Application of Rough Set for Routing Selection Based on OSPF Protocol

Size: px
Start display at page:

Download "Application of Rough Set for Routing Selection Based on OSPF Protocol"

Transcription

1 Application of Rough Set for Routing Selection Based on OSPF Protocol Yanbing Liu 1,2, Hong Tang 1, Menghao Wang 1, and Shixin Sun 2 1 Chongqing University of Posts and Telecommunications, Chongqing , P.R. China 2 School of Computer Science, UEST of China, Chengdu , P.R. China liuyb@cqupt.edu.cn Abstract. Attribute reduction is one of the most important issues and the focus of the research on efficient algorithms in rough sets. This paper focus on the routing selection algorithms and application used to compute QoS routes in OSPF protocol that are based on the rough set, which the attribute-value system about the link of network is created from the network topology. The use of rough set method can simplify enormous irregular link QoS attribute and classify the link with the link-status attribute. A illustrative example is employed to show the feasibility and effectiveness that the most excellent routing attribute set is obtained by rough set theory. 1 Introduction IP routing protocols have long been an essential element of IP networks for many years. Recently, this technology has been the focus of new development, as routing has evolved to handle the needs of next generation networks. Traditional IP routing protocols have therefore been substantiallyextendedinanumberof areas. Data Connection provides a full range of high-function portable Unicast IP Routing software products, including BGP, OSPF and RIP for both IPv4 and IPv6 networks. With the development of network and application, the routing needs to satisfy the QoS (Quality of Service) demand. However, because the complication of many solving schemes to QoS Routing is NPC (nondeterministic polynomial time completeness), the node can t maintain the network information timely with the continual change of network state [1][2]. In order to adapt new demand on computer network, it is imperative to apply new feasible and efficient routing scheme to meet increasing demand on network. The theory of rough sets has recently emerged as another major mathematical approach for managing uncertainty that arises from inexact, noisy, or incomplete information. Rough sets can be used for feature reduction, where attributes that do not contribute towards the classification of the given training data can be identified and removed and relevance analysis, where the contribution or significance of each attributes is assessed with respect to the classification task. The problem of finding the minimal subsets (reductions) of attributes that can describe all D. Śl ezak et al. (Eds.): RSFDGrC 2005, LNAI 3642, pp , c Springer-Verlag Berlin Heidelberg 2005

2 Application of Rough Set for Routing Selection Based on OSPF Protocol 655 of the concepts in the given data set is NP-hard. However algorithms to reduce the computation intensity have been proposed. In one method, for example, a discernibility matrix is used to store the differences between attribute values for each pair of data samples. Rather than searching on the entire data set, the matrix is instead searched to detect redundant attributes. The work presented in this paper is to decide the link-rank by a series of the link-state attributes. The application of the rough set theory can solve this problem successfully. Usually, the link is classified by many QoS parameters such as link propagation delay, link available bandwidth, link jitter, possibility of connection and hop-counts et al. Then OSPF can select the best path with the link rank. The instance presented in this paper indicates that the reduction algorithm based on rough set offers an attractive approach to solve the feature subnet selection problem in routing-reduction table. The remaining of this paper is organized as follows. Section 2 describes the related knowledge about OSPF. Application of rough set theory and the algorithm to select the best path are presented in Section 3. Section 4 shows a case to verify the algorithm. A conclusion is drawn in Section 5. 2 Related Knowledge 2.1 OSPF OSPF (Open Shortest Path First) is a link-state routing protocol, which means that the routers exchange topology information with their nearest neighbors. The topology information is flooded throughout the AS, so that every router within the AS has a complete picture of the topology of the AS. This picture is then used to calculate end-to-end paths through the AS, normally using a variant of the Dijkstra algorithm. Therefore, in a link-state routing protocol, the next hop address to which data is forwarded is determined by choosing the best end-to-end path to the eventual destination. OSPF bases its path descriptions on link states that take into account additional network information. OSPF also lets the user assign cost metrics to a given host router so that some paths are given preference. OSPF supports a variable network subnet mask so that a network can be subdivided. The main advantage of a link state routing protocol is that the complete knowledge of topology allows routers to calculate routes that satisfy particular criteria. 2.2 OSPF Routing Algorithm OSPF uses a link-state algorithm in order to build and calculate the shortest path to all known destinations. The algorithm by itself is quite complicated. The following is a very high level, simplified way of looking at the various steps of the algorithm[11]: 1. Upon initialization or due to any change in routing information, a router will generate a link-state advertisement. This advertisement will represent the collection of all link-states on that router.

3 656 Y. Liu et al. 2. All routers will exchange link-states by means of flooding. Each router that receives a link-state update should store a copy in its link-state database and then propagate the update to other routers. 3. After the database of each router is completed, the router will calculate a Shortest Path Tree to all destinations. The router uses the Dijkstra algorithm to calculate the shortest path tree. The destinations, the associated cost and the next hop to reach those destinations will form the IP routing table. 4. In case no changes in the OSPF network occur, such as cost of a link or a network being added or deleted, OSPF should be very quiet. Any changes that occur are communicated via link-state packets, and the Dijkstra algorithm is recalculated to find the shortest path. The OSPF routing algorithm is based on Dijkstra shortest path algorithm. The term Shortest pat is inaccurate because what we really want to find is the Optimum path. To find the optimum path in a network means to find a path with a minimal cost, considering factors like time, money and quality of the received data. The route is not chosen only by the cost, because in every network many constraint-attributes must be considered[11]: - Cost-based routing metrics. - Possibility of connection: Usually in traditional network, the possibility of link connection is high and this metric can be ignored. But in wireless network, it is a very important metric. - Link available bandwidth: As mentioned earlier, we currently assume that most QoS requirements are derivable from bandwidth. We further assume that associated with each link is a maximal bandwidth value, e.g., the link physical bandwidth or some fraction thereof that has been set aside for QoS flows. - Link propagation delay: This quantity is meant to identify high latency links, e.g., satellite links, which may be unsuitable for real-time requests. - Link jitter: This quantity is used as a measure of the change of link delay. A path with a smaller jitter is more stable and typically preferable. - Failure probability: failure probability of a single edge, the number of edges on each path, and the number of all edges shared among paths. The main objective of QoS-based routing is to realize dynamic determination of feasible paths; QoS-based routing can determine a path, from among possibly many choices, that has a good chance of accommodating the QoS of the given flow. 2.3 Related Rough Set Theory Rough set theory is a mathematical approach to imprecision, vague and uncertainty in information analysis [3]. It can be applied to find reduction. An attribute-value system IS is a quadruple (U, C D, V, f), A = C D is the set

4 Application of Rough Set for Routing Selection Based on OSPF Protocol 657 of all attributions which are further classified into two disjoint subsets: the condition attributes C = {a i i =1,,m} and the decision attribution D = {d}, V = a A V a is a set of attribute values, where U = {x 1,x 2,,x n } denotes the set of all objects in the set of all objects in the dataset, V a is the domain of attribute a. a i (x j ) denotes the value of x j on the attribution a i. f : U A V is an information function, which appoints the attribute value of every object x in U. A discernibility matrix is a n n matrix in which the classes are diagonal. In the matrix, the (condition) attributes which can be used to discern between the classes in the corresponding row and column are inserted.the information system s discernibility matrix M(C D (i, j)) with entry C D (i, j) is defined as {a A a(x i ) a(x j )} if d(x i ) d(x j ), φ otherwise, where i, j =1,,n. ThecoreattributesetCore(A) can be defined as the set of all single element where C D (i, j) = 1 [4,5,6]. 3 Routing-Reduction Algorithm to Select the Best Path This paper makes the elucidation of the algorithm to classify link-rank to select the best path. 1) From the historical data of routing table and the QoS information about the links, the attribute-value system about the links can be built. 2) Then we can draw the matrix about the information system and can conclude the routing-reduction table [7,8,9,10]. Step 1: RT = φ, Core = φ; Step 2: for every b A, computing the equivalent class U/b; Step 3: construct discernibility matrix M(A) ={C D (i, j)} n n,where1< i, j < n. Step 4: Do loop, C D (i, j) M(A), if ( C D (i, j) == 1) then Core = Core {C D (i, j)}; Step 5: RT = Core; Step 6: Core, WesetC D (i, j) =φ when a C D (i, j). 3) The decision attribute with excellent routing attributes can be concluded from the routing-reduction table RT. 4) With the knowledge of OSPF, the best path can be obtained. The link state algorithm presented below is known as Dijkstra s algorithm. Initialization: N = set of nodes in the graph; U={source node} for all nodes v if v adjacent to U then D(v) = c(u, v) else D(v) = Infinity

5 658 Y. Liu et al. Loop find w not in N such that D(w) is a minimum add w to N for v adjacent to w and not in N update D(v): D(v) = min{ D(v), D(w)+c(w, v) } until all nodes in N. c(i, j) is the weight of the decision attributes of the link from node i to node j. D(v) is cost of the path from the source node to destination v that has currently (as the iteration of the algorithm) the least cost with the most excellent routing attribute. N is set of nodes whose least-cost path from the source is definitely known. With the help of rough set theory, the simplification of the routing-reduction table is to simplify the condition attributes in routing-reduction table, and after that the routing-reduction possesses the ability of the routing-reduction table before simplification, but possesses more important condition attributes. 4 A Case Analysis Let us take a routing topology of network, which has ten nodes. Figure 1 is a network topology used to illustrate the above arithmetic. The number on the link denotes the link-number (link No.). Routing is determined by the link s QoS attribution parameters, such as: bandwidth, propagation delay, connectionfailure possibility and bit error ratio and so on. All the values in the table 1 denote the w eight (measure) of the attributes that learn from historical records in router, which represents an equivalence class in routing table. Part of the routingattribute conditions in network can be defined as information table IS=(U, C {d},v,f), C = {a 1,a 2,a 3,a 4 } is a routing attribute set, in which a 1 represents the bandwidth of link: 1 denotes enough, 2 denotes available, 3 denotes nonenough. a 2 represents the propagation delay of link: 1 denotes low, 2 denotes normal, 3 denotes high. a 3 represents the failure probability of link: 1 denotes low, 2 denotes normal, 3 denotes under normal. a 4 represents the bit error ratio of the link: 1 denotes low, 2 denotes acceptable, 3 denotes insufferable. The decision attribution D = {d} = {G, N, B}: G denotes good, N denotes normal, B denotes bad (each of their weight is 1,2,3, respectively). The function of the information f can expressed by the table 1. Fig. 1. The Network Topology

