Fast Network Path Restoration Through Modified Finite State Machine Model in Border Gateway Protocol

2019 ◽  
Vol 16 (10) ◽  
pp. 4394-4399
Author(s):  
Vidhu Baggan ◽  
Devendra Prasad ◽  
Prabhjot Kaur

The interminable Internet Connectivity is imperative for the present style of living and the swelling size of network traffic has kindled challenges for establishing a no jitter network. The twists of Routing Protocols and underlying mechanisms were undercover and need to be explored enough. In this paper, we review various dimensions of existing Network Path Restoration mechanisms and proposed a modification in the connection establishment process of Exterior Routing Protocol for quick network path restoration. The de-facto Routing Protocol for inter-autonomous systems is the Border Gateway Routing Protocol (BGP). The connection establishment process of BGP must be modified for the quick recovery from a link failure in a network. The need for TCP/IP, 3 ways handshake process during connection re-establishment in BGP must be mitigated. The goal of this research paper is to design a network, for the modification of the connection establishment process of BGP.

2019 ◽  
Vol 6 (3) ◽  
pp. 284
Author(s):  
Chairul Mukmin ◽  
Edi Surya Negara

<p><em>Each routing protocol has different algorithms and metrics in determining the best path on a network. Differences 1) Applications that only run on routing protocols 2) hardware from various vendors 3) Networks with different routing areas or domains. Some aspects that become a reference for some routing protocols that are issued from data sent and lost in the process of sending data (packet loss), speed in sending data (delay), as well as the ability of some routing protocols in choosing the closest distance when sending data transmission packets. Routing protocol characteristics. This study studies analyzing routing redistribution in dynamic routing protocols, in order to find out which routing protocols perform better in networks that are different from autonomous systems (AS) with measurement parameters of Throughput, Delay and Packet Loss.</em></p><p><em><strong>Keywords</strong> :  EIGRP, IS-IS, Redistribution Routing, RIP, Routing Protocol</em></p><p><em>Setiap protokol routing memiliki algoritma dan metrik yang berbeda-beda dalam menentukan jalur terbaik pada sebuah jaringan. </em><em>Perbedaan karakteristik tersebut menimbulkan beberapa masalah 1)aplikasi yang hanya  berjalan pada protokol routing tertentu 2)hardware dari berbagai vendor 3)Jaringan dengan area atau domain routing berbeda. Beberapa aspek yang menjadi acuan suatu protokol routing diantaranya dari segi data yang terkirim dan hilang dalam proses pengiriman data (packet loss), kecepatan dalam pengiriman data (delay), juga kemampuan suatu protokol routing dalam memilih jarak terdekat bahkan jalur terbaik dalam pengiriman paket data. Perbedaan karakteristik protokol routing tersebut</em><em> tersebut dapat diselesaikan dengan cara menggunakan redistribusi routing.</em><em> Penelitian ini bertujuan menganalisis perbandingan redistribusi routing pada protokol routing dinamik, guna mencari tahu protokol routing mana yang lebih baik kinerjanya dalam jaringan yang berbeda autonomous system (AS) dengan parameter pengukuran Throughput, Delay</em> dan <em>Packet Loss.</em></p><p><em><strong>Kata Kunci</strong> : </em><em>EIGRP, IS-IS, Redistribusi Routing, RIP, Protokol Routing</em><strong><em></em></strong></p>


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


Author(s):  
A. Radhika ◽  
D. Haritha

Wireless Sensor Networks, have witnessed significant amount of improvement in research across various areas like Routing, Security, Localization, Deployment and above all Energy Efficiency. Congestion is a problem of  importance in resource constrained Wireless Sensor Networks, especially for large networks, where the traffic loads exceed the available capacity of the resources . Sensor nodes are prone to failure and the misbehaviour of these faulty nodes creates further congestion. The resulting effect is a degradation in network performance, additional computation and increased energy consumption, which in turn decreases network lifetime. Hence, the data packet routing algorithm should consider congestion as one of the parameters, in addition to the role of the faulty nodes and not merely energy efficient protocols .Nowadays, the main central point of attraction is the concept of Swarm Intelligence based techniques integration in WSN.  Swarm Intelligence based Computational Swarm Intelligence Techniques have improvised WSN in terms of efficiency, Performance, robustness and scalability. The main objective of this research paper is to propose congestion aware , energy efficient, routing approach that utilizes Ant Colony Optimization, in which faulty nodes are isolated by means of the concept of trust further we compare the performance of various existing routing protocols like AODV, DSDV and DSR routing protocols, ACO Based Routing Protocol  with Trust Based Congestion aware ACO Based Routing in terms of End to End Delay, Packet Delivery Rate, Routing Overhead, Throughput and Energy Efficiency. Simulation based results and data analysis shows that overall TBC-ACO is 150% more efficient in terms of overall performance as compared to other existing routing protocols for Wireless Sensor Networks.


2012 ◽  
Vol 3 (2) ◽  
pp. 419-423
Author(s):  
JARUPULA RAJESHWAR ◽  
Dr G NARSIMHA

A freely moving nodes forming as group to communicate among themselves are called as Mobile AdHoc Networks (MANET). Many applications are choosing this MANET for effective commutation due to its flexible nature in forming a network. But due to its openness characteristics it is posing many security challenges. As it has highly dynamic network topology security for routing is playing a major role. We have very good routing protocols for route discovery as well as for transporting data packers but most of them lack the feature of security like AODV. In this paper we are studying the basic protocol AODV and identify how it can be made secure. We are studying a protocol S-AODV which is a security extension of AODV which is called Secure AODV (S-AODV) and we are studying enhanced version of S-AODV routing protocol a Adaptive Secure AODV (A-SAODV). Finally we have described about the parameter to be taken for performance evaluation of different secure routing protocols


2021 ◽  
pp. 1-11
Author(s):  
Shu Zhang ◽  
Jianhua Chen

 This paper analyzes the security algorithm and energy cost of wireless sensor networks in depth, and designs and implements a series of energy-optimized security solutions to ensure the secure establishment and operation of wireless sensor networks. This paper proposes an improved Ad hoc network routing protocol based on energy control. It introduces a low-energy balanced routing algorithm to reduce routing transmission energy consumption, balance network traffic, and improve the energy control performance of network routing protocols. The protocol uses a cross-layer design in this way, the route selection combines the information of the link the remaining energy. A joint function is formed by the transmit power level remaining energy. The joint function of all nodes on the path is used as the basis for route selection and applied to the route discovery stage. At the same time, the protocol introduces edge degree parameters in the establishment process, the idea of minimum energy consumption path and the introduction of energy consumption ratio parameters in the cluster skull backbone network generation process are adopted to realize the energy optimization of the path establishment process. At the same time, the protocol uses the message interaction mechanism in the path establishment process to implement a node security authentication scheme based on secret shared information without adding any routing communication messages, which effectively prevents the passive and active attacks of the attacker on the network. The results of simulation experiments prove that the secure routing protocol achieves the network’s balanced energy consumption while ensuring the secure communication of the network, and solves the energy problem.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1021
Author(s):  
Zhanserik Nurlan ◽  
Tamara Zhukabayeva ◽  
Mohamed Othman

Wireless sensor networks (WSN) are networks of thousands of nodes installed in a defined physical environment to sense and monitor its state condition. The viability of such a network is directly dependent and limited by the power of batteries supplying the nodes of these networks, which represents a disadvantage of such a network. To improve and extend the life of WSNs, scientists around the world regularly develop various routing protocols that minimize and optimize the energy consumption of sensor network nodes. This article, introduces a new heterogeneous-aware routing protocol well known as Extended Z-SEP Routing Protocol with Hierarchical Clustering Approach for Wireless Heterogeneous Sensor Network or EZ-SEP, where the connection of nodes to a base station (BS) is done via a hybrid method, i.e., a certain amount of nodes communicate with the base station directly, while the remaining ones form a cluster to transfer data. Parameters of the field are unknown, and the field is partitioned into zones depending on the node energy. We reviewed the Z-SEP protocol concerning the election of the cluster head (CH) and its communication with BS and presented a novel extended mechanism for the selection of the CH based on remaining residual energy. In addition, EZ-SEP is weighted up using various estimation schemes such as base station repositioning, altering the field density, and variable nodes energy for comparison with the previous parent algorithm. EZ-SEP was executed and compared to routing protocols such as Z-SEP, SEP, and LEACH. The proposed algorithm performed using the MATLAB R2016b simulator. Simulation results show that our proposed extended version performs better than Z-SEP in the stability period due to an increase in the number of active nodes by 48%, in efficiency of network by the high packet delivery coefficient by 16% and optimizes the average power consumption compared to by 34.


Author(s):  
Edy Victor Haryanto ◽  

In an underwater wireless sensor network (UWSN), research challenges occur in the availability of new connectivity protocols, sensors, and utilization of energy. One of the issues is to enhance the lifespan of the network without increasing the supply, cost, and level of resources. This paper proposes a conceptual routing protocol for UWSN, known as Energy-Efficient Multipath Adaptive Routing (E2MAR) protocols, which is primarily intended for long-term control with greater energy efficiency and transmission rate. Key development conditions were set by the E2MR and forward nodes are chosen based on the performance index. Different tests are carried out by evaluating E2MR in terms of the number of live nodes, end-to-end latency, packet delivery rate, and maximum energy usage efficiently compared to some other Routing protocols. The lifespan of the network has also been greatly enhanced.


2015 ◽  
Vol 4 (2) ◽  
pp. 390 ◽  
Author(s):  
Alaa Zain ◽  
Heba El-khobby ◽  
Hatem M. Abd Elkader ◽  
Mostafa Abdelnaby

A Mobile Ad-Hoc Networks (MANET) is widely used in many industrial and people's life applications, such as earth monitoring, natural disaster prevention, agriculture biomedical related applications, and many other areas. Security threat is one of the major aspects of MANET, as it is one of the basic requirements of wireless sensor network, yet this problem has not been sufficiently explored. The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS) attacks on network layer using proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocols like Ad hoc On-Demand Distance Vector (AODV), Hybrid routing protocols like Geographic Routing Protocol (GRP). Moreover, a comparative analysis of DoS attacks for throughput, Data loss, delay and network load is taken into account. The performance of MANET under the attack is studied to find out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The simulation is done using OPNET 17.


Sign in / Sign up

Export Citation Format

Share Document