Disaster Management In IP Networks Using Automatic Node or Link Remapping
|
|
- Dwayne Ferguson
- 5 years ago
- Views:
Transcription
1 Disaster Management In IP Networks Using Automatic Node or Link Remapping Mr. Issac Syam Sundar Palli #1, RojaRani Govada #2, Bhavya Badisa #3, Asha Jyothi Goli #4 #1 Assistant Professor, #2,#3,#4 Final Year Students Department of Computer Science & Engineering Andhra Loyola Institute of Engineering and Technology,Vijayawada-8 Abstract: Internet plays an important part in communication environment; the working procedure of approaches which are used for routing as soon as a network failure occurs has become a major issue. For a recovering of link or failed node existing in the networks, a fresh method can be used for recovery known as Link or Node Remapping (LNR) is used. It is implemented with some major changes to already existing methods. It is used for obtaining better scalability, backup path lengths, and distribution of load over each and every node after a failure. LNR is used to estimate the traffic demands within a network and thereby improve the distribution of traffic which was recovered reducing the congestion occurrence chance. Keywords: LNR, Networking, Link Node Remapping, routing protocols I. INTRODUCTION The inter net is being changed from time to time. The requests on Internet dependability and accessibility. An unsettling impact of a relationship in primary parts of a system can affect a huge number of telephone discoursed or TCP relationship, with clear antagonistic impacts. The ability to recover from mishaps has constantly been a focal diagram objective in the Internet. IP frameworks are naturally intense, since IGP coordinating traditions like OSPF are proposed to invigorate the sending information in light of the changed topology after a mishap. The re-union expect full dispersal of the new association state to all switches in the framework space. At the point when the new state data is conveyed, every switch separately computes new legitimate steering tables. This framework wide IP rejoining is a dreary methodology, an association or center dissatisfaction is usually trailed by a period of coordinating trickiness. In the midst of this period, distributes dropped due to invalid courses. This wonder has been analyzed in the both IGP and BGP setting, and adversity influences nonstop applications. Events provoking are-union have been seemed to happen frequently. Much effort has been given to overhauling the particular steps of the converging of IP coordinating, i.e., revelation, dispersal of information and most concise way tally, however the joining time is still excessively sweeping for applications with continuous solicitations. A key issue is that since most framework frustrations are brief, too much speedy initiating of the re-union process can achieve course rippling and extended framework wobbliness. A. Motivation Directing occasions affect numerous ways in the Internet, yet current dynamic topology mapping methods screen ways freely. Distinguishing a guiding event on one Internet way does not trigger any estimations on different maybe influenced ways. This approach prompts out of date and clashing directing information.we portray directing occasions in the Internet and examine testing techniques to productively distinguish ways affected by a steering occasion. Our outcomes demonstrate that focused testing can help us rapidly remap steering occasions and keep up additional a la mode and predictable topology maps. B. Problem Statement Much exertion has been centered around streamlining the various strides of the joining of IP coordinating, i.e., recognizing verification, diffusing of data and most succinct way estimation, however the union time is still unreasonably huge for applications with unfaltering requests[6]. A key issue is that since most framework frustrations are brief, too much quick actuating of the re-joining technique can achieve course vacillating and extended framework flimsiness.the IGP meeting technique is immediate since it is open and around the globe. It responds to an oversight after it has happened, and it joins every one of the switches in the locale. In this paper we show another game plan for overseeing affiliation and focus point disappointments in IP structures. Connection or Node Rerouting (LNR) is predefined and nearby, which permits healing in the scope of milliseconds. LNR permits bundle sending to proceed over pre - designed option next-jumps promptly after the location of the setback. Using LNR as a first line of hindrance against framework misfortunes, the run of the mill IP union process can be put on hold. This methodology is then begun similarly therefore ISSN: Page 93
2 of non-transient misfortunes. Since no overall rerouting is performed, brisk difficulty recognizable proof frameworks like fast invites or hardware alerts can be used to trigger LNR without bartering framework reliability [8]. LNR guarantees mending from any single association or center point misfortune, which constitutes a tremendous bigger piece of the mishaps experienced in a framework. 1) Problem Definition In existing system we cannot recover or re-establish the multiple links or multiple nodes failure in a single connection which was established to the links or nodes. 