This document summarizes a research paper on finding alternate paths in wireless networks using fast rerouting. It discusses how wireless ad hoc networks are self-configuring and nodes can join networks anywhere. Existing routing techniques have delays when links fail. The paper proposes calculating alternate paths instantly when a node fails to reduce packet loss. It would find a new path from the source to destination much faster than existing systems. When a node fails or does not respond, it would choose the next closest responding node and reroute packets along the new path immediately, without waiting for routing tables to update. This provides faster rerouting and recovery from link failures in wireless networks.
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
Network routing algorithms used today calculate least cost (shortest) paths between nodes. The cost of a path is the sum of the cost of all links on that path. The use of a single metric for adaptive routing is insufficient to reflect the actual state of the link. In general, there is a limitation on the accuracy of the link state information obtained by the routing protocol. Hence it becomes useful if two or more metrics can be associated to produce a single metric that can describe the state of the link more accurately. In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics; a fuzzy membership function is defined. The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path. And this paper investigates how three metrics, the mean link bandwidth, queue utilization and the mean link delay, can be related using a simple fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more „precise‟ than either of the single metric, to solve routing problem .
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...Editor IJCATR
For a successful route request in Mobile Ad-hoc Networks (MANETs), it is important to know that routing protocols work correctly.
On the other hand, this phenomenon acts randomly and it is not often possible to predict their act from one moment to the next. One
way for ensuring correct operation of the protocol is to develop a formal model and analyze it. Stochastic Petri Net (SPN) is a formal modeling
language which causes the analytical model to be a formal model. Also, prediction of future system's behavior is done in a shorter
time than simulation. In this paper, an analytical model based on SPN was presented for TAODV routing protocol. The results showed that
the analytical model acted like simulation model in terms of reliability, availability, and mean time to security failure parameters.
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Performance evaluation of various types of nodes in manet with dsr routing pr...eSAT Journals
Abstract Day by day, wireless communication popularity growing fast, it has led wireless communication data rates higher and made its prices cheaper, that’s why wireless communication is growing so fast. The latest technological demands now a day’s arising from laptops, wireless devices such as wireless local area networks (LANs) etc. In this paper we compared different types of node in MANET like static nodes, dynamic nodes and dynamic nodes with trajectory by using Dynamic routing protocol (DSR) and compared the performance of these nodes by using OPNET simulator 14.5. The performance is evaluated under different parameters like Data Dropped (Retry Threshold Exceeded), Load, Media access delay and Network Load by using FTP load. Keywords: MANET, Peak Value, Protocol, Trajectory.
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
A Mobile Ad-Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless
links, to form an arbitrary topology. The nodes are free to move arbitrarily in the topology. Thus, the
network's wireless topology may be random and may change quickly. An ad Hoc network is formed by
sensor networks consisting of sensing, data processing, and communication components. There is frequent
occurrence of congested links in such a network as wireless links inherently have significantly lower
capacity than hardwired links and are therefore more prone to congestion. Here we proposed a algorithm
which involves the reduction in the delay with the help of Request_set created on the basis of the location
information of the destination node. Across the paths found in the Route_reply (RREP) packets the load is
equally distributed
Fuzzy Optimized Metric for Adaptive Network RoutingCSCJournals
Network routing algorithms used today calculate least cost (shortest) paths between nodes. The cost of a path is the sum of the cost of all links on that path. The use of a single metric for adaptive routing is insufficient to reflect the actual state of the link. In general, there is a limitation on the accuracy of the link state information obtained by the routing protocol. Hence it becomes useful if two or more metrics can be associated to produce a single metric that can describe the state of the link more accurately. In this paper, a fuzzy inference rule base is implemented to generate the fuzzy cost of each candidate path to be used in routing the incoming calls. This fuzzy cost is based on the crisp values of the different metrics; a fuzzy membership function is defined. The parameters of these membership functions reflect dynamically the requirement of the incoming traffic service as well as the current state of the links in the path. And this paper investigates how three metrics, the mean link bandwidth, queue utilization and the mean link delay, can be related using a simple fuzzy logic algorithm to produce a optimized cost of the link for a certain interval that is more „precise‟ than either of the single metric, to solve routing problem .
Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic P...Editor IJCATR
For a successful route request in Mobile Ad-hoc Networks (MANETs), it is important to know that routing protocols work correctly.
On the other hand, this phenomenon acts randomly and it is not often possible to predict their act from one moment to the next. One
way for ensuring correct operation of the protocol is to develop a formal model and analyze it. Stochastic Petri Net (SPN) is a formal modeling
language which causes the analytical model to be a formal model. Also, prediction of future system's behavior is done in a shorter
time than simulation. In this paper, an analytical model based on SPN was presented for TAODV routing protocol. The results showed that
the analytical model acted like simulation model in terms of reliability, availability, and mean time to security failure parameters.
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
Ad hoc network is a network without centralized administration in which different users can communicate and exchange information. In such a structure, all the nodes participate in order to achieve the network and ensure the travel of the information. Hence, multihopping techniques are used to achieve this task. The communication reliability within an ad hoc network and how the different nodes act are managed by routing protocols. Nowadays, different types of protocols exist. Nevertheless, the source routing ones, based on information known at the source of the communication, seem to attract more studies. Source routing protocols had shown interesting results in realistic scenarios in areas such as military battlefields or airport stations.
This Paper deals with DSR Protocol and is focused on the multipath aspect of this routing protocol. Since, it is necessary to understand that multipath techniques enhance reliability and can ensure security. We have simulated a new multipath algorithm. The solution had been evaluated with the network Simulator 2. Since we want to know how our protocol reacts in different mobility cases, the random waypoint model which allows us to present relevant results, due to the fact this situation is taken into account.
Simulation results show that the multipath protocol behaves better than DSR, the main actual reactive protocol. The Proposed protocol MSR performs well in high mobility by using much less overhead than DSR. Additionally, it is interesting to see that DSR without any modifications manage poorly in high mobility situation.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Performance evaluation of various types of nodes in manet with dsr routing pr...eSAT Journals
Abstract Day by day, wireless communication popularity growing fast, it has led wireless communication data rates higher and made its prices cheaper, that’s why wireless communication is growing so fast. The latest technological demands now a day’s arising from laptops, wireless devices such as wireless local area networks (LANs) etc. In this paper we compared different types of node in MANET like static nodes, dynamic nodes and dynamic nodes with trajectory by using Dynamic routing protocol (DSR) and compared the performance of these nodes by using OPNET simulator 14.5. The performance is evaluated under different parameters like Data Dropped (Retry Threshold Exceeded), Load, Media access delay and Network Load by using FTP load. Keywords: MANET, Peak Value, Protocol, Trajectory.
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
A Mobile Ad-Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless
links, to form an arbitrary topology. The nodes are free to move arbitrarily in the topology. Thus, the
network's wireless topology may be random and may change quickly. An ad Hoc network is formed by
sensor networks consisting of sensing, data processing, and communication components. There is frequent
occurrence of congested links in such a network as wireless links inherently have significantly lower
capacity than hardwired links and are therefore more prone to congestion. Here we proposed a algorithm
which involves the reduction in the delay with the help of Request_set created on the basis of the location
information of the destination node. Across the paths found in the Route_reply (RREP) packets the load is
equally distributed
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
A Mobile Ad hoc Network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas others need the aid of intermediate nodes to route their packets. Each node has a wireless interface to communicate with each other. These networks are fully distributed, and can work at any place without the help of any fixed infrastructure as access points or base stations. Routing protocols are divided into two broad classes – Reactive and Proactive. In Reactive or on demand routing protocols the routes are created only when they are needed. The application of this protocol can be seen in the Dynamic Source Routing Protocol (DSR) and the Ad-hoc On-demand Distance Vector Routing Protocol (AODV). Wherein Proactive or Table-driven routing protocols the nodes keep updating their routing tables by periodical messages. OPSR proposes a proactive mechanism in source routing.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Improving the scalability by contact information compression in routingijitjournal
The existence of reduced scalability and delivery leads to the development of scalable routing by contact
information compression. The previous work dealt with the result of consistent analysis in the performance
of DTN hierarchical routing (DHR). It increases as the source to destination distance increases with
decreases in the routing performance. This paper focuses on improving the scalability and delivery through
contact information compression algorithm and also addresses the problem of power awareness routing to
increase the lifetime of the overall network. Thus implementing the contact information compression (CIC)
algorithm the estimated shortest path (ESP) is detected dynamically. The scalability and release are more
improved during multipath multicasting, which delivers the information to a collection of target
concurrently in a single transmission from the source.
Effective Path Identification Protocol for Wireless Mesh NetworksIDES Editor
Wireless Mesh Networks (WMNs) have emerged as
a key technology for next-generation wireless networking.
Routing is a key factor for transfer of packets from source to
destination. SrcRR is widely used protocol for transferring
packets from source to destination. This protocol often uses
Dijkstra’s algorithm on its link state database to find the next
alternative path to the destination when ever the ETX metric
of the link changes.This is a time consuming process if the
ETX metric of the links are changing frequently. So this paper
eliminates the use of Dijkistra’s algorithm and uses the a
search operation for finding the best paths.
Authentication of Secure Data Transmission In Wireless RoutingIJERA Editor
The major objective of our work is to explore a security enhanced dynamic routing algorithm based on distributed routing information widely supported in existing wired and wireless networks. The message authentication is the main area to be considered in WSN’s. Most of the wireless networks are attacked for detecting the data’s that are transmitted in between the users. We aim at the randomization of delivery paths for data transmission to provide considerably small path similarity (i.e., the number of common links between two delivery paths) of two consecutive transmitted packets. The proposed algorithm should be easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol (RIP) for wired networks and Destination-Sequenced Distance Vector (DSDV) protocol for wireless networks over existing infrastructures. These protocols shall not increase the number of control messages if the proposed algorithm is adopted. An analytic study will be presented for the proposed routing algorithm, and a series of simulation study will be conducted to verify the analytic results and to show the capability of the proposed algorithm.
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksijcsit
Considering the context of building management systems with wireless sensor networks monitoring
environmental features, this paper presents a proposal of a Fuzzy Logic Based Routing Algorithm (FLBRA)
to determine the cost of each link and the identification of the best routes for packet forwarding. We
describe the parameters (Received Signal Strength Indicator - RSSI, Standard Deviation of the RSSI and
Packet Error Rate - PER) for the cost definition of each path, the sequence of identifying best routes and
the results obtained in simulation. As expected in this proposal, the simulation results showed an increase
in the packet delivery rate compared to RSSI-based forward protocol (RBF).
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
Themain challengein wireless sensor network is to improve the fault tolerance of each
node and also provide an energy efficient fast data routing service. In this paper we propose an
energyefficient node fault diagnosis and recovery for wireless sensor networks referred as fault tolerant
multipath routing scheme for energy efficientwireless sensor network (FTMRS).The FTMRSis based on
multipath data routing scheme. One shortest path is use for main data routing in FTMRS technique and
other two backup paths are used as alternative path for faulty network and to handle the overloaded
traffic on main channel.Shortest path data routing ensures energy efficient data routing. The
performance analysis of FTMRSshows better results compared to other popular fault tolerant techniques
in wireless sensor networks.
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKIJCNCJournal
In the Wireless Sensor Network (WSN), sensor nodes are connected together through radio frequency (RF).Routing protocol is used to transmit data among sensor nodes. In the paper, we proposed a new routing protocol based on LEACH protocol. This is energy-efficient clustering algorithm. The proposed protocol enlarges WSN life-time by considering remaining energy and distance from nodes to BS in the election of cluster head. Comparing the result simulation between LEACH and proposed protocol showed that proposed protocol will prolong the network life-time.
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemIDES Editor
Kademlia is a structured peer-to-peer (P2P)
application level network, which implements a distributed
hash table (DHT). Its key-value storage and lookup service is
made efficient and reliable by its well-designed binary tree
topology and dense mesh of connections between participant
nodes. While it can carry out data storage and retrieval in
logarithmic time if the key assigned to the value in question
is precisely known, no complex queries of any kind are
supported. In this article a broadcast algorithm for the
Kademlia network is presented, which can be used to
implement such queries. The replication scheme utilized is
compatible with the lookup algorithm of Kademlia, and it
uses the same routing tables. The reliability (coverage) of the
algorithm is increased by assigning the responsibility of
disseminating the broadcast message to many nodes at the
same time. The article presents a model validated with
simulation as well. The model can be used by nodes at runtime
to calculate the required level of replication for any desired
level of coverage. This calculation can take node churn, packet
loss ratio and the size of the overlay into account.
On the routing overhead in infrastructureless multihop wireless networksNarendra Singh Yadav
Routing in infrastructureless multihop wireless networks is a challenging task and has received a vast amount of attention from researchers. This has lead to development of many different routing protocols each having their own superiorities and pitfalls making it very difficult to decide on a better protocol under vulnerable scenarios in such networks. In this paper the performance of three routing protocols (DSR, AODV and CBRP) in terms of routing overhead in bytes and in packets is presented under growing density and varying mobility in different traffic conditions. The simulation results show that CBRP outperforms both DSR and AODV in all scenarios.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Shortest Tree Routing With Security In Wireless Sensor NetworksIJERA Editor
We propose STR to resolve the main reasons of overall network performance degradation of ZTR, which are the detour path problem and the traffic concentration problem. Second, we prove that the 1-hop neighbor nodes used by STR improve the routing path efficiency and alleviate the traffic load concentrated on tree links in ZTR. Third, we analyze the performance of ZTR, STR, and AODV by differentiating the network conditions such as network density, ZigBee network constraints, traffic types, and the network traffic. For modification security purpose we are also encrypting the data packets during transmission. So that the intermediate nodes are not able to view the data during transmission. For Encryption process, we are using RC4 Algorithm. Short cut tree routing is used for minimizing the routing path from source to destination.
Optimised Proactive Link State Routing For DOS Attack PreventionEditor IJCATR
A Mobile Ad hoc Network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate, whereas others need the aid of intermediate nodes to route their packets. Each node has a wireless interface to communicate with each other. These networks are fully distributed, and can work at any place without the help of any fixed infrastructure as access points or base stations. Routing protocols are divided into two broad classes – Reactive and Proactive. In Reactive or on demand routing protocols the routes are created only when they are needed. The application of this protocol can be seen in the Dynamic Source Routing Protocol (DSR) and the Ad-hoc On-demand Distance Vector Routing Protocol (AODV). Wherein Proactive or Table-driven routing protocols the nodes keep updating their routing tables by periodical messages. OPSR proposes a proactive mechanism in source routing.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Improving the scalability by contact information compression in routingijitjournal
The existence of reduced scalability and delivery leads to the development of scalable routing by contact
information compression. The previous work dealt with the result of consistent analysis in the performance
of DTN hierarchical routing (DHR). It increases as the source to destination distance increases with
decreases in the routing performance. This paper focuses on improving the scalability and delivery through
contact information compression algorithm and also addresses the problem of power awareness routing to
increase the lifetime of the overall network. Thus implementing the contact information compression (CIC)
algorithm the estimated shortest path (ESP) is detected dynamically. The scalability and release are more
improved during multipath multicasting, which delivers the information to a collection of target
concurrently in a single transmission from the source.
Effective Path Identification Protocol for Wireless Mesh NetworksIDES Editor
Wireless Mesh Networks (WMNs) have emerged as
a key technology for next-generation wireless networking.
Routing is a key factor for transfer of packets from source to
destination. SrcRR is widely used protocol for transferring
packets from source to destination. This protocol often uses
Dijkstra’s algorithm on its link state database to find the next
alternative path to the destination when ever the ETX metric
of the link changes.This is a time consuming process if the
ETX metric of the links are changing frequently. So this paper
eliminates the use of Dijkistra’s algorithm and uses the a
search operation for finding the best paths.
Authentication of Secure Data Transmission In Wireless RoutingIJERA Editor
The major objective of our work is to explore a security enhanced dynamic routing algorithm based on distributed routing information widely supported in existing wired and wireless networks. The message authentication is the main area to be considered in WSN’s. Most of the wireless networks are attacked for detecting the data’s that are transmitted in between the users. We aim at the randomization of delivery paths for data transmission to provide considerably small path similarity (i.e., the number of common links between two delivery paths) of two consecutive transmitted packets. The proposed algorithm should be easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol (RIP) for wired networks and Destination-Sequenced Distance Vector (DSDV) protocol for wireless networks over existing infrastructures. These protocols shall not increase the number of control messages if the proposed algorithm is adopted. An analytic study will be presented for the proposed routing algorithm, and a series of simulation study will be conducted to verify the analytic results and to show the capability of the proposed algorithm.
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networksijcsit
Considering the context of building management systems with wireless sensor networks monitoring
environmental features, this paper presents a proposal of a Fuzzy Logic Based Routing Algorithm (FLBRA)
to determine the cost of each link and the identification of the best routes for packet forwarding. We
describe the parameters (Received Signal Strength Indicator - RSSI, Standard Deviation of the RSSI and
Packet Error Rate - PER) for the cost definition of each path, the sequence of identifying best routes and
the results obtained in simulation. As expected in this proposal, the simulation results showed an increase
in the packet delivery rate compared to RSSI-based forward protocol (RBF).
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
Themain challengein wireless sensor network is to improve the fault tolerance of each
node and also provide an energy efficient fast data routing service. In this paper we propose an
energyefficient node fault diagnosis and recovery for wireless sensor networks referred as fault tolerant
multipath routing scheme for energy efficientwireless sensor network (FTMRS).The FTMRSis based on
multipath data routing scheme. One shortest path is use for main data routing in FTMRS technique and
other two backup paths are used as alternative path for faulty network and to handle the overloaded
traffic on main channel.Shortest path data routing ensures energy efficient data routing. The
performance analysis of FTMRSshows better results compared to other popular fault tolerant techniques
in wireless sensor networks.
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKIJCNCJournal
In the Wireless Sensor Network (WSN), sensor nodes are connected together through radio frequency (RF).Routing protocol is used to transmit data among sensor nodes. In the paper, we proposed a new routing protocol based on LEACH protocol. This is energy-efficient clustering algorithm. The proposed protocol enlarges WSN life-time by considering remaining energy and distance from nodes to BS in the election of cluster head. Comparing the result simulation between LEACH and proposed protocol showed that proposed protocol will prolong the network life-time.
Packet Loss and Overlay Size Aware Broadcast in the Kademlia P2P SystemIDES Editor
Kademlia is a structured peer-to-peer (P2P)
application level network, which implements a distributed
hash table (DHT). Its key-value storage and lookup service is
made efficient and reliable by its well-designed binary tree
topology and dense mesh of connections between participant
nodes. While it can carry out data storage and retrieval in
logarithmic time if the key assigned to the value in question
is precisely known, no complex queries of any kind are
supported. In this article a broadcast algorithm for the
Kademlia network is presented, which can be used to
implement such queries. The replication scheme utilized is
compatible with the lookup algorithm of Kademlia, and it
uses the same routing tables. The reliability (coverage) of the
algorithm is increased by assigning the responsibility of
disseminating the broadcast message to many nodes at the
same time. The article presents a model validated with
simulation as well. The model can be used by nodes at runtime
to calculate the required level of replication for any desired
level of coverage. This calculation can take node churn, packet
loss ratio and the size of the overlay into account.
On the routing overhead in infrastructureless multihop wireless networksNarendra Singh Yadav
Routing in infrastructureless multihop wireless networks is a challenging task and has received a vast amount of attention from researchers. This has lead to development of many different routing protocols each having their own superiorities and pitfalls making it very difficult to decide on a better protocol under vulnerable scenarios in such networks. In this paper the performance of three routing protocols (DSR, AODV and CBRP) in terms of routing overhead in bytes and in packets is presented under growing density and varying mobility in different traffic conditions. The simulation results show that CBRP outperforms both DSR and AODV in all scenarios.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Shortest Tree Routing With Security In Wireless Sensor NetworksIJERA Editor
We propose STR to resolve the main reasons of overall network performance degradation of ZTR, which are the detour path problem and the traffic concentration problem. Second, we prove that the 1-hop neighbor nodes used by STR improve the routing path efficiency and alleviate the traffic load concentrated on tree links in ZTR. Third, we analyze the performance of ZTR, STR, and AODV by differentiating the network conditions such as network density, ZigBee network constraints, traffic types, and the network traffic. For modification security purpose we are also encrypting the data packets during transmission. So that the intermediate nodes are not able to view the data during transmission. For Encryption process, we are using RC4 Algorithm. Short cut tree routing is used for minimizing the routing path from source to destination.
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
The growth in wireless communication technologies has resulted in a considerable amount of
attention given to mobile adhoc networks. All mobile hosts in an adhoc network are embedded with
packet forwarding capabilities. It is decentralized and is independent of infrastructure. Since mobile
hosts in an adhoc network usually move freely, the topology of the network changes dynamically and
disconnection occurs frequently. These characteristics require the routing protocols to find an
alternative path towards the destination for data transfer. The existing on-demand routing protocols
does the alternative path establishment only after the disconnection of links in the existing path. The
data sent by the source during alternate path establishment period will be lost leading to incomplete
data transfer. The network traffic will therefore increase considerably. This problem can be overcome
by establishing an alternative path when the existing path is more likely to be broken, by sending a
warning message to the source indicating the likelihood of disconnection. In this paper an attempt has
been made to analyze a protocol that improves the network connectivity by preempting the alternative
path before the existing link gets failed by monitoring the signal strength and ‘age of the path’.
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
Reliability is playing very vital role in some application of Wireless Sensor Networks
and multipath routing is one of the ways to increase the probability of reliability. More over energy
consumption is constraint. In this paper, we provide a survey of the state-of-the-art of proposed
multipath routing algorithm for Wireless Sensor Networks. We study the design, analyze the tradeoff
of each design, and overview several presenting algorithms.
Gateway Forwarding Schemes For Manet-Internet Connectivityijsrd.com
In the real world one of the most important challenge for the broad implementation of mobile ad hoc network (MANET) technology is the finding way to capably interconnect them with the Internet. Yet, such interconnections are very difficult due to differences in mobility, addressing and routing between MANETs and reside IP networks. Imprecise address and routing techniques are hard to integrate. In this paper we propose the half tunnels as a powerful transition technique to integrate various networks. In this paper, we will also discuss some existing solutions like default routes host route etc to interconnect MANETs with the Internet, but on analysis we find them lacking in robustness and flexibility. For example, many solutions do not consider the presence of multiple gateways, and in such scenarios they either fail, or are less efficient due to the lack of multi-homing capabilities.
Placate packet dropping attack using secure routing protocol and incentive ba...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Mobility is one of the basic features that define an ad hoc network, an asset that leaves the field
free for the nodes to move. The most important aspect of this kind of network turns into a great
disadvantage when it comes to commercial applications, take as an example: the automotive
networks that allow communication between a groups of vehicles. The ad hoc on-demand
distance vector (AODV) routing protocol, designed for mobile ad hoc networks, has two main
functions. First, it enables route establishment between a source and a destination node by
initiating a route discovery process. Second, it maintains the active routes, which means finding
alternative routes in a case of a link failure and deleting routes when they are no longer
desired. In a highly mobile network those are demanding tasks to be performed efficiently and
accurately. In this paper, we focused in the first point to enhance the local decision of each node
in the network by the quantification of the mobility of their neighbours. Quantification is made
around RSSI algorithm a well known distance estimation method.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
In Mobile ad-hoc network, nodes must cooperate to achieve the routing purposes. Node misbehaviour due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. In this paper, we propose a Two node-disjoint Routes protocol for Isolating Dropper Node in MANET (TRIDNT) to deal with misbehaviour in MANET. TRIDNT allows some degree of selfishness to give an incentive to the selfish nodes to declare itself to its neighbours, which reduce the misbehaving nodes searching time. In TRIDNT two node-disjoint routes between the source and destination are selected based on their trust values. We use both DLL-ACK and end-to-end TCP-ACK to monitor the behaviour of routing path nodes: if a malicious behaviour is detected then the path searching tool starts to identify the malicious nodes and isolate them. Finally by using a mathematical analysis we find that our proposed protocol reduces the searching time of malicious nodes comparing to the route expected life time, and avoids the isolated misbehaving node from sharing in all future routes, which improve the overall network throughput.
Abstract— A MANETs is a self-configuring network is a collection of mobile hosts that are connected via a wireless link. Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networks. Opportunistic data forwarding is the lack of an efficient, lightweight proactive routing scheme with strong source routing capability. In this project proposed to a lightweight proactive source routing (PSR) protocol. PSR can be maintained at different network topology information than distance vector (DV), link state (LS), optimized link State routing (OLSR), then reactive source routing [e.g., dynamic source routing (DSR)]. In this project concentrate on reducing the overhead at the base line protocols, then testing to the better data transportation. Network Simulator (NS-2) help in testing and implementing to this project for effectively reduced to the overhead in the data transportation.
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...pijans
An Ad hoc Network is a pool of wireless mobile node
s energetically forming a network without the use o
f
any pre-accessible network infrastructure or centra
lized administrator. These nodes communicate with
each other by hop-to-hop communication. This dynami
c topology of mobile ad-hoc networks (MANETs)
allows nodes to get attached and leave the network
at any second of time. Thus MANET can be used in a
variety of fields. Current MANETs are designed prim
ary for military utility. This generic characterist
ic of
MANET has rendered its vulnerability to security at
tacks. Due to which unprotected attacks of the
malicious nodes can occur at any time. This paper f
ocuses on one such attack known as “Black hole
attack” and the routing protocol being used here is
AODV
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
1. International Journal of Research in Advent Technology, Vol.4, No.2, February 2016
E-ISSN: 2321-9637
Available online at www.ijrat.org
62
Alternating Path Finding using Fast Reroute in Wireless
Network
Pragya L.S Balley, Prof. Chaitrali Chaudhari
Department of Computer Engineering, Lokmanya Tilak College of engineering, Mumbai University,
Navi Mumbai, India
Email:priya.balley34@gmail.com, chaitralichaudhari@rediffmail.com
Abstract-A wireless ad hoc network is a demoralization type of wireless network. The network is adhoc because
it does not rely on a prior infrastructure, such as routers in wired networks or access points in managed
(infrastructure) wireless networks [1]. Instead, In these each node of the graph participates in communication for
routing by forwarding the data for the remaining other nodes, so the determination of which nodes forward data
is made domical on the basis of network affinity. Wireless mobile ad hoc networks are self-configuring
,progressive networks in which nodes are free to move. Wireless networks lack the convolution of infrastructure
setup and administration, enabling devices to create and join networks anywhere, anytime [2].In these
decentralization nature of the wireless network has make them ethical for using it in number of applications
where as overriding nodes cannot be relied on the network [3]. Minimum number of configuration and cursory
deployment make ad hoc networks suitable for agile situations like natural disasters or military conflicts. The
presence of adaptive routing protocols enables ad hoc networks to be formed expeditious.
Index Terms-Fast reroute; adhoc network ; Routing protocols; alternate routing; wireless network
1. INTRODUCTION
Today the world is rapidly changing and technology
is zooming exponentially, the number of users of
internet is also increasing rapidly which cause increase
in traffic and causes more no of failures in
transmission of packets [1]. The backbone process of
the global internet or any internal network is Routing
.Existing routing techniques includes static and
dynamic routing which are implemented using routing
algorithms like RIP, EIGRP, OSPF, IS-IS. These
routing algorithms intelligently route the packets on
the network. There are many scenarios where a packet
is sent, the routing algorithm finds an appropriate path
for the packet, routes it and it is delivered. There are
cases where packets do not get delivered because of
many reasons like link failures [4]. A method to find
an back up path, after a link failure happened from a
source node to a target node is to reroutes the data
packet by notifying the sender which takes minimum
about 100 mille second. A smarter way to deliver the
packet is to reroute the packets from the last
successful node.
1.1 Routing
Routing is the process of selecting best paths in a
network [1]. In the past, the term routing was also
used to mean forwarding network traffic among
networks.
1.2 Rerouting
It could cause the route instability and supply the
interruption before routing tables at all routers
converge to new routes. Fast reroute extensions [2]
have been proposed within the IETF to reduce the
adverse effects of link or node breakdown by timely
invoking the pre-computed repair paths.
1.3 Module Descriptions
1.3.1 Topology/Network construction
1. Node initialization
This admin will create the network or topology of 5 to
7 nodes by entering the node name, port no, and Ip
address.
2. Network construction
In this module admin will enter the source name,
destination name and node weights for each node for
creating the network.
1.3.2 Network Communication
2. Packet Sender
In this module sender will select user to which node he
want to send the file (In The form of packet).
3. Shortest Path Generation Algorithm
In this module the shortest path between the source
and destination will be generated and then that path
will be displayed.
4. Routing Table generation
2. International Journal of Research in Advent Technology, Vol.4, No.2, February 2016
E-ISSN: 2321-9637
Available online at www.ijrat.org
63
In this module the by using the shortest path and all
the network id, next hop the routing table will be
generated.
5. Packet Receiver
In this module the destination node will show the
received packet and also intermediate path node will
receive the packet and displayed.
6. Link Failure Detection
Link break between source and destination is analyzed
to check path fail. If it is so then that path will be
displayed in GUI and the packet will be send on
alternate shortest path from source to destination.
2. EXISTING SYSTEM
In our previous works [4], we introduced an IP fast
reroute technology for unicast link state routing
protocols using the theory of remote LFAP (Loop Free
Alternative method ) to achieve full substitute path
analysis under a single link failure with a minimal
additional complexity[5].In this scheme ,while the
elemental routing protocols detect and react to
topology changes in longer time scales. It does not
guaranteed to find an alternate route, even if one path
already exists.
3. PROPOSED SYSTEM
In these we find alternate method for finding an
alternate path during link failure. The current FRR’s do
not provide an adequate mechanism for technique to re-
route packets of link failure. To overcome this a FRR is
needed that calculates shortest paths instantaneous .In
this method an alternate route is found out instantly
after a node Failure, and updating the routing table of
other nodes according to the new route.
We are providing the path at the time of node
failure or data is not forwarding to other node as it does
not communicate. Than new path is provided for
communication .For example If source node want to
communicate with sink node. but due to link failure the
data or packet is not forwarding .At this we are
providing the alternate path, we can understand these in
given points are such as-
1. Whenever a node fail than instead of going to
source node from where the communication is
started, It goes to its previous node.
2. Than the previous node choose the other path for
communication with sink node.
3. First of it collect all the information of the
remaining node.
4. It wait for there response and then communication
started.
5. It inform all the node that we have (n-1) path to
communicate.
6. Than by applying shortest path algorithm choose
the path.
7. So we can say that we have much easier path
communication, these can be explain with graph
diagram which is given below:-
3.1 Graph diagram
The fast reroute method would establish a new path
from the source to destination node in a much lesser
time than the existing system do it. Firstly we see the
diagram so that we can understand it in a more proper
way .Its shown below:-
3.1.1Node description
So: Source Node
A: Node A
B: Node B
C: Node C
D: Node D
E: Node E also attacker node
Si: Sink Node
Hence, we have many paths to reach the destination
node from source node (shown in fig 1.0).
fig 1.0
3.2 Fast route-valid path
First in which communication is done without any
dropage of package or data. As according to given
3. International Journal of Research in Advent Technology, Vol.4, No.2, February 2016
E-ISSN: 2321-9637
Available online at www.ijrat.org
64
diagram, hope count (number of nodes) here the
shortest path will be [source node , node B, node E,
sink node].
3.3 Fast Reroute-invalid path
In these we have shown that while communication is
going on and they can across a problem that one of
the node of the network is not responding, Thus two
criteria could be created such as:-
a) In fist case if there is node fail or not
responding for much longer time then it could
mean that some else attacker is trying to
access the data from these node ,thus these is
called as attacker node. At these time we can
follow the fast reroute method.
b) Second case is that due to some reason it
does not follow the path or not able to
forward the packet. Than it goes to previous
node and communication started again.
Example
Suppose here node E is failed due to some reason
than It is known as invalid or attacker path, As it
could be possible that may be some else is trying to
access the data from network through node E due to
which it is not responsing.So node E can be called
as attacker node.
3.4 Equal cost and multiple path
One of the oldest and elementary of IP fast reroute
techniques is Equal Cost Multiple Path (ECMP) [5],
which is an extension enabled in the majority of
today’s networks. ECMP is usable in those cases when
more than one (different) shortest paths are available
towards a destination [6].
The traffic is distributed equally among the paths by
default, offering increased bandwidth. Additionally,
when a failure occurs on one path, routers equity the
traffic among the remaining routes. ECMP is easy to
implement, but it works only when multiple paths of
equal cost are convenient between the source and
destination [7].
3.5 Equal cost and multiple path implementation
a) In these method it could choose the path but as we
know that we have the problem of choosing the failure
path again. thus it increase the time to transfer the
packets. we can remove this problem by removing
these from the network.
b) So we see that we have remaining (n-1) path for
communication.
c) Thus it reduces the time by not going the same path
again.
d) We have implemented that we choose the next path
on the basis of the time priority which ever generated
or activated first has been choose for the
communication.
3.6 Shortest Path
Given a vertex, say vertex (that is, a source), this field
describes the shortest path algorithm.
The general algorithm is:
1. We will Initialize the array basic Weight so that
basic weight[u] = weights [vertex, u].
2. In these set basic weight [vertex] = 0.
3. Find the vertex, v, that is closest to vertex for which
the precise path has not been determined.
4. Mark v as the (next) apex for which we get the
precise weight.
5. For each vertex w in G, it will be such that the
precise path from vertex to w has not been resolve and
an edge (v, w) exists, if the weight of the path to w via
v is smaller than its current weight, change the weight
of w to the weight of v + the weight of the edge (v,
w).
4. ARCHITECTURE
The architecture of fast reroute can be shown as:-
.
4. International Journal of Research in Advent Technology, Vol.4, No.2, February 2016
E-ISSN: 2321-9637
Available online at www.ijrat.org
65
Figure shows the System Architecture
5. WORKING OF THE PROPOSED SYSTEM
In these we have implemented the path for reroute in
case of node failure. Process does not stop it further go
back to its previous node. From there retransmission
of the data packet is initiated .It does not go to source
node again.
5.1 Rerouting mechanism
We decided one node as Attacker node
1. First create the network structure.
2. Identify source and destination node.
3. Identify neighboring node connectivity for
each node as edges
4. For each edges of source node e
5. Initialize total weight = weight of current
edge(=1)
6. Initialize min_ weight as infinity
7. set v as next node of edge e
8. Set path = source, v
9. while v is not destination
10. Set f as next edge of v
11. Add weight of f to total weight
12. set v as next node of edge f
13. append v to path
14. end while
15. if total weight < min_ weight then
16. min_ weight = total weight
17. min_ path = path
18. end if
19. end for
20. Then transmit data on selected min_ path
21. If we choose the attacker status in attacker
node then if we find the attacker node in path
then packet is send back to its previous node
22. choose another path at previous node and
packet is sent to destination from other node.
5.2 Rerouting description
We decided one node as a Attacker node i.e Node E
1. First create the network structure.
2. Then choose the source node and destination
node.
3. Then we find the shortest path between them
using shortest path algorithm.
4. Then select txt file to send between them.
If we choose the attacker status in attacker node then
if we find the attacker node that is Node E in path
then packet is send back to its previous node and then
choose the another path and packet is sent to
destination.
Then the packet is sent from this path and received at
destination node destination node and source node
receives the response also.
6. CONCLUSION
We presented various network designs and backup
reconfiguration schemes for restoring multiple failures
using FRR. These are the first designs with formal
(worst case) guarantees of no loss of connectivity.
Although our proofs of correctness are complex, the
descriptions of the designs and protocols are simple.
Using a lower bound argument, we showed that one of
our constructions is nearly optimal in the number of
edges. A numerical evaluation showed that, e.g., a
5. International Journal of Research in Advent Technology, Vol.4, No.2, February 2016
E-ISSN: 2321-9637
Available online at www.ijrat.org
66
network graph with average degree 7 with 57%
overbuild can support failures of up to 4 edges.
We also conclude that we do not required the
expensive infrastructure, communication is possible in
much easier way. In these information is distributed
so ,By providing the path (n-1).It saves the time by
not following the same path in which node failure is
found.
7. FUTURE SCOPE
In future the implementation can be made more
optimize .The load which come on the previous node
at the time of node failure, It could be decrease by
giving the prior information from the source node to
the previous node of whose prior node is failed (here
previous node is D ,whenever node E is failed than all
the transmission started from node D) that how many
remaining neighboring nodes are connected and able
to transfer the packet or data.
REFERENCES
[1] A. Atlas, Ed.,“U-turn alternates for IP/LDP fast-
reroute,”IETFdraftatlas-ip-local-protect-uturn-03,
Feb. 2006.
[2] A. Atlas and A. Zinin, Eds., “Basic specification
for IP fast reroute: loop free alternative,” IETF
RFC 5286, Sept. 2008.
[3] S. Bryant, C. Filsfils, and M. Shand, “Remote LFA
FRR,” IETF Internet Draft draft-shand-remote-
lfa-00, Oct. 2011.
[4] C. Filsfils and P. Francois, Eds., “Loop-free
alternative (LFA) applicability in service provider
(SP) networks,” IETF RFC 6571, June 2012.
[5] E. M.Gafni and D. P. Bertsekas,“Distributed
algorithms for generating loop-free routes in
networks with frequently changing topology,”
IEEE Trans. Commun., vol. COM-29, pp. 11–18,
1981.
[6] I. Hussain, Fault-Tolerant IP and MPLS Networks.
Cisco Press,2005.
[7]A. Kvalbein, A. F. Hansen, T.ˇ Ciˇci´c, S. Gjessing,
and O. Lysne, “Multiple routing configurations
for fast IP network recovery,” IEEE/ACM Trans.
Netw., vol. 17, pp. 473–486, 2009.
[8] K. W. Kwong, L. Gao, R. A. Gu´erin, and Z.
Zhang, “On the feasibility and efficacy of
protection routing in IP networks,” IEEE/ACM
Trans. Netw., vol. 19, pp. 1543–1556, 2011.
[9] S. S. Lor, R. Ali, and M. Rio, “Recursive loop-
free alternates for full protection against transient
link failures,” in Proc.2010 IEEE Symp. On
Comput. and Commun., pp. 44–49.
[10] G. R´etv´ari, J. Tapolcai, G. Enyedi, and A.
Cs´asz´ar, “IP Fast Re Route: loop free alternates
revisited,” in Proc. 2011 IEEE Int. Conf. on
Comput. Commun., pp. 2948–2956.
[11] J.M.Welch and J.E. Walter Link Reversal
Algorithms. Morgan & Claypool Publishers,
2012.
.