scholarly journals Dynamic resource allocations in virtual networks through a knapsack problem's dynamic programming solution

2020 ◽  
Vol Volume 31 - 2019 - CARI 2018 ◽  
Author(s):  
Vianney Kengne Tchendji ◽  
Yannick Florian YANKAM

International audience The high-value Internet services that have been significantly enhanced with the integration of network virtualization and Software Defined Networking (SDN) technology are increasingly attracting the attention of end-users and major computer network companies (Google, Amazon, Yahoo, Cisco, ...). In order to cope with this high demand, network resource providers (bandwidth, storage space, throughput, etc.) must implement the right models to understand and hold the users' needs while maximizing profits reaped or the number of satisfied requests into the virtual networks. This need is even more urgent that users' requests can be linked, thereby imposing to the InP some constraints concerning the mutual satisfaction of requests, which further complicates the problem. From this perspective, we show that the problem of resource allocation to users based on their requests is a knapsack problem and can therefore be solved efficiently by using the best dynamic programming solutions for the knapsack problem. Our contribution takes the dynamic resources allocation as a multiple knapsack's problem instances on variable value requests. La multitude des services à forte valeur ajoutée offert par Internet et améliorés considérablement avec l'intégration de la virtualisation réseau et de la technologie des réseaux définis par logiciels (Software Defined Networking), suscite de plus en plus l'attention des utilisateurs finaux et des grands acteurs des réseaux informatiques (Google, Amazon, Yahoo, Cisco, ...); ainsi, pour faire face à cette forte demande, les fournisseurs de ressources réseau (bande passante, espace de stockage, débit, ...) doivent mettre en place les bons modèles permettant de bien prendre en main les besoins des utilisateurs tout en maximisant les profits engrangés ou le nombre de requêtes satis-faites dans les réseaux virtuels. Ce besoin est d'autant plus urgent que les requêtes des utilisateurs peuvent être interdépendantes, imposant de ce fait au FIP des contraintes de satisfaction mutuelle des requêtes, ce qui complexifie encore plus le problème. Dans cette optique, nous montrons que le problème d'allocation des ressources aux utilisateurs en fonction de leurs requêtes, se ramène à un problème de sac à dos et peut par conséquent être résolu de façon efficiente en exploitant les meilleures solutions de programmation dynamique pour le problème de sac à dos. Notre contribution considère l'allocation dynamique des ressources comme une application de plusieurs instances du problème de sac à dos sur des requêtes à valeurs variables.

2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


Author(s):  
Wei (David) Fan ◽  
Mason D. Gemar ◽  
Randy Machemehl

The primary function of equipment managers is to replace the right equipment at the right time and at the lowest overall cost. In this paper, the opportunities and challenges associated with equipment replacement optimization (ERO) are discussed in detail. First, a comprehensive review of the state-of-the art and state-of-the practice literature for the ERO problem is conducted. Second, a dynamic programming (DP) based optimization solution methodology is presented to solve the ERO problem. The Bellman’s formulation for the ERO deterministic (DDP) and stochastic dynamic programming (SDP) problems are discussed in detail. Finally, comprehensive ERO numerical results and implications are given.


2018 ◽  
Vol 2 (Especial 2) ◽  
pp. 86-92
Author(s):  
Adriana Baker Goveia Araujo ◽  
Nyeda Yuri Santos Kiyota Dan

It is well known that technology has daily innovated the daily life of society, starting from the transformation of simple applications of mobile devices to their amplitude when gaining medicine and the judiciary. Not forgetting his most common intervention, that is, the virtual currency, which especially understands the financial world and the forensic environment. This time, with so many changes occurring in the daily lives of individuals, it is imperative that the legal system accompany this technological progress. Therefore, this study intends to cover the possibility of judicial attachment to the virtual currency during the execution, making a correlation between the right and the world wide computer network. Thus, this article was based on bibliographical surveys, readings of laws and electronic articles, where the informative elements were examined with the application of the hypothetical deductive method.


Game Theory ◽  
2017 ◽  
pp. 383-399
Author(s):  
Sungwook Kim

Computer network bandwidth can be viewed as a limited resource. The users on the network compete for that resource. Their competition can be simulated using game theory models. No centralized regulation of network usage is possible because of the diverse ownership of network resources. Therefore, the problem is of ensuring the fair sharing of network resources. If a centralized system could be developed which would govern the use of the shared resources, each user would get an assigned network usage time or bandwidth, thereby limiting each person's usage of network resources to his or her fair share. As of yet, however, such a system remains an impossibility, making the situation of sharing network resources a competitive game between the users of the network and decreasing everyone's utility. This chapter explores this competitive game.


2020 ◽  
Vol 92 (1) ◽  
pp. 107-132 ◽  
Author(s):  
Britta Schulze ◽  
Michael Stiglmayr ◽  
Luís Paquete ◽  
Carlos M. Fonseca ◽  
David Willems ◽  
...  

Abstract In this article, we introduce the rectangular knapsack problem as a special case of the quadratic knapsack problem consisting in the maximization of the product of two separate knapsack profits subject to a cardinality constraint. We propose a polynomial time algorithm for this problem that provides a constant approximation ratio of 4.5. Our experimental results on a large number of artificially generated problem instances show that the average ratio is far from theoretical guarantee. In addition, we suggest refined versions of this approximation algorithm with the same time complexity and approximation ratio that lead to even better experimental results.


2020 ◽  
Vol 179 ◽  
pp. 107349 ◽  
Author(s):  
Godfrey Kibalya ◽  
Joan Serrat ◽  
Juan-Luis Gorricho ◽  
Haipeng Yao ◽  
Peiying Zhang

Sign in / Sign up

Export Citation Format

Share Document