SlideShare a Scribd company logo
1 of 4
Download to read offline
Ms.Ashwina .N. Patil , Prof. S.S. Kanade , Ms. S.S. Bhakare / International Journal of
       Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                        Vol. 2, Issue4, July-August 2012, pp.1486-1489
     Fast Recovery For Dual-Link Failure Through Backup Path
         Ms.Ashwina .N. Patil* , Prof. S.S. Kanade** , Ms. S.S. Bhakare***
                           *
                              Department of CSE, College of Engineering. Osmanabad
                          **
                             Head of E&TC Dept, College of Engineering , Osmanabad
                         ***
                             Department of CSE, Sinhgad College of Engineering. Pune.

ABSTRACT
         The nodes in Mobile Ad Hoc Network                [4], [5]. Although the WDM network and wireless
(MANET) are mobile resulting in dynamic                    ad-hoc settings are quite different in nature, they
topology with high rate of link breakage and               share a number of problems and challenges. One of
network partitions leading to interruptions in the         them is failures of network components. If a link
ongoing communication. Because of node mobility            failure is detected on the primary path (through
and power limitations, the network topology                which actual data transmission is taking place), the
changes frequently. Link failures or path failure          source can switch to an alternate path instead of
are common in such type of network. Therefore              initiating a route discovery/recovery process. A new
the networks employ path/link protection to                discovery takes place only when all precomputed
achieve fast recovery from dual failures. While the        paths break.
first link failure can be protected using link                       Since in a wireless ad-hoc network has no
protection, but if second link is failed then we           fixed infrastructure and there is no centralized control
have the problem of recover that path so the               over the nodes ; no designated routers. So nodes
purpose of our system is that recovery from                serve as routers for each other, and data packets are
second failure. One of the strategies to recover           forwarded from node to node in a multi-hop fashion.
from dual-link failures is to employ link                  Protecting the circuits or connections established in
protection for the two failed links independently,         such networks against single-link failures may be
which requires that two links may not use each             achieved in two ways: path protection or link
other in their backup paths if they may fail               protection [6]. Main focus of this paper is to protect
simultaneously. Such a strategy is referred to as          end-to-end connections from dual-link failures using
backup link mutual exclusion (BLME). This                  path protection and link protection.
paper develops a solution to the BLME problem
by using two approaches by: 1) integer linear              2. TAXONOMY OF PROTECTION SCHEMES
program; 2) developing a polynomial time                             Protection schemes proposed in the
heuristic based on minimum cost path routing.              literature can be broadly classified as link protection
                                                           and path protection.
Keywords-MANET, BLME, FDLP, FILP.
                                                           2.1 Link protection
1. INTRODUCTION                                                      Link protection schemes route a connection
          A Mobile Adhoc Network (MANET) is a              around a failed link. Re-routing is performed by the
network composed of mobile nodes mainly                    node connected to the failed link to the neighboring
characterized by the absence of centralized                node on the original path. Such a protection may be
coordination or fixed infrastructure, which makes any      achieved in the network in a way that is transparent
node in the network act as potential router. MANETs        to the source node, except in cases where a link
are also characterized by a dynamic, random and            connected to the source or destination fails. Link
rapidly     changing     topology.      In    MANETs,      protection, as shown in Fig. 1, reroutes all the
communication link between mobile nodes always             connections on the failed link around it. When
require over multi-hop paths. Since no infrastructure      accepting a call request, the link protection scheme
exists and node may cause frequent link failure.           will reserve the network resource for the associated
          In WDM network, the failure of a single          protection path. The protection path connects the two
fiber link may lead to tremendous data loss since a        nodes adjacent to the failed link. When a link failure
single fiber link can carry a huge amount of data (on      occurs, the node adjacent to and upstream of the
the order of terabits per second).Therefore, network       failed link immediately redirects the traffic along the
survivability is an important problem in network           predetermined protection path to the node on the
design and its real-time operation. In order to reduce     other end of the failed link to restores transmission.
the data loss, various protection and restoration
mechanisms have been proposed and studied in the
literature to recover traffic after a failure occurs and
before the failure is physically repaired [1], [2], [3],


                                                                                                  1486 | P a g e
Ms.Ashwina .N. Patil , Prof. S.S. Kanade , Ms. S.S. Bhakare / International Journal of
       Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                        Vol. 2, Issue4, July-August 2012, pp.1486-1489

            5        6           7       8               9     1                                       ILP             Backup
                                                               0             User                      Method          Length
                                                                             Or          BLME
                                                                             Node        Problem                                         Results
                         3                       4

                                                                                                       Heuristic
                                                                                                                           Time
                                                                                                       Method
            1                                                     2                                                        In Sec

                                                              Primary path
                                                              Backup
                Fig 1: Link Protection                        path                         Fig 3 : System architecture

2.2 Path protection                                                             4. INTEGER LINEAR PROGRAMMING
           Path protection schemes recover from a                                         Dual-link failure resiliency strategies are
failure by re-routing the connections at the source.                            classified based on the nature in which the
Path protection schemes may be classified into two                              connections are recovered from first and second
categories based on their knowledge of the failure                              failures. The recovery from the first link failure is
location. Assignment of a backup path that does not                             assumed to employ link protection strategy. Fig. 4
require precise knowledge of the link failure is                                shows an example network where link 1-2 is
referred to as failure-independent path protection                              protected by the backup path 1-3-4-2. The second
(FIPP). Alternatively, if a connection may be                                   protection strategy will refer to the manner in which
assigned more than one backup path depending on                                 the backup path of the first failed link is recovered.
the failure, then it is referred to as failure-dependent
path protection (FDPP).Path protection, as illustrated                               5       6        7            8         9      10
in Fig. 2, reserves network resources for a single
protection path in addition to the primary path. Since
it is impossible to find which link on the primary path
will fail, the system allocates a protection path, which                                         3                     4
is completely link-disjoint from the primary path.
The primary path therefore shares no common link
with its associated protection path. When a link fails,                                                                             2
                                                                                     1
the source and destination nodes of a call on the
failed link are informed of the failure, and the                                                 Fig 4: Back up link
communication is switched to the protection path.
       5         6           7       8               9        1
                                                                                4.1 Failure Dependent Link Protection (FDLP)
                                                              0
                                                                                          If the backup path is affected by the second
                                                                                failure, a backup path under dual-link failure is
                                                                                provided. This backup path is computed by
                     3                       4                                  eliminating the two failed links from the network and
                                                                                computing shortest path between the specific node
                                                                                pairs. Fig.4 shows the backup path assigned for link
       1                                                       2                1-2 under dual-link failures. It may be observed that
                                                                                the backup path assignment is different for different
                                                             Primary path       failures that affect the path. When a second link
                                                             Backup
           Fig 2: Path Protection                                               failure occurs, a failure notification must be sent to
                                                             path
                                                                                node 1, explicitly mentioning the failure location in
3. LINK FAILURE RECOVERY                                                        the path 1-3-4-2. Every link is assigned one backup
          Path protection schemes recover from a                                path for single link failure and multiple backup paths
failure by re-routing the connections at the source.                            (depending on the number of links in the backup path
Path protection schemes may be classier into three                              for the single link failure) under dual-link failures. If
categories based on their knowledge of the failure                              the primary path and link 1-3 of backup path fails
location. Assignment of a backup path that does not                             down , then this dual failed link is recovered by the
require precise knowledge of the link failure is                                path 1-5-3-4-2,similarly for link 3-4 and 4-5 fails, the
referred to as failure independent path protection                              recovery will be 1-5-6-7-8-4-2 and 1-3-4-10-2.
(FIPP). Alternatively, if a connection may be
assigned more than one backup path depending on                                 4.2 Failure Independent Link Protection (FILP)
the failure, then it is referred to as failure-dependent                                 One approach to dual-link failure resiliency
path protection (FDPP). Link protection schemes                                 using link protection is to compute two link-disjoint
route a connection around a failed link.                                        backup paths for every link. For any two adjacent
                                                                                                                             1487 | P a g e
Ms.Ashwina .N. Patil , Prof. S.S. Kanade , Ms. S.S. Bhakare / International Journal of
       Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                        Vol. 2, Issue4, July-August 2012, pp.1486-1489
nodes, there exist two link-disjoint backup paths for     the rectangular region according to the “random way-
the link connecting the two nodes. Let Bl and B'l         point” mobility model. All data packets are 512 bytes
denote the two link-disjoint backups for link Bl. If      long. All traffic sessions are established at random
any link in the backup path Bl fails, the backup path     times near the beginning of the simulation run and
of will be reconfigured to B'l. Hence, the nodes          the sessions stay active until the end. Each simulation
connected to link l must have the knowledge of the        is run for 100 sec. We evaluate the performance by
failure in its backup paths (not necessarily the          varying number of nodes for both the methods.
location).If the link 1-2 fails, then under dual-link
failure the backup path assigned by FILP will be 1-5-     6.2 Performance Metrics
6-7-8-9-10-2. The backup path is identical under any               The performance of the ILP and heuristic
second failure that affects the path 1-3-4-2. When the    algorithm developed in this paper are evaluated by
second failure occurs, a failure notification must be     using the given performance metrics .
sent to nodes 1 and 2, although this notification need         Packet delivery ratio (PDR):
not explicitly mention which link failed in path 1-3-          Path length
4-2.                                                           Throughput
                                                                   Packet delivery ratio is the ratio of the
5. HEURISTIC APPROACH                                      number of data packets received at the destinations
          The heuristic solution is based on iterative     and the number of data packets actually sent to the
computation of minimum cost routing. The network           network. This measures the quality of the
is treated as an undirected graph G. A set of auxiliary    discovered path. The packet delivery ratio in IMCP
graphs corresponding to failure of a link l € G is         and FDLP is shown in figure 5.As the number of
created: Xl = G ( N , L-{l } ). In each auxiliary graph    nodes varies, the packet delivery ratio of both the
Xl the objective is to obtain a path between the nodes     methods increases. The packet delivery ratio of
that were originally connected by link l . Let Pl          FDLP is higher than that of IMCP.
denote the path selected in auxiliary graph Xl . If a
link l’ is a part of the path selected on graph Xl ,
then the path in graph Xl must avoid the use of link l
.This is accomplished by imposing a cost on the links
in the auxiliary graphs, and having the path selection
approach select the minimum cost path. Let Wl l’
denote the cost of link l’ on graph Xl such that it
indicates that graph Xl ‘ contains link l and the two
links l and l’ may be unavailable simultaneously.
Hence, the cost values are binary in nature. The cost
of a path in an auxiliary graph is the sum of the cost
of links in it. At any given instant during the
computation, the total cost of all the paths (T) is the
sum of the cost of the paths across all auxiliary
graphs. It may be observed that the total cost must be
                                                          Fig 5 :Packet Delivery Ratio for IMCP and FDLP
an even number, as every link l’ in a path Pl that has
                                                                   The average hop length in IMCP and FDLP
a cost of 1 implies that link l in path Pl ‘ would also
                                                          is shown in figure 6. The path length is calculated
have a cost of 1. For a given network, the minimum
                                                          during the packet delivery. The alternative path may
value of the total cost would then be two times the
                                                          be longer than the main path.
number of dual-link failure scenarios that would have
the network disconnected. If τ denotes the number of
dual-link failure scenarios that would disconnect the
graph, then the termination condition for the heuristic
is given by T = 2τ .

