Do you want to publish a course? Click here

Cheating Detection in MDA-ALM Protocol in Application-Level Multicast Networks

كشف الغش في البروتوكول (MDA-ALM) في الشبكات الـتطبيقية متعددة البث

1225   0   63   0 ( 0 )
 Publication date 2015
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

Recent researches consecrate their efforts to overcome multicast network problems by moving all the multicast functions and responsibilities from network layer (routers) to application layer ( terminal nodes (Users)). Most of Application-Level Multicast (ALM)protocols rely on the idea that when a parent node leaves the overlay tree, all itspredecessors should re-join the tree again,which cause several re-organization operations in addition to the interruption of communication frequently. Membership Duration Aware ALM (MDA-ALM) protocol was suggested to solve this problem, it depends on the announcement of the expected membership duration for each new user in order to build a stable and efficient tree. Although the performance of MD-ALM protocol is good, but it is based on membership duration parameter and this makes it more sensitive for the cheating and non-cooperative nodes. The main goal for the cheating nodes is to improve its position in the tree by trying to get the nearest position to the source node and to avoid having any children’s in order to relieve its load by manipulating the membership duration information. Our research aims to find the best solution to detect the cheating nodes and cancel its affects in order to improve the performance of MDA against cheating. The simulation results improve that the proposed method detects effectively the cheating nodes.


Artificial intelligence review:
Research summary
تتناول هذه الورقة البحثية مشكلة كشف الغش في بروتوكول (MDA-ALM) المستخدم في الشبكات التطبيقية متعددة البث. يعتمد هذا البروتوكول على مدة بقاء العقد الأعضاء لبناء شجرة بث مستقرة وفعالة. ومع ذلك، فإن هذا البروتوكول حساس للعقد الغشاشة التي تحاول تحسين موقعها في الشجرة عن طريق التلاعب بمعلومات مدة البقاء. تهدف الدراسة إلى تطوير طريقة لكشف الغش وتحسين أداء البروتوكول. تم استخدام محاكي الشبكة Python لإجراء المحاكاة، وأظهرت النتائج أن الطريقة المقترحة كانت فعالة في كشف الغش بنسبة تصل إلى 100% عند نسبة غش منخفضة، لكن الفعالية تقل مع زيادة نسبة الغش. تم اقتراح آليتين لمعاقبة العقد الغشاشة: الأولى بإجبارها على المغادرة، والثانية بزيادة مدة بقائها. أثبتت المحاكاة أن كلا الاقتراحين كان لهما تأثير إيجابي على أداء الشبكة، مع تفضيل الاقتراح الأول من حيث تقليل الحمل الناجم عن إعادة الانضمام، والاقتراح الثاني من حيث تقليل نسبة تمدد الوصلة.
Critical review
دراسة نقدية: تعتبر هذه الورقة البحثية خطوة مهمة نحو تحسين أداء بروتوكولات الشبكات التطبيقية متعددة البث من خلال كشف الغش. ومع ذلك، يمكن توجيه بعض الانتقادات البناءة. أولاً، تعتمد الدراسة بشكل كبير على المحاكاة باستخدام محاكي الشبكة Python، مما قد يحد من تطبيق النتائج في بيئات حقيقية. ثانياً، لم تتناول الدراسة تأثير الغش على أنواع أخرى من البروتوكولات التطبيقية متعددة البث، مما يفتح المجال لمزيد من الأبحاث في هذا المجال. أخيراً، يمكن تحسين الدراسة من خلال تقديم تحليل أعمق لتأثير الغش على أداء الشبكة في سيناريوهات مختلفة، مثل الشبكات ذات الأحجام الكبيرة جداً أو الشبكات ذات التوزيعات الجغرافية المختلفة.
Questions related to the research
  1. ما هو الهدف الرئيسي من بروتوكول MDA-ALM؟

    الهدف الرئيسي من بروتوكول MDA-ALM هو بناء شجرة بث مستقرة وفعالة من خلال الإعلان عن مدة البقاء المتوقعة لكل عضو يرغب في الانضمام للشجرة.

  2. ما هي الطريقة المقترحة لكشف الغش في البروتوكول MDA-ALM؟

    تعتمد الطريقة المقترحة لكشف الغش على التحقق من مدة بقاء العقدة وإذا كانت قريبة من الصفر ولا تحتوي على أي عقد أبناء، فإن هذه العقدة يمكن أن تكون غشاشة.

  3. ما هي الآليتين المقترحتين لمعاقبة العقد الغشاشة؟

    الآلية الأولى هي إجبار العقد الغشاشة على المغادرة، والثانية هي زيادة مدة بقاء العقدة الغشاشة.

  4. ما هي نتائج المحاكاة بالنسبة لكشف الغش عند نسبة غش منخفضة؟

    أظهرت نتائج المحاكاة أن الطريقة المقترحة كانت فعالة في كشف الغش بنسبة تصل إلى 100% عندما كانت نسبة الغش تتراوح بين 5-10%.


References used
Shubha Shukla and Akhilesh Kosta , “A Relevant and Survivable Scheme for Application Layer Multicast Routing”, Department of Computer Science & Engineering K.I.T, Kanpur, India, vol.2, no.8, pp: 43-54, August 2013
(Ayman El-Sayed. “Application-Level Multicast Transmission Techniques Over The Internet”. PhD thesis, INRIA RhneAlpes, March (2004
Zhiye Huang, JinxiangPeng and Jian Zhang, “The application level Multicast Technique Algorithms Oriented to P2P video”, Applied Mechanics and Material, vol.8, no. 303- 306, pp: 2260-2264, January 2013
rate research

Read More

Application-Level Multicast (ALM) has been proposed as an alternative solution to overcome the lack of deployment of the IP Multicast group communication model. It builds an overlay tree consisting of end-to-end unicast connections between end-host s based on the collaboration of group members with each other. The efficiency of the constructed overlay tree depends entirely on the honesty and on the cooperation of all participating members. However such behaviour can not be guaranteed and some selfish and non-cooperative nodes may take profit from the honesty of other members in the overlay. Recently, many researchers have been investigating the impact of selfishness of nodes in the overlay multicast. Our contribution in this paper is to describe in detail the basic algorithms used to construct the overlay tree, and evaluate the impact of cheating nodes on the stability and on the performance of constructed overlay tree using these algorithms.
Application-Level Multicast Networks are easy to deployment, it does not require any change in the network layer, where data is sent to the network via the built-up coverage of the tree using a single-contact transmission of the final contract, who are the hosts are free can join / leave whenever they want it, or even to leave without telling any node so. Causing the separation of the children of the leaved node from the tree, and the request for rejoin, in other words, these nodes will be separated from the overlay tree and cannot get the data even rejoin. This causes the distortion of the constructed tree, and the loss of several packets which can significantly impact the user. One of the key challenges in building a multi-efficiently and effectively overlay multicast protocol is to provide a robust mechanism to overcome the sudden departure of a node from the overlay tree without a significant impact on the performance of the constructed tree. In this research, we propose a new protocol to solve problems presented previously.
Overlay multicast (Application-Level Multicast (ALM)) constructs a multicast delivery tree among end hosts. Unlike traditional IP multicast where the internal tree nodes are dedicated routers which are relatively stable and do not leave the multicast tree voluntarily, the non-leaf nodes in the overlay tree are free end hosts which can join/leave the overlay at will, or even crash without notification. So, the leaving node can leave suddenly and cannot give its descendants (and the Rendez-vous Point (RP)) the time to prepare the recovering (the reconnection) of the overlay tree, and so there is a need to trigger a rearrangement process in which each one of its descendants should rejoin the overlay tree. In this case, all of its downstream nodes are partitioned from the overlay tree and cannot get the multicast data any more. These dynamic characteristics cause the instability of the overlay tree, which can significantly impact the user. A key challenge in constructing an efficient and resilient ALM protocol is to provide fast data recovery when overlay node failures partition the data delivery paths. In this paper, we analyze the performance of the ALM tree recovery solutions using different metrics.
WLANs have evolved into the best choice in a number of situations such as government institutions and airports, but because of the open transport in these networks increased the possibility of security attacks, which required the use of security prot ocols to protect the network and to protect users. This research examines and evaluates the impact of security protocols on WLAN performance in order to select the optimal protocol, the impact of these protocols on network performance has been evaluated by adding those Protocols to open source GloMoSim environment, And recent simulation results show that the performance of these protocols are varies according to the environment applied within them, noting that there is no effective Protocol in all environments, i.e. the suitable Protocol in an environment may be unsuitable in other ones. After comparing performance results in simulations with performance results in the real network, we can see that the best performance protocol is WEP. Also, The best protocol for both performance and security is the WPA2. Hence, our choice to one of the security protocols depends on what we want to secure in the level of protection and the performance of the network.
Radar detects the targets and measures its parameters, range, azimuth, height, and velocity of the target. In some application, such as early warning radar we don’t have extremely measure all these parameters, but in other application like detect ion targets and measures his geo-locations requires high resolution to all these parameters. This paper discusses the feasibility of detecting the location of from four deferent satellites Positions by using of Linear Algebra and pseudo range’s solution, The Matlab was used to solve the four Equations and to simulate the Geo-Positions on Geo-Map

suggested questions

comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا