SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 325
“SURVEY ON IMPLEMENTATION OF GRAPH THEORY IN ROUTING
PROTOCOLS OF WIRED COMPUTER NETWORK”
Deepak Kumar Malviya1, Neeraj Malviya2
1M.Tech. Student Department of IT, UIT BU Bhopal MP
2Associate Professor, Department of Mathamatics, NRI IST Bhopal MP
-----------------------------------------------------------------------***------------------------------------------------------------------------
ABSTRACT - In wired Computer Networking Routing Protocols are used to select the best route between any two reachable
nodes .Different types of Routing Protocol are defined for specific network environment as which routing protocol seems to be
efficient to find the best route especially when the number of nodes varies. When numbers of nodes are limited Routing
Information Protocol (RIP) is used and in large enterprise network Open Shortest Path First (OSPF) and Enhanced Interior
Gateway Routing Protocol are used. This paper analyze the Algorithms which are used by Routing Protocol to select the best
routes , these algorithm is defined in Graph Theory.
Keywords- Routing Protocol, Graph, Vertices, Edges, Weight, Shortest Path Algorithm and Bandwidth (BW).
1. INTRODUCTION
Networks are group of node which are connected each other by wired/ wireless communication media through different paths
and each node is able to communicate any of other nodes of networks. In scope of Mathematics, we can describe these
networks with the help of Graph Theory. A Graph is representation of set objects called vertices in which some of vertices are
connected by links also known as edges. Normally undirected graph, directed graph and weighted graph are used to represent
network. An undirected graph shown in Fig 1, a graph which has no orientations. A more practical example of an undirected
graph would be two people sharing hands. Person A is sharing hands with person B and at the same time Person B is sharing
hands with Person B. Fig 2 shows a directed graph or digraph. A graph has edges that have direction. Arrow on the edges are
used to show the flow from one node to another. For example in Fig 2 vertices A can move to vertices B, vertices B can move to
vertices A and vertices C but vertices cannot move to vertices B. Here Vertices movement shows the direction of
communication between network nodes. And weighted graph shown in Fig 3 , a graph in which each edge is given weight in
terms of numbers . In network it is used to analyze better path on the basis of weight on the edges of graph. Weight denotes
the cost it takes to get from one vertices to the next vertices. For example in Fig 3
for moving from vertices A to vertices we have two routes one is from directly vertices A to vertices C which has weight/cost
5 and second is from vertices A to vertices B weight/cost is 2 and vertices B to vertices C weight is 1 and in second route total
weight is 3 which is lesser weight than first routes i.e. 5 it means second routes is better.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 326
There are many topics being researched related to graph theory. However the context of this paper will be focused on
shortest path algorithms (SPAs). We will discuss how shortest path algorithms (SPAs) are used to find the best or least cost
path from given node to another node and also we discuss two of most common shortest path algorithms (SPAs) Bellman-
Ford algorithm and Dijkstra’salgorithm.Without SPAs, network traffic would have no direction and not know where to go. It
is also very important that network traffic does not loop.
There are two types of protocols are used in wired computer network Exterior Gateway Protocol (EGP) and Interior
Gateway Protocol (IGP) .EGP is used to share routing information between the Autonomous System (AS). An AS is a
heterogeneous network (group of network nodes) typically governed by large enterprise. An Enterprise which wants to be a
part of world wide web or internet has to allocate the Autonomous System Number (ASN) from Internet Assigned Number
Authority (IANA).The routing protocol which is used to communicate between two different AS is called IGP e.g Border
Gateway Protocol (BGP).IGP is used to share routing information within an AS (between the nodes of an enterprise).
Fig 4 show the communication between AS ( ASN 101,102 &104) through Exterior Gateway Protocol (EGP) and In each AS
every node (ABCD in AS 101 or PQR in AS 102 or XY in AS 103) communicate by IGP with each other in same AS only. There
are two types of Interior Gateway Protocols (IGP) , Distance Vector Routing Protocol and Link State Routing Protocol
.Distance Vector Routing Protocols i.e. Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP)
and Enhanced Interior Gateway Routing Protocol (EIGRP) uses Bellman-Ford algorithm and Link State Routing Protocol
i.e. Open Shortest Path First (OSPF) uses Dijkstra’s algorithm for finding the best path. Each of these algorithms uses a unique
method to find shortest paths between network routes. Also, one of the most unique distinctions between each routing
protocol is how each chooses their edge weights. RIP considers the cost from vertex to vertex to all be equal. Therefore, the
shortest path is determined solely on the shortest number of nodes used to get to the destination. EIGRP uses a more complex
formula in calculating weight called metric or cost but still does not require much overhead. The cost metric can be found by
using the following formula (the K variables are predefined and a default value is most often used).
EIGRP Cost = [{K1×BW+(k2×BW)/(256-Load)+k3×Delay}×k5/(k4+Reliability)] ×256 where BW=Bandwidth
OSPF uses a very simple calculation to find its edge weight called metric or cost. Its cost is found by taking one hundred divided
by the bandwidth in units of Megabits per second. The cost metric can be found by using the following formula
OSPF Cost =Reference Bandwidth / Interface Bandwidth, where reference bandwidth is 100 Mega bit per second.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 327
From the information provided above, it is clear that each algorithm is unique. I studied each of these routing protocols in
depth, and analyzed the efficiencies of each and worked to find which one is best. It is well known that each of these routing
protocols were built around a previously discovered graph theory algorithm. For example, OSPF was created knowing that
Dijkstra’s algorithm would be used in finding the shortest path. There have been several revisions of this protocol since its
release, but those changes were made to accommodate for new technology. Overall, the method used to find the shortest path
has remained the same for years. There are many times where multiple routing protocols find a shortest path to be the same
path as another protocol. Therefore, I define efficiency to be equal to the time it takes for an algorithm to actually calculate
the shortest path. Given the size of today’s networks, the process of calculating routing paths can be exhausting. Any time a
path is modified or changed, the algorithm must be ran again on the network to determine if a new shortest path is available.
For example, a cable between two routers being cut would represent an edge being removed from a graph because there is no
longer a connection between routers, or vertices. Similarly, when a router is taken out of a network, this represents a vertex
being removed from the graph. From past experience in computer networking, the arguments posed on choosing a particular
routing protocol are only related to which protocol is best for the type of equipment or connections that are being used. It
should also be known that this paper will focus on undirected graphs. In the area of computer networking, it is not practical to
say that network traffic can flow in one direction across a given path, but not the other direction. Therefore, directed graphs
will be excluded from most of the research topics. I will show my analysis of the shortest path algorithms. Then, I will move in
to the experimental portion and explain, in detail, how I used computer software to find the results.
2. RELATED WORK
Now a days many applications are using shortest path algorithms. Consider using computer navigation software to obtain
directions to a place you have never driven to before. In most cases, there are many paths one could take in order to arrive at
that location. This software creates a graph with the vertices representing a physical location and the edges which represent
the road that connects two locations. If there is not a road between locations, then there is not an edge in the graph. Next, a
weight is associated with each edge. In this example, the primary metric used for weight is distance. However, other factors in
this example are considered when assigning a weight, or cost, to an edge, such as traffic and average speed of vehicles on
a given road.
Path finding algorithms date back to the late 1800s. “Path finding, in particular searching for a maze, belongs to the
classical graph problems, and the classical references are Wiener [1873], Lucas [1882], and Tarry [1895]. They form the basis
for depth-first search techniques”. However, it wasn’t until the 1950s that shortest path algorithm.
Development began to rise. This time period marked a new era of complex network applications. For example, telephone
networks were growing significantly larger, creating a demand for a more efficient process to find the shortest path to the end
caller. Before this period, call routing had to be completed manually by telephone operators. Therefore, if a particular call path
was broken, it was not automatically intuitive as to which backup path should be taken. While several mathematicians and
computer scientists contributed to this research, two major contributions were Edsger Dijkstra and Dijkstra’s algorithm in
1956 and also the Bellman-Ford algorithm, developed by Lester Ford, Jr. and Richard Bellman in 1956 and 1958
respectively. The Bellman-Ford algorithm was also published in 1957 by Edward F. Moore and is sometimes referred to as
the Bellman-Ford-Moore algorithm. Computer networks began to evolve throughout the late 1950s and 1960s. The
majority of these networks were initially used in military operations for top secret data transfer and also for radar system
Semi-Automatic Ground Environment (SAGE) [1] . This created a great opportunity for computer networking in the
corporate world as well.
American Airlines was the first American company to fully utilize a complex network to connect mainframe systems for the
use of Semi-automated Business Research Environment (SABRE).
As corporate networks began to grow, it became very difficult to manually manage every connection between sites.
Configuring routers to direct traffic to a fixed location at all times was completely inefficient. Routers needed the ability to
dynamically calculate the best and shortest path quickly. This process is referred to as dynamic routing. The first major
dynamic routing protocol, Routing Information Protocol (RIP), was implemented in 1988. “This algorithm has been used for
routing computations in computer networks since the early days for the ARPANET” (RFC 1058). RIP runs as a software
component on routers based on the Bellman-Ford algorithm. Each routing protocol uses a different method in
calculating the cost between routers. RIP determines that the hop count is the routing metric. RIP is still commonly used in
networks today. The second major dynamic routing protocol is called Open Shortest Path First (OSPF). This protocol is current
on version 2, which is defined by RFC 2328 and published by the Internet Engineering Task Force (IETF) in 1998. Similarly,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 328
OSPF exercises a previously defined shortest path algorithm, Dijkstra’s Algorithm. OSPF calculates determines the
bandwidth between two routers and then assigns that bandwidth amount in megabits per second to the edge cost. This
protocol is also implemented frequently in corporate networks around the world today.
3. SHORTEST PATH ALGORITHMS
3.1 The Dijkstra algorithm
Finite element models of hot-rolled RHS/SHS stub columns were developed by using the non-linear finite element
program ABAQUS, in which two steps including linear perturbation and non-linear analyses were performed in order to
obtain the ultimate carrying capacity and failure modes of RHS/SHS stub columns. Material properties and cross-section
dimensions measured from Joanna’s test were included in the finite element model. The typical nomenclature is defined in
Figure 5.
The Dijkstra algorithm is used to find a single node as the source node and calculate the shortest paths from the source to
all other nodes in the graph, increasing node by node to get a shortest path tree. Here is the algorithm:
Step1: Initializing D[i]. D[i]represents the distance from the starting point V to the point Vi. If there is an arc between the
two vertices, then D[i] is the weight of the arc; Otherwise, D[i]=∞.
Step2: Finding a node Vj, which is abutting to node V and has the shortest distance from V.
Step3: Then finding a node Vk, which is abutting to node Vj and has the shortest distance from Vj. Making D[j]=Min{D[j], D[i] +
the weight from Vj to Vk}.
Step4: Repeating the step3 until reaching the destination node.
Here is a simple example to show detailed steps of the algorithm.[9]
Figure 5. A example of the Dijkstra algorithm
Table 1. A example of the Dijkstra algorithm
3.2. The Bellman–Ford algorithm
The Bellman–Ford algorithm is an algorithm that computes the shortest path from a single source vertex to all of the other
vertices. It is capable of solving graphs in which some of the edge weights are negative numbers. Here is the algorithm:
Step1: Initializing D[i]. D[i] represents the distance from the starting point V to the object point Vi.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 329
Step2: w (m,n) is the weight of the edge e (m,n), and e is the shortest path between (m,n). For each edge e (m,n). If D[m] +
w(m, n) < D[n],
D[n] = D[m] + w(u, v).
Step3: The loop performs up to i - 1 times, and i is the number of the vertices. If the operation above does not update the
D[i], the shortest path has been searched, or some of the points cannot be reached. Otherwise, executing to the next cycle.
Step4: Testing the diagram to find whether it has a negative loop (the sum of weight is less than 0). If D [u] + w (u, v) <
Distant [v], there is a negative loop, which means the shortest path cannot be founded in the graph. Otherwise D[i] records
the shortest path. For example, if there is a negative loop, the values of each point will decrease, after one traversal. It is shown
in Figure 6.
Figure 6. A negative loop
4. CONCLUSIONS
This Paper introduces the Routing Protocol which are used to find the best path between the nodes in computer networking
on the basis of their shortest path algorithms of graph .When studying routing protocol, there is a widely used the shortest
path algorithm. The main idea is to create a figure. Each node in the diagram represents a router and each edge/arc is a
communication line. In order to select the routing among a pair of routers, the algorithm should find the shortest path in the
diagram.
Modern computer networks usually use dynamic routing protocol, namely distance vector routing protocol and link
state routing protocol.
The distance vector routing algorithm is that each router maintains a table. The table has the best path and route for each
destination through exchanging the information with neighboring routers to update the table information. RIP protocol is
a dynamic routing protocol and uses the Bellman-Ford algorithm. The process of routing announcement is the process of
the Bellman-Ford algorithm’s implementation. The routers collect all different paths to the destination and save the number
of sites about information of each destination path. Any other information will be discarded, except the best route to the
destination.
Link state routing protocol collects all kinds of information of the whole network, which constitute a topological database of
routers. Open Shortest Path First (OSPF) is a typical protocol which is an internal gateway protocol which used to make
routing decision within a single autonomous system. Besides, it is a specific implementation of Dijkstra algorithm. It mainly
uses the algorithm to generates a tree without loops. Then starting from a router and passing the information to all the
routers in the tree. Thus, all the routers is shared by all the state of the link. Each router is calculated in the local routing and
avoids updating the routing table blindly.
REFERENCES
1) Schrijver, Alexander. 2010. On the History of the Shortest Path Problem. Documenta Math. p. 155- 165.
2) Yellen, Jay and Gross, Jonathan. 2008. Graph Theory and its Applications. Chapman & Hall. P. 172.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 330
3) McHugh, James. Algorithmic Graph Theory. Prentice Hall. P. 92.
4) “Introduction to Algorithms – Lecture 18”. MIT 6.046J. http://www.youtube.com/watch?v=Ttezuzs39nk
5) Wu, Bang Ye. Study of Shortest Path. Shortest-Path Trees.
6) R. Bellman. On a routing problem. Quar. Appl. Math., 16:87-90, 1958.
7) E.W. Dijkstra. A note on two problems in connection with graphs. Numer. Math., 1:269–271, 1959.
8) Kong, D., Liang, Y., Ma, X., & Zhang, L. (2011, July). Improvement and Realization of Dijkstra Algorithm in GIS of Depot.
In Control, Automation and Systems Engineering (CASE), 2011 International Conference on (pp. 1-4). IEEE. (APA)
9) Li, T., Qi, L., & Ruan, D. (2008, November). An efficient algorithm for the single-source shortest path problem in graph
theory. In Intelligent System and Knowledge Engineering, 2008. ISKE 2008. 3rd International Conference on (Vol. 1,
pp. 152-157). IEEE.
10) Yue, Y. (1999). An efficient implementation of shortest path algorithm based on dijkstra algorithm. Journal of Wuhan
Technical University of Surveying & Mapping.
11) Jian, L. I. (2009). Optimization studies based on shortest path algorithm of dijkstra. Journal of Weinan Teachers
University.

More Related Content

What's hot

IRJET- Devnagari Text Detection
IRJET- Devnagari Text DetectionIRJET- Devnagari Text Detection
IRJET- Devnagari Text DetectionIRJET Journal
 
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...cscpconf
 
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...csandit
 
GRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEM
GRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEMGRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEM
GRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEMIJCSEA Journal
 
An improved graph drawing algorithm for email networks
An improved graph drawing algorithm for email networksAn improved graph drawing algorithm for email networks
An improved graph drawing algorithm for email networksZakaria Boulouard
 
Comparitive analysis of doa and beamforming algorithms for smart antenna systems
Comparitive analysis of doa and beamforming algorithms for smart antenna systemsComparitive analysis of doa and beamforming algorithms for smart antenna systems
Comparitive analysis of doa and beamforming algorithms for smart antenna systemseSAT Journals
 
Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...
Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...
Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...CSCJournals
 
High –Speed Implementation of Design and Analysis by Using Parallel Prefix Ad...
High –Speed Implementation of Design and Analysis by Using Parallel Prefix Ad...High –Speed Implementation of Design and Analysis by Using Parallel Prefix Ad...
High –Speed Implementation of Design and Analysis by Using Parallel Prefix Ad...IOSRJECE
 
A Minimum Spanning Tree Approach of Solving a Transportation Problem
A Minimum Spanning Tree Approach of Solving a Transportation ProblemA Minimum Spanning Tree Approach of Solving a Transportation Problem
A Minimum Spanning Tree Approach of Solving a Transportation Probleminventionjournals
 
A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...
A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...
A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...IRJET Journal
 
From shortest path to all-path the routing continuum theory and its applications
From shortest path to all-path the routing continuum theory and its applicationsFrom shortest path to all-path the routing continuum theory and its applications
From shortest path to all-path the routing continuum theory and its applicationsNexgen Technology
 
Routing Management with MIRA and enhancement (IMECS2010)
Routing Management with MIRA and enhancement (IMECS2010)Routing Management with MIRA and enhancement (IMECS2010)
Routing Management with MIRA and enhancement (IMECS2010)Akhmad Zaimi
 
ANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOC
ANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOCANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOC
ANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOCijcsa
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksPvrtechnologies Nellore
 
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONSPERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONSVLSICS Design
 

What's hot (18)

IRJET- Devnagari Text Detection
IRJET- Devnagari Text DetectionIRJET- Devnagari Text Detection
IRJET- Devnagari Text Detection
 
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
 
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
 
GRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEM
GRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEMGRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEM
GRAPH MATCHING ALGORITHM FOR TASK ASSIGNMENT PROBLEM
 
An improved graph drawing algorithm for email networks
An improved graph drawing algorithm for email networksAn improved graph drawing algorithm for email networks
An improved graph drawing algorithm for email networks
 
Comparitive analysis of doa and beamforming algorithms for smart antenna systems
Comparitive analysis of doa and beamforming algorithms for smart antenna systemsComparitive analysis of doa and beamforming algorithms for smart antenna systems
Comparitive analysis of doa and beamforming algorithms for smart antenna systems
 
Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...
Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...
Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...
 
Ko3518201823
Ko3518201823Ko3518201823
Ko3518201823
 
High –Speed Implementation of Design and Analysis by Using Parallel Prefix Ad...
High –Speed Implementation of Design and Analysis by Using Parallel Prefix Ad...High –Speed Implementation of Design and Analysis by Using Parallel Prefix Ad...
High –Speed Implementation of Design and Analysis by Using Parallel Prefix Ad...
 
A Minimum Spanning Tree Approach of Solving a Transportation Problem
A Minimum Spanning Tree Approach of Solving a Transportation ProblemA Minimum Spanning Tree Approach of Solving a Transportation Problem
A Minimum Spanning Tree Approach of Solving a Transportation Problem
 
A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...
A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...
A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controll...
 
From shortest path to all-path the routing continuum theory and its applications
From shortest path to all-path the routing continuum theory and its applicationsFrom shortest path to all-path the routing continuum theory and its applications
From shortest path to all-path the routing continuum theory and its applications
 
Routing Management with MIRA and enhancement (IMECS2010)
Routing Management with MIRA and enhancement (IMECS2010)Routing Management with MIRA and enhancement (IMECS2010)
Routing Management with MIRA and enhancement (IMECS2010)
 
ANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOC
ANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOCANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOC
ANGLE ROUTING:A FULLY ADAPTIVE PACKET ROUTING FOR NOC
 
Al35218220
Al35218220Al35218220
Al35218220
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networks
 
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONSPERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
PERFORMANCE EVALUATION OF LOW POWER CARRY SAVE ADDER FOR VLSI APPLICATIONS
 
C42011318
C42011318C42011318
C42011318
 

Similar to IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired Computer Network

A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs) IJMER
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Networkijtsrd
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmIOSR Journals
 
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...IOSR Journals
 
Optimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath FlowsOptimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath FlowsIRJET Journal
 
Performance evaluation of MANET routing protocols based on QoS and energy p...
  Performance evaluation of MANET routing protocols based on QoS and energy p...  Performance evaluation of MANET routing protocols based on QoS and energy p...
Performance evaluation of MANET routing protocols based on QoS and energy p...IJECEIAES
 
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...IRJET Journal
 
Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...
Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...
Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...IJERA Editor
 
Solving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing dataSolving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing dataIJCNCJournal
 
Fuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingFuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
 

Similar to IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired Computer Network (20)

A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Network
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV Algorithm
 
C0431320
C0431320C0431320
C0431320
 
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...
 
Optimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath FlowsOptimizing Data Plane Resources for Multipath Flows
Optimizing Data Plane Resources for Multipath Flows
 
Performance evaluation of MANET routing protocols based on QoS and energy p...
  Performance evaluation of MANET routing protocols based on QoS and energy p...  Performance evaluation of MANET routing protocols based on QoS and energy p...
Performance evaluation of MANET routing protocols based on QoS and energy p...
 
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
Urban Bus Route Planning Using Reverse Labeling Dijkstra Algorithm for Tempor...
 
Random walks and green
Random walks and greenRandom walks and green
Random walks and green
 
Description Of A Graph
Description Of A GraphDescription Of A Graph
Description Of A Graph
 
RoutingMetrics_PHD_2006
RoutingMetrics_PHD_2006RoutingMetrics_PHD_2006
RoutingMetrics_PHD_2006
 
Wiki2010 Unit 4
Wiki2010 Unit 4Wiki2010 Unit 4
Wiki2010 Unit 4
 
A study on “link
A study on “linkA study on “link
A study on “link
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...
Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...
Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...
 
Solving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing dataSolving bandwidth guaranteed routing problem using routing data
Solving bandwidth guaranteed routing problem using routing data
 
Gk2411581160
Gk2411581160Gk2411581160
Gk2411581160
 
Fuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network RoutingFuzzy Optimized Metric for Adaptive Network Routing
Fuzzy Optimized Metric for Adaptive Network Routing
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

IRJET- Survey on Implementation of Graph Theory in Routing Protocols of Wired Computer Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 325 “SURVEY ON IMPLEMENTATION OF GRAPH THEORY IN ROUTING PROTOCOLS OF WIRED COMPUTER NETWORK” Deepak Kumar Malviya1, Neeraj Malviya2 1M.Tech. Student Department of IT, UIT BU Bhopal MP 2Associate Professor, Department of Mathamatics, NRI IST Bhopal MP -----------------------------------------------------------------------***------------------------------------------------------------------------ ABSTRACT - In wired Computer Networking Routing Protocols are used to select the best route between any two reachable nodes .Different types of Routing Protocol are defined for specific network environment as which routing protocol seems to be efficient to find the best route especially when the number of nodes varies. When numbers of nodes are limited Routing Information Protocol (RIP) is used and in large enterprise network Open Shortest Path First (OSPF) and Enhanced Interior Gateway Routing Protocol are used. This paper analyze the Algorithms which are used by Routing Protocol to select the best routes , these algorithm is defined in Graph Theory. Keywords- Routing Protocol, Graph, Vertices, Edges, Weight, Shortest Path Algorithm and Bandwidth (BW). 1. INTRODUCTION Networks are group of node which are connected each other by wired/ wireless communication media through different paths and each node is able to communicate any of other nodes of networks. In scope of Mathematics, we can describe these networks with the help of Graph Theory. A Graph is representation of set objects called vertices in which some of vertices are connected by links also known as edges. Normally undirected graph, directed graph and weighted graph are used to represent network. An undirected graph shown in Fig 1, a graph which has no orientations. A more practical example of an undirected graph would be two people sharing hands. Person A is sharing hands with person B and at the same time Person B is sharing hands with Person B. Fig 2 shows a directed graph or digraph. A graph has edges that have direction. Arrow on the edges are used to show the flow from one node to another. For example in Fig 2 vertices A can move to vertices B, vertices B can move to vertices A and vertices C but vertices cannot move to vertices B. Here Vertices movement shows the direction of communication between network nodes. And weighted graph shown in Fig 3 , a graph in which each edge is given weight in terms of numbers . In network it is used to analyze better path on the basis of weight on the edges of graph. Weight denotes the cost it takes to get from one vertices to the next vertices. For example in Fig 3 for moving from vertices A to vertices we have two routes one is from directly vertices A to vertices C which has weight/cost 5 and second is from vertices A to vertices B weight/cost is 2 and vertices B to vertices C weight is 1 and in second route total weight is 3 which is lesser weight than first routes i.e. 5 it means second routes is better.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 326 There are many topics being researched related to graph theory. However the context of this paper will be focused on shortest path algorithms (SPAs). We will discuss how shortest path algorithms (SPAs) are used to find the best or least cost path from given node to another node and also we discuss two of most common shortest path algorithms (SPAs) Bellman- Ford algorithm and Dijkstra’salgorithm.Without SPAs, network traffic would have no direction and not know where to go. It is also very important that network traffic does not loop. There are two types of protocols are used in wired computer network Exterior Gateway Protocol (EGP) and Interior Gateway Protocol (IGP) .EGP is used to share routing information between the Autonomous System (AS). An AS is a heterogeneous network (group of network nodes) typically governed by large enterprise. An Enterprise which wants to be a part of world wide web or internet has to allocate the Autonomous System Number (ASN) from Internet Assigned Number Authority (IANA).The routing protocol which is used to communicate between two different AS is called IGP e.g Border Gateway Protocol (BGP).IGP is used to share routing information within an AS (between the nodes of an enterprise). Fig 4 show the communication between AS ( ASN 101,102 &104) through Exterior Gateway Protocol (EGP) and In each AS every node (ABCD in AS 101 or PQR in AS 102 or XY in AS 103) communicate by IGP with each other in same AS only. There are two types of Interior Gateway Protocols (IGP) , Distance Vector Routing Protocol and Link State Routing Protocol .Distance Vector Routing Protocols i.e. Routing Information Protocol (RIP), Interior Gateway Routing Protocol (IGRP) and Enhanced Interior Gateway Routing Protocol (EIGRP) uses Bellman-Ford algorithm and Link State Routing Protocol i.e. Open Shortest Path First (OSPF) uses Dijkstra’s algorithm for finding the best path. Each of these algorithms uses a unique method to find shortest paths between network routes. Also, one of the most unique distinctions between each routing protocol is how each chooses their edge weights. RIP considers the cost from vertex to vertex to all be equal. Therefore, the shortest path is determined solely on the shortest number of nodes used to get to the destination. EIGRP uses a more complex formula in calculating weight called metric or cost but still does not require much overhead. The cost metric can be found by using the following formula (the K variables are predefined and a default value is most often used). EIGRP Cost = [{K1×BW+(k2×BW)/(256-Load)+k3×Delay}×k5/(k4+Reliability)] ×256 where BW=Bandwidth OSPF uses a very simple calculation to find its edge weight called metric or cost. Its cost is found by taking one hundred divided by the bandwidth in units of Megabits per second. The cost metric can be found by using the following formula OSPF Cost =Reference Bandwidth / Interface Bandwidth, where reference bandwidth is 100 Mega bit per second.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 327 From the information provided above, it is clear that each algorithm is unique. I studied each of these routing protocols in depth, and analyzed the efficiencies of each and worked to find which one is best. It is well known that each of these routing protocols were built around a previously discovered graph theory algorithm. For example, OSPF was created knowing that Dijkstra’s algorithm would be used in finding the shortest path. There have been several revisions of this protocol since its release, but those changes were made to accommodate for new technology. Overall, the method used to find the shortest path has remained the same for years. There are many times where multiple routing protocols find a shortest path to be the same path as another protocol. Therefore, I define efficiency to be equal to the time it takes for an algorithm to actually calculate the shortest path. Given the size of today’s networks, the process of calculating routing paths can be exhausting. Any time a path is modified or changed, the algorithm must be ran again on the network to determine if a new shortest path is available. For example, a cable between two routers being cut would represent an edge being removed from a graph because there is no longer a connection between routers, or vertices. Similarly, when a router is taken out of a network, this represents a vertex being removed from the graph. From past experience in computer networking, the arguments posed on choosing a particular routing protocol are only related to which protocol is best for the type of equipment or connections that are being used. It should also be known that this paper will focus on undirected graphs. In the area of computer networking, it is not practical to say that network traffic can flow in one direction across a given path, but not the other direction. Therefore, directed graphs will be excluded from most of the research topics. I will show my analysis of the shortest path algorithms. Then, I will move in to the experimental portion and explain, in detail, how I used computer software to find the results. 2. RELATED WORK Now a days many applications are using shortest path algorithms. Consider using computer navigation software to obtain directions to a place you have never driven to before. In most cases, there are many paths one could take in order to arrive at that location. This software creates a graph with the vertices representing a physical location and the edges which represent the road that connects two locations. If there is not a road between locations, then there is not an edge in the graph. Next, a weight is associated with each edge. In this example, the primary metric used for weight is distance. However, other factors in this example are considered when assigning a weight, or cost, to an edge, such as traffic and average speed of vehicles on a given road. Path finding algorithms date back to the late 1800s. “Path finding, in particular searching for a maze, belongs to the classical graph problems, and the classical references are Wiener [1873], Lucas [1882], and Tarry [1895]. They form the basis for depth-first search techniques”. However, it wasn’t until the 1950s that shortest path algorithm. Development began to rise. This time period marked a new era of complex network applications. For example, telephone networks were growing significantly larger, creating a demand for a more efficient process to find the shortest path to the end caller. Before this period, call routing had to be completed manually by telephone operators. Therefore, if a particular call path was broken, it was not automatically intuitive as to which backup path should be taken. While several mathematicians and computer scientists contributed to this research, two major contributions were Edsger Dijkstra and Dijkstra’s algorithm in 1956 and also the Bellman-Ford algorithm, developed by Lester Ford, Jr. and Richard Bellman in 1956 and 1958 respectively. The Bellman-Ford algorithm was also published in 1957 by Edward F. Moore and is sometimes referred to as the Bellman-Ford-Moore algorithm. Computer networks began to evolve throughout the late 1950s and 1960s. The majority of these networks were initially used in military operations for top secret data transfer and also for radar system Semi-Automatic Ground Environment (SAGE) [1] . This created a great opportunity for computer networking in the corporate world as well. American Airlines was the first American company to fully utilize a complex network to connect mainframe systems for the use of Semi-automated Business Research Environment (SABRE). As corporate networks began to grow, it became very difficult to manually manage every connection between sites. Configuring routers to direct traffic to a fixed location at all times was completely inefficient. Routers needed the ability to dynamically calculate the best and shortest path quickly. This process is referred to as dynamic routing. The first major dynamic routing protocol, Routing Information Protocol (RIP), was implemented in 1988. “This algorithm has been used for routing computations in computer networks since the early days for the ARPANET” (RFC 1058). RIP runs as a software component on routers based on the Bellman-Ford algorithm. Each routing protocol uses a different method in calculating the cost between routers. RIP determines that the hop count is the routing metric. RIP is still commonly used in networks today. The second major dynamic routing protocol is called Open Shortest Path First (OSPF). This protocol is current on version 2, which is defined by RFC 2328 and published by the Internet Engineering Task Force (IETF) in 1998. Similarly,
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 328 OSPF exercises a previously defined shortest path algorithm, Dijkstra’s Algorithm. OSPF calculates determines the bandwidth between two routers and then assigns that bandwidth amount in megabits per second to the edge cost. This protocol is also implemented frequently in corporate networks around the world today. 3. SHORTEST PATH ALGORITHMS 3.1 The Dijkstra algorithm Finite element models of hot-rolled RHS/SHS stub columns were developed by using the non-linear finite element program ABAQUS, in which two steps including linear perturbation and non-linear analyses were performed in order to obtain the ultimate carrying capacity and failure modes of RHS/SHS stub columns. Material properties and cross-section dimensions measured from Joanna’s test were included in the finite element model. The typical nomenclature is defined in Figure 5. The Dijkstra algorithm is used to find a single node as the source node and calculate the shortest paths from the source to all other nodes in the graph, increasing node by node to get a shortest path tree. Here is the algorithm: Step1: Initializing D[i]. D[i]represents the distance from the starting point V to the point Vi. If there is an arc between the two vertices, then D[i] is the weight of the arc; Otherwise, D[i]=∞. Step2: Finding a node Vj, which is abutting to node V and has the shortest distance from V. Step3: Then finding a node Vk, which is abutting to node Vj and has the shortest distance from Vj. Making D[j]=Min{D[j], D[i] + the weight from Vj to Vk}. Step4: Repeating the step3 until reaching the destination node. Here is a simple example to show detailed steps of the algorithm.[9] Figure 5. A example of the Dijkstra algorithm Table 1. A example of the Dijkstra algorithm 3.2. The Bellman–Ford algorithm The Bellman–Ford algorithm is an algorithm that computes the shortest path from a single source vertex to all of the other vertices. It is capable of solving graphs in which some of the edge weights are negative numbers. Here is the algorithm: Step1: Initializing D[i]. D[i] represents the distance from the starting point V to the object point Vi.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 329 Step2: w (m,n) is the weight of the edge e (m,n), and e is the shortest path between (m,n). For each edge e (m,n). If D[m] + w(m, n) < D[n], D[n] = D[m] + w(u, v). Step3: The loop performs up to i - 1 times, and i is the number of the vertices. If the operation above does not update the D[i], the shortest path has been searched, or some of the points cannot be reached. Otherwise, executing to the next cycle. Step4: Testing the diagram to find whether it has a negative loop (the sum of weight is less than 0). If D [u] + w (u, v) < Distant [v], there is a negative loop, which means the shortest path cannot be founded in the graph. Otherwise D[i] records the shortest path. For example, if there is a negative loop, the values of each point will decrease, after one traversal. It is shown in Figure 6. Figure 6. A negative loop 4. CONCLUSIONS This Paper introduces the Routing Protocol which are used to find the best path between the nodes in computer networking on the basis of their shortest path algorithms of graph .When studying routing protocol, there is a widely used the shortest path algorithm. The main idea is to create a figure. Each node in the diagram represents a router and each edge/arc is a communication line. In order to select the routing among a pair of routers, the algorithm should find the shortest path in the diagram. Modern computer networks usually use dynamic routing protocol, namely distance vector routing protocol and link state routing protocol. The distance vector routing algorithm is that each router maintains a table. The table has the best path and route for each destination through exchanging the information with neighboring routers to update the table information. RIP protocol is a dynamic routing protocol and uses the Bellman-Ford algorithm. The process of routing announcement is the process of the Bellman-Ford algorithm’s implementation. The routers collect all different paths to the destination and save the number of sites about information of each destination path. Any other information will be discarded, except the best route to the destination. Link state routing protocol collects all kinds of information of the whole network, which constitute a topological database of routers. Open Shortest Path First (OSPF) is a typical protocol which is an internal gateway protocol which used to make routing decision within a single autonomous system. Besides, it is a specific implementation of Dijkstra algorithm. It mainly uses the algorithm to generates a tree without loops. Then starting from a router and passing the information to all the routers in the tree. Thus, all the routers is shared by all the state of the link. Each router is calculated in the local routing and avoids updating the routing table blindly. REFERENCES 1) Schrijver, Alexander. 2010. On the History of the Shortest Path Problem. Documenta Math. p. 155- 165. 2) Yellen, Jay and Gross, Jonathan. 2008. Graph Theory and its Applications. Chapman & Hall. P. 172.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 330 3) McHugh, James. Algorithmic Graph Theory. Prentice Hall. P. 92. 4) “Introduction to Algorithms – Lecture 18”. MIT 6.046J. http://www.youtube.com/watch?v=Ttezuzs39nk 5) Wu, Bang Ye. Study of Shortest Path. Shortest-Path Trees. 6) R. Bellman. On a routing problem. Quar. Appl. Math., 16:87-90, 1958. 7) E.W. Dijkstra. A note on two problems in connection with graphs. Numer. Math., 1:269–271, 1959. 8) Kong, D., Liang, Y., Ma, X., & Zhang, L. (2011, July). Improvement and Realization of Dijkstra Algorithm in GIS of Depot. In Control, Automation and Systems Engineering (CASE), 2011 International Conference on (pp. 1-4). IEEE. (APA) 9) Li, T., Qi, L., & Ruan, D. (2008, November). An efficient algorithm for the single-source shortest path problem in graph theory. In Intelligent System and Knowledge Engineering, 2008. ISKE 2008. 3rd International Conference on (Vol. 1, pp. 152-157). IEEE. 10) Yue, Y. (1999). An efficient implementation of shortest path algorithm based on dijkstra algorithm. Journal of Wuhan Technical University of Surveying & Mapping. 11) Jian, L. I. (2009). Optimization studies based on shortest path algorithm of dijkstra. Journal of Weinan Teachers University.