SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 171
A NOVEL SCHEME FOR RELIABLE MULTIPATH ROUTING
THROUGH NODE-INDEPENDENT DIRECTED ACYCLIC GRAPHS
Srinivas.Vaida1
, N. RaghavaRao2
, R.V.Krishnaiah3
1
M.Tech Student,2
Associate Professor, 3
Principal, Department of Software Engineering,
DRK Institute of Science & Technology, Hyderabad, Andhra Pradesh, India,
vaida.srinu@gmail.com, raghavarao.n@gmail.com, r.v.krishnaiah@gmail.com
Abstract
Multipath routing is essential in the wake of voice over IP, multimedia streaming for efficient data transmission. The growing usage of
such network requirements also demands fast recovery from network failures. Multipath routing is one of the promising routing
schemes to accommodate the diverse requirements of the network with provision such as load balancing and improved bandwidth.
Cho et al. introduced a resilient multipath routing scheme known as directed acyclic graphs. These graphs enable multipath routing
with all possible edges while ensuring guaranteed recovery from single point of failures. We also built a prototype application that
demonstrates the efficiency of the scheme. The simulation results revealed that the scheme is useful and can be used in real world
network applications.
Index Terms – Multipath routing, failure recovery, directed acyclic graphs
---------------------------------------------------------------------***-------------------------------------------------------------------------
1. INTRODUCTION
As the cost of hardware devices decreased and there is steady
increase in resource availability voice over IP and other
multimedia data streaming is increased. In such applications
high bandwidth is expected besides faster recovery from
single point of failures. In order to achieve this modern
networks are employing various strategies such as load
balancing, recovery from node failures, and end-to-end
bandwidth. Towards a good solution multipath routing can be
used. This scheme along with techniques can achieve security
[6], congestion reduction [5], aggregation of bandwidth [4],
load balancing [3] and robustness. In existing networking
applications where multipath routing is required use directed
acyclic graphs [7]. When a data packet starts from source to
destination, it has to carry routing table information in its
header. When a node to be forwarded is not there, the packet
is dropped. This behavior causes problems. This approach
can’t guarantee reliable packet delivery. However, the
techniques for fast recovery need to recover link failures
effectively. Based on the nature of techniques they are
classified. As explored in [8] a default forwarding node is
maintained. When a node fails to forward, the default
forwarding node takes the responsibility of forwarding.
In [9] three solutions are provided for fast rerouting which
were given considerable attention. There three solutions are
known as tunneling using not via addressing [13], failure
insensitive routing (FIR) [11], [12] and Multiple Routing
Configurations (MRC) [10]. The common feature of these
techniques is to use more than one routing tables. However,
they are different in the way they solve problem. In [15] and
[16] resiliency to a single like failure is explored using
multipath routing. For each destination node two trees are
construct red in this approach. These trees are used to solve
such problem. It is similar to the approaches where multiple
routing tables are involved. Only difference is that they
employ only two routing tables. For this reason every packet
has to carry in its header the routing table to be used to reach
the destination. Colored trees concept is introduced in [17]
which are also known as independent trees. Fig. 1 shows
examples for node independent trees.
Fig. 1 – Illustrates node-independent trees (excerpts from
[24])
In both the networks illustrated here the root node is A. The
networks are constructed in such a way that they have capacity
to recover from link failures. For instance when a packet
forwarded from node F to root node encounters a failure, the
packet will be sent through F-C-B-A. The networks work fine
when a single link fails. When two links fail automatically,
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 172
there might be problem. The goal of this paper is to overcome
this drawback by using additional links from the network in
order to make the multipath routing robust. The solution to
this problem is the construction of independent directed
acyclic graphs. The solution is illustrated in fig. 2.
As can be seen in fig. 2, node I has two edges for forwarding.
This will enable the network to built possible paths for data
forwarding.
Fig. 2 – Node independent directed acyclic graphs (excerpts
from [24])
However, there is no provision for backup forwarding in case
of single link failure. Cho et al. [24] presented a solution for
this which achieves multipath routing utilizing all possible
edges; reduced overhead; recovery from single link failure is
guaranteed. In this paper we implement the concept of [24] in
Java platform. We built a prototype application that
demonstrates the proof of concept.
The remainder of the paper is organized as follows. Section II
provides details of the proposed work. Section III presents the
details of prototype implementation. Section IV provides
experimental results while section V concludes the paper.
2. PROPOSED MULTIPATH ROUTING
APPROACH:
The goal of this paper is to construct as many directed acyclic
graphs as possible for ensuring reliable multipath routing. The
sample DAGs are presented in fig. 2. The link independent
DAG construction is made using the procedure suggested by
Cho et al. [24].
Procedure for LI-DAGs Construction
1) Divide the network into two vertex connected (2V)
Components.
2) In each 2V component, select the unique articulation
node through which every path from any node in that
component must traverse to reach d. We refer to this
articulation node as the root node of the component.
In the component that contains node d , we assume
that the root node of the component is node d itself.
3) In each 2V component, construct two node
independent DAG to the root node of that
component.
4) Merge all node independent DAG to obtain the Link
independent DAGs.
The above procedure is given to construct multiple link
independent DAGS. These DAGs provide reliable
communication in multipath routing fashion. The algorithm is
implemented on different network topologies as shown in fig.
3 and 4.
In Fig. 3 and Fig. 4 four real time topologies are presented.
They have different nodes and links.
Fig. 3 – Illustrate real world topologies such as ARPANET
and ITALIAN-NET (excerpts from [24])
Fig. 4 – Illustrate real world topologies such as MESH-4X4
and NJ-LATA (excerpts from [24])
These topologies are used in the practical experiments of this
paper.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 173
3. PROTOTYPE IMPLEMNETATION
A prototype application is built using Java platform which
simulates the concept of reliable multipath routing scheme
presented by Cho et al. [24]. The environment used for the
implementation is Java platform, a PC with 4 GB RAM, Core
2 Dual processor running Windows 7 operating system. The
Java custom simulator application is used to generate number
of nodes and make experiments on different topologies. The
simulator supports four topologies such as MESH-AX4, NJ-
LATA, ARPANET and ITALIAN-NET. After generating
nodes, the main UI of the application is as shown in fig. 5.
Fig. 5 – Main UI of the prototype
The prototype application facilitates shown in Fig.5 is to send
data from source to destination. There are many links from
node A to node D. The details are as shown in Fig. 5. The
application also has provision to generated IDAGs based on
the approaches like link independent and node independent.
Sample DAG between given source and destination is given in
fig. 6.
Fig. 6 – UI highlighting DAG between the given source and
designation.
As can be seen in Fig. 6, it is evident that the DAG is formed
between the given source and destination. There are multiple
DAGs possible as shown in fig. 6.
4. RESULTS:
Number of experiments is made to know the number of paths
between the source and destination nodes on various
topologies. The number of paths from source to destination is
considered to be the degree of the node. It is obvious that
when number of links is increased in the network, the number
of paths increase automatically. The experimental results are
shown as a series of graphs.
Fig. 7 – Number of paths from source to destination on
ITALIAN-NET topology
As can be seen in Fig. 7, it is evident that the node ids which
are participated in experiments are presented in horizontal axis
while the vertical axis represents the number of paths in given
topology. The results revealed that number of paths is more
when number of links is increased.
As can be seen in Fig. 8, it is evident that the node ids which
are participated in experiments are presented in horizontal axis
while the vertical axis represents the number of paths in given
topology.
Fig. 8 – Number of paths from source to destination on
ARPANET topology
0
10
20
30
40
50
60
1 2 3 4 5 6 7 8 9 10
Numberofpaths
Node id
Blue
Red
0
10
20
30
40
1 4 7 10 13 16 19
Numberofpaths
Node id
Blue
Red
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 174
The results revealed that number of paths is more when
number of links is increased.
Fig. 9 – Product of number of critical links with given
approaches and topologies
As seen in Fig. 9, the horizontal axis represents topologies
while the vertical axis presents the product of number of
critical links. The approaches followed are 6 pairs of colored
trees, IDAGs and ITREEs on four topologies namely MESH-
AX4, NJ-LATA, ARPANET and ITALIAN-NET.
Fig. 10 – Product of number of critical links with given
approaches and topologies
As seen in Fig. 10, the horizontal axis represents number of
pairs of colored trees while the vertical axis presents the
product of number of critical links. The experiments are done
using topologies like MESH-AX4, NJ-LATA, ARPANET and
ITALIAN-NET.
As seen in Fig. 11, the horizontal axis represents topologies
like MESH-AX4, NJ-LATA, ARPANET and ITALIAN-NET
while the vertical axis represents average path length ratio.
Fig. 11 – Average ratio of path lengths of IDAGs and I Trees
Fig. 12 – Ratio of average six pairs of colored trees and
IDAGS path lengths
As seen in Fig. 12, the horizontal axis represents topologies
like MESH-AX4, NJ-LATA, ARPANET and ITALIAN-NET
while the vertical axis represents average path length ratio.
Fig. 13 – Ratio of average six pairs of colored trees and
IDAGS path lengths
0
5
10
15
20
25
30
Producuofnumberofcritical
links
6 pairs of
colored trees
IDAGS
ITREEs
0
5
10
15
20
25
30
1 2 3 4 5 6
Productofnumberof
criticallinks
M
MESH 4X4
NJ-LATA
ARPANET
ITALIAN-
NET
0
0.5
1
1.5
2
2.5
Averagepathlength
ratio(IDAGs/ITREEs)
Blue
Red
0
0.5
1
1.5
2
2.5
Avg.pathlengthratio
6
pairs
of
color
ed
trees/
ITree
s
0
0.2
0.4
0.6
0.8
1
1.2
Avg.pathlengthratio
(shortestpathonIDAGs
/ITREEs)
Red
Blue
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 175
As seen in Fig. 13, the horizontal axis represents topologies
like MESH-AX4, NJ-LATA, ARPANET and ITALIAN-NET
while the vertical axis represents average path length ratio.
CONCLUSIONS
Multipath routing is important for reliable data transfer in
modern networks. When independent directed acyclic graphs
are constructed, it is possible to achieve reliable
communication with multiple IDAGS that ensure fast recovery
in case of link failures. The solution presented by Cho et al.
[24] and the polynomial time algorithms are implemented in
this paper in order to ensure reliable multipath routing. We
implemented the IDAGs using a custom simulator. The
simulation results revealed that the node independent IDAGs
are practically reliable and can recover faster from link
failures.
REFERENCES
[1] S. Cho, T. Elhourani, and S. Ramasubramanian, “Resilient
multipath routing with independent directed acyclic graphs,”
in Proceedings ofIEEE International Conference on
Communications, Cape Town, South Africa, May 2010, pp. 1–
5.
[2] Z. Yes, S. V. Krishnamurthy, and S. K. Tripathi, “A
framework for reliablerouting in mobile ad hoc networks,” in
INFOCOM’03, April 2003, pp.270–280.
[3] P. P. Pham and S. Perreau, “Performance analysis of
reactive shortest path and multi-path routing mechanism with
load balance,” in IEEEINFOCOM, 2003, pp. 251–259.
[4] J. Tsai and T. Moors, “A review of multipath routing
protocols: From wireless ad hoc to mesh networks,” in Acorn
Early Career ResearcherWorkshop on Wireless Multihop
Networking, Jul. 17-18, 2006.
[5] S. Murthy and J. Garcia-Luna-Aceves, “Congestion-
oriented shortest multipath routing,” in IEEE INFOCOM, vol.
3, March 1996, pp. 1028–1036.
[6] W. Lou, W. Liu, and Y. Fang, “A simulation study of
security performance using multipath routing in ad hoc
networks,” in IEEE Vehicular Technology Conference, vol. 3,
October 2003, pp. 2142–2146.
[7] G. Lee and J. Choi, “A survey of multipath routing for
traffic engineering,”2002. [Online]. Available:
http://vega.icu.ac.kr/˜gmlee/research/
[8] K. Xi and J. Chao, “Ip fast rerouting for single-link/node
failurerecovery,” in Proceedings of BROADNETS - Internet
TechnologiesSymposium, September 2007.
[9] M. Shand and S. Bryant, “IP Fast Reroute Framework,”
IETF InternetDraft, Feb. 2008, draft-ietf-rtgwg-ipfrr-
framework-08.txt.
[10] A. Kvalbein, A. F. Hansen, T. Cˇ icˇic´, S. Gjessing, and
O. Lysne, “FastIP network recovery using multiple routing
configurations,” in IEEEINFOCOM, Apr. 2006.
[11] S. Lee, Y. Yu, S. Nelakuditi, Z.-L. Zhang, and C.-N.
Chuah, “Proactivevs. Reactive approaches to failure resilient
routing,” in IEEE INFOCOM, Mar. 2004.
[12] S. Nelakuditi et al., “Failure insensitive routing for
ensuring serviceavailability,” in IWQoS’03 Lecture Notes in
Computer Science 2707,Jun. 2003.
[13] S. Bryant, M. Shand, and S. Previdi, “IP fast reroute
using notviaaddresses,” Internet Draft, Feb 2008, draft-ietf-
rtgwg-ipfrr-notviaaddresses-02.txt.
[14] S. Kini, S. Ramasubramanian, A. Kvalbein, and A.
Hansen, “Fastrecovery from dual-link failures in IP networks,”
in Proceedings of IEEEINFOCOM, Rio de Janeiro, Brazil,
April 2009, pp. 1368–1376.
[15] S. Ramasubramanian, M. Harkara, and M. Krunz,
“Distributed lineartime construction of colored trees for
disjoint multlipath routing,” inProceedings of IFIP
Networking, May 2006.
[16] G. Jayavelu, S. Ramasubramanian, and O. Younis,
“Maintaining coloredtrees for disjoint multipath routing under
node failures,” Accepted forpublication in IEEE/ACM
Transactions on Networking, 2008.11
[17] A. Huck, “Independent trees in graphs,” Graphs and
Combinatorics,vol. 10, pp. 29–45, 1994.
[18] T. Erlebach and A. Mereu, “Path splicing with
guaranteedfault tolerance,” in Proceedings of the 28th IEEE
conferenceon Global telecommunications, ser.
GLOBECOM’09. Piscataway,NJ, USA: IEEE Press, 2009, pp.
623–628. [Online].
Available:http://portal.acm.org/citation.cfm?id=181138
0.1811483
[19] Y. Ohara, S. Imahori, and R. V. Meter, “MARA:
maximum alternativerouting algorithm,” in IEEE INFOCOM,
Rio de Janeiro, Brazil, April2009, pp. 298–306.
[20] M. Medard, R. A. Barry, S. G. Finn, and R. G. Gallager,
“Redundanttrees for preplanned recovery in arrbitrary vertex-
redundant or edgeredundant graphs,” IEEE/ACM Transactions
on Networking, vol. 7,no. 5, pp. 641–652, October 1999.
[21] G. Xue, L. Chen, and K. Thulasiraman, “Quality-of-
service and qualityof-protection issues in preplanned recovery
schemes using redundanttrees,”IEEE Journal on Selected
Areas in Communication, vol. 21, no. 8,pp. 1332–1345,
October 2003.
[22] S. Ramasubramanian, M. Harkara, and M. Krunz, “Linear
time distributedconstruction of colored trees for disjoint
multipath routing,”Accepted for publication in Elsevier
COMNET, vol. 51, no. 10, pp.2854–2866, July 2007.
[23] G. Xue, W. Zhang, J. Tang, and K. Thulasiraman,
“Polynomial timeapproximation algorithms for multi-
constrained qos routing,” IEEE/ACMTransactions on
Networking, vol. 16, no. 3, pp. 656 –669, June 2008.
[24] Sangman Cho, Theodore Elhourani, Srinivasan
Ramasubramanian, “Independent Directed Acyclic Graphs for
Resilient Multipath Routing”, IEEE conference 2010.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 176
BIOGRAPHIES
Srinivas.Vaida has completed MCA from
Jesus PG College, OU, Hyderabad, and
pursuing M.Tech (Software Engineering) in
DRK Institute of Science and Technology,
JNTU, Hyderabad, Andhra Pradesh, India.
His research interest includes Computer
Networks and Databases, Software Engineering.
N. RaghavaRao is working as an
Associative Professor in DRK Institute of
Science and Technology, JNTU,
Hyderabad, Andhra Pradesh, India. He has
received M.Tech (Computer Science)
degree from JNTUH; His main research
interest includes Data Mining, Compiler
Design and DAA.
Dr. R. V. Krishnaiah, did M.Tech (EIE)
from NIT Waranagal, MTech (CSE) form
JNTU, Ph.D, from JNTU Ananthapur, He
has memberships in professional bodies
MIE, MIETE, MISTE. He is working as
Principal in DRK Institute of Science and
Technology, Hyderabad. His main
research interests include Image Processing, Security systems,
Sensors, Intelligent Systems, Computer networks, Data
mining, Software Engineering, network protection and
security control. He has published many papers and Editorial
Member and Reviewer for some national and international
journals

Más contenido relacionado

La actualidad más candente

Macromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting AlgorithmMacromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting Algorithmijsrd.com
 
Report-de Bruijn Graph
Report-de Bruijn GraphReport-de Bruijn Graph
Report-de Bruijn GraphAshwani kumar
 
Fault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andFault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andeSAT Publishing House
 
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...Derryck Lamptey, MPhil, CISSP
 
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...IOSR Journals
 
Shortest route finding using an object oriented database approach
Shortest route finding using an object oriented database approachShortest route finding using an object oriented database approach
Shortest route finding using an object oriented database approachAlexander Decker
 
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...ijcsit
 
Paper Explained: Understanding the wiring evolution in differentiable neural ...
Paper Explained: Understanding the wiring evolution in differentiable neural ...Paper Explained: Understanding the wiring evolution in differentiable neural ...
Paper Explained: Understanding the wiring evolution in differentiable neural ...Devansh16
 
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSSVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSijscmcj
 
Single Channel Speech De-noising Using Kernel Independent Component Analysis...
	Single Channel Speech De-noising Using Kernel Independent Component Analysis...	Single Channel Speech De-noising Using Kernel Independent Component Analysis...
Single Channel Speech De-noising Using Kernel Independent Component Analysis...theijes
 
Centrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksCentrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksIJERA Editor
 
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...TELKOMNIKA JOURNAL
 
A fpga implementation of data hiding using lsb matching method
A fpga implementation of data hiding using lsb matching methodA fpga implementation of data hiding using lsb matching method
A fpga implementation of data hiding using lsb matching methodeSAT Journals
 

La actualidad más candente (16)

Macromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting AlgorithmMacromodel of High Speed Interconnect using Vector Fitting Algorithm
Macromodel of High Speed Interconnect using Vector Fitting Algorithm
 
Report-de Bruijn Graph
Report-de Bruijn GraphReport-de Bruijn Graph
Report-de Bruijn Graph
 
Fault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms andFault diagnosis using genetic algorithms and
Fault diagnosis using genetic algorithms and
 
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
Achieving Portability and Efficiency in a HPC Code Using Standard Message-pas...
 
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
2-Dimensional and 3-Dimesional Electromagnetic Fields Using Finite element me...
 
20320130406025
2032013040602520320130406025
20320130406025
 
Shortest route finding using an object oriented database approach
Shortest route finding using an object oriented database approachShortest route finding using an object oriented database approach
Shortest route finding using an object oriented database approach
 
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
 
Paper Explained: Understanding the wiring evolution in differentiable neural ...
Paper Explained: Understanding the wiring evolution in differentiable neural ...Paper Explained: Understanding the wiring evolution in differentiable neural ...
Paper Explained: Understanding the wiring evolution in differentiable neural ...
 
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONSSVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
SVD BASED LATENT SEMANTIC INDEXING WITH USE OF THE GPU COMPUTATIONS
 
Single Channel Speech De-noising Using Kernel Independent Component Analysis...
	Single Channel Speech De-noising Using Kernel Independent Component Analysis...	Single Channel Speech De-noising Using Kernel Independent Component Analysis...
Single Channel Speech De-noising Using Kernel Independent Component Analysis...
 
Planes de negocios paper
Planes de negocios paperPlanes de negocios paper
Planes de negocios paper
 
Centrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksCentrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social Networks
 
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
Stochastic Computing Correlation Utilization in Convolutional Neural Network ...
 
A fpga implementation of data hiding using lsb matching method
A fpga implementation of data hiding using lsb matching methodA fpga implementation of data hiding using lsb matching method
A fpga implementation of data hiding using lsb matching method
 
H04302064067
H04302064067H04302064067
H04302064067
 

Destacado

Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentationrogeriosan10
 
Week 4 pde2 overseas study trip to desaru, johor
Week 4   pde2 overseas study trip to desaru, johorWeek 4   pde2 overseas study trip to desaru, johor
Week 4 pde2 overseas study trip to desaru, johormralfr3dchan
 
Demir dogramaci ve kaynakci is eleman alimi ilani istanbul kirac avcilar KARM...
Demir dogramaci ve kaynakci is eleman alimi ilani istanbul kirac avcilar KARM...Demir dogramaci ve kaynakci is eleman alimi ilani istanbul kirac avcilar KARM...
Demir dogramaci ve kaynakci is eleman alimi ilani istanbul kirac avcilar KARM...Karma Metall
 
Inducción a la plataforma
Inducción a la plataformaInducción a la plataforma
Inducción a la plataformaGuisella Jimenez
 
Nueva aplicación de facebook
Nueva aplicación de facebookNueva aplicación de facebook
Nueva aplicación de facebookStefanyAriana
 
Franse villa van koning Albert had last van overvloedige regen
Franse villa van koning Albert had last van overvloedige regenFranse villa van koning Albert had last van overvloedige regen
Franse villa van koning Albert had last van overvloedige regenThierry Debels
 
Red Mall | Retail Space | Food Court | 9654953105
Red Mall | Retail Space | Food Court | 9654953105Red Mall | Retail Space | Food Court | 9654953105
Red Mall | Retail Space | Food Court | 9654953105ashokjai
 
Guia de lenguaje unidad 1
Guia de lenguaje unidad 1Guia de lenguaje unidad 1
Guia de lenguaje unidad 1Juan Ramos
 
Mondrian applying dynamic security - Pentaho
Mondrian applying  dynamic security - PentahoMondrian applying  dynamic security - Pentaho
Mondrian applying dynamic security - PentahoDavid Fombella Pombal
 
