Downloads: 100 | Views: 265
Research Paper | Computer Science & Engineering | Ghana | Volume 4 Issue 2, February 2015 | Popularity: 6.3 / 10
Reliable and Rapid Routing Configurations for Network Recovery
William Asiedu K. O. Boateng
Abstract: Today the Internet has a wide ranging impact on the way business is conducted as well as on the way we live. The volume of communications and commerce handled by the internet is growing exponentially. Aninterruption of a link in a network has the potential to affect hundreds of thousands of businesses or internet connections, with obvious adverse effects. The ability to recover from failures has always been a central design goal in the Internet. IP networks are intrinsically robust, since IGP routing protocols like OSPF are designed to update the forwarding information based on the changed topology after a failure. In this paper we provide the routers with additional routing configurations, allowing them to forward packets along routes that avoid a failed component. This mechanism is used to handle both link and node failures, without knowing the root cause of the failure. The backup link provided analyzes its performance with respect to scalability, backup path lengths, and load distribution after a failure. This paper also calculates approximately the traffic demands in the network and reduces the likelihood congestion.
Keywords: Internet, Routing, Topology, Scalability, Distribution
Edition: Volume 4 Issue 2, February 2015
Pages: 2448 - 2452
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera