• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 985
  • 277
  • 143
  • 110
  • 86
  • 35
  • 30
  • 28
  • 19
  • 19
  • 16
  • 12
  • 9
  • 8
  • 8
  • Tagged with
  • 2078
  • 647
  • 498
  • 476
  • 386
  • 338
  • 271
  • 242
  • 240
  • 238
  • 238
  • 203
  • 185
  • 175
  • 174
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
651

Routing on the Channel Dependency Graph:

Domke, Jens 20 June 2017 (has links) (PDF)
In the pursuit for ever-increasing compute power, and with Moore's law slowly coming to an end, high-performance computing started to scale-out to larger systems. Alongside the increasing system size, the interconnection network is growing to accommodate and connect tens of thousands of compute nodes. These networks have a large influence on total cost, application performance, energy consumption, and overall system efficiency of the supercomputer. Unfortunately, state-of-the-art routing algorithms, which define the packet paths through the network, do not utilize this important resource efficiently. Topology-aware routing algorithms become increasingly inapplicable, due to irregular topologies, which either are irregular by design, or most often a result of hardware failures. Exchanging faulty network components potentially requires whole system downtime further increasing the cost of the failure. This management approach becomes more and more impractical due to the scale of today's networks and the accompanying steady decrease of the mean time between failures. Alternative methods of operating and maintaining these high-performance interconnects, both in terms of hardware- and software-management, are necessary to mitigate negative effects experienced by scientific applications executed on the supercomputer. However, existing topology-agnostic routing algorithms either suffer from poor load balancing or are not bounded in the number of virtual channels needed to resolve deadlocks in the routing tables. Using the fail-in-place strategy, a well-established method for storage systems to repair only critical component failures, is a feasible solution for current and future HPC interconnects as well as other large-scale installations such as data center networks. Although, an appropriate combination of topology and routing algorithm is required to minimize the throughput degradation for the entire system. This thesis contributes a network simulation toolchain to facilitate the process of finding a suitable combination, either during system design or while it is in operation. On top of this foundation, a key contribution is a novel scheduling-aware routing, which reduces fault-induced throughput degradation while improving overall network utilization. The scheduling-aware routing performs frequent property preserving routing updates to optimize the path balancing for simultaneously running batch jobs. The increased deployment of lossless interconnection networks, in conjunction with fail-in-place modes of operation and topology-agnostic, scheduling-aware routing algorithms, necessitates new solutions to solve the routing-deadlock problem. Therefore, this thesis further advances the state-of-the-art by introducing a novel concept of routing on the channel dependency graph, which allows the design of an universally applicable destination-based routing capable of optimizing the path balancing without exceeding a given number of virtual channels, which are a common hardware limitation. This disruptive innovation enables implicit deadlock-avoidance during path calculation, instead of solving both problems separately as all previous solutions.
652

Optimalizace tras při rozvozu europalet / Optimal routes for Euro pallet transporting

Juříčková, Ivana January 2014 (has links)
This diploma thesis describes a logistic problem of the company JACER-CZ Ltd. The main focus is on identifying optimal routes about the Euro pallets distribution. The Euro pallets are standardized at length replaceable transport pallets which are in Europe. The aim of this thesis is to find a solution which will meet requirements of all thirteen customers and simultaneously a total route length of all vans will be minimalized. At first there is the mathematical model about the delivery assignment with the split delivery vehicle calculated by solvers CPLEX and Gurobi. Then the original and the modified example is solved manually by heuristic algorithms. It is concerned the nearest neighbour algorithm, savings algorithm, the insertion algorithm and the heuristic method for the split delivery vehicle routing problem.
653

Meta-heurísticas para problemas integrados de roteamento e carregamento de veículos / Meta-heuristics for integrated vehicle routing and loading problems

