Selfish routing in the presence of side constraints

نویسندگان

  • George Karakostas
  • Stavros G. Kolliopoulos
چکیده

The natural approach for describing network flow problems is to introduce side constraints that capture restrictions of a logical or technological nature, e.g., capacity or budgetary constraints. We study the traffic equilibria arising from selfish routing of individual users in networks with side constraints. For the problem without side constraints the classic Wardrop principle suggests that in equilibrium for each origin-destination pair the latency on all the used routes is equal or less to the latency on all unused routes. In this paper we use a natural extension of the Wardrop principle [13] in order to obtain results on selfish routing with side constraints. The extended Wardrop principle suggests that in equilibrium flow is routed along paths of minimal latency according to a modified function that essentially incorporates penalty terms for the side constraints. This approach provides a basis for the systematic application of relevant optimization theory to selfish routing problems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

AODV & SAODV under Attack: Performance Comparison

AODV is a reactive MANET routing protocol that does not support security of routing messages. SAODV is an extension of the AODV routing protocol that is designed to fulfil security features of the routing messages. In this paper, we study the performance of both AODV and SAODV routing protocols under the presence of blackhole, grayhole, selfish and flooding attacks. We conclude that the perform...

متن کامل

Effect of Selfish Attack and Prevention Scheme on TCP and UDP in MANET

Mobile Ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure and centralized administration. Due to security vulnerabilities of the routing protocols, Mobile ad hoc networks may be unprotected against attacks by the malicious nodes. One of these attacks is the Selfish Attack against network integrity absorbing all routing packets as well as...

متن کامل

Network Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment

Abstract- Efficient message delivery in city environment is required to ensure driver’s safety and passenger’s comfortability. In cities of developed nations, routing of data in vehicular Ad hoc Network (VANET) faces many challenges such as radio obstacles, mobility constraints and uneven nodes distribution. These factors primarily makes communication between vehicles complex. To overcome and t...

متن کامل

The Special Application of Vehicle Routing Problem with Uncertainty Travel Times: Locomotive Routing Problem

This paper aims to study the locomotive routing problem (LRP) which is one of the most important problems in railroad scheduling in view of involving expensive assets and high cost of operating locomotives. This problem is assigning a fleet of locomotives to a network of trains to provide sufficient power to pull them from their origins to destinations by satisfying a rich set of operational con...

متن کامل

A novel bi-objective reliable location routing model considering impedance function under demand-side and supply-side uncertainty (A Case study)

Reliable location routing problem considers a location problem and a vehicle routing problem in order to select the optimal location of facilities and at the same time the optimal routes for vehicles considering the unexpected failure for facilities in which, all facilities may fail with a probability. In this paper, a bi-objective mathematical model has been developed to minimize the total cos...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003