Loop-free Alternates

The principles of Loop-free Alternates (LFA) are similar to that of ECMP, but LFA covers more cases. The primary path is always the shortest one, and all other paths along which the next-hop is closer to the destination than the sender are potential secondary paths. There is no global signaling, failures are not advertised throughout … Read more

The GridSim toolkit

The GridSim toolkit provides a comprehensive facility for simulation of different classes of, applications, heterogeneous resources resource brokers, users, and schedulers. Use to simulate application schedulers for single or multiple administrative domains distributed computing systems such as clusters and grids. Application schedulers, perform resource discovery, called resource brokers, selection, and aggregation of a diverse set … Read more

Multiple Routing Configurations

Average coverage on common networks (that is strongly dependent on the topology) shows variations from 60 to 90%. Indeed, when a link or a node fails, only the neighbors of the failure are initially aware that the failure has occurred and only neighboring node to the failure repair the failure. These repairing routers have to … Read more

Load Balancing Algorithms

• Two Phase Load Balancing Algorithm: The two phase scheduling algorithm combines Opportunistic Load Balancing and Min-Min scheduling algorithms to utilize better executing efficiency and maintain the load balancing of the system. Opportunistic scheduling algorithm keeps every node in working state to achieve the goal of load balance and Min Min scheduling algorithm is utilized … Read more

METHODOLOGY & IMPLEMENTATION – Enhanced Multiple Routing Configurations (EMRC)

3.1 Introduction Enhanced Multiple Routing Configurations (EMRC) is designed to support multiple failures by utilizing time slot mechanism and less number of backup configurations. EMRC is a threefold approach. First, create a set of backup configurations, such that every network component is excluded from packet forwarding in one configuration. Secondly, each configuration, a routing algorithm … Read more

Congestion in a network – proposal

CHAPTER-1 GENERAL INTRODUCTION Presently the Internet accommodates simultaneous audio, video, and data traffic. This requires the Internet to guarantee the packet loss which at its turn depends very much on congestion control. A series of protocols have been introduced to supplement the insufficient TCP mechanism controlling the network congestion. Core Stateless Fair Queuing (CSFQ) was … Read more

Dynamic scheduling algorithm for heterogeneous computers

This study developed a dynamic scheduling algorithm for heterogeneous computers that schedules application based on a historical database of runtime values. It can be noted that by storing and using the historical information, a scheduler can determine how to assign applications to heterogeneous processors that utilize all devices available and allow for a greater computational … Read more

Data Preprocessing

In the process of rough set data analysis, attributes can be reduced, which implies that some redundant attributes that do not play any role in distinguishing an object from the others, can be eliminated without any information loss. And the final result to which rough set approaches direct is the production rule that is capable … Read more

Dynamic scheduling

Dynamic scheduling is a method in which the hardware determines which instructions to execute, as opposed to a statically scheduled machine, in which the compiler determines the order of execution. In essence, the processor is executing instructions out of order. Dynamic scheduling is akin to a data flow machine, in which instructions don’t execute based … Read more

Intrusion detection systems (IDS)

CHAPTER 1 1.1. Introduction An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways. There are network … Read more

IP Networks

1.1 INTRODUCTION In last few decades the Internet has been transformed from a special purpose network to an omnipresent platform for a broad range of daily communication services. The demands on Internet availability and reliability have improved accordingly. An interruption of a link in central parts of a network has the ability to affect hundreds … Read more

The need to eliminate the missing record in the database

To enhance or make a new model that can make functional relationships between covariates and response variables. This model should work in a feedforward manner so that mean error is reached to threshold after finite no. of iteration [7]. Databases are complex structures that may conceal implicit patterns of information that cannot be easily discovered … Read more

Storing of Data Efficient and Secured Deduplication in Cloud

Abstract: Secure deduplication is a system for disposing of copy duplicates of capacity information, and gives security to them. To decrease storage room and transfer data transmission in distributed storage deduplication has been a surely understood strategy. For that reason concurrent encryption has been