This is era of information blast. A huge quantity of information is pouring in from various sources. The
revolutionary advancement of Information and Communication technologies bring the world close
together.A pile of information in different formats is just a click away. Which motivate the organizations to
get more internet bandwidth to consume and publish theinformationoverexploding cloudof Internet. The
standard router redundancyprotocolis used to handle backup link showever it cannot aggregate
them.Whereas thelink standard aggregation protocol can aggregate the link but it support only Ethernet
technology.In this researchpaper a concept of Redundant Link Aggregation (RLA)is proposed. RLA can
aggregate and handle backup links with main links regardless of carriertechnology. Furthermore a
dataforwardingmechanism Odd Load Balancing (OLB) is also proposed for RLA scheme. For the sake of
performance evaluation, Redundant Link Aggregation (RLA) is compared with Virtual Router Redundancy
Protocol (VRRP). The simulation result reveals that Redundant Link Aggregation (RLA) can cover the
bandwidth demand of the network in peak hours by consuming backup links as well which with Virtual
Router Redundancy Protocol (VRRP)cannot.It is further noted thatOdd Load Balancing (OLB) feature can
be used to save the cost in terms of money per annum.
The support of multipath routing in IPv6-based internet of things IJECEIAES
The development of IPv6-based network architectures for Internet of Things (IoT) systems is a feasible approach to widen the horizon for more effective applications, but remains a challenge. Network routing needs to be effectively addressed in such environments of scarce computational and energy resources. The Internet Engineering Task Force (IETF) specified the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to provide a basic IPv6-based routing framework for IoT networks. However, the RPL design has the potential of extending its functionality to a further limit and incorporating the support of advanced routing mechanisms. These include multipath routing which has opened the doors for great improvements towards efficient energy balancing, load distribution, and even more. This paper fulfilled a need for an effective review of recent advancements in Internet of Things (IoT) networking. In particular, it presented an effective review and provided a taxonomy of the different multipath routing solutions enhancing the RPL protocol. The aim was to discover its current state and outline the importance of integrating such a mechanism into RPL to revive its potentiality to a wider range of IoT applications. This paper also discussed the latest research findings and provided some insights into plausible follow-up researches.
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
This document provides an overview of networking concepts including networking devices, network interface cards, network topologies, local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It discusses common networking devices like hubs, switches, routers and their functions. It also explains the OSI reference model and its seven layers - physical, data link, network, transport, session, presentation and application layer.
Active Network is a novel approach of networking to mobile users in which the nodes are programmed to perform custom operations on the messages that pass through the node. It provides an architectural support for dynamically deploying new protocols in an existing network topology. The routers in an active network can download and execute code that is contained in the packets passing through them, thus rendering the node recognized and run totally new protocols without making any changes to the architecture of the network. Because the network's behavior can be altered at any time, active networks could be used to provide dynamic quality of service (QoS) or to support dynamic solutions to traffic congestion. This research implements and tests such specialized Active Networks security service known as the firewall and the ping service in Active Network. Active Network environment will be implemented on a small scale test scenario in order to study the performance and characteristics of active networks
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
This document discusses the transition from IPv4 to IPv6. It provides background on why IPv6 was developed, noting that IPv4 addresses were being depleted and IPv6 expands the address space from 32 to 128 bits. It summarizes three main transition strategies: dual stack, tunneling, and translation. The document warns that tunneling IPv6 packets inside IPv4 packets could allow hidden IPv6 traffic and security issues if deep packet inspection is not used. Overall it emphasizes that a gradual transition combining techniques will be needed to migrate from the current IPv4 internet to an IPv6 internet.
The document discusses networking devices and concepts, describing network interface cards, hubs, bridges, switches, routers, topologies like bus, ring, star, and examples of different types of networks including local area networks (LANs), wireless LAN standards, wide area networks (WANs), and storage area networks (SANs). It also explains the purpose of the OSI model in standardizing network communication and its seven layers from physical layer to application layer.
This document provides an overview of networking concepts including data networks, networking devices, network interface cards, networking device icons, repeaters, hubs, bridges, workgroup switches, routers, network topologies, physical topologies, LANs, WANs, examples of data networks, wireless LAN organizations and standards, cellular topology for wireless, SANs, virtual private networks, bandwidth, measuring bandwidth, the OSI model, data flow through a network, LAN physical layer, Ethernet standards, straight-through and crossover cables, sources of noise on copper media, shielded twisted pair cable, coaxial cable, fiber optic cable, fiber optic connectors, fiber optic patch panels, cable specifications, Ethernet media connector requirements, L
The support of multipath routing in IPv6-based internet of things IJECEIAES
The development of IPv6-based network architectures for Internet of Things (IoT) systems is a feasible approach to widen the horizon for more effective applications, but remains a challenge. Network routing needs to be effectively addressed in such environments of scarce computational and energy resources. The Internet Engineering Task Force (IETF) specified the IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to provide a basic IPv6-based routing framework for IoT networks. However, the RPL design has the potential of extending its functionality to a further limit and incorporating the support of advanced routing mechanisms. These include multipath routing which has opened the doors for great improvements towards efficient energy balancing, load distribution, and even more. This paper fulfilled a need for an effective review of recent advancements in Internet of Things (IoT) networking. In particular, it presented an effective review and provided a taxonomy of the different multipath routing solutions enhancing the RPL protocol. The aim was to discover its current state and outline the importance of integrating such a mechanism into RPL to revive its potentiality to a wider range of IoT applications. This paper also discussed the latest research findings and provided some insights into plausible follow-up researches.
AN ADAPTIVE DIFFSERV APPROACH TO SUPPORT QOS IN NETWORK MOBILITY NEMO ENVIRON...IJCNCJournal
Network Mobility Basic Support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 doesn’t deliver any kind of Quality of Service (QoS) guarantees to its clients. It can barely offer the same level of services (i.e. Best-Effort) to all the users without obligation to the application’s needs. This propositions a challenge to real-time applications that demand a precise level of QoS pledge. The Differentiated Services has recently come to be the most widely used QoS support technology in IP networks due to its relative simplicity and scalability benefits. This paper proposes a new scheme to provide QoS to mobile network nodes within NEMO context. The proposed scheme intends to reduce handover latency for the users of MNN as well as alleviates packet losses. The feasibility of the proposed enhancement is assessed by measuring its performance against the native NEMO BS standard protocol using NS-2 simulator. The obtained results in the simulation study have demonstrated that the proposed scheme outperforms the standard NEMO BS protocol.
This document provides an overview of networking concepts including networking devices, network interface cards, network topologies, local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It discusses common networking devices like hubs, switches, routers and their functions. It also explains the OSI reference model and its seven layers - physical, data link, network, transport, session, presentation and application layer.
Active Network is a novel approach of networking to mobile users in which the nodes are programmed to perform custom operations on the messages that pass through the node. It provides an architectural support for dynamically deploying new protocols in an existing network topology. The routers in an active network can download and execute code that is contained in the packets passing through them, thus rendering the node recognized and run totally new protocols without making any changes to the architecture of the network. Because the network's behavior can be altered at any time, active networks could be used to provide dynamic quality of service (QoS) or to support dynamic solutions to traffic congestion. This research implements and tests such specialized Active Networks security service known as the firewall and the ping service in Active Network. Active Network environment will be implemented on a small scale test scenario in order to study the performance and characteristics of active networks
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
This document discusses the transition from IPv4 to IPv6. It provides background on why IPv6 was developed, noting that IPv4 addresses were being depleted and IPv6 expands the address space from 32 to 128 bits. It summarizes three main transition strategies: dual stack, tunneling, and translation. The document warns that tunneling IPv6 packets inside IPv4 packets could allow hidden IPv6 traffic and security issues if deep packet inspection is not used. Overall it emphasizes that a gradual transition combining techniques will be needed to migrate from the current IPv4 internet to an IPv6 internet.
The document discusses networking devices and concepts, describing network interface cards, hubs, bridges, switches, routers, topologies like bus, ring, star, and examples of different types of networks including local area networks (LANs), wireless LAN standards, wide area networks (WANs), and storage area networks (SANs). It also explains the purpose of the OSI model in standardizing network communication and its seven layers from physical layer to application layer.
This document provides an overview of networking concepts including data networks, networking devices, network interface cards, networking device icons, repeaters, hubs, bridges, workgroup switches, routers, network topologies, physical topologies, LANs, WANs, examples of data networks, wireless LAN organizations and standards, cellular topology for wireless, SANs, virtual private networks, bandwidth, measuring bandwidth, the OSI model, data flow through a network, LAN physical layer, Ethernet standards, straight-through and crossover cables, sources of noise on copper media, shielded twisted pair cable, coaxial cable, fiber optic cable, fiber optic connectors, fiber optic patch panels, cable specifications, Ethernet media connector requirements, L
The document provides information about networking certifications and the CCNA exam. It discusses the CCNA exam number, total marks, duration, passing score, number of questions, question types, and benefits of obtaining the certification. It also covers networking topics like data networks, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs, WANs, virtual private networks, bandwidth, internetworking devices, network structure and hierarchy, IEEE 802 standards, and the OSI model.
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
This document discusses migrating packet dropping in mobile ad-hoc networks using a modified ACK-based authentication scheme. It begins by introducing mobile ad-hoc networks and some of the security challenges they face, such as packet dropping attacks. It then discusses existing ACK-based authentication schemes and their limitations, such as generating a large overhead and having ambiguity when nodes refuse acknowledgments. The document proposes a modified ACK-based scheme that uses a secure channel to overcome these limitations and minimize packet dropping. It evaluates the proposed scheme through simulation experiments and finds it improves performance metrics like packet delivery ratio and throughput compared to not using a secure channel. In conclusion, the modified scheme is presented as a way to enhance node authentication and reduce packet dropping in mobile
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of LANs, MANs and WANs. Finally, it introduces the OSI model and its seven layers.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of local, metropolitan, and wide area networks. Finally, it introduces the OSI model and its seven layers, describing the function of each layer.
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Gabriele Bozzi
1. The document discusses the potential for peer-to-peer (P2P) computing as an alternative or complement to the traditional client-server model, especially in the context of cloud computing.
2. It notes challenges with P2P such as lack of centralized control and potential for freeloading, but also advantages like harnessing unused resources.
3. Emerging technologies like autonomic and cognitive networking aim to address P2P challenges by enabling self-configuration and optimization of distributed resources.
1. The document discusses the potential for peer-to-peer (P2P) computing as an alternative or complement to the traditional client-server model, especially in the context of cloud computing.
2. P2P systems offer access to distributed resources but lack centralized control, which makes it difficult to ensure reliability, performance, and security.
3. Autonomic and cognitive approaches may help address issues with P2P by enabling self-configuration, healing, optimization and protection of distributed resources.
4. Future networking approaches like DirecNet envision high-speed mobile mesh networks that could further enable wide-scale distributed computing architectures.
This document provides an overview of networking concepts including data networks, networking devices, network interface cards, networking device icons, repeaters, hubs, bridges, workgroup switches, routers, network topologies, LANs, MANs and WANs, wireless LAN organizations and standards, cellular topology for wireless, storage area networks, virtual private networks, bandwidth, measuring bandwidth, the OSI model, and WAN physical layer implementations.
This document provides an overview of computer networking concepts including networking devices, network interface cards, networking device icons, network topologies, local area networks (LANs), metropolitan area networks (MANs), wide area networks (WANs), wireless networks, storage area networks (SANs), virtual private networks (VPN), bandwidth, and the OSI model. The purpose of networking technology is to increase productivity while saving costs by efficiently sharing resources and communicating between devices.
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...CSCJournals
End-System multicasting (ESM) is a promising application-layer scheme that has been recently proposed for implementing multicast routing in the application layer as a practical alternative to the IP multicasting. Moreover, ESM is an efficient application layer solution where all the multicast functionality is shifted to the end users. However, the limitation in bandwidth and the fact that the message needs to be forwarded from host-to-host using unicast connection, and consequently incrementing the end-to-end delay of the transmission process, contribute to the price to pay for this new approach. Therefore, supporting high-speed real-time applications such as live streaming multimedia, videoconferencing, distributed simulations, and multiparty games require a sound understanding of these multicasting schemes such as IP multicast and ESM and the factors that might affect the end-user requirements. In this paper, we present both the analytical and the mathematical models for formalizing the end-to-end delay and the bandwidth efficiency of both IP and ESM multicast system. For the sake of the experimental verifications of the proposed models, numerical and simulation results are presented in this paper. Finally, the proposed formulization can be used to design and implement a more robust and efficient multicast systems for the future networks
Traffic management inside software-defined data centre networkingjournalBEEI
In recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configurations, efficient enhancements and further elasticity to handle massive network schemes. In this paper the opendaylight controller (ODL-CO) with new version OF 1.4 protocol and the ant colony optimization algorithm is proposed to test the performance of the LB function using IPv6 in a SDN-DC network by studying the throughput, data transfer, bandwidth and average delay performance of the networking parameters before and after use of the LB algorithm. As a result, after applying the LB, the throughput, data transfer and bandwidth performance increased, while the average delay decreased.
Comparison between Conventional Network and ANN with Case Study IRJET Journal
This document provides an overview and comparison of conventional networks, artificial neural networks (ANN), routers, bridges, and repeaters. It begins with an abstract discussing the goals of comparing these network types and generating a case study. It then provides detailed descriptions of ad-hoc networks, ANN, routers, bridges, and repeaters. The document discusses routing protocols for ad-hoc networks and categorizes them as proactive, reactive, or hybrid. It also examines challenges in ad-hoc network routing and provides examples of different routing protocols. In the following sections, it provides more in-depth explanations of routers, including their control and forwarding planes and different types.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...BDDazza
The document discusses the architecture of the Internet. It describes the Internet as a collection of thousands of independent networks that interconnect using the TCP/IP protocol. This allows any network to communicate with any other network. The architecture is hierarchical, with small local networks connecting to medium regional networks and then large national backbones. This hierarchy and the use of common protocols allows the Internet to function as a single global network. The original architecture was designed to promote innovation but is changing in ways that may reduce innovation.
The document discusses the CCNA certification exam which tests knowledge of networking concepts. The exam is 90 minutes long with 45-55 multiple choice and simulation questions. Candidates must score 849 points or higher to pass. Obtaining the CCNA provides peer validation for personal and potential employer benefits, as well as opportunities for career advancement.
Fundamentals of internet_measurement_a_tutorialTuristicae
This document provides a tutorial on fundamentals of internet measurement. It is intended for readers with a basic knowledge of networks and the internet who need to learn more about network measurement. The tutorial covers topics such as active vs passive measurement, measuring at single or multiple points, and different types of internet service providers including transport, access, web hosting, application hosting, content delivery and traffic exchange providers. It also discusses key concepts related to measuring internet performance such as networks, intranets, connectivity and layers of the network.
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...csandit
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...TELKOMNIKA JOURNAL
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLS-VPN network and a classic VPN network using simulation studies done on OPNET®. The performance metrics used to carry out the comparison include; End to End Delay, Voice Packet Sent/Received and Label Switched Path’s Traffic. The simulation study was carried out with Voice over Internet Protocol (VoIP) as the test bed. The result of the study showed that MPLS-based VPN networks outperform classic VPN networks.
Key management in information centric networkingIJCNCJournal
Information centric networking (ICN) has been in the spotlight of recent research. It is an emerging
communication paradigm that relays on the concept of publish and subscribe. It aims to revise the current
Internet with a new clean slate architecture where the design is completely different from today’s location
based model. To secure the forwarding plan in this network, it is vital to have a time based transient
forwarding identifiers by periodically changing the network link identifiers. This assumes shared keys to be
distributed prior the communications between an entity termed topology manager (TM) and each forwarder
in the network. Exchanging and sharing a secret key between two parties is one of most critical functions in
cryptography that needs to be more concerned when integrating cryptographic functions into the system. As
ICN is brand new Internet architecture, many existing cryptography protocols may need to be redesigned
to fit this new architecture. Therefore, this paper focuses on the security aspect of ICN and proposes an
initial design to deploy the integrated Diffie-Hellman-DSA key exchange protocol as a key distributions
mechanism.
Load Balance in Data Center SDN Networks IJECEIAES
In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control a nd forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and forwarding planes. So, due to the rapid increase in the number of applications, websites, storage space, and some of the network resources are being underutilized due to static routing mechanisms. To overcome these limitations, a Software Defined Network based Openflow Data Center network architecture is used to obtain better performance parameters and implementing traffic load balancing function. The load balancing distributes the traffic requests over the connected servers, to diminish network congestions, and reduce un derutilization problem of servers. As a result, SDN is developed to afford more effective configuration, enhanced performance, and more flexibility to deal with huge network designs.
The document provides an overview of Janet Abbate's book "Inventing the Internet" which explores the history of the development of the Internet from 1959 to 1994. The book examines the social and cultural factors influencing the Internet's evolution from ARPANET to a global network. It analyzes how the Internet was shaped by collaboration and conflict between various players including government, military, computer scientists, and businesses. The author traces the technological development of the Internet and links it to organizational, social, and cultural changes during that period.
The document provides information about networking certifications and the CCNA exam. It discusses the CCNA exam number, total marks, duration, passing score, number of questions, question types, and benefits of obtaining the certification. It also covers networking topics like data networks, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs, WANs, virtual private networks, bandwidth, internetworking devices, network structure and hierarchy, IEEE 802 standards, and the OSI model.
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
This document discusses migrating packet dropping in mobile ad-hoc networks using a modified ACK-based authentication scheme. It begins by introducing mobile ad-hoc networks and some of the security challenges they face, such as packet dropping attacks. It then discusses existing ACK-based authentication schemes and their limitations, such as generating a large overhead and having ambiguity when nodes refuse acknowledgments. The document proposes a modified ACK-based scheme that uses a secure channel to overcome these limitations and minimize packet dropping. It evaluates the proposed scheme through simulation experiments and finds it improves performance metrics like packet delivery ratio and throughput compared to not using a secure channel. In conclusion, the modified scheme is presented as a way to enhance node authentication and reduce packet dropping in mobile
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of LANs, MANs and WANs. Finally, it introduces the OSI model and its seven layers.
The document provides information about the CCNA certification exam, including the exam number, total marks, duration, passing score, question types, and benefits of obtaining the certification. It also discusses common networking devices, network interface cards, hubs, switches, routers, common network topologies, and the functions of local, metropolitan, and wide area networks. Finally, it introduces the OSI model and its seven layers, describing the function of each layer.
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Gabriele Bozzi
1. The document discusses the potential for peer-to-peer (P2P) computing as an alternative or complement to the traditional client-server model, especially in the context of cloud computing.
2. It notes challenges with P2P such as lack of centralized control and potential for freeloading, but also advantages like harnessing unused resources.
3. Emerging technologies like autonomic and cognitive networking aim to address P2P challenges by enabling self-configuration and optimization of distributed resources.
1. The document discusses the potential for peer-to-peer (P2P) computing as an alternative or complement to the traditional client-server model, especially in the context of cloud computing.
2. P2P systems offer access to distributed resources but lack centralized control, which makes it difficult to ensure reliability, performance, and security.
3. Autonomic and cognitive approaches may help address issues with P2P by enabling self-configuration, healing, optimization and protection of distributed resources.
4. Future networking approaches like DirecNet envision high-speed mobile mesh networks that could further enable wide-scale distributed computing architectures.
This document provides an overview of networking concepts including data networks, networking devices, network interface cards, networking device icons, repeaters, hubs, bridges, workgroup switches, routers, network topologies, LANs, MANs and WANs, wireless LAN organizations and standards, cellular topology for wireless, storage area networks, virtual private networks, bandwidth, measuring bandwidth, the OSI model, and WAN physical layer implementations.
This document provides an overview of computer networking concepts including networking devices, network interface cards, networking device icons, network topologies, local area networks (LANs), metropolitan area networks (MANs), wide area networks (WANs), wireless networks, storage area networks (SANs), virtual private networks (VPN), bandwidth, and the OSI model. The purpose of networking technology is to increase productivity while saving costs by efficiently sharing resources and communicating between devices.
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for ...CSCJournals
End-System multicasting (ESM) is a promising application-layer scheme that has been recently proposed for implementing multicast routing in the application layer as a practical alternative to the IP multicasting. Moreover, ESM is an efficient application layer solution where all the multicast functionality is shifted to the end users. However, the limitation in bandwidth and the fact that the message needs to be forwarded from host-to-host using unicast connection, and consequently incrementing the end-to-end delay of the transmission process, contribute to the price to pay for this new approach. Therefore, supporting high-speed real-time applications such as live streaming multimedia, videoconferencing, distributed simulations, and multiparty games require a sound understanding of these multicasting schemes such as IP multicast and ESM and the factors that might affect the end-user requirements. In this paper, we present both the analytical and the mathematical models for formalizing the end-to-end delay and the bandwidth efficiency of both IP and ESM multicast system. For the sake of the experimental verifications of the proposed models, numerical and simulation results are presented in this paper. Finally, the proposed formulization can be used to design and implement a more robust and efficient multicast systems for the future networks
Traffic management inside software-defined data centre networkingjournalBEEI
In recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configurations, efficient enhancements and further elasticity to handle massive network schemes. In this paper the opendaylight controller (ODL-CO) with new version OF 1.4 protocol and the ant colony optimization algorithm is proposed to test the performance of the LB function using IPv6 in a SDN-DC network by studying the throughput, data transfer, bandwidth and average delay performance of the networking parameters before and after use of the LB algorithm. As a result, after applying the LB, the throughput, data transfer and bandwidth performance increased, while the average delay decreased.
Comparison between Conventional Network and ANN with Case Study IRJET Journal
This document provides an overview and comparison of conventional networks, artificial neural networks (ANN), routers, bridges, and repeaters. It begins with an abstract discussing the goals of comparing these network types and generating a case study. It then provides detailed descriptions of ad-hoc networks, ANN, routers, bridges, and repeaters. The document discusses routing protocols for ad-hoc networks and categorizes them as proactive, reactive, or hybrid. It also examines challenges in ad-hoc network routing and provides examples of different routing protocols. In the following sections, it provides more in-depth explanations of routers, including their control and forwarding planes and different types.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
What is internet architecture? - (Darren's Study Guide: CompTIA A+, 220-1001 ...BDDazza
The document discusses the architecture of the Internet. It describes the Internet as a collection of thousands of independent networks that interconnect using the TCP/IP protocol. This allows any network to communicate with any other network. The architecture is hierarchical, with small local networks connecting to medium regional networks and then large national backbones. This hierarchy and the use of common protocols allows the Internet to function as a single global network. The original architecture was designed to promote innovation but is changing in ways that may reduce innovation.
The document discusses the CCNA certification exam which tests knowledge of networking concepts. The exam is 90 minutes long with 45-55 multiple choice and simulation questions. Candidates must score 849 points or higher to pass. Obtaining the CCNA provides peer validation for personal and potential employer benefits, as well as opportunities for career advancement.
Fundamentals of internet_measurement_a_tutorialTuristicae
This document provides a tutorial on fundamentals of internet measurement. It is intended for readers with a basic knowledge of networks and the internet who need to learn more about network measurement. The tutorial covers topics such as active vs passive measurement, measuring at single or multiple points, and different types of internet service providers including transport, access, web hosting, application hosting, content delivery and traffic exchange providers. It also discusses key concepts related to measuring internet performance such as networks, intranets, connectivity and layers of the network.
A NEW ALGORITHM FOR CONSTRUCTION OF A P2P MULTICAST HYBRID OVERLAY TREE BASED...csandit
In the last decade Peer to Peer technology has been thoroughly explored, because it overcomes many limitations compared to the traditional client server paradigm. Despite its advantages over a traditional approach, the ubiquitous availability of high speed, high bandwidth and low latency networks has supported the traditional client-server paradigm. Recently, however, the surge of streaming services has spawned renewed interest in Peer to Peer technologies. In addition, services like geolocation databases and browser technologies like Web-RTC make a hybrid approach attractive.
Performance of MPLS-based Virtual Private Networks and Classic Virtual Privat...TELKOMNIKA JOURNAL
Multiprotocol Label Switching (MPLS) is effective in managing and utilizing available network bandwidth. It has advanced security features and a lower time delay. The existing literature has covered the performance of MPLS-based networks in relation to conventional Internet Protocol (IP) networks. But, too few literatures exist on the performance of MPLS-based Virtual Private Networks (VPN) in relation to traditional VPN networks. In this paper, a comparison is made between the effectiveness of the MPLS-VPN network and a classic VPN network using simulation studies done on OPNET®. The performance metrics used to carry out the comparison include; End to End Delay, Voice Packet Sent/Received and Label Switched Path’s Traffic. The simulation study was carried out with Voice over Internet Protocol (VoIP) as the test bed. The result of the study showed that MPLS-based VPN networks outperform classic VPN networks.
Key management in information centric networkingIJCNCJournal
Information centric networking (ICN) has been in the spotlight of recent research. It is an emerging
communication paradigm that relays on the concept of publish and subscribe. It aims to revise the current
Internet with a new clean slate architecture where the design is completely different from today’s location
based model. To secure the forwarding plan in this network, it is vital to have a time based transient
forwarding identifiers by periodically changing the network link identifiers. This assumes shared keys to be
distributed prior the communications between an entity termed topology manager (TM) and each forwarder
in the network. Exchanging and sharing a secret key between two parties is one of most critical functions in
cryptography that needs to be more concerned when integrating cryptographic functions into the system. As
ICN is brand new Internet architecture, many existing cryptography protocols may need to be redesigned
to fit this new architecture. Therefore, this paper focuses on the security aspect of ICN and proposes an
initial design to deploy the integrated Diffie-Hellman-DSA key exchange protocol as a key distributions
mechanism.
Load Balance in Data Center SDN Networks IJECEIAES
In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control a nd forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and forwarding planes. So, due to the rapid increase in the number of applications, websites, storage space, and some of the network resources are being underutilized due to static routing mechanisms. To overcome these limitations, a Software Defined Network based Openflow Data Center network architecture is used to obtain better performance parameters and implementing traffic load balancing function. The load balancing distributes the traffic requests over the connected servers, to diminish network congestions, and reduce un derutilization problem of servers. As a result, SDN is developed to afford more effective configuration, enhanced performance, and more flexibility to deal with huge network designs.
The document provides an overview of Janet Abbate's book "Inventing the Internet" which explores the history of the development of the Internet from 1959 to 1994. The book examines the social and cultural factors influencing the Internet's evolution from ARPANET to a global network. It analyzes how the Internet was shaped by collaboration and conflict between various players including government, military, computer scientists, and businesses. The author traces the technological development of the Internet and links it to organizational, social, and cultural changes during that period.
Congestion and Energy Aware Multipath Load Balancing Routing for LLNSIJCNCJournal
The Internet of Things (IoT) is presently in its golden era with its current technological evolution towards digital transformation. Low-power and Lossy Networks (LLNs) form the groundwork for IoT, where the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is designated by Internet Engineering Task Force as the benchmark protocol for routing. Although RPL, with its unique capabilities, has addressed many IoT routing requirements, Load balancing and Congestion control are the outliers. This paper builds on the RPL protocol and proposes a multipath Congestion and Energy Aware RPL (CEARPL) that alleviates the load balancing and congestion concerns associated with RPL and improves the network performance. For congestion avoidance, a Congestion and Energy Aware Objective Function (CEA-OF) is suggested during parent selection that considers multiple metrics like Child Count metric, Estimated Lifetime metric, and Queue Occupancy metric, to equally distribute the traffic in LLNs. The Queue Occupancy metric is used to detect congestion in the network, and a Multipath routing strategy is utilized to mitigate the congestion in the network. A comparison of the performance of CEA-RPL was made against the existing Objective Functions of RPL, OFO, and MRHOF, as well as COM-OF, utilizing Contiki OS 3.0's Cooja emulator. CEA-RPL projected superior results with power consumption lowering by 33%, end-to-end delay decreasing by 30%, queue loss ratio reducing by 49%, and packet receiving rate and network lifetime improving by 7% and 49%, on an average, respectively.
CONGESTION AND ENERGY AWARE MULTIPATH LOAD BALANCING ROUTING FOR LLNSIJCNCJournal
The Internet of Things (IoT) is presently in its golden era with its current technological evolution towards
digital transformation. Low-power and Lossy Networks (LLNs) form the groundwork for IoT, where the
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is designated by Internet Engineering
Task Force as the benchmark protocol for routing. Although RPL, with its unique capabilities, has
addressed many IoT routing requirements, Load balancing and Congestion control are the outliers. This
paper builds on the RPL protocol and proposes a multipath Congestion and Energy Aware RPL (CEARPL)
that alleviates the load balancing and congestion concerns associated with RPL and improves the network
performance. For congestion avoidance, a Congestion and Energy Aware Objective Function (CEA-OF) is
suggested during parent selection that considers multiple metrics like Child Count metric, Estimated
Lifetime metric, and Queue Occupancy metric, to equally distribute the traffic in LLNs. The Queue
Occupancy metric is used to detect congestion in the network, and a Multipath routing strategy is utilized
to mitigate the congestion in the network. A comparison of the performance of CEA-RPL was made against
the existing Objective Functions of RPL, OFO, and MRHOF, as well as COM-OF, utilizing Contiki OS
3.0's Cooja emulator. CEA-RPL projected superior results with power consumption lowering by 33%, endto-end delay decreasing by 30%, queue loss ratio reducing by 49%, and packet receiving rate and network
lifetime improving by 7% and 49%, on an average, respectively.
Efficient addressing schemes for internet of thingsIJECEIAES
The internet of things (IoT) defines the connectivity of physical devices to provide the machine to machine communication. This communication is achieved through various wireless standards for sensor node connectivity. The IoT calls from the formation of various wireless sensor nodes (WSNs) in a network. The existing neighborhood discovery method had the disadvantage of time complexity to calculate the cluster distance. Our proposed method rectifies this issue and gives accurate execution time. This paper proposed mobility management system based on proxy mobile IPv6 as distributed PMIPv6 with constrained application protocol (CoAP-DPMIP) and PMIPv6 with constrained application protocol (CoAP-PMIP). It also provides the optimized transmission path to reduce the delay handover in IoT network. The PMIPv6 described the IPv6 address of mobile sensor device for efficient mobility management. The network architecture explains three protocol layers of open systems interconnection model (OSI model). The OSI layers are data link layer, network layer and transport layer. We have proposed the distance estimation algorithm for efficient data frames transmission. This paper mainly focuses the secure data transmission with minimum loss of error. The evaluation result proved that proposed technique performance with delay, energy, throughput and packet delivery ratio (PDR). Also, it measures the computational time very effectively.
An Efficient Machine Learning Optimization Model for Route Establishment Mech...IJCNCJournal
Internet of Things (IoT) provides interconnection of various wireless communication devices, which offers both ubiquitous accessibility of devices and in-built intelligence capacity. IoT offers interaction with devices and provides sufficient capability advantages of networking and socialization with consideration of intermediate devices. RPL (Routing Protocol for low-power and Lossy Networks) is an attractive model for effective routing techniques in the wireless medium. The increase in demand for wireless systems in terms of energy, reliability, stability, and scale routing IPv6 over 6L0WPAN is being adopted. This research developed an optimized machine learning model (WOABC) routing protocol for route establishment in IoT networks. The constructed RPL routing protocol incorporates an optimization approach for the identification of the best and worst routes in the network. The proposed WOABC evaluates the routing path for data transmission between nodes through optimization techniques for effective route establishment. The optimization of routes is performed with whale optimization techniques. The developed whale optimization technique is incorporated in machine learning networks. Also, the proposed WOABC utilizes an optimization membership function for the identification of the optimal path in the network. The performance of the proposed WOABC is compared with existing techniques such as RPL and Speed – IoT. The comparative analysis showed that the performance of the proposed WOABC is ~3% increased throughput. The performance of the proposed WOABC is significant compared with the existing RPL routing protocol.
AN EFFICIENT MACHINE LEARNING OPTIMIZATION MODEL FOR ROUTE ESTABLISHMENT MECH...IJCNCJournal
Internet of Things (IoT) provides interconnection of various wireless communication devices, which offers
both ubiquitous accessibility of devices and in-built intelligence capacity. IoT offers interaction with
devices and provides sufficient capability advantages of networking and socialization with consideration of
intermediate devices. RPL (Routing Protocol for low-power and Lossy Networks) is an attractive model for
effective routing techniques in the wireless medium. The increase in demand for wireless systems in terms
of energy, reliability, stability, and scale routing IPv6 over 6L0WPAN is being adopted. This research
developed an optimized machine learning model (WOABC) routing protocol for route establishment in IoT
networks. The constructed RPL routing protocol incorporates an optimization approach for the
identification of the best and worst routes in the network. The proposed WOABC evaluates the routing path
for data transmission between nodes through optimization techniques for effective route establishment. The
optimization of routes is performed with whale optimization techniques. The developed whale optimization
technique is incorporated in machine learning networks. Also, the proposed WOABC utilizes an
optimization membership function for the identification of the optimal path in the network. The
performance of the proposed WOABC is compared with existing techniques such as RPL and Speed – IoT.
The comparative analysis showed that the performance of the proposed WOABC is ~3% increased
throughput. The performance of the proposed WOABC is significant compared with the existing RPL
routing protocol.
An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very interesting way out for providing Internet access to vehicles in the road. However, due to the several specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is to select the more reliable route to the mobile gateways, by reducing the communication overhead and performing seamless handover. The proposed protocol is compared with one recent protocol based on packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol ameliorates significantly the network performance in the contrast of the other protocol.
AN EFFICIENT MOBILE GATEWAY SELECTION AND DISCOVERY BASED-ROUTING PROTOCOL IN...IJCNCJournal
Coupling cellular communication networks with vehicular ad hoc networks (VANET) can be a very
interesting way out for providing Internet access to vehicles in the road. However, due to the several
specific characteristics of VANETs, making an efficient multi-hop routing from vehicular sources to the
Internet gateways through Long Term Evolution (LTE) technology is still challenging. In this paper, an
Internet mobile gateway selection scheme is proposed to elect more potential vehicles to behave as
gateways to Internet in VANETs. Therefore, the discovery and the selection of route to those mobiles
gateways is carried out via an efficient multiple metrics-based relay selection mechanism. The objective is
to select the more reliable route to the mobile gateways, by reducing the communication overhead and
performing seamless handover. The proposed protocol is compared with one recent protocol based on
packet delivery ratio, average end-to-end delay and overhead. The results show that the proposed protocol
ameliorates significantly the network performance in the contrast of the other protocol.
Multi port network ethernet performance improvement techniquesIJARIIT
An Ethernet has its own importance and space in network subsystem. In today’s resource-intensive engineering the
applications need to deal with the real-time data processing, server virtualization, and high-volume data transactions. The realtime
technologies such as video on demand and Voice over IP operations demand the network devices with efficient network
data processing as well as better networking bandwidth. The performance is the major issues with the multi-port network
devices. It requires the sufficient network bandwidth and CPU processing speed to process the real-time data at the context.
And this demand is goes on increasing. The new multi-port hardware technologies can help to improvements in the
performance of the virtualized server environments. But, these hardware technologies having their own limitations in terms of
CPU utilization levels and power consumption. It also impacts on latency and the overall system cost. This thesis will provide
the insights to some of the key configuration decisions at hardware as well as software designs in order to facilitate multi-port
network devices performance improvement over the existing infrastructure. This thesis will also discuss the solutions such as
Virtual LAN and balanced or symmetric network to reduce the cost and hardware dependency to improve the multi-port
network system performance significantly over the currently existing infrastructure. This performance improvement includes
CPU utilization and bandwidth in the heavy network loads.
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their
implementation has posed several challenges insofar that they generate and process vast amounts of
security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and
constrained devices communicating with each other and being accessed ubiquitously through lossy
networks. In this scenario, the routing of data is a specific area of concern especially with the inherent
constraints and limiting properties of such devices like processing resources, memory capacity and battery
life. To suit these constraints and to provide the required connectivity, the IETF has developed several
standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be
compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing
Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management
mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In
addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared
with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be
better
Trustbased Routing Metric for RPL Routing Protocol in the Internet of Things.pijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and
even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
Wireless ad-hoc mesh network is a special kind of network, where all of the nodes move in time. The topology of the network changes as the nodes are in the proximity of each other. Ad-hoc networks are generally self-configuring no stable infrastructure takes a place. In this network, each node should help relaying packets of neighboring nodes using multi-hop routing mechanism. This mechanism is needed to reach far destination nodes to solve problem of dead communication. This multiple traffic "hops" within a wireless mesh network caused dilemma. Wireless mesh network that contain multiple hops become increasingly vulnerable to problems such as energy degradation and rapid increasing of overhead packets. This paper provides a generic routing framework that balances energy efficient broadcast schemes in Wireless (Ad-Hoc) Mesh Network and maintaining connectivity of nodes (mobile terminals). Typically, each node’s activities will consume energy, either for sending packets, receiving or preparing/processing packets. Number of hops, distance of nodes, and size of packet will determine the consumption of energy. The framework is based on the principle that additional relay nodes with appropriate energy and routing metric between source and final destination significantly reduces the energy consumption necessary to deliver packets in Wireless (Ad-Hoc) Mesh Network while keep the connectivity of dynamic nodes. Using the framework, the average network connectivity is kept 18% higher and the lifetime of network lasting more than 2.38% compared with network with Link State Routing mechanism. The simulation notes that the end-to-end delay may increase rapidly if relay nodes are more than five.
Best strategy to control data on internet-of-robotic-things in heterogeneous ...IJECEIAES
1. The document proposes a new routing strategy called Routing Information and Distance Vector (RIDV) to improve data transmission in heterogeneous networks used for Internet of Robotic Things (IoRT) applications.
2. The RIDV strategy activates the Routing Information Protocol version 2 (RIPv2) on routers in wired networks and the Ad-hoc On-demand Distance Vector (AODV) protocol in wireless networks. It unifies their routing tables to reduce congestion.
3. Simulation results show that RIDV improved quality of service over other strategies and individual protocols by reducing data and traffic drop, queue delay, and increasing throughput.
A FUTURE MOBILE PACKET CORE NETWORK BASED ON IP-IN-IP PROTOCOLIJCNCJournal
The current Evolved Packet Core (EPC) 4th generation (4G) mobile network architecture features complicated control plane protocols and requires expensive equipment. Data delivery in the mobile packet core is performed based on a centralized mobility anchor between eNode B (eNB) elements and the network gateways. The mobility anchor is performed based on General Packet Radio Service tunnelling protocol (GTP), which has numerous drawbacks, including high tunnelling overhead and suboptimal routing between mobile devices on the same network. To address these challenges, here we describe new mobile core architecture for future mobile networks. The proposed scheme is based on IP encapsulated within IP (IP-in-IP) for mobility management and data delivery. In this scheme, the core network functions via layer 3 switching (L3S), and data delivery is implemented based on IP-in-IP routing, thus eliminating the GTP tunnelling protocol. For handover between eNB elements located near to one another, we propose the creation of a tunnel that maintains data delivery to mobile devices until the new eNB element updates the route with the gateway, which prevents data packet loss during handover. For this, we propose Generic Routing Encapsulation (GRE) tunnelling protocol. We describe the results of numerical analyses and simulation results showing that the proposed network core architecture provides superior performance compared with the current 4G architecture in terms of handover delay, tunnelling overhead and total transmission delay.
Peer-to-Peer Architecture Case Study Gnutella NetworkMate.docxherbertwilson5999
Peer-to-Peer Architecture Case Study: Gnutella Network
Matei Ripeanu
Computer Science Department,
The University of Chicago
[email protected]
Abstract
Despite recent excitement generated by the P2P
paradigm and despite surprisingly fast deployment of
some P2P applications, there are few quantitative
evaluations of P2P systems behavior. Due to its open
architecture and achieved scale, Gnutella is an
interesting P2P architecture case study. Gnutella, like
most other P2P applications, builds at the application
level a virtual network with its own routing mechanisms.
The topology of this overlay network and the routing
mechanisms used have a significant influence on
application properties such as performance, reliability,
and scalability. We built a ‘crawler’ to extract the
topology of Gnutella’s application level network, we
analyze the topology graph and evaluate generated
network traffic. We find that although Gnutella is not a
pure power-law network, its current configuration has the
benefits and drawbacks of a power-law structure. These
findings lead us to propose changes to Gnutella protocol
and implementations that bring significant performance
and scalability improvements.
1. Introduction
Peer-to-peer systems (P2P) have emerged as a
significant social and technical phenomenon over the last
year. P2P systems provide infrastructure for communities
that share CPU cycles (e.g., Entropia, [email protected])
and/or, storage space (e.g., FreeNet, Gnutella), or that
support interpersonal collaborative environments. Two
factors have fostered the recent explosive growth of such
systems: first, the low cost and high availability of huge
computing and storage resources, and second, increased
network connectivity. As these trends continue, the P2P
paradigm can be expected to become more popular.
Peer-to-peer networks allow individual computers to
communicate directly with each other and to share
information and resources without using specialized
‘servers’. A common characteristic of this new breed of
applications is that they build, at the application level, a
virtual network with its own routing mechanisms. The
topology of this virtual network and the routing
mechanisms used have a significant influence on
application properties such as performance, reliability,
and, in some cases, anonymity. The virtual topology also
determines the communication costs incurred when
running the P2P application.
These considerations have motivated us to conduct a
detailed study of the topology and protocol of a popular
P2P system, Gnutella. In this study, we benefited from
Gnutella’s large existing user base and open architecture,
and, in effect, use the public Gnutella network as a large-
scale, if uncontrolled, testbed. We capture the network
topology, the generated traffic, and the resources’
dynamic behavior. We use our findings to evaluate costs
and benefits of the P2P approach and to investigate
possible improvements to the routing protocol that would
a.
Abstract— Internet of things (IoT) is a new networks paradigm,
that billions of internet things can be connected at anytime and
anyplace, and it’s expected to include billions of smart devices,
these devices characterized by small memory, low transfer rate
and low energy, internet protocol version 6 (IPv6) it was
introduced to offer huge address space, however it doesn’t
compatible with capabilities of the constrained device, therefore
IPv6 over low power Wireless Personal Area network
(6LoWPAN) adaptation layer was introduced to carry IPv6
datagram over constrained links, in this paper, we first provide
intensive analysis of 6LoWPAN specifications that includes IPv6
encapsulation, frame format, 6LoWPAN header compression,
fragmentation of the payload datagram and encoding of user
datagram protocol UDP, in addition to the implementation of the
6LoWPAN in the NS-3 using different payload size, then we
evaluate the following metrics throughput, packets loss, delay
and jitter, the results showed that the fragmentation effects the
network throughput and increase the delay and the number of
lost packets, moreover, when payload fit within a single frame the
network show better performance , there are no packets lost as
well as minimum values of the delay and the jitter, and in the
two cases 6LoWPAN shows reasonable packets delivery ratio.
This whitepaper gives a general overview of traditional IPv4 route selection and the challenges posed by the dynamics of the R&E community. Through a comparison with the commercial world, the authors illustrate the current problem and propose several solutions to mitigate the issues.
The document discusses networking concepts such as network topologies, devices, and the OSI model. It begins by explaining how businesses realized networking could increase productivity and save costs. It then describes common networking devices like NICs, hubs, switches, and routers. The document also covers standard network topologies and the layers of the OSI model, providing examples of how data is encapsulated as it travels through each layer.
Disadvantages And Disadvantages Of Wireless Networked And...Kimberly Jones
The document describes an implementation of the Bellman-Ford algorithm to find the shortest path routing from node U in a provided network diagram. The program outputs the routing table for node U after each iteration, showing the destination and number of hops. It runs for V-1 iterations, where V is the total number of vertices. The algorithm uses a relaxation formula to calculate the shortest path between each edge iteratively. By the final iteration, the optimal shortest paths from the source node U to all other nodes are determined. A Word document with screenshots explains how the program incorporates the Bellman-Ford algorithm and determines when the routing table is optimal.
Similar to CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION (20)
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
1. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 2, April 2013
DOI : 10.5121/cseij.2013.3202 23
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK
AGGREGATION
Rafiullah Khan1
andShaukat Ali2
1
Institute of Business and Management Science,TheUniversity of Agriculture Peshawar,
Pakistan
rafiyz@gmail.com
2
FG Degree College Peshawar Cantt, KPK, Pakistan Peshawar, Pakistan
shoonikhan@gmail.com
ABSTRACT
This is era of information blast. A huge quantity of information is pouring in from various sources. The
revolutionary advancement of Information and Communication technologies bring the world close
together.A pile of information in different formats is just a click away. Which motivate the organizations to
get more internet bandwidth to consume and publish theinformationoverexploding cloudof Internet. The
standard router redundancyprotocolis used to handle backup link showever it cannot aggregate
them.Whereas thelink standard aggregation protocol can aggregate the link but it support only Ethernet
technology.In this researchpaper a concept of Redundant Link Aggregation (RLA)is proposed. RLA can
aggregate and handle backup links with main links regardless of carriertechnology. Furthermore a
dataforwardingmechanism Odd Load Balancing (OLB) is also proposed for RLA scheme. For the sake of
performance evaluation, Redundant Link Aggregation (RLA) is compared with Virtual Router Redundancy
Protocol (VRRP). The simulation result reveals that Redundant Link Aggregation (RLA) can cover the
bandwidth demand of the network in peak hours by consuming backup links as well which with Virtual
Router Redundancy Protocol (VRRP)cannot.It is further noted thatOdd Load Balancing (OLB) feature can
be used to save the cost in terms of money per annum.
1. INTRODUCTION
The recent advancement in Information and Communication Technologies has shrunk the World.
A new term of Global Village is now adopted, thanks to the instant information sharing property
of electronic media. The ease in data publishing facilitate the organizations to unleash their data,
due to which Internet became the mammoth of information. In February 2013 “WWW Size”
website reported 13.02 billion indexed webpages1. Today’s web is completely different from
early web. Early web was created to transfer the textual data; however today almost all data
publishers publishes multimedia and data of other services as well. The access and exploitation of
this data requires high bandwidth connectivity with Internet. The need of higher bandwidth
connectivity is also compulsory for publishing the multimedia data and Voice or Video
communication.
1
http://www.worldwidewebsize.com
2. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 2, April 2013
24
The need of more bandwidth is not new a thing. Many organizations of developed countries
predict the future need, and start research for increasing bandwidth at different levels of network.
In this regard notable contribution was development of Integrated Services Digital Network
(ISDN) in 1988 [1]. The idea behind the ISDN was to combine different number of telephone
lines in order to get more bandwidth and meet the user demand. For instance two mechanisms are
available for increasing the bandwidth; at Data link Layer Port Aggregation and at network Layer
Redundancy Protocols. For both the solutions Standard protocols are available however both the
solutions have certain limitations.
In the next section the evaluation process and limitations of these solutions are discussed in detail.
After that new concept of Redundant Links Aggregation is discussed in detail with its
performance comparison with standard Virtual Router Redundancy Protocol (VRRP).
2. RELATED WORK
As mentioned earlier first ever effort made in 1988 as ISDN however ISDN was a full fledge
system and was Wide Area Network Technology However in Local Area Network (LAN) and
especiallyat the Access and Distribution layer of the Network design, first effort was made by
KALPANA during 1990[2].KALPANA proposed and implementedthe concept of Link
Aggregation which is then acquired by Cisco in 1994. Cisco implement this concept with the
name of EtherChannel[3]. Cisco also develop Port Aggregation Protocol (PAgP) which is used to
handle the EtherChannel.This concept was proposed for purely for Ethernet technology.
The standardization process of Link Aggregation start in November 1997[4]. In 2000, IEEE
802.3ad group releases first version of standard protocol for Link Aggregation called Link
Aggregation Control Protocol (LACP) [5]. Before that most venders provide their proprietary
solution for aggregation capability. The IEEE 802.3 ad standard is revisited in 2008 and
according to the suggestions of David Law the Link Aggregation standard is formally transferred
under the umbrella of 802.1 as its sub-standard.Its identity is also changed as 802.1 AX-2008
[6][7]. IEEE describe Link aggregation as the method of using multiple Ethernet links or ports in
parallel in order to increase the link bandwidth beyond the limits of any single link or port in
Ethernet Technology[8].
Link Aggregation gives solutions for two problems related to Ethernet LAN Technology;
Bandwidth limitation and redundancy in connections[9]. As the Ethernet bandwidths increases
ten times by each previous bandwidth, so increase bandwidth upgrading of the equipment. The
upgrading of equipment also require new media technology which consequently increase the
budget. To solve this problem Link Aggregation is cost effective and appropriate solution.
According to Link Aggregation Protocol user can bundle two or four or six or eight links together
use it as single logical link[9]. However the bigger problems related to this solution are its
technology dependency (as this solution was given for Ethernet) and Strict rules of combination.
The rules LACP Link Aggregation includes: the number of participant links must even in
number, the participant link must be of same type and bandwidth and number of link must not be
exceeded from sixteen[10].
At Network layer another solutionfor increasing of bandwidth is available in form of Redundancy
protocols. Redundancy protocols are used in those scenarios where more than one gateways
(Internet Uplinks) are available. These protocols takes primary and backup gateways from the
3. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 2, April 2013
25
user and use primary link for sending all traffic while the backup links remain inactive. If the
primary link goes down by any mean, the backup link becomes active[9].
Cisco systems is the pioneer of Redundancy protocol. In 1998 Cisco release Hot Standby Router
Protocol (HSRP)their firstproprietary Redundancy Protocol[11].In the same year IETF release
RFC 2338 which define Virtual Router Redundancy Protocol (VRRP) a proposed standard [12].
Then IETF release draft standard of VRRPduring 2004 in their RFC 3768[13] and in 2010 IETF
release RFC 5798 which is current standard of Redundancy protocol[14].
Like Link Aggregation, Redundancy protocols do not have strict rules like even number of links,
same type and bandwidth of links, however it do not combine links. Theytreat all the links as
separate links. The issue related with this type of protocols are their inactive secondary links.
Their primary links are always active while secondary links remain inactive and provide standby
facility to the network. Cisco provide load balancing facility in Gateway Load Balancing Protocol
(GLBP) their new proprietary protocol.This protocol provide three types of load balancing Host-
Dependent, Round Robin and Weighted[15].In this competition GLBP fails due to its property of
proprietary standard.
In short a mechanism is needed to take benefit from the redundant active links with no restriction
of even number of links, technologicaldependency,participants with same propertiesand the
solution must be cost effective. Furthermore that mechanism must also handle the gateways
according to the cost in case of volume based charges.
3. CONCEPTUAL FRAMEWORK OF REDUNDANT LINKS AGGREGATION
In this research new concept of Redundant LinksAggregation(RLA) is proposed.RLA will
provide luxury to the user to Aggregate or bundle links of different data carrier technologies
together with no restrictions of even number of participant. These technologies can be of different
nature including Local and Wide Area Network Technologies.It will alsofacilitate theuser to
aggregate links with different bandwidth and forward the traffic according to the cost of link.
The Redundant Links Aggregation (RLA)system is divided into two core modules,the Link
Control Module (LCM) and the Data Forwarding Module (DFM). Link Control Module (LCM)
will be used to handle the links while Data ForwardingModule will be responsible forwarding the
outgoing trafficusing different techniques.
4. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 2, April 2013
26
Figure 1. Framework of Redundant Link Aggregation
3.1 Link Control Module
The LCM will take aggregation parameters from the user. The aggregation parameters include
Aggregation Group, Priority of the Link in a Groupand Cost of the Link. Aggregation Group
parameter will be necessary, this will help the device to maintain multiple groups on a single
device.Priority of the link will facilitate the user to set primary, secondary or tertiary link of the
bundle.The cost parameter will be used in the Weighted Fair Queuing (WFQ) technique.
3.2Data Forwarding Module
After setting parametersof the aggregated bundle Data Forwarding Module will be used to
forward the traffic over the links. This module will provide different techniques traffic forwarding
including Round Robin, Weighted Fair Queue (WFQ) and Odd Load Balance.The user will get
the freedom of choosing the forwarding mechanismaccording to the need.
In Round Robin fashion all the incoming traffic will be distributed across all the links in the
bundle.This mechanism is good for the load distribution between the nodes having same
bandwidth and type. However it also introduces the problem of out of order PDU (Protocol Data
Unit) at the receiving system. This mechanism is good for short lived connections. However for
long lived connections like Stream TCP connections and Multicast type of environment this
mechanism is not suitable due to out of order PDU transmission[16].In Weighted Fair Queue
(WFQ) technique the data will be distributed across all the links in the bundle according to the
cost of the link.
The recommended method for the Redundant Links Aggregation is Odd Load Balance (OLB). In
OLB technique, primary link will be active for any type of traffic. Once the traffic exceeds from
threshold value of the buffer of the link, the secondary link will become active to aid primary
link.If the traffic also exceeds from the threshold value of secondary link, next lower priority link
5. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 2, April 2013
27
will become active to aid previous two links. The process of deactivation of link is same like the
process of activation of link in reverse order. When the traffic become low to the extent that high
priority links can handle them then the low priority link will become deactivated.
3.3 Suggested Algorithm for Odd Load Balancing
The process of activation of link means filling of the link buffer with forwarding data. Although
the links are up continuously but their buffer will be filled by forwarding data according to the
load and weight of the link defined by the user.
The suggested algorithm for Odd load balancing is as follows:
While (Continue)
{
z = 0;
for ( i = 1; i ≤ n; i + +)
{
z = z + + ;
if ( B [z] ≤ T[z])
Break ;
}
Send data to B [z]
}
There are three variables “z”, “n” and “i" are used in the algorithm. “z” is used to access the array
contents. “n” shows total number of links in a group, and “i” is used in a loop. Two Arrays
“B[z]” and “T[z]” are also used which contains the value of current buffer size of all participated
links and the threshold values of the buffers of all the participated links respectively.
The algorithm starts from continues WHILE loop, then z variable is initialized with zero. After
that there is an FOR loop which checks wither i (the next variable) exceeds number of link or not.
If the condition is true it will go further. In the body of the FOR loop there is an increment
statement which will increment z, then the buffer of z link will check against the threshold value
of z link. If condition is true means the buffer is not full so the loop will break and the data will
be sent to buffer z. if the condition is not true the FOR loop will continue and will compare next
link buffer with its own threshold. The flow of this algorithm is shown in figure 2.
6. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 2, April 2013
28
Figure2. Flow Chart of Odd Load Balancing Algorithm.
4. SIMULATION RESULTS
To evaluate the performance, Redundant Links Aggregation (RLA) is compared with Virtual
Router Redundancy Protocol (VRRP). Two scenarios from the real world have been selected and
both the mechanisms are tested against the demand of the network.
In first scenario 24 hours internet traffic of a university is taken. The available number of Internet
connections is two i.e. 64Mbps and 32Mbps. The link of 64Mbps is used as primary link while
link having 32Mbps will be used as backup link. Odd Load Balancing mechanism is used in
Redundant Links Aggregation scheme.
In second scenario 24 hours internet traffic of another university is taken. The number of
available connections in second scenario is three which includes two connections of 16Mbps and
one connection of 4Mbps. 4Mbpsconnectionsis taken as primary connection according to the cost,
while both16 Mbps connections are taken as secondary and tertiary. Odd Load Balancing
mechanism is also taken for Redundant Links Aggregation scheme.
In both the graphs the demanded bandwidth is plotted against the supplied bandwidth. Orange
line in the graph shows the demanded bandwidth of the network while the light blue area and
green line shows theshows the supplied bandwidth of VRRP and RLA respectively.
4.1 Scenario 1
The result of first scenario shows that VRRP failed to satisfy demand of the network at peak
hours. 1000 hours to 1600 hoursis the peak time of the network. At that time the demanded
bandwidth is higher than 64Mbps while VRRP provides 64Mbps. However if we the RLA
Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 2, April 2013
28
Figure2. Flow Chart of Odd Load Balancing Algorithm.
4. SIMULATION RESULTS
To evaluate the performance, Redundant Links Aggregation (RLA) is compared with Virtual
Router Redundancy Protocol (VRRP). Two scenarios from the real world have been selected and
both the mechanisms are tested against the demand of the network.
In first scenario 24 hours internet traffic of a university is taken. The available number of Internet
connections is two i.e. 64Mbps and 32Mbps. The link of 64Mbps is used as primary link while
link having 32Mbps will be used as backup link. Odd Load Balancing mechanism is used in
Redundant Links Aggregation scheme.
In second scenario 24 hours internet traffic of another university is taken. The number of
available connections in second scenario is three which includes two connections of 16Mbps and
one connection of 4Mbps. 4Mbpsconnectionsis taken as primary connection according to the cost,
while both16 Mbps connections are taken as secondary and tertiary. Odd Load Balancing
mechanism is also taken for Redundant Links Aggregation scheme.
In both the graphs the demanded bandwidth is plotted against the supplied bandwidth. Orange
line in the graph shows the demanded bandwidth of the network while the light blue area and
green line shows theshows the supplied bandwidth of VRRP and RLA respectively.
4.1 Scenario 1
The result of first scenario shows that VRRP failed to satisfy demand of the network at peak
hours. 1000 hours to 1600 hoursis the peak time of the network. At that time the demanded
bandwidth is higher than 64Mbps while VRRP provides 64Mbps. However if we the RLA
Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 2, April 2013
28
Figure2. Flow Chart of Odd Load Balancing Algorithm.
4. SIMULATION RESULTS
To evaluate the performance, Redundant Links Aggregation (RLA) is compared with Virtual
Router Redundancy Protocol (VRRP). Two scenarios from the real world have been selected and
both the mechanisms are tested against the demand of the network.
In first scenario 24 hours internet traffic of a university is taken. The available number of Internet
connections is two i.e. 64Mbps and 32Mbps. The link of 64Mbps is used as primary link while
link having 32Mbps will be used as backup link. Odd Load Balancing mechanism is used in
Redundant Links Aggregation scheme.
In second scenario 24 hours internet traffic of another university is taken. The number of
available connections in second scenario is three which includes two connections of 16Mbps and
one connection of 4Mbps. 4Mbpsconnectionsis taken as primary connection according to the cost,
while both16 Mbps connections are taken as secondary and tertiary. Odd Load Balancing
mechanism is also taken for Redundant Links Aggregation scheme.
In both the graphs the demanded bandwidth is plotted against the supplied bandwidth. Orange
line in the graph shows the demanded bandwidth of the network while the light blue area and
green line shows theshows the supplied bandwidth of VRRP and RLA respectively.
4.1 Scenario 1
The result of first scenario shows that VRRP failed to satisfy demand of the network at peak
hours. 1000 hours to 1600 hoursis the peak time of the network. At that time the demanded
bandwidth is higher than 64Mbps while VRRP provides 64Mbps. However if we the RLA
7. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 2, April 2013
29
reaction in peak hours, its supply varies according to the demand. The maximum supplied
bandwidth of RLA in that case is 96Mbps. As shown in figure 3.
Figure 3. Scenario 1
4.2 Scenario 2
The second scenario tested in terms of cost effectiveness.The peak time of this network is
between 1030 hours to 1600 hours.In peak hours RLA works in three levels. When
demandexceeded from4Mbps, RLA open the secondary pathto aid the primary link. At 1000
hours and1600 hours when demand exceededfrom 20Mbps, RLA open the tertiary path as well
which gives maximum bandwidth 36Mbps. However throughout the simulation VRRP provided a
constant bandwidth of 16Mbps.
0
20
40
60
80
100
120
0:00
0:55
1:50
2:45
3:40
4:35
5:30
6:25
7:20
8:15
9:10
10:05
11:00
11:55
12:50
13:45
14:40
15:35
16:30
17:25
18:20
19:15
20:10
21:05
22:00
22:55
23:50
BANDWIDTH
TIME
VRRP Demand RLA
8. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 2, April 2013
30
Graph. 2 Scenario 2
5. CONCLUSIONS
In overall, the outcome of this research came to prove that the new suggested Redundant Link
Aggregation (RLA) scheme performance in the peak hours is batter then standard router
redundancy protocol. Iteffectively make use of backup link which are remain idle while using the
standard router redundancy protocol.The feature of adjusting the bandwidth according to the
demand of the network makes it more effective in terms of cost. The Odd Load Balancing
mechanism can be further configured according to the cost of the network. More economical
connectionas primary link while less economical as secondary link. Which help the organization
to save a notable sum of money per annum.
The work over Quality of Service of Redundant Link Aggregation should also be carried out in
order to improve Quality of Service (QoS) for special protocols and services like Voice over IP,
Video over IP, Multicast streaming Data and other Real time protocols.
REFERENCES
[1] M. Decina and E. Scace, "CCITT Recommendations on the ISDN: A Review," Selected Areas in
Communications, IEEE Journal on, vol. 4, pp. 320-325, 1986.
[2] C. Balakrishnan and M. Manikandan, "Link Aggregation Models and Services," International
Journal of Science, Engineering and Technology Research, vol. 2, pp. pp: 038-042, 2013.
[3] O. Spatscheck, "Layers of Success," Internet Computing, IEEE, vol. 17, pp. 3-6, 2013.
[4] R. M. Wyatt, "Link aggregation," Google Patents, 2004.
[5] T. Wegmann and M. Gilmore, "IEEE 802.3 Ethernet Working Group," 2007.
[6] T. Kojima, M. Kanada, N. Inomata, and K. Kikuchi, "Communication apparatus, communication
method, and computer program for LACP," EP Patent 2,362,588, 2011.
[7] D. Law, "IEEE 802.3 Maintenance," PDF, 2006.
0
5
10
15
20
25
30
35
40
45
0:00
0:50
1:40
2:30
3:20
4:10
5:00
5:50
BANDWIDTH
Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 2, April 2013
30
Graph. 2 Scenario 2
5. CONCLUSIONS
In overall, the outcome of this research came to prove that the new suggested Redundant Link
Aggregation (RLA) scheme performance in the peak hours is batter then standard router
redundancy protocol. Iteffectively make use of backup link which are remain idle while using the
standard router redundancy protocol.The feature of adjusting the bandwidth according to the
demand of the network makes it more effective in terms of cost. The Odd Load Balancing
mechanism can be further configured according to the cost of the network. More economical
connectionas primary link while less economical as secondary link. Which help the organization
to save a notable sum of money per annum.
The work over Quality of Service of Redundant Link Aggregation should also be carried out in
order to improve Quality of Service (QoS) for special protocols and services like Voice over IP,
Video over IP, Multicast streaming Data and other Real time protocols.
REFERENCES
[1] M. Decina and E. Scace, "CCITT Recommendations on the ISDN: A Review," Selected Areas in
Communications, IEEE Journal on, vol. 4, pp. 320-325, 1986.
[2] C. Balakrishnan and M. Manikandan, "Link Aggregation Models and Services," International
Journal of Science, Engineering and Technology Research, vol. 2, pp. pp: 038-042, 2013.
[3] O. Spatscheck, "Layers of Success," Internet Computing, IEEE, vol. 17, pp. 3-6, 2013.
[4] R. M. Wyatt, "Link aggregation," Google Patents, 2004.
[5] T. Wegmann and M. Gilmore, "IEEE 802.3 Ethernet Working Group," 2007.
[6] T. Kojima, M. Kanada, N. Inomata, and K. Kikuchi, "Communication apparatus, communication
method, and computer program for LACP," EP Patent 2,362,588, 2011.
[7] D. Law, "IEEE 802.3 Maintenance," PDF, 2006.
5:50
6:40
7:30
8:20
9:10
10:00
10:50
11:40
12:30
13:20
14:10
15:00
15:50
16:40
17:30
18:20
19:10
20:00
20:50
21:40
TIME
VRRP Demand RLA
Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 2, April 2013
30
Graph. 2 Scenario 2
5. CONCLUSIONS
In overall, the outcome of this research came to prove that the new suggested Redundant Link
Aggregation (RLA) scheme performance in the peak hours is batter then standard router
redundancy protocol. Iteffectively make use of backup link which are remain idle while using the
standard router redundancy protocol.The feature of adjusting the bandwidth according to the
demand of the network makes it more effective in terms of cost. The Odd Load Balancing
mechanism can be further configured according to the cost of the network. More economical
connectionas primary link while less economical as secondary link. Which help the organization
to save a notable sum of money per annum.
The work over Quality of Service of Redundant Link Aggregation should also be carried out in
order to improve Quality of Service (QoS) for special protocols and services like Voice over IP,
Video over IP, Multicast streaming Data and other Real time protocols.
REFERENCES
[1] M. Decina and E. Scace, "CCITT Recommendations on the ISDN: A Review," Selected Areas in
Communications, IEEE Journal on, vol. 4, pp. 320-325, 1986.
[2] C. Balakrishnan and M. Manikandan, "Link Aggregation Models and Services," International
Journal of Science, Engineering and Technology Research, vol. 2, pp. pp: 038-042, 2013.
[3] O. Spatscheck, "Layers of Success," Internet Computing, IEEE, vol. 17, pp. 3-6, 2013.
[4] R. M. Wyatt, "Link aggregation," Google Patents, 2004.
[5] T. Wegmann and M. Gilmore, "IEEE 802.3 Ethernet Working Group," 2007.
[6] T. Kojima, M. Kanada, N. Inomata, and K. Kikuchi, "Communication apparatus, communication
method, and computer program for LACP," EP Patent 2,362,588, 2011.
[7] D. Law, "IEEE 802.3 Maintenance," PDF, 2006.
21:40
22:30
23:20
9. Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 2, April 2013
31
[8] S.-M. Cho, "Ethernet communication apparatus, bridge thereof and connection device," U.S.
Patent Application 10/339,566, 2003.
[9] D. Hucaby, CCNP BCMSN exam certification guide: CCNP self-study: Cisco Systems, 2004.
[10] D. Hucaby, CCNP switch 642-813 official certification guide: Cisco Press, 2010.
[11] D. Li, P. Morton, T. Li, and B. Cole, "Cisco hot standby router protocol (HSRP)," 1998.
[12] S. Knight, D. Weaver, D. Whipple, R. Hinden, D. Mitzel, P. Hunt, P. Higginson, M. Shand, and
A. Lindem, "Virtual router redundancy protocol," RFC2338, April, 1998.
[13] R. Hinden, "Virtual router redundancy protocol (VRRP)," 2004.
[14] S. Nadas, "Virtual Router Redundancy Protocol (VRRP) Version 3 for IPv4 and IPv6," 2010.
[15] T. J. Nosella and I. H. Wilson, "Gateway load balancing protocol," Google Patents, 2011.
[16] C. Klonowski, H. J. Seeger, J. Kim, S. G. Bueno, and K. W. Jeong, AIX Version 4.3 to 5L
Migration Guide: IBM, International Technical Support Organization, 2003.
AUTHORS
Mr Rafiullah Khan, Lecturer Institute of Business and Management Sciences (IBMS),
The University of Agriculture Peshawar Pakistan received his BS (Hons) degree from
University of Peshawar in 2007 and MS degree in Information Technology from the
Institute of Management Science (IM|Sciences) Peshawar, Pakistan in 2010. Currently,
he is perusing Ph.D program in the Department of Computer Science of the University of
Peshawar. His fields of specialization are Semantic Web and Computer Based
Communication Networks.
Mr Shaukat Ali, Assistant Professor, FG Degree College Peshawar Cantt, KPK,
Pakistanreceived M.Sc degree in computer science from University of Peshawar, KPK,
Pakistan in 2002, and the MS degree in Information Technology from the same
university in 2007. Currently, he is perusing Ph.D program in the Department of
Computer Science of the above mentioned university. His fields of specialization are
Semantic Web and Computer Based Communication Networks. He has authored 5
research papers, published in internationalJournals and presented in international
conferences.