Construct the routing tables at each of the nodes

Assignment Help Computer Network Security
Reference no: EM131146508

Part -1:

Question 1. We have discussed Dijkstra's algorithm in class for computing the shortest paths from any source node to all other nodes in a network. The first step is to codify the network information, i.e., how do we represent the link costs? One way is to use a matrix representation. If the link costs have been expressed as a matrix C, then the (i, j)th element of the matrix gives the cost of the link between i and j (obviously, if i = j, Cif = 0, for all i). For example, the cost matrix for the network shown in Fig. 1 is (first row/column is for node A, second row/column is for node B, etc.):

525_matrix.jpg

You can assume that the user would not make any error in entering the link cost matrix (i.e., the matrix would be symmetric, non-negative, and al elements along the leading diagonal will be 0). That is, your code does not need to check for potential errors in the link cost matrix.

Write a function computeDijkstra(sourceID,C)' which takes as inputs the source node ID and the link cost matrix and returns the final best cost vector and the final predecessor vector.

For example, referring to slide-38 of Chapter-5 notes, your out¬put arguments should be [0,2,3,1,2,4] and [A, A, E, A, D, El or [1,1,5,1,4,5] if you label each node by a numeric, i.e., [A, B, C, D, E] -4 [1,2,3,4,5].

The pseudocode is available on slide-36 of Chapter-5 notes.

If you cannot implement the predecessor vector, just try to return the final cost vector. You can earn up to 50 points if you do so correctly.

You cannot use built in functions which directly compute the shortest path tree or implement Dijkstra's algorithm.

Here's a MATLAB tip. Suppose x = [2, 3, 1, 4, 5]. Executing (a,b) = min(x) returns a=1 and b=3. The parameter b therefore returns the position in x where the minimum is found.

283_Graph.jpg

Figure 1: Network for Problem 1.

NOTE: You should email me your codes with instructions on how to rim than.

Part -2:

Question 1. Consider the 6-node network shown in Fig. 1. The numbers shown next to the edges (links) represent the link costs. Using Dijkstra's algorithm, find out the minimum cost paths from node. A to all other nodes in the network. In your homework, you should include a table similar to the one shown on slide 38 of Chapter-5 notes (make sure to show both the minimum cost vector p as well as the predecessor vector).

1800_Fig.jpg

Question 2. In some cases, link costs reflect reliabilities. In this case, the definition of a best cost path changes. For example, the reliability of the path A -+ B -> C is defined as: r(ABC) = r(A13) x r(BC), i.e., the reliability of a path is the product of the reliabilities of the hops constituting the path. In addition, the reliability measure of a link is a number between 0 (actually, a very very small number, say, 10 'Du) and 1. If the reliability of a link is 0.8, you can interpret that as `the probability that the link will fail is 0.2'. In contrast, if the link costs were to be viewed as dollar costs (or even delays in seconds), you would add up the costs of the hops constituting a path to obtain the cost of that path.

When link costs are modeled as reliabilities, a certain mathematical transformation allows you to convert products of individual reliahilities to sums of transformed reli-abilities. What is that transformation? After the transformation, what is the nature of all link costs (maximum and minimum limits)? In Dijkstra's algorithm, we seek to find paths which minimize the sum of link costs. Noting that finding the minimum of -x (where x is an arbitrary variable) is equivalent to finding the maximum of x, explain how you could adapt Dijkstra'a algorithm when link costs reflect reliabilities. After you have thought it out, find the most reliable paths from node A to all other nodes for the network shown in Figure 2.

Even though you are not being asked to do anything about this, it is worth¬while to note that there's an alternate definition of the reliability of a path. Just as a chain is only as strong as its weakest link, the reliability of a path is sometimes also defined as the minimum of the reliabilities of the hops constituting a path. Under this definition, if the reliability of the link (A, B) is 0.8 and the reliability of the link (13,C) is 0.2, then the reliability of the path (A 44 B 44 C) is the minimum of 0.8 and 0.2, or, 0.2. By the definition of the first paragraph, however, the reliability of the path (A H B <4 C) is 0.8 x 0.2 = 0.16.

2486_Fig1.jpg

Question 3. The network shown in Figure 3 is in operation. Distance vector protocol is used for routing.

(a) Construct the routing tables at each of the five nodes.

(b) Subsequently, the cost of the link (A, D) changes to 5. Node D is the first to detect this and updates its routing table. It then sends out an advertisement to nodes A, C and E. In response, nodes A, C and E update their own routing tables and inform their neighbors (i.e., node A sends to B and D; node C sends to B, D and B; and node E sends to C and D). This process continues until routes/costs have stabilized. If you think this through, you will see that node A's first two routing table updates are in response to: (i) an update from D, and then, (ii) an update from B.

Construct the routing tables at A after each of these two steps. In order to answer this, you might have to construct the routing tables at other nodes.

844_fig2.jpg

Reference no: EM131146508

Questions Cloud

Determine the payback period for the new machine : Problem A Hamlet Company is considering the purchase of a new machine that would cost USD 300,000 and would have an estimated useful life of 10 years with no salvage value. The new machine is expected to have annual before-tax cash inflows of USD 100..
Find the what is wrong with the executive statement : If our earnings go down, our stockholders are hurt because stock prices will fall, and our managers will be hurt because their bonuses are tied to earnings." What is wrong with the executive's statement?
Define two of the regulatory bodies the pol falls under : List four forms of basic recommended personal protective equipment (PPE) that can be used when collecting specimens from patients. Why is proper hand washing an important consideration when working in the laboratory and with patients?
Using creativity and innovation as leadership strategy : Many successful organizations are using creativity and innovation as a leadership strategy to differentiate their organization and position them for success. Select a recent article from current events (past 90 days) that highlights an organization t..
Construct the routing tables at each of the nodes : Construct the routing tables at each of the five nodes - Write a function computeDijkstra(sourceID,C)' which takes as inputs the source node ID and the link cost matrix and returns the final best cost vector and the final predecessor vector.
Determine the equilibrium position and the frequency : The schematic diagram of a centrifugal governor is shown in Fig. 2.70. The length of each rod is l, the mass of each ball is m, and the free length of the spring is h. If the shaft speed is ω determine the equilibrium position and the frequency fo..
How quality customer service can impact organization culture : This question provides you with an opportunity to analyze the advantages of an organization that offers quality customer service. First, describe what it means to you to provide quality customer service for both internal customers and also externa..
Why does your selected managers organisation exist : Why does your selected manager's organisation exist? Who are the customers it serves, and what products/services does it provide them with? Based on what you have learned from interviews, observation, and any other research that you have carried out ..
What was the corporations net sales : What was the corporation's net sales, cost of goods sold, and gross profit?- What was the corporate tax rate?- What was the corporation's net interest expense?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Problem regarding the machine probability

The probability that two machines is related by , A to work is 0.7 and the probability that B works if A is working is 0.8 , and 0.35 if A fails work find that machine probability B does not work.

  Explain advantages about solution of type of key

At ABC Institute, researchers are unsure about type of key (Asymmetric or Symmetric) to be used. Formulate possible solution and explain advantages and disadvantages of any solution employed.

  What is the main difference between a virus and a trojan

What is the main difference between a virus and a Trojan? A virus or malware can impact which of the three tenets of information systems security (confidentiality, integrity, or availability)? In what way?

  Define the cybercrime paper

The papers should be comprised of a INTRODUCTION, REVIEW OF LITERATURE, DISCUSSION, CONCLUSIONS, and REFERENCES.

  How would you divide up your network to satisfy requirements

You are an ISP that has been assigned a class B network with the address 145.34.0.0. You know you will service 200 to 250 small companies.

  Create a three page policy for business continuity

Create a three page policy for business continuity for the White House security staff. Prepare a plan based on the critical nature of information that is presented within the executive department and military strategies that are reviewed for actio..

  What encryption mechanism is used in the cquroam

What wireless security type does CQUniversity implement to enable roaming? Explain how this wireless security type work and what encryption mechanism is used in the CQURoam?  Explain  how this mechanism works

  What password protection measures taken system administrator

What password protection measures are normally implemented by system administrators, operating systems, and security services? Describe the pros and cons of enabling audits of resource accesse

  Determine the suitability of certification

Determine the suitability of certification. Justify by using threat identification and provide risk assessment for this organisation.

  Discuss primary challenges related to maintaining security

Distributed applications and cloud computing have become a viable option within the LAN-to-WAN Domain. Discuss the primary challenges related to maintaining the security of both applications and data in such an environment

  Use the diffie-hellman public-key algorithm

You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman public-key algorithm to exchange secret keys. You and Bob have agreed to use the public base g = 19 and public modulus p = 739.

  Using the diffie-hellman key agreement protocol find the

1 using the diffie-hellman key agreement protocol find the common key that can be used by two parties with keys k1 7

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd