SlideShare a Scribd company logo
1 of 6
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 171
A NOVEL SCHEME FOR RELIABLE MULTIPATH ROUTING
THROUGH NODE-INDEPENDENT DIRECTED ACYCLIC GRAPHS
Srinivas.Vaida1
, N. RaghavaRao2
, R.V.Krishnaiah3
1
M.Tech Student,2
Associate Professor, 3
Principal, Department of Software Engineering,
DRK Institute of Science & Technology, Hyderabad, Andhra Pradesh, India,
vaida.srinu@gmail.com, raghavarao.n@gmail.com, r.v.krishnaiah@gmail.com
Abstract
Multipath routing is essential in the wake of voice over IP, multimedia streaming for efficient data transmission. The growing usage of
such network requirements also demands fast recovery from network failures. Multipath routing is one of the promising routing
schemes to accommodate the diverse requirements of the network with provision such as load balancing and improved bandwidth.
Cho et al. introduced a resilient multipath routing scheme known as directed acyclic graphs. These graphs enable multipath routing
with all possible edges while ensuring guaranteed recovery from single point of failures. We also built a prototype application that
demonstrates the efficiency of the scheme. The simulation results revealed that the scheme is useful and can be used in real world
network applications.
Index Terms – Multipath routing, failure recovery, directed acyclic graphs
---------------------------------------------------------------------***-------------------------------------------------------------------------
1. INTRODUCTION
As the cost of hardware devices decreased and there is steady
increase in resource availability voice over IP and other
multimedia data streaming is increased. In such applications
high bandwidth is expected besides faster recovery from
single point of failures. In order to achieve this modern
networks are employing various strategies such as load
balancing, recovery from node failures, and end-to-end
bandwidth. Towards a good solution multipath routing can be
used. This scheme along with techniques can achieve security
[6], congestion reduction [5], aggregation of bandwidth [4],
load balancing [3] and robustness. In existing networking
applications where multipath routing is required use directed
acyclic graphs [7]. When a data packet starts from source to
destination, it has to carry routing table information in its
header. When a node to be forwarded is not there, the packet
is dropped. This behavior causes problems. This approach
can’t guarantee reliable packet delivery. However, the
techniques for fast recovery need to recover link failures
effectively. Based on the nature of techniques they are
classified. As explored in [8] a default forwarding node is
maintained. When a node fails to forward, the default
forwarding node takes the responsibility of forwarding.
In [9] three solutions are provided for fast rerouting which
were given considerable attention. There three solutions are
known as tunneling using not via addressing [13], failure
insensitive routing (FIR) [11], [12] and Multiple Routing
Configurations (MRC) [10]. The common feature of these
techniques is to use more than one routing tables. However,
they are different in the way they solve problem. In [15] and
[16] resiliency to a single like failure is explored using
multipath routing. For each destination node two trees are
construct red in this approach. These trees are used to solve
such problem. It is similar to the approaches where multiple
routing tables are involved. Only difference is that they
employ only two routing tables. For this reason every packet
has to carry in its header the routing table to be used to reach
the destination. Colored trees concept is introduced in [17]
which are also known as independent trees. Fig. 1 shows
examples for node independent trees.
Fig. 1 – Illustrates node-independent trees (excerpts from
[24])
In both the networks illustrated here the root node is A. The
networks are constructed in such a way that they have capacity
to recover from link failures. For instance when a packet
forwarded from node F to root node encounters a failure, the
packet will be sent through F-C-B-A. The networks work fine
when a single link fails. When two links fail automatically,
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 172
there might be problem. The goal of this paper is to overcome
this drawback by using additional links from the network in
order to make the multipath routing robust. The solution to
this problem is the construction of independent directed
acyclic graphs. The solution is illustrated in fig. 2.
As can be seen in fig. 2, node I has two edges for forwarding.
This will enable the network to built possible paths for data
forwarding.
Fig. 2 – Node independent directed acyclic graphs (excerpts
from [24])
However, there is no provision for backup forwarding in case
of single link failure. Cho et al. [24] presented a solution for
this which achieves multipath routing utilizing all possible
edges; reduced overhead; recovery from single link failure is
guaranteed. In this paper we implement the concept of [24] in
Java platform. We built a prototype application that
demonstrates the proof of concept.
The remainder of the paper is organized as follows. Section II
provides details of the proposed work. Section III presents the
details of prototype implementation. Section IV provides
experimental results while section V concludes the paper.
2. PROPOSED MULTIPATH ROUTING
APPROACH:
The goal of this paper is to construct as many directed acyclic
graphs as possible for ensuring reliable multipath routing. The
sample DAGs are presented in fig. 2. The link independent
DAG construction is made using the procedure suggested by
Cho et al. [24].
Procedure for LI-DAGs Construction
1) Divide the network into two vertex connected (2V)
Components.
2) In each 2V component, select the unique articulation
node through which every path from any node in that
component must traverse to reach d. We refer to this
articulation node as the root node of the component.
In the component that contains node d , we assume
that the root node of the component is node d itself.
3) In each 2V component, construct two node
independent DAG to the root node of that
component.
4) Merge all node independent DAG to obtain the Link
independent DAGs.
The above procedure is given to construct multiple link
independent DAGS. These DAGs provide reliable
communication in multipath routing fashion. The algorithm is
implemented on different network topologies as shown in fig.
3 and 4.
In Fig. 3 and Fig. 4 four real time topologies are presented.
They have different nodes and links.
Fig. 3 – Illustrate real world topologies such as ARPANET
and ITALIAN-NET (excerpts from [24])
Fig. 4 – Illustrate real world topologies such as MESH-4X4
and NJ-LATA (excerpts from [24])
These topologies are used in the practical experiments of this
paper.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 173
3. PROTOTYPE IMPLEMNETATION
A prototype application is built using Java platform which
simulates the concept of reliable multipath routing scheme
presented by Cho et al. [24]. The environment used for the
implementation is Java platform, a PC with 4 GB RAM, Core
2 Dual processor running Windows 7 operating system. The
Java custom simulator application is used to generate number
of nodes and make experiments on different topologies. The
simulator supports four topologies such as MESH-AX4, NJ-
LATA, ARPANET and ITALIAN-NET. After generating
nodes, the main UI of the application is as shown in fig. 5.
Fig. 5 – Main UI of the prototype
The prototype application facilitates shown in Fig.5 is to send
data from source to destination. There are many links from
node A to node D. The details are as shown in Fig. 5. The
application also has provision to generated IDAGs based on
the approaches like link independent and node independent.
Sample DAG between given source and destination is given in
fig. 6.
Fig. 6 – UI highlighting DAG between the given source and
designation.
As can be seen in Fig. 6, it is evident that the DAG is formed
between the given source and destination. There are multiple
DAGs possible as shown in fig. 6.
4. RESULTS:
Number of experiments is made to know the number of paths
between the source and destination nodes on various
topologies. The number of paths from source to destination is
considered to be the degree of the node. It is obvious that
when number of links is increased in the network, the number
of paths increase automatically. The experimental results are
shown as a series of graphs.
Fig. 7 – Number of paths from source to destination on
ITALIAN-NET topology
As can be seen in Fig. 7, it is evident that the node ids which
are participated in experiments are presented in horizontal axis
while the vertical axis represents the number of paths in given
topology. The results revealed that number of paths is more
when number of links is increased.
As can be seen in Fig. 8, it is evident that the node ids which
are participated in experiments are presented in horizontal axis
while the vertical axis represents the number of paths in given
topology.
Fig. 8 – Number of paths from source to destination on
ARPANET topology
0
10
20
30
40
50
60
1 2 3 4 5 6 7 8 9 10Numberofpaths
Node id
Blue
Red
0
10
20
30
40
1 4 7 10 13 16 19
Numberofpaths
Node id
Blue
Red
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 174
The results revealed that number of paths is more when
number of links is increased.
Fig. 9 – Product of number of critical links with given
approaches and topologies
As seen in Fig. 9, the horizontal axis represents topologies
while the vertical axis presents the product of number of
critical links. The approaches followed are 6 pairs of colored
trees, IDAGs and ITREEs on four topologies namely MESH-
AX4, NJ-LATA, ARPANET and ITALIAN-NET.
Fig. 10 – Product of number of critical links with given
approaches and topologies
As seen in Fig. 10, the horizontal axis represents number of
pairs of colored trees while the vertical axis presents the
product of number of critical links. The experiments are done
using topologies like MESH-AX4, NJ-LATA, ARPANET and
ITALIAN-NET.
As seen in Fig. 11, the horizontal axis represents topologies
like MESH-AX4, NJ-LATA, ARPANET and ITALIAN-NET
while the vertical axis represents average path length ratio.
Fig. 11 – Average ratio of path lengths of IDAGs and I Trees
Fig. 12 – Ratio of average six pairs of colored trees and
IDAGS path lengths
As seen in Fig. 12, the horizontal axis represents topologies
like MESH-AX4, NJ-LATA, ARPANET and ITALIAN-NET
while the vertical axis represents average path length ratio.
Fig. 13 – Ratio of average six pairs of colored trees and
IDAGS path lengths
0
5
10
15
20
25
30
Producuofnumberofcritical
links
6 pairs of
colored trees
IDAGS
ITREEs
0
5
10
15
20
25
30
1 2 3 4 5 6
Productofnumberof
criticallinks
M
MESH 4X4
NJ-LATA
ARPANET
ITALIAN-
NET
0
0.5
1
1.5
2
2.5
Averagepathlength
ratio(IDAGs/ITREEs)
Blue
Red
0
0.5
1
1.5
2
2.5
Avg.pathlengthratio
6
pairs
of
color
ed
trees/
ITree
s
0
0.2
0.4
0.6
0.8
1
1.2
Avg.pathlengthratio
(shortestpathonIDAGs
/ITREEs)
Red
Blue
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 175
As seen in Fig. 13, the horizontal axis represents topologies
like MESH-AX4, NJ-LATA, ARPANET and ITALIAN-NET
while the vertical axis represents average path length ratio.
CONCLUSIONS
Multipath routing is important for reliable data transfer in
modern networks. When independent directed acyclic graphs
are constructed, it is possible to achieve reliable
communication with multiple IDAGS that ensure fast recovery
in case of link failures. The solution presented by Cho et al.