Santini, Luigi Tavolaro 23 February 2017 (has links)
Submitted by Nadir Basilio (nadirsb@uninove.br) on 2018-01-24T20:35:47Z No. of bitstreams: 1 Luigi Tavolaro Santini.pdf: 2357766 bytes, checksum: b70528f7db6bf88f1285744982eb4234 (MD5) / Made available in DSpace on 2018-01-24T20:35:47Z (GMT). No. of bitstreams: 1 Luigi Tavolaro Santini.pdf: 2357766 bytes, checksum: b70528f7db6bf88f1285744982eb4234 (MD5) Previous issue date: 2017-02-23 / The present work deals with the Capacitated Vehicle Routing Problem with Three-Dimensional Loading Constraints. This problem is difficult to solve exactly, still relatively little studied, but important in the logistics activities of movement, warehousing and transportation. This problem consists in minimizing the total traveled distance by a homogeneous fleet of vehicles that address the issue of deliveries of customer demands, in which these demands are composed of items that have three relevant spatial dimensions. The objective of the present work is to develop heuristic and metaheuristic algorithms to solve the problem in question. The algorithms are based on the Clarke & Wright and George & Robinson heuristics, and on the Iterated Local Search and Adaptive Large Neighborhood Search metaheuristics. In the proposed algorithm, the routing problem is firstly addressed by adapting the Clarke & Wright heuristic, creating routes that are used to verify the loading pattern, thus obtaining an initial solution. In the following, an extensive search in the solution neighborhood is applied with the Iterated Local Search metaheuristic. For the best results of this search, it is checked if the loading pattern is feasible using an adapted George & Robinson algorithm. If it is not feasible, the Adaptive Large Neighborhood Search metaheuristic is executed in an attempt to find a feasible solution to the loading problem. Instances from the literature are used to evaluate the efficiency of the developed methods. The results obtained for the routing problem individually were of paramount importance to ensure the effectiveness of the Iterated Local Search metaheuristic. For the loading problem individually, the tests were also satisfactory, allowing for several feasible loading patterns using the adapted George & Robinson algorithm and the Adaptive Large Neighborhood Search metaheuristic. The results obtained with the proposed algorithm for the integrated problem were also good, being very close to those in the literature and with computational time relatively lower. As perspectives for future research, it is intended to investigate more efficient ways of exploring the solution space of the integrated problem, as well as the use of other metaheuristics. / O presente trabalho trata do Problema de Roteamento de Veículos Capacitado com Restrições de Carregamento Tridimensional. Este é um problema de difícil solução exata, ainda relativamente pouco estudado, porém importante nas atividades logísticas de movimentação, armazenagem e transporte de produtos. Este problema consiste em minimizar a distância total percorrida por uma frota homogênea de veículos que supram a questão das entregas das demandas de clientes, em que tais demandas são compostas por itens que possuem três dimensões espaciais relevantes. O objetivo do presente trabalho consiste em desenvolver algoritmos heurísticos e meta-heurísticos para resolver o problema em questão. Os algoritmos são baseados nas heurísticas de Clarke & Wright e de George & Robinson, e nas meta-heurísticas Iterated Local Search e Adaptive Large Neighborhood Search. No algoritmo proposto, primeiro trata-se o problema de roteamento adaptando-se a heurística de Clarke & Wright, criando roteiros que são utilizados para a verificação do padrão de carregamento, tendo-se assim uma solução inicial. Em seguida, é aplicada uma busca extensiva na vizinhança com a meta-heurística Iterated Local Search. Para os melhores resultados desta busca, verifica-se se o padrão de carregamento é viável utilizando o algoritmo de George & Robinson adaptado. Nos casos em que não é viável, a meta-heurística Adaptive Large Neighborhood Search é executada na tentativa de se encontrar soluções viáveis para o problema de carregamento. Instâncias da literatura são utilizadas para avaliar a eficiência dos métodos desenvolvidos. Os resultados obtidos para o problema de roteamento separadamente foram de suma importância para assegurar a eficiência do meta-heurística Iterated Local Search. Para o problema de carregamento separadamente, os testes utilizando o algoritmo de George & Robinson adaptado e a meta-heurística Adaptive Large Neighborhood Search também foram satisfatórios, permitindo a obtenção de vários padrões de carregamento factíveis. Os resultados obtidos com o algoritmo proposto para o problema integrado também foram bons, sendo bastante próximos aos da literatura e com tempo computacional relativamente menor. Como perspectivas de pesquisas futuras, pretende-se estudar formas mais eficientes de se explorar o espaço de busca do problema integrado, bem como a utilização de outras meta-heurísticas.
654

Modely a metody pro svozové úlohy / Models and methods for routing problems

Nevrlý, Vlastimír January 2016 (has links)
This master's thesis deals with mathematical model building for routing problems and ways to solve them. There are discussed and implemented deterministic and heuristic approaches that are suitable to be utilized. A big effort is put into building of the mathematical model describing a real world problem from the field of waste management. Appropriate algorithms are developed and modified to solve a particular problem effectively. An original graphical environment is created to illustrate acquired results and perform testing computations.
655

Inventory routing problems on two-echelon systems : exact and heuristic methods for the tactical and operational problems / Inventory Routing Problems dans les systèmes à deux échelons : méthodes exactes et heuristiques pour les problèmes tactique et opérationnel