6 Application of Rough Set for Routing Selection Based on OSPF Protocol 659 Table 1. Information System Link No. a 1 a 2 a 3 a 4 d G(1) G(1) G(1) N(2) N(2) B(3) B(3) B(3) From Table 1, the discernibility matrix M(C D (i, j)) can be given as follow: φa 3 a 4 a 1 a 3 a 1 a 2 a 2 a 3 a 1 a 2 a 4 a 1 a 2 a 4 a 1 a 2 a 4 φ a 1 a 4 a 1 a 2 a 3 a 4 a 2 a 3 a 4 a 1 a 2 a 3 a 4 a 1 a 2 a 3 a 4 a 1 a 2 a 3 φ a 2 a 3 a 1 a 2 a 3 a 2 a 3 a 4 a 1 a 2 a 3 a 4 a 1 a 2 a 3 a 4 φ a 1 a 3 a 4 a 1 a 4 a 1 a 2 a 4 φ a 1 a 3 a 4 a 1 a 3 a 4 a 1 a 2 a 3 a 4 φ a 1 a 1 a 2 a 4 φ a 2 a 4 φ In the above matrix, C D (4, 6) =1, C D (6, 7) = 1, we can get Core(A) = {a 1,a 4 }. This means that a 1 and a 4 are the most important routing attributes. When C D (i, j) containsa 1 or a 4,thenwesetC D (i, j) =φ. A new simple matrix can be obtained: φφφφa 2 a 3 φφφ φφφ φ φφφ φφ φ φφφ φ φ φ φ φ φ φ φ φ φφφ φφ φ The reduced attribute set can be (a 1 a 2 a 4 ) (a 1 a 3 a 4 ). It means the reduction attributions can be a 1 a 2 a 4 or a 1 a 3 a 4.Wetakea 1 a 2 a 4 as an example. We find that, in the initial information table 1 there are four attributes besides the decision attribute. In general, the router record these attributes by historic data, so there are some attributes that are dispensable to Best Path. After removing the redundant attributes by rough set theory, we get the table 2. The simplification of routing- reduction attributes needn t to select all routing-reduction attributes in the condition of keeping the consistence of routing-reduction table. That is to say, attribute reduction techniques aim at finding minimal subsets of attributes, each of which has the same discriminating

7 660 Y. Liu et al. Table 2. Reduction Information System Link No. a 1 a 2 a 4 d G(1) G(1) G(1) N(2) N(2) B(3) B(3) B(3) Fig. 2. The Rank of Link power as the entire attributes. For compatible data table,the most excellent attribute set is selected by rough set theory.the links on the subnet shown Figure 1 are classified to three ranks. Based on the Dijkstra algorithm [11], we can find the best path from A to D in Figure 2 is A B C D according to the link-rank attributes. The routing path is the best on condition that bandwidth is enough and available, bit error ratio is acceptable. After some attributes of the link aren t selected, we investigate that if the condition attribute with same row can decide the same decision value as before. 5 Conclusion and Future Work In this paper, we have proposed a new alternate Best-path-finding algorithm for OSPF. The complication of traditional solving schemes to QoS Routing is NPC. In this paper, the link is classified to different ranks with rough set theory in terms of its QoS attributes, and OSPF based on QoS routing can be realized. Rough set theory can deal with the links with complicated QoS attributes, and can rapidly classify them to different ranks. OSPF based on rough set theory can select a path with the QoS parameters and can offer the QoS-based service in the Internet. The application of rough set theory greatly simplifies the implication of the algorithm. For further work, executing time analysis, when the connectivity and the diameter of graphs change, should be considered. Moreover, future tests in a real network environment should also be performed.

8 Application of Rough Set for Routing Selection Based on OSPF Protocol 661 Acknowledgement The authors would like to thank Dr. Y.Y. Yao and Dr. J.T. Yao for their help when they were in Canada. They also wish to express sincere thanks to their current and past colleagues, especially Dr. Guoyin Wang and Dr. Yu Wu, for their help and discussions. The authors thank the referees for their useful suggestions. The work is supported by the National Natural Science Foundation of China under Grant No , the Natural Science Foundation of CSTC and CQUPT under Grant No. A and the Natural Science Foundation of CQMEC under Grant No. KJ References 1. Bruno, A. (ed.): CCIE # CCIE Routing and Switching Exam Certification Guide. Digit. Libr., 1 (2003) 2. Liu, H.S., Xu, M.W., Ke, X., Cui, Y.: Research on Internetwork Routing Protocol: a Survey. Science of Telecommunications, 19 (2003) Pawlak, Z.: Rough Sets-Theoretical Aspects of Reasoning about Data. Kluwer Academic Publishers, Dordrecht, Netherlands, Li, P., Hong, Z., Saeid, N.: The Application of Rough Set and Kohonen Network to Feature Selection for Object Extraction. Proceedings of the second International Conference on Machine Learning and Cybernetics. November (2003) Crawley, E., Nair, R., et al.: RFC 2386, IETF, August (1998) 6. Apostolopoulos, G., Williams, D., Kamat, S., Guerin, R., et al.: RFC 2676, IETF, August (1999) 7. Li, Y., Xiao, Z., Liu, F.S.: Classification of clients in client relationship management base on rough set theory, Proceedings of the second International Conference on Machine Learning and Cybernetics. November (2003) Wang, Z.L., Meng, W.B., Gu, X.J., et al.: The Research of the Police GIS Spatial Data Classification Technology Based on Rough Set. Proceedings of the 4th Congress on Intelligent Control and Automation. June (2002) Zhang, Y.: Rough Set and Genetic Algorithms in Path Planning of Robot. Proceeding of Second International Conference on Machine Learning and Cybernetics, Xi an, Nov. (2003) Wang, G.Y., Yu, H., Yang, D.C.: Decision table reduction based on information entropy (in Chinese), Chinese Journal computers, 2(7) (2002)

EFFICIENT ATTRIBUTE REDUCTION ALGORITHM

EFFICIENT ATTRIBUTE REDUCTION ALGORITHM EFFICIENT ATTRIBUTE REDUCTION ALGORITHM Zhongzhi Shi, Shaohui Liu, Zheng Zheng Institute Of Computing Technology,Chinese Academy of Sciences, Beijing, China Abstract: Key words: Efficiency of algorithms

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University

More information

Minimal Test Cost Feature Selection with Positive Region Constraint

Minimal Test Cost Feature Selection with Positive Region Constraint Minimal Test Cost Feature Selection with Positive Region Constraint Jiabin Liu 1,2,FanMin 2,, Shujiao Liao 2, and William Zhu 2 1 Department of Computer Science, Sichuan University for Nationalities, Kangding

More information

QoS Routing Extensions to OSPF

QoS Routing Extensions to OSPF QoS Routing Extensions to OSPF Jani Lakkakorpi jani.lakkakorpi@nokia.com Abstract This paper briefly describes the extensions suggested to the OSPF [1] protocol to support QoS routes. These extensions

More information

Classification with Diffuse or Incomplete Information

Classification with Diffuse or Incomplete Information Classification with Diffuse or Incomplete Information AMAURY CABALLERO, KANG YEN Florida International University Abstract. In many different fields like finance, business, pattern recognition, communication

More information

IJMT Volume 2, Issue 3 ISSN:

IJMT Volume 2, Issue 3 ISSN: QoS Routing Protocol Using GAs Ali.A.Sakr* Mai.R.Ibraheem** Abstract: Routing protocols in most networks use the length of paths or the minimum-hops can be achieved, as the routing metric and the QoS requirements.

More information

Simple Quality-of-Service Path First Protocol and Modeling Analysis*

Simple Quality-of-Service Path First Protocol and Modeling Analysis* Simple Quality-of-Service Path First Protocol and Modeling Analysis* Lin Shen, Mingwei Xu, Ke Xu, Yong Cui, Youjian Zhao Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

On Reduct Construction Algorithms

On Reduct Construction Algorithms 1 On Reduct Construction Algorithms Yiyu Yao 1, Yan Zhao 1 and Jue Wang 2 1 Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 {yyao, yanzhao}@cs.uregina.ca 2 Laboratory

More information

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

CSCD 330 Network Programming Spring 2018

CSCD 330 Network Programming Spring 2018 CSCD 330 Network Programming Spring 018 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 017 1 Network

More information

CSCD 330 Network Programming Spring 2017

CSCD 330 Network Programming Spring 2017 CSCD 330 Network Programming Spring 017 Lecture 16 Network Layer Routing Protocols Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-007

More information

A Finite State Mobile Agent Computation Model

A Finite State Mobile Agent Computation Model A Finite State Mobile Agent Computation Model Yong Liu, Congfu Xu, Zhaohui Wu, Weidong Chen, and Yunhe Pan College of Computer Science, Zhejiang University Hangzhou 310027, PR China Abstract In this paper,

More information

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1

Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing

More information

Course Routing Classification Properties Routing Protocols 1/39

Course Routing Classification Properties Routing Protocols 1/39 Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

Routing, Routing Algorithms & Protocols

Routing, Routing Algorithms & Protocols Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a

More information

Quality of Service Routing

Quality of Service Routing Quality of Service Routing KNOM Tutorial 2004, Jeju, Korea, Nov. 4-5, 2004. November 5, 2004 Kwang-Hui Lee Communication Systems Lab, Changwon National University khlee@changwon.ac.kr Contents Introduction

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Collaborative Rough Clustering

Collaborative Rough Clustering Collaborative Rough Clustering Sushmita Mitra, Haider Banka, and Witold Pedrycz Machine Intelligence Unit, Indian Statistical Institute, Kolkata, India {sushmita, hbanka r}@isical.ac.in Dept. of Electrical

