The router is an important component in NoC as it provides routes for the communication between different cores. A router
consists of registers, switches, arbitration and control logic that collectively implement the routing and flow control function required to
buffer and forward flits to their destination. This router will be implemented on FPGA using Spartan-3 kit. This paper describes the internal blocks of a junction based router and there operation.
Internal Architecture of Junction Based Router Editor IJCATR
The router is an important component in NoC as it provides routes for the communication between different cores. A router consists of registers, switches, arbitration and control logic that collectively implement the routing and flow control function required to buffer and forward flits to their destination. This router will be implemented on FPGA using Spartan-3 kit. This paper describes the internal blocks of a junction based router and there operation.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...theijes
In modern network communications, Routing protocols are getting an important function for the user data path that are responsible for controlling the routers to communicate together and forward packets by routers over the best trip path from a base node to a destination one. Dynamic routing protocols represented by RIP, OSPF and EIGRP are explained here for addressing various networks with different traffic environments. In this paper, the performance of these protocols are estimating with many factors like convergence activity and duration, average throughput, network end-to-end delay, Point-to-Point Utilization over the simulation based on OPNET academic version. From Simulation results, EIGRP have a fastest time convergence compared with other topologies of networks are confirmed and the OSPF has the highest Point-to-Point Utilization in the network followed by EIGRP then RIP. So, there is an attempt for finding out which protocols are suitable for the networks and from analyses to understand the role of the routing protocols in different network scenarios
Highlighted notes while studying Advanced Computer Networks:
Routing table
Source: Wikipedia
In computer networking a routing table, or routing information base (RIB), is a data table stored in a router or a network host that lists the routes to particular network destinations, and in some cases, metrics (distances) associated with those routes. The routing table contains information about the topology of the network immediately around it.
Wikipedia is a free online encyclopedia, created and edited by volunteers around the world and hosted by the Wikimedia Foundation.
The document discusses the key aspects of the Internet Protocol (IP) including its connectionless delivery service, packet format and processing by routers. IP provides end-to-end delivery of packets across interconnected networks, with each packet containing a header for routing. Routers examine packet headers to forward packets via the best path towards the destination based on routing tables. IP itself provides a best-effort delivery service, while higher level protocols implement reliable connections.
IPv4 is the fourth version of the Internet Protocol (IP) and the first widely deployed. It uses 32-bit addresses and supports three addressing modes: unicast, broadcast, and multicast. IPv4 addresses are hierarchical and contain network and host identification information. Subnet masks are used to distinguish the network and host portions of an IPv4 address. There are five classes of IPv4 addresses - A, B, C, D and E - designed for different sized networks.
Routing protocols exchange information to determine the best paths between sources and destinations in a network. The document discusses several routing protocols:
Distance vector protocols like RIP propagate routing tables between routers periodically. They are simple to configure but slow to converge. Link state protocols like OSPF use link state advertisements to build a map of the network and calculate the lowest cost paths more quickly. OSPF divides large networks into areas to reduce routing table sizes and convergence times. It elects routers on area borders to aggregate routing information between areas.
The document discusses the network layer and routing algorithms. It begins by defining the network layer and its responsibilities like routing packets across networks using logical addressing. It then discusses network layer design issues such as store-and-forward packet switching and services provided to the transport layer. Implementation of connectionless and connection-oriented services are explained along with a comparison of virtual-circuit and datagram networks. Finally, it covers routing algorithms like flooding and distance vector routing where routers maintain routing tables and exchange information with neighbors.
Internal Architecture of Junction Based Router Editor IJCATR
The router is an important component in NoC as it provides routes for the communication between different cores. A router consists of registers, switches, arbitration and control logic that collectively implement the routing and flow control function required to buffer and forward flits to their destination. This router will be implemented on FPGA using Spartan-3 kit. This paper describes the internal blocks of a junction based router and there operation.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...theijes
In modern network communications, Routing protocols are getting an important function for the user data path that are responsible for controlling the routers to communicate together and forward packets by routers over the best trip path from a base node to a destination one. Dynamic routing protocols represented by RIP, OSPF and EIGRP are explained here for addressing various networks with different traffic environments. In this paper, the performance of these protocols are estimating with many factors like convergence activity and duration, average throughput, network end-to-end delay, Point-to-Point Utilization over the simulation based on OPNET academic version. From Simulation results, EIGRP have a fastest time convergence compared with other topologies of networks are confirmed and the OSPF has the highest Point-to-Point Utilization in the network followed by EIGRP then RIP. So, there is an attempt for finding out which protocols are suitable for the networks and from analyses to understand the role of the routing protocols in different network scenarios
Highlighted notes while studying Advanced Computer Networks:
Routing table
Source: Wikipedia
In computer networking a routing table, or routing information base (RIB), is a data table stored in a router or a network host that lists the routes to particular network destinations, and in some cases, metrics (distances) associated with those routes. The routing table contains information about the topology of the network immediately around it.
Wikipedia is a free online encyclopedia, created and edited by volunteers around the world and hosted by the Wikimedia Foundation.
The document discusses the key aspects of the Internet Protocol (IP) including its connectionless delivery service, packet format and processing by routers. IP provides end-to-end delivery of packets across interconnected networks, with each packet containing a header for routing. Routers examine packet headers to forward packets via the best path towards the destination based on routing tables. IP itself provides a best-effort delivery service, while higher level protocols implement reliable connections.
IPv4 is the fourth version of the Internet Protocol (IP) and the first widely deployed. It uses 32-bit addresses and supports three addressing modes: unicast, broadcast, and multicast. IPv4 addresses are hierarchical and contain network and host identification information. Subnet masks are used to distinguish the network and host portions of an IPv4 address. There are five classes of IPv4 addresses - A, B, C, D and E - designed for different sized networks.
Routing protocols exchange information to determine the best paths between sources and destinations in a network. The document discusses several routing protocols:
Distance vector protocols like RIP propagate routing tables between routers periodically. They are simple to configure but slow to converge. Link state protocols like OSPF use link state advertisements to build a map of the network and calculate the lowest cost paths more quickly. OSPF divides large networks into areas to reduce routing table sizes and convergence times. It elects routers on area borders to aggregate routing information between areas.
The document discusses the network layer and routing algorithms. It begins by defining the network layer and its responsibilities like routing packets across networks using logical addressing. It then discusses network layer design issues such as store-and-forward packet switching and services provided to the transport layer. Implementation of connectionless and connection-oriented services are explained along with a comparison of virtual-circuit and datagram networks. Finally, it covers routing algorithms like flooding and distance vector routing where routers maintain routing tables and exchange information with neighbors.
The network layer is responsible for packet forwarding including routing through intermediate routers. It controls the operation of the subnet and decides which physical path data takes. Routing is the process of moving packets from source to destination, usually performed by routers. Internetworking connects different network technologies like LANs and WANs using devices like routers. The network layer uses IP addressing to identify devices and enable routing. Private IP addresses identify internal devices while public addresses provide external internet access.
IPv6 is the latest version of the Internet Protocol that provides identification and location for computers on networks. It was developed to address the problem of IPv4 address exhaustion, as IPv4 addresses were running out. IPv6 is intended to eventually replace IPv4 and provides a vastly larger 128-bit address space compared to IPv4's 32-bit addresses. Key features of IPv6 include new header format, large address space, built-in security, prioritized traffic delivery, autoconfiguration, and mobility support.
Difference between Routing & Routed ProtocolNetwax Lab
A routing protocol is different and is only used
between routers. It makes possible for routers to
build and maintain routing tables.
A routed protocol is a protocol by which data can
be routed.
The document contains a list of experiments related to computer networking. It includes 7 experiments covering topics like defining different types of LANs, WANs and MANs; describing network devices and topologies; implementing framing methods like bit stuffing, byte stuffing and character stuffing; and implementing routing algorithms such as simple redundancy check, cyclic redundancy check, checksum, and Hamming code. For each experiment, it provides details about the concepts and includes sample C code programs to demonstrate the techniques.
Secure Routing with AODV Protocol for MANET by Ashok PanwarAshok Panwar
This presentation discusses securing the AODV routing protocol for mobile ad hoc networks. It reviews three approaches: 1) Using public key cryptography and group session keys to authenticate nodes and encrypt routing packets. 2) Using intrusion detection and response models to identify compromised nodes based on abnormal routing behavior. 3) The Secure AODV (SAODV) protocol which aims to provide source authentication, neighbor authentication, message integrity, and access control to address vulnerabilities like message tampering, dropping, and replays. Experimental results are compared for SAODV and traditional AODV.
The document summarizes routing tables and routing algorithms. It discusses how routing tables are structured with an array of buckets containing linked lists of route records. It describes the data fields within each route record and how routing lookups and maintenance are performed using procedures like netnum, netmatch, netmask, rthash, and rtget.
OSPF (Open Shortest Path First) Case Study: Anil NembangAnil Nembang
- The document discusses Open Shortest Path First (OSPF) configuration for a network comprising routers and PCs partitioned into 4 areas.
- An addressing scheme is proposed using /30 subnet masking to assign point-to-point interfaces between routers in areas 120, 120, and 120. Area 99 is an OSPF multi-access network requiring a different approach.
- OSPF is configured on the network with areas and interfaces assigned addresses according to the proposed scheme. A virtual link is also specified to connect the non-contiguous areas as required.
This document provides an overview of IP routing and routing protocols. It begins with a high-level explanation of how routing works on the internet through IP addressing and packet forwarding. It then discusses the history of routing, from static routing in early networks to the development of dynamic routing protocols. The rest of the document outlines key interior gateway protocols like OSPF and IS-IS, exterior gateway protocols like BGP, and concepts like autonomous systems and routing policy.
The chapter discusses IP routing and routing protocols. It explains the goals of routing which include stability, robustness, dynamic path updates, and secure information transmission. It also covers routing metrics, interior and exterior routing protocols, static and dynamic routing, routing tables, and the Routing Information Protocol (RIP). RIP uses hop count as its metric and supports up to 15 hops between routers. Enhancements in RIPv2 include multicast updates, triggered updates, classless operation, and authentication.
This document provides an overview of routing concepts and protocols. It discusses the basic components of routing including algorithms, databases, and protocols. It describes different routing algorithm types such as static, distance vector, and link state. Specific routing protocols covered include RIP, OSPF, and BGP. It also discusses routing within autonomous systems and between autonomous systems on the internet.
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...IJMER
The document summarizes a study that used OPNET simulation to analyze the performance of four dynamic routing protocols (RIP, OSPF, EIGRP, IGRP) for different applications. The simulation tested the protocols over a network with six subnets connected by DS3 links. Results showed that EIGRP had the lowest delay and performed best for FTP and email applications. However, for real-time applications like VoIP and video conferencing, OSPF and RIP provided better results due to lower latency requirements. The document concludes that the choice of routing protocol depends on the specific applications running over the network.
The document outlines the key concepts in the network layer chapter, including:
- The functions of the network layer including forwarding, routing, and connection setup in some architectures.
- The differences between virtual circuit and datagram networks and how routers and forwarding work differently in each.
- An overview of the main components and functions of a router, including routing processors, switching fabrics, input/output ports, and forwarding tables.
- Details on IP as the main network layer protocol used in the Internet, including its datagram format, addressing, and fragmentation.
This document summarizes routing protocols and the Border Gateway Protocol (BGP). It discusses static versus dynamic routing, routing with partial information, and the original core routing architecture. It then describes autonomous systems (AS), external gateway protocols (EGP), and how BGP establishes peering sessions between ASes to automatically share routing information. BGP speakers in different ASes use external BGP to exchange routing information, while internal BGP is used within an AS. The document provides details on BGP update messages, path attributes, and how BGP enforces routing policies.
The document discusses several routing protocols for mobile ad hoc networks:
- DSR allows nodes to cache and share routing information for more efficient routing but has larger packet headers due to source routing. AODV uses only next hop information, keeping routing tables smaller.
- Both protocols use route discovery and maintenance, but AODV proactively refreshes routes while DSR reacts to failures. AODV also uses sequence numbers to prevent loops and choose fresher routes.
- Overall, DSR is better for networks where routes change infrequently while AODV scales better and maintains only active routes, at the cost of higher routing overhead during route discovery. Security remains a challenge for both protocols.
The document discusses the network layer and routing. It begins by stating the goals of understanding network layer services like routing, dealing with scale, and router functionality. It then provides an overview of network layer services, routing principles, hierarchical routing, IP, routing protocols, and functions of routers. The key abstraction provided by the network layer is the service model, which can be either virtual circuits or datagrams. Routing determines the path between source and destination, and algorithms like Dijkstra's algorithm are used to find the least cost path through a graph of routers and links.
The document discusses routing and routing protocols. It defines routing as the process routers use to forward packets toward their destination network based on the destination IP address. It describes static routing, where network administrators manually configure routes, as well as dynamic routing protocols, where routers automatically share information to build and update routing tables. It outlines common routing protocols including RIP, IGRP, EIGRP, OSPF, and BGP and their key characteristics such as the metrics and timers they use.
Packet transfer mechanism using routers and IP addresses myrajendra
The document discusses packet transfer mechanisms using routers and IP addresses. It explains that routers forward packets between interconnected networks using routing tables that contain the destination address and interface to route packets. Packets are forwarded either directly, if the source and destination are on the same network, or indirectly by moving from router to router. Forwarding techniques include next hop, network/host specific, default methods. Examples of routing protocols and an example routing table are also provided.
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
This document discusses using the Address Resolution Protocol (ARP) routing protocol for multi-hop transmissions in IEEE 802.11 ad hoc networks. It proposes using ARP messages between nodes to establish routes for sending data when the source and destination nodes are out of radio range of each other. Intermediate nodes receiving ARP requests or replies would act as routers, forwarding the data to the destination. The method aims to reduce overhead compared to other ad hoc routing protocols like AODV. Simulation results showed the ARP routing protocol performed comparably to AODV in terms of throughput, packet loss and round trip time for different distances and environments.
Link-state routing protocols use Dijkstra's algorithm to calculate the shortest path to all destinations based on a link-state database containing the full network topology. Each router runs the same algorithm locally to determine the optimal path. Key aspects include link-state advertisements to share connectivity information, the topological database to store network maps, and shortest path first calculations to derive routes. Common link-state protocols are OSPF and IS-IS. They provide fast convergence and scalability but require more resources than distance-vector protocols.
Route Update Overhead Reduction in MANETS Using Node ClusteringEditor IJCATR
This document proposes a technique to reduce route update overhead in mobile ad hoc networks (MANETs) using node clustering. It introduces a clustering mechanism where nodes are grouped into clusters with a cluster head node. The cluster head is elected based on factors like battery power and stability. When a node leaves a cluster, route updates are broadcast only within the cluster, rather than to the entire network. Experimental results show this approach reduces routing overhead and time compared to the existing Proactive Source Routing (PSR) protocol, which broadcasts updates to all nodes. The clustering approach limits broadcasts to within clusters, reducing the number of routing packets needed for updates.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
Improved Strategy for Distributed Processing and Network Application DevelopmentEditor IJCATR
The complexity of software development abstraction and the new development in multi-core computers have shifted the
burden of distributed software performance from network and chip designers to software architectures and developers. We need to
look at software development strategies that will integrate parallelization of code, concurrency factors, multithreading, distributed
resources allocation and distributed processing. In this paper, a new software development strategy that integrates these factors is
further experimented on parallelism. The strategy is multidimensional aligns distributed conceptualization along a path. This
development strategy mandates application developers to reason along usability, simplicity, resource distribution, parallelization of
code where necessary, processing time and cost factors realignment as well as security and concurrency issues in a balanced path from
the originating point of the network application to its retirement.
The network layer is responsible for packet forwarding including routing through intermediate routers. It controls the operation of the subnet and decides which physical path data takes. Routing is the process of moving packets from source to destination, usually performed by routers. Internetworking connects different network technologies like LANs and WANs using devices like routers. The network layer uses IP addressing to identify devices and enable routing. Private IP addresses identify internal devices while public addresses provide external internet access.
IPv6 is the latest version of the Internet Protocol that provides identification and location for computers on networks. It was developed to address the problem of IPv4 address exhaustion, as IPv4 addresses were running out. IPv6 is intended to eventually replace IPv4 and provides a vastly larger 128-bit address space compared to IPv4's 32-bit addresses. Key features of IPv6 include new header format, large address space, built-in security, prioritized traffic delivery, autoconfiguration, and mobility support.
Difference between Routing & Routed ProtocolNetwax Lab
A routing protocol is different and is only used
between routers. It makes possible for routers to
build and maintain routing tables.
A routed protocol is a protocol by which data can
be routed.
The document contains a list of experiments related to computer networking. It includes 7 experiments covering topics like defining different types of LANs, WANs and MANs; describing network devices and topologies; implementing framing methods like bit stuffing, byte stuffing and character stuffing; and implementing routing algorithms such as simple redundancy check, cyclic redundancy check, checksum, and Hamming code. For each experiment, it provides details about the concepts and includes sample C code programs to demonstrate the techniques.
Secure Routing with AODV Protocol for MANET by Ashok PanwarAshok Panwar
This presentation discusses securing the AODV routing protocol for mobile ad hoc networks. It reviews three approaches: 1) Using public key cryptography and group session keys to authenticate nodes and encrypt routing packets. 2) Using intrusion detection and response models to identify compromised nodes based on abnormal routing behavior. 3) The Secure AODV (SAODV) protocol which aims to provide source authentication, neighbor authentication, message integrity, and access control to address vulnerabilities like message tampering, dropping, and replays. Experimental results are compared for SAODV and traditional AODV.
The document summarizes routing tables and routing algorithms. It discusses how routing tables are structured with an array of buckets containing linked lists of route records. It describes the data fields within each route record and how routing lookups and maintenance are performed using procedures like netnum, netmatch, netmask, rthash, and rtget.
OSPF (Open Shortest Path First) Case Study: Anil NembangAnil Nembang
- The document discusses Open Shortest Path First (OSPF) configuration for a network comprising routers and PCs partitioned into 4 areas.
- An addressing scheme is proposed using /30 subnet masking to assign point-to-point interfaces between routers in areas 120, 120, and 120. Area 99 is an OSPF multi-access network requiring a different approach.
- OSPF is configured on the network with areas and interfaces assigned addresses according to the proposed scheme. A virtual link is also specified to connect the non-contiguous areas as required.
This document provides an overview of IP routing and routing protocols. It begins with a high-level explanation of how routing works on the internet through IP addressing and packet forwarding. It then discusses the history of routing, from static routing in early networks to the development of dynamic routing protocols. The rest of the document outlines key interior gateway protocols like OSPF and IS-IS, exterior gateway protocols like BGP, and concepts like autonomous systems and routing policy.
The chapter discusses IP routing and routing protocols. It explains the goals of routing which include stability, robustness, dynamic path updates, and secure information transmission. It also covers routing metrics, interior and exterior routing protocols, static and dynamic routing, routing tables, and the Routing Information Protocol (RIP). RIP uses hop count as its metric and supports up to 15 hops between routers. Enhancements in RIPv2 include multicast updates, triggered updates, classless operation, and authentication.
This document provides an overview of routing concepts and protocols. It discusses the basic components of routing including algorithms, databases, and protocols. It describes different routing algorithm types such as static, distance vector, and link state. Specific routing protocols covered include RIP, OSPF, and BGP. It also discusses routing within autonomous systems and between autonomous systems on the internet.
Network Performance Analysis of Dynamic Routing Protocols for Real Time Appl...IJMER
The document summarizes a study that used OPNET simulation to analyze the performance of four dynamic routing protocols (RIP, OSPF, EIGRP, IGRP) for different applications. The simulation tested the protocols over a network with six subnets connected by DS3 links. Results showed that EIGRP had the lowest delay and performed best for FTP and email applications. However, for real-time applications like VoIP and video conferencing, OSPF and RIP provided better results due to lower latency requirements. The document concludes that the choice of routing protocol depends on the specific applications running over the network.
The document outlines the key concepts in the network layer chapter, including:
- The functions of the network layer including forwarding, routing, and connection setup in some architectures.
- The differences between virtual circuit and datagram networks and how routers and forwarding work differently in each.
- An overview of the main components and functions of a router, including routing processors, switching fabrics, input/output ports, and forwarding tables.
- Details on IP as the main network layer protocol used in the Internet, including its datagram format, addressing, and fragmentation.
This document summarizes routing protocols and the Border Gateway Protocol (BGP). It discusses static versus dynamic routing, routing with partial information, and the original core routing architecture. It then describes autonomous systems (AS), external gateway protocols (EGP), and how BGP establishes peering sessions between ASes to automatically share routing information. BGP speakers in different ASes use external BGP to exchange routing information, while internal BGP is used within an AS. The document provides details on BGP update messages, path attributes, and how BGP enforces routing policies.
The document discusses several routing protocols for mobile ad hoc networks:
- DSR allows nodes to cache and share routing information for more efficient routing but has larger packet headers due to source routing. AODV uses only next hop information, keeping routing tables smaller.
- Both protocols use route discovery and maintenance, but AODV proactively refreshes routes while DSR reacts to failures. AODV also uses sequence numbers to prevent loops and choose fresher routes.
- Overall, DSR is better for networks where routes change infrequently while AODV scales better and maintains only active routes, at the cost of higher routing overhead during route discovery. Security remains a challenge for both protocols.
The document discusses the network layer and routing. It begins by stating the goals of understanding network layer services like routing, dealing with scale, and router functionality. It then provides an overview of network layer services, routing principles, hierarchical routing, IP, routing protocols, and functions of routers. The key abstraction provided by the network layer is the service model, which can be either virtual circuits or datagrams. Routing determines the path between source and destination, and algorithms like Dijkstra's algorithm are used to find the least cost path through a graph of routers and links.
The document discusses routing and routing protocols. It defines routing as the process routers use to forward packets toward their destination network based on the destination IP address. It describes static routing, where network administrators manually configure routes, as well as dynamic routing protocols, where routers automatically share information to build and update routing tables. It outlines common routing protocols including RIP, IGRP, EIGRP, OSPF, and BGP and their key characteristics such as the metrics and timers they use.
Packet transfer mechanism using routers and IP addresses myrajendra
The document discusses packet transfer mechanisms using routers and IP addresses. It explains that routers forward packets between interconnected networks using routing tables that contain the destination address and interface to route packets. Packets are forwarded either directly, if the source and destination are on the same network, or indirectly by moving from router to router. Forwarding techniques include next hop, network/host specific, default methods. Examples of routing protocols and an example routing table are also provided.
Performance analysis on multihop transmission using arp routing protocol in i...eSAT Journals
This document discusses using the Address Resolution Protocol (ARP) routing protocol for multi-hop transmissions in IEEE 802.11 ad hoc networks. It proposes using ARP messages between nodes to establish routes for sending data when the source and destination nodes are out of radio range of each other. Intermediate nodes receiving ARP requests or replies would act as routers, forwarding the data to the destination. The method aims to reduce overhead compared to other ad hoc routing protocols like AODV. Simulation results showed the ARP routing protocol performed comparably to AODV in terms of throughput, packet loss and round trip time for different distances and environments.
Link-state routing protocols use Dijkstra's algorithm to calculate the shortest path to all destinations based on a link-state database containing the full network topology. Each router runs the same algorithm locally to determine the optimal path. Key aspects include link-state advertisements to share connectivity information, the topological database to store network maps, and shortest path first calculations to derive routes. Common link-state protocols are OSPF and IS-IS. They provide fast convergence and scalability but require more resources than distance-vector protocols.
Route Update Overhead Reduction in MANETS Using Node ClusteringEditor IJCATR
This document proposes a technique to reduce route update overhead in mobile ad hoc networks (MANETs) using node clustering. It introduces a clustering mechanism where nodes are grouped into clusters with a cluster head node. The cluster head is elected based on factors like battery power and stability. When a node leaves a cluster, route updates are broadcast only within the cluster, rather than to the entire network. Experimental results show this approach reduces routing overhead and time compared to the existing Proactive Source Routing (PSR) protocol, which broadcasts updates to all nodes. The clustering approach limits broadcasts to within clusters, reducing the number of routing packets needed for updates.
VANET Security against Sybil Attack by Using New SRAN Routing ProtocolEditor IJCATR
A VANET facilitates communicate between vehicles and between vehicles and infrastructure. Vehicular Ad-Hoc Network
is a sub type of Mobile Ad-Hoc Network i.e. MANET. Now days, road traffic activities are one of the most important daily routines
worldwide. VANET provides you most of information that are required for better safety and driving such as an accurate weather
description or early warnings of upcoming dangers. To successfully deploy VANET, security is one of the major challenges such as
protection from selfish vehicles that may block or mess traffic, bogus notifications etc. that may harm and losses lives, that must be
addressed. Sybil attacks have become a serious threat as they can affect the functionality of VANETs for the benefit of the attacker.
The Sybil attack is the case where a single faulty entity, called a malicious node, can create multiple identities known as Sybil nodes or
fake nodes. This project detects and prevents the Sybil attack using “Secure Routing for Ad Hoc Network” (SRAN) routing protocol.
SRAN is based on AODV protocol. In our proposed work, we have developed SRAN protocol to maintain routing information and
route discovery in such manner that will detect as well as prevent Sybil Attack. Each node will have a unique identity and their entry in
route table. SRAN Protocol easily detects such route that is not valid anymore for communication. It deletes all the related entries from
the routing table for those invalid routes.
Improved Strategy for Distributed Processing and Network Application DevelopmentEditor IJCATR
The complexity of software development abstraction and the new development in multi-core computers have shifted the
burden of distributed software performance from network and chip designers to software architectures and developers. We need to
look at software development strategies that will integrate parallelization of code, concurrency factors, multithreading, distributed
resources allocation and distributed processing. In this paper, a new software development strategy that integrates these factors is
further experimented on parallelism. The strategy is multidimensional aligns distributed conceptualization along a path. This
development strategy mandates application developers to reason along usability, simplicity, resource distribution, parallelization of
code where necessary, processing time and cost factors realignment as well as security and concurrency issues in a balanced path from
the originating point of the network application to its retirement.
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...Editor IJCATR
Bayesian classifier works efficiently on some fields, and badly on some. The performance of Bayesian Classifier suffers in fields that involve correlated features. Feature selection is beneficial in reducing dimensionality, removing irrelevant data, incrementing learning accuracy, and improving result comprehensibility. But, the recent increase of dimensionality of data place a hard challenge to many existing feature selection methods with respect to efficiency and effectiveness. In this paper, Bayesian Classifier with Correlation Based Feature Selection is introduced which can key out relevant features as well as redundancy among relevant features without pair wise correlation analysis. The efficiency and effectiveness of our method is presented through broad.
Collision Avoidance Protocol for Inter Vehicular Communication Editor IJCATR
Vehicle to vehicle communication can give us better results by avoiding the major problems in road like collision of vehicles, better route selection in case of traffic congestion, fuel consumption, suitable selection of parking place etc. This paper presents a protocol to avoid the collision of vehicles. High mobility and fast topology changes are the characteristics of Vehicular Ad-hoc Networks (VANETs). To establish the real world environment for VANETs, network simulator NS2 is used. Medium Access Control (MAC) Protocol is used to avoid the collision of transmitted data. The Simulation is done using the proposed Vehicular Ad-hoc On-demand Distance Vector (VAODV) routing protocol, which is a modification of Ad-hoc On-demand Distance Vector (AODV) routing protocol. The proposed VAODV protocol is continuously checks the distance, speed of each vehicle and if it finds that the distance between vehicles is continuously decreasing then in this case it will send a warning textual message to those vehicles that are in accidental situation. Based on this textual information these vehicles will take particular action like vehicle may choose new route if it exists or it may slow down its own speed or it may stop moving by pressing brake. The experimental results are used to find out the performance of VAODV protocol. The performance of VAODV protocol is analyzed with different parameters like end to end delay, throughput, packet delivery ratio, normalized routing load etc.
Improved Strategy for Distributed Processing and Network Application Developm...Editor IJCATR
The complexity of software development abstraction and the new development in multi-core computers have shifted the burden of distributed software performance from network and chip designers to software architectures and developers. We need to look at software development strategies that will integrate parallelization of code, concurrency factors, multithreading, distributed resources allocation and distributed processing. In this paper, a new software development strategy that integrates these factors is further experimented on parallelism. The strategy is multidimensional aligns distributed conceptualization along a path. This development strategy mandates application developers to reason along usability, simplicity, resource distribution, parallelization of code where necessary, processing time and cost factors realignment as well as security and concurrency issues in a balanced path from the originating point of the network application to its retirement.
New Technique for Measuring and Controlling the Permeability of Polymeric Mem...Editor IJCATR
Membranes have wide uses in industry and medicine applications. Polymer membranes are important materials because of their high chemical resistance, but they are of weak mechanical resistance against high pressures. Therefore, it was essential to modify a permeability measuring technique free from high pressure application. The current work represented a modification for the permeability measuring technique of membranes, where ionic salt was added with known concentration to water as common solvent and the electrolyte current was measured behind the membrane. The electrolysis current was correlated to the flow rate of water across a polyvinyl alcohol (PVA) membrane. Some other problems were raised such that polarization on electrodes and changes in electrolyte contents during the long time of the slow process. Pulsed potential on electrodes resolved these problems and other associated problems like rush in current and the double layer capacitance effect. An empirical equation was suggested to evaluate the permeability of polymer membranes by this modified method. Easy and accurate measurement of permeability helped authors to change the permeability of PVA membranes by adding copper nano particles in membrane to reduce its permeability, and adding silicone dioxide micro particles to the PVA membranes to increase its permeability. Authors suggested a mechanism for these permeability changes. Scanning electron microscope images for the filled PVA membranes supported the suggested mechanism.
A Model for Predicting Students’ Academic Performance using a Hybrid of K-mea...Editor IJCATR
Higher learning institutions nowadays operate in a more complex and competitive due to a high demand from prospective
students and an emerging increase of universities both public and private. Management of Universities face challenges and concerns of
predicting students’ academic performance in to put mechanisms in place prior enough for their improvement. This research aims at
employing Decision tree and K-means data mining algorithms to model an approach to predict the performance of students in advance
so as to devise mechanisms of alleviating student dropout rates and improve on performance. In Kenya for example, there has been
witnessed an increase student enrolling in universities since the Government started free primary education. Therefore the Government
expects an increased workforce of professionals from these institutions without compromising quality so as to achieve its millennium
development and vision 2030. Backlog of students not finishing their studies in stipulated time due to poor performance is another
issue that can be addressed from the results of this research since predicting student performance in advance will enable University
management to devise ways of assisting weak students and even make more decisions on how to select students for particular courses.
Previous studies have been done Educational Data Mining mostly focusing on factors affecting students’ performance and also used
different algorithms in predicting students’ performance. In all these researches, accuracy of prediction is key and what researchers
look forward to try and improve.
Biogeography Based Optimization (BBO) is a new evolutionary algorithm for global optimization that was introduced in
2008. BBO is an application of biogeography to evolutionary algorithms. Biogeography is the study of the distribution of biodiversity
over space and time. It aims to analyze where organisms live, and in what abundance. BBO has certain features in common with other population-based optimization methods. Like GA and PSO, BBO can share information between solutions. This makes BBO applicable to many of the same types of problems that GA and PSO are used for, including unimodal, multimodal and deceptive functions. This paper explains the methodology of application of BBO algorithm for the constrained task scheduling problems.
Strategic Management of Intellectual Property: R&D Investment Appraisal Using...Editor IJCATR
Company executives are under increasing pressure to proactively evaluate the benefits of the huge amounts of
investment into intellectual property (IP). The main goal of this paper is to propose a Dynamic Bayesian Network
as a tool for modeling the forecast of the distribution of Research and Development (R&D) investment efficiency
towards the strategic management of IP. Dynamic Bayesian Network provides a framework for handling the
uncertainties and impression in the qualitative and quantitative data that impact the effectiveness and efficiency
of investments on R&D. This paper specifies the process of creating the graphical representation using impactful
variables, specifying numerical link between the variables and drawing inference from the network
Strategic Management of Intellectual Property: R&D Investment Appraisal Using...Editor IJCATR
Company executives are under increasing pressure to proactively evaluate the benefits of the huge amounts of investment into intellectual property (IP). The main goal of this paper is to propose a Dynamic Bayesian Network as a tool for modeling the forecast of the distribution of Research and Development (R&D) investment efficiency towards the strategic management of IP. Dynamic Bayesian Network provides a framework for handling the uncertainties and impression in the qualitative and quantitative data that impact the effectiveness and efficiency of investments on R&D. This paper specifies the process of creating the graphical representation using impactful variables, specifying numerical link between the variables and drawing inference from the network.
Improved greedy routing protocol for VANETEditor IJCATR
VANET (vehicular ad-hoc network) is a classification of MANET in which vehicles act as mobile node and provides a different
approach to Intelligent transport System (ITS). VANET is an emerging area for Intelligent Transportation System (ITS) which can result in
increased traffic safety, collision warning through exchange of messages through wireless media. Efficient routing protocols are required for
efficient communication among vehicles. In the given paper, we surveyed various VANETs protocols and along with its advantages and
disadvantages. We compare our proposed protocols via NS-2 based simulations and show the performance of different protocols
Sampling of User Behavior Using Online Social NetworkEditor IJCATR
The popularity of online networks provides an opportunity to study the characteristics of online social network graphs is important, both to improve current systems and to design new application of online social networks. Although personalized search has been proposed for many years and many personalization strategies have been investigated, it is still unclear whether personalization is consistently effective on different queries for different users, and under different search contexts. In this paper, we study performance of information collection in a dynamic social network. By analyzing the results, we reveal that personalized search has significant improvement over common web search.
The mixing time of thee sampling process strongly depends on the characteristics of the graph.
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIPEditor IJMTER
The focus of this Paper is the actual implementation of Network Router and verifies the
functionality of the four port router for network on chip using the latest verification methodologies,
Hardware Verification Languages and EDA tools and qualify the IP for synthesis and implementation.
This Router design contains three output ports and one input port, it is packet based Protocol. This Design
consists Registers and FIFO. For larger networks, where a direct-mapped approach is not feasible due to
FPGA resource limitations, a virtualized time multiplexed approach was used. Compared to the provided
software reference implementation, our direct-mapped approach achieves three orders of magnitude
speedup, while our virtualized time multiplexed approach achieves one to two orders of magnitude
speedup, depending on the network and router configuration.
IRJET- Design of Virtual Channel Less Five Port NetworkIRJET Journal
This document describes the design of a virtual channel less five port network router. It discusses the need for efficient router design in Network on Chip architectures to improve communication performance. A router microarchitecture is proposed using a round robin arbiter, priority encoder, and multiplexer crossbar. The router is designed using Verilog to support five simultaneous requests. Simulation results show the round robin arbiter and priority encoder generating the necessary control signals for the crossbar to connect input and output ports. The virtual channel less router design aims to increase communication speed while reducing complexity compared to routers using virtual channels.
The focus of this Paper is the actual implementation of Network Router and verifies the functionality of the four port router for network on chip using the latest verification methodologies, Hardware Verification Languages and EDA tools and qualify the IP for Synthesis an implementation. This Router design contains three output ports and one input port, it is packet based Protocol. This Design consists Registers and FIFO. For larger networks, where a direct-mapped approach is not feasible due to FPGA resource limitations, a virtualized timemultiplexed approach was used. Compared to the provided software reference implementation, our direct-mapped approach achieves three orders of magnitude speedup, while our virtualized time multiplexed approach achieves one to two orders of magnitude speedup, depending on the network and router configuration.
This document describes a student project to implement the OSPF routing protocol on routers using the Packet Tracer simulator. It includes an introduction to routing and OSPF, as well as chapters covering the OSPF process, router types, network architecture, results, advantages/disadvantages, and references. The project was completed by three students for their Bachelor of Technology degree and submitted to their department for acceptance.
The document discusses the functions of the transport layer in the OSI model. It explains that the transport layer accepts data from the session layer, breaks it into packets and delivers them to the network layer. It is responsible for guaranteeing successful arrival of data at the destination and provides end-to-end communication between source and destination transport layers. The transport layer separates upper layers from low-level data transmission details and handles any data loss or damage. It can transmit packets in the same order or as isolated messages depending on the network and protocol.
In this paper we attempt to give a networking solution by applying VLSI architecture techniques to router design for networking systems to provide intelligent control over the network. Networking routers to have limited input/output configurations, which we attempt to overcome by adopting bridging loops to reduce the latency and security concerns. Other techniques we explore include the use of multiple protocols. We attempt to overcome the security and latency issues with protocol switching technique embedded in the router engine itself. The approach is based on hardware coding to reduce the impact of latency issues as the hardware itself is designed according to the need. We attempt to provide a multipurpose networking router by means of Verilog code, thus we can maintain the same switching speed with more security we embed the packet storage buffer on chip and generate the code as self-independent VLSI based router. Our main focus is the implementation of hardware IP .router. The approach enables the router to process multiple incoming IP packets with different versions of protocols simultaneously, e.g. for IPv4 and IPv6. The approach will results in increased switching speed of routing per packet for both current trend protocols, which we believe would result inconsiderable enhancement in networking systems.
Introduction to the Network Layer: Network layer services, packet switching, network layer performance, IPv4 addressing, forwarding of IP packets, Internet Protocol, ICMPv4, Mobile IP Unicast Routing: Introduction, routing algorithms, unicast routing protocols. Next generation IP: IPv6 addressing, IPv6 protocol, ICMPv6 protocol, transition from IPv4 to IPv6. Introduction to the Transport Layer: Introduction, Transport layer protocols (Simple protocol, Stop-and-wait protocol, Go-Back-n protocol, Selective repeat protocol, Bidirectional protocols), Transport layer services, User datagram protocol, Transmission control protocol
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
2 Marks Questions And Answers MC1628 TCP IP Protocol SuiteScott Bou
The document discusses TCP/IP protocols and networking concepts. It provides definitions for key terms like network support layers, user support layers, and the purpose of each layer in the OSI model. Transport layer protocols like TCP and UDP are described as well as networking technologies like IP addressing, routing, subnetting, and connecting devices. Standards bodies that develop networking standards are also mentioned.
The document discusses networking concepts like routers, switches, and protocols. It explains that routers operate at the network layer and use layer 3 addresses to transmit data between networks, while switches operate at layer 2 and use MAC addresses. It describes common routing protocols like RIP, OSPF, and BGP and how they calculate paths between networks. The document also provides configuration steps that can be taken to secure routers and switches, such as applying vendor patches and disabling unnecessary routing updates.
A hub is a networking device that connects multiple devices on a local area network (LAN). It receives data packets through one port and broadcasts them to all other ports so all connected devices can see the packets. Hubs operate in half duplex mode and have no bandwidth management or collision detection. Switches are more advanced devices that can connect more devices than hubs. Switches have buffers and port-to-MAC address tables that allow them to send frames to specific ports faster than hubs. Routers connect multiple networks like LANs and WANs. Routers use IP addresses to route packets between networks and can run routing protocols to dynamically learn routes.
Network devices like hubs, switches, and routers connect computers in a network and help manage traffic flow. Hubs broadcast all received data to all ports but have limited bandwidth. Switches can connect more devices than hubs and have features like VLANs. Routers connect different networks and use IP addresses to direct traffic. Other devices like firewalls, VPNs, and IDS/IPS provide network security functions.
This document discusses congestion control for scalability in bufferless on-chip networks with FPGA implementation. It proposes a new centralized arbiter called the Islip arbiter that uses the Islip scheduling algorithm with a 2D mesh topology. The Islip algorithm is an iterative scheduling approach that attempts to quickly converge on a conflict-free match between inputs and outputs in multiple iterations. Each iteration consists of a request, grant, and accept step with round-robin priority. The document also describes implementing an 8-bit version of the Islip scheduler on a Spartan-3E FPGA for evaluation.
This document discusses different networking devices including hubs, switches, routers, bridges, and brouters. It provides information on their functions, design, and operation at both the physical and data link layers of the OSI model. It also discusses IP addresses and their role in identifying devices and enabling communication using the Internet Protocol.
This chapter covers IP routing concepts including routing protocols, path selection, static routing, and virtual routing and forwarding. It discusses how different routing protocols advertise and learn routes, the metrics and algorithms routers use to select the best path, and an overview of static and dynamic routing configurations.
The document discusses routing and routing protocols. It provides explanations of key routing concepts like routing tables, static routing, default routing, dynamic routing, distance vector routing protocols, link state routing protocols, hybrid routing protocols, and how routing loops occur and can be overcome. It also defines specific routing protocols like OSPF, RIP, IGRP, EIGRP, and compares features of these protocols.
A efficacy of different buffer size on latency of network on chip (NoC)journalBEEI
Moore's prediction has been used to set targets for research and development in semiconductor industry for years now. A burgeoning number of processing cores on a chip demand competent and scalable communication architecture such as network-on-chip (NoC). NoC technology applies networking theory and methods to on-chip communication and brings noteworthy improvements over conventional bus and crossbar interconnections. Calculated performances such as latency, throughput, and bandwidth are characterized at design time to assured the performance of NoC. However, if communication pattern or parameters set like buffer size need to be altered, there might result in large area and power consumption or increased latency. Routers with large input buffers improve the efficiency of NoC communication while routers with small buffers reduce power consumption but result in high latency. This paper intention is to validate that size of buffer exert influence to NoC performance in several different network topologies. It is concluded that the way in which routers are interrelated or arranged affect NoC’s performance (latency) where different buffer sizes were adapted. That is why buffering requirements for different routers may vary based on their location in the network and the tasks assigned to them.
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGAIJERA Editor
This document proposes a new reliable dynamic network-on-chip (NoC) based on a modified XY routing algorithm and error detection mechanism. The proposed NoC uses a mesh structure of routers that can detect routing errors to enable adaptive routing. It includes packet error detection and correction. The error detection mechanism allows the NoC to accurately localize error sources to maintain throughput and network load. The modified XY routing algorithm is combined with a scheduler to route packets and avoid collisions in the proposed packet switched NoC implemented on an FPGA. Simulation results show that the proposed method efficiently transfers data between nodes with lower latency and higher throughput compared to contention-based networks.
1. While including network functionality is important, it is possible to develop a scalable workload management system without network-specific code by leveraging existing networking infrastructure.
2. Using Neutron provides networking as a service and allows secure isolation of tenant traffic in a multi-tenant environment.
3. Neutron defines abstract network, subnet, and port resources that map to real-world concepts like VLANs, IP blocks, and switch ports to define network topology.
Similar to Internal Architecture of Junction Based Router (20)
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This document discusses green computing practices and sustainable IT services. It provides an overview of factors driving adoption of green computing to reduce costs and environmental impact of data centers, such as rising energy costs and density. Green strategies discussed include improving infrastructure efficiency, power management, thermal management, efficient product design, and virtualization to optimize resource utilization. The document examines how green computing aims to lower costs and environmental footprint, and how sustainable IT services take a broader approach considering economic, environmental and social impacts.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Session 1 - Intro to Robotic Process Automation.pdfUiPathCommunity
👉 Check out our full 'Africa Series - Automation Student Developers (EN)' page to register for the full program:
https://bit.ly/Automation_Student_Kickstart
In this session, we shall introduce you to the world of automation, the UiPath Platform, and guide you on how to install and setup UiPath Studio on your Windows PC.
📕 Detailed agenda:
What is RPA? Benefits of RPA?
RPA Applications
The UiPath End-to-End Automation Platform
UiPath Studio CE Installation and Setup
💻 Extra training through UiPath Academy:
Introduction to Automation
UiPath Business Automation Platform
Explore automation development with UiPath Studio
👉 Register here for our upcoming Session 2 on June 20: Introduction to UiPath Studio Fundamentals: https://community.uipath.com/events/details/uipath-lagos-presents-session-2-introduction-to-uipath-studio-fundamentals/
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfleebarnesutopia
So… you want to become a Test Automation Engineer (or hire and develop one)? While there’s quite a bit of information available about important technical and tool skills to master, there’s not enough discussion around the path to becoming an effective Test Automation Engineer that knows how to add VALUE. In my experience this had led to a proliferation of engineers who are proficient with tools and building frameworks but have skill and knowledge gaps, especially in software testing, that reduce the value they deliver with test automation.
In this talk, Lee will share his lessons learned from over 30 years of working with, and mentoring, hundreds of Test Automation Engineers. Whether you’re looking to get started in test automation or just want to improve your trade, this talk will give you a solid foundation and roadmap for ensuring your test automation efforts continuously add value. This talk is equally valuable for both aspiring Test Automation Engineers and those managing them! All attendees will take away a set of key foundational knowledge and a high-level learning path for leveling up test automation skills and ensuring they add value to their organizations.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxSunil Jagani
Discover how AI is transforming the workplace and learn strategies for reskilling and upskilling employees to stay ahead. This comprehensive guide covers the impact of AI on jobs, essential skills for the future, and successful case studies from industry leaders. Embrace AI-driven changes, foster continuous learning, and build a future-ready workforce.
Read More - https://bit.ly/3VKly70
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
"NATO Hackathon Winner: AI-Powered Drug Search", Taras KlobaFwdays
This is a session that details how PostgreSQL's features and Azure AI Services can be effectively used to significantly enhance the search functionality in any application.
In this session, we'll share insights on how we used PostgreSQL to facilitate precise searches across multiple fields in our mobile application. The techniques include using LIKE and ILIKE operators and integrating a trigram-based search to handle potential misspellings, thereby increasing the search accuracy.
We'll also discuss how the azure_ai extension on PostgreSQL databases in Azure and Azure AI Services were utilized to create vectors from user input, a feature beneficial when users wish to find specific items based on text prompts. While our application's case study involves a drug search, the techniques and principles shared in this session can be adapted to improve search functionality in a wide range of applications. Join us to learn how PostgreSQL and Azure AI can be harnessed to enhance your application's search capability.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Discover the Unseen: Tailored Recommendation of Unwatched ContentScyllaDB
The session shares how JioCinema approaches ""watch discounting."" This capability ensures that if a user watched a certain amount of a show/movie, the platform no longer recommends that particular content to the user. Flawless operation of this feature promotes the discover of new content, improving the overall user experience.
JioCinema is an Indian over-the-top media streaming service owned by Viacom18.
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Keywords: AI, Containeres, Kubernetes, Cloud Native
Event Link: https://meine.doag.org/events/cloudland/2024/agenda/#agendaId.4211
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
"What does it really mean for your system to be available, or how to define w...Fwdays
We will talk about system monitoring from a few different angles. We will start by covering the basics, then discuss SLOs, how to define them, and why understanding the business well is crucial for success in this exercise.
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Internal Architecture of Junction Based Router
1. International Journal of Computer Applications Technology and Research
Volume 4– Issue 8, 623 - 628, 2015, ISSN: 2319–8656
www.ijcat.com 623
Internal Architecture of Junction Based Router
Tulikapriya Sinha
Symbiosis Institute of
Technology,
Symbiosis International
University,
Pune, India
Shraddha Patil
Symbiosis Institute of
Technology,
Symbiosis International
University,
Pune, India
Smita Khole
Symbiosis Institute of
Technology,
Symbiosis International
University,
Pune, India
Abstract: The router is an important component in NoC as it provides routes for the communication between different cores. A router
consists of registers, switches, arbitration and control logic that collectively implement the routing and flow control function required to
buffer and forward flits to their destination. This router will be implemented on FPGA using Spartan-3 kit. This paper describes the
internal blocks of a junction based router and there operation.
Keywords: Router, NoC, FPGA, Verilog, arbiter.
1. INTRODUCTION
1.1Network on Chip (NoC)
Network on chip or network on a chip is a communication
subsystem on an integrated circuit (commonly called a "chip"),
typically between IP cores in a System on a Chip (SoC).
Network-on-Chip (NoC) architectures provide a good way of
realizing efficient interconnections and largely alleviate the
limitations of bus-based solutions. NoCs can span synchronous
and asynchronous clock domains or use un-
clocked asynchronous logic. NoC technology
applies networking theory and methods to on-
conventional bus and crossbar interconnections. NoC improves
the scalability of SoCs (System on Chips), and the power
efficiency of complex SoCs compared to other designs.[1]
Traditionally, ICs have been designed with dedicated point-to-
point connections, with one wire dedicated to each signal. For
large designs, in particular, this has several limitations from
a physical design viewpoint. The wires occupy most of the area
on the chip, interconnects dominate both performance
and dynamic power dissipation, as signal propagation in wires
across the chip requires multiple clock cycles. NoC links can
reduce the complexity of designing wires for predictable speed,
power, noise, reliability, etc., thanks to their regular, well
controlled structure. From a system design viewpoint, with the
advent of multi-core processor systems, a network is a natural
architectural choice. A NoC can provide separation between
computation and communication, support modularity
and IP reuse via standard interfaces,
handle synchronization issues, serve as a platform for system
test, and, hence, increase engineering productivity. The whole
router design can be implemented on a FPGA (Field
programmable gate arrays).
There are three main components of NoC.
Resource
Resource Network Interface (RNI)
Router
Figure 1 Example of Network on Chip platform[1]
Figure 2: NoC Components [1]
A Core is connected to the router through RNI. RNI is the
interface between router and the core. Core sends packet to the
router through RNI, and from router it is send to the other
routers or core depending on the destination.
2. International Journal of Computer Applications Technology and Research
Volume 4– Issue 8, 623 - 628, 2015, ISSN: 2319–8656
www.ijcat.com 624
Benefits of NoC Architecture:
Independent implementation and optimization of
layers.
Simplified customization per application.
Supports multiple topologies and options for
different parts of the network.
Simplified feature development, interface
interoperability, and scalability.
1.2 Design for Junction based routing
Routing in NoC can be classified in many ways. Router design
depends on the routing protocol and routing algorithm used. [1]
Two kinds of routing algorithms are source routing and
distributed routing.
In source routing, path to be followed by the flit is locked from
source to destination. The complete route information is
available in head flit. Here, router takes decision by looking at
the head flit. Path tables are stored inside the resource network
interface (RNI). These path tables contain the complete path
information for a specific destination in the network. Path
information is calculated by applying routing algorithms.
In distributed routing, routing decisions are taken inside every
router on the path and hence is a complex design due to extra
hardware. There is no information about the path inside the
header packet.
Compared to distributed routing, source routing has speed
advantage because the routing information is stored in the
packet itself. But source routing leads to overhead to store
complete path information in the header of each packet.
An algorithm called Junction based source routing was
developed to overcome these flaws. Junction Based Source
Routing limits the required path information to be stored in
every packet to a small number of bits which correspond to only
a few hops as shown in figure 3. There are temporary
destinations called junctions to cover the large distance such
that sub-paths are always smaller than or equal to a maximum
hop count. If a packet needs to go through a junction, the source
just appends path information from source to the junction. On
reaching the junction, the packet picks up path information to
reach the destination from this junction.
The design of a NoC router depends on various aspects of NoC
architecture and the performance requirement. The Junction
Router contains path information in tables to reach any
destination. The table can implement either in the router itself
or in the resource network interface (RNI) or in the resource
(core). There are three distinct cases for a packet to reach a
junction:
i. If the destination of the packet is the resource connected to
the Junction itself, then it should be routed to the resource
through RNI.
ii. If the destination is not very far and the packet header has
enough information to reach the destination, then the router
forwards the packet just by looking at the relevant field in the
header.
iii. If the destination is far, then the junction will be the
intermediate destination. This will be clear from the relevant
field in the header. In this case, Junction modifies the path
information in the packet header for onward journey to the
destination, if possible otherwise to another junction as
intermediate destination. [1]
Fig.3 Junction Based Network on Chip based system [1]
The router architecture is a typical Network on Chip router.
Design of a router depends on the routing algorithm used. Here
junction based resource router has been described. This router
architecture supports both kinds of routers which mean that the
router can be used as a normal router as well as a junction
router. Main components in the router architecture are as
follow:
i. Arbiter and Control
ii. Crossbar
iii. Input Handler [1].
Figure 4: Main components of Router
Figure 5: Block Diagram depicting all blocks of Junction
based Router
Input Handler
(gets 34 bit data
from user)
Crossbar (provides
the output to the
user)
Arbiter and
Control
3. International Journal of Computer Applications Technology and Research
Volume 4– Issue 8, 623 - 628, 2015, ISSN: 2319–8656
www.ijcat.com 625
1.3 Flit Format:
Figure 6: Flit Format.[1]
RB- Resource Bit.
JB- Junction Bit.
Dest. Address- Destination Address
The above diagram represents the Flit Format or the
distribution of bits of the 34 bit data.
Flit type:
00- Head Flit.
01- Body Flit.
10- End Flit.
11- Full Flit.
Head Flit:
When the Flit type is “00”, its Head Flit. This flit is initially
sent to lock a particular path for transmission of data. This
contains the destination address, direction bits, etc.
Body Flit:
When the Flit type is “01”, its Body Flit. This flit follows the
path reserved by the Head flit. It contains the main data which
needs to be transmitted.
End Flit:
When the Flit type is”10”, its End flit. When this flit is sent, it
means that the data has been sent and no more data needs to be
transmitted. This indicates end of transmission of data.
Full Flit:
When the Flit type is “11”, its full flit. When this flit is sent, the
path which was locked for transmission of data is unlocked for
next data to be transmitted.
2. DESCRIPTION OF COMPONENTS
PRESENT IN ROUTER:
2.1 Input Handler:
This block receives the data and stores it temporarily in a stack
present. By using a stack of width 34bits and depth 4bits. The
outputs are sent to different parts of Crossbar and Arbiter .This
block consists of 3 subparts:
i. Input Port
ii. Header Modifier
iii. Junction and Resource Control.
2.1.1. Input Port
The main function of this block is to store the
incoming flits and send them to header modifier
block.
For the storing the data temporarily, stack is used,
which operates on ‘First In First Out’ (FIFO)
concept.
There are many temporary registers used to control
the stack
As the data is sent into the router, it becomes the data
for this block, signal is generated and the data is
written into the stack.
Stack consists of a depth of 4, which means it can
save maximum of 4 data at a time. When the stack is
full, other data go into the waiting state for stack to
empty at least one row.
2.1.2 Header Modifier
When the block receives request signal from the
input port, data is sent from the port.
When the data is received, flits are checked first. If
the flits are Head flit or Full flit, then the RB
(Resource Bit) is checked.
If Resource Bit=1, then wait for request signal from
junction to the Header modifier. When the signal is
received, along with this the data from Junction and
Resource control which is of 34bits is also received.
First 4 bits of Header Modifier is sent to the Arbiter,
these become the inputs of Arbiter block, which is
discussed later.
The 4 bits of Header Modifier are divided in
following manner:
2 bits for Flit type, first two bits.
2 bits for direction i.e. from where the data
is coming, next two bits.
The entire 34bit data is sent to the Crossbar as its
input from this block.
If RB=0, then concatenation operation of data is
performed. Here the path information is modified,
first two bits are sent behind the last 2 bits of path
information. This modified data is then sent to the
crossbar as 34bits data and 4 bit data is sent to the
Arbiter and control block.
If the Flit type is body flit or end flit, data in the
modifier is directly sent to the crossbar and the 4 bit
data is sent to the Arbiter and control block.
2.1.3 Junction and Resource Control
The main function of this block is to receive flits from input
port, send destination address to Path Table Arbiter Component
and receive new path information , To send flit with new path
information to Header Modifier.
When the block receives request signal from the
input port, data is sent from the port.
As soon as the data is received , flit type is checked.
If the flit type is Head or Full type , then it checks for
Resource Bit condition.
If resource bit is 1, then it loads the data in destination
address which goes from junction to path table arbiter
else it goes into waiting state till it receives the
address with resource bit as 1 .
Further, if junction and resource control block is
getting signal from path table arbiter then this block
gets new path information from path table.
Junction and resource control concatenates the new
path information such that the first two bits are sent
behind the last 2 bits of path information.
Fli
t
Ty
p
e
R
B
J
B
Path
Informatio
n
Dest
.
Add
ress
P
ay
lo
a
d
2
b
i
t
s
1
b
i
t
1
b
i
t
16
bit
s
8
b
i
t
s
6
b
i
t
s
4. International Journal of Computer Applications Technology and Research
Volume 4– Issue 8, 623 - 628, 2015, ISSN: 2319–8656
www.ijcat.com 626
If the flits are Body or End type, then it goes into
waiting state till it receives Head or Full as flit type.
2.2 Arbiter and control
2.2.1 Path Table Arbiter
The main function of this block is to handle all the
new path information requests and forward them to
the path table, where the new path information is
generated.
Firstly, there is a request signal from Junction and
Resource Control block. Run an FSM to set priority
if data is coming from more than one direction:
o North -------- First
o South ------- Second
o West -------- Third
o East --------- Fourth
o Resource -- Last
Resource is given lowest priority to avoid entrance of
a new flit when present data is being processed.
As the request is accepted to be serviced, the
destination address is forwarded to the path table to
obtain new path information. Simultaneously, a read
signal is generated and forwarded to the path table.
The block remains in waiting state until a signal is
obtained from the path table.
As soon as this signal is obtained, signal is generated
and sent to Junction Resource Control block.
After this, the block enters the initial state of scanning
requests.
2.2.2 Path Table
Main function of this block is to forward the new path
information to the Junction and Resource Controller.
For this purpose, there is a new path information
created in the initial steps, input of destination
address from the Path Table Arbiter, payload from
the Input Port and an FSM is run to decide the
direction bits i.e. 001 for north, 010 for south, 011 for
west and 100 for east.
The above three are concatenated and stored in a
temporary register of 17 bits length.
This data is then written into a stack. Its operation is
similar to that of stack used in Input Port.
At positive transition of clock, the path info is
concatenated and written in the fifo,
As soon as a read signal is received, the data is sent
to the Junction and Resource Control block. After
this, a signal is sent to the Path Table Arbiter
indicating the completion of the task.
2.2.3 Arbiter using Round RobinAlgorithm:
Arbiter & Control is considered as the Brain of the router
because of its following functions described below:
handles request for output direction.
takes decision for output direction by decoding the
Head flit.
locking and unlocking the path.
checks the space in the buffer of next router.
To send signals for selecting the output direction.
To send signal to the next router or resource to save
data in buffer. [1]
Arbiter and Control makes use of Round robin Algorithm to
assign priority to directions/ routing of the data. There are 5
directions which needs to be considered while making this
router, North, South, West, East and Resource.
Figure7: FSM for using Round Robin Algorithm[2]
North- 1000
West- 0100
South- 0010
East- 0001
While using this algorithm assume a 3*3 mesh, resource will
be the 5th
router or the centre router, as discussed diagram
above. Hence resource direction has not been taken into
considerations. By using round Robin algorithm each state
checks for all signals from all directions and then passes the
signal according to their priority.
Highest priority is given to north, then west, south and east. The
direction into consideration is anti-clockwise.
Arbiter works in following way:
When it receives the signal from Header Modifier
which is a 4 bit data, the first 2 bits are used for
checking Flit type.
If the Flit type is head, it means that arbiter
needs to assign a direction for the flow of
data i.e. lock the path for data.
If the flit type is body or end, data follows
the path assigned/ the path which is locked.
If the flit type is full, it means that the data
transmission is over and the path should be
unlocked.
It checks from which direction Arbiter has received
the signal and accordingly assigns the next state.
Directions are assigned and used to avoid congestion
of Data.
When the direction the data is in the present state then
the path is locked. Locking of path takes place only
for flit type head.
Along with this select is also assigned some value of
3bits. These values are given to crossbar for deciding
the direction through which the output is expected.
For example if the Present State is ‘North’ then
select= 001 and select line for north=1, others are
assigned as 0.
This cycle continues till the data does not reach
destination.
5. International Journal of Computer Applications Technology and Research
Volume 4– Issue 8, 623 - 628, 2015, ISSN: 2319–8656
www.ijcat.com 627
Figure 8: Simulation Result of Arbiter. Flit type is Head,
North is given higher priority hence select=001 and, signal for
north goes high(p_n) and select line for north (sel_n) goes
high.
2.3 Crossbar
The main function of the crossbar is to send the data from one
path to the assigned path.
Select lines are assigned for choosing the direction or
path of data flow.
There are 5 select lines for 5 directions which are
controlled by Arbiter.
When the select line is known then data is collected
from the Header Modifier and sent out through the
same line.
For example, if select=001, which means North state
and in this state if west select line is high, then data
is collected from modifier and sent as data out from
west direction.
Figure 9 : Simulation report of Crossbar
2.4 Interfacing of the blocks
Verilog coding is usually done in segments and later a number
of smaller segments is integrated together to give a common
output. The process of interfacing involves the following
mentioned steps:
Writing the codes individually.
Creating a top module and calling the above
programs as instances in the top module.
Instantiating a program is calling the code is a
defined format, that is, module ‘name’
‘instance’(ports).
After all the codes are instantiated and added in the
top module group and a common simulation is
checked.
2.5 Conclusions
This work presented the implementation of router which is
divided into small blocks input port, header modifier , junction
and resource control , path table, path table arbiter, crossbar and
arbiter and control. The blocks were implemented through
Verilog codes using ISE XILINX version 14.6 software. The
simulation facilitates clear understanding of the functionality of
each block in the router for a network on chip.
Six blocks have been interfaced satisfactorily which includes
input port, header modifier, junction and resource control, path
table arbiter, arbiter and crossbar.
Interfacing of the 7th
block, Path Table is in the process.
6. International Journal of Computer Applications Technology and Research
Volume 4– Issue 8, 623 - 628, 2015, ISSN: 2319–8656
www.ijcat.com 628
Figure 10: Simulation Report of 6 blocks( Input port, Header Modifier, Junction and Resource Control, Path Table Arbiter,
Arbiter and Crossbar) have been interfaced together. The inputs are given to data_in pin in any direction required and the
output is obtained from data_out in the same direction as the input given.
3. ACKNOWLEDGMENTS
We would like to thank our mentor Ms. Priti Shahne for
her continuous support and giving us the opportunity to
work on this project.
4. REFERENCES
1. Muhammad Awais Aslam,” Router Architecture for
Junction Based source routing: design and FPGA
Prototyping”, Tekniska Hogskolan, 2011.
2. Jer-Min Jou and Yun-Lung Lee,” An Optimal Round-
Robin Arbiter Design for NoC”, Journal of Information
Science and Engineering,2010.
3. Tobias Bjerregaard and Shankar Mahadevan,” A
Survey of Research and Practices of Network-on-Chip”,
ACM computing surveys, 2006.
4. Ville Rantala, Teijo Lehtonen and Juha Plosila,
“Network on Chip Routing Algorithms”, TUCS technical
Report, 2006.
5. Stephen L. Chamberlin,” Design and implementation of
Router using Xilinx FPGA”, Massachusetts Institute of
Technology.
6. Sunil, Shaik Khadar Sharif, 3praveen Vanaparthy,
“Fpga Implementation of Five Port Router Network”,
International Journal of Engineering Development and
Research.
7. Adrijean Adriahantenaina, Hervé Charlery, Alain
Greiner, Laurent Mortiez, Cesar Albenes Zeferino, “SPIN:
a Scalable, Packet Switched, On-chip Micro-network”.
8. Samir Palnitkar, “Verilog- HDL, a guide to Digital and
Synthesis”.
9. J. Duato, S. Yalamanchili, and L. Ni, Interconnection
Networks: An Engineering Approach. IEEE Computer
Society Press, 1997.