce prevent - what kind of key authority is used to prevent the man-in-the-middle attack when using public key encryption?

  Security of information in government organisations

Complete a research essay about information security. The research provides you with the opportunity to complete research and demonstrate knowledge of information security from a theoretical perspective

  Explain cross site scripting attack

Explain Cross Site Scripting attack

  Improving the security of the current network

The plan includes improving the security of the current network and establishing a secure environment for data exchange between the headquarters (Brisbane) and other offices.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd