In IP multicasting messages are sent from the source node to all destination nodes. In order to meet QoS requirements an optimizing algorithm is needed. We propose an Ant Colony Optimization algorithm to do so. Ants release a chemical called pheromone while searching for food. They are capable of finding shortest path to their target. This can give an effective optimal solution to our Multicast Routing Problem.
IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is often employed for streaming media applications on the Internet and private networks.(wikipedia)
Implementation of multicast communication in internet
Individual hosts are configured as members of different multicast groups
One particular user may a member of many multicast groups
For a one multicast can be few members/nodes
IP Multicast group is identified by Class D address (224.0.0.0 – 239.255.255.255)
Every IP datagram send to a multicast group is transferred to all members of group
IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission. It is often employed for streaming media applications on the Internet and private networks.(wikipedia)
Implementation of multicast communication in internet
Individual hosts are configured as members of different multicast groups
One particular user may a member of many multicast groups
For a one multicast can be few members/nodes
IP Multicast group is identified by Class D address (224.0.0.0 – 239.255.255.255)
Every IP datagram send to a multicast group is transferred to all members of group
Overview of IPv6 protocol along with various transition scenarios for the migration from IPv4 to IPv6
IPv6 is the current and future Internet Protocol standard. As anticipated, IPv4 addresses became exhausted around 2012.
The IP address scarcity is the main driver for IPv6 protocol adoption.
IPv6 defines a much larger address space that should be sufficient for the foreseeable future, even taking into account Internet of Things scenarios with zillions of small devices connected to the Internet.
IPv6 is, however, much more than simply an expansion of the address space. IPv6 defines a clean address architecture with globally aggregatable addresses thus reducing routing table sizes in Internet routers.
IPv6 extension headers provide a standard mechanism for stacking protocols such as IP, IPSec, routing headers and upper layer headers such as TCP.
ICMP (Internet Control Message Protocol) is already defined for IPv4. ICMP was totally revamped for IPv6 and as ICMPv6 provides common functions like IP address and prefix assignment.
Lack of business drivers for migrating to IPv6 is responsible for sluggish adoption of IPv6 in carrier and enterprise networks.
Numerous transition mechanisms were developed to ease the transition from IPv4 to IPv6. Many of these mechanisms are complex and difficult to administer.
The transition mechanisms can be coarsely classified into dual-stack, tunneling and translation mechanisms.
QoS AND ROUTING IN REGULAR WIRELESS MESH TOPOLOGYSyed Nizamudeen
Presented Paper at National conference on ADVANCED COMPUTING titled QoS AND ROUTING IN REGULAR WIRELESS MESH TOPOLOGY at PG and Research Department of Computer Science, Jamal Mohamed College (Autonomous), Tiruchirappalli-620020.
Overview of IPv6 protocol along with various transition scenarios for the migration from IPv4 to IPv6
IPv6 is the current and future Internet Protocol standard. As anticipated, IPv4 addresses became exhausted around 2012.
The IP address scarcity is the main driver for IPv6 protocol adoption.
IPv6 defines a much larger address space that should be sufficient for the foreseeable future, even taking into account Internet of Things scenarios with zillions of small devices connected to the Internet.
IPv6 is, however, much more than simply an expansion of the address space. IPv6 defines a clean address architecture with globally aggregatable addresses thus reducing routing table sizes in Internet routers.
IPv6 extension headers provide a standard mechanism for stacking protocols such as IP, IPSec, routing headers and upper layer headers such as TCP.
ICMP (Internet Control Message Protocol) is already defined for IPv4. ICMP was totally revamped for IPv6 and as ICMPv6 provides common functions like IP address and prefix assignment.
Lack of business drivers for migrating to IPv6 is responsible for sluggish adoption of IPv6 in carrier and enterprise networks.
Numerous transition mechanisms were developed to ease the transition from IPv4 to IPv6. Many of these mechanisms are complex and difficult to administer.
The transition mechanisms can be coarsely classified into dual-stack, tunneling and translation mechanisms.
QoS AND ROUTING IN REGULAR WIRELESS MESH TOPOLOGYSyed Nizamudeen
Presented Paper at National conference on ADVANCED COMPUTING titled QoS AND ROUTING IN REGULAR WIRELESS MESH TOPOLOGY at PG and Research Department of Computer Science, Jamal Mohamed College (Autonomous), Tiruchirappalli-620020.
Performance of genetic algorithm is flexible enough to make it applicable to a wide range of problems, such as the problem of placing N queens on N by N chessboard in order that no two queens can attack each other which is known as ‘n-Queens problem.
Lack of information about details of the problem made genetic algorithm confused in searching state space of the problem
If the number of spine switches were to be merely doubled, the effect of a single switch failure is halved. With 8 spine switches, the effect of a single switch failure only causes a 12% reduction in available bandwidth. So, in modern data centers, people build networks with anywhere from 4 to 32 spine switches. With a leaf-spine network, every server on the network is exactly the same distance away from all other servers – three port hops, to be precise. The benefit of this architecture is that you can just add more spines and leaves as you expand the cluster and you don't have to do any recabling. Intuition Systems will also get more predictable latency between the nodes.
As a trend, disaggregation seems to be most useful for very large companies like Facebook and Google, or cloud providers. The technology does not necessarily have significant implications for small or medium sized businesses. Historically, however, technology has a way of trickling down from the pioneering phases of existing only within large companies with tremendous resources, to becoming more standardized across the board.
Implementing multicast communication system making use of an existing data ne...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
MulticastingIt is the communication between a single sender and m.pdfsinghanubhav1234
Multicasting:
It is the communication between a single sender and multiple receivers on a network. Typical
uses include the updating of mobile workers from a home office and the episodic issuance of
online newsletters
IGMP works as:
Internet Group Management Protocol is allows a host to promote its multicast group membership
to adjacent switches and routers. IGMP is used by the TCP/IP protocol set to achieve dynamic
multicasting
When a multicast transmission initiates the software creates a multicast group. This multicast
group address consists of an IP address by the first octet in the range 224 – 239 and is particular
in the IP packet as the end address for this traffic. The host initiate the transmission send a
message to the 224.0.0.2 address specify the multicast group address. And the switch receives
this message and adds the multicast group to its table and adds the receiving port as a member of
the group.
PIM works as:
The PIM protocol can be configured to work on IPv4 and IPv6 networks.
Multicast protocols are used to carry multicast packets from one source to multiple receivers.
They ease better bandwidth use and use less host and router processing and ideal for usage in
applications such as video and audio. PIM is a usually used multicast routing protocol.
SDN:
Software Defined Networking is an upcoming architecture that is dynamic, manageable and
adaptable of making it perfect for the dynamic nature of today\'s applications.
Open Flow:
Open Flow is enable for researchers to run experimental protocols in the campus networks we
use every day. Open Flow is added as a feature to saleable Ethernet switches, routers and
wireless access points and provide a regular hook to allow researchers to run experiments
without require vendors to expose the inner workings of their network devices.
Solution
Multicasting:
It is the communication between a single sender and multiple receivers on a network. Typical
uses include the updating of mobile workers from a home office and the episodic issuance of
online newsletters
IGMP works as:
Internet Group Management Protocol is allows a host to promote its multicast group membership
to adjacent switches and routers. IGMP is used by the TCP/IP protocol set to achieve dynamic
multicasting
When a multicast transmission initiates the software creates a multicast group. This multicast
group address consists of an IP address by the first octet in the range 224 – 239 and is particular
in the IP packet as the end address for this traffic. The host initiate the transmission send a
message to the 224.0.0.2 address specify the multicast group address. And the switch receives
this message and adds the multicast group to its table and adds the receiving port as a member of
the group.
PIM works as:
The PIM protocol can be configured to work on IPv4 and IPv6 networks.
Multicast protocols are used to carry multicast packets from one source to multiple receivers.
They ease better bandwidth use and use less host and route.
Service performance and analysis in cloud computing extened 2Abdullaziz Tagawy
This is a study to the research paper (Service Performance and Analysis in Cloud Computing) by Kaiqi Xiong and Harry Perros in the class related to the course of EC636 Stochastic and Random Process in Tripoli University-Engineering faculty-Computer Engineering Department.
You can find this paper in (https://ieeexplore.ieee.org/document/5190711)
A solar cell (photovoltaic devices) is a pn junction device with no voltage directly applied across the junction (used with zero bias).
A photodiode is a pn junction diode operated with an applied reverse-biased voltage.
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Abdullaziz Tagawy
Network Management is define as monitoring, testing, configuring, and troubleshooting network components to meet a set of requirements defined by an organization.
The requirements include the smooth, efficient operation of the network that provides the predefined quality of service for users.
To accomplish this task, a network management system uses hardware, software, and humans.
IPsec provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet. Examples of its use include:
Secure branch office connectivity over the Internet
Secure remote access over the Internet
Establishing extranet and intranet connectivity with partners
Enhancing electronic commerce security
A second important technique in error-control coding is that of convolutional coding . In this type of coding the encoder output is not in block form, but is in the form of an encoded
sequence generated from an input information sequence.
convolutional encoding is designed so that its decoding can be performed in some structured and simplified way. One of the design assumptions that simplifies decoding
is linearity of the code. For this reason, linear convolutional codes are preferred. The source alphabet is taken from a finite field or Galois field GF(q).
Convolution coding is a popular error-correcting coding method used in digital communications.
The convolution operation encodes some redundant information into the transmitted signal, thereby improving the data capacity of the channel.
Convolution Encoding with Viterbi decoding is a powerful FEC technique that is particularly suited to a channel in which the transmitted signal is corrupted mainly by AWGN.
It is simple and has good performance with low implementation cost.
OFDM allows tightly packed carriers to convey information orthogonally and with high bandwidth efficiency
Objectives Description:
Concepts
Basic idea
Introduction to OFDM
Implementation
Advantages and Drawbacks.
FDMA
Solving QoS multicast routing problem using ACO algorithmAbdullaziz Tagawy
Many Internet multicast applications have stringent Quality-of-Service (QoS) requirements that include delay, loss rate, bandwidth, and delay jitter. In this paper, we present a Swarm intelligence based on Ant Colony Optimization (ACO) technique to optimize the multicast tree
Snapdragon is a family of mobile systems on a chip (SoC) by Qualcomm. Qualcomm considers Snapdragon a "platform" for use in smartphones, tablets, and smartbook devices.
ARM is a family of RISC-based microprocessors and microcontrollers designed by ARM Inc., Cambridge, England.
ARM chips are high-speed processors that are known for their small die size and low power requirements.
Networks must be able to transfer data from one device to another with acceptable
accuracy. For most applications, a system must guarantee that the data received are
identical to the data transmitted. Any time data are transmitted from one node to the
next, they can become corrupted in passage. Many factors can alter one or more bits of
a message. Some applications require a mechanism for detecting and correcting errors.
Some applications can tolerate a small level of error. For example, random errors
in audio or video transmissions may be tolerable, but when we transfer text, we expect
a very high level of accuracy.
At the data-link layer, if a frame is corrupted between the two nodes, it needs to be
corrected before it continues its journey to other nodes. However, most link-layer protocols
simply discard the frame and let the upper-layer protocols handle the retransmission
of the frame. Some multimedia applications, however, try to correct the corrupted frame.
This chapter is divided into five sections.
❑ The first section introduces types of errors, the concept of redundancy, and distinguishes
between error detection and correction.
❑ The second section discusses block coding. It shows how error can be detected
using block coding and also introduces the concept of Hamming distance.
❑ The third section discusses cyclic codes. It discusses a subset of cyclic code, CRC,
that is very common in the data-link layer. The section shows how CRC can be
easily implemented in hardware and represented by polynomials.
❑ The fourth section discusses checksums. It shows how a checksum is calculated for
a set of data words. It also gives some other approaches to traditional checksum.
❑ The fifth section discusses forward error correction. It shows how Hamming distance
can also be used for this purpose. The section also describes cheaper methods
to achieve the same goal, such as XORing of packets, interleaving chunks, or
compounding high and low resolutions packets.
The TCP/IP protocol suite does not define any protocol in the data-link layer or
physical layer. These two layers are territories of networks that when connected
make up the Internet. These networks, wired or wireless, provide services to the upper
three layers of the TCP/IP suite. This may give us a clue that there are several standard
protocols in the market today. For this reason, we discuss the data-link layer in several
chapters. This chapter is an introduction that gives the general idea and common issues
in the data-link layer that relate to all networks.
❑ The first section introduces the data-link layer. It starts with defining the concept
of links and nodes. The section then lists and briefly describes the services provided
by the data-link layer. It next defines two categories of links: point-to-point
and broadcast links. The section finally defines two sublayers at the data-link layer
that will be elaborated on in the next few chapters.
❑ The second section discusses link-layer addressing. It first explains the rationale
behind the existence of an addressing mechanism at the data-link layer. It then
describes three types of link-layer addresses to be found in some link-layer protocols.
The section discusses the Address Resolution Protocol (ARP), which maps
the addresses at the network layer to addresses at the data-link layer. This protocol
helps a packet at the network layer find the link-layer address of the next node for
delivery of the frame that encapsulates the packet. To show how the network layer
helps us to find the data-link-layer addresses, a long example is included in this
section that shows what happens at each node when a packet is travelling through
the Internet.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2. In IP multicasting messages are sent from the
source node to all destination nodes. In
order to meet QoS requirements an
optimizing algorithm is needed. We propose
an Ant Colony Optimization algorithm to do
so. Ants release a chemical called
pheromone while searching for food. They
are capable of finding shortest path to their
target. This can give an effective optimal
solution to our Multicast Routing Problem.
Abstract
4. INTRODUCTION
sending a packet from a source to the
members of a multicast group is referred to as
multicasting.
Unlike IP multicasting, IP unicasting sends a
separate datagram to each recipient host.
IP broadcasting sends a single datagram to
all hosts on a single network segment (also
known as subnet), even to those not interested
in receiving it.
DEFINITION :
6. INTRODUCTION
Multicasting has a number of practical applications. For
example : -
1) Multimedia: A number of users “tune in” to a video or
audio transmission from a multimedia source station .
2) Teleconferencing: A group of workstations form a
multicast group such that a transmission from any member
is received by all other group members.
3) Database: All copies of a replicated file or database are
updated at the same time.
4) Distributed computation: Intermediate results are sent to
all participants.
5) Real-time workgroup: Files, graphics, and messages are
exchanged among active group members in real time.
`
DEFINITION :
7. INTRODUCTION
IPv4 and IPv6 each assign a block of
addresses for this purpose.
In IPv4, Class D addresses are reserved for
Multicasting . These are 32-bit addresses with
1110 as their high-order 4 bits, followed by a
28-bit group identifier.
DEFINITION : Function
Requirements
8. INTRODUCTION
In IPv6, a 128-bit multicast address consists of
an 8-bit prefix of all ones, a 4-bit flags field, a
4-bit scope field, and a 112-bit group identifier .
DEFINITION : Function
Requirements
9. INTRODUCTION
A router must translate between an IP multicast
address and a network multicast address in order
to deliver a multicast IP datagram on the
destination network .
in IEEE 802 networks, a MAC-level address is 48
bits long; if the highest-order bit is 1, then it is a
multicast address. Thus, for multicast delivery, a
router attached to an IEEE 802 network must
translate a 32-bit IPv4 or a 128-bit IPv6 multicast
address into a 48-bit IEEE 802 MAC-level
DEFINITION : Function
Requirements
12. INTRODUCTION
A network must be enabled for multicasting,
as follows:
1) Hosts must be configured to send and
receive multicast data
2) Routers must support the Internet Group
Membership Protocol (IGMP), multicast
forwarding, and multicast routing protocols
DEFINITION :
13. INTRODUCTION
Internet Group Management Protocol (IGMP)
is used by hosts and routers to exchange
multicast group membership information over a
LAN .
IGMP supports two principal operations:
1) Hosts send messages to routers to subscribe
to and unsubscribe from a multicast group
defined by a given multicast address.
2) Routers periodically check which multicast
groups are of interest to which hosts.
IGMP :
14. INTRODUCTION
All IGMP messages are transmitted in IP
datagrams. The current version (IGMPv3)
defines two message types: Membership
Query and Membership Report.
IGMP : Message Format
15. INTRODUCTION
Membership Query message is sent by a multicast router.
There are three subtypes :-
1) General query, used to learn which groups have
members on an attached network.
2) Group-specific query, used to learn if a particular
group has any members on an attached network.
3) Group-and-source-specific query, used to learn if any
attached device desires reception of packets sent to a
specified multicast address, from any of a specified list
of sources.
Membership Report message is sent by a host as a
response to a query message.
IGMP : Message Format
16. INTRODUCTION
To support multicasting in an internetwork, the
hosts and routers must be multicast-enabled.
In an IP multicast-enabled intranet, any host
can send IP multicast datagrams, and any
host can receive IP multicast datagrams,
including sending and receiving across the
Internet.
WORKING :
17. INTRODUCTION
The source host sends multicast datagrams
to a single Class D IP address, known as the
group address.
Any host that is interested in receiving the
datagrams contacts a local router to join the
multicast group and then receives all
subsequent datagrams sent to that address.
WORKING :
18. INTRODUCTION
Routers use a multicast routing protocol to
determine which subnets include at least one
interested multicast group member and to
forward multicast datagrams only to those
subnets that have group members or a router
that has downstream group members.
WORKING :
20. INTRODUCTION
ARCHITECTURE :
Component Description
Host (source or receiver)
A host is any client or server on the
network. A multicast-enabled host is
configured to send and receive (or
only send) multicast data.
Router A multicast router is capable of
handling host requests to join or
leave a group and of forwarding
multicast data to subnets that
contain group members.
21. INTRODUCTION
ARCHITECTURE :
Component Description
Multicast address A Class D IP address used for
sending IP multicast data. An IP
multicast source sends the data to a
single multicast address, as
described later in this section. A
specific IP multicast address is also
known as group address.
Multicast group A multicast group is the set of hosts
that listen for a specific IP multicast
address. A multicast group is also
known as a host group.
MBone The Internet multicast backbone, or
the portion of the Internet that
23. RELATED WORK
Anycast is a communication technique
between a single sender and nearest of
several receivers of group. It exists in the
contradistinction to multicast, communication
between a single sender and multiple
receivers, and unicast, communication
between a single sender and a single
receiver in a network.
ANYCAST :
24. RELATED WORK
An anycast packet is delivered to one of
these nodes with the same anycast address.
Like a multicast address, a single anycast
address is assigned to multiple nodes (called
anycast membership), but unlike
multicasting, only one member of the
assigned anycast address communicates
with the originator at a time.
ANYCAST :
25. RELATED WORK
was unknown until IPv6 made it a standard
connection type. Anycast is not standardized
in IPv4 but can be emulated.
ANYCAST :
26. RELATED WORK
It was unknown until IPv6 made it a standard connection
type. Anycast is not standardized in IPv4 but can be
emulated.
The basic idea of Anycast is very simple:
multiple servers, which share the same IP address, host
the same service.
The routing infrastructure sends IP packets to the
nearest server (according to the metric of the routing
protocol used).
The major benefits of employing Anycast in IPv4 are
improved latency times, server load balancing, and
improved security.
ANYCAST :
27. RELATED WORK
Anycast packets can be dropped like any other kind of
traffic.
Packets are not specifically marked or tagged.
Preferably only anycast server receives a packet, but there
is no guarantee.
It is possible that the sequential packets from a client to
anycast address are delivered to different servers.
If servers are not synchronized incorrect data maybe sent
back.
The server that receives a specific packet is solely
determined by the unicast routing protocol used in the
domain.
ANYCAST :
28. RELATED WORK
Clients, servers, and routers require no
special software/firmware.
The only special configuration is needed on
servers and routing infrastructure.
ANYCAST :
29. RELATED WORK
Unicast is the term used to describe
communication where one piece of
information is sent from one point to another
having just one sender and one receiver.
It defined as a point-to-point flow of packets
between a source (client) and destination
host (server).
UNICAST :
30. RELATED WORK
Certain network applications which are mass-
distributed are too costly to be conducted
with unicast transmission since each network
connection consumes computing resources
on the sending host and requires its own
separate network bandwidth for transmission.
Such applications include streaming media of
many forms. Internet radio stations using
unicast connections may have high
bandwidth costs.
UNICAST :
31. RELATED WORK
Broadcasting refers to a method of
transferring a message to all recipients
simultaneously.
can be performed in following ways:
1) As a high level operation in a program, for
example broadcasting Message Passing
Interface .
2) It may be a low level networking
operation, for example broadcasting on
BROADCAST :
32. RELATED WORK
Not all network technologies support
broadcast addressing. For example, neither
X.25 nor frame relay have broadcast
capability, nor is there any form of Internet-
wide broadcast.
Broadcasting is largely confined to local are
network (LAN) technologies.
most notably Ethernet and token ring, where
the performance impact of broadcasting is
not as large as it would be in a wide area
BROADCAST :
34. ANT COLONY OPTIMIZATION
ALGORITHM
Swarm intelligence is a relatively new
approach to problem solving that takes
inspiration from social behaviors to solve
optimization problem.
Ant colony optimization is a heuristic algorithm
which has been proven a successful technique
and applied to a number of combinational
optimization problem and taken as one of the
high performance computing methods.
ANT Colony Optimization :
35. ANT COLONY OPTIMIZATION
ALGORITHM
It has wide range of applications with very
good search capabilities for optimization
problems but it still remains a bottleneck due to
high cost and time conversion.
ACO inspired by the forging behavior of real
ants to find food from their nest.
ANT Colony Optimization :
36. ANT COLONY OPTIMIZATION
ALGORITHM
The algorithm is basically used to find shortest
path from nest to food source and the path is
then used by other ants this is all due to
chemical name pheromone deposited by ants
on ground while searching for food .
ANT Colony Optimization :
38. ANT COLONY OPTIMIZATION
ALGORITHM
ANT Colony Optimization :
Ant Colony Optimization technique has
emerged recently novel meta-heuristic for a
hard combinational optimization problems.
It is designed to stimulate the ability of ant
colonies to determine the shortest paths to
food.
Although individual ant posses few capabilities,
their operation as a colony is capable of
complex behavior.
39. ANT COLONY OPTIMIZATION
ALGORITHM
ANT Colony Optimization :
Real ants can indirectly can communicate
though pheromone information without visual
cues and capable of finding shortest path
between food and their nests.
The ants follow pheromone on trail while
walking and the other ants follow the trail with
some probability dependent on the density of
pheromone deposited by the ants.
40. ANT COLONY OPTIMIZATION
ALGORITHM
ANT Colony Optimization :
more the pheromone deposited the more ants
will follow that trail.
Through this mechanism ants ultimately find
the shortest path.
42. ANT COLONY OPTIMIZATION
ALGORITHM
ANT Colony Optimization :
A search algorithm with such concept is
called Ant Colony Optimization Algorithm.
ACO inspired by the forging behavior of real
ants to find food from their nest.
43. ANT COLONY OPTIMIZATION
ALGORITHM
ALGORITHM :
Assuming S is source code and U= {U1, U2……...Um} donated a set of
destination nodes.
1. Initialize network nodes.
2. Set LC=0 where LC is loop count.
3. Let 𝐿 𝑘 be the shortest path for the destination node Ui.
4. The initial value of 𝜏 𝑘=0 as no ant has traversed any path so ant can
chose any path as probability of any path=0.
5. Ant chooses the path according to the probability of path.
6. Compute the pheromone update of the path and each edge selected by
the ant using
𝜏 𝑘 =
𝑅
𝐿 𝑘
Where
R is any constant value.
Lk is total path traversed by the ant.
45. ANT COLONY OPTIMIZATION
ALGORITHM
ALGORITHM :
Compute the probability 𝑃𝑘 of each edge.
𝑃𝑘 =
[𝜏] 𝛼
∗ [𝑛]
𝛽
𝑗∈𝑛[𝜏] 𝛼
∗ [𝑛]
𝛽
𝑛 𝑘= 1
𝑒 𝑘
Where k ϵ N
α,β are meta values.
𝑛 𝑘 heuristic value.
𝑒 𝑘 edge value.
9. Set LC=LC+1.