Notes

Algorithm

AVL tree AVL tree of height h has at most (n = 2^h – 1) and at least (n = F_{h+2}\geq \Omega(\Phi^h)) where (F_i) is (i)-th Fibonacci number and (\Phi = \frac{1 + \sqrt{5}}{2}). Note that ((T_{h+1} + 1) = (T_{h} + 1) + (T_{h-1} + 1) = F_{h+3}). Algorithm Definition…

End-to-end throughput of AdHoc network chain

We can derive end-to-end throughput decline curve as the length of AdHoc chain increases. $$Capacity = B log_2(1 + SNR)$$ This is Shannon capacity, and the following is the derived equation.  Throughput = C log_2\left(1 + \frac{SNR}{1 + SNR \sum\limits_{n = 2\frac{IR}{D}}^{h – 1} \frac{1}{\left(\left\lfloor \frac{n}{2}\right\rfloor +…

Internet security final

[Paper] Bot hunter 내부 네트웍의 모든 트래픽을 감시하는 IDS를 두고 아래와 같은 봇 모델에 맞는 behavior를 검색함 Scan을 찾는 모듈 (SCADE)로  e1과 e5를 찾음 Payload를 보는 모듈 (SLADE)로 e2를 찾음 Signature engine으로 e2, e3, e4를 찾음 [Paper] BotMiner Protocol- and structure-independent botnet detection Key idea: horizontal correlation C-plane clustering: BPS,…

ISS539 Midterm

Worm Virus v.s. Worm (Self-spreading) Worm history Morris worm Infected 6000 computers, 90% of them are not connected to the internet Code Red worm Attack web servers (buffer overflow) Epidemic Model Basic model Susceptible –> Removed Kermack-McKendric model Susceptible –> Infectious –> Removed Network Intrusion Delivering malicious payload Buffer…

Week 2, Thr

IP protocol Difference between flow control and congestion control Congestion control이 뭐지?

Week 1, tue,

AS Distinguished by routing policy. Usually an ISP

Wed 09/24 (week 4) Network Virtualization

FlowVisor Question: Is there any reason that the research network should be distributed across the world? –> In a large country, such as America, the time of different province may be different. Think about DTN deployment scenario. Difference from previous systems such as NOS or ONIX is that the user…

Mon 09/22 (week 4) Controller Scalability

SDN experiment는 mininet으로 할 수 있다.  참고: Mininet installation guide video Controller는 5가지 challenge를 가진다. generality, …(!!) 쪼끄만 네트웍에서는 centralized controller가 잘 먹히지만 커지면 문제가 생긴다. 와.. 상욱이형 슬라이드 잘 만들었다. Onix가 production quality로 implement 되어있었구나. evaluation controller capacity latency from dissemination mechanisms latency from ??? Onix can support 1M hosts…

Mon 09/01 (week 1) Introduction

Course web page: Piazza ‘How to have a bad career’ Project Final report: 10pt, two-column, 10+ page paper The project can be a literature review: writing a survey paper 10+ paper review –> 1 final summary paper