Disaster Management In IP Networks Using Automatic Node or Link Remapping

Size: px
Start display at page:

Download "Disaster Management In IP Networks Using Automatic Node or Link Remapping"

Transcription

1 Disaster Management In IP Networks Using Automatic Node or Link Remapping Mr. Issac Syam Sundar Palli #1, RojaRani Govada #2, Bhavya Badisa #3, Asha Jyothi Goli #4 #1 Assistant Professor, #2,#3,#4 Final Year Students Department of Computer Science & Engineering Andhra Loyola Institute of Engineering and Technology,Vijayawada-8 Abstract: Internet plays an important part in communication environment; the working procedure of approaches which are used for routing as soon as a network failure occurs has become a major issue. For a recovering of link or failed node existing in the networks, a fresh method can be used for recovery known as Link or Node Remapping (LNR) is used. It is implemented with some major changes to already existing methods. It is used for obtaining better scalability, backup path lengths, and distribution of load over each and every node after a failure. LNR is used to estimate the traffic demands within a network and thereby improve the distribution of traffic which was recovered reducing the congestion occurrence chance. Keywords: LNR, Networking, Link Node Remapping, routing protocols I. INTRODUCTION The inter net is being changed from time to time. The requests on Internet dependability and accessibility. An unsettling impact of a relationship in primary parts of a system can affect a huge number of telephone discoursed or TCP relationship, with clear antagonistic impacts. The ability to recover from mishaps has constantly been a focal diagram objective in the Internet. IP frameworks are naturally intense, since IGP coordinating traditions like OSPF are proposed to invigorate the sending information in light of the changed topology after a mishap. The re-union expect full dispersal of the new association state to all switches in the framework space. At the point when the new state data is conveyed, every switch separately computes new legitimate steering tables. This framework wide IP rejoining is a dreary methodology, an association or center dissatisfaction is usually trailed by a period of coordinating trickiness. In the midst of this period, distributes dropped due to invalid courses. This wonder has been analyzed in the both IGP and BGP setting, and adversity influences nonstop applications. Events provoking are-union have been seemed to happen frequently. Much effort has been given to overhauling the particular steps of the converging of IP coordinating, i.e., revelation, dispersal of information and most concise way tally, however the joining time is still excessively sweeping for applications with continuous solicitations. A key issue is that since most framework frustrations are brief, too much speedy initiating of the re-union process can achieve course rippling and extended framework wobbliness. A. Motivation Directing occasions affect numerous ways in the Internet, yet current dynamic topology mapping methods screen ways freely. Distinguishing a guiding event on one Internet way does not trigger any estimations on different maybe influenced ways. This approach prompts out of date and clashing directing information.we portray directing occasions in the Internet and examine testing techniques to productively distinguish ways affected by a steering occasion. Our outcomes demonstrate that focused testing can help us rapidly remap steering occasions and keep up additional a la mode and predictable topology maps. B. Problem Statement Much exertion has been centered around streamlining the various strides of the joining of IP coordinating, i.e., recognizing verification, diffusing of data and most succinct way estimation, however the union time is still unreasonably huge for applications with unfaltering requests[6]. A key issue is that since most framework frustrations are brief, too much quick actuating of the re-joining technique can achieve course vacillating and extended framework flimsiness.the IGP meeting technique is immediate since it is open and around the globe. It responds to an oversight after it has happened, and it joins every one of the switches in the locale. In this paper we show another game plan for overseeing affiliation and focus point disappointments in IP structures. Connection or Node Rerouting (LNR) is predefined and nearby, which permits healing in the scope of milliseconds. LNR permits bundle sending to proceed over pre - designed option next-jumps promptly after the location of the setback. Using LNR as a first line of hindrance against framework misfortunes, the run of the mill IP union process can be put on hold. This methodology is then begun similarly therefore ISSN: Page 93

2 of non-transient misfortunes. Since no overall rerouting is performed, brisk difficulty recognizable proof frameworks like fast invites or hardware alerts can be used to trigger LNR without bartering framework reliability [8]. LNR guarantees mending from any single association or center point misfortune, which constitutes a tremendous bigger piece of the mishaps experienced in a framework. 1) Problem Definition In existing system we cannot recover or re-establish the multiple links or multiple nodes failure in a single connection which was established to the links or nodes. 2) Detailed Problem Description Lately the Web has been transformed from an unprecedented reason framework to an all inclusive stage for a broad assortment of standard correspondence organizations. The solicitations on Internet resolute quality and availability have extended suitably. An unsettling impact of a relationship in focal parts of a system can affect a gigantic number of telephone discoursed or TCP relationship, with clear negative impacts. The ability to recover from difficulties has reliably been a central arrangement objective in the Internet. IP frameworks are naturally overwhelming, since IGP guiding traditions like OSPF are proposed to revive the sending information I light of the changed topology after a misfortune. This rejoining acknowledges full transport of the new association state to all switches in the framework space. Right when the new state information is scattered, each switch only learns new generous coordinating tables. This system wide IP remeeting is a dreary technique, and an affiliation or focus disappointment is normally trailed by a time of managing unsteadiness. Amidst this period, bundles might be dropped in light of invalid courses. This ponder has been considered in both IGP and BGP setting, and affliction impacts relentless applications. Events inciting a re-union have been seemed to happen in many cases, and are regularly activated by outer directing conventions. The essential thought of LNR is as per the following: Each source to goal transmission keeps up unique course. To begin with most limited way is taken as a unique course. These most limited ways are figured by utilizing the OSPF calculation. At to begin with, data packs will be transmitted using this remarkable course. In this source to objective transmission, any sudden occasion of center point or association misfortune happens, indicate transmission is gave way. At this moment LNR uses the schedule vacancy segment. If a mishap is happened we will give the schedule opening, infers give somewhere in the range os a chance to misfortune recuperating before changing the course. Inside the schedule opening, if the mishap is recovered then data is transmitted by using the primary course just data is transmitted by using the fortification course and send the testing for misfortune mending. In the midst of the support course transmission, if mishap is recovered, then fortification course transmission is ended and again reuses the main course. By reusing the main course we can improve the snappiness of directing, since the support course is longer than the primary course. II. LITERATURE SURVEY There was a enormous headway in the Internet prior decade and has now changed into the fundamental data foundation for the applications of individual and trade related. It is required to be constantly accessible as it is basic to our well ordered business, social and social activities. Benefit interruption for even a brief term could be disastrous in the realm of on line business, bringing about financial harm and additionally discoloring the notoriety of a system specialist co-op. Also, many developing administrations, for example, voice over IP and virtual private structures for back and other advancing business applications require stringent association accessibility and steadfast quality. Lamentably, setbacks are genuinely regular in the ordinary operation of a system because of different causes, for example, interface setbacks and so forth. The key considered LNR is to make a little course of action of fortification framework outlines using the framework chart and the related association weights. The association weights in these fortification setups are controlled so that the center that perceives the misfortune can safely forward the moving towards bundles towards the objective on a substitute association. LNR expect that the framework uses briefest way directing and objective based bob by-hop sending. The moving of action to joins bypassing the mishap can incite stop up and package incident-in parts of the framework. This limits the time that the predefined mending arrangement can be used to forward action before the overall coordinating tradition is taught about the mishap,and subsequently diminishes the gave that a transient difficultly can be managed without a full overall guiding redesign. Ideally, a predefined mending arrangement should guarantee organize after a difficultly, and in addition do all things considered in a way that does not realize an inadmissible load assignment. This essential has been noted as begin one of the primary troubles for per-processed IP recuperating plans. The association weights, if there ought to be an event of LNR are set automatically in each support setup. This gives exceptional flexibility in regards to how the recovered development is controlled. The fortification plan used after a mishap is picked in perspective of the misfortune event, and in this way we can pick interface weights in the support setups that are proper for only a subset of difficult examples. This procedure is then begun similarly as a result of non-transient thwarted expectations. Since no general recoordinating is performed, quick disappointment ISSN: Page 94

3 unmistakable evidence sections like smart welcomes or equipment alarms can be utilized to trigger MRC without trading structure security [8]. MRC ensures recuperation from any single affiliation or focus disappointment, which constitutes a broad lion's share of the misstep experienced in a structure [7]. The association weights in these support plans are controlled so that for every association and center point dissatisfaction, and paying little regard to whether it is an association or center frustration, the center point that perceives the mistake can safely forward the moving toward groups towards the objective on a substitute association. MRC acknowledge that the framework uses most restricted way guiding and objective based hop-by-hop sending. The capacity to recoup from setbacks has dependably been a focal plan objective in the Net [1]. Networks are naturally vigorous, since OSPF was intended to refresh the sending data in view of the changed topology after a setback. appropriation of the new connection state to all switches in This re-meeting expect full the system space. At the point when the new state data is disseminated, every switch independently computes new legitimate steering tables. Thus system wide IP re-configuring is of tough collection of steps, and a connection or hub break down is generally pursued by a time of directing vulnerability. In the midst of the cost of time, parcels may be lost because of invalid; connections. This wonder has been mulled over in IGP [2] and BGP setting [3], and affliction impacts consistent applications[4].instances triggered re-meeting have been assumed to happen regularly[5].the moving improvement to joins bypassing the slip-up can impel stop up and bundle hardship n parts of the system[9].preferably, a predefined recuperation mastermind ought not just ensure compose after a disappointment,this need has been noted as being one of the essential inconveniences for pre - found IP recuperation organizes[10] The moving of development to joins bypassing the mistake can incite stop up and package hardship in parts of the framework [9]. Ideally, a predefined recovery arrange should not simply guarantee organize after a failure, This need has been noted as being one of the primary troubles for pre - discovered IP recovery arranges [10]. In this paper "Fast Recovery Approaches from Failures in IP Networks", according to P.Rajasekar :Internet is altered and contains high level requests on QoS and accessing similar networks which may be related to business entertainement along with some online apps,wireless data transfer etc.in a considerable lot of the applications, even little administration aggravations, happened because of route connecting can swing to be deplorable execution debasement. Numerous new strategies were created for recuperating from setbacks inside Ip systems with predefined reinforcement way counts and burrowing inside IP arrange. The bundle to the following jump hub system can recouped from its first setback, as the parcel is directed over the insurance diagram relating to that assurance address. Internet has changed and contains tough demands on strength and availability, like networks related to business, games which are played on line, wireless transmission, and video conferencing. In many of the applications, even small service disturbances occurred due to route linking can turn to be unbearable performance devaluation. Many new methods were developed only to heal from a failure within any networks along many backup route statistics and transfers within IP network. The method which was introduced primarily provided resilience. By passing the packet to the next-hop node network can recover from its first failure, because the graph is traversed with the packet which contains the secured address. In this paper "Stability Issues in OSPF Routing", According to Riecke Bell.G: OSPF protocol is given more importance for stability. Mainly three measures of stability are considered. Much analysis was made under 3 different outlines:(a) some networks which locate OSPF along with traffic engineering add-ons,(b) some networks which utilize substitute HELLO timers, and(c)on systems that utilization elective techniques for refreshing vertices-links data. These investigation was done on a network which contains 292 vertices and 765 links. III. EXISTING SYSTEM The already existing algorithms or methods which are introduced for working over load distribution in connectionless IGP networks were successful in some cases but not in all cases. They may concentrate on the failure free condition or checking weights which are to be checked when a link failure occurs.large positions of the techniques enrolled in this class give rich and capable responses for snappy framework healing however LNR and Not-through burreoing is in every way the priciple two covering all surveyed requirements.in any case,lnr offers a similar usefulness with an easier and more strong approach, and utilized for better streaming as for load adjusting. Class give rich and predefined answers for quick system healing,however LNR and Not-by means of burrowing is from every angle the fundamental two covering all evaluated necessities. IN any case LNR offers a similar usefulness with a less difficult and more strong approach, and utilized for better streamlining concerning load adjusting. Class give rich and proficient answers for quick system recuperation, however LNR and Not-by means of burrowing is by all accounts the main two covering all assessed prerequisites. However, LNR offers a similar usefulness with a less complex and more strong approach, and utilize for better improvement as for load adjusting. ISSN: Page 95

4 IV. PROPOSED SYSTEM While the problems are being solved using the existing methods, the proposed method named as LNR scheme achieves Recovery in every possible single failure cases, by utilizing this strategy to deal with no of vertices as well as linking setbacks, and with no knowledge of underlying router of the setback. LNR is full swore focuses just on destination based. LNR stores advanced routes information for routing and forwards packet in alternative route whenever a link is failed or a node is deactivated. A. Basic Operations Link failure detection Node failure detection Shortest path calculation Backup maintenance of paths Identifying new paths Rectifying the failure inks/nodes. B. System Architecture A framework configuration is a hypothetical model that depicts the structure, direct, and more perspectives of a framework. A framework outline is a formal portrayal and delineation of a system, dealt with a way that support examining the structures and practices of the structure. A framework configuration can contain structure sections that will collaborate to execute the general system. There have been endeavors to formalize dialects to depict framework engineering, all things considered these are called design portrayal dialects. V. OUTPUT Figure 2: Transferring data in Client 1 In the above figure, client1 is initiated and starts data transmission as client1 acts as source of data. Figure 3:Transferring Data Through Server In the above figure the data is transmitted to the server (destination). Figure 1: System Architecture The above system architecture figure shows the complete flow of steps for routing. VI. CONCLUSION Link or Node Remapping is a method used to elevate speed retrieval within networks. LNR is an enhanced routing configuration added to routers for efficient routing over failed routes or links. LNR precisely maintains recovery from link failure within a random network. LNR immediately responds on failure discovery, by means of different measures which are available locally. VII.FUTURE WORK This procedure can be implemented over other types of environments as well as with combination of other routing protocols. REFERENCES 1. D. D. Clark, The design philosophy of the DARPA internet protocols, SIGCOMM, Computer Communications Review, vol. 18, no. 4, pp , Aug ISSN: Page 96

5 2. A. Basu and J. G. Riecke, Stability issues in OSPF routing, in Proceedings of SIGCOMM, San Diego, California, USA, Aug. 2001, pp C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian, Delayed Internet Routing Convergence, IEEE/ACM Transactions on Networking, vol. 9, no. 3, pp , June C. Boutremans, G. Iannaccone, and C. Diot, Impact of link failures on VoIP performance, in Proceedings of International Workshop on Network and Operating System Support for Digital Audio and Video, 2002, pp D. Watson, F. Jahanian, and C. Labovitz, Experiences with monitoring OSPF on a regional service provider network, in ICDCS 03: Proceedings of the 23rd International Conference on Distributed Computing Systems. Washington, DC, USA: IEEE Computer Society, 2003, pp P. Francois, C. Filsfils, J. Evans, and O. Bonaventure, Achieving sub-second IGP convergence in large IP networks, ACM SIGCOMM Computer Communication Review, vol. 35, no. 2, pp , July A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C.-N.Chuah, and C. Diot, Characterization of failures in an IP backbone network, in Proceedings INFOCOM, Mar S. Nelakuditi, S. Lee, Y. Yu, Z.-L. Zhang,, and C.-N. Chuah, Fast local rerouting for handling transient link failures, IEEE/ACM Transactions on Networking, vol. 15, no. 2, pp , apr S. Iyer, S. Bhattacharyya, N. Taft, and C. Diot, An approach to alleviate link overload as observed on an IP backbone, in Proceedings INFOCOM, Mar. 2003, pp S. Rai, B. Mukherjee, and O. Deshpande, IP resilience within an autonomous system: Current approaches, challenges, and future directions, IEEE Communications Magazine, vol. 43, no. 10, pp , Oct S. Bryant, M. Shand, and S. Previdi, IP fast reroute using not-via addresses, Internet Draft (work in progress), June 2007, draft-ietfrtgwgipfrr-notvia-addresses P. Francois, O. Bonaventure, and M. Shand, Disruption free topology reconfiguration in OSPF networks, in Proceedings INFOCOM, Anchorage, AK, USA, may ISSN: Page 97

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System.

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume2 Issue 8 August, 2013 Page No. 2628-2634 Multiple Routing Configurations For Fast Ip Network Recovery Sk.Meeravali

More information

Fast IP Network Recovery using MRC

Fast IP Network Recovery using MRC International Journal of Research in Computer Science ISSN 2249-8257 Volume 1 Issue 1 (2011) pp. 75-88 White Globe Publications www.ijorcs.org Fast IP Network Recovery using MRC T.K Rajesh 1, N. Sreenivasulu

More information

Deterministic Routing in OSPF for Post Single Link Failure

Deterministic Routing in OSPF for Post Single Link Failure Deterministic Routing in OSPF for Post Single Link Failure Dnyaneshwar Dhangar 1, Sachin Bojewar 2 1 (Information Technology/ Mumbai, India) 1 (Information Technology/ Mumbai, India) ABSTRACT : In the

More information

OSPF with Deterministic Routing

OSPF with Deterministic Routing OSPF with Deterministic Routing Sachin Bojewar Associate Professor, Vidyalankar Institute of Technology, Wadala, Mumbai, India Dnyaneshwar Dhangar Vidyalankar Institute of Technology, Wadala, Mumbai, India

More information

Ordered FIB Updates. draft-francois-ordered-fib-01.txt. Pierre Francois Olivier Bonaventure Mike Shand Stefano Previdi Stewart Bryant

Ordered FIB Updates. draft-francois-ordered-fib-01.txt. Pierre Francois Olivier Bonaventure Mike Shand Stefano Previdi Stewart Bryant Ordered FIB Updates draft-francois-ordered-fib-01.txt Pierre Francois Olivier Bonaventure Mike Shand Stefano Previdi Stewart Bryant Outline Quick reminder on ordered FIB updates Convergence time of ordered

More information

Link/Node Failure Recovery through Backup Path Lengths

Link/Node Failure Recovery through Backup Path Lengths Link/Node Failure Recovery through Backup Path Lengths Ravula Prathap Kumar, Banothu Balaji, Dasari Yakobu, N Sai Bala Kishore Department of Computer Science and Engineering, Vignan University, Guntur,

More information

Network Recovery using an Automatic Error Recovery Network Approach

Network Recovery using an Automatic Error Recovery Network Approach Network Recovery using an Automatic Error Recovery Network Approach Dileep Kumar Gopaluni 1, R Praveen Sam 2 1 Research and Development Center, Bharathiar University, Coimbatore, India. dileep.gopaluni@gmail.com

More information

Framework of Vertical Multi-homing in IPv6-based NGN

Framework of Vertical Multi-homing in IPv6-based NGN ITU-T Recommendation Y.ipv6-vmh Framework of Vertical Multi-homing in IPv6-based NGN Summary This Recommendation describes a framework of vertical multi-homing in IPv6-based NGN. This Recommendation identifies

More information

Enhancing TCP performance in IP fast reroute

Enhancing TCP performance in IP fast reroute Title Enhancing TCP performance in IP fast reroute Author(s) Mao, M; Wen, Z; Yeung, LK Citation The IEEE International Conference on Communications (ICC 2012), Ottawa, ON., 10-15 June 2012. In IEEE International

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 173 A Review of Various Approaches to Multipath Routing Maryada M.Tech. Student, Department of Computer Science

More information

Physical-Layer Communication Recovery for Heterogeneous Network

Physical-Layer Communication Recovery for Heterogeneous Network Physical-Layer Communication Recovery for Heterogeneous Network Po-Kai Tseng 1, Wei-Ho Chung 1, Kate Ching-Ju Lin 1, Chi-Sheng Shih 2, and Ling-Jyh Chen 3 1 Research Center for Information Technology Innovation,

More information

Scope and Sequence: CCNA Discovery

Scope and Sequence: CCNA Discovery Scope and Sequence: CCNA Discovery Last updated June 19, 2009 Target Audience The Cisco CCNA Discovery curriculum is primarily designed for Cisco Networking Academy students who are seeking entry-level

More information

CCNA-A Scope and Sequence (March 2007-Draft)

CCNA-A Scope and Sequence (March 2007-Draft) CCNA-A Scope and Sequence (March 2007-Draft) This document is a preliminary overview of the new CCNA-A curriculum and is subject to change since the courses are still under development. The English versions

More information

Enhanced Multipath Routing And Proactive Route Maintenance For Congestion Minimization And Transient Link Failures

Enhanced Multipath Routing And Proactive Route Maintenance For Congestion Minimization And Transient Link Failures Enhanced Multipath Routing And Proactive Route Maintenance For Congestion Minimization And Transient Link Failures Selvamani K 1, Kanimozhi S 2, Elakkiya R 3 and Kannan A 4 1,3 Department of Computer Science

More information

IP Failure Handling Using Localized On-Demand Link State Routing

IP Failure Handling Using Localized On-Demand Link State Routing RESEARCH ARTICLE IP Failure Handling Using Localized On-Demand Link State Routing Prof. S.M.Sangve, Sushil Warkar, Amit Shirke, Kunal Solanke, Pratap Patil, Department of Computer Science and Engineering,

More information

ENHANCING NETWORK SURVIVABILITY USING ROUTING AND LINK WEIGHT ASSIGNMENT TO AVOID CONGESTION

ENHANCING NETWORK SURVIVABILITY USING ROUTING AND LINK WEIGHT ASSIGNMENT TO AVOID CONGESTION P.-K. Tseng et al., Int. J. of Safety and Security Eng., Vol. 5, No. 1 (2015) 29 47 ENHANCING NETWORK SURVIVABILITY USING ROUTING AND LINK WEIGHT ASSIGNMENT TO AVOID CONGESTION P.-K. TSENG, W.-H. CHUNG,

More information

Mitigation of Transient Loops in IGP Networks

Mitigation of Transient Loops in IGP Networks Mitigation of Transient Loops in IGP Networks Mohammed Yousef 1, David K. Hunter 1 1 School of Computer Science and Electronic Engineering, University of Essex, Wivenhoe Park, Colchester, Essex CO4 3SQ,

More information

Deploying MPLS & DiffServ

Deploying MPLS & DiffServ Deploying MPLS & DiffServ Thomas Telkamp Director, Data Architecture & Technology Global Crossing Telecommunications, Inc. telkamp@gblx.net MPLS and DiffServ technologies are getting a lot of attention

More information

Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes

Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes Yu Guo, Ning Wang, Kin-Hon Ho, Michael Howarth, and George Pavlou 2 Centre for Communication Systems Research, University

More information

Resilient IP Backbones. Debanjan Saha Tellium, Inc.

Resilient IP Backbones. Debanjan Saha Tellium, Inc. Resilient IP Backbones Debanjan Saha Tellium, Inc. dsaha@tellium.com 1 Outline Industry overview IP backbone alternatives IP-over-DWDM IP-over-OTN Traffic routing & planning Network case studies Research

More information

Avoiding Transient Loops through Interface-Specific Forwarding

Avoiding Transient Loops through Interface-Specific Forwarding Avoiding Transient Loops through Interface-Specific Forwarding Zifei Zhong, Ram Keralapura 2, Srihari Nelakuditi, Yinzhe Yu 3, Junling Wang, Chen-Nee Chuah 2, and Sanghwan Lee 3 Department of Computer

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Scope and Sequence: CCNA Discovery

Scope and Sequence: CCNA Discovery Scope and Sequence: CCNA Discovery Last updated April 22, 2008 Target Audience CCNA Discovery is primarily designed for Cisco Networking Academy students who are looking for career-oriented, information

More information

Query Result Extraction Using Dynamic Query Forms

Query Result Extraction Using Dynamic Query Forms Query Result Extraction Using Dynamic Query Forms #1 Mrs. I. Anitha Rani, #2 Y.Vijay, #3 Abdul Moseen #1 Assistant Professor, Department of Computer Science Engineering,Andhra Loyola Institute Of Engineering

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

Multicast Subsecond Convergence

Multicast Subsecond Convergence Multicast Subsecond Convergence First Published: July 22, 2002 Last Updated: September 10, 2010 The Multicast Subsecond Convergence feature comprises a comprehensive set of features and protocol enhancements

More information

Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer

Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer Kang Xi and H. Jonathan Chao April 00 New York State CENTER FOR ADVANCED TECHNOLOGY IN TELECOMMUNICATIONS Supported by the New

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

On the Impact of Route Processing and MRAI Timers on BGP Convergence Times

On the Impact of Route Processing and MRAI Timers on BGP Convergence Times On the Impact of Route Processing and MRAI Timers on BGP Convergence Times Shivani Deshpande and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute, Troy, NY 12180 Abstract Fast convergence

More information

ROBUST ROUTING INFORMATION UPDATING IN IPV6 NETWORKS. Cosmin Adomnicăi, Viorel Mînzu

ROBUST ROUTING INFORMATION UPDATING IN IPV6 NETWORKS. Cosmin Adomnicăi, Viorel Mînzu ELECTROTECHNICS, ELECTRONICS, AUTOMATIC CONTROL, INFORMATICS ROBUST ROUTING INFORMATION UPDATING IN IPV6 NETWORKS Cosmin Adomnicăi, Viorel Mînzu Faculty of Automatics, Computer science, Electrical and

More information

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Sushma T Shanbhogue 1, Poonguzhali E 2 P.G. Student, Department of Computer Engineering, AMC Engineering College, Bangalore,

More information

An Experimental Analysis on OSPF-TE Convergence Time

An Experimental Analysis on OSPF-TE Convergence Time An Experimental Analysis on OSPF-TE Convergence Time S. Huang* a, K. Kitayama a, F. Cugini b, F. Paolucci c, A. Giorgetti c, L. Valcarenghi c, P. Castoldi c a Osaka University, Osaka, Japan; b CNIT, Pisa,

More information

What is the difference between unicast and multicast? (P# 114)

What is the difference between unicast and multicast? (P# 114) 1 FINAL TERM FALL2011 (eagle_eye) CS610 current final term subjective all solved data by eagle_eye MY paper of CS610 COPUTER NETWORKS There were 30 MCQs Question no. 31 (Marks2) Find the class in 00000001.001011.1001.111

More information

How Cisco IT Simplified Network Growth with EIGRP

How Cisco IT Simplified Network Growth with EIGRP Cisco IT Case Study May 2013 EIGRP Implementation How Cisco IT Simplified Network Growth with EIGRP EXECUTIVE SUMMARY CHALLENGE Simplify global expansion Add tens of thousands of home offices to network

More information

A New Backup Topology Design Method for Congestion Avoidance in IP Fast Reroute

A New Backup Topology Design Method for Congestion Avoidance in IP Fast Reroute International Journal of Networks and Communications 2012, 2(5): 123-131 DOI: 10.5923/j.ijnc.20120205.05 A New Backup Topology Design Method for Congestion Avoidance in IP Fast Reroute Simon Tembo 1,*,

More information

Based on Distance Comparison Shortest Path Algorithm

Based on Distance Comparison Shortest Path Algorithm Volume 118 No. 20 2018, 853-860 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Based on Distance Comparison Shortest Path Algorithm 1 Y. NavyaSri, 2 K. Meghana, 3 D. Nageswari and

More information

Proactive Network Management of IPTV Networks

Proactive Network Management of IPTV Networks Proactive Network Management of IPTV Networks Rakesh K. Sinha, K. K. Ramakrishnan, Bob Doverspike, Dahai Xu, Jorge Pastor, Aman Shaikh, Seungjoon Lee, Chris Chase AT&T Labs - Research, New Jersey, USA

More information

Reliable IPTV Transport Network. Dongmei Wang AT&T labs-research Florham Park, NJ

Reliable IPTV Transport Network. Dongmei Wang AT&T labs-research Florham Park, NJ Reliable IPTV Transport Network Dongmei Wang AT&T labs-research Florham Park, NJ Page 2 Outline Background on IPTV Motivations for IPTV Technical challenges How to design a reliable IPTV backbone network

More information

Random Neural Networks for the Adaptive Control of Packet Networks

Random Neural Networks for the Adaptive Control of Packet Networks Random Neural Networks for the Adaptive Control of Packet Networks Michael Gellman and Peixiang Liu Dept. of Electrical & Electronic Eng., Imperial College London {m.gellman,p.liu}@imperial.ac.uk Abstract.

More information

TIME SYNCHRONIZATION TEST SOLUTION FROM VERYX TECHNOLOGIES

TIME SYNCHRONIZATION TEST SOLUTION FROM VERYX TECHNOLOGIES TIME SYNCHRONIZATION TEST SOLUTION FROM VERYX TECHNOLOGIES CONTENTS Introduction... 1 1588v2 Overview... 1 SyncE overview... 2 VERYX capability... 2 1588v2 Test Coverage... 2 Time Sync Application Test

More information

Convergence Routing Analysis in IPv6 Networks

Convergence Routing Analysis in IPv6 Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735 PP 18-24 www.iosrjournals.org Convergence Routing Analysis in IPv6 Networks S.Arun Kumar 1 and

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016 RESEARCH ARTICLE OPEN ACCESS Investigating the Impact of Simulation Time on Convergence Activity & Duration of EIGRP, OSPF Routing Protocols under Link Failure and Link Recovery in WAN Using OPNET Modeler

More information

Mitigating Link Failures and Implementing Security Mechanism in Multipath Flows for Data Plane Resources

Mitigating Link Failures and Implementing Security Mechanism in Multipath Flows for Data Plane Resources World Engineering & Applied Sciences Journal 7 (4): 212-219, 2016 ISSN 2079-2204 IDOSI Publications, 2016 DOI: 10.5829/idosi.weasj.2016.212.219 Mitigating Link Failures and Implementing Security Mechanism

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Implementing Cisco IP Routing

Implementing Cisco IP Routing ROUTE Implementing Cisco IP Routing Volume 3 Version 1.0 Student Guide Text Part Number: 97-2816-02 DISCLAIMER WARRANTY: THIS CONTENT IS BEING PROVIDED AS IS. CISCO MAKES AND YOU RECEIVE NO WARRANTIES

More information

Cybersecurity was nonexistent for most network data exchanges until around 1994.

Cybersecurity was nonexistent for most network data exchanges until around 1994. 1 The Advanced Research Projects Agency Network (ARPANET) started with the Stanford Research Institute (now SRI International) and the University of California, Los Angeles (UCLA) in 1960. In 1970, ARPANET

More information

HP A5820X & A5800 Switch Series MPLS. Configuration Guide. Abstract

HP A5820X & A5800 Switch Series MPLS. Configuration Guide. Abstract HP A5820X & A5800 Switch Series MPLS Configuration Guide Abstract This document describes the software features for the HP 5820X & 5800 Series products and guides you through the software configuration

More information

A hassle-free network for communications assurance

A hassle-free network for communications assurance China Unicom Zhuhai A hassle-free network for communications assurance China Unicom Zhuhai has successfully cut over to the optimized MSC Pool solution, helping it achieve one-time service recovery and

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Look-ahead Type Detour Path Management Methods Yu Miyoshi, Tatsuyuki Kimura, and Yoshihiro Otsuka

Look-ahead Type Detour Path Management Methods Yu Miyoshi, Tatsuyuki Kimura, and Yoshihiro Otsuka Look-ahead Type Detour Path Management Methods Yu Miyoshi, Tatsuyuki Kimura, and Yoshihiro Otsuka Abstract We describe a look-ahead type detour path specification method that can specify in advance detour

More information

Lecture - 14 Transport Layer IV (Reliability)

Lecture - 14 Transport Layer IV (Reliability) Computer Networks and Internet Protocol Prof. Sandip Chakraborthy Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 14 Transport Layer IV (Reliability)

More information

An Approach for Enhanced Performance of Packet Transmission over Packet Switched Network

An Approach for Enhanced Performance of Packet Transmission over Packet Switched Network ISSN (e): 2250 3005 Volume, 06 Issue, 04 April 2016 International Journal of Computational Engineering Research (IJCER) An Approach for Enhanced Performance of Packet Transmission over Packet Switched

More information

A NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT

A NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT A NEW APPROACH FOR BROADBAND BACKUP LINK TO INTERNET IN CAMPUS NETWORK ENVIRONMENT Mohd Nazri Ismail Faculty of MIIT, University of Kuala Lumpur (UniKL), MALAYSIA, mnazrii@miit.unikl.edu.my Abstract Most

More information

A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing

A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing Yuki Katsurai *, Yoshitaka Nakamura **, and Osamu Takahashi ** * Graduate School

More information

Subnet Multicast for Delivery of One-to-Many Multicast Applications

Subnet Multicast for Delivery of One-to-Many Multicast Applications Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting

More information

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2002; 15:899 906 (DOI: 10.1002/dac.571) Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

On TCP friendliness of VOIP traffic

On TCP friendliness of VOIP traffic On TCP friendliness of VOIP traffic By Rashmi Parthasarathy WSU ID # 10975537 A report submitted in partial fulfillment of the requirements of CptS 555 Electrical Engineering and Computer Science Department

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Progress Report No. 15. Shared Segments Protection

Progress Report No. 15. Shared Segments Protection NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury

More information

LOUP: The Principles and Practice of Intra-Domain Route Dissemination. Nikola Gvozdiev, Brad Karp, Mark Handley

LOUP: The Principles and Practice of Intra-Domain Route Dissemination. Nikola Gvozdiev, Brad Karp, Mark Handley LOUP: The Principles and Practice of Intra-Domain Route Dissemination Nikola Gvozdiev, Brad Karp, Mark Handley The Rising Tide of Reachability Expectations Internet users expect any-to-any reachability:

More information

QoS-Aware IPTV Routing Algorithms

QoS-Aware IPTV Routing Algorithms QoS-Aware IPTV Routing Algorithms Patrick McDonagh, Philip Perry, Liam Murphy. School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4. {patrick.mcdonagh, philip.perry,

More information

Cisco Service Advertisement Framework Deployment Guide

Cisco Service Advertisement Framework Deployment Guide Cisco Service Advertisement Framework Deployment Guide What You Will Learn Cisco Service Advertisement Framework (SAF) is a network-based, scalable, bandwidth-efficient approach to service advertisement

More information

Analyzing Causes of Failures in the Global Research Network Using Active Measurements

Analyzing Causes of Failures in the Global Research Network Using Active Measurements Analyzing Causes of Failures in the Global Research Network Using Active Measurements Eugene S. Myakotnykh, Bjarne E. Helvik Centre for Quantifiable Quality of Service in Communication Systems (Q2S) 1

More information

Towards Distributed Router Architectures and Centralized Control Architectures in IP Networks

Towards Distributed Router Architectures and Centralized Control Architectures in IP Networks Towards Distributed Router Architectures and Centralized Control Architectures in IP Networks Jing Fu 1, Peter Sjödin 2, and Gunnar Karlsson 1 1 ACCESS Linnaeus Center, School of Electrical Engineering

More information

Data Networks. Lecture 1: Introduction. September 4, 2008

Data Networks. Lecture 1: Introduction. September 4, 2008 Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:

More information

Producing Graphical User Interface from Activity Diagrams Ebitisam K. Elberkawi, Mohamed M. Elammari

Producing Graphical User Interface from Activity Diagrams Ebitisam K. Elberkawi, Mohamed M. Elammari Producing Graphical User Interface from Activity Diagrams Ebitisam K. Elberkawi, Mohamed M. Elammari Abstract Graphical User Interface (GUI) is essential to programming, as is any other characteristic

More information

INTRODUCTION TO CROSS LAYER DESIGN AND CROSS LAYER BASIC SCHEMES

INTRODUCTION TO CROSS LAYER DESIGN AND CROSS LAYER BASIC SCHEMES INTRODUCTION TO CROSS LAYER DESIGN AND CROSS LAYER BASIC SCHEMES Chapter 2: INTRODUCTION TO CROSS LAYER DESIGN AND CROSS LAYER BASIC SCHEMES 2.1-Introduction to Cross Layer Design: Cross layer optimization

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

CHAPTER I INTRODUCTION. In Communication Networks, Survivability is an important factor

CHAPTER I INTRODUCTION. In Communication Networks, Survivability is an important factor 1 CHAPTER I INTRODUCTION In Communication Networks, Survivability is an important factor to be considered in planning and designing of Survivable Fiber Optic Networks (SFON). Survivability depicts network

More information

Configuring MPLS L3VPN

Configuring MPLS L3VPN Contents Configuring MPLS L3VPN 1 MPLS L3VPN overview 1 Introduction to MPLS L3VPN 1 MPLS L3VPN concepts 2 MPLS L3VPN packet forwarding 5 MPLS L3VPN networking schemes 5 MPLS L3VPN routing information

More information

(Refer Slide Time: 01:08 to 01:25min)

(Refer Slide Time: 01:08 to 01:25min) COMPUTER NETWORKS Prof. Sujoy Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture-27 RIP- Distance Vector Routing We have seen basic routing. Now we will

More information

Bidirectional Forwarding Detection

Bidirectional Forwarding Detection Bidirectional Forwarding Detection This document describes how to enable the Bidirectional Forwarding Detection (BFD) protocol. BFD is a detection protocol designed to provide fast forwarding path failure

More information

Multicast Transport Protocol Analysis: Self-Similar Sources *

Multicast Transport Protocol Analysis: Self-Similar Sources * Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

Hands-On Troubleshooting IPTV with WireShark

Hands-On Troubleshooting IPTV with WireShark Hands-On Course Description This Hands-On course will enable attendees to upgrade their knowledge about how Video and Television is carried over IP in state-of-the art systems. At the end of the course

More information

Architectural Principles of the Internet

Architectural Principles of the Internet TLEN7000/ECEN7002: Analytical Foundations of Networks Architectural Principles of the Internet Lijun Chen 11/27/2012 The Internet Protocol Stack TCP/IP was first proposed in 1973 The specifications are

More information

Virtualization and Softwarization Technologies for End-to-end Networking

Virtualization and Softwarization Technologies for End-to-end Networking ization and Softwarization Technologies for End-to-end Networking Naoki Oguchi Toru Katagiri Kazuki Matsui Xi Wang Motoyoshi Sekiya The emergence of 5th generation mobile networks (5G) and Internet of

More information

Core Membership Computation for Succinct Representations of Coalitional Games

Core Membership Computation for Succinct Representations of Coalitional Games Core Membership Computation for Succinct Representations of Coalitional Games Xi Alice Gao May 11, 2009 Abstract In this paper, I compare and contrast two formal results on the computational complexity

More information

Enhancement of Lifetime Ratio in Wireless Sensor Network Using Genetic Algorithm

Enhancement of Lifetime Ratio in Wireless Sensor Network Using Genetic Algorithm Enhancement of Lifetime Ratio in Wireless Sensor Network Using Genetic Algorithm Rashmi M and Dr. Rekha K.R and Dr. Nataraj K. R 1 PG student, Digital Communication and Networking, SJBIT, Bangalore, India.

More information

Internet Research Task Force (IRTF) Category: Informational May 2011 ISSN:

Internet Research Task Force (IRTF) Category: Informational May 2011 ISSN: Internet Research Task Force (IRTF) T. Li, Ed. Request for Comments: 6227 Cisco Systems, Inc. Category: Informational May 2011 ISSN: 2070-1721 Abstract Design Goals for Scalable Internet Routing It is

More information

A Survey of Congestion Control in Proactive Source Routing Protocol in Mobile Ad Hoc Networks

A Survey of Congestion Control in Proactive Source Routing Protocol in Mobile Ad Hoc Networks A Survey of Congestion Control in Proactive Source Routing Protocol in Mobile Ad Hoc Networks M. K. Siddique (Department of Computer Science, CCS University) mazharsiddique@gmail.com Abstract In mobile

More information

Optimal Performance Analysis Enabling OSPF and BGP in Internal and External WAN

Optimal Performance Analysis Enabling OSPF and BGP in Internal and External WAN Optimal Performance Analysis Enabling OSPF and BGP in Internal and External WAN K. RamKumar 1, S. Raj Anand 2 1,2 VelTechMultiTech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai Abstract:-

More information

MPLS SOLUTION How to Make the Best Choice for Your Business

MPLS SOLUTION How to Make the Best Choice for Your Business HOW-TO GUIDE Choosing the Right MPLS SOLUTION How to Make the Best Choice for Your Business TABLE OF CONTENTS Introduction 3 CH. 1 Why Organizations Choose MPLS 4 CH. 2 What Types of MPLS Solutions Will

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry

More information

Operation Manual Routing Protocol. Table of Contents

Operation Manual Routing Protocol. Table of Contents Table of Contents Table of Contents Chapter 1 IP Routing Protocol Overview... 1-1 1.1 Introduction to IP Route and Routing Table... 1-1 1.1.1 IP Route... 1-1 1.1.2 Routing Table... 1-1 1.2 Routing Management

More information

Occasionally, a network or a gateway will go down, and the sequence. of hops which the packet takes from source to destination must change.

Occasionally, a network or a gateway will go down, and the sequence. of hops which the packet takes from source to destination must change. RFC: 816 FAULT ISOLATION AND RECOVERY David D. Clark MIT Laboratory for Computer Science Computer Systems and Communications Group July, 1982 1. Introduction Occasionally, a network or a gateway will go

More information

A Study on Efficient Route Optimization using Border Gateway Protocol in Mobile Adhoc Networks

A Study on Efficient Route Optimization using Border Gateway Protocol in Mobile Adhoc Networks A Study on Efficient Route Optimization using Border Gateway Protocol in Mobile Adhoc Networks N.vijay kumar T.Santhi Sri Dr.J.Rajendra Prasad Y.Vijayalakshmi II MCA II SEMESTER Department of CA Department

More information

Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks

Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Hierarchical Addressing and Routing Mechanisms for Distributed Applications over Heterogeneous Networks Damien Magoni Université Louis Pasteur LSIIT magoni@dpt-info.u-strasbg.fr Abstract. Although distributed

More information

"Charting the Course... TSHOOT Troubleshooting and Maintaining Cisco IP Networks Course Summary

Charting the Course... TSHOOT Troubleshooting and Maintaining Cisco IP Networks Course Summary Course Summary Description This course is designed to help network professionals improve the skills and knowledge that they need to maintain their network and to diagnose and resolve network problems quickly

More information

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-8,

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-8, A NOVEL HOP-BY-HOP ROUTING SYSTEM FOR GREEN INTERNET Dr. Anuradha M S 1, Bhagyashree 2 Prof., P.G. Student Department of Electronics and communication engineering, GNDEC, Karnataka (India) Abstract The

More information

Multihoming with BGP and NAT

Multihoming with BGP and NAT Eliminating ISP as a single point of failure www.noction.com Table of Contents Introduction 1. R-NAT Configuration 1.1 NAT Configuration 5. ISPs Routers Configuration 3 15 7 7 5.1 ISP-A Configuration 5.2

More information

IBM i Version 7.2. Networking TCP/IP routing and workload balancing IBM

IBM i Version 7.2. Networking TCP/IP routing and workload balancing IBM IBM i Version 7.2 Networking TCP/IP routing and workload balancing IBM IBM i Version 7.2 Networking TCP/IP routing and workload balancing IBM Note Before using this information and the product it supports,

More information

Scope and Sequence: CCNA Discovery v4.0

Scope and Sequence: CCNA Discovery v4.0 Scope and Sequence: CCNA Discovery v4.0 Last Updated August 30, 2007 The course objectives and outline for the final two CCNA Discovery courses, Introducing Routing and Switching in the Enterprise and

More information

Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows for Data Plane Resources

Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows for Data Plane Resources 2876 Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows for Data Plane Resources Ramya M PG Scholar, Department of Computer Science, Klasalingam Institute of Technology,Krishnan

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

Internet Engineering Task Force (IETF) Orange R. Shakir Google March 2018

Internet Engineering Task Force (IETF) Orange R. Shakir Google March 2018 Internet Engineering Task Force (IETF) Request for Comments: 8355 Category: Informational ISSN: 2070-1721 C. Filsfils, Ed. S. Previdi, Ed. Cisco Systems, Inc. B. Decraene Orange R. Shakir Google March

More information