Farias de Araújo, Katyanne 25 November 2019 (has links)
Les activités de transport et de gestion des stocks ont un impact important les unes sur les autres. Assurer un niveau de stock idéal peut demander des livraisons fréquentes, ce qui entraîne des coûts logistiques élevés. Pour optimiser les compromis entre les coûts de stock et de transport, des systèmes VMI (Vendor Managed Inventory) ont été développés pour gérer ensemble les opérations de stock et de transport. Pour un ensemble de clients ayant des demandes sur un horizon de temps, le problème de détermination des tournées et des quantités à livrer avec un coût minimum de gestion de stock et de transport est connu sous le nom de Inventory Routing Problem (IRP). Les systèmes à deux échelons ont également été étudiés pour améliorer le flux de véhicules dans les zones urbaines. étant donné que des nouvelles politiques de gestion sont apparues, dans le but de limiter le trafic des gros véhicules et leur vitesse dans les centres urbains, des Centres de Distribution (DC) sont mis en place pour coordonner les flux de marchandises à l'intérieur et à l'extérieur des zones urbaines. Les produits sont donc livrés aux clients par les fournisseurs via les DC.Nous proposons de combiner un système à deux échelons avec le IRP. Nous introduisons un Operational Two-Echelon Inventory Routing Problem (O-2E-IRP), ce qui est une nouvelle extension du IRP à notre connaissance. Dans le O-2E-IRP proposé, les clients doivent être servis par un fournisseur strictement via des DC et les tournées doivent être définis dans les deux échelons sur un horizon de temps donné. Trois politiques de réapprovisionnement et de configurations de routage différentes sont modélisées pour ce problème. Nous développons deux formulations mathématiques, ainsi qu'un algorithme Branch-and-Cut (B&C) combiné à une matheuristique pour résoudre le problème. De plus, nous analysons plusieurs inégalités valides disponibles pour le IRP et nous introduisons de nouvelles inégalités valides inhérentes au IRP à deux échelons. Des expériences de calcul approfondies ont été effectuées sur un ensemble d'instances générées de manière aléatoire. Les résultats obtenus montrent que les performances des méthodes sont liées à la politique de stock et à la configuration de routage.Dans le contexte d'un IRP à deux échelons, deux décisions tactiques importantes doivent être prises en plus des décisions de livraison de routage et de quantité de livraison: à partir de quel DC sera fourni chaque client et en utilisant quels véhicules ? Répondre à ces questions est extrêmement difficile car cela implique de pouvoir minimiser les coûts opérationnels d'un système de livraison VMI à deux échelons à long-terme et avec des demandes incertaines. Pour faire face à cela, nous présentons le Tactical Two-Echelon Inventory Routing Problem (T-2E-IRP) qui optimise les décisions en fonction d'un horizon à long-terme et en tenant compte des demandes stochastiques. Trois politiques de gestion des stocks sont modélisées et appliquées à un ou aux deux échelons. Nous développons une approche de simulation pour résoudre le T-2E-IRP sur un horizon de temps à long-terme. Nous proposons quatre formulations et deux algorithmes B&C pour définir l'affectation des clients et des véhicules aux DC en fonction d'un horizon de temps court. Ensuite, nous évaluons ces décisions d'affectation via un outil de simulation qui résout un sous-problème du T-2E-IRP, qui consiste en les décisions de livraisons du fournisseur aux DC et des DC aux clients, sur un horizon glissant. De nombreuses expériences sont effectuées pour un ensemble d'instances générées aléatoirement. L'impact de plusieurs paramètres utilisés pour déterminer l'affectation des clients et des véhicules aux DC sur le coût total est analysé. Basé sur des expériences, nous définissons la combinaison de paramètres qui fournit généralement les meilleurs résultats sur les instances générées. / Transport and inventory management activities have a great impact on each other. Ensuring an ideal inventory level can require frequent deliveries, leading to high logistics costs. To optimize the trade-offs between inventory and transportation costs, VMI (Vendor Managed Inventory) systems have been developed to manage inventory and transportation operations together. Given a set of customers with demands over a time horizon, the problem of determining routes and delivery quantities at a minimum inventory holding and transportation costs is known as Inventory Routing Problem (IRP). Two-echelon systems have also been studied to improve the freight vehicle flow inside urban areas. As new management policies have emerged, with the goal of limiting the traffic of large vehicles and their speed in urban centers, Distribution Centers (DC) are introduced to coordinate freight flows inside and outside the urban areas. Products are then delivered from the suppliers to the customers through the DC.We propose to combine a two-echelon system with the IRP. We introduce an Operational Two-Echelon Inventory Routing Problem (O-2E-IRP), which is a new extension of the IRP to the best of our knowledge. On the proposed O-2E-IRP, the customers must be served by a supplier strictly through DC and routes must be defined in both echelons over a given time horizon. Three different replenishment policies and routing configurations are modeled for this problem. We develop two mathematical formulations, and a Branch-and-Cut (B&C) algorithm combined with a matheuristic to solve the problem. In addition, we analyze several valid inequalities available for IRP, and we introduce new ones inherent to the IRP within two echelons. Extensive computational experiments have been carried out on a set of randomly generated instances. The obtained results show that the performance of the methods is related to the inventory policy and routing configuration.In the context of a two-echelon IRP, two important tactical decisions have to be taken in addition to route and quantity delivery decisions: from which DC will be supplied each customer and using which vehicles? Answering these questions is extremely difficult as it implies being able to minimize operational costs for a two-echelon VMI delivery system on long-term and with uncertain demands. In order to deal with this, we introduce the Tactical Two-Echelon Inventory Routing Problem (T-2E-IRP) that optimizes the decisions based on a long-term horizon and considering stochastic demands. Three inventory management policies are modeled and applied at one or both echelons. We develop a simulation approach to solve the T-2E-IRP on a long-term time horizon. We propose four formulations and two B&C algorithms to define the assignment of customers and vehicles to the DC based on a short time horizon. Then, we evaluate these assignment decisions through a simulation tool that solves a subproblem of the T-2E-IRP, which consists of the decisions of deliveries from the supplier to the DC and from the DC to the customers, on a rolling-horizon framework. Extensive computational experiments are performed for a set of randomly generated instances. The impact of several parameters used to determine the assignment of customers and vehicles to DC on the total cost is analyzed. Based on the experiments, we define the combination of parameters that generally provides the best results on the generated instances.
656