Laporan farmasi fisika rheologi
Laporan farmasi fisika rheologiLaporan farmasi fisika rheologi
Laporan farmasi fisika rheologiMina Audina
 
Vennootschap Veronique Branquinho staat als een huis
Vennootschap Veronique Branquinho staat als een huisVennootschap Veronique Branquinho staat als een huis
Vennootschap Veronique Branquinho staat als een huisThierry Debels
 

Destacado (15)

Vip manual p1
Vip manual p1Vip manual p1
Vip manual p1
 
K R Supraja
K R SuprajaK R Supraja
K R Supraja
 
Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Week 4 pde2 overseas study trip to desaru, johor
Week 4   pde2 overseas study trip to desaru, johorWeek 4   pde2 overseas study trip to desaru, johor
Week 4 pde2 overseas study trip to desaru, johor
 
Demir dogramaci ve kaynakci is eleman alimi ilani istanbul kirac avcilar KARM...
Demir dogramaci ve kaynakci is eleman alimi ilani istanbul kirac avcilar KARM...Demir dogramaci ve kaynakci is eleman alimi ilani istanbul kirac avcilar KARM...
Demir dogramaci ve kaynakci is eleman alimi ilani istanbul kirac avcilar KARM...
 
Inducción a la plataforma
Inducción a la plataformaInducción a la plataforma
Inducción a la plataforma
 
Nueva aplicación de facebook
Nueva aplicación de facebookNueva aplicación de facebook
Nueva aplicación de facebook
 
남양유업 (003920) 알고리즘 기업분석 보고서
남양유업 (003920) 알고리즘 기업분석 보고서남양유업 (003920) 알고리즘 기업분석 보고서
남양유업 (003920) 알고리즘 기업분석 보고서
 
Franse villa van koning Albert had last van overvloedige regen
Franse villa van koning Albert had last van overvloedige regenFranse villa van koning Albert had last van overvloedige regen
Franse villa van koning Albert had last van overvloedige regen
 
Red Mall | Retail Space | Food Court | 9654953105
Red Mall | Retail Space | Food Court | 9654953105Red Mall | Retail Space | Food Court | 9654953105
Red Mall | Retail Space | Food Court | 9654953105
 
Guia de lenguaje unidad 1
Guia de lenguaje unidad 1Guia de lenguaje unidad 1
Guia de lenguaje unidad 1
 
Campana Teka CC 40
Campana Teka CC 40Campana Teka CC 40
Campana Teka CC 40
 
Mondrian applying dynamic security - Pentaho
Mondrian applying  dynamic security - PentahoMondrian applying  dynamic security - Pentaho
Mondrian applying dynamic security - Pentaho
 
Laporan farmasi fisika rheologi
Laporan farmasi fisika rheologiLaporan farmasi fisika rheologi
Laporan farmasi fisika rheologi
 
Vennootschap Veronique Branquinho staat als een huis
Vennootschap Veronique Branquinho staat als een huisVennootschap Veronique Branquinho staat als een huis
Vennootschap Veronique Branquinho staat als een huis
 

Similar a A novel scheme for reliable multipath routing through node independent directed acyclic graphs - copy

Fpga based design and implementation of noc torus
Fpga based design and implementation of noc torusFpga based design and implementation of noc torus
Fpga based design and implementation of noc toruseSAT Publishing House
 
Maximizing network capacity and reliable transmission in mimo cooperative net...
Maximizing network capacity and reliable transmission in mimo cooperative net...Maximizing network capacity and reliable transmission in mimo cooperative net...
Maximizing network capacity and reliable transmission in mimo cooperative net...eSAT Journals
 
Maximizing network capacity and reliable transmission
Maximizing network capacity and reliable transmissionMaximizing network capacity and reliable transmission
Maximizing network capacity and reliable transmissioneSAT Publishing House
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodveSAT Journals
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodveSAT Publishing House
 
H030102052055
H030102052055H030102052055
H030102052055theijes
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkeSAT Publishing House
 
Design of a 5 port router for noc using verilog
Design of a 5 port router for noc using verilogDesign of a 5 port router for noc using verilog
Design of a 5 port router for noc using verilogeSAT Publishing House
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)eSAT Publishing House
 
Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...redpel dot com
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...eSAT Journals
 
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...rahulmonikasharma
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...eeiej_journal
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...ijrap
 
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...eeiej
 
Decision making approach to prefer route repair technique in aodv routing pro...
Decision making approach to prefer route repair technique in aodv routing pro...Decision making approach to prefer route repair technique in aodv routing pro...
Decision making approach to prefer route repair technique in aodv routing pro...eSAT Journals
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networkseSAT Journals
 

Similar a A novel scheme for reliable multipath routing through node independent directed acyclic graphs - copy (20)

Fpga based design and implementation of noc torus
Fpga based design and implementation of noc torusFpga based design and implementation of noc torus
Fpga based design and implementation of noc torus
 
Maximizing network capacity and reliable transmission in mimo cooperative net...
Maximizing network capacity and reliable transmission in mimo cooperative net...Maximizing network capacity and reliable transmission in mimo cooperative net...
Maximizing network capacity and reliable transmission in mimo cooperative net...
 
Maximizing network capacity and reliable transmission
Maximizing network capacity and reliable transmissionMaximizing network capacity and reliable transmission
Maximizing network capacity and reliable transmission
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodv
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodv
 
H030102052055
H030102052055H030102052055
H030102052055
 
A study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh networkA study on cross layer metrics of wireless mesh network
A study on cross layer metrics of wireless mesh network
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
Design of a 5 port router for noc using verilog
Design of a 5 port router for noc using verilogDesign of a 5 port router for noc using verilog
Design of a 5 port router for noc using verilog
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)
 
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh NetworkRobustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
Robustness Analysis of Buffer Based Routing Algorithms in Wireless Mesh Network
 
Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
 
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
Performance Comparison of Geographic LAR1 with On-demand AODV and DSR Routing...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
 
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
COMPARATIVE STUDY FOR PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MOBILITY A...
 
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
Comparative Study for Performance Analysis of Routing Protocols in Mobility a...
 
Decision making approach to prefer route repair technique in aodv routing pro...
Decision making approach to prefer route repair technique in aodv routing pro...Decision making approach to prefer route repair technique in aodv routing pro...
Decision making approach to prefer route repair technique in aodv routing pro...
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networks
 

Más de eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

Más de eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Último

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Último (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

A novel scheme for reliable multipath routing through node independent directed acyclic graphs - copy

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 171 A NOVEL SCHEME FOR RELIABLE MULTIPATH ROUTING THROUGH NODE-INDEPENDENT DIRECTED ACYCLIC GRAPHS Srinivas.Vaida1 , N. RaghavaRao2 , R.V.Krishnaiah3 1 M.Tech Student,2 Associate Professor, 3 Principal, Department of Software Engineering, DRK Institute of Science & Technology, Hyderabad, Andhra Pradesh, India, vaida.srinu@gmail.com, raghavarao.n@gmail.com, r.v.krishnaiah@gmail.com Abstract Multipath routing is essential in the wake of voice over IP, multimedia streaming for efficient data transmission. The growing usage of such network requirements also demands fast recovery from network failures. Multipath routing is one of the promising routing schemes to accommodate the diverse requirements of the network with provision such as load balancing and improved bandwidth. Cho et al. introduced a resilient multipath routing scheme known as directed acyclic graphs. These graphs enable multipath routing with all possible edges while ensuring guaranteed recovery from single point of failures. We also built a prototype application that demonstrates the efficiency of the scheme. The simulation results revealed that the scheme is useful and can be used in real world network applications. Index Terms – Multipath routing, failure recovery, directed acyclic graphs ---------------------------------------------------------------------***------------------------------------------------------------------------- 1. INTRODUCTION As the cost of hardware devices decreased and there is steady increase in resource availability voice over IP and other multimedia data streaming is increased. In such applications high bandwidth is expected besides faster recovery from single point of failures. In order to achieve this modern networks are employing various strategies such as load balancing, recovery from node failures, and end-to-end bandwidth. Towards a good solution multipath routing can be used. This scheme along with techniques can achieve security [6], congestion reduction [5], aggregation of bandwidth [4], load balancing [3] and robustness. In existing networking applications where multipath routing is required use directed acyclic graphs [7]. When a data packet starts from source to destination, it has to carry routing table information in its header. When a node to be forwarded is not there, the packet is dropped. This behavior causes problems. This approach can’t guarantee reliable packet delivery. However, the techniques for fast recovery need to recover link failures effectively. Based on the nature of techniques they are classified. As explored in [8] a default forwarding node is maintained. When a node fails to forward, the default forwarding node takes the responsibility of forwarding. In [9] three solutions are provided for fast rerouting which were given considerable attention. There three solutions are known as tunneling using not via addressing [13], failure insensitive routing (FIR) [11], [12] and Multiple Routing Configurations (MRC) [10]. The common feature of these techniques is to use more than one routing tables. However, they are different in the way they solve problem. In [15] and [16] resiliency to a single like failure is explored using multipath routing. For each destination node two trees are construct red in this approach. These trees are used to solve such problem. It is similar to the approaches where multiple routing tables are involved. Only difference is that they employ only two routing tables. For this reason every packet has to carry in its header the routing table to be used to reach the destination. Colored trees concept is introduced in [17] which are also known as independent trees. Fig. 1 shows examples for node independent trees. Fig. 1 – Illustrates node-independent trees (excerpts from [24]) In both the networks illustrated here the root node is A. The networks are constructed in such a way that they have capacity to recover from link failures. For instance when a packet forwarded from node F to root node encounters a failure, the packet will be sent through F-C-B-A. The networks work fine when a single link fails. When two links fail automatically,
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 172 there might be problem. The goal of this paper is to overcome this drawback by using additional links from the network in order to make the multipath routing robust. The solution to this problem is the construction of independent directed acyclic graphs. The solution is illustrated in fig. 2. As can be seen in fig. 2, node I has two edges for forwarding. This will enable the network to built possible paths for data forwarding. Fig. 2 – Node independent directed acyclic graphs (excerpts from [24]) However, there is no provision for backup forwarding in case of single link failure. Cho et al. [24] presented a solution for this which achieves multipath routing utilizing all possible edges; reduced overhead; recovery from single link failure is guaranteed. In this paper we implement the concept of [24] in Java platform. We built a prototype application that demonstrates the proof of concept. The remainder of the paper is organized as follows. Section II provides details of the proposed work. Section III presents the details of prototype implementation. Section IV provides experimental results while section V concludes the paper. 