Computer supported collaborative applications on overlay networks are gaining popularity among users who are geographically dispersed. Examples of these kinds of applications include video-conferencing, distributed database replication, and online games. This type of application requires a multicasting subnetwork, using which messages should arrive at the destinations within a specified delay bound. These applications also require that destinations receive the message from the source at approximately the same time. The problem of finding a multicasting subnetwork with delay and delay-variation bound has been proved to be an NP complete problem in the literature and heuristics have been proposed for this problem. In this paper, we provide an efficient heuristic to obtain a multicast subnetwork on an overlay network, given a source and a set of destinations that is within a specified maximum delay and a specified maximum variation in the delays from a source to the destinations. The time-complexity of our algorithm is O(|E|+nk log(|E|/n)+m2k), where n and |E| are the number of nodes and edges in the network, respectively, k is the number of shortest paths determined, and m is the number of destinations. We have shown that our algorithm is significantly better in terms of time-complexity than existing algorithms for the same problem. Our extensive empirical studies indicate that our heuristic uses significantly less runtime in comparison with the best-known heuristics while achieving the tightest delay variation for a given end-to-end delay bound
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0INTRODUCTION
1.1STATEMENT OF PROBLEM
1.2PURPOSE OF STUDY
1.3AIMS AND OBJECTIVES
1.4SCOPE/DELIMITATIONS
1.5LIMITATIONS/CONSTRAINTS
1.6DEFINITION OF TERMS
CHAPTER TWO
2.0LITERATURE REVIEW
CHAPTER THREE
3.0METHODS FOR FACT FINDING AND DETAILED DISCUSSIONS OF THE SYSTEM
3.1 METHODOLOGIES FOR FACT-FINDING
3.2DISCUSSIONS
CHAPTER FOUR
4.0FUTURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1FUTURES
4.2IMPLICATIONS
4.3CHALLENGES
CHAPTER FIVE
5.0RECOMMENDATIONS, SUMMARY AND CONCLUSION
5.1RECOMMENDATION
5.2SUMMARY
5.3CONCLUSION
5.4REFERENCES
MUILTI CAST ROUTING WITH DELAY AND DELAY VARIATION CONSTRAINTS FOR COLLABORATIVE APPLICATION ON OVERLAY NETWORK
SOURCE CODE INCLUDED ABSTRACT In the fundamental operation in computer science, Graph algorithm is a great tool used to solve problems related to graph theory and this algorithms have wide applications in solving routing problems. For the purpose of this project four algorithms from the many types of graph algorithms were selected which are... Continue Reading
ABSTRACT This project examines the determinants of audit delay report in the 40 Nigeria listed companies and to find out the impact of selected corporate attributes, on audit delay in Nigeria. Timeliness of financial report is one of the attributes of good corporate governance identified by the... Continue Reading
ABSTRACT This project examines the determinants of audit delay report in the 40 Nigeria listed companies and to find out the impact of selected corporate attributes, on audit delay in Nigeria. Timeliness of financial report is one of the attributes of good corporate governance identified by the... Continue Reading
ABSTRACT Congestion and delay at the airport are used in measuring the performance indicator (PI) of an airport. One key determinant of the expected activities at a given aerodrome is the airfield component and characteristic in which the runway is of great significant. According to ICAO Annex 14 which addresses Aerodrome, runway is defined... Continue Reading
ABSTRACT This study examines the impact of audit delay on timeliness of financial reporting in Nigerian quoted companies. To empirically examine audit delay in Nigeria, secondary data were collected from the 2nd tier security market and some few food and leverages companies in order... Continue Reading
CHAPTER ONE INTRODUCTION Background of the Study “Financial reporting is the manner of communicating data on the activities of the organization to the users of accounting data; and the quality of financial reporting is a feature of the excellent of... Continue Reading
ABSTRACT A powerful and effective numerical tool called the Variational Iteration Method has been used to solve various kinds of differential equations over the years. Though the Variational Iteration Method has not been used solely to solve various kinds of differential equations as it has always been coupled with polynomials/transforms. The core... Continue Reading
ABSTRACT The Transmission Control Protocol (TCP) wad designed to provide reliable end-to-end delivery of data over unreliable networks. In practice most TCP deployments have been carefully designed in the context of wired networks. Ignoring the properties of wireless Ad hoc Network can lead to TCP implementations with poor performance. In order to... Continue Reading
ABSTRACT Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of... Continue Reading
ABSTRACT Multicast routing is an effective way to communicate among multiple hosts in a network. It outperforms the basic broadcast strategy by sharing resources along general links, while sending information to a set of predefined multiple destinations concurrently. However, it is vulnerable to component failure in ad hoc network due to the lack... Continue Reading