Dynamische Tourenplanung - Modifikation von klassischen Heuristiken für das Dynamische Rundreiseproblem (DTSP) und das Dynamische Tourenplanungsproblem (DVRP) mit der Möglichkeit der Änderung des aktuellen Fahrzeugzuges

Richter, Andreas 17 August 2005 (has links)
Unternehmen der Transportbranche müssen gerade im operativen Tagesgeschäft bei der Tourenplanung und Transportdisposition Planungsprobleme lösen, die ein hohes Maß an Dynamik aufweisen. Speziell die Inputfaktoren der Tourenplanung sind größtenteils dynamisch und stochastisch. Aus Sicht des Autors kann die Qualität von Tourplanungsergebnissen durch die zeitnahe Berücksichtigung unvorhergesehener Ereignisse nachhaltig verbessert werden. Jedoch findet diese zunehmend erfolgskritische Funktionalität in der Literatur bisher nur unzureichend Beachtung, obwohl das Tourenplanungsproblem (Vehicle Routing Problem (VRP)) eines der wichtigsten und am meisten erforschten kombinatorischen Optimierungsprobleme ist. Verfahren für kapazitierte dynamische Tourenplanungsproblemstellungen sind in der Literatur kaum zu finden. Speziell im Bereich der Algorithmen, die eine große Lösungsgeschwindigkeit, eine leichte Verständlichkeit, eine aus praktischer Sicht akzeptable Lösungsgüte aufweisen und die Möglichkeit besitzen, die aktuellen Routenpläne der Fahrzeuge ausgehend von der momentanen geographischen Position real-time zu verändern, besteht Forschungsbedarf. Die Arbeit geht daher der Forschungsfrage nach, wie ein Verfahren für die dynamische Tourenplanung zu konstruieren ist, welches das kapazitierte dynamische Tourenplanungsproblem mit der Möglichkeit der Änderung des aktuellen Fahrzeugzuges unter Einhaltung sehr kurzer Rechenzeiten bei größtmöglicher Verständlichkeit löst. Durch die genannten Kriterien wird im Rahmen der Arbeit der Schwerpunkt auf die Modifikation von klassischen heuristischen Verfahren für die Lösung von dynamischen Tourenplanungsproblemen gelegt. Die Arbeit befasst sich sowohl mit dem Gesamtkonzept zur Disposition dynamischer Kunden als auch mit konkreten Modellen und Verfahren zur Lösung von Subproblemen innerhalb des Gesamtkonzeptes. Ferner erfolgt die Präsentation von umfangreichen Simulationsergebnissen, die auf der durchgeführten softwaretechnischen Implementierung der entwickelten Verfahren basieren. Die gute Anwendbarkeit der neuen Verfahren in der Praxis wird gezeigt. Zwecks der möglichst ganzheitlichen Betrachtung des Themengebietes erfolgt in der Arbeit zum einen sowohl die Erörterung von quantitativen als auch von qualitativen Aspekten der dynamischen Tourenplanung und zum anderen die Analyse von Schnittstellen zwischen der dynamischen Tourenplanung und eng damit verbundenen Bereichen wie Flottenmanagement oder Auftragseingang bzw. -disposition. Hierzu werden die Informationsflüsse zwischen den beteiligten Elementen im Rahmen des dynamischen Dispositionsprozesses aufgezeigt, telematische Komponenten zur Unterstützung des Informationsmanagements und der Informationsübertragung vorgestellt sowie die benötigten Inputdaten erläutert. Den Schwerpunkt der Arbeit stellt jedoch die Entwicklung von neuen quantitativen Methoden zur dynamischen Tourenplanung dar.
657

Hierarchical routing and cross-layer mechanisms for improving video streaming quality of service over mobile wireless ad hoc networks

Arce Vila, Pau 20 March 2014 (has links)
This thesis dissertation addresses the problem of providing video streaming services over mobile wireless ad hoc networks. This sort of network represents a hostile environment for this kind of realtime data transmission to the extent that obtaining a good quality of viewer experience is challenging and still under study. Besides the research point of view, providing high-quality multimedia services is decisive for the practical usability and feasibility of wireless ad hoc networks so that service providers can broaden the range of services offered. So far, mobile wireless ad hoc networks have been used to provide network connection among users who could not have connectivity otherwise. However, quality expectations and requirements have been increased notably, fostered by the advent of real-time multimedia applications over mobile devices. Due to the considerable processing and bandwidth constraints underlying these types of devices, coupled with their ability to move freely, it becomes a difficult task to achieve an acceptable quality of service throughout the entire video transmission. Thus, the contribution of this thesis work is twofold. On the one hand, the main problems and limitations that may be encountered and should be faced when deploying real-time services over mobile wireless ad hoc networks are analyzed and discussed. Bandwidth constraints and node mobility are portrayed as the major causes that prevent good quality of service and smooth video playback. On the other hand, following then the aim of improving video streaming quality, this thesis proposes practical solutions that involve diverse routing and cross-layer techniques. One of the proposed approaches focuses on hierarchical routing. Hierarchical arrangement of network nodes may reduce packet interference as well as offer a structured architecture that reduces control traffic overhead. Particularly, the proposed hierarchical routing protocol aims at providing scalability when the number of nodes grows, while maintaining complexity as low as possible. The resulting reduction in packet losses and video playback interruptions finally enhances the quality of received video streams. Furthermore, on the basis that the nodes in an ad hoc network are willing to perform routing tasks, every node could become essential for the proper network operation and routing performance. In tune with this philosophy, a new cross-layer mechanism for recovering lost packets is proposed. By overhearing packets over the wireless shared medium, any node in the surrounding area of the destination endpoint can altruistically retransmit those video packets that have not been correctly received at destination. Moreover, due to the video awareness and frame prioritization algorithm considered in this proposal, it becomes very convenient for real-time video streaming services. The results show that the presented mechanism succeeds in improving video quality and user experience, especially when packet losses are caused due to the mobility of the destination node. / Arce Vila, P. (2014). Hierarchical routing and cross-layer mechanisms for improving video streaming quality of service over mobile wireless ad hoc networks [Tesis doctoral]. Editorial Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/36538 / Alfresco
658

Attack-resistant Embedding of Rooted Spanning Trees for Efficient Routing in Friend-to-Friend Overlays

Byrenheid, Martin 02 May 2022 (has links)
Das Internet und darauf aufbauende Infrastrukturen haben sich als zentrale Medien zum weltweiten Abruf und Austausch von Informationen etabliert. Im Zuge dessen ist das Internet ein wichtiges Werkzeug zur globalen Vernetzung von Aktivisten und Journalisten geworden, welche dieses zudem als Plattform zur Veröffentlichung von Rechercheergebnissen und Beweismaterial verwenden. Um den Zugang zu kompromittierenden oder als unerwünscht erachteten Informationen über das Internet zu unterbinden, haben jedoch Regierungen weltweit weitreichende technische Zensurmaßnahmen implementiert. Um diesen Maßnahmen entgegenzuwirken sind Betroffene darauf angewiesen, ihre digitale Kommunikation über Geräte von Drittanbietern zu leiten, welche sich außerhalb des Einflussbereichs des Zensors befinden und deren Rolle als Umgehungsknoten für den Zensor schwer zu detektieren ist. Eine vielversprechender Ansatz zur Realisierung solcher Gegenmaßnahmen sind Friend-to-Friend (F2F) Overlay-Netzwerke. Ähnlich zu Anonymisierungsnetzwerken wie Tor und AN.ON setzen sich F2F Overlays aus den Knoten von mehreren Betreibern zusammen, wodurch ein Single Point of Failure vermieden wird. Um gegen Unterwanderung zu schützen wird jedoch die Kommunikation zwischen den Knoten in F2F Overlays auf jene Paare beschränkt, deren Betreiber sich gegenseitig vertrauen. Folglich erfordert das Aufdecken der Knoten eines F2F Overlays die Identifizierung und Kompromittierung deren Betreiber durch den Zensor mit Hilfe von Social-Engineering-Methoden. Um Anwendungsfälle wie anonymes Blogging zu unterstützen, benötigen F2F Overlays ein Routing-Protokoll, welches Datenübertragungen zwischen Knoten ohne wechselseitig vertraute Betreiber ermöglicht. Aufgrund seiner hohen Effizienz und Ausfalltoleranz gilt Routing anhand von Rooted Spanning Tree (RST) Embeddings hierfür als besonders vielversprechender Kandidat. Dabei wählen die teilnehmenden Knoten zunächst einen Knoten als Wurzel und formen, ausgehend von diesem, einen virtuellen Wurzelbaum über das F2F Overlay. Anschließend wird jedem Knoten eine virtuelle Adresse zugewiesen, welche dessen Position in dem zuvor erzeugten Wurzelbaum eindeutig repräsentiert. In F2F Overlays muss davon ausgegangen werden, dass ein Zensor, welcher einen Teil der Knotenbetreiber kompromittieren konnte, mit Hilfe eigener Knoten aktive Angriffe auf das Routing durchführt, um die Verbreitung von Inhalten zu unterbinden. Bisherige Forschung zu Routing anhand von RST Embeddings konzentriert sich jedoch primär auf die Steigerung dessen Effizienz sowie der Verbesserung dessen Robustheit gegenüber permanenter Ausfälle. In dieser Arbeit werden bisher unbekannte Angriffe auf RST-Embedding-basierte Routing-Protokolle vorgestellt, welche von bösartigen F2F-Overlay-Teilnehmern mit geringem Aufwand durchgeführt werden können. Ergänzend stellen wir anschließend Maßnahmen vor, welche derartige Routing-Protokolle inhärent robuster gegen Fehlverhalten machen. Ein wesentlicher Einflussfaktor bezüglich der Effektivität der identifizierten Angriffe ist die Tatsache, ob der gewählte Wurzelknoten ein Knoten des Angreifers ist oder nicht. Während die von uns vorgestellten Schutzmaßnahmen die Auswirkung der Angriffe auch in dem Fall begrenzen, dass der Wurzelnoten sich bösartig verhält, so erfordert das Routing von Nachrichten dabei nichtsdestotrotz erhöhten Aufwand bei gleichzeitig reduzierter Erfolgswahrscheinlichkeit. Die Wurzelwahlverfahren bisheriger RST-Embedding-basierter Routing-Protokolle können in F2F Overlays jedoch nicht auf sichere Weise umgesetzt werden, so dass ein Angreifer mit geringem Aufwand erreichen kann, dass einer seiner Knoten als Wurzel gewählt wird. Während es in F2F Overlays allgemein nicht ausgeschlossen werden kann, dass ein bösartiger Knoten als Wurzel gewählt wird, so ist es dennoch erstrebenswert, die Wahrscheinlichkeit der Wahl eines nicht-bösartigen Knotens zu erhöhen. Da bisherige Verfahren zur sicheren, verteilten Wahl eines Knotens nicht effektiv in F2F Overlays umgesetzt werden können, wird in dieser Arbeit ein neues Wurzelwahlverfahren vorgestellt. Dieses basiert auf lokalen, randomisierten Mehrheitsentscheidungen, um einen Konsens auf einen einzelnen Knoten herbeizuführen. Ergänzend dazu werden Ergebnisse einer Simulationsstudie anhand realer sozialer Graphen vorgestellt, welche belegen, dass dieser Ansatz einer Unterwanderung widersteht, wenn der Angreifer eine geringe Anzahl von Teilnehmern kompromittieren konnte. Gleichzeitig legen die Ergebnisse der Studie nahe, dass dieses Verfahren auch in F2F Overlays mit zehntausenden von Knoten in kurzer Zeit eine Einigung auf einen gemeinsamen Wurzelknoten für den Großteil der Knoten erreicht. Zur Effizienzsteigerung leiten aktuelle RST-Embedding-basierte Routing-Protokolle die Addressen anhand von Breitensuchbäumen ab. Der Aufbau derartiger Bäume erfordert jedoch, dass jeder Knoten seinem Nachbarn die eigene Hop-Distanz zum Wurzelknoten mitteilt. Dabei können Angreiferknoten gezielt inkorrekte Distanzwerte versenden, um die Anzahl der gutartigen Knoten zu maximieren, welche diese als Elternknoten wählen und folglich von anschließenden Angriffen betroffen sind. Um derartige Angriffe zu unterbinden, wird in dieser Arbeit zudem ein verteilter, selbststabilisierender Algorithmus zum Aufbau von Breitensuchbäumen vorgestellt. Dieser verwendet kryptografische Signaturen in Kombination mit Zeitstempeln, um inkorrekte sowie veraltete Distanzwerte erkennbar zu machen. Die Nutzung von RST Embeddings birgt neben Angriffen auf deren Verfügbarkeit das Risiko, dass ein interner Angreifer Informationen über die Topologie des zugrundeliegenden Netzwerkes gewinnen kann. Im Kontext von F2F Overlays ist dies problematisch, da deren Struktur dem sozialen Netzwerk deren Teilnehmern entspricht. Erlangt ein Angreifer einen Schnappschuss der Topologie eines F2F Overlays oder eines Teils davon, so kann er diesen mit der Topologie anderer sozialer Netzwerkgraphen abgleichen, um bisher unbekannte Teilnehmer aufzudecken. Das konkrete Ausmaß, in dem RST Embeddings sowie das darauf aufbauende Routing Rückschlüsse über die Topologie des Netzwerkes zulassen wurde bisher jedoch nicht untersucht. Der vierte Beitrag dieser Dissertation besteht daher aus einer detaillierten Analyse bezüglich der konkreten Informationen, welche ein interner Angreifer anhand der durch RST-Embedding-basierte Routing-Protokolle propagierten Daten gewinnen kann. / Today, the Internet plays a vital role in enabling activists and journalists to collaborate and to publish critical information on a global scale. As a consequence, governments around the globe have implemented technical censorship measures to keep citizens from accessing content that is deemed inappropriate or compromising. To address such censorship measures, a circumvention infrastructure is needed that allows affected individuals to route their online communication through third-party servers that are outside of the censor’s influence and whose use for circumvention is difficult to detect for the censor. A promising substrate to realize such an infrastructure are Friend-to-Friend (F2F) overlay networks. Similar to anonymization networks like Tor and AN.ON, F2F overlay nodes may be operated by different individuals, thus avoiding a single point of failure. To protect against infiltration, F2F overlays additionally restrict communication between participating devices to those pairs whose operators mutually trust each other. Thus, censors need to perform social engineering in order to discover operators and their nodes. To realize use cases that require communication between nodes of participants without mutual trust, such as distributed and redundant content storage or anonymous blogging, F2F overlays require a routing protocol suitable for large, dynamic networks. Among the current research on routing protocols for F2F overlays, routing based on rooted spanning tree (RST) embeddings emerged as the most promising candidate due to its high efficiency and fault tolerance. In this approach, nodes collaboratively determine a rooted spanning tree over the overlay topology and, starting from the elected root node, assign each node a virtual address that encodes its unique position in the tree. Given that a censor may compromise a fraction of the participants of an F2F overlay, it is likely that the censor will use nodes under their control to actively attack the routing protocol in order to disrupt communication. However, existing research on RST embeddings concentrates on their efficient implementation as well as resilience to permanent faults, thus leaving open in which ways such routing protocols can be attacked. Towards this end, this thesis presents previously unknown attacks that malicious participants of an F2F overlay can easily perform against state-of-the-art routing protocols. As these attacks cannot be reliably attributed to malicious nodes, we propose countermeasures that improve the inherent resilience of such protocols against misbehaving nodes. A fundamental risk that cannot completely be avoided in F2F overlays is that a malicious node may be chosen as the root node of the embedding, giving it a particularly strong position for attacks. While our proposed countermeasures limit the impact of malicious root behavior, routing in such a scenario nonetheless comes at the cost of increased routing overhead and an increased chance of routing failure. Since existing routing protocols based on RST embeddings employ insecure root election schemes, it is desirable to increase the likelihood that a benign node is chosen as root. Because existing secure protocols for node election cannot be used effectively in F2F overlays, we propose a novel root election protocol that leverages local voting algorithms to reach consensus on a single node. Simulations on real-world social graphs show that in F2F overlays, the protocol is able to reach consensus among a large fraction of nodes quickly and, in contrast to election protocols used by state-of-the-art routing algorithms, resists compromise by malicious nodes. To improve efficiency, state-of-the-art protocols embed breadth-first-search (BFS) trees for address assignment, whose formation relies on the truthful reporting of hop distances. In the presence of a benign root node, malicious nodes may deliberately propagate incorrect distance values to maximize the number of benign nodes that choose them as parent, thus increasing the impact of subsequent attacks. To defend against such misbehavior, we furthermore propose a self-stabilizing BFS formation algorithm that leverages cryptographic signatures to make incorrectly reported distances detectable. Additional to the risk of attacks aiming at the disruption of communication, RST embeddings and the routing based on them inherently leaks information about the topology of the underlying network to its participants. Such leakage is problematic in F2F overlays, as topology snapshots can be linked with graph data from further sources in order to identify participants. However, the concrete inferences malicious participants can make from the routing control data propagated by state-of-the-art protocols has not been investigated so far. The fourth contribution of this thesis therefore lies in the analysis of which information about the topology of an F2F overlay malicious participants can infer from the control data propagated by RST embedding algorithms as well as the resulting routing of messages.
659