2. PROPOSED MULTIPATH ROUTING APPROACH: The goal of this paper is to construct as many directed acyclic graphs as possible for ensuring reliable multipath routing. The sample DAGs are presented in fig. 2. The link independent DAG construction is made using the procedure suggested by Cho et al. [24]. Procedure for LI-DAGs Construction 1) Divide the network into two vertex connected (2V) Components. 2) In each 2V component, select the unique articulation node through which every path from any node in that component must traverse to reach d. We refer to this articulation node as the root node of the component. In the component that contains node d , we assume that the root node of the component is node d itself. 3) In each 2V component, construct two node independent DAG to the root node of that component. 4) Merge all node independent DAG to obtain the Link independent DAGs. The above procedure is given to construct multiple link independent DAGS. These DAGs provide reliable communication in multipath routing fashion. The algorithm is implemented on different network topologies as shown in fig. 3 and 4. In Fig. 3 and Fig. 4 four real time topologies are presented. They have different nodes and links. Fig. 3 – Illustrate real world topologies such as ARPANET and ITALIAN-NET (excerpts from [24]) Fig. 4 – Illustrate real world topologies such as MESH-4X4 and NJ-LATA (excerpts from [24]) These topologies are used in the practical experiments of this paper.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 173 3. PROTOTYPE IMPLEMNETATION A prototype application is built using Java platform which simulates the concept of reliable multipath routing scheme presented by Cho et al. [24]. The environment used for the implementation is Java platform, a PC with 4 GB RAM, Core 2 Dual processor running Windows 7 operating system. The Java custom simulator application is used to generate number of nodes and make experiments on different topologies. The simulator supports four topologies such as MESH-AX4, NJ- LATA, ARPANET and ITALIAN-NET. After generating nodes, the main UI of the application is as shown in fig. 5. Fig. 5 – Main UI of the prototype The prototype application facilitates shown in Fig.5 is to send data from source to destination. There are many links from node A to node D. The details are as shown in Fig. 5. The application also has provision to generated IDAGs based on the approaches like link independent and node independent. Sample DAG between given source and destination is given in fig. 6. Fig. 6 – UI highlighting DAG between the given source and designation. As can be seen in Fig. 6, it is evident that the DAG is formed between the given source and destination. There are multiple DAGs possible as shown in fig. 6. 4. RESULTS: Number of experiments is made to know the number of paths between the source and destination nodes on various topologies. The number of paths from source to destination is considered to be the degree of the node. It is obvious that when number of links is increased in the network, the number of paths increase automatically. The experimental results are shown as a series of graphs. Fig. 7 – Number of paths from source to destination on ITALIAN-NET topology As can be seen in Fig. 7, it is evident that the node ids which are participated in experiments are presented in horizontal axis while the vertical axis represents the number of paths in given topology. The results revealed that number of paths is more when number of links is increased. As can be seen in Fig. 8, it is evident that the node ids which are participated in experiments are presented in horizontal axis while the vertical axis represents the number of paths in given topology. Fig. 8 – Number of paths from source to destination on ARPANET topology 0 10 20 30 40 50 60 1 2 3 4 5 6 7 8 9 10 Numberofpaths Node id Blue Red 0 10 20 30 40 1 4 7 10 13 16 19 Numberofpaths Node id Blue Red
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 174 The results revealed that number of paths is more when number of links is increased. Fig. 9 – Product of number of critical links with given approaches and topologies As seen in Fig. 9, the horizontal axis represents topologies while the vertical axis presents the product of number of critical links. The approaches followed are 6 pairs of colored trees, IDAGs and ITREEs on four topologies namely MESH- AX4, NJ-LATA, ARPANET and ITALIAN-NET. Fig. 10 – Product of number of critical links with given approaches and topologies As seen in Fig. 10, the horizontal axis represents number of pairs of colored trees while the vertical axis presents the product of number of critical links. The experiments are done using topologies like MESH-AX4, NJ-LATA, ARPANET and ITALIAN-NET. As seen in Fig. 11, the horizontal axis represents topologies like MESH-AX4, NJ-LATA, ARPANET and ITALIAN-NET while the vertical axis represents average path length ratio. Fig. 11 – Average ratio of path lengths of IDAGs and I Trees Fig. 12 – Ratio of average six pairs of colored trees and IDAGS path lengths As seen in Fig. 12, the horizontal axis represents topologies like MESH-AX4, NJ-LATA, ARPANET and ITALIAN-NET while the vertical axis represents average path length ratio. Fig. 13 – Ratio of average six pairs of colored trees and IDAGS path lengths 0 5 10 15 20 25 30 Producuofnumberofcritical links 6 pairs of colored trees IDAGS ITREEs 0 5 10 15 20 25 30 1 2 3 4 5 6 Productofnumberof criticallinks M MESH 4X4 NJ-LATA ARPANET ITALIAN- NET 0 0.5 1 1.5 2 2.5 Averagepathlength ratio(IDAGs/ITREEs) Blue Red 0 0.5 1 1.5 2 2.5 Avg.pathlengthratio 6 pairs of color ed trees/ ITree s 0 0.2 0.4 0.6 0.8 1 1.2 Avg.pathlengthratio (shortestpathonIDAGs /ITREEs) Red Blue
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 175 As seen in Fig. 13, the horizontal axis represents topologies like MESH-AX4, NJ-LATA, ARPANET and ITALIAN-NET while the vertical axis represents average path length ratio. CONCLUSIONS Multipath routing is important for reliable data transfer in modern networks. When independent directed acyclic graphs are constructed, it is possible to achieve reliable communication with multiple IDAGS that ensure fast recovery in case of link failures. The solution presented by Cho et al. [24] and the polynomial time algorithms are implemented in this paper in order to ensure reliable multipath routing. We implemented the IDAGs using a custom simulator. The simulation results revealed that the node independent IDAGs are practically reliable and can recover faster from link failures. REFERENCES [1] S. Cho, T. Elhourani, and S. Ramasubramanian, “Resilient multipath routing with independent directed acyclic graphs,” in Proceedings ofIEEE International Conference on Communications, Cape Town, South Africa, May 2010, pp. 1– 5. [2] Z. Yes, S. V. Krishnamurthy, and S. K. Tripathi, “A framework for reliablerouting in mobile ad hoc networks,” in INFOCOM’03, April 2003, pp.270–280. [3] P. P. Pham and S. Perreau, “Performance analysis of reactive shortest path and multi-path routing mechanism with load balance,” in IEEEINFOCOM, 2003, pp. 251–259. [4] J. Tsai and T. Moors, “A review of multipath routing protocols: From wireless ad hoc to mesh networks,” in Acorn Early Career ResearcherWorkshop on Wireless Multihop Networking, Jul. 17-18, 2006. [5] S. Murthy and J. Garcia-Luna-Aceves, “Congestion- oriented shortest multipath routing,” in IEEE INFOCOM, vol. 3, March 1996, pp. 1028–1036. [6] W. Lou, W. Liu, and Y. Fang, “A simulation study of security performance using multipath routing in ad hoc networks,” in IEEE Vehicular Technology Conference, vol. 3, October 2003, pp. 2142–2146. [7] G. Lee and J. Choi, “A survey of multipath routing for traffic engineering,”2002. [Online]. Available: http://vega.icu.ac.kr/˜gmlee/research/ [8] K. Xi and J. Chao, “Ip fast rerouting for single-link/node failurerecovery,” in Proceedings of BROADNETS - Internet TechnologiesSymposium, September 2007. [9] M. Shand and S. Bryant, “IP Fast Reroute Framework,” IETF InternetDraft, Feb. 2008, draft-ietf-rtgwg-ipfrr- framework-08.txt. [10] A. Kvalbein, A. F. Hansen, T. Cˇ icˇic´, S. Gjessing, and O. Lysne, “FastIP network recovery using multiple routing configurations,” in IEEEINFOCOM, Apr. 2006. [11] S. Lee, Y. Yu, S. Nelakuditi, Z.-L. Zhang, and C.-N. Chuah, “Proactivevs. Reactive approaches to failure resilient routing,” in IEEE INFOCOM, Mar. 2004. [12] S. Nelakuditi et al., “Failure insensitive routing for ensuring serviceavailability,” in IWQoS’03 Lecture Notes in Computer Science 2707,Jun. 2003. [13] S. Bryant, M. Shand, and S. Previdi, “IP fast reroute using notviaaddresses,” Internet Draft, Feb 2008, draft-ietf- rtgwg-ipfrr-notviaaddresses-02.txt. [14] S. Kini, S. Ramasubramanian, A. Kvalbein, and A. Hansen, “Fastrecovery from dual-link failures in IP networks,” in Proceedings of IEEEINFOCOM, Rio de Janeiro, Brazil, April 2009, pp. 1368–1376. [15] S. Ramasubramanian, M. Harkara, and M. Krunz, “Distributed lineartime construction of colored trees for disjoint multlipath routing,” inProceedings of IFIP Networking, May 2006. [16] G. Jayavelu, S. Ramasubramanian, and O. Younis, “Maintaining coloredtrees for disjoint multipath routing under node failures,” Accepted forpublication in IEEE/ACM Transactions on Networking, 2008.11 [17] A. Huck, “Independent trees in graphs,” Graphs and Combinatorics,vol. 10, pp. 29–45, 1994. [18] T. Erlebach and A. Mereu, “Path splicing with guaranteedfault tolerance,” in Proceedings of the 28th IEEE conferenceon Global telecommunications, ser. GLOBECOM’09. Piscataway,NJ, USA: IEEE Press, 2009, pp. 623–628. [Online]. Available:http://portal.acm.org/citation.cfm?id=181138 0.1811483 [19] Y. Ohara, S. Imahori, and R. V. Meter, “MARA: maximum alternativerouting algorithm,” in IEEE INFOCOM, Rio de Janeiro, Brazil, April2009, pp. 298–306. [20] M. Medard, R. A. Barry, S. G. Finn, and R. G. Gallager, “Redundanttrees for preplanned recovery in arrbitrary vertex- redundant or edgeredundant graphs,” IEEE/ACM Transactions on Networking, vol. 7,no. 5, pp. 641–652, October 1999. [21] G. Xue, L. Chen, and K. Thulasiraman, “Quality-of- service and qualityof-protection issues in preplanned recovery schemes using redundanttrees,”IEEE Journal on Selected Areas in Communication, vol. 21, no. 8,pp. 1332–1345, October 2003. [22] S. Ramasubramanian, M. Harkara, and M. Krunz, “Linear time distributedconstruction of colored trees for disjoint multipath routing,”Accepted for publication in Elsevier COMNET, vol. 51, no. 10, pp.2854–2866, July 2007. [23] G. Xue, W. Zhang, J. Tang, and K. Thulasiraman, “Polynomial timeapproximation algorithms for multi- constrained qos routing,” IEEE/ACMTransactions on Networking, vol. 16, no. 3, pp. 656 –669, June 2008. [24] Sangman Cho, Theodore Elhourani, Srinivasan Ramasubramanian, “Independent Directed Acyclic Graphs for Resilient Multipath Routing”, IEEE conference 2010.
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 08 | Aug-2013, Available @ http://www.ijret.org 176 BIOGRAPHIES Srinivas.Vaida has completed MCA from Jesus PG College, OU, Hyderabad, and pursuing M.Tech (Software Engineering) in DRK Institute of Science and Technology, JNTU, Hyderabad, Andhra Pradesh, India. His research interest includes Computer Networks and Databases, Software Engineering. N. RaghavaRao is working as an Associative Professor in DRK Institute of Science and Technology, JNTU, Hyderabad, Andhra Pradesh, India. He has received M.Tech (Computer Science) degree from JNTUH; His main research interest includes Data Mining, Compiler Design and DAA. Dr. R. V. Krishnaiah, did M.Tech (EIE) from NIT Waranagal, MTech (CSE) form JNTU, Ph.D, from JNTU Ananthapur, He has memberships in professional bodies MIE, MIETE, MISTE. He is working as Principal in DRK Institute of Science and Technology, Hyderabad. His main research interests include Image Processing, Security systems, Sensors, Intelligent Systems, Computer networks, Data mining, Software Engineering, network protection and security control. He has published many papers and Editorial Member and Reviewer for some national and international journals