scholarly journals Comparison Analysis of Multipath Routing Implementation in Software Defined Network

Author(s):  
Syaifuddin Syaifuddin ◽  
Muhamad Fathul Azis ◽  
Fauzi Dwi Setiawan Sumadi

Multipath routing is a path search method used as a data transmission process utilizing more than one available path on a network. The multipath routing concept is directed to substitute the single path routing concept for reducing network traffic congestion by distributing data transmission through several available paths. It can be implemented in the Software Defined Network (SDN) environment that separates the control plane and the data plane, which provides flexibility by deploying application-based solutions to resolve the problem. This paper is directed to implement the modified Deep First Search (DFS) multipath routing algorithm and compare the proposed method with Dijkstra and normal DFS multipath algorithm. The contribution was designed by combining the node, edge, path, and bucket weight using port statistics available in OpenFlow standard and manual calculation. The results of the system’s emulation showed that the overall algorithm could determine more than one path for the data transmission process. The average execution time on all algorithms produced 0.0903 ms for the modified DFS multipath algorithm, 0.0858 ms for DFS multipath algorithm, and 0.901 ms Dijkstra multipath algorithm, respectively. The QoS parameter testing results illustrated that the proposed method was better than another multipath routing algorithm in terms of throughput and jitter. However, based on packet loss percentage, the modified method was placed after normal DFS but still generated better results than Dijkstra. Overall, the implement multipath routing concept in SDN with all algorithms could be deployed to provide more than one data transmission path.

2021 ◽  
Vol 1791 (1) ◽  
pp. 012054
Author(s):  
A A Lyubchenko ◽  
E Y Kopytov ◽  
A G Malyutin ◽  
A A Bogdanov

Electronics ◽  
2021 ◽  
Vol 10 (10) ◽  
pp. 1138
Author(s):  
Yu Lu ◽  
Liu Chang ◽  
Jingwen Luo ◽  
Jia Wu

With the rapid popularization of 5G communication and internet of things technologies, the amount of information has increased significantly in opportunistic social networks, and the types of messages have become more and more complex. More and more mobile devices join the network as nodes, making the network scale increase sharply, and the tremendous amount of datatransmission brings a more significant burden to the network. Traditional opportunistic social network routing algorithms lack effective message copy management and relay node selection methods, which will cause problems such as high network delay and insufficient cache space. Thus, we propose an opportunistic social network routing algorithm based on user-adaptive data transmission. The algorithm will combine the similarity factor, communication factor, and transmission factor of the nodes in the opportunistic social network and use information entropy theory to adaptively assign the weights of decision feature attributes in response to network changes. Also, edge nodes are effectively used, and the nodes are divided into multiple communities to reconstruct the community structure. The simulation results show that the algorithm demonstrates good performance in improving the information transmission’s success rate, reducing network delay, and caching overhead.


2016 ◽  
Vol 37 (1) ◽  
pp. 231-252
Author(s):  
Marcin Bednarek ◽  
Tadeusz Dąbrowski ◽  
Tomasz Wawer

Abstract Communication between the process stations of the distributed control system is carried out. By the supervision and therapeutic systems of the stations communication process diagnosis is performed. Supervision and therapeutic systems are responsible for the security of transmitted data. The security is considered in this article mainly in the aspect of resistance to external destructive factors on the data transmission process. It is assumed that the transmission security can be provided by mechanisms protecting the integrity of the transmitted data. Correctness of the data is controlled by using one-way hash function calculated on the basis of the transmitted value variable and also is attached to the transmitted data. This allows to maintain the integrity of the transmitted process data. A solutions using one-way hash function to protection of the transmission before changing message contents (caused by eg. intruder interference) are proposed in the article.


2021 ◽  
Vol 12 (1) ◽  
pp. 53-72
Author(s):  
Mohsin Khan ◽  
Bhavna Arora

Connected automated vehicle (CAV) technology is the core for the new age vehicles in research phase to communicate with one another and assimilation of vehicular ad-hoc network (VANET) for the transference of data between vehicles at a quantified place and time. This manuscript is an enactment of the algorithms associated to the maintenance of secure distance amongst vehicles, lane shifting, and overtaking, which will diminish the occurrence of collisions and congestions especially phantom jams. Those implementations are centered over CAV and VANET technology for the interconnection of the vehicles and the data transmission. The data is associated to the aspects of a vehicle such as speed, position, acceleration, and acknowledgements, which acts as the fundamentals for the computation of variables. In accordance with the environment of a particular vehicle (i.e., its surrounding vehicles), real-time decisions are taken based on the real-time computation of the variables in a discrete system.


2017 ◽  
Vol 13 (04) ◽  
pp. 45 ◽  
Author(s):  
Liping LV

<p class="0abstract"><span lang="EN-US">Wireless sensor network is a new field of computer science and technology research. It has a very broad application prospects. In order to improve the network survival time, it is very important to design efficient energy-constrained routing protocols. In this paper, we studied the characteristics of wireless sensor networks, and analyzed the design criteria of sensor network routing algorithms. In view of the shortcomings of traditional algorithms, we proposed an energy-aware multi-path algorithm. When selecting a data transmission path, the energy-aware multi-path algorithm can avoid nodes with low energy levels. At the same time, it takes the remaining energy of the node and the number of hops as one of the measures of the path selection. The multi-path routing algorithm realized the low energy consumption of the data transmission path, thus effectively prolonging the network lifetime. Compared with the traditional algorithm, the results show that our method has high reliability and energy efficiency.</span></p>


Author(s):  
Jin Yong-xian

To improve the energy efficiency of the wireless sensor network (WSN), and extend the network life. This paper proposes an improved unequal clustering multipath routing algorithm (UCMRA). The algorithm improves the formula of cluster head selection probability and competition radius, and considers the energy factor, node density, optimal number of cluster heads, etc. Experimental results show that, compared with the traditional algorithm, UCMRA has more stable cluster head distribution, less energy consumption and longer network lifetime.


Author(s):  
Haoxiang Wang

In recent times Automation is emerging every day and bloomed in every sector. Intelligent Transportation System (ITS) is one of the important branches of Automation. The major constrain in the transportation system is traffic congestion. This slurps the individual’s time and consequently pollutes the environment. A centralized management is required for optimizing the transportation system. The current traffic condition is predicted by evaluating the historical data and thereby it reduces the traffic congestion. The periodic update of traffic condition in each and every street of the city is obtained and the data is transferred to the autonomous vehicle. These data are obtained from the simulation results of transportation prediction tool SUMO. It is proved that our proposed work reduces the traffic congestion and maintains ease traffic flow and preserves the fleet management.


T-Comm ◽  
2020 ◽  
Vol 14 (6) ◽  
pp. 4-12
Author(s):  
А.А. Lyubchenko ◽  
◽  
E.Yu. Kopytov ◽  
A.A. Bogdanov ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document