More information

Performance Assessment of DMOEA-DD with CEC 2009 MOEA Competition Test Instances

Performance Assessment of DMOEA-DD with CEC 2009 MOEA Competition Test Instances Performance Assessment of DMOEA-DD with CEC 2009 MOEA Competition Test Instances Minzhong Liu, Xiufen Zou, Yu Chen, Zhijian Wu Abstract In this paper, the DMOEA-DD, which is an improvement of DMOEA[1,

More information

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) Computer Networking Intra-Domain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) IP Forwarding The Story So Far IP addresses are structured to reflect Internet structure IP

More information

A Feature Selection Method to Handle Imbalanced Data in Text Classification

A Feature Selection Method to Handle Imbalanced Data in Text Classification A Feature Selection Method to Handle Imbalanced Data in Text Classification Fengxiang Chang 1*, Jun Guo 1, Weiran Xu 1, Kejun Yao 2 1 School of Information and Communication Engineering Beijing University

More information

Chapter 3. Introduction to Dynamic Routing Protocols. CCNA2-1 Chapter 3

Chapter 3. Introduction to Dynamic Routing Protocols. CCNA2-1 Chapter 3 Chapter 3 Introduction to Dynamic Routing Protocols CCNA2-1 Chapter 3 Introduction to Dynamic Routing Protocols Introduction to Dynamic Routing Protocols CCNA2-2 Chapter 3 Perspective and Background Dynamic

More information

Reversing Ticket Based Probing Routing Protocol for MANET

Reversing Ticket Based Probing Routing Protocol for MANET Reversing Ticket Based Probing Routing Protocol for MANET TURGUT YUCEL and MIN SONG Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529 U.S.A. http://www.odu.edu/networking

More information

Interplay between routing, forwarding

Interplay between routing, forwarding Chapter 4: outline 4. introduction 4. virtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link state

More information

Module 8. Routing. Version 2 ECE, IIT Kharagpur

Module 8. Routing. Version 2 ECE, IIT Kharagpur Module 8 Routing Lesson 27 Routing II Objective To explain the concept of same popular routing protocols. 8.2.1 Routing Information Protocol (RIP) This protocol is used inside our autonomous system and

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set

A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set A Rough Set Approach for Generation and Validation of Rules for Missing Attribute Values of a Data Set Renu Vashist School of Computer Science and Engineering Shri Mata Vaishno Devi University, Katra,

More information

Optimal QoS Routing Based on Extended Simulated Annealing

Optimal QoS Routing Based on Extended Simulated Annealing Optimal QoS Routing Based on Extended Simulated Annealing Yong Cui, Ke Xu, Mingwei Xu, and Jianping Wu Department of Computer Science, Tsinghua University Beijing, P.R.China, 084 {cy,xuke,xmw}@csnet1.cs.tsinghua.edu.cn,

More information

Lecture on Computer Networks

Lecture on Computer Networks Lecture on Computer Networks Historical Development Copyright (c) 28 Dr. Thomas Haenselmann (Saarland University, Germany). Permission is granted to copy, distribute and/or modify this document under the

More information

Introduction to Dynamic Routing Protocols

Introduction to Dynamic Routing Protocols Introduction to Dynamic Routing Protocols 1 Objectives Describe the role of dynamic routing protocols and place these protocols in the context of modern network design. Identify several ways to classify

More information

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC Zhou Ling 1, 2, Ding Wei-xiong 2 and Zhu Yu-xi 2 1 Department of Information Science and Engineer, Central South University,

More information

cs/ee 143 Communication Networks

cs/ee 143 Communication Networks cs/ee 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also were

More information

Model the P2P Attack in Computer Networks

Model the P2P Attack in Computer Networks International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information

More information

CSE 473 Introduction to Computer Networks. Final Exam Review

CSE 473 Introduction to Computer Networks. Final Exam Review CSE 473 Introduction to Computer Networks Final Exam Review Roch Guérin 12/4/2014 1) The diagram at right shows a switched Ethernet LAN with two routers (labeled Q and R), seven switches and five hosts.

More information

Unicast Routing. Information About Layer 3 Unicast Routing CHAPTER

Unicast Routing. Information About Layer 3 Unicast Routing CHAPTER CHAPTER 1 This chapter introduces the underlying concepts for Layer 3 unicast routing protocols in Cisco 1000 Series Connected Grid Routers (hereafter referred to as the Cisco CG-OS router) and WAN backhaul

More information

Assisting Trustworthiness Based Web Services Selection Using the Fidelity of Websites *

Assisting Trustworthiness Based Web Services Selection Using the Fidelity of Websites * Assisting Trustworthiness Based Web Services Selection Using the Fidelity of Websites * Lijie Wang, Fei Liu, Ge Li **, Liang Gu, Liangjie Zhang, and Bing Xie Software Institute, School of Electronic Engineering

More information

A SOLUTION FOR REPLICA CONSISTENCY MAINTENANCE IN UNSTRUCTURED PEER-TO-PEER NETWORKS

A SOLUTION FOR REPLICA CONSISTENCY MAINTENANCE IN UNSTRUCTURED PEER-TO-PEER NETWORKS INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A SOLUTION FOR REPLICA CONSISTENCY MAINTENANCE IN UNSTRUCTURED PEER-TO-PEER NETWORKS Narjes Nikzad Khasmakhi 1, Shahram

