Network Recovery using an Automatic Error Recovery Network Approach

Size: px
Start display at page:

Download "Network Recovery using an Automatic Error Recovery Network Approach"

Transcription

1 Network Recovery using an Automatic Error Recovery Network Approach Dileep Kumar Gopaluni 1, R Praveen Sam 2 1 Research and Development Center, Bharathiar University, Coimbatore, India. dileep.gopaluni@gmail.com 2 Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, Kurnool, India. praveen_sam75@yahoo.com Abstract - Currently a Days business and social affiliations are using systems for organization reasons. Noting the true objective to meet the business requirements, network frameworks are produced in like manner. The advancement of such systems are enhanced by dealing with the limits of far reaching networks since its balance raises the possible results that conflicts with the framework. A failure inside a system will impact its execution by affecting limitations like throughput, delay, idleness, steadfastness etc. In different leveled organized structures any likelihood of failure may crash the entire network. A failure in the network can disturb the entire network at different levels in the organization which may impact every node and cause communication delay within the entire network. In this paper we propose an Automatic Error Recovery Network (AERN) approach to overcome the issues of different leveled frameworks. The proposed approach at first identifies potential results of blunders in the system and gives specific recovery strategy. The proposed strategy shows preferred execution over conventional strategies. The paper focuses on anchored information transmission of information between frameworks in a system with no information failures. Keyword - Network structure, Network, classification, improvement, Network failure, Path malfunction, Data safety. I. INTRODUCTION Web innovation has given significant methods for correspondence representation to its clients. For the production system configuration procedure associations and specialized prerequisites are exceptionally important to give a system topology. A few system topologies have been presented relying upon their requirement for the correspondence procedure. Though in business associations, it is capable to utilize divide and conquer method to outline a system. Such approach builds up the system configuration layers. Layers configuration compares to various leveled engineering methods. In hierarchal systems it is exceptionally testing task to give dependable correspondence over web because of plausibility of deficiencies in systems [2]. These shortcomings can make the systems administration as a slow terminal and it quit working until the point when the fault gets repaired. In progressive systems different deficiencies can happens i.e. physical deformities, equipment glitch, interface defilement, IP availability fault, physical adjustment in topology, arrange mis-configuration, electrical commotion [3]. The issue of system recuperation after enormous disturbance under vulnerability of the correct area of the failed hubs/path is handled effectively. We plan the base expected recuperation issue that it is NP-Hard. We propose a multi-arrange iterative stochastic recuperation calculation, that is displayed in three distinct variants, to be specific, Iterative most limited way, Iterative Branch and Bound, and iterative multi-ware LP unwinding to locate an achievable arrangement and take care of the issue. To contrast with past works, we altered a formerly proposed calculation called iterative split and prune [3] to work under vulnerability. We allude the adjusted variation as dynamic, as it permits a dynamic approach with incremental revelation at every emphasis. II. RELATED WORK Every IP hub typically keeps up an essential sending port for a destination. At the point when a fault happens, a portion of the essential ports could point to the harmed link/hub and wind up unusable. The fault on a specific way can be dealt by sending packets along a substitute way. This approach has been executed in viable systems. Be that as it may, an equivalent path may not exist in specific circumstances. A. Kwasinski et.al [1], as of now being institutionalized in the IETF, makes utilization of IP burrows that can naturally sidestep faults with ensured 100% fault scope inside a solitary action. J. Wang et al [2] proposed to utilize multi-topology IGPs, for example, MT-OSPF [9] for accomplishing quick fault recuperation where the influenced activity can be privately commented to directing topologies on the off chance that a fault happens in the default topology. To empower quick recuperation there should be an occurrence of AS connection faults, N. Bartoliniet al [3] proposed a shrewd FRR instrument that permits the default departure hub to quickly redirect client movement through pre-built up IP burrows towards the optional departure point. It ought to be noticed that current IP FRR arrangements manage intra and AS faults DOI /IJSSST.a ISSN: x online, print

2 independently, in which case devoted instruments should be connected against various kinds of faults. Conversely, we propose an encompassing arrangement that can ensure against the two kinds of faults, and all the more vitally, to empower unsurprising and controlled departure point. S. Tati et al.[4] proposes a various leveled structure for giving adaptation to non-critical regions in the progressive systems. It presents the product executed adaptation to internal layer of an appropriated situation [9]. III. PROPOSED NEW METHOD A. Failure of a Router In progressive model if any directing node damaged then it quits sending of message to next level nodes. For e.g. consider hub R3 failed because of any of above clarified reason at that point all the movement sent by R3 will be halted. For this situation because of fault of R3 the adjoining nodes will additionally quit working. At the point when GS1 needs to send message to host associated with hub SW5 then the message does not convey on account of static way. For defining the issue of fault recognition and recuperation in various leveled systems we consider progressive system engineering of any corporate association. This design contains three kinds of nodes one is a Group Server1 (GS1) to speak to association head. Furthermore seven hubs name as S1, S2, S3, S4, S5, S6, and S7. Furthermore, five hubs (S1, S2, S3, S4, S5) to give network to different end nodes. Advance GS1 is associated with the hub S1 for next level correspondence. We consider that hubs are associated with aggregate server, hub, or part have utilizing bidirectional connection. On the off chance that end node2 associated with hub 4 (SW4) intrigued to transmit the message to node 3 of hub 2(SW2) at that point sending of message will take after the way: Fig.2. Failure of a Router. Also, sending of messages will stay suspended until the point when R3 get repaired. In this manner the whole messages which are sent by means of R3 are dropped and GS1 retransmitted the message after timeout. B. Failure of Transmission Link In progressive model, if any correspondence interface progresses toward attack because of any fault then nodes which are associated with this connection won't convey to each other. In this way messages were sent among those nodes are dropped. For e.g. in Fig. 2 joins R1 to R3 flopped then all the movement towards R1/R3 are halted until the point when route is repaired. For this situation again GS1retransmits the message after timeout. Fig. 1. Network model. Presently, there are two primary issues related with various leveled nodes which are depicted below. B1. Detection of Path Most directing conventions recognize faults by exchanging \hello" messages between neighboring hubs and flooding the topology changes through the system. This approach requires little clocks for quick fault identification, DOI /IJSSST.a ISSN: x online, print

3 forcing extra overhead on the hubs. Also, numerous faults are triggered by prompting two convergence events one for the connection (s), and another for the recovery that both reason transient interruptions. In advertisement projection, \hello" messages don't identify a wide range of faults with mis-configurations (e.g., having a greatest packet estimate that is too little) and assaults (e.g., an enemy specifically dropping packets) don't prompt lost \hello" messages. Rather, our method depends on route level fault detection. Every entrance departure hub combine has a session to monitor every one of its ways. The tests can be piggybacked on existing information track, blocking the requirement for independent \hello" messages when the way is conveying general information track. This empowers quick fault recognition without presenting additional test track, and the \implicit tests" give a more practical perspective of the unwavering quality of a way [3, 12], since the packets differ in size, locations, etc. Another preferred standpoint is that the packets are dealt with by the equipment interfaces and, in that capacity, don't devour preparing assets at middle hubs. C. Algorithm for Fault Recognition In fault discovery calculation, it utilizes Fault Detection Message (FDM) to recognize fault in the system. FDM send by nodes to verify their neighboring nodes if they are active or not. FDM is additionally arranged in two kinds initially is Fault Detection Query Message (FDQM) and second is Fault Detection Report Message (FDRM). The architecture of the network recovery process is explained clearly in below figure. In the proposed method initially the network node parameters like location, routing information, ID, Protocol to be used of every node is given as input. Based on the information provided a network is established and routing is done among the nodes which are authenticated using the protocol specified. After establishing the route then link failure is recognized between 2 nodes by using ACK scheme. In the proposed method: When a node sends a data packet to its next node, after receiving the data neighbor node has to send the data back to its sender. If the ACK is not received with in stipulated time then again sender will send the data again for specific time. If still ACK is not received then considered it as link or node failure. When a failure is recognized in the network then AERN approach is used for failure recovery where a new route is established which is considered from backups immediately and data forwarding occurs. Backups are maintained by the parent node(pn) which acts central node of the whole network which has responsibilities like Node authentication, Key Generation, Key Distribution, Route Identification and Backup Maintenance. If no routing information is present in backups then re-routing is performed and stored in backups. After establishing a new route then the routing information is stored in backups for future purpose. When a new route is identified from available backup path, communication will be done by avoiding the node or link which gets failed and the communication among the nodes will be completed successfully. The PN will track each and every step in communication and stores in its Backup for future use. As the Node which is not involved in communication because of link/node failure, it has to be rectified and a new node or link should be established. When the Node/link is replaced with active node, then the information which it has not received must reach to it. When the node/link gets repaired then the Parent node will send ACK message to check if it is in active mode or node. If the Node sends ACK back to PN, then now PN will send the information to the nodes which are not involved in communication. With this every node will get proper information even if failure occurs. The proposed method effectively establishes route and also performs network recovery effectively with a minimum time. FDM propels QM (Query message) or RM (Report message) to straightforwardly associated hubs. The proposed algorithm effectively identifies the faults in the network. Fig. 3. Architecture of AERN Method DOI /IJSSST.a ISSN: x online, print

4 repaired before timeout then it tells the sending (source) node. The proposed algorithm effectively recovers the faults occurred in the networks. Input: Size of Buffer=B Fig.4. Failure of Link/Node In the above figure a network is formed but only nodes A,C,F,G,J,K,L,Q are authenticates trusted nodes. When communication is initiated then if link between F and K or node K gets failed. Red colored node K is failed node and green colored node J is PN. When node k gets failed then or path between F and K gets failed then communication will continue without any delay by avoiding node K or the link between them. The PN will trace every action and stores it in backups. When the node or path is re-established then PN will send the missed data for node K. E. Creating Backup Configurations D. Fault Recovery Algorithm Fault recuperation calculation is utilized to give unwavering quality by speedier recuperation from deficiencies. In various leveled organization if any node identified flaws, at that point fault recuperation calculation is in charge of following undertakings: 1. Stores the message at the cradle of past hub; 2.Transmit the message after hub get repaired; 3. In the event that flawed node not Fault recovery methods designs are characterized by the system topology, which is the same in all setups, and the related connection weights, which contrast among arrangements. We formally speak to the system topology as a diagram G = (N, A), with an arrangement of hubs N and an arrangement of unidirectional connections (bends) A. So as to ensure single-adaptation to internal nodes, the topology chart G must be bi-associated. In producing reinforcement design we will first detail the necessities that must be put on the reinforcement setups utilized. At that point we propose a algorithm that can be utilized to naturally make such arrangements. The calculation will regularly run once at the underlying start-up of the system, and each time a hub or connection is for all time included or evacuated. The proposed algorithm maintains the backups of the networks as if any failure occurs in node or a link then by using these backups the network can be reconfigured. DOI /IJSSST.a ISSN: x online, print

5 MAC layer to convey a parcel from neighbor identifier hubs. Along these lines, we have Note a MAC accomplishment for an identifier shows that there is no crash with any of the other n 1 route finder hubs in a dispute network W. Assume every MAC get to time is one time unit in a conflict network of W time units., we can ascertain RMAC as IV. RESULTS AND DISCUSSION We have produced preparing information under different renovation parameters. The versatile framework is defined by these assaults on Networks wherein hubs once formed are in fixed location with a motion-less routing path. A particular test system expected for systems administration known as 'NS2'. Event scheduler list the occasions, for example, packet and clock end. Driven occasion scheduler handles the occasions each one in turn and multicast conventions over wired and remote systems, NS2 give extensive help. Basically NS2 is a occasion scheduler to list the occasions, Driven occasion scheduler handles the occasions each one in turn and can't accurately mirror occasions took care of simultaneously in reality. This isn't a tremendous obstruction in dominant part of the system recreations, since the occasions here are every now and again impermanent. Further, NS-2 executes various system components and conventions. In the event that the recuperation conflict route measure is W, the identifier recuperates the route failure recognized in an irregular time inside (0, W). LetRRSis a chance to be the likelihood of recuperation accomplishment for a route finder to send a recuperation parcel to its protest hub. Note that the likelihood of recuperation accomplishment of an identifier is under the condition that Let RRF = 1 RRS be the likelihood of route failure for a finder to send a recuperation packet to its protest hub. At that point the likelihood that all route finders of a question neglect to recoup can be composed as prompting the general likelihood of effective network recovery as: Any route recovery can be done in a network using the below equation In NS2 simulator the parameters used are depicted in table below TABLE-1 PARAMETERS USED 1. MAC layer achievement: there is no impact with different identifiers at the season of recuperation packet conveyance, 2. RHY layer achievement: effective PHY layer unicast of the recuperation bundle to the protest. Give RRHY is a chance to be the likelihood of recuperation unicast disappointment at PHY layer to convey a packet from the neighbor indicator hubs. Further, let RMAC be the likelihood of recuperation disappointment at DOI /IJSSST.a ISSN: x online, print

6 Fig.5. Network Creation in NS2 Simulator The Fig.5 indicates utilizing NS2 test system made fixed network where nodes are fixed at a location and involve in communication. At that point one specific hub naturally will assume responsibility group head i.e. Parent Node. This group head will identify the failed hubs. Fig.7. Network failure detection rate The Fig.7 represented as Network group Data Loss Ratio, Loss is the quantity of hubs with number of the packet and time of movement. In this diagram time is in x pivot. Fig.8. Failure Recovery Rate Fig.6. Identification of the harmed hubs in the Network. It is noted that this isn't an immense obstruction in majority share of the network reproductions, since the occasions here are much of the time brief. Further, ns-2 executes different system instruments and conventions. The proposed method is compared with the existing technique for failure detection rate and the performance graph is depicted as below. Fig.9. Network throughput DOI /IJSSST.a ISSN: x online, print

7 Fig.9 demonstrates the proposed algorithm that depicts about the packet throughput. Packet loss is the quantity of hubs with number of the packet and time of movement. In this chart time is in x pivot. Fig.10. Delay in Node/Link re-connection Fig.10 illustrates the time taken to re-establish a node or a link when a failure is detected. The proposed method takes very less time to re-establish the network when compared with the existing method. V. CONCLUSION Our outcome demonstrates that AERN approach is superior to anything then regular approach over the system parameters: delay, throughput. In future the AERN approach will be contemplated and stretched out for blockage in progressive system. In light of the consequences of blockages based AERN approach it will additionally be summed up for an assortment of business systems. Amid this transmission whenever, if the first course is recouped, information transmission utilizing reinforcement route is ceased and again moved to the first route. By utilizing this design one can enhance the speed of fault recuperation and information transmission. AERN in this way accomplishes quick recuperation with an exceptionally restricted execution. AERN does not take any measures towards a decent load dispersion in the system in the period when activity is directed on the recuperation ways. The proposed method efficiently identifies the failed node or link and establishes the link immediately without any data loss. Also the proposed AERN method maintains the backup of the network so as to re-route whenever necessary... REFERENCES [1] A. Kwasinski et al. Telecommunications power plant damageassessment for hurricane katrina site survey and followupresults. IEEE Systems Journal, [2] J. Wang et al. On progressive network recovery after a majordisruption. In Proceedings IEEE INFOCOM, [3] N. Bartolini et al. Network recovery after massive s. InDependable Systems and Networks (DSN), [4] S. Tati et al. Adaptive algorithms for diagnosing large-scales in computer networks. In Dependable Systems andnetworks (DSN), [5] T. Horie et al. A new method of proactive recovery mechanismfor large-scale network s. In AINA 09. IEEE, [6] G. Yu et al. Disruption management: framework, models and applications. World Scientific, [7] K. Al Sabeh et al. Progressive network recovery in opticalcore networks. In th International Workshop on Reliable Networks Design and Modeling (RNDM). IEEE, [8] F. Farhat et al. Locally multipath adaptive routing protocol resilient to selfishness and wormholes. In ISPEC, [9] D. Z. Tootaghaj et al. Game-theoretic approach to mitigate packet dropping in wireless ad-hoc networks. In CCNC, [10] Y. Bozorgnia et al. Earthquake engineering: from engineering seismology to performance-based engineering. CRC press,2004. [11] D. Clark. The design philosophy of the DARPA internet protocols. in Proc. SIGCOMM'88, 1988, pp [12] A. Basu and J.G. Riecke. Stability issues in OSPF routing. in Proc. ACM SIGCOMM, 2001, pp [13] C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian. (2001, June). Delayed internet routing convergence. IEEE/ACM Trans. Networking, 9(3), pp [14] C. Boutremans, G. Iannaccone and C. Diot. Impact of links on VoIP performance in Proc. Int. Workshop on Network and Operating System Support for Digital Audio and Video,2002, pp [15] P. Francois, C. Filsfils, J. Evans and O. Bonaventure. (July 2005). Achieving sub-second IGP convergence in large IP networks. SIGCOMM Comput. Commun. Rev. 35(3), pp [16] A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C.N. Chuah and C. Diot, (August 2008). Characterization of s in an IP backbone network, IEEE/ACM Trans. Netw. 16(4) pp [17] A. F. Hansen, T. Cicic, S. Gjessing, A. Kvalbein, and O. Lysne. (April 2009). Multiple Routing Configurations For Fast IP Network Recovery, IEEE/ACM Trans. Netw. 17(2), pp [18] O. Bonaventure et al, Achieving Sub-50 Milliseconds Recovery upon BGP Peering Link s, IEEE/ACMTrans. on Netw. Vol 15, No 5, October 2007 [19] R. Teixeira et al, TIE Breaking: Tunable Inter-domain Egress Selection, IEEE/ACM Trans. on Netw. Vol. 15, No.4, 2007 [20] N. Kushman et al, R-BGP: Staying Connected in a Connected World, Proc. USENIX NSDI, April 2007 [21] M. Motiwala et al, Path Splicing, Proc. ACM SIGCOMM2008 [22] A. Atlas, Basic Specification for IP Fast-Reroute: Loop-free Alternates, IETF RFC 5286, September 2008 [23] S. Nelakuditi et al, Fast Local Rerouting for Handling Transient Link s, IEEE/ACM Trans. on Netw. Vol.15, No. 2, 2007 DOI /IJSSST.a ISSN: x online, print

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System.

Key words: TCP/IP, IGP, OSPF Routing protocols, MRC, MRC System. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume2 Issue 8 August, 2013 Page No. 2628-2634 Multiple Routing Configurations For Fast Ip Network Recovery Sk.Meeravali

More information

Deterministic Routing in OSPF for Post Single Link Failure

Deterministic Routing in OSPF for Post Single Link Failure Deterministic Routing in OSPF for Post Single Link Failure Dnyaneshwar Dhangar 1, Sachin Bojewar 2 1 (Information Technology/ Mumbai, India) 1 (Information Technology/ Mumbai, India) ABSTRACT : In the

More information

Fast IP Network Recovery using MRC

Fast IP Network Recovery using MRC International Journal of Research in Computer Science ISSN 2249-8257 Volume 1 Issue 1 (2011) pp. 75-88 White Globe Publications www.ijorcs.org Fast IP Network Recovery using MRC T.K Rajesh 1, N. Sreenivasulu

More information

OSPF with Deterministic Routing

OSPF with Deterministic Routing OSPF with Deterministic Routing Sachin Bojewar Associate Professor, Vidyalankar Institute of Technology, Wadala, Mumbai, India Dnyaneshwar Dhangar Vidyalankar Institute of Technology, Wadala, Mumbai, India

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Link/Node Failure Recovery through Backup Path Lengths

Link/Node Failure Recovery through Backup Path Lengths Link/Node Failure Recovery through Backup Path Lengths Ravula Prathap Kumar, Banothu Balaji, Dasari Yakobu, N Sai Bala Kishore Department of Computer Science and Engineering, Vignan University, Guntur,

More information

Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes

Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes Achieving Fast BGP Reroute with Traffic Engineering Using Multiple Routing Planes Yu Guo, Ning Wang, Kin-Hon Ho, Michael Howarth, and George Pavlou 2 Centre for Communication Systems Research, University

More information

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS American Journal of Applied Sciences 11 (7): 1059-1064, 2014 ISSN: 1546-9239 2014 K.S. Kumar et al., This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/ajassp.2014.1059.1064

More information

Convergence Routing Analysis in IPv6 Networks

Convergence Routing Analysis in IPv6 Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735 PP 18-24 www.iosrjournals.org Convergence Routing Analysis in IPv6 Networks S.Arun Kumar 1 and

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

ICS 351: Today's plan. OSPF BGP Routing in general

ICS 351: Today's plan. OSPF BGP Routing in general ICS 351: Today's plan OSPF BGP Routing in general link-state routing in distance-vector (Bellman-Ford, Ford-Fulkerson, RIP-style) routing, each router distributes its routing table to its neighbors an

More information

Physical-Layer Communication Recovery for Heterogeneous Network

Physical-Layer Communication Recovery for Heterogeneous Network Physical-Layer Communication Recovery for Heterogeneous Network Po-Kai Tseng 1, Wei-Ho Chung 1, Kate Ching-Ju Lin 1, Chi-Sheng Shih 2, and Ling-Jyh Chen 3 1 Research Center for Information Technology Innovation,

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

ENHANCING NETWORK SURVIVABILITY USING ROUTING AND LINK WEIGHT ASSIGNMENT TO AVOID CONGESTION

ENHANCING NETWORK SURVIVABILITY USING ROUTING AND LINK WEIGHT ASSIGNMENT TO AVOID CONGESTION P.-K. Tseng et al., Int. J. of Safety and Security Eng., Vol. 5, No. 1 (2015) 29 47 ENHANCING NETWORK SURVIVABILITY USING ROUTING AND LINK WEIGHT ASSIGNMENT TO AVOID CONGESTION P.-K. TSENG, W.-H. CHUNG,

More information

International Journal on Emerging Technologies (Special Issue on NCRIET-2015) 6(2): (2015)

International Journal on Emerging Technologies (Special Issue on NCRIET-2015) 6(2): (2015) e t International Journal on Emerging Technologies (Special Issue on NCRIET-2015) 6(2): 155-162(2015) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Minimizing Routing Overhead through Availability

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 173 A Review of Various Approaches to Multipath Routing Maryada M.Tech. Student, Department of Computer Science

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

Mitigating Link Failures and Implementing Security Mechanism in Multipath Flows for Data Plane Resources

Mitigating Link Failures and Implementing Security Mechanism in Multipath Flows for Data Plane Resources World Engineering & Applied Sciences Journal 7 (4): 212-219, 2016 ISSN 2079-2204 IDOSI Publications, 2016 DOI: 10.5829/idosi.weasj.2016.212.219 Mitigating Link Failures and Implementing Security Mechanism

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 10, October 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B. IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

Analyzation of Automatic Repeat Request (ARQ) Protocols

Analyzation of Automatic Repeat Request (ARQ) Protocols RESEARCH ARTICLE OPEN ACCESS Analyzation of Automatic Repeat Request (ARQ) Protocols 1 Jeshvina.S, 2 Sneha.P, 3 Saraanya.S Final year BCA, Dept of Computer Science New Horizon College Kasturinagar, Bangalore

More information

Rate Based Pacing with Various TCP Variants

Rate Based Pacing with Various TCP Variants International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Rate Based Pacing with Various TCP Variants Mr. Sreekanth Bandi 1, Mr.K.M.Rayudu 2 1 Asst.Professor, Dept of CSE,

More information

Techniques and Protocols for Improving Network Availability

Techniques and Protocols for Improving Network Availability Techniques and Protocols for Improving Network Availability Don Troshynski dtroshynski@avici.com February 26th, 2004 Outline of Talk The Problem Common Convergence Solutions An Advanced Solution: RAPID

More information

Sorted out POR Protocol for MANETS with Destination Driven Strategies

Sorted out POR Protocol for MANETS with Destination Driven Strategies International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 1-7 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Sorted

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Disaster Management In IP Networks Using Automatic Node or Link Remapping

Disaster Management In IP Networks Using Automatic Node or Link Remapping Disaster Management In IP Networks Using Automatic Node or Link Remapping Mr. Issac Syam Sundar Palli #1, RojaRani Govada #2, Bhavya Badisa #3, Asha Jyothi Goli #4 #1 Assistant Professor, #2,#3,#4 Final

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

Performance Analysis of Aodv Protocol under Black Hole Attack

Performance Analysis of Aodv Protocol under Black Hole Attack International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc

More information

An Experimental Analysis on OSPF-TE Convergence Time

An Experimental Analysis on OSPF-TE Convergence Time An Experimental Analysis on OSPF-TE Convergence Time S. Huang* a, K. Kitayama a, F. Cugini b, F. Paolucci c, A. Giorgetti c, L. Valcarenghi c, P. Castoldi c a Osaka University, Osaka, Japan; b CNIT, Pisa,

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

Reducing Routing Overhead in Mobile Ad Hoc Networks Using Cluster Scheme

Reducing Routing Overhead in Mobile Ad Hoc Networks Using Cluster Scheme e-issn 2455 1392 Volume 2 Issue 2, February 2016 pp. 1-7 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Reducing Routing Overhead in Mobile Ad Hoc Networks Using Cluster Scheme Paranjape

More information

Operation Manual IPv4 Routing H3C S3610&S5510 Series Ethernet Switches. Table of Contents

Operation Manual IPv4 Routing H3C S3610&S5510 Series Ethernet Switches. Table of Contents Table of Contents Table of Contents Chapter 1 Static Routing Configuration... 1-1 1.1 Introduction... 1-1 1.1.1 Static Route... 1-1 1.1.2 Default Route... 1-1 1.1.3 Application Environment of Static Routing...

More information

OPTIMIZED SENSOR NODES OF WIRELESS SENSOR NETWORK BY FAULT NODE RECOVERY ALGORITHM

OPTIMIZED SENSOR NODES OF WIRELESS SENSOR NETWORK BY FAULT NODE RECOVERY ALGORITHM OPTIMIZED SENSOR NODES OF WIRELESS SENSOR NETWORK BY FAULT NODE RECOVERY ALGORITHM Chauhan Ajitkumar 1, Asst. Prof. Jignesh V. Patel 2 1PG Scholar, EC Dept., SPCE, Visnagar, Gujarat, India. 2Assistant

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

ICS 351: Today's plan. OSPF BGP Routing in general routing protocol comparison encapsulation network dynamics

ICS 351: Today's plan. OSPF BGP Routing in general routing protocol comparison encapsulation network dynamics ICS 351: Today's plan OSPF BGP Routing in general routing protocol comparison encapsulation network dynamics OSPF OSPF generally used within a single Autonomous System (AS), i.e. within an organization

More information

Comparison of Various Routing Protocols & Brief of MANET

Comparison of Various Routing Protocols & Brief of MANET International Journal of Modern Trends in Engineering and Research www.ijmter.com Comparison of Various Routing Protocols & Brief of MANET Akashkumar Patel 1, Rakshitkumar Hirapara 2, Vivekkumar Dhamecha

More information

CS118 Discussion Week 7. Taqi

CS118 Discussion Week 7. Taqi CS118 Discussion Week 7 Taqi Outline Hints for project 2 Lecture review: routing About Course Project 2 Please implement byte-stream reliable data transfer Cwnd is in unit of bytes, not packets How to

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

Planning for Information Network

Planning for Information Network Planning for Information Network Lecture 8: Network Routing Protocols Assistant Teacher Samraa Adnan Al-Asadi 1 Routing protocol features There are many ways to characterize routing protocols, including

More information

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Sharma Shelja, Kumar Suresh and Rathy R. K. Department of CSE, FET, MRIU, Faridabad, India Email: sharma.shelja@gmail.com, enthusk@yahoo.com,

More information

Ordered FIB Updates. draft-francois-ordered-fib-01.txt. Pierre Francois Olivier Bonaventure Mike Shand Stefano Previdi Stewart Bryant

Ordered FIB Updates. draft-francois-ordered-fib-01.txt. Pierre Francois Olivier Bonaventure Mike Shand Stefano Previdi Stewart Bryant Ordered FIB Updates draft-francois-ordered-fib-01.txt Pierre Francois Olivier Bonaventure Mike Shand Stefano Previdi Stewart Bryant Outline Quick reminder on ordered FIB updates Convergence time of ordered

More information

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA

Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Protected and Effective Transmission of Data in Peer-To-Peer Network Using SGA Sushma T Shanbhogue 1, Poonguzhali E 2 P.G. Student, Department of Computer Engineering, AMC Engineering College, Bangalore,

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Enhanced Multipath Routing And Proactive Route Maintenance For Congestion Minimization And Transient Link Failures

Enhanced Multipath Routing And Proactive Route Maintenance For Congestion Minimization And Transient Link Failures Enhanced Multipath Routing And Proactive Route Maintenance For Congestion Minimization And Transient Link Failures Selvamani K 1, Kanimozhi S 2, Elakkiya R 3 and Kannan A 4 1,3 Department of Computer Science

More information

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV) RESEARCH ARTICLE International Journal of Computer Techniques - Volume 2 Issue 1, 2015 OPEN ACCESS A Survey on Wireless Routing Protocols (AODV, DSR, DSDV) Sejal D Mello 1, Priyanka B. Patil 2, Tarannum

More information

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet A Comparative Analysis of Traffic Flows for and Protocols in Manet Ranichitra.A 1, Radhika.S 2 1 Assistant Professor, 2 M.Phil Scholar, Department of Computer Science, Sri S.R.N.M College, Sattur, India

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

PREVENTING NETWORK INSTABILITY CAUSED BY PROPAGATION OF CONTROL PLANE POISON MESSAGES *

PREVENTING NETWORK INSTABILITY CAUSED BY PROPAGATION OF CONTROL PLANE POISON MESSAGES * PREVENTING NETWORK INSTABILITY CAUSED BY PROPAGATION OF CONTROL PLANE POISON MESSAGES * Xiaojiang Du Mark A. Shayman Department of Electrical and Computer Engineering University of Maryland, College Park,

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lecture 13: Traffic Engineering CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster Lecture 13 Overview Evolution of routing in the ARPAnet Today s TE: Adjusting

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

Configuring StackWise Virtual

Configuring StackWise Virtual Finding Feature Information, page 1 Restrictions for Cisco StackWise Virtual, page 1 Prerequisites for Cisco StackWise Virtual, page 2 Information About Cisco Stackwise Virtual, page 2 Cisco StackWise

More information

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm A New Approach for Energy Efficient in MANETs Using Multi Objective Genetic Algorithm Neha Agarwal, Neeraj Manglani Abstract Mobile ad hoc networks (MANET) are selfcreating networks They contain short

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET MPBCA: Mobility Prediction Based Clustering Algorithm for MANET Rani.V.G Associate Professor Research and Development Center Bharathiar University Coimbatore, India ranikhans@gmail.com Dr.M.Punithavalli

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET Performance Evaluation of AODV DSDV and OLSR Protocols with Varying FTP Connections in MANET Alok Upadhyay, Rupali Phatak Research Scholar, Asst. Professor -Department of Electronics & Communication Engineering

More information

IP Routing Volume Organization

IP Routing Volume Organization IP Routing Volume Organization Manual Version 20091105-C-1.03 Product Version Release 6300 series Organization The IP Routing Volume is organized as follows: Features IP Routing Overview Static Routing

More information

ICS 351: Today's plan. distance-vector routing game link-state routing OSPF

ICS 351: Today's plan. distance-vector routing game link-state routing OSPF ICS 351: Today's plan distance-vector routing game link-state routing OSPF distance-vector routing game 1. prepare a list of all neighbors and the links to them, and the metric for each link 2. create

More information

An Efficient Data Routing Protocol for WSN with high Network Capacity and Scalability

An Efficient Data Routing Protocol for WSN with high Network Capacity and Scalability An Efficient Data Routing Protocol for WSN with high Network Capacity and Scalability Radhika BG 1, Shalini S 2 P.G. Student, Department of Computer Science, AMC College of Engineering, Karnataka, India

More information

OSPF Protocol Overview on page 187. OSPF Standards on page 188. OSPF Area Terminology on page 188. OSPF Routing Algorithm on page 190

OSPF Protocol Overview on page 187. OSPF Standards on page 188. OSPF Area Terminology on page 188. OSPF Routing Algorithm on page 190 Chapter 17 OSPF Protocol Overview The Open Shortest Path First (OSPF) protocol is an interior gateway protocol (IGP) that routes packets within a single autonomous system (AS). OSPF uses link-state information

More information

Handling multiple failures in IP Backbone network using LOLS along with AOMDV for detecting and avoiding wormhole attack

Handling multiple failures in IP Backbone network using LOLS along with AOMDV for detecting and avoiding wormhole attack Handling multiple failures in IP Backbone network using LOLS along with AOMDV for detecting and avoiding wormhole attack Anuja Sanjay Divekar 1 and Pankaj Chandre 2 1 PG Fellow, Department of Computer

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH

More information

Mobile SCTP for IP Mobility Support in All-IP Networks

Mobile SCTP for IP Mobility Support in All-IP Networks Mobile SCTP for IP Mobility Support in All-IP Networks Seok Joo Koh sjkoh@cs.knu.ac.kr Abstract The Stream Control Transmission Protocol (SCTP) is a new transport protocol that is featured multi-streaming

More information

Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer

Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer Protected Packet Routing: Achieving Fast Failure Recovery in the IP Layer Kang Xi and H. Jonathan Chao April 00 New York State CENTER FOR ADVANCED TECHNOLOGY IN TELECOMMUNICATIONS Supported by the New

More information

EVALUATING THE DIVERSE ALGORITHMS OF TRANSMISSION CONTROL PROTOCOL UNDER THE ENVIRONMENT OF NS-2

EVALUATING THE DIVERSE ALGORITHMS OF TRANSMISSION CONTROL PROTOCOL UNDER THE ENVIRONMENT OF NS-2 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.157

More information

HSRP (Hot Stand by Routing Protocol) Reliability Issues Over the Internet Service Provider s Network

HSRP (Hot Stand by Routing Protocol) Reliability Issues Over the Internet Service Provider s Network ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal www.computerscijournal.org ISSN: 0974-6471 December 2011, Vol. 4, No. (2): Pgs. 399-404

More information

Tracing down Black hole attack in MANETS

Tracing down Black hole attack in MANETS IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 5, Ver. III (Sep.- Oct. 2017), PP 06-10 www.iosrjournals.org Dr. G. Krishna Kishore 1, K. Jahnavi 2,

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

A New Backup Topology Design Method for Congestion Avoidance in IP Fast Reroute

A New Backup Topology Design Method for Congestion Avoidance in IP Fast Reroute International Journal of Networks and Communications 2012, 2(5): 123-131 DOI: 10.5923/j.ijnc.20120205.05 A New Backup Topology Design Method for Congestion Avoidance in IP Fast Reroute Simon Tembo 1,*,

More information

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

FAULT TOLERANT REAL TIME COMMUNICATION IN MULTIHOP NETWORKS USING SEGMENTED BACKUP

FAULT TOLERANT REAL TIME COMMUNICATION IN MULTIHOP NETWORKS USING SEGMENTED BACKUP Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1074

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Unit 3: Dynamic Routing

Unit 3: Dynamic Routing Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN: Cluster Based Id Revocation with Vindication Capability for Wireless Network S. Janani Devi* *Assistant Professor, ECE, A.S.L.Pauls College of Engineering and Technology, Tamilnadu, India ABSTRACT: The

More information

Cross-Layer Failure Restoration Techniques for a Robust IPTV Service

Cross-Layer Failure Restoration Techniques for a Robust IPTV Service Cross-Layer Failure Restoration Techniques for a Robust IPTV Service Murat Yuksel, K. K. Ramakrishnan, and Robert D. Doverspike yuksem@cse.unr.edu, kkrama@research.att.com, rdd@research.att.com Abstract

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Optimal Recovery from Large-Scale Failures in IP Networks

Optimal Recovery from Large-Scale Failures in IP Networks Optimal Recovery from Large-Scale Failures in IP Networks Qiang Zheng, Guohong Cao,TomLaPorta,andAnanthramSwami Department of Computer Science and Engineering, The Pennsylvania State University, University

More information

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

More information

Configuring MST Using Cisco NX-OS

Configuring MST Using Cisco NX-OS This chapter describes how to configure Multiple Spanning Tree (MST) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About MST, page

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Time Synchronization in Wireless Sensor Networks: CCTS

Time Synchronization in Wireless Sensor Networks: CCTS Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly

More information

An Optimized Time Series based Two phase strategy Pre-Copy Algorithm for Live Virtual Machine Migration

An Optimized Time Series based Two phase strategy Pre-Copy Algorithm for Live Virtual Machine Migration An Optimized Time Series based Two phase strategy Pre-Copy Algorithm for Live Virtual Machine Migration Ruchi Tailwal P.G. Scholar, Graphic Era Hill University Dehradun, India Avita Katal Assistant Professor,

More information

ITEC310 Computer Networks II

ITEC310 Computer Networks II ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able

More information

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Dr. S. K. Singh Professor, Department of EC, India Dr. R. Gupta Asst. Prof. Department of EC, India Abstract: The

More information

A Framework for Optimizing IP over Ethernet Naming System

A Framework for Optimizing IP over Ethernet Naming System www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul

More information

ABSTRACT I. INTRODUCTION. Rashmi Jatain Research Scholar, CSE Department, Maharishi Dayanand University, Rohtak, Haryana, India

ABSTRACT I. INTRODUCTION. Rashmi Jatain Research Scholar, CSE Department, Maharishi Dayanand University, Rohtak, Haryana, India ABSTRACT International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 3 ISSN : 2456-3307 Review on Congestion Control in MANET

More information