Efficient heuristics for large-scale vehicle routing problems

Graf, Benjamin 02 September 2021 (has links)
In this thesis we consider three challenging vehicle routing problems representing specific aspects of complex real-world problems: (i) the vehicle routing problem with unit demands, (ii) the preemptive stacker crane problem and (iii) a multi-period vehicle and technician routing problem. For the vehicle routing problem with units demands we continue research on the exponential multi-insertion neighborhood, investigate its properties and propose heuristic solution methods utilizing the neighborhood. For the preemptive stacker crane problem we study structural properties and provide bounds on the benefits of preemption and the benefits of so-called explicit drop nodes that are used exclusively to facilitate preemption. We propose construction heuristics that improve on the state-of-the-art in computational time and solution quality. The multi-period vehicle and technician routing problem is the subject of the VeRoLog Solver Challenge 2019. We develop a solution method that adapts to the limited computational budget and the given instance parameters. In summary, this thesis contributes to the structural analysis of the considered problems and proposes efficient heuristic solution methods that are effective even on large-scale instances and under tight restrictions of the computational budget. The methods combine global and local search approaches and take the available computational budget into account to realize an adaptive best-effort allocation of the resources.
660

Hardware-Efficient WDM/SDM Network : Smart Resource Allocation with SDN Controller / Maskinvarueffektivt WDM / SDM-nätverk : Smart resursallokering med SDN-controller

Liu, Lida January 2019 (has links)
Optical networking has been developing for decades and wavelength-division multiplexing (WDM) is the main technology used to carry signals in fiber-optical communication systems. However, its development has slowed because it is approaching the Shannon limit of nonlinear fiber transmission. Researchers are looking for multi dimensional multiplexing. Space-division multiplexing (SDM) is an ideal way to scale network capacities. The capacity of WDM/SDM network could be expanded to several times the capacity of WDM network but the active hardware devices may also increase by several times. This project aims to answer a practical question: How to construct a WDM/SDM network with less hardware resource? There is no mature research about WDM/SDM network yet. Therefore, the problem can be divided into two parts: (1) how to build a WDM/SDM network and (2) how to allocate resource and compute routes in such a network to minimize hardware resources. First, this thesis proposes a WDM/SDM node which has bypass connections between different fibers and architecture on demand (AoD) to effectively decrease the number of active hardware devices within the node. Then, two types of networks were constructed: one with bypass connections in each node and another one without any bypass connections. These networks were under the control of a software defined network (SDN) controller. The controller knew the wavelength resources within the networks. Several algorithms were applied to these networks to evaluate the effect of a bypass network and to identify the desired characteristics (to find short length path and decrease the probability of spectrum fragmentation) of an algorithm suitable for a network with bypass connections. The results of applying the proposed algorithms in two networks proved that the bypass connections increased the blocking probability in small topology but did not affect the results in large topology. The results in a large-scale network with bypass network were almost the same as the results in a network without bypass connections. Thus, bypass connections are suitable for large-scale network. / Optiskt nätverk har utvecklats i årtionden och våglängdsdelningsmultiplexering (WDM) är den viktigaste tekniken som används för att bära signaler i fiberoptiska kommunikationssystem. Utvecklingen har dock minskat eftersom den närmar sig Shannon-gränsen för olinjär fiberöverföring. Forskare letar efter flerdimensionell multiplexering. Space-division multiplexing (SDM) är ett idealiskt sätt att skala nätverkskapacitet. Kapaciteten för WDM / SDM-nätverk kan utökas till flera gånger WDM-nätverkets kapacitet, men de aktiva hårdvaraenheterna kan också öka med flera gånger. Projektet syftar till att svara på en praktisk fråga: Hur konstruerar jag ett WDM / SDM-nätverk med mindre hårdvara? Det finns ingen mogen forskning om WDM / SDM-nätverk än. Därför kan problemet delas in i två delar: (1) hur man bygger ett WDM / SDM-nätverk och (2) hur man fördelar resurser och beräknar rutter i ett sådant nätverk för att minimera hårdvaruressurser. Först föreslår denna avhandling en WDM / SDM-nod som har förbikopplingsanslutningar mellan olika fibrer och arkitektur på begäran (AoD) för att effektivt minska antalet aktiva hårdvaraenheter inom noden. Sedan konstruerades två typer av nätverk: en med bypass-anslutningar i varje nod och en annan utan några bypass-anslutningar. Dessa nätverk kontrollerades av en mjukvarudefinierad nätverkskontroller (SDN). Styrenheten visste våglängdsresurserna i nätverket. Flera algoritmer applicerades på dessa nätverk för att utvärdera effekten av ett förbikopplingsnätverk och för att identifiera de önskade egenskaperna (för att hitta en kort längdväg och minska sannolikheten för spektrumfragmentering) av en algoritm som är lämplig för ett nätverk med bypass-anslutningar. Resultaten av att tillämpa de föreslagna algoritmerna i två nät visade att förbikopplingsförbindelserna ökade blockeringssannolikheten i liten topologi men inte påverkade resultaten i stor topologi. Resultaten i ett storskaligt nätverk med bypass-nätverk var nästan samma som resultaten i ett nätverk utan bypass-anslutningar. Bypassanslutningar är således lämpliga för storskaliga nätverk.

Page generated in 0.0967 seconds