SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
International Journal JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY
  INTERNATIONAL of Computer Engineering and Technology (IJCET), ISSN 0976 –
                                           (IJCET)
 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 3, Issue 3, October - December (2012), pp. 23-29                        IJCET
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2012): 3.9580 (Calculated by GISI)
www.jifactor.com
                                                                           ©IAEME



                    MULTIPLE ROUTING CONFIGURATION

         A.S.Tamboli (Asst. Professor)                   Ms. B.A.Jadhawar(Asst. Professor)
        Dept. of Information Technology                   Dept. of Information Technology
   Annasaheb Dange College of Engineering and           Annasaheb Dange College of Engineering
               Technology,Ashta                               and Technology,Ashta
           shikalgar.arifa@gmail.com                       bajdhawar123@gmail.com


 ABSTRACT
        As we know today’s world surrounded with internet and internet is the most important
 part of the communication, but some routing protocols are work slow for recover link or
 node. So we introduce new routing protocol called as “Multiple Routing Configuration”
 (MRC). MRC protocol gives the guarantees for recovering both failed nodes and failed links,
 works without knowing the root cause of failure of node or links. MRC is connectionless and
 forward packet Hop-by-Hop. MRC keeps information of routing, and allow to forward packet
 through shortest alternate link after the failure. Using MRC we also can reduce the traffic on
 network and also reduce the time of forwarding packet after failure.

 Keywords: Routing, multiple routing, shortest Path

 I. INTRODUCTION
    Today’s Internet is so fast, central and it covers large area every day. The main problem of
 the internet to fast recover from the failure. There are many protocols to forward packet after
 the failure of links and nodes but they work after the failure such as BGP and IGP. In this
 case, packet can drop during the failure. The both protocols can give a more time to detect the
 failure, to send the NACK message to source and calculate the shortest path for the specific
 Destination. IGP is a slow process, it is reactive and global because it reacts after the failure
 arises and it can involves all the nodes in the network. In case of MRC is a proactive and
 local because it can stores the additional information of routing in the nodes and send the
 packet hop-by-hop from previous node of failure node by shortest path. These shortest paths
 are already calculated so the time for calculating shortest path is minimised after the failure,
 means the time for recover the node is reduced. MRC working without knowing the root
 cause of the failure such as node failure or link failure.

                                                23
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

II. MRC OVERVIEW
      MRC builds a set of backup routing configurations that are used to route the packet on
alternate path after failure. The backup configuration is different from original network
configuration. In observation, If traffic on a link is high then traffic doesn’t routed through
that link or node.

     MRC scheme is based on three steps. First, create a set of backup configurations for
each and every node; forward the packet using one of this after the failure of node or link.
Second, for calculating shortest path use the OSPF for each backup configuration and create
forward table for each configuration. Finally, design a packet forwarding process that shows
the advantage of backup configurations to facilities fast recovery from a component failure.

III. CREATE BACKUP CONFIGURATIONS
        MRC configuration is based on network topology; network topology is like a graph,
with collection of nodes and unidirectional links. It gives the guarantee fault tolerance; the
network topology graph must be bi-connected. Each link having the weight, this weight
necessary for deciding the node is isolated, restricted or normal. Isolated node doesn’t carry
any traffic; restricted links carry traffic at sufficient high weight. Isolated nodes are those
nodes that having only restricted or isolated nodes. Means restricted links are always between
the isolated node and non-isolated node. Isolated links between isolated node and non
isolated node or between two isolated nodes.

        Backbone:- All isolated nodes are directly connected to the backbone configuration.
Validating configurations are connected to the backbone.

       Isolated Node




                                  Fig 1:- Isolated Node and Link


        Isolated nodes are those how’s weight having infinity or maximum than the link cost.
This link cannot be used to forward the packet from one node to another node.


                                              24
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

        Non-isolated nodes or links either normal or restricted (nodes/links). This node and
links can be used to forward the packet from one node to another node.

       Restricted Node




                                 Fig 2:- Restricted Node and Link

        Restricted nodes are those how’s weight having less than maximum cost of link but
close to the maximum cost of the link. After sending some packets at the same time through
this node, this node goes under the isolated node.
        That means restricted links are used to isolate the node after forwarding some traffic.
Within MRC, Restricted and isolated links are always attached to isolated nodes.

       This means that a restricted link always connects an isolated node to a non-isolated
node. An isolated link either connects an isolated node to a non-isolated node, or it connects
two isolated nodes.


IV. FORWARDING PROCESS
        When the packet travel through network and reach at the point of failure, the previous
node to failure node or link is called detecting node. This node is responsible for searching
the appropriate backup configuration for that failure node or isolated node without knowing
the root cause of the failure of component. Using that backup configuration the packet can be
sent through the alternative path. This alternative path is a loop less and shortest one.




                                              25
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME




                            Fig 3:- Forward Packet Form ‘A’ To ‘B’

        As shown in above figure the packet is forwarded form source ‘a’ to destination ‘b’.
There is no any failure between the source and destination the packet is sent normally but
failure in path then the backup configuration is applied if the link or node is fail then packet is
dropped and previous node can look for the alternate path in the backup configuration. There
is no alternate path then packet is dropped otherwise packet sent by alternate shortest path.

Forwarding Table




                                    Fig 4:- Forwarding Table




                                                26
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

        Forwarding table shows the information about all nodes and represent the     cost on
those links that are connected to the nodes.

       Shortest Path




                                    Fig 5:- Shortest Path

       In this part, shows the all path present between from node and to node but use only
those path that having minimum traffic. That means having the low costs on their links.
Shortest path assures that the successful packet reach at the destination than the other path
because of the other links having the more weight than shortest path. Having more weight is
responsible for the congestion; due to congestion packets are dropped.

Forward Packet




                                 Fig 6:- Forwarding Packet




                                             27
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

       This is the actual packet forwarding process. In this the packet is forwarded from
source to destination using the shortest path. In case of failure of node or link MRC use the
backup configuration and sends the packet using the alternate shortest path.


V. PERFORMANCE EVALUATION

        Multiple Routing Configuration requires the routers to store the additional
information of the routing configurations and backup configurations. The amount of memory
required in the routers to store the configurations is depends on the total configuration. The
total load of the network is reduced and time required for again sending the packet from
source to destination after failure is also reduced.




                      Fig 7:- Graph in case node failure in IGP & MRC

        The IGP and BGP are taking a several time for determining the cause of failure, and
calculating the alternate shortest path for forwarding packet from source to destination. MRC
already provides the backup configuration means on the creation of the network that’s why
the time for calculating shortest path is totally minimised. MRC is local; means time required
for forwarding the packet from detecting node to destination is less. MRC recovers the failure
components within the seconds.

VI. CONCLUSION

       In this paper Multiple Routing Configurations is achieve fast recovery in IP networks.
MRC uses routing information stored on the routers and allow them to forward the packet
through routers, avoiding the failed components in the networks. In a bi-connected network
MRC gives the guarantees to recover single failed link or node. MRC works without knowing
the root cause of the failure of the components and forward the packet hop-by-hop
successfully by solving the problems. It reduces the load of the network and time required to
reach at the destination after the failure of the component.



                                             28
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 –
6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME

REFERENCES

1] Amund Kvalbein, Member, IEEE, Audun Fosselie Hansen, Tarik ˇ Ciˇcic´, Member, IEEE,
Stein Gjessing, Member, IEEE, and Olav Lysne, Member, IEEE

2] A. Basu and J. G. Riecke, “Stability issues in OSPF routing,” in Proc. ACM SIGCOMM,
San Diego, CA, Aug. 2001, pp. 225–236.

3] A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C.-N. Chuah, and C. Diot,
“Characterization of failures in an IP backbone network,” in Proc. IEEE INFOCOM, Mar.
2004, vol. 4, pp. 2307–2317.

4] S. Nelakuditi, S. Lee, Y. Yu, Z.-L. Zhang, and C.-N. Chuah, “Fast local rerouting for
handling transient link failures,” IEEE/ACM Trans. Networking, vol. 15, no. 2, pp. 359–372,
Apr. 2007.

5] P. Francois, M. Shand, and O. Bonaventure, “Disruption free topology reconfiguration in
OSPF networks,” in Proc. IEEE INFOCOM, Anchorage, AK, May 2007, pp. 89–97

6] P. Francois, C. Filsfils, J. Evans, and O. Bonaventure, “Achieving sub-second IGP
convergence in large IP networks,” ACM SIGCOMM Comput. Commun. Rev., vol. 35, no. 2,
pp. 35–44, Jul. 2005.

7] A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C.-N. Chuah, and C. Diot,
“Characterization of failures in an IP backbone network,” in Proc. IEEE INFOCOM, Mar.
2004, vol. 4, pp. 2307–2317.




                                            29

Más contenido relacionado

La actualidad más candente

Packet switching
Packet switchingPacket switching
Packet switching
Vikash Dhal
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinks
Swapnil Raut
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
jayaprakash
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Chapter 2. vantage understanding sensor placement in networks
Chapter 2. vantage  understanding sensor placement in networksChapter 2. vantage  understanding sensor placement in networks
Chapter 2. vantage understanding sensor placement in networks
Phu Nguyen
 
Final several design issues at network layer
Final several design issues at network layerFinal several design issues at network layer
Final several design issues at network layer
Kashyap Davariya
 

La actualidad más candente (20)

Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
 
Camp finall
Camp finallCamp finall
Camp finall
 
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 80...
 
Packet switching
Packet switchingPacket switching
Packet switching
 
TransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinksTransparentInterconnectionsofLotofLinks
TransparentInterconnectionsofLotofLinks
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Ch 18 intro to network layer - section 1
Ch 18   intro to network layer - section 1Ch 18   intro to network layer - section 1
Ch 18 intro to network layer - section 1
 
parallel Questions & answers
parallel Questions & answersparallel Questions & answers
parallel Questions & answers
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Chapter 2. vantage understanding sensor placement in networks
Chapter 2. vantage  understanding sensor placement in networksChapter 2. vantage  understanding sensor placement in networks
Chapter 2. vantage understanding sensor placement in networks
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
SDN and it’s Application in Wireless Mesh Network
SDN and it’s Application in Wireless Mesh NetworkSDN and it’s Application in Wireless Mesh Network
SDN and it’s Application in Wireless Mesh Network
 
Ch 18 intro to network layer - section 2
Ch 18   intro to network layer - section 2Ch 18   intro to network layer - section 2
Ch 18 intro to network layer - section 2
 
Computer Networking 2
Computer Networking 2Computer Networking 2
Computer Networking 2
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
packet switching
packet switchingpacket switching
packet switching
 
Final several design issues at network layer
Final several design issues at network layerFinal several design issues at network layer
Final several design issues at network layer
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 et
 

Similar a Multiple routing configuration

Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...
IAEME Publication
 
Shared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multipleShared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multiple
iaemedu
 
Routing management for mobile ad hoc networks
Routing management for mobile ad hoc networksRouting management for mobile ad hoc networks
Routing management for mobile ad hoc networks
IAEME Publication
 
Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2
IAEME Publication
 
On improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheOn improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring sche
IAEME Publication
 
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
IAEME Publication
 

Similar a Multiple routing configuration (20)

“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
Enhanced Multiple Routing Configurations for Fast IP Network Recovery from Mu...
Enhanced Multiple Routing Configurations for Fast IP Network Recovery from Mu...Enhanced Multiple Routing Configurations for Fast IP Network Recovery from Mu...
Enhanced Multiple Routing Configurations for Fast IP Network Recovery from Mu...
 
Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...Shared bandwidth reservation of backup paths of multiple lsp against link and...
Shared bandwidth reservation of backup paths of multiple lsp against link and...
 
Shared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multipleShared bandwidth reservation of backup paths of multiple
Shared bandwidth reservation of backup paths of multiple
 
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
 
50120140503018
5012014050301850120140503018
50120140503018
 
Routing management for mobile ad hoc networks
Routing management for mobile ad hoc networksRouting management for mobile ad hoc networks
Routing management for mobile ad hoc networks
 
Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2Energy efficient routing protocol to increase manet life time using cluster 2
Energy efficient routing protocol to increase manet life time using cluster 2
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
On improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheOn improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring sche
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV Algorithm
 
C0431320
C0431320C0431320
C0431320
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
A Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing ProtocolsA Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing Protocols
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
50120140506004
5012014050600450120140506004
50120140506004
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
The detection of routing misbehavior in mobile ad hoc networks using the 2 ac...
 

Más de IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

Más de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Multiple routing configuration

  • 1. International Journal JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY INTERNATIONAL of Computer Engineering and Technology (IJCET), ISSN 0976 – (IJCET) 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 3, Issue 3, October - December (2012), pp. 23-29 IJCET © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2012): 3.9580 (Calculated by GISI) www.jifactor.com ©IAEME MULTIPLE ROUTING CONFIGURATION A.S.Tamboli (Asst. Professor) Ms. B.A.Jadhawar(Asst. Professor) Dept. of Information Technology Dept. of Information Technology Annasaheb Dange College of Engineering and Annasaheb Dange College of Engineering Technology,Ashta and Technology,Ashta shikalgar.arifa@gmail.com bajdhawar123@gmail.com ABSTRACT As we know today’s world surrounded with internet and internet is the most important part of the communication, but some routing protocols are work slow for recover link or node. So we introduce new routing protocol called as “Multiple Routing Configuration” (MRC). MRC protocol gives the guarantees for recovering both failed nodes and failed links, works without knowing the root cause of failure of node or links. MRC is connectionless and forward packet Hop-by-Hop. MRC keeps information of routing, and allow to forward packet through shortest alternate link after the failure. Using MRC we also can reduce the traffic on network and also reduce the time of forwarding packet after failure. Keywords: Routing, multiple routing, shortest Path I. INTRODUCTION Today’s Internet is so fast, central and it covers large area every day. The main problem of the internet to fast recover from the failure. There are many protocols to forward packet after the failure of links and nodes but they work after the failure such as BGP and IGP. In this case, packet can drop during the failure. The both protocols can give a more time to detect the failure, to send the NACK message to source and calculate the shortest path for the specific Destination. IGP is a slow process, it is reactive and global because it reacts after the failure arises and it can involves all the nodes in the network. In case of MRC is a proactive and local because it can stores the additional information of routing in the nodes and send the packet hop-by-hop from previous node of failure node by shortest path. These shortest paths are already calculated so the time for calculating shortest path is minimised after the failure, means the time for recover the node is reduced. MRC working without knowing the root cause of the failure such as node failure or link failure. 23
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME II. MRC OVERVIEW MRC builds a set of backup routing configurations that are used to route the packet on alternate path after failure. The backup configuration is different from original network configuration. In observation, If traffic on a link is high then traffic doesn’t routed through that link or node. MRC scheme is based on three steps. First, create a set of backup configurations for each and every node; forward the packet using one of this after the failure of node or link. Second, for calculating shortest path use the OSPF for each backup configuration and create forward table for each configuration. Finally, design a packet forwarding process that shows the advantage of backup configurations to facilities fast recovery from a component failure. III. CREATE BACKUP CONFIGURATIONS MRC configuration is based on network topology; network topology is like a graph, with collection of nodes and unidirectional links. It gives the guarantee fault tolerance; the network topology graph must be bi-connected. Each link having the weight, this weight necessary for deciding the node is isolated, restricted or normal. Isolated node doesn’t carry any traffic; restricted links carry traffic at sufficient high weight. Isolated nodes are those nodes that having only restricted or isolated nodes. Means restricted links are always between the isolated node and non-isolated node. Isolated links between isolated node and non isolated node or between two isolated nodes. Backbone:- All isolated nodes are directly connected to the backbone configuration. Validating configurations are connected to the backbone. Isolated Node Fig 1:- Isolated Node and Link Isolated nodes are those how’s weight having infinity or maximum than the link cost. This link cannot be used to forward the packet from one node to another node. 24
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME Non-isolated nodes or links either normal or restricted (nodes/links). This node and links can be used to forward the packet from one node to another node. Restricted Node Fig 2:- Restricted Node and Link Restricted nodes are those how’s weight having less than maximum cost of link but close to the maximum cost of the link. After sending some packets at the same time through this node, this node goes under the isolated node. That means restricted links are used to isolate the node after forwarding some traffic. Within MRC, Restricted and isolated links are always attached to isolated nodes. This means that a restricted link always connects an isolated node to a non-isolated node. An isolated link either connects an isolated node to a non-isolated node, or it connects two isolated nodes. IV. FORWARDING PROCESS When the packet travel through network and reach at the point of failure, the previous node to failure node or link is called detecting node. This node is responsible for searching the appropriate backup configuration for that failure node or isolated node without knowing the root cause of the failure of component. Using that backup configuration the packet can be sent through the alternative path. This alternative path is a loop less and shortest one. 25
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME Fig 3:- Forward Packet Form ‘A’ To ‘B’ As shown in above figure the packet is forwarded form source ‘a’ to destination ‘b’. There is no any failure between the source and destination the packet is sent normally but failure in path then the backup configuration is applied if the link or node is fail then packet is dropped and previous node can look for the alternate path in the backup configuration. There is no alternate path then packet is dropped otherwise packet sent by alternate shortest path. Forwarding Table Fig 4:- Forwarding Table 26
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME Forwarding table shows the information about all nodes and represent the cost on those links that are connected to the nodes. Shortest Path Fig 5:- Shortest Path In this part, shows the all path present between from node and to node but use only those path that having minimum traffic. That means having the low costs on their links. Shortest path assures that the successful packet reach at the destination than the other path because of the other links having the more weight than shortest path. Having more weight is responsible for the congestion; due to congestion packets are dropped. Forward Packet Fig 6:- Forwarding Packet 27
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME This is the actual packet forwarding process. In this the packet is forwarded from source to destination using the shortest path. In case of failure of node or link MRC use the backup configuration and sends the packet using the alternate shortest path. V. PERFORMANCE EVALUATION Multiple Routing Configuration requires the routers to store the additional information of the routing configurations and backup configurations. The amount of memory required in the routers to store the configurations is depends on the total configuration. The total load of the network is reduced and time required for again sending the packet from source to destination after failure is also reduced. Fig 7:- Graph in case node failure in IGP & MRC The IGP and BGP are taking a several time for determining the cause of failure, and calculating the alternate shortest path for forwarding packet from source to destination. MRC already provides the backup configuration means on the creation of the network that’s why the time for calculating shortest path is totally minimised. MRC is local; means time required for forwarding the packet from detecting node to destination is less. MRC recovers the failure components within the seconds. VI. CONCLUSION In this paper Multiple Routing Configurations is achieve fast recovery in IP networks. MRC uses routing information stored on the routers and allow them to forward the packet through routers, avoiding the failed components in the networks. In a bi-connected network MRC gives the guarantees to recover single failed link or node. MRC works without knowing the root cause of the failure of the components and forward the packet hop-by-hop successfully by solving the problems. It reduces the load of the network and time required to reach at the destination after the failure of the component. 28
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 – 6367(Print), ISSN 0976 – 6375(Online) Volume 3, Issue 3, October-December (2012), © IAEME REFERENCES 1] Amund Kvalbein, Member, IEEE, Audun Fosselie Hansen, Tarik ˇ Ciˇcic´, Member, IEEE, Stein Gjessing, Member, IEEE, and Olav Lysne, Member, IEEE 2] A. Basu and J. G. Riecke, “Stability issues in OSPF routing,” in Proc. ACM SIGCOMM, San Diego, CA, Aug. 2001, pp. 225–236. 3] A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C.-N. Chuah, and C. Diot, “Characterization of failures in an IP backbone network,” in Proc. IEEE INFOCOM, Mar. 2004, vol. 4, pp. 2307–2317. 4] S. Nelakuditi, S. Lee, Y. Yu, Z.-L. Zhang, and C.-N. Chuah, “Fast local rerouting for handling transient link failures,” IEEE/ACM Trans. Networking, vol. 15, no. 2, pp. 359–372, Apr. 2007. 5] P. Francois, M. Shand, and O. Bonaventure, “Disruption free topology reconfiguration in OSPF networks,” in Proc. IEEE INFOCOM, Anchorage, AK, May 2007, pp. 89–97 6] P. Francois, C. Filsfils, J. Evans, and O. Bonaventure, “Achieving sub-second IGP convergence in large IP networks,” ACM SIGCOMM Comput. Commun. Rev., vol. 35, no. 2, pp. 35–44, Jul. 2005. 7] A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C.-N. Chuah, and C. Diot, “Characterization of failures in an IP backbone network,” in Proc. IEEE INFOCOM, Mar. 2004, vol. 4, pp. 2307–2317. 29