[24] and the polynomial time algorithms are implemented in
this paper in order to ensure reliable multipath routing. We
implemented the IDAGs using a custom simulator. The
simulation results revealed that the node independent IDAGs
are practically reliable and can recover faster from link
failures.
REFERENCES
[1] S. Cho, T. Elhourani, and S. Ramasubramanian, “Resilient
multipath routing with independent directed acyclic graphs,”
in Proceedings ofIEEE International Conference on
Communications, Cape Town, South Africa, May 2010, pp. 1–
5.
[2] Z. Yes, S. V. Krishnamurthy, and S. K. Tripathi, “A
framework for reliablerouting in mobile ad hoc networks,” in
INFOCOM’03, April 2003, pp.270–280.
[3] P. P. Pham and S. Perreau, “Performance analysis of
reactive shortest path and multi-path routing mechanism with
load balance,” in IEEEINFOCOM, 2003, pp. 251–259.
[4] J. Tsai and T. Moors, “A review of multipath routing
protocols: From wireless ad hoc to mesh networks,” in Acorn
Early Career ResearcherWorkshop on Wireless Multihop
Networking, Jul. 17-18, 2006.
[5] S. Murthy and J. Garcia-Luna-Aceves, “Congestion-
oriented shortest multipath routing,” in IEEE INFOCOM, vol.
3, March 1996, pp. 1028–1036.
[6] W. Lou, W. Liu, and Y. Fang, “A simulation study of
security performance using multipath routing in ad hoc
networks,” in IEEE Vehicular Technology Conference, vol. 3,
October 2003, pp. 2142–2146.
[7] G. Lee and J. Choi, “A survey of multipath routing for
traffic engineering,”2002. [Online]. Available:
http://vega.icu.ac.kr/˜gmlee/research/
[8] K. Xi and J. Chao, “Ip fast rerouting for single-link/node
failurerecovery,” in Proceedings of BROADNETS - Internet
TechnologiesSymposium, September 2007.
[9] M. Shand and S. Bryant, “IP Fast Reroute Framework,”
IETF InternetDraft, Feb. 2008, draft-ietf-rtgwg-ipfrr-
framework-08.txt.
[10] A. Kvalbein, A. F. Hansen, T. Cˇ icˇic´, S. Gjessing, and
O. Lysne, “FastIP network recovery using multiple routing
configurations,” in IEEEINFOCOM, Apr. 2006.
[11] S. Lee, Y. Yu, S. Nelakuditi, Z.-L. Zhang, and C.-N.
Chuah, “Proactivevs. Reactive approaches to failure resilient
routing,” in IEEE INFOCOM, Mar. 2004.
[12] S. Nelakuditi et al., “Failure insensitive routing for
ensuring serviceavailability,” in IWQoS’03 Lecture Notes in
Computer Science 2707,Jun. 2003.
[13] S. Bryant, M. Shand, and S. Previdi, “IP fast reroute
using notviaaddresses,” Internet Draft, Feb 2008, draft-ietf-
rtgwg-ipfrr-notviaaddresses-02.txt.
[14] S. Kini, S. Ramasubramanian, A. Kvalbein, and A.
Hansen, “Fastrecovery from dual-link failures in IP networks,”
in Proceedings of IEEEINFOCOM, Rio de Janeiro, Brazil,
April 2009, pp. 1368–1376.
[15] S. Ramasubramanian, M. Harkara, and M. Krunz,
“Distributed lineartime construction of colored trees for
disjoint multlipath routing,” inProceedings of IFIP
Networking, May 2006.
[16] G. Jayavelu, S. Ramasubramanian, and O. Younis,
“Maintaining coloredtrees for disjoint multipath routing under
node failures,” Accepted forpublication in IEEE/ACM
Transactions on Networking, 2008.11
[17] A. Huck, “Independent trees in graphs,” Graphs and
Combinatorics,vol. 10, pp. 29–45, 1994.
[18] T. Erlebach and A. Mereu, “Path splicing with
guaranteedfault tolerance,” in Proceedings of the 28th IEEE
conferenceon Global telecommunications, ser.
GLOBECOM’09. Piscataway,NJ, USA: IEEE Press, 2009, pp.
623–628. [Online].
Available:http://portal.acm.org/citation.cfm?id=181138
0.1811483
[19] Y. Ohara, S. Imahori, and R. V. Meter, “MARA:
maximum alternativerouting algorithm,” in IEEE INFOCOM,
Rio de Janeiro, Brazil, April2009, pp. 298–306.
[20] M. Medard, R. A. Barry, S. G. Finn, and R. G. Gallager,
“Redundanttrees for preplanned recovery in arrbitrary vertex-
redundant or edgeredundant graphs,” IEEE/ACM Transactions
on Networking, vol. 7,no. 5, pp. 641–652, October 1999.
[21] G. Xue, L. Chen, and K. Thulasiraman, “Quality-of-
service and qualityof-protection issues in preplanned recovery
schemes using redundanttrees,”IEEE Journal on Selected
Areas in Communication, vol. 21, no. 8,pp. 1332–1345,
October 2003.
[22] S. Ramasubramanian, M. Harkara, and M. Krunz, “Linear
time distributedconstruction of colored trees for disjoint
multipath routing,”Accepted for publication in Elsevier
COMNET, vol. 51, no. 10, pp.2854–2866, July 2007.
[23] G. Xue, W. Zhang, J. Tang, and K. Thulasiraman,
“Polynomial timeapproximation algorithms for multi-
constrained qos routing,” IEEE/ACMTransactions on
Networking, vol. 16, no. 3, pp. 656 –669, June 2008.
[24] Sangman Cho, Theodore Elhourani, Srinivasan
Ramasubramanian, “Independent Directed Acyclic Graphs for
Resilient Multipath Routing”, IEEE conference 2010.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 176
BIOGRAPHIES
Srinivas.Vaida has completed MCA from
Jesus PG College, OU, Hyderabad, and
pursuing M.Tech (Software Engineering) in
DRK Institute of Science and Technology,
JNTU, Hyderabad, Andhra Pradesh, India.
His research interest includes Computer
Networks and Databases, Software Engineering.
N. RaghavaRao is working as an
Associative Professor in DRK Institute of
Science and Technology, JNTU,
Hyderabad, Andhra Pradesh, India. He has
received M.Tech (Computer Science)
degree from JNTUH; His main research
interest includes Data Mining, Compiler
Design and DAA.
Dr. R. V. Krishnaiah, did M.Tech (EIE)
from NIT Waranagal, MTech (CSE) form
JNTU, Ph.D, from JNTU Ananthapur, He
has memberships in professional bodies
MIE, MIETE, MISTE. He is working as
Principal in DRK Institute of Science and
Technology, Hyderabad. His main
research interests include Image Processing, Security systems,
Sensors, Intelligent Systems, Computer networks, Data
mining, Software Engineering, network protection and
security control. He has published many papers and Editorial
Member and Reviewer for some national and international
journals

More Related Content

What's hot

Macromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting AlgorithmMacromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting Algorithmijsrd.com
 
Report-de Bruijn Graph
Report-de Bruijn GraphReport-de Bruijn Graph
Report-de Bruijn GraphAshwani kumar
 
Fault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andFault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andeSAT Publishing House
 
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...Derryck Lamptey, MPhil, CISSP
 
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...IOSR Journals
 
Shortest route finding using an object oriented database approach
Shortest route finding using an object oriented database approachShortest route finding using an object oriented database approach
Shortest route finding using an object oriented database approachAlexander Decker
 
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...ijcsit
 
Paper Explained: Understanding the wiring evolution in differentiable neural ...
Paper Explained: Understanding the wiring evolution in differentiable neural ...Paper Explained: Understanding the wiring evolution in differentiable neural ...
Paper Explained: Understanding the wiring evolution in differentiable neural ...Devansh16
 
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSSVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSijscmcj
 
Single Channel Speech De-noising Using Kernel Independent Component Analysis...
	Single Channel Speech De-noising Using Kernel Independent Component Analysis...	Single Channel Speech De-noising Using Kernel Independent Component Analysis...
Single Channel Speech De-noising Using Kernel Independent Component Analysis...theijes
 
Centrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksCentrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksIJERA Editor
 
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...TELKOMNIKA JOURNAL
 
A fpga implementation of data hiding using lsb matching method
A fpga implementation of data hiding using lsb matching methodA fpga implementation of data hiding using lsb matching method
A fpga implementation of data hiding using lsb matching methodeSAT Journals
 

What's hot (16)

Macromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting AlgorithmMacromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting Algorithm
 
Report-de Bruijn Graph
Report-de Bruijn GraphReport-de Bruijn Graph
Report-de Bruijn Graph
 
Fault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andFault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms and
 
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
 
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
 
20320130406025
2032013040602520320130406025
20320130406025
 
Shortest route finding using an object oriented database approach
Shortest route finding using an object oriented database approachShortest route finding using an object oriented database approach
Shortest route finding using an object oriented database approach
 
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
 
Paper Explained: Understanding the wiring evolution in differentiable neural ...
Paper Explained: Understanding the wiring evolution in differentiable neural ...Paper Explained: Understanding the wiring evolution in differentiable neural ...
Paper Explained: Understanding the wiring evolution in differentiable neural ...
 
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSSVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
 
Single Channel Speech De-noising Using Kernel Independent Component Analysis...
	Single Channel Speech De-noising Using Kernel Independent Component Analysis...	Single Channel Speech De-noising Using Kernel Independent Component Analysis...
Single Channel Speech De-noising Using Kernel Independent Component Analysis...
 
Planes de negocios paper
Planes de negocios paperPlanes de negocios paper
Planes de negocios paper
 
Centrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksCentrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social Networks
 
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
 
A fpga implementation of data hiding using lsb matching method
A fpga implementation of data hiding using lsb matching methodA fpga implementation of data hiding using lsb matching method
A fpga implementation of data hiding using lsb matching method
 
H04302064067
H04302064067H04302064067
H04302064067
 

Viewers also liked

Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
 
Technological and cross border mixture value chain of
Technological and cross border mixture value chain ofTechnological and cross border mixture value chain of
Technological and cross border mixture value chain ofeSAT Publishing House
 
Study on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sandStudy on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sandeSAT Publishing House
 
Study on pedestrian and slow moving traffic
Study on pedestrian and slow moving trafficStudy on pedestrian and slow moving traffic
Study on pedestrian and slow moving trafficeSAT Publishing House
 
Automatic power generation control structure for smart electrical power grids
Automatic power generation control structure for smart electrical power gridsAutomatic power generation control structure for smart electrical power grids
Automatic power generation control structure for smart electrical power gridseSAT Publishing House
 
Vibration analysis and diagnostics for oil production units by pumping rod
Vibration analysis and diagnostics for oil production units by pumping rodVibration analysis and diagnostics for oil production units by pumping rod
Vibration analysis and diagnostics for oil production units by pumping rodeSAT Publishing House
 
An understanding of graphical perception
An understanding of graphical perceptionAn understanding of graphical perception
An understanding of graphical perceptioneSAT Publishing House
 
Control of vibration through an innovative isolation
Control of vibration through an innovative isolationControl of vibration through an innovative isolation
Control of vibration through an innovative isolationeSAT Publishing House
 
Swarm robotics for intelligent warehousing an
Swarm robotics for intelligent warehousing anSwarm robotics for intelligent warehousing an
Swarm robotics for intelligent warehousing aneSAT Publishing House
 
Comparative analysis of c99 and topictiling text
Comparative analysis of c99 and topictiling textComparative analysis of c99 and topictiling text
Comparative analysis of c99 and topictiling texteSAT Publishing House
 
Power system stabilisation based on ga anfis in generators
Power system stabilisation based on ga anfis in generatorsPower system stabilisation based on ga anfis in generators
Power system stabilisation based on ga anfis in generatorseSAT Publishing House
 
Smart automobile security system using labview
Smart automobile security system using labviewSmart automobile security system using labview
Smart automobile security system using labvieweSAT Publishing House
 
Effect of concentration on structural and optical
Effect of concentration on structural and opticalEffect of concentration on structural and optical
Effect of concentration on structural and opticaleSAT Publishing House
 
Analysis of proximity coupled equilateral triangular
Analysis of proximity coupled equilateral triangularAnalysis of proximity coupled equilateral triangular
Analysis of proximity coupled equilateral triangulareSAT Publishing House
 
Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...eSAT Publishing House
 
Lake sediment thickness estimation using ground penetrating radar
Lake sediment thickness estimation using ground penetrating radarLake sediment thickness estimation using ground penetrating radar
Lake sediment thickness estimation using ground penetrating radareSAT Publishing House
 
Approaches to the numerical solving of fuzzy
Approaches to the numerical solving of fuzzyApproaches to the numerical solving of fuzzy
Approaches to the numerical solving of fuzzyeSAT Publishing House
 
A comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudsA comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudseSAT Publishing House
 
Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...eSAT Publishing House
 
An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...eSAT Publishing House
 

Viewers also liked (20)

Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
Technological and cross border mixture value chain of
Technological and cross border mixture value chain ofTechnological and cross border mixture value chain of
Technological and cross border mixture value chain of
 
Study on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sandStudy on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sand
 
Study on pedestrian and slow moving traffic
Study on pedestrian and slow moving trafficStudy on pedestrian and slow moving traffic
Study on pedestrian and slow moving traffic
 
Automatic power generation control structure for smart electrical power grids
Automatic power generation control structure for smart electrical power gridsAutomatic power generation control structure for smart electrical power grids
Automatic power generation control structure for smart electrical power grids
 
Vibration analysis and diagnostics for oil production units by pumping rod
Vibration analysis and diagnostics for oil production units by pumping rodVibration analysis and diagnostics for oil production units by pumping rod
Vibration analysis and diagnostics for oil production units by pumping rod
 
An understanding of graphical perception
An understanding of graphical perceptionAn understanding of graphical perception
An understanding of graphical perception
 
Control of vibration through an innovative isolation
Control of vibration through an innovative isolationControl of vibration through an innovative isolation
Control of vibration through an innovative isolation
 
Swarm robotics for intelligent warehousing an
Swarm robotics for intelligent warehousing anSwarm robotics for intelligent warehousing an
Swarm robotics for intelligent warehousing an
 
Comparative analysis of c99 and topictiling text
Comparative analysis of c99 and topictiling textComparative analysis of c99 and topictiling text
Comparative analysis of c99 and topictiling text
 
Power system stabilisation based on ga anfis in generators
Power system stabilisation based on ga anfis in generatorsPower system stabilisation based on ga anfis in generators
Power system stabilisation based on ga anfis in generators
 
Smart automobile security system using labview
Smart automobile security system using labviewSmart automobile security system using labview
Smart automobile security system using labview
 
Effect of concentration on structural and optical
Effect of concentration on structural and opticalEffect of concentration on structural and optical
Effect of concentration on structural and optical
 
Analysis of proximity coupled equilateral triangular
Analysis of proximity coupled equilateral triangularAnalysis of proximity coupled equilateral triangular
Analysis of proximity coupled equilateral triangular
 
Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...
 
Lake sediment thickness estimation using ground penetrating radar
Lake sediment thickness estimation using ground penetrating radarLake sediment thickness estimation using ground penetrating radar
Lake sediment thickness estimation using ground penetrating radar
 
Approaches to the numerical solving of fuzzy
Approaches to the numerical solving of fuzzyApproaches to the numerical solving of fuzzy
Approaches to the numerical solving of fuzzy
 
A comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go cloudsA comparative study of secure search protocols in pay as-you-go clouds
A comparative study of secure search protocols in pay as-you-go clouds
 
Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...
 
An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...An analysis of desktop control and information retrieval from the internet us...
An analysis of desktop control and information retrieval from the internet us...
 

Similar to A novel scheme for reliable multipath routing

Fpga based design and implementation of noc torus
Fpga based design and implementation of noc torusFpga based design and implementation of noc torus
Fpga based design and implementation of noc toruseSAT Publishing House
 
Maximizing network capacity and reliable transmission in mimo cooperative net...
Maximizing network capacity and reliable transmission in mimo cooperative net...Maximizing network capacity and reliable transmission in mimo cooperative net...
Maximizing network capacity and reliable transmission in mimo cooperative net...eSAT Journals
 
Maximizing network capacity and reliable transmission
Maximizing network capacity and reliable transmissionMaximizing network capacity and reliable transmission
Maximizing network capacity and reliable transmissioneSAT Publishing House
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodveSAT Publishing House
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodveSAT Journals
 
H030102052055
H030102052055H030102052055
H030102052055theijes
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkeSAT Publishing House
 
Design of a 5 port router for noc using verilog
Design of a 5 port router for noc using verilogDesign of a 5 port router for noc using verilog
Design of a 5 port router for noc using verilogeSAT Publishing House
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)eSAT Publishing House
 
Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...redpel dot com
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...eSAT Journals
 
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...rahulmonikasharma
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...eeiej_journal
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...ijrap
 
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...eeiej
 
Decision making approach to prefer route repair technique in aodv routing pro...
Decision making approach to prefer route repair technique in aodv routing pro...Decision making approach to prefer route repair technique in aodv routing pro...
Decision making approach to prefer route repair technique in aodv routing pro...eSAT Journals
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networkseSAT Journals
 

Similar to A novel scheme for reliable multipath routing (20)

Fpga based design and implementation of noc torus
Fpga based design and implementation of noc torusFpga based design and implementation of noc torus
Fpga based design and implementation of noc torus
 
Maximizing network capacity and reliable transmission in mimo cooperative net...
Maximizing network capacity and reliable transmission in mimo cooperative net...Maximizing network capacity and reliable transmission in mimo cooperative net...
Maximizing network capacity and reliable transmission in mimo cooperative net...
 
Maximizing network capacity and reliable transmission
Maximizing network capacity and reliable transmissionMaximizing network capacity and reliable transmission
Maximizing network capacity and reliable transmission
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodv
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodv
 
H030102052055
H030102052055H030102052055
H030102052055
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh network
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
Design of a 5 port router for noc using verilog
Design of a 5 port router for noc using verilogDesign of a 5 port router for noc using verilog
Design of a 5 port router for noc using verilog
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)
 
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh NetworkRobustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
 
Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
 
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
 
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
 
Decision making approach to prefer route repair technique in aodv routing pro...
Decision making approach to prefer route repair technique in aodv routing pro...Decision making approach to prefer route repair technique in aodv routing pro...
Decision making approach to prefer route repair technique in aodv routing pro...
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networks
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 

Recently uploaded (20)

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 

A novel scheme for reliable multipath routing

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 171 A NOVEL SCHEME FOR RELIABLE MULTIPATH ROUTING THROUGH NODE-INDEPENDENT DIRECTED ACYCLIC GRAPHS Srinivas.Vaida1 , N. RaghavaRao2 , R.V.Krishnaiah3 1 M.Tech Student,2 Associate Professor, 3 Principal, Department of Software Engineering, DRK Institute of Science & Technology, Hyderabad, Andhra Pradesh, India, vaida.srinu@gmail.com, raghavarao.n@gmail.com, r.v.krishnaiah@gmail.com Abstract Multipath routing is essential in the wake of voice over IP, multimedia streaming for efficient data transmission. The growing usage of such network requirements also demands fast recovery from network failures. Multipath routing is one of the promising routing schemes to accommodate the diverse requirements of the network with provision such as load balancing and improved bandwidth. Cho et al. introduced a resilient multipath routing scheme known as directed acyclic graphs. These graphs enable multipath routing with all possible edges while ensuring guaranteed recovery from single point of failures. We also built a prototype application that demonstrates the efficiency of the scheme. The simulation results revealed that the scheme is useful and can be used in real world network applications. Index Terms – Multipath routing, failure recovery, directed acyclic graphs ---------------------------------------------------------------------***------------------------------------------------------------------------- 1. INTRODUCTION As the cost of hardware devices decreased and there is steady increase in resource availability voice over IP and other multimedia data streaming is increased. In such applications high bandwidth is expected besides faster recovery from single point of failures. In order to achieve this modern networks are employing various strategies such as load balancing, recovery from node failures, and end-to-end bandwidth. Towards a good solution multipath routing can be used. This scheme along with techniques can achieve security [6], congestion reduction [5], aggregation of bandwidth [4], load balancing [3] and robustness. In existing networking applications where multipath routing is required use directed acyclic graphs [7]. When a data packet starts from source to destination, it has to carry routing table information in its header. When a node to be forwarded is not there, the packet is dropped. This behavior causes problems. This approach can’t guarantee reliable packet delivery. However, the techniques for fast recovery need to recover link failures effectively. Based on the nature of techniques they are classified. As explored in [8] a default forwarding node is maintained. When a node fails to forward, the default forwarding node takes the responsibility of forwarding. In [9] three solutions are provided for fast rerouting which were given considerable attention. There three solutions are known as tunneling using not via addressing [13], failure insensitive routing (FIR) [11], [12] and Multiple Routing Configurations (MRC) [10]. The common feature of these techniques is to use more than one routing tables. However, they are different in the way they solve problem. In [15] and [16] resiliency to a single like failure is explored using multipath routing. For each destination node two trees are construct red in this approach. These trees are used to solve such problem. It is similar to the approaches where multiple routing tables are involved. Only difference is that they employ only two routing tables. For this reason every packet has to carry in its header the routing table to be used to reach the destination. Colored trees concept is introduced in [17] which are also known as independent trees. Fig. 1 shows examples for node independent trees. Fig. 1 – Illustrates node-independent trees (excerpts from [24]) In both the networks illustrated here the root node is A. The networks are constructed in such a way that they have capacity to recover from link failures. For instance when a packet forwarded from node F to root node encounters a failure, the packet will be sent through F-C-B-A. The networks work fine when a single link fails. When two links fail automatically,
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 172 there might be problem. The goal of this paper is to overcome this drawback by using additional links from the network in order to make the multipath routing robust. The solution to this problem is the construction of independent directed acyclic graphs. The solution is illustrated in fig. 2. As can be seen in fig. 2, node I has two edges for forwarding. This will enable the network to built possible paths for data forwarding. Fig. 2 – Node independent directed acyclic graphs (excerpts from [24]) However, there is no provision for backup forwarding in case of single link failure. Cho et al. [24] presented a solution for this which achieves multipath routing utilizing all possible edges; reduced overhead; recovery from single link failure is guaranteed. In this paper we implement the concept of [24] in Java platform. We built a prototype application that demonstrates the proof of concept. The remainder of the paper is organized as follows. Section II provides details of the proposed work. Section III presents the details of prototype implementation. Section IV provides experimental results while section V concludes the paper. 2. PROPOSED MULTIPATH ROUTING APPROACH: The goal of this paper is to construct as many directed acyclic graphs as possible for ensuring reliable multipath routing. The sample DAGs are presented in fig. 2. The link independent DAG construction is made using the procedure suggested by Cho et al. [24]. Procedure for LI-DAGs Construction 1) Divide the network into two vertex connected (2V) Components. 2) In each 2V component, select the unique articulation node through which every path from any node in that component must traverse to reach d. We refer to this articulation node as the root node of the component. In the component that contains node d , we assume that the root node of the component is node d itself. 3) In each 2V component, construct two node independent DAG to the root node of that component. 4) Merge all node independent DAG to obtain the Link independent DAGs. The above procedure is given to construct multiple link independent DAGS. These DAGs provide reliable communication in multipath routing fashion. The algorithm is implemented on different network topologies as shown in fig. 3 and 4. In Fig. 3 and Fig. 4 four real time topologies are presented. They have different nodes and links. Fig. 3 – Illustrate real world topologies such as ARPANET and ITALIAN-NET (excerpts from [24]) Fig. 4 – Illustrate real world topologies such as MESH-4X4 and NJ-LATA (excerpts from [24]) These topologies are used in the practical experiments of this paper.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 173 3. PROTOTYPE IMPLEMNETATION A prototype application is built using Java platform which simulates the concept of reliable multipath routing scheme presented by Cho et al. [24]. The environment used for the implementation is Java platform, a PC with 4 GB RAM, Core 2 Dual processor running Windows 7 operating system. The Java custom simulator application is used to generate number of nodes and make experiments on different topologies. The simulator supports four topologies such as MESH-AX4, NJ- LATA, ARPANET and ITALIAN-NET. After generating nodes, the main UI of the application is as shown in fig. 5. Fig. 5 – Main UI of the prototype The prototype application facilitates shown in Fig.5 is to send data from source to destination. There are many links from node A to node D. The details are as shown in Fig. 5. The application also has provision to generated IDAGs based on the approaches like link independent and node independent. Sample DAG between given source and destination is given in fig. 6. Fig. 6 – UI highlighting DAG between the given source and designation. As can be seen in Fig. 6, it is evident that the DAG is formed between the given source and destination. There are multiple DAGs possible as shown in fig. 6. 4. RESULTS: Number of experiments is made to know the number of paths between the source and destination nodes on various topologies. The number of paths from source to destination is considered to be the degree of the node. It is obvious that when number of links is increased in the network, the number of paths increase automatically. The experimental results are shown as a series of graphs. Fig. 7 – Number of paths from source to destination on ITALIAN-NET topology As can be seen in Fig. 7, it is evident that the node ids which are participated in experiments are presented in horizontal axis while the vertical axis represents the number of paths in given topology. The results revealed that number of paths is more when number of links is increased. As can be seen in Fig. 8, it is evident that the node ids which are participated in experiments are presented in horizontal axis while the vertical axis represents the number of paths in given topology. Fig. 8 – Number of paths from source to destination on ARPANET topology 0 10 20 30 40 50 60 1 2 3 4 5 6 7 8 9 10Numberofpaths Node id Blue Red 0 10 20 30 40 1 4 7 10 13 16 19 Numberofpaths Node id Blue Red
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 174 The results revealed that number of paths is more when number of links is increased. Fig. 9 – Product of number of critical links with given approaches and topologies As seen in Fig. 9, the horizontal axis represents topologies while the vertical axis presents the product of number of critical links. The approaches followed are 6 pairs of colored trees, IDAGs and ITREEs on four topologies namely MESH- AX4, NJ-LATA, ARPANET and ITALIAN-NET. Fig. 10 – Product of number of critical links with given approaches and topologies As seen in Fig. 10, the horizontal axis represents number of pairs of colored trees while the vertical axis presents the product of number of critical links. The experiments are done using topologies like MESH-AX4, NJ-LATA, ARPANET and ITALIAN-NET. As seen in Fig. 11, the horizontal axis represents topologies like MESH-AX4, NJ-LATA, ARPANET and ITALIAN-NET while the vertical axis represents average path length ratio. Fig. 11 – Average ratio of path lengths of IDAGs and I Trees Fig. 12 – Ratio of average six pairs of colored trees and IDAGS path lengths As seen in Fig. 12, the horizontal axis represents topologies like MESH-AX4, NJ-LATA, ARPANET and ITALIAN-NET while the vertical axis represents average path length ratio. Fig. 13 – Ratio of average six pairs of colored trees and IDAGS path lengths 0 5 10 15 20 25 30 Producuofnumberofcritical links 6 pairs of colored trees IDAGS ITREEs 0 5 10 15 20 25 30 1 2 3 4 5 6 Productofnumberof criticallinks M MESH 4X4 NJ-LATA ARPANET ITALIAN- NET 0 0.5 1 1.5 2 2.5 Averagepathlength ratio(IDAGs/ITREEs) Blue Red 0 0.5 1 1.5 2 2.5 Avg.pathlengthratio 6 pairs of color ed trees/ ITree s 0 0.2 0.4 0.6 0.8 1 1.2 Avg.pathlengthratio (shortestpathonIDAGs /ITREEs) Red Blue
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 175 As seen in Fig. 13, the horizontal axis represents topologies like MESH-AX4, NJ-LATA, ARPANET and ITALIAN-NET while the vertical axis represents average path length ratio. CONCLUSIONS Multipath routing is important for reliable data transfer in modern networks. When independent directed acyclic graphs are constructed, it is possible to achieve reliable communication with multiple IDAGS that ensure fast recovery in case of link failures. The solution presented by Cho et al. [24] and the polynomial time algorithms are implemented in this paper in order to ensure reliable multipath routing. We implemented the IDAGs using a custom simulator. The simulation results revealed that the node independent IDAGs are practically reliable and can recover faster from link failures. REFERENCES [1] S. Cho, T. Elhourani, and S. Ramasubramanian, “Resilient multipath routing with independent directed acyclic graphs,” in Proceedings ofIEEE International Conference on Communications, Cape Town, South Africa, May 2010, pp. 1– 5. [2] Z. Yes, S. V. Krishnamurthy, and S. K. Tripathi, “A framework for reliablerouting in mobile ad hoc networks,” in INFOCOM’03, April 2003, pp.270–280. [3] P. P. Pham and S. Perreau, “Performance analysis of reactive shortest path and multi-path routing mechanism with load balance,” in IEEEINFOCOM, 2003, pp. 251–259. [4] J. Tsai and T. Moors, “A review of multipath routing protocols: From wireless ad hoc to mesh networks,” in Acorn Early Career ResearcherWorkshop on Wireless Multihop Networking, Jul. 17-18, 2006. [5] S. Murthy and J. Garcia-Luna-Aceves, “Congestion- oriented shortest multipath routing,” in IEEE INFOCOM, vol. 3, March 1996, pp. 1028–1036. [6] W. Lou, W. Liu, and Y. Fang, “A simulation study of security performance using multipath routing in ad hoc networks,” in IEEE Vehicular Technology Conference, vol. 3, October 2003, pp. 2142–2146. [7] G. Lee and J. Choi, “A survey of multipath routing for traffic engineering,”2002. [Online]. Available: http://vega.icu.ac.kr/˜gmlee/research/ [8] K. Xi and J. Chao, “Ip fast rerouting for single-link/node failurerecovery,” in Proceedings of BROADNETS - Internet TechnologiesSymposium, September 2007. [9] M. Shand and S. Bryant, “IP Fast Reroute Framework,” IETF InternetDraft, Feb. 2008, draft-ietf-rtgwg-ipfrr- framework-08.txt. [10] A. Kvalbein, A. F. Hansen, T. Cˇ icˇic´, S. Gjessing, and O. Lysne, “FastIP network recovery using multiple routing configurations,” in IEEEINFOCOM, Apr. 2006. [11] S. Lee, Y. Yu, S. Nelakuditi, Z.-L. Zhang, and C.-N. Chuah, “Proactivevs. Reactive approaches to failure resilient routing,” in IEEE INFOCOM, Mar. 2004. [12] S. Nelakuditi et al., “Failure insensitive routing for ensuring serviceavailability,” in IWQoS’03 Lecture Notes in Computer Science 2707,Jun. 2003. [13] S. Bryant, M. Shand, and S. Previdi, “IP fast reroute using notviaaddresses,” Internet Draft, Feb 2008, draft-ietf- rtgwg-ipfrr-notviaaddresses-02.txt. [14] S. Kini, S. Ramasubramanian, A. Kvalbein, and A. Hansen, “Fastrecovery from dual-link failures in IP networks,” in Proceedings of IEEEINFOCOM, Rio de Janeiro, Brazil, April 2009, pp. 1368–1376. [15] S. Ramasubramanian, M. Harkara, and M. Krunz, “Distributed lineartime construction of colored trees for disjoint multlipath routing,” inProceedings of IFIP Networking, May 2006. [16] G. Jayavelu, S. Ramasubramanian, and O. Younis, “Maintaining coloredtrees for disjoint multipath routing under node failures,” Accepted forpublication in IEEE/ACM Transactions on Networking, 2008.11 [17] A. Huck, “Independent trees in graphs,” Graphs and Combinatorics,vol. 10, pp. 29–45, 1994. [18] T. Erlebach and A. Mereu, “Path splicing with guaranteedfault tolerance,” in Proceedings of the 28th IEEE conferenceon Global telecommunications, ser. GLOBECOM’09. Piscataway,NJ, USA: IEEE Press, 2009, pp. 623–628. [Online]. Available:http://portal.acm.org/citation.cfm?id=181138 0.1811483 [19] Y. Ohara, S. Imahori, and R. V. Meter, “MARA: maximum alternativerouting algorithm,” in IEEE INFOCOM, Rio de Janeiro, Brazil, April2009, pp. 298–306. [20] M. Medard, R. A. Barry, S. G. Finn, and R. G. Gallager, “Redundanttrees for preplanned recovery in arrbitrary vertex- redundant or edgeredundant graphs,” IEEE/ACM Transactions on Networking, vol. 7,no. 5, pp. 641–652, October 1999. [21] G. Xue, L. Chen, and K. Thulasiraman, “Quality-of- service and qualityof-protection issues in preplanned recovery schemes using redundanttrees,”IEEE Journal on Selected Areas in Communication, vol. 21, no. 8,pp. 1332–1345, October 2003. [22] S. Ramasubramanian, M. Harkara, and M. Krunz, “Linear time distributedconstruction of colored trees for disjoint multipath routing,”Accepted for publication in Elsevier COMNET, vol. 51, no. 10, pp.2854–2866, July 2007. [23] G. Xue, W. Zhang, J. Tang, and K. Thulasiraman, “Polynomial timeapproximation algorithms for multi- constrained qos routing,” IEEE/ACMTransactions on Networking, vol. 16, no. 3, pp. 656 –669, June 2008. [24] Sangman Cho, Theodore Elhourani, Srinivasan Ramasubramanian, “Independent Directed Acyclic Graphs for Resilient Multipath Routing”, IEEE conference 2010.
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 176 BIOGRAPHIES Srinivas.Vaida has completed MCA from Jesus PG College, OU, Hyderabad, and pursuing M.Tech (Software Engineering) in DRK Institute of Science and Technology, JNTU, Hyderabad, Andhra Pradesh, India. His research interest includes Computer Networks and Databases, Software Engineering. N. RaghavaRao is working as an Associative Professor in DRK Institute of Science and Technology, JNTU, Hyderabad, Andhra Pradesh, India. He has received M.Tech (Computer Science) degree from JNTUH; His main research interest includes Data Mining, Compiler Design and DAA. Dr. R. V. Krishnaiah, did M.Tech (EIE) from NIT Waranagal, MTech (CSE) form JNTU, Ph.D, from JNTU Ananthapur, He has memberships in professional bodies MIE, MIETE, MISTE. He is working as Principal in DRK Institute of Science and Technology, Hyderabad. His main research interests include Image Processing, Security systems, Sensors, Intelligent Systems, Computer networks, Data mining, Software Engineering, network protection and security control. He has published many papers and Editorial Member and Reviewer for some national and international journals