Downloads: 119 | Views: 301
Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016 | Popularity: 6.4 / 10
Cost-Effective Resource Allocation of Overlay Routing Relay Nodes ? A Survey
Anuradha B. Jadhav, Nandkishor G. Dharashive
Abstract: Today Internet is a very popular and vastly growing application. It added support for various new services as compared to past 3 decades Internet. The services like mobility, real time support and much more requires continuous evolution in Internet techniques and infrastructure. As number of users increasing day by day, Internet suffers from various problems such as bottleneck, congestion, path and server failure etc. To overcome or minimize these problems Internet wants new schemes with little or no change in present routing infrastructure. Overlays are the best solution, which provides new functionalities and improves previous properties without making any change in routing standards and network infrastructure. Overlay is an additional virtual layer providing new functionalities to present routing infrastructure. Overlay network constructed on top of surviving network. Some present overlay networks are oTCP, RON, Detour, G-ISP designed to provide some functionalities. oTCP is an Overlay network, it increase TCP performance of connection by converting a TCP connection into multiple pipelined sub-connection. Each sub-connection follows end to end nature of TCP. RON is designed to provide fast fault recovery. RON is an application layer overlay network so it route packet according to application specific routing metrics. Instead of dedicated links Detour takes alternate paths to increase performance and availability. Detour routers form a virtual layer of functionality by tunneling packets over standard Internet. The inter-domain routing functionalities such as end to end inter-AS QoS, multicasting are offered by G-ISP to its customers, which todays Internet doesnt provide.
Keywords: Overlay, Overlay network
Edition: Volume 5 Issue 1, January 2016
Pages: 1545 - 1547
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2001
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 719
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 699
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 688
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera