Deterministic Routing in OSPF for Post Single Link Failure
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 2
Abstract
In the Internet, link-state routing protocols, that are commonly deployed tend to converge globally after any of real-time applications. Topological change in the network i.e. news of the change is propagated to all the routers in the network. Such network-wide protocol convergence introduces transient inconsistency in the routing tables of the routers in the network. This inconsistency of routing tables may lead to the formation loops in the network. Study shows that such loops cause a significant packet forwarding discontinuity in the network and severely affects performance In this paper a technique to handle transient Convergence is initiated only for long-lasting failures in the network. single link failures in OSPF networks, without initiating global IP convergence process. Our technique is based on adding information in the packets traversing the failure by the routers attached to the failed link, and then locally rerouting them .
Authors and Affiliations
Dnyaneshwar Dhangar , Sachin Bojewar
Performance Enhancement of a Novel Interleaved Boost Converter by using a Soft-Switching Technique
In this paper a novel Interleaved Boost Converter (IBC) with soft-switching techniques is proposed. Through the zero-voltage switching (ZVS) and zero-current switching (ZCS) reduces the current stress of the main circuit...
Risk Assessment in Online Banking System
With the development of information technology and the popular use of the information network system, the security of the information system becomes particularly important. To ensure the security of the information syste...
Enhancing Detection Rate in Selfish Attack Detection Scheme in Cognitive Radio Adhoc Networks
Cognitive radio (CR) is a significant communication technology in which the unlicensed users use the maximum available bandwidth. When the spectrum is not used by the licensed primary user, the obtainable channels are al...
Detection of Spoofing Using Packet Marking Algorithm
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. However the localization infrastructure can be subjected to non cryptographic attacks, such as signal at...
IPv4 Mobility Support
Mobile computing offers mobile users anytime, anywhere bi-directional reliable access to the Internet. Mobile IP as a network layer routing protocol has been designed by the IETF (Internet Engineering Task Force) to prov...