2) Detailed Problem Description Lately the Web has been transformed from an unprecedented reason framework to an all inclusive stage for a broad assortment of standard correspondence organizations. The solicitations on Internet resolute quality and availability have extended suitably. An unsettling impact of a relationship in focal parts of a system can affect a gigantic number of telephone discoursed or TCP relationship, with clear negative impacts. The ability to recover from difficulties has reliably been a central arrangement objective in the Internet. IP frameworks are naturally overwhelming, since IGP guiding traditions like OSPF are proposed to revive the sending information I light of the changed topology after a misfortune. This rejoining acknowledges full transport of the new association state to all switches in the framework space. Right when the new state information is scattered, each switch only learns new generous coordinating tables. This system wide IP remeeting is a dreary technique, and an affiliation or focus disappointment is normally trailed by a time of managing unsteadiness. Amidst this period, bundles might be dropped in light of invalid courses. This ponder has been considered in both IGP and BGP setting, and affliction impacts relentless applications. Events inciting a re-union have been seemed to happen in many cases, and are regularly activated by outer directing conventions. The essential thought of LNR is as per the following: Each source to goal transmission keeps up unique course. To begin with most limited way is taken as a unique course. These most limited ways are figured by utilizing the OSPF calculation. At to begin with, data packs will be transmitted using this remarkable course. In this source to objective transmission, any sudden occasion of center point or association misfortune happens, indicate transmission is gave way. At this moment LNR uses the schedule vacancy segment. If a mishap is happened we will give the schedule opening, infers give somewhere in the range os a chance to misfortune recuperating before changing the course. Inside the schedule opening, if the mishap is recovered then data is transmitted by using the primary course just data is transmitted by using the fortification course and send the testing for misfortune mending. In the midst of the support course transmission, if mishap is recovered, then fortification course transmission is ended and again reuses the main course. By reusing the main course we can improve the snappiness of directing, since the support course is longer than the primary course. II. LITERATURE SURVEY There was a enormous headway in the Internet prior decade and has now changed into the fundamental data foundation for the applications of individual and trade related. It is required to be constantly accessible as it is basic to our well ordered business, social and social activities. Benefit interruption for even a brief term could be disastrous in the realm of on line business, bringing about financial harm and additionally discoloring the notoriety of a system specialist co-op. Also, many developing administrations, for example, voice over IP and virtual private structures for back and other advancing business applications require stringent association accessibility and steadfast quality. Lamentably, setbacks are genuinely regular in the ordinary operation of a system because of different causes, for example, interface setbacks and so forth. The key considered LNR is to make a little course of action of fortification framework outlines using the framework chart and the related association weights. The association weights in these fortification setups are controlled so that the center that perceives the misfortune can safely forward the moving towards bundles towards the objective on a substitute association. LNR expect that the framework uses briefest way directing and objective based bob by-hop sending. The moving of action to joins bypassing the mishap can incite stop up and package incident-in parts of the framework. This limits the time that the predefined mending arrangement can be used to forward action before the overall coordinating tradition is taught about the mishap,and subsequently diminishes the gave that a transient difficultly can be managed without a full overall guiding redesign. Ideally, a predefined mending arrangement should guarantee organize after a difficultly, and in addition do all things considered in a way that does not realize an inadmissible load assignment. This essential has been noted as begin one of the primary troubles for per-processed IP recuperating plans. The association weights, if there ought to be an event of LNR are set automatically in each support setup. This gives exceptional flexibility in regards to how the recovered development is controlled. The fortification plan used after a mishap is picked in perspective of the misfortune event, and in this way we can pick interface weights in the support setups that are proper for only a subset of difficult examples. This procedure is then begun similarly as a result of non-transient thwarted expectations. Since no general recoordinating is performed, quick disappointment ISSN: Page 94
3 unmistakable evidence sections like smart welcomes or equipment alarms can be utilized to trigger MRC without trading structure security [8]. MRC ensures recuperation from any single affiliation or focus disappointment, which constitutes a broad lion's share of the misstep experienced in a structure [7]. The association weights in these support plans are controlled so that for every association and center point dissatisfaction, and paying little regard to whether it is an association or center frustration, the center point that perceives the mistake can safely forward the moving toward groups towards the objective on a substitute association. MRC acknowledge that the framework uses most restricted way guiding and objective based hop-by-hop sending. The capacity to recoup from setbacks has dependably been a focal plan objective in the Net [1]. Networks are naturally vigorous, since OSPF was intended to refresh the sending data in view of the changed topology after a setback. appropriation of the new connection state to all switches in This re-meeting expect full the system space. At the point when the new state data is disseminated, every switch independently computes new legitimate steering tables. Thus system wide IP re-configuring is of tough collection of steps, and a connection or hub break down is generally pursued by a time of directing vulnerability. In the midst of the cost of time, parcels may be lost because of invalid; connections. This wonder has been mulled over in IGP [2] and BGP setting [3], and affliction impacts consistent applications[4].instances triggered re-meeting have been assumed to happen regularly[5].the moving improvement to joins bypassing the slip-up can impel stop up and bundle hardship n parts of the system[9].preferably, a predefined recuperation mastermind ought not just ensure compose after a disappointment,this need has been noted as being one of the essential inconveniences for pre - found IP recuperation organizes[10] The moving of development to joins bypassing the mistake can incite stop up and package hardship in parts of the framework [9]. Ideally, a predefined recovery arrange should not simply guarantee organize after a failure, This need has been noted as being one of the primary troubles for pre - discovered IP recovery arranges [10]. In this paper "Fast Recovery Approaches from Failures in IP Networks", according to P.Rajasekar :Internet is altered and contains high level requests on QoS and accessing similar networks which may be related to business entertainement along with some online apps,wireless data transfer etc.in a considerable lot of the applications, even little administration aggravations, happened because of route connecting can swing to be deplorable execution debasement. Numerous new strategies were created for recuperating from setbacks inside Ip systems with predefined reinforcement way counts and burrowing inside IP arrange. The bundle to the following jump hub system can recouped from its first setback, as the parcel is directed over the insurance diagram relating to that assurance address. Internet has changed and contains tough demands on strength and availability, like networks related to business, games which are played on line, wireless transmission, and video conferencing. In many of the applications, even small service disturbances occurred due to route linking can turn to be unbearable performance devaluation. Many new methods were developed only to heal from a failure within any networks along many backup route statistics and transfers within IP network. The method which was introduced primarily provided resilience. By passing the packet to the next-hop node network can recover from its first failure, because the graph is traversed with the packet which contains the secured address. In this paper "Stability Issues in OSPF Routing", According to Riecke Bell.G: OSPF protocol is given more importance for stability. Mainly three measures of stability are considered. Much analysis was made under 3 different outlines:(a) some networks which locate OSPF along with traffic engineering add-ons,(b) some networks which utilize substitute HELLO timers, and(c)on systems that utilization elective techniques for refreshing vertices-links data. These investigation was done on a network which contains 292 vertices and 765 links. III. EXISTING SYSTEM The already existing algorithms or methods which are introduced for working over load distribution in connectionless IGP networks were successful in some cases but not in all cases. They may concentrate on the failure free condition or checking weights which are to be checked when a link failure occurs.large positions of the techniques enrolled in this class give rich and capable responses for snappy framework healing however LNR and Not-through burreoing is in every way the priciple two covering all surveyed requirements.in any case,lnr offers a similar usefulness with an easier and more strong approach, and utilized for better streaming as for load adjusting. Class give rich and predefined answers for quick system healing,however LNR and Not-by means of burrowing is from every angle the fundamental two covering all evaluated necessities. IN any case LNR offers a similar usefulness with a less difficult and more strong approach, and utilized for better streamlining concerning load adjusting. Class give rich and proficient answers for quick system recuperation, however LNR and Not-by means of burrowing is by all accounts the main two covering all assessed prerequisites. However, LNR offers a similar usefulness with a less complex and more strong approach, and utilize for better improvement as for load adjusting. ISSN: Page 95
4 IV. PROPOSED SYSTEM While the problems are being solved using the existing methods, the proposed method named as LNR scheme achieves Recovery in every possible single failure cases, by utilizing this strategy to deal with no of vertices as well as linking setbacks, and with no knowledge of underlying router of the setback. LNR is full swore focuses just on destination based. LNR stores advanced routes information for routing and forwards packet in alternative route whenever a link is failed or a node is deactivated. A. Basic Operations Link failure detection Node failure detection Shortest path calculation Backup maintenance of paths Identifying new paths Rectifying the failure inks/nodes. B. System Architecture A framework configuration is a hypothetical model that depicts the structure, direct, and more perspectives of a framework. A framework outline is a formal portrayal and delineation of a system, dealt with a way that support examining the structures and practices of the structure. A framework configuration can contain structure sections that will collaborate to execute the general system. There have been endeavors to formalize dialects to depict framework engineering, all things considered these are called design portrayal dialects. V. OUTPUT Figure 2: Transferring data in Client 1 In the above figure, client1 is initiated and starts data transmission as client1 acts as source of data. Figure 3:Transferring Data Through Server In the above figure the data is transmitted to the server (destination). Figure 1: System Architecture The above system architecture figure shows the complete flow of steps for routing. VI. CONCLUSION Link or Node Remapping is a method used to elevate speed retrieval within networks. LNR is an enhanced routing configuration added to routers for efficient routing over failed routes or links. LNR precisely maintains recovery from link failure within a random network. LNR immediately responds on failure discovery, by means of different measures which are available locally. VII.FUTURE WORK This procedure can be implemented over other types of environments as well as with combination of other routing protocols. REFERENCES 1. D. D. Clark, The design philosophy of the DARPA internet protocols, SIGCOMM, Computer Communications Review, vol. 18, no. 4, pp , Aug ISSN: Page 96
5 2. A. Basu and J. G. Riecke, Stability issues in OSPF routing, in Proceedings of SIGCOMM, San Diego, California, USA, Aug. 2001, pp C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian, Delayed Internet Routing Convergence, IEEE/ACM Transactions on Networking, vol. 9, no. 3, pp , June C. Boutremans, G. Iannaccone, and C. Diot, Impact of link failures on VoIP performance, in Proceedings of International Workshop on Network and Operating System Support for Digital Audio and Video, 2002, pp D. Watson, F. Jahanian, and C. Labovitz, Experiences with monitoring OSPF on a regional service provider network, in ICDCS 03: Proceedings of the 23rd International Conference on Distributed Computing Systems. Washington, DC, USA: IEEE Computer Society, 2003, pp P. Francois, C. Filsfils, J. Evans, and O. Bonaventure, Achieving sub-second IGP convergence in large IP networks, ACM SIGCOMM Computer Communication Review, vol. 35, no. 2, pp , July A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C.-N.Chuah, and C. Diot, Characterization of failures in an IP backbone network, in Proceedings INFOCOM, Mar S. Nelakuditi, S. Lee, Y. Yu, Z.-L. Zhang,, and C.-N. Chuah, Fast local rerouting for handling transient link failures, IEEE/ACM Transactions on Networking, vol. 15, no. 2, pp , apr S. Iyer, S. Bhattacharyya, N. Taft, and C. Diot, An approach to alleviate link overload as observed on an IP backbone, in Proceedings INFOCOM, Mar. 2003, pp S. Rai, B. Mukherjee, and O. Deshpande, IP resilience within an autonomous system: Current approaches, challenges, and future directions, IEEE Communications Magazine, vol. 43, no. 10, pp , Oct S. Bryant, M. Shand, and S. Previdi, IP fast reroute using not-via addresses, Internet Draft (work in progress), June 2007, draft-ietfrtgwgipfrr-notvia-addresses P. Francois, O. Bonaventure, and M. Shand, Disruption free topology reconfiguration in OSPF networks, in Proceedings INFOCOM, Anchorage, AK, USA, may ISSN: Page 97
Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume2 Issue 8 August, 2013 Page No. 2628-2634 Multiple Routing Configurations For Fast Ip Network Recovery Sk.Meeravali
More informationFast IP Network Recovery using MRC
International Journal of Research in Computer Science ISSN 2249-8257 Volume 1 Issue 1 (2011) pp. 75-88 White Globe Publications www.ijorcs.org Fast IP Network Recovery using MRC T.K Rajesh 1, N. Sreenivasulu
More informationDeterministic Routing in OSPF for Post Single Link Failure
Deterministic Routing in OSPF for Post Single Link Failure Dnyaneshwar Dhangar 1, Sachin Bojewar 2 1 (Information Technology/ Mumbai, India) 1 (Information Technology/ Mumbai, India) ABSTRACT : In the
More informationOSPF with Deterministic Routing
OSPF with Deterministic Routing Sachin Bojewar Associate Professor, Vidyalankar Institute of Technology, Wadala, Mumbai, India Dnyaneshwar Dhangar Vidyalankar Institute of Technology, Wadala, Mumbai, India
More informationOrdered FIB Updates. draft-francois-ordered-fib-01.txt. Pierre Francois Olivier Bonaventure Mike Shand Stefano Previdi Stewart Bryant
Ordered FIB Updates draft-francois-ordered-fib-01.txt Pierre Francois Olivier Bonaventure Mike Shand Stefano Previdi Stewart Bryant Outline Quick reminder on ordered FIB updates Convergence time of ordered
More informationLink/Node Failure Recovery through Backup Path Lengths
Link/Node Failure Recovery through Backup Path Lengths Ravula Prathap Kumar, Banothu Balaji, Dasari Yakobu, N Sai Bala Kishore Department of Computer Science and Engineering, Vignan University, Guntur,
More informationNetwork Recovery using an Automatic Error Recovery Network Approach
Network Recovery using an Automatic Error Recovery Network Approach Dileep Kumar Gopaluni 1, R Praveen Sam 2 1 Research and Development Center, Bharathiar University, Coimbatore, India. dileep.gopaluni@gmail.com
More informationFramework of Vertical Multi-homing in IPv6-based NGN
ITU-T Recommendation Y.ipv6-vmh Framework of Vertical Multi-homing in IPv6-based NGN Summary This Recommendation describes a framework of vertical multi-homing in IPv6-based NGN. This Recommendation identifies
More informationEnhancing TCP performance in IP fast reroute
Title Enhancing TCP performance in IP fast reroute Author(s) Mao, M; Wen, Z; Yeung, LK Citation The IEEE International Conference on Communications (ICC 2012), Ottawa, ON., 10-15 June 2012. In IEEE International
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 173 A Review of Various Approaches to Multipath Routing Maryada M.Tech. Student, Department of Computer Science
More informationPhysical-Layer Communication Recovery for Heterogeneous Network
Physical-Layer Communication Recovery for Heterogeneous Network Po-Kai Tseng 1, Wei-Ho Chung 1, Kate Ching-Ju Lin 1, Chi-Sheng Shih 2, and Ling-Jyh Chen 3 1 Research Center for Information Technology Innovation,
More informationScope and Sequence: CCNA Discovery
Scope and Sequence: CCNA Discovery Last updated June 19, 2009 Target Audience The Cisco CCNA Discovery curriculum is primarily designed for Cisco Networking Academy students who are seeking entry-level
More informationCCNA-A Scope and Sequence (March 2007-Draft)
CCNA-A Scope and Sequence (March 2007-Draft) This document is a preliminary overview of the new CCNA-A curriculum and is subject to change since the courses are still under development. The English versions
More informationEnhanced Multipath Routing And Proactive Route Maintenance For Congestion Minimization And Transient Link Failures
Enhanced Multipath Routing And Proactive Route Maintenance For Congestion Minimization And Transient Link Failures Selvamani K 1, Kanimozhi S 2, Elakkiya R 3 and Kannan A 4 1,3 Department of Computer Science
More informationIP Failure Handling Using Localized On-Demand Link State Routing
RESEARCH ARTICLE IP Failure Handling Using Localized On-Demand Link State Routing Prof. S.M.Sangve, Sushil Warkar, Amit Shirke, Kunal Solanke, Pratap Patil, Department of Computer Science and Engineering,
More informationENHANCING NETWORK SURVIVABILITY USING ROUTING AND LINK WEIGHT ASSIGNMENT TO AVOID CONGESTION
P.-K. Tseng et al., Int. J. of Safety and Security Eng., Vol. 5, No. 1 (2015) 29 47 ENHANCING NETWORK SURVIVABILITY USING ROUTING AND LINK WEIGHT ASSIGNMENT TO AVOID CONGESTION P.-K. TSENG, W.-H. CHUNG,
More informationMitigation of Transient Loops in IGP Networks
Mitigation of Transient Loops in IGP Networks Mohammed Yousef 1, David K. Hunter 1 1 School of Computer Science and Electronic Engineering, University of Essex, Wivenhoe Park, Colchester, Essex CO4 3SQ,
More informationDeploying MPLS & DiffServ
Deploying MPLS & DiffServ Thomas Telkamp Director, Data Architecture & Technology Global Crossing Telecommunications, Inc. telkamp@gblx.net MPLS and DiffServ technologies are getting a lot of attention
More informationAchieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes
Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes Yu Guo, Ning Wang, Kin-Hon Ho, Michael Howarth, and George Pavlou 2 Centre for Communication Systems Research, University
More informationResilient IP Backbones. Debanjan Saha Tellium, Inc.
Resilient IP Backbones Debanjan Saha Tellium, Inc. dsaha@tellium.com 1 Outline Industry overview IP backbone alternatives IP-over-DWDM IP-over-OTN Traffic routing & planning Network case studies Research
More informationAvoiding Transient Loops through Interface-Specific Forwarding
Avoiding Transient Loops through Interface-Specific Forwarding Zifei Zhong, Ram Keralapura 2, Srihari Nelakuditi, Yinzhe Yu 3, Junling Wang, Chen-Nee Chuah 2, and Sanghwan Lee 3 Department of Computer
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationScope and Sequence: CCNA Discovery
Scope and Sequence: CCNA Discovery Last updated April 22, 2008 Target Audience CCNA Discovery is primarily designed for Cisco Networking Academy students who are looking for career-oriented, information
More informationQuery Result Extraction Using Dynamic Query Forms
Query Result Extraction Using Dynamic Query Forms #1 Mrs. I. Anitha Rani, #2 Y.Vijay, #3 Abdul Moseen #1 Assistant Professor, Department of Computer Science Engineering,Andhra Loyola Institute Of Engineering
More informationInternational Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN
International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization
More informationMulticast Subsecond Convergence
Multicast Subsecond Convergence First Published: July 22, 2002 Last Updated: September 10, 2010 The Multicast Subsecond Convergence feature comprises a comprehensive set of features and protocol enhancements
More informationProtected Packet Routing: Achieving Fast Failure Recovery in the IP Layer
Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer Kang Xi and H. Jonathan Chao April 00 New York State CENTER FOR ADVANCED TECHNOLOGY IN TELECOMMUNICATIONS Supported by the New
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationOn the Impact of Route Processing and MRAI Timers on BGP Convergence Times
On the Impact of Route Processing and MRAI Timers on BGP Convergence Times Shivani Deshpande and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute, Troy, NY 12180 Abstract Fast convergence
More informationROBUST ROUTING INFORMATION UPDATING IN IPV6 NETWORKS. Cosmin Adomnicăi, Viorel Mînzu
ELECTROTECHNICS, ELECTRONICS, AUTOMATIC CONTROL, INFORMATICS ROBUST ROUTING INFORMATION UPDATING IN IPV6 NETWORKS Cosmin Adomnicăi, Viorel Mînzu Faculty of Automatics, Computer science, Electrical and
More informationProtected and Effective Transmission of Data in Peer-To-Peer Network Using SGA
Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Sushma T Shanbhogue 1, Poonguzhali E 2 P.G. Student, Department of Computer Engineering, AMC Engineering College, Bangalore,
More informationAn Experimental Analysis on OSPF-TE Convergence Time
An Experimental Analysis on OSPF-TE Convergence Time S. Huang* a, K. Kitayama a, F. Cugini b, F. Paolucci c, A. Giorgetti c, L. Valcarenghi c, P. Castoldi c a Osaka University, Osaka, Japan; b CNIT, Pisa,
More informationWhat is the difference between unicast and multicast? (P# 114)
1 FINAL TERM FALL2011 (eagle_eye) CS610 current final term subjective all solved data by eagle_eye MY paper of CS610 COPUTER NETWORKS There were 30 MCQs Question no. 31 (Marks2) Find the class in 00000001.001011.1001.111
More informationHow Cisco IT Simplified Network Growth with EIGRP
Cisco IT Case Study May 2013 EIGRP Implementation How Cisco IT Simplified Network Growth with EIGRP EXECUTIVE SUMMARY CHALLENGE Simplify global expansion Add tens of thousands of home offices to network
More informationA New Backup Topology Design Method for Congestion Avoidance in IP Fast Reroute
International Journal of Networks and Communications 2012, 2(5): 123-131 DOI: 10.5923/j.ijnc.20120205.05 A New Backup Topology Design Method for Congestion Avoidance in IP Fast Reroute Simon Tembo 1,*,
More informationBased on Distance Comparison Shortest Path Algorithm
Volume 118 No. 20 2018, 853-860 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Based on Distance Comparison Shortest Path Algorithm 1 Y. NavyaSri, 2 K. Meghana, 3 D. Nageswari and
More informationProactive Network Management of IPTV Networks
Proactive Network Management of IPTV Networks Rakesh K. Sinha, K. K. Ramakrishnan, Bob Doverspike, Dahai Xu, Jorge Pastor, Aman Shaikh, Seungjoon Lee, Chris Chase AT&T Labs - Research, New Jersey, USA
More informationReliable IPTV Transport Network. Dongmei Wang AT&T labs-research Florham Park, NJ
Reliable IPTV Transport Network Dongmei Wang AT&T labs-research Florham Park, NJ Page 2 Outline Background on IPTV Motivations for IPTV Technical challenges How to design a reliable IPTV backbone network
More informationRandom Neural Networks for the Adaptive Control of Packet Networks
Random Neural Networks for the Adaptive Control of Packet Networks Michael Gellman and Peixiang Liu Dept. of Electrical & Electronic Eng., Imperial College London {m.gellman,p.liu}@imperial.ac.uk Abstract.
More informationTIME SYNCHRONIZATION TEST SOLUTION FROM VERYX TECHNOLOGIES
TIME SYNCHRONIZATION TEST SOLUTION FROM VERYX TECHNOLOGIES CONTENTS Introduction... 1 1588v2 Overview... 1 SyncE overview... 2 VERYX capability... 2 1588v2 Test Coverage... 2 Time Sync Application Test
More informationConvergence Routing Analysis in IPv6 Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735 PP 18-24 www.iosrjournals.org Convergence Routing Analysis in IPv6 Networks S.Arun Kumar 1 and
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016
RESEARCH ARTICLE OPEN ACCESS Investigating the Impact of Simulation Time on Convergence Activity & Duration of EIGRP, OSPF Routing Protocols under Link Failure and Link Recovery in WAN Using OPNET Modeler
More informationMitigating Link Failures and Implementing Security Mechanism in Multipath Flows for Data Plane Resources
World Engineering & Applied Sciences Journal 7 (4): 212-219, 2016 ISSN 2079-2204 IDOSI Publications, 2016 DOI: 10.5829/idosi.weasj.2016.212.219 Mitigating Link Failures and Implementing Security Mechanism
More informationElimination Of Redundant Data using user Centric Data in Delay Tolerant Network
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant
More informationImplementing Cisco IP Routing
ROUTE Implementing Cisco IP Routing Volume 3 Version 1.0 Student Guide Text Part Number: 97-2816-02 DISCLAIMER WARRANTY: THIS CONTENT IS BEING PROVIDED AS IS. CISCO MAKES AND YOU RECEIVE NO WARRANTIES
More informationCybersecurity was nonexistent for most network data exchanges until around 1994.
1 The Advanced Research Projects Agency Network (ARPANET) started with the Stanford Research Institute (now SRI International) and the University of California, Los Angeles (UCLA) in 1960. In 1970, ARPANET
More informationHP A5820X & A5800 Switch Series MPLS. Configuration Guide. Abstract
HP A5820X & A5800 Switch Series MPLS Configuration Guide Abstract This document describes the software features for the HP 5820X & 5800 Series products and guides you through the software configuration
More informationA hassle-free network for communications assurance
China Unicom Zhuhai A hassle-free network for communications assurance China Unicom Zhuhai has successfully cut over to the optimized MSC Pool solution, helping it achieve one-time service recovery and
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationLook-ahead Type Detour Path Management Methods Yu Miyoshi, Tatsuyuki Kimura, and Yoshihiro Otsuka
Look-ahead Type Detour Path Management Methods Yu Miyoshi, Tatsuyuki Kimura, and Yoshihiro Otsuka Abstract We describe a look-ahead type detour path specification method that can specify in advance detour
More informationLecture - 14 Transport Layer IV (Reliability)
Computer Networks and Internet Protocol Prof. Sandip Chakraborthy Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 14 Transport Layer IV (Reliability)
More informationAn Approach for Enhanced Performance of Packet Transmission over Packet Switched Network
ISSN (e): 2250 3005 Volume, 06 Issue, 04 April 2016 International Journal of Computational Engineering Research (IJCER) An Approach for Enhanced Performance of Packet Transmission over Packet Switched
More informationA NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT
A NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT Mohd Nazri Ismail Faculty of MIIT, University of Kuala Lumpur (UniKL), MALAYSIA, mnazrii@miit.unikl.edu.my Abstract Most
More informationA proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing
A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing Yuki Katsurai *, Yoshitaka Nakamura **, and Osamu Takahashi ** * Graduate School
More informationSubnet Multicast for Delivery of One-to-Many Multicast Applications
Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting
More informationLow pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2002; 15:899 906 (DOI: 10.1002/dac.571) Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationOn TCP friendliness of VOIP traffic
On TCP friendliness of VOIP traffic By Rashmi Parthasarathy WSU ID # 10975537 A report submitted in partial fulfillment of the requirements of CptS 555 Electrical Engineering and Computer Science Department
More informationPresenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks
Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali
More informationProgress Report No. 15. Shared Segments Protection
NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury
More informationLOUP: The Principles and Practice of Intra-Domain Route Dissemination. Nikola Gvozdiev, Brad Karp, Mark Handley
LOUP: The Principles and Practice of Intra-Domain Route Dissemination Nikola Gvozdiev, Brad Karp, Mark Handley The Rising Tide of Reachability Expectations Internet users expect any-to-any reachability:
More informationQoS-Aware IPTV Routing Algorithms
QoS-Aware IPTV Routing Algorithms Patrick McDonagh, Philip Perry, Liam Murphy. School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4. {patrick.mcdonagh, philip.perry,
More informationCisco Service Advertisement Framework Deployment Guide
Cisco Service Advertisement Framework Deployment Guide What You Will Learn Cisco Service Advertisement Framework (SAF) is a network-based, scalable, bandwidth-efficient approach to service advertisement
More informationAnalyzing Causes of Failures in the Global Research Network Using Active Measurements
Analyzing Causes of Failures in the Global Research Network Using Active Measurements Eugene S. Myakotnykh, Bjarne E. Helvik Centre for Quantifiable Quality of Service in Communication Systems (Q2S) 1
More informationTowards Distributed Router Architectures and Centralized Control Architectures in IP Networks
Towards Distributed Router Architectures and Centralized Control Architectures in IP Networks Jing Fu 1, Peter Sjödin 2, and Gunnar Karlsson 1 1 ACCESS Linnaeus Center, School of Electrical Engineering
More informationData Networks. Lecture 1: Introduction. September 4, 2008
Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:
More informationProducing Graphical User Interface from Activity Diagrams Ebitisam K. Elberkawi, Mohamed M. Elammari
Producing Graphical User Interface from Activity Diagrams Ebitisam K. Elberkawi, Mohamed M. Elammari Abstract Graphical User Interface (GUI) is essential to programming, as is any other characteristic
More informationINTRODUCTION TO CROSS LAYER DESIGN AND CROSS LAYER BASIC SCHEMES
INTRODUCTION TO CROSS LAYER DESIGN AND CROSS LAYER BASIC SCHEMES Chapter 2: INTRODUCTION TO CROSS LAYER DESIGN AND CROSS LAYER BASIC SCHEMES 2.1-Introduction to Cross Layer Design: Cross layer optimization
More informationIN a mobile ad hoc network, nodes move arbitrarily.
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make
More informationMobile SCTP for IP Mobility Support in All-IP Networks
Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming
More informationCHAPTER I INTRODUCTION. In Communication Networks, Survivability is an important factor
1 CHAPTER I INTRODUCTION In Communication Networks, Survivability is an important factor to be considered in planning and designing of Survivable Fiber Optic Networks (SFON). Survivability depicts network
More informationConfiguring MPLS L3VPN
Contents Configuring MPLS L3VPN 1 MPLS L3VPN overview 1 Introduction to MPLS L3VPN 1 MPLS L3VPN concepts 2 MPLS L3VPN packet forwarding 5 MPLS L3VPN networking schemes 5 MPLS L3VPN routing information
More information(Refer Slide Time: 01:08 to 01:25min)
COMPUTER NETWORKS Prof. Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture-27 RIP- Distance Vector Routing We have seen basic routing. Now we will
More informationBidirectional Forwarding Detection
Bidirectional Forwarding Detection This document describes how to enable the Bidirectional Forwarding Detection (BFD) protocol. BFD is a detection protocol designed to provide fast forwarding path failure
More informationMulticast Transport Protocol Analysis: Self-Similar Sources *
Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,
More informationA Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks
A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior
More informationHands-On Troubleshooting IPTV with WireShark
Hands-On Course Description This Hands-On course will enable attendees to upgrade their knowledge about how Video and Television is carried over IP in state-of-the art systems. At the end of the course
More informationArchitectural Principles of the Internet
TLEN7000/ECEN7002: Analytical Foundations of Networks Architectural Principles of the Internet Lijun Chen 11/27/2012 The Internet Protocol Stack TCP/IP was first proposed in 1973 The specifications are
More informationVirtualization and Softwarization Technologies for End-to-end Networking
ization and Softwarization Technologies for End-to-end Networking Naoki Oguchi Toru Katagiri Kazuki Matsui Xi Wang Motoyoshi Sekiya The emergence of 5th generation mobile networks (5G) and Internet of
More informationCore Membership Computation for Succinct Representations of Coalitional Games
Core Membership Computation for Succinct Representations of Coalitional Games Xi Alice Gao May 11, 2009 Abstract In this paper, I compare and contrast two formal results on the computational complexity
More informationEnhancement of Lifetime Ratio in Wireless Sensor Network Using Genetic Algorithm
Enhancement of Lifetime Ratio in Wireless Sensor Network Using Genetic Algorithm Rashmi M and Dr. Rekha K.R and Dr. Nataraj K. R 1 PG student, Digital Communication and Networking, SJBIT, Bangalore, India.