More information

Classification with Diffuse or Incomplete Information

Classification with Diffuse or Incomplete Information Classification with Diffuse or Incomplete Information AMAURY CABALLERO, KANG YEN, YECHANG FANG Department of Electrical & Computer Engineering Florida International University 10555 W. Flagler Street,

More information

Efficient Rule Set Generation using K-Map & Rough Set Theory (RST)

Efficient Rule Set Generation using K-Map & Rough Set Theory (RST) International Journal of Engineering & Technology Innovations, Vol. 2 Issue 3, May 2015 www..com 6 Efficient Rule Set Generation using K-Map & Rough Set Theory (RST) Durgesh Srivastava 1, Shalini Batra

More information

Routing in a network

Routing in a network Routing in a network Focus is small to medium size networks, not yet the Internet Overview Then Distance vector algorithm (RIP) Link state algorithm (OSPF) Talk about routing more generally E.g., cost

More information

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Network Layer part II. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Network Layer part II Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it IP datagram format IP protocol version number header length (bytes) type of data max number remaining

More information

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering

More information

Rough Set Approaches to Rule Induction from Incomplete Data

Rough Set Approaches to Rule Induction from Incomplete Data Proceedings of the IPMU'2004, the 10th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems, Perugia, Italy, July 4 9, 2004, vol. 2, 923 930 Rough

More information

Routing Algorithms. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Routing Algorithms. Daniel Zappala. CS 460 Computer Networking Brigham Young University Routing Algorithms Daniel Zappala CS 460 Computer Networking Brigham Young University Routing 2/20 How does the Internet determine which path to use from the source to the destination? Challenges need

More information

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP Chapter 4: outline 4. introduction 4. irtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IP4 addressing ICMP IP6 4.5 routing algorithms link state

More information

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a

Research on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Research on Applications of Data Mining in Electronic Commerce Xiuping YANG 1, a 1 Computer Science Department,

More information

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm Last time Transitioning to IPv6 Tunneling Gateways Routing Graph abstraction Link-state routing Dijkstra's Algorithm Distance-vector routing Bellman-Ford Equation 10-1 This time Distance vector link cost

More information

Simulating a Finite State Mobile Agent System

Simulating a Finite State Mobile Agent System Simulating a Finite State Mobile Agent System Liu Yong, Xu Congfu, Chen Yanyu, and Pan Yunhe College of Computer Science, Zhejiang University, Hangzhou 310027, P.R. China Abstract. This paper analyzes

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Network Laer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4. Routing algorithms Link

More information

Routing in the Internet

Routing in the Internet Routing in the Internet Daniel Zappala CS 460 Computer Networking Brigham Young University Scaling Routing for the Internet 2/29 scale 200 million destinations - can t store all destinations or all prefixes

More information

For example, in the widest-shortest path heuristic [8], a path of maximum bandwidth needs to be constructed from a structure S that contains all short

For example, in the widest-shortest path heuristic [8], a path of maximum bandwidth needs to be constructed from a structure S that contains all short A Note on Practical Construction of Maximum Bandwidth Paths Navneet Malpani and Jianer Chen Λ Department of Computer Science Texas A&M University College Station, TX 77843-3112 Abstract Constructing maximum

More information

Investigation on the fisheye state algorithm in context with QoS routing. Author: Yi Zhou. Prof: Raimo Kantola Instructor: Dr.

Investigation on the fisheye state algorithm in context with QoS routing. Author: Yi Zhou. Prof: Raimo Kantola Instructor: Dr. Investigation on the fisheye state algorithm in context with QoS routing Author: Yi Zhou Prof: Raimo Kantola Instructor: Dr. Peng Zhang 1 Table of Contents 1. Overview of routing algorithms 2. Fisheye

More information

Routing Protocols. Technology Description BGP CHAPTER

Routing Protocols. Technology Description BGP CHAPTER CHAPTER 11 This chapter describes the level of support that Cisco ANA provides for routing protocols, as follows: Technology Description, page 11-1 Information Model Objects (IMOs), page 11-3 Vendor-Specific

More information

Using Decision Boundary to Analyze Classifiers

Using Decision Boundary to Analyze Classifiers Using Decision Boundary to Analyze Classifiers Zhiyong Yan Congfu Xu College of Computer Science, Zhejiang University, Hangzhou, China yanzhiyong@zju.edu.cn Abstract In this paper we propose to use decision

More information

Method and Algorithm for solving the Bicriterion Network Problem

Method and Algorithm for solving the Bicriterion Network Problem Proceedings of the 00 International Conference on Industrial Engineering and Operations Management Dhaka, Bangladesh, anuary 9 0, 00 Method and Algorithm for solving the Bicriterion Network Problem Hossain

More information

Why dynamic route? (1)

Why dynamic route? (1) Routing Why dynamic route? (1) Static route is ok only when Network is small There is a single connection point to other network No redundant route 2 Why dynamic route? (2) Dynamic Routing Routers update