6. PERFORMANCE EVALUATION
6.1 Simulation setup
         The setup of the simulation depicts an ad
hoc network that consists of a varying number of
Mobile Hosts (MHs) that move randomly in a square
field free of obstacles. The setup is based on the
OMNeT++ discrete simulator. The implementation of
the proposed methods is based on the AODV routing
                                                          Fig 6 :Average hop length for IMCP and FDLP
protocol. We have fixed the area to a rectangular
                                                          Figure 7 shows the throughput comparison of IMCP
region of 350m x 350m. The transmission range of
                                                          and FDLP. The ratio of the total amount of data that
each node is fixed to 250 m. Nodes move around in
                                                                                                1488 | P a g e
Ms.Ashwina .N. Patil , Prof. S.S. Kanade , Ms. S.S. Bhakare / International Journal of
         Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                          Vol. 2, Issue4, July-August 2012, pp.1486-1489
reaches a receiver from a sender to the time it takes       [4]    M. Clouqueur and W. D. Grover,
for the receiver to get the last packet is referred to as          “Availability analysis of spanrestorable
throughput. It is expressed in bits per second or                  mesh networks,” IEEE J. Select. Areas
packets per second. Factors that affect throughput                 Commun., vol. 20,no. 4, pp. 810–821, (May
include frequent topology changes, unreliable                      2002).
communication, limited bandwidth and limited                [5]    S. Ramamurthy, L. Sahasrabuddhe, and B.
energy. Packet delivery capacity of the proposed                   Mukherjee, “Survivable WDM mesh
method decreases as the network size increases. This               networks,” IEEE/OSA J. Lightwave
is due to the route breaks as the number of size                   Technology, vol. 21,no. 4, pp. 870–883,
increases.                                                         (Apr. 2003).
                                                            [6]    A. Chandak and S. Ramasubramanian,
                                                                   “Dual-link failure resiliency through backup
                                                                   link mutual exclusion,” in Proc. IEEE Int.
                                                                   Conf. Broadband Networks, Boston, MA,
                                                                   (Oct. 2005), pp. 258–267.

                                                            [7]    R. Ramamurthy, A. Akyamac, J.-F.
                                                                   Labourdette, and S. Chaudhuri, “Preemptive
                                                                   reprovisioning in mesh optical networks,” in
                                                                   Proc. OFC’(2003), pp. 785–787.
                                                            [8]    H. Choi, S. Subramaniam, and H.-A. Choi,
                                                                   “On double-link failure recovery in WDM
                                                                   optical networks,” in Proc. IEEE
                                                                   INFOCOM’(2002),vol. 2, pp. 808–816.
                                                            [9]    S. Kim and S. Lumetta, “Evaluation of
                                                                   protection reconfiguration for multiple
Fig 7: Variation of throughput with network size for               failures inWDM mesh networks,” in Proc.
IMCP and FDLP                                                      OFC’(2003), pp. 210–211.
                                                            [10]   D. Schupke and R. Prinz, “Performance of
7. CONCLUSION                                                      path protection and rerouting for WDM
         This paper focuses on the approaches for                  networks subject to dual failures,” in Proc.
providing dual-link failure resiliency. Recovery from              OFC’(2003),pp. 209–210. [10] S. S.
a dual-link failure using an extension constraint,                 Lumetta
referred to as BLME constraint, whose satisfiability        [11]   Perkins C E., “Ad Hoc Network”,
allows the network to recover from dual-link failures.             Switzerland: Addsion-Wesley, (2000).
In this paper, we motivated the need for considering        [12]   S.J. Lee, E. Royer and C.E. Perkins,
double-link failures and presented some approaches                 “Scalability study of the ad hoc on-demand
for handling such failures. So here, we have proposed              distance     vector     routing    protocol”,
two schemes to solve BLME problem . The proposed                   International         Journal of Network
scheme shows significant improvements in terms of                  Management, Vol.13, (2003), pp. 97–114.
packet delivery ratio, average hop length and               [13]   S. Corson and J. Macker, “Mobile ad hoc
throughput.                                                        networking (MANET): routing protocol
                                                                   performance      issues    and     evaluation
REFERENCES                                                         considerations”, RFC. 2501, (1999).
  [1]     B. Mukherjee, “WDM optical networks:              [14]   D.B Johnson, D.A Maltz and Josh Broch,
          progress and challenges,” IEEE J. Select.                “DSR: The Dynamic Source Routing
          Areas Commun., vol. 18, pp. 1810–1824,                   Protocol for Multi-Hop Wireless Ad Hoc
          (Oct. 2000).                                             Networks”, In Ad Hoc Networking, edited
  [2]     O. Gerstel and R. Ramaswami, “Optical                    by Charles E. Perkins, Chapter 5, pp. 132–
          layer survivability: a services perspective,”            172, Addison-Wesley, (2001).
          IEEE Commun. Mag., vol. 38, pp. 104–113,          [15]   C.E. Perkins and E.M. Royer, “Ad-Hoc On
          (March 2000).                                            Demand Distance          Vector Routing,”
  [3]     G. Mohan, C. S. R. Murthy, and A. K.                     Proceedings of the 2nd IEEE Workshop on
          Somani, “Efficient algorithms for routing                Mobile      Computing        Systems     and
          dependable connections in WDM optical                    Applications (WMCSA), New Orleans, LA,
          networks,” IEEE/ACM Trans. Networking,                   (February 1999), pp. 90-100
          vol. 9, pp. 553–566, (Oct. 2001)



                                                                                               1489 | P a g e

More Related Content

What's hot

Network using topologies
Network using topologiesNetwork using topologies
Network using topologiesJaveria600
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
 
785101092study material xii_ip
785101092study material xii_ip785101092study material xii_ip
785101092study material xii_ipgitesh_nagar
 
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...IDES Editor
 
Multistage interconnection networks a transition to optical
Multistage interconnection networks a transition to opticalMultistage interconnection networks a transition to optical
Multistage interconnection networks a transition to opticaleSAT Publishing House
 
Networking tutorials introduction to networking
Networking tutorials   introduction to networkingNetworking tutorials   introduction to networking
Networking tutorials introduction to networkingVinod Jadhav
 
A simulation model of ieee 802.15.4 gts mechanism and gts
A simulation model of ieee 802.15.4 gts mechanism and gtsA simulation model of ieee 802.15.4 gts mechanism and gts
A simulation model of ieee 802.15.4 gts mechanism and gtswissem hammouda
 
Stability routing in fso manets
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manetseSAT Journals
 
Network Topology
Network TopologyNetwork Topology
Network TopologyRohan Raj
 
Strategies and Metric for Resilience in Computer Networks
Strategies and Metric for Resilience in Computer NetworksStrategies and Metric for Resilience in Computer Networks
Strategies and Metric for Resilience in Computer Networksdmarinojr
 
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...IOSR Journals
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
Network topology
Network topologyNetwork topology
Network topologylekshmik
 

What's hot (20)

Network using topologies
Network using topologiesNetwork using topologies
Network using topologies
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
 
MyThesis
MyThesisMyThesis
MyThesis
 
785101092study material xii_ip
785101092study material xii_ip785101092study material xii_ip
785101092study material xii_ip
 
Network topology
Network topologyNetwork topology
Network topology
 
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
 
Multistage interconnection networks a transition to optical
Multistage interconnection networks a transition to opticalMultistage interconnection networks a transition to optical
Multistage interconnection networks a transition to optical
 
Networking tutorials introduction to networking
Networking tutorials   introduction to networkingNetworking tutorials   introduction to networking
Networking tutorials introduction to networking
 
A simulation model of ieee 802.15.4 gts mechanism and gts
A simulation model of ieee 802.15.4 gts mechanism and gtsA simulation model of ieee 802.15.4 gts mechanism and gts
A simulation model of ieee 802.15.4 gts mechanism and gts
 
shashank_spdp1993_00395543
shashank_spdp1993_00395543shashank_spdp1993_00395543
shashank_spdp1993_00395543
 
Stability routing in fso manets
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manets
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
ICICCE011
ICICCE011ICICCE011
ICICCE011
 
Strategies and Metric for Resilience in Computer Networks
Strategies and Metric for Resilience in Computer NetworksStrategies and Metric for Resilience in Computer Networks
Strategies and Metric for Resilience in Computer Networks
 
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
Overview of Improving Robustness of MAODV Protocol by Combining Tree and Mesh...
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
Network topology
Network topologyNetwork topology
Network topology
 
50120140501004
5012014050100450120140501004
50120140501004
 
NETWORK TOPOLOGIES
NETWORK TOPOLOGIESNETWORK TOPOLOGIES
NETWORK TOPOLOGIES
 

Viewers also liked (20)

Hg2412901297
Hg2412901297Hg2412901297
Hg2412901297
 
Jp2416601666
Jp2416601666Jp2416601666
Jp2416601666
 
Hq2413531358
Hq2413531358Hq2413531358
Hq2413531358
 
I24056076
I24056076I24056076
I24056076
 
Hc2412691276
Hc2412691276Hc2412691276
Hc2412691276
 
Hm2413291336
Hm2413291336Hm2413291336
Hm2413291336
 
Ii2414621475
Ii2414621475Ii2414621475
Ii2414621475
 
G24041050
G24041050G24041050
G24041050
 
Ej24856861
Ej24856861Ej24856861
Ej24856861
 
Fy2410811087
Fy2410811087Fy2410811087
Fy2410811087
 
Gb2410971101
Gb2410971101Gb2410971101
Gb2410971101
 
Hw2413871391
Hw2413871391Hw2413871391
Hw2413871391
 
Fl2410041009
Fl2410041009Fl2410041009
Fl2410041009
 
Fs2410401044
Fs2410401044Fs2410401044
Fs2410401044
 
Er31950953
Er31950953Er31950953
Er31950953
 
Comunicacion
ComunicacionComunicacion
Comunicacion
 
Jogo das letras
Jogo das letrasJogo das letras
Jogo das letras
 
Some stuff about C++ and development
Some stuff about C++ and developmentSome stuff about C++ and development
Some stuff about C++ and development
 
Kayla's flipbook
Kayla's flipbookKayla's flipbook
Kayla's flipbook
 
Ueta 2013
Ueta 2013Ueta 2013
Ueta 2013
 

Similar to Il2414861489

A Review on Network Survivability in Optical Networks
A Review on Network Survivability in Optical NetworksA Review on Network Survivability in Optical Networks
A Review on Network Survivability in Optical NetworksIJERA Editor
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Networkpijans
 
A Framework for Routing Misbehavior Recognition in MANETS
A Framework for Routing Misbehavior Recognition in MANETSA Framework for Routing Misbehavior Recognition in MANETS
A Framework for Routing Misbehavior Recognition in MANETSEECJOURNAL
 
A Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing ProtocolsA Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing Protocolsijeei-iaes
 
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...IJNSA Journal
 
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...IJNSA Journal
 
Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...IAEME Publication
 
Shared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multipleShared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multipleiaemedu
 
Design and development of anonymous location based routing for mobile ad-hoc...
Design and development of anonymous location based routing  for mobile ad-hoc...Design and development of anonymous location based routing  for mobile ad-hoc...
Design and development of anonymous location based routing for mobile ad-hoc...IJECEIAES
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...Editor IJCATR
 

Similar to Il2414861489 (20)

A Review on Network Survivability in Optical Networks
A Review on Network Survivability in Optical NetworksA Review on Network Survivability in Optical Networks
A Review on Network Survivability in Optical Networks
 
Hg3113981406
Hg3113981406Hg3113981406
Hg3113981406
 
Hg3113981406
Hg3113981406Hg3113981406
Hg3113981406
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
Study of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh NetworkStudy of Various Schemes for Link Recovery in Wireless Mesh Network
Study of Various Schemes for Link Recovery in Wireless Mesh Network
 
A Framework for Routing Misbehavior Recognition in MANETS
A Framework for Routing Misbehavior Recognition in MANETSA Framework for Routing Misbehavior Recognition in MANETS
A Framework for Routing Misbehavior Recognition in MANETS
 
A Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing ProtocolsA Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing Protocols
 
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
 
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
REAL TIME SECURING OF ALL-OPTICAL NETWORKS AGAINST SECURITY ATTACKS AT THE PH...
 
Br33421423
Br33421423Br33421423
Br33421423
 
Br33421423
Br33421423Br33421423
Br33421423
 
Aq4103266271
Aq4103266271Aq4103266271
Aq4103266271
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...
 
Shared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multipleShared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multiple
 
E42022125
E42022125E42022125
E42022125
 
Design and development of anonymous location based routing for mobile ad-hoc...
Design and development of anonymous location based routing  for mobile ad-hoc...Design and development of anonymous location based routing  for mobile ad-hoc...
Design and development of anonymous location based routing for mobile ad-hoc...
 
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
A Multiparametric Reliable AODV Protocol using Alternate Routing in MANET’s u...
 
Ijariie1170
Ijariie1170Ijariie1170
Ijariie1170
 
Md ux mza5mtg=14
Md ux mza5mtg=14Md ux mza5mtg=14
Md ux mza5mtg=14
 

Il2414861489

  • 1. Ms.Ashwina .N. Patil , Prof. S.S. Kanade , Ms. S.S. Bhakare / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1486-1489 Fast Recovery For Dual-Link Failure Through Backup Path Ms.Ashwina .N. Patil* , Prof. S.S. Kanade** , Ms. S.S. Bhakare*** * Department of CSE, College of Engineering. Osmanabad ** Head of E&TC Dept, College of Engineering , Osmanabad *** Department of CSE, Sinhgad College of Engineering. Pune. ABSTRACT The nodes in Mobile Ad Hoc Network [4], [5]. Although the WDM network and wireless (MANET) are mobile resulting in dynamic ad-hoc settings are quite different in nature, they topology with high rate of link breakage and share a number of problems and challenges. One of network partitions leading to interruptions in the them is failures of network components. If a link ongoing communication. Because of node mobility failure is detected on the primary path (through and power limitations, the network topology which actual data transmission is taking place), the changes frequently. Link failures or path failure source can switch to an alternate path instead of are common in such type of network. Therefore initiating a route discovery/recovery process. A new the networks employ path/link protection to discovery takes place only when all precomputed achieve fast recovery from dual failures. While the paths break. first link failure can be protected using link Since in a wireless ad-hoc network has no protection, but if second link is failed then we fixed infrastructure and there is no centralized control have the problem of recover that path so the over the nodes ; no designated routers. So nodes purpose of our system is that recovery from serve as routers for each other, and data packets are second failure. One of the strategies to recover forwarded from node to node in a multi-hop fashion. from dual-link failures is to employ link Protecting the circuits or connections established in protection for the two failed links independently, such networks against single-link failures may be which requires that two links may not use each achieved in two ways: path protection or link other in their backup paths if they may fail protection [6]. Main focus of this paper is to protect simultaneously. Such a strategy is referred to as end-to-end connections from dual-link failures using backup link mutual exclusion (BLME). This path protection and link protection. paper develops a solution to the BLME problem by using two approaches by: 1) integer linear 2. TAXONOMY OF PROTECTION SCHEMES program; 2) developing a polynomial time Protection schemes proposed in the heuristic based on minimum cost path routing. literature can be broadly classified as link protection and path protection. Keywords-MANET, BLME, FDLP, FILP. 2.1 Link protection 1. INTRODUCTION Link protection schemes route a connection A Mobile Adhoc Network (MANET) is a around a failed link. Re-routing is performed by the network composed of mobile nodes mainly node connected to the failed link to the neighboring characterized by the absence of centralized node on the original path. Such a protection may be coordination or fixed infrastructure, which makes any achieved in the network in a way that is transparent node in the network act as potential router. MANETs to the source node, except in cases where a link are also characterized by a dynamic, random and connected to the source or destination fails. Link rapidly changing topology. In MANETs, protection, as shown in Fig. 1, reroutes all the communication link between mobile nodes always connections on the failed link around it. When require over multi-hop paths. Since no infrastructure accepting a call request, the link protection scheme exists and node may cause frequent link failure. will reserve the network resource for the associated In WDM network, the failure of a single protection path. The protection path connects the two fiber link may lead to tremendous data loss since a nodes adjacent to the failed link. When a link failure single fiber link can carry a huge amount of data (on occurs, the node adjacent to and upstream of the the order of terabits per second).Therefore, network failed link immediately redirects the traffic along the survivability is an important problem in network predetermined protection path to the node on the design and its real-time operation. In order to reduce other end of the failed link to restores transmission. the data loss, various protection and restoration mechanisms have been proposed and studied in the literature to recover traffic after a failure occurs and before the failure is physically repaired [1], [2], [3], 1486 | P a g e
  • 2. Ms.Ashwina .N. Patil , Prof. S.S. Kanade , Ms. S.S. Bhakare / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1486-1489 5 6 7 8 9 1 ILP Backup 0 User Method Length Or BLME Node Problem Results 3 4 Heuristic Time Method 1 2 In Sec Primary path Backup Fig 1: Link Protection path Fig 3 : System architecture 2.2 Path protection 4. INTEGER LINEAR PROGRAMMING Path protection schemes recover from a Dual-link failure resiliency strategies are failure by re-routing the connections at the source. classified based on the nature in which the Path protection schemes may be classified into two connections are recovered from first and second categories based on their knowledge of the failure failures. The recovery from the first link failure is location. Assignment of a backup path that does not assumed to employ link protection strategy. Fig. 4 require precise knowledge of the link failure is shows an example network where link 1-2 is referred to as failure-independent path protection protected by the backup path 1-3-4-2. The second (FIPP). Alternatively, if a connection may be protection strategy will refer to the manner in which assigned more than one backup path depending on the backup path of the first failed link is recovered. the failure, then it is referred to as failure-dependent path protection (FDPP).Path protection, as illustrated 5 6 7 8 9 10 in Fig. 2, reserves network resources for a single protection path in addition to the primary path. Since it is impossible to find which link on the primary path will fail, the system allocates a protection path, which 3 4 is completely link-disjoint from the primary path. The primary path therefore shares no common link with its associated protection path. When a link fails, 2 1 the source and destination nodes of a call on the failed link are informed of the failure, and the Fig 4: Back up link communication is switched to the protection path. 5 6 7 8 9 1 4.1 Failure Dependent Link Protection (FDLP) 0 If the backup path is affected by the second failure, a backup path under dual-link failure is provided. This backup path is computed by 3 4 eliminating the two failed links from the network and computing shortest path between the specific node pairs. Fig.4 shows the backup path assigned for link 1 2 1-2 under dual-link failures. It may be observed that the backup path assignment is different for different Primary path failures that affect the path. When a second link Backup Fig 2: Path Protection failure occurs, a failure notification must be sent to path node 1, explicitly mentioning the failure location in 3. LINK FAILURE RECOVERY the path 1-3-4-2. Every link is assigned one backup Path protection schemes recover from a path for single link failure and multiple backup paths failure by re-routing the connections at the source. (depending on the number of links in the backup path Path protection schemes may be classier into three for the single link failure) under dual-link failures. If categories based on their knowledge of the failure the primary path and link 1-3 of backup path fails location. Assignment of a backup path that does not down , then this dual failed link is recovered by the require precise knowledge of the link failure is path 1-5-3-4-2,similarly for link 3-4 and 4-5 fails, the referred to as failure independent path protection recovery will be 1-5-6-7-8-4-2 and 1-3-4-10-2. (FIPP). Alternatively, if a connection may be assigned more than one backup path depending on 4.2 Failure Independent Link Protection (FILP) the failure, then it is referred to as failure-dependent One approach to dual-link failure resiliency path protection (FDPP). Link protection schemes using link protection is to compute two link-disjoint route a connection around a failed link. backup paths for every link. For any two adjacent 1487 | P a g e
  • 3. Ms.Ashwina .N. Patil , Prof. S.S. Kanade , Ms. S.S. Bhakare / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1486-1489 nodes, there exist two link-disjoint backup paths for the rectangular region according to the “random way- the link connecting the two nodes. Let Bl and B'l point” mobility model. All data packets are 512 bytes denote the two link-disjoint backups for link Bl. If long. All traffic sessions are established at random any link in the backup path Bl fails, the backup path times near the beginning of the simulation run and of will be reconfigured to B'l. Hence, the nodes the sessions stay active until the end. Each simulation connected to link l must have the knowledge of the is run for 100 sec. We evaluate the performance by failure in its backup paths (not necessarily the varying number of nodes for both the methods. location).If the link 1-2 fails, then under dual-link failure the backup path assigned by FILP will be 1-5- 6.2 Performance Metrics 6-7-8-9-10-2. The backup path is identical under any The performance of the ILP and heuristic second failure that affects the path 1-3-4-2. When the algorithm developed in this paper are evaluated by second failure occurs, a failure notification must be using the given performance metrics . sent to nodes 1 and 2, although this notification need  Packet delivery ratio (PDR): not explicitly mention which link failed in path 1-3-  Path length 4-2.  Throughput Packet delivery ratio is the ratio of the 5. HEURISTIC APPROACH number of data packets received at the destinations The heuristic solution is based on iterative and the number of data packets actually sent to the computation of minimum cost routing. The network network. This measures the quality of the is treated as an undirected graph G. A set of auxiliary discovered path. The packet delivery ratio in IMCP graphs corresponding to failure of a link l € G is and FDLP is shown in figure 5.As the number of created: Xl = G ( N , L-{l } ). In each auxiliary graph nodes varies, the packet delivery ratio of both the Xl the objective is to obtain a path between the nodes methods increases. The packet delivery ratio of that were originally connected by link l . Let Pl FDLP is higher than that of IMCP. denote the path selected in auxiliary graph Xl . If a link l’ is a part of the path selected on graph Xl , then the path in graph Xl must avoid the use of link l .This is accomplished by imposing a cost on the links in the auxiliary graphs, and having the path selection approach select the minimum cost path. Let Wl l’ denote the cost of link l’ on graph Xl such that it indicates that graph Xl ‘ contains link l and the two links l and l’ may be unavailable simultaneously. Hence, the cost values are binary in nature. The cost of a path in an auxiliary graph is the sum of the cost of links in it. At any given instant during the computation, the total cost of all the paths (T) is the sum of the cost of the paths across all auxiliary graphs. It may be observed that the total cost must be Fig 5 :Packet Delivery Ratio for IMCP and FDLP an even number, as every link l’ in a path Pl that has The average hop length in IMCP and FDLP a cost of 1 implies that link l in path Pl ‘ would also is shown in figure 6. The path length is calculated have a cost of 1. For a given network, the minimum during the packet delivery. The alternative path may value of the total cost would then be two times the be longer than the main path. number of dual-link failure scenarios that would have the network disconnected. If τ denotes the number of dual-link failure scenarios that would disconnect the graph, then the termination condition for the heuristic is given by T = 2τ . 6. PERFORMANCE EVALUATION 6.1 Simulation setup The setup of the simulation depicts an ad hoc network that consists of a varying number of Mobile Hosts (MHs) that move randomly in a square field free of obstacles. The setup is based on the OMNeT++ discrete simulator. The implementation of the proposed methods is based on the AODV routing Fig 6 :Average hop length for IMCP and FDLP protocol. We have fixed the area to a rectangular Figure 7 shows the throughput comparison of IMCP region of 350m x 350m. The transmission range of and FDLP. The ratio of the total amount of data that each node is fixed to 250 m. Nodes move around in 1488 | P a g e
  • 4. Ms.Ashwina .N. Patil , Prof. S.S. Kanade , Ms. S.S. Bhakare / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue4, July-August 2012, pp.1486-1489 reaches a receiver from a sender to the time it takes [4] M. Clouqueur and W. D. Grover, for the receiver to get the last packet is referred to as “Availability analysis of spanrestorable throughput. It is expressed in bits per second or mesh networks,” IEEE J. Select. Areas packets per second. Factors that affect throughput Commun., vol. 20,no. 4, pp. 810–821, (May include frequent topology changes, unreliable 2002). communication, limited bandwidth and limited [5] S. Ramamurthy, L. Sahasrabuddhe, and B. energy. Packet delivery capacity of the proposed Mukherjee, “Survivable WDM mesh method decreases as the network size increases. This networks,” IEEE/OSA J. Lightwave is due to the route breaks as the number of size Technology, vol. 21,no. 4, pp. 870–883, increases. (Apr. 2003). [6] A. Chandak and S. Ramasubramanian, “Dual-link failure resiliency through backup link mutual exclusion,” in Proc. IEEE Int. Conf. Broadband Networks, Boston, MA, (Oct. 2005), pp. 258–267. [7] R. Ramamurthy, A. Akyamac, J.-F. Labourdette, and S. Chaudhuri, “Preemptive reprovisioning in mesh optical networks,” in Proc. OFC’(2003), pp. 785–787. [8] H. Choi, S. Subramaniam, and H.-A. Choi, “On double-link failure recovery in WDM optical networks,” in Proc. IEEE INFOCOM’(2002),vol. 2, pp. 808–816. [9] S. Kim and S. Lumetta, “Evaluation of protection reconfiguration for multiple Fig 7: Variation of throughput with network size for failures inWDM mesh networks,” in Proc. IMCP and FDLP OFC’(2003), pp. 210–211. [10] D. Schupke and R. Prinz, “Performance of 7. CONCLUSION path protection and rerouting for WDM This paper focuses on the approaches for networks subject to dual failures,” in Proc. providing dual-link failure resiliency. Recovery from OFC’(2003),pp. 209–210. [10] S. S. a dual-link failure using an extension constraint, Lumetta referred to as BLME constraint, whose satisfiability [11] Perkins C E., “Ad Hoc Network”, allows the network to recover from dual-link failures. Switzerland: Addsion-Wesley, (2000). In this paper, we motivated the need for considering [12] S.J. Lee, E. Royer and C.E. Perkins, double-link failures and presented some approaches “Scalability study of the ad hoc on-demand for handling such failures. So here, we have proposed distance vector routing protocol”, two schemes to solve BLME problem . The proposed International Journal of Network scheme shows significant improvements in terms of Management, Vol.13, (2003), pp. 97–114. packet delivery ratio, average hop length and [13] S. Corson and J. Macker, “Mobile ad hoc throughput. networking (MANET): routing protocol performance issues and evaluation REFERENCES considerations”, RFC. 2501, (1999). [1] B. Mukherjee, “WDM optical networks: [14] D.B Johnson, D.A Maltz and Josh Broch, progress and challenges,” IEEE J. Select. “DSR: The Dynamic Source Routing Areas Commun., vol. 18, pp. 1810–1824, Protocol for Multi-Hop Wireless Ad Hoc (Oct. 2000). Networks”, In Ad Hoc Networking, edited [2] O. Gerstel and R. Ramaswami, “Optical by Charles E. Perkins, Chapter 5, pp. 132– layer survivability: a services perspective,” 172, Addison-Wesley, (2001). IEEE Commun. Mag., vol. 38, pp. 104–113, [15] C.E. Perkins and E.M. Royer, “Ad-Hoc On (March 2000). Demand Distance Vector Routing,” [3] G. Mohan, C. S. R. Murthy, and A. K. Proceedings of the 2nd IEEE Workshop on Somani, “Efficient algorithms for routing Mobile Computing Systems and dependable connections in WDM optical Applications (WMCSA), New Orleans, LA, networks,” IEEE/ACM Trans. Networking, (February 1999), pp. 90-100 vol. 9, pp. 553–566, (Oct. 2001) 1489 | P a g e