More informationInternet Research Task Force (IRTF) Category: Informational May 2011 ISSN:
Internet Research Task Force (IRTF) T. Li, Ed. Request for Comments: 6227 Cisco Systems, Inc. Category: Informational May 2011 ISSN: 2070-1721 Abstract Design Goals for Scalable Internet Routing It is
More informationA Survey of Congestion Control in Proactive Source Routing Protocol in Mobile Ad Hoc Networks
A Survey of Congestion Control in Proactive Source Routing Protocol in Mobile Ad Hoc Networks M. K. Siddique (Department of Computer Science, CCS University) mazharsiddique@gmail.com Abstract In mobile
More informationOptimal Performance Analysis Enabling OSPF and BGP in Internal and External WAN
Optimal Performance Analysis Enabling OSPF and BGP in Internal and External WAN K. RamKumar 1, S. Raj Anand 2 1,2 VelTechMultiTech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai Abstract:-
More informationMPLS SOLUTION How to Make the Best Choice for Your Business
HOW-TO GUIDE Choosing the Right MPLS SOLUTION How to Make the Best Choice for Your Business TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations Choose MPLS 4 CH. 2 What Types of MPLS Solutions Will
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationRouting Basics. What is Routing? Routing Components. Path Determination CHAPTER
CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role
More informationDistributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks
Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry
More informationOperation Manual Routing Protocol. Table of Contents
Table of Contents Table of Contents Chapter 1 IP Routing Protocol Overview... 1-1 1.1 Introduction to IP Route and Routing Table... 1-1 1.1.1 IP Route... 1-1 1.1.2 Routing Table... 1-1 1.2 Routing Management
More informationOccasionally, a network or a gateway will go down, and the sequence. of hops which the packet takes from source to destination must change.
RFC: 816 FAULT ISOLATION AND RECOVERY David D. Clark MIT Laboratory for Computer Science Computer Systems and Communications Group July, 1982 1. Introduction Occasionally, a network or a gateway will go
More informationA Study on Efficient Route Optimization using Border Gateway Protocol in Mobile Adhoc Networks
A Study on Efficient Route Optimization using Border Gateway Protocol in Mobile Adhoc Networks N.vijay kumar T.Santhi Sri Dr.J.Rajendra Prasad Y.Vijayalakshmi II MCA II SEMESTER Department of CA Department
More informationHierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks
Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Damien Magoni Université Louis Pasteur LSIIT magoni@dpt-info.u-strasbg.fr Abstract. Although distributed
More information"Charting the Course... TSHOOT Troubleshooting and Maintaining Cisco IP Networks Course Summary
Course Summary Description This course is designed to help network professionals improve the skills and knowledge that they need to maintain their network and to diagnose and resolve network problems quickly
More informationISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-8,
A NOVEL HOP-BY-HOP ROUTING SYSTEM FOR GREEN INTERNET Dr. Anuradha M S 1, Bhagyashree 2 Prof., P.G. Student Department of Electronics and communication engineering, GNDEC, Karnataka (India) Abstract The
More informationMultihoming with BGP and NAT
Eliminating ISP as a single point of failure www.noction.com Table of Contents Introduction 1. R-NAT Configuration 1.1 NAT Configuration 5. ISPs Routers Configuration 3 15 7 7 5.1 ISP-A Configuration 5.2
More informationIBM i Version 7.2. Networking TCP/IP routing and workload balancing IBM
IBM i Version 7.2 Networking TCP/IP routing and workload balancing IBM IBM i Version 7.2 Networking TCP/IP routing and workload balancing IBM Note Before using this information and the product it supports,
More informationScope and Sequence: CCNA Discovery v4.0
Scope and Sequence: CCNA Discovery v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Discovery courses, Introducing Routing and Switching in the Enterprise and
More informationMitigating Link Failures & Implementing Security Mechanism in Multipath Flows for Data Plane Resources
2876 Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows for Data Plane Resources Ramya M PG Scholar, Department of Computer Science, Klasalingam Institute of Technology,Krishnan
More informationAn Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks
An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract
More informationInternet Engineering Task Force (IETF) Orange R. Shakir Google March 2018
Internet Engineering Task Force (IETF) Request for Comments: 8355 Category: Informational ISSN: 2070-1721 C. Filsfils, Ed. S. Previdi, Ed. Cisco Systems, Inc. B. Decraene Orange R. Shakir Google March
More information