More information

Routing. 4. Mar INF-3190: Switching and Routing

Routing. 4. Mar INF-3190: Switching and Routing Routing 4. Mar. 004 1 INF-3190: Switching and Routing Routing: Foundations! Task! To define the route of packets through the network! From the source! To the destination system! Routing algorithm! Defines

More information

Routing. Directly Connected IP Networks. Data link layer routing. ifconfig command

Routing. Directly Connected IP Networks. Data link layer routing. ifconfig command Routing Basic principles dr. C. P. J. Koymans Informatics Institute University of Amsterdam (version 1.1, 2010/02/19 12:21:58) Monday, February 22, 2010 Basic setup Directly connected Not directly connected

More information

CSc 450/550 Computer Networks Internet Routing

CSc 450/550 Computer Networks Internet Routing CSc 450/550 Computer Networks Internet Routing Jianping Pan Summer 2007 7/12/07 CSc 450/550 1 Review Internet Protocol (IP) IP header addressing class-based, classless, hierarchical, NAT routing algorithms

More information

Border Gateway Protocol

Border Gateway Protocol 39 CHAPTER Chapter Goals Understand the purpose of the. Explain BGP attributes and their use in route selection. Examine the BGP route selection process. Introduction The (BGP) is an interautonomous system

More information

Introduction to OSPF OSPF. Link State Routing. Link State. Fast Convergence. Low Bandwidth Utilisation

Introduction to OSPF OSPF. Link State Routing. Link State. Fast Convergence. Low Bandwidth Utilisation Introduction to OSPF ISP/IP Workshops OSPF Open Shortest Path First Link state or SPF technology Developed by OSPF working group of IETF (RFC 47) Designed for TCP/IP Internet environment Fast convergence

More information

Routing Protocols and

Routing Protocols and Introduction to Dynamic Routing Protocol Routing Protocols and Concepts Chapter 3 1 Objectives Describe the role of dynamic routing protocols and place these protocols in the context of modern network

More information

Open Shortest Path First (OSPF)

Open Shortest Path First (OSPF) CHAPTER 42 Open Shortest Path First (OSPF) Background Open Shortest Path First (OSPF) is a routing protocol developed for Internet Protocol (IP) networks by the interior gateway protocol (IGP) working

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

On Generalizing Rough Set Theory

On Generalizing Rough Set Theory On Generalizing Rough Set Theory Y.Y. Yao Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: yyao@cs.uregina.ca Abstract. This paper summarizes various formulations

More information

Intra-domain Routing

Intra-domain Routing Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm CS 640 1 Goal Build router forwarding tables in an internetwork using intra-domain routing protocols High level approach Distributed

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 RESEARCH ARTICLE OPEN ACCESS Investigating the Impact of Simulation Time on Convergence Activity & Duration of EIGRP, OSPF Routing Protocols under Link Failure and Link Recovery in WAN Using OPNET Modeler

More information

The Theoretical Framework of the Optimization of Public Transport Travel

The Theoretical Framework of the Optimization of Public Transport Travel The Theoretical Framework of the Optimization of Public Transport Travel Jolanta Koszelew # # Faculty of Computer Science, Bialystok Technical University, Wiejska A, - Bialystok, Poland jolka@ii.pb.bialystok.pl

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

EITF25 Internet Routing. Jens A Andersson

EITF25 Internet Routing. Jens A Andersson EITF25 Internet Routing Jens A Andersson Study Guide Kihl & Andersson: Ch 8, 9.3 9.4 Stallings: Ch 19.1 & 19.2 Forouzan 5th ed Ch 20.1 20.3, 21.1 21.2 Routing The Routing Concept Unicast Routing Multicast

More information

Influence of Link State Update Algorithms on the Cost of QoS Path Computations

Influence of Link State Update Algorithms on the Cost of QoS Path Computations Influence of Link State Update Algorithms on the of QoS Path Computations Gonzalo Camarillo Advanced Signalling Research Laboratory Ericsson, FIN-0220 Jorvas, Finland Gonzalo.Camarillo@ericsson.com Abstract

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapter 4 Network Layer CPSC 335 Data Communication Systems Readings: 4.4.3, 4.4.4, 4.5, 4.5.1 David Nguyen Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March

More information

Routing. Advanced Computer Networks: Routing 1

Routing. Advanced Computer Networks: Routing 1 Routing Advanced Computer Networks: Routing 1 Gateway To internet or wide area network Metropolitan Area Network (MAN) s s Organization Servers Backbone R S R R Departmental Server s R S R s S R s s s

More information

Computer Networks. Routing Algorithms

Computer Networks. Routing Algorithms Computer Networks Routing Algorithms Topics Routing Algorithms Shortest Path (Dijkstra Algorithm) Distance Vector Routing Count to infinity problem Solutions for count to infinity problem Link State Routing

More information

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A Scheme of Multi-path Adaptive Load Balancing in MANETs 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication

More information

Introduction to OSPF

Introduction to OSPF Introduction to OSPF 1 OSPF Open Shortest Path First Link state or SPF technology Developed by OSPF working group of IETF (RFC 1247) OSPFv2 standard described in RFC2328 Designed for: TCP/IP environment

More information

Routing Outline. EECS 122, Lecture 15

Routing Outline. EECS 122, Lecture 15 Fall & Walrand Lecture 5 Outline EECS, Lecture 5 Kevin Fall kfall@cs.berkeley.edu Jean Walrand wlr@eecs.berkeley.edu Definition/Key Questions Distance Vector Link State Comparison Variations EECS - Fall

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

A Comparative Study on broadcasting video quality by Routing Protocols in IPTV Network

A Comparative Study on broadcasting video quality by Routing Protocols in IPTV Network 112 A Comparative Study on broadcasting video quality by Routing Protocols in IPTV Network Mi-JinKim, Jong-Wook Jang Department of Computer Engineering Dong-Eui University, Busan, Korea Department of Computer

More information

Distance Vector Routing

Distance Vector Routing ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE Routing in General Distance Vector Routing Jean Yves Le Boudec Fall 22 Contents. Routing in General 2. Distance vector: theory. Distance vector: practice 4. Dynamic

More information

Routing Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001

Routing Algorithms McGraw-Hill The McGraw-Hill Companies, Inc., 2001 Routing Algorithms Main issue is how the routers that constitute the network layer of a network cooperate to find the best routes between all pairs of stations. Routing algorithm at a router decides which

More information

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

More information

CCNA 3 (v v6.0) Chapter 5 Exam Answers % Full

CCNA 3 (v v6.0) Chapter 5 Exam Answers % Full CCNA 3 (v5.0.3 + v6.0) Chapter 5 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-5-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 5 Exam Answers

More information

OSPF Demand Circuit Feature

OSPF Demand Circuit Feature OSPF Demand Circuit Feature Document ID: 5132 Contents Introduction Prerequisites Requirements Components Used Conventions How Is OSPF over Demand Circuit Different from a Normal Circuit? Suppressed Periodic

More information

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice Hierarchical Routing Our routing study thus far - idealization all routers identical network flat not true in practice scale: with 200 million destinations: can t store all destinations in routing tables!

More information

Real4Test. Real IT Certification Exam Study materials/braindumps

Real4Test.   Real IT Certification Exam Study materials/braindumps Real4Test http://www.real4test.com Real IT Certification Exam Study materials/braindumps Exam : 400-101 Title : CCIE Routing and Switching Written Exam v5.1 Vendor : Cisco Version : DEMO Get Latest & Valid

More information

Top-k Keyword Search Over Graphs Based On Backward Search

Top-k Keyword Search Over Graphs Based On Backward Search Top-k Keyword Search Over Graphs Based On Backward Search Jia-Hui Zeng, Jiu-Ming Huang, Shu-Qiang Yang 1College of Computer National University of Defense Technology, Changsha, China 2College of Computer

More information

Routing Algorithms : Fundamentals of Computer Networks Bill Nace

Routing Algorithms : Fundamentals of Computer Networks Bill Nace Routing Algorithms 4-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Recall from Last Time Routing Algorithm

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks OMP/ELE 49/6 Introduction to omputer Networks Intra-domain routing Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu

More information

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load Dynamic Routing Overview Forwarding vs Routing forwarding: to select an output port based on destination address and routing table routing: process by which routing table is built Network as a Graph C

More information

A rule-extraction framework under multigranulation rough sets

A rule-extraction framework under multigranulation rough sets DOI 10.1007/s13042-013-0194-0 ORIGINAL ARTICLE A rule-extraction framework under multigranulation rough sets Xin Liu Yuhua Qian Jiye Liang Received: 25 January 2013 / Accepted: 10 August 2013 Ó Springer-Verlag

More information

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 4 The Network Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every

More information

Youki Kadobayashi NAIST

Youki Kadobayashi NAIST Information Network 1 Routing (1) Youki Kadobayashi NAIST 1 The Routing Problem! How do I get from source to destination?! Which path is best? In terms of:! Number of hops! Delay! Bandwidth! Policy constraints!

More information

Energy Consumption Analysis of modified AODV Routing protocol under Random Waypoint and Reference point Group Mobility Models

Energy Consumption Analysis of modified AODV Routing protocol under Random Waypoint and Reference point Group Mobility Models ICACSIS 2012 ISBN: 978-979-1421-15-7 Energy Consumption Analysis of modified AODV Routing protocol under Random Waypoint and Reference point Group Mobility Models Harris Simaremare*, Abdusy Syarif**, Abdelhafid

More information

CHAPTER 4: ROUTING DYNAMIC. Routing & Switching

CHAPTER 4: ROUTING DYNAMIC. Routing & Switching CHAPTER 4: ROUTING DYNAMIC Routing & Switching CHAPTER4 4.1 Dynamic Routing Protocols 4.2 Distance Vector Dynamic Routing 4.3 RIP and RIPng Routing 4.4 Link-State Dynamic Routing 4.5 The Routing Table

More information

Handling Missing Attribute Values in Preterm Birth Data Sets

Handling Missing Attribute Values in Preterm Birth Data Sets Handling Missing Attribute Values in Preterm Birth Data Sets Jerzy W. Grzymala-Busse 1, Linda K. Goodwin 2, Witold J. Grzymala-Busse 3, and Xinqun Zheng 4 1 Department of Electrical Engineering and Computer

More information