Research Paper | Computer Science & Engineering | Ghana | Volume 4 Issue 2, February 2015
Reliable and Rapid Routing Configurations for Network Recovery
William Asiedu K. O. Boateng
Today the Internet has a wide ranging impact on the way business is conducted as well as on the way we live. The volume of communications and commerce handled by the internet is growing exponentially. Aninterruption of a link in a network has the potential to affect hundreds of thousands of businesses or internet connections, with obvious adverse effects. The ability to recover from failures has always been a central design goal in the Internet. IP networks are intrinsically robust, since IGP routing protocols like OSPF are designed to update the forwarding information based on the changed topology after a failure. In this paper we provide the routers with additional routing configurations, allowing them to forward packets along routes that avoid a failed component. This mechanism is used to handle both link and node failures, without knowing the root cause of the failure. The backup link provided analyzes its performance with respect to scalability, backup path lengths, and load distribution after a failure. This paper also calculates approximately the traffic demands in the network and reduces the likelihood congestion.
Keywords: Internet, Routing, Topology, Scalability, Distribution
Edition: Volume 4 Issue 2, February 2015
Pages: 2448 - 2452
How to Cite this Article?
William Asiedu K. O. Boateng, "Reliable and Rapid Routing Configurations for Network Recovery", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB151819, Volume 4 Issue 2, February 2015, 2448 - 2452
Similar Articles with Keyword 'Internet'
Review on Deep Learning and IoT Techniques on Corono Virus
A Survey based IoT Model to Maintain Social Distancing
Similar Articles with Keyword 'Routing'
Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Review on Various Data Gathering Techniques Using Artificial Intelligence
Varsha Kumari, Preeti Sondhi
Similar Articles with Keyword 'Topology'
A Survey of Thinning Techniques on Two Dimensional Binary Images
Moumita Sarkar, Santanu Chatterjee
A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Similar Articles with Keyword 'Scalability'
Categorize & Compare Cloud Automation & Devops Tools
Pardeep Singh Virdi
Key Management in Wireless Sensor Networks - A Review
Majida C V, Sandhya V
Similar Articles with Keyword 'Distribution'
A Survey on the Applications of Generative Adversarial Networks
Ashish Roy, Dr. B. G. Prasad
Survey on Hubness - Based Clustering Algorithms
Nikita Dhamal, Antara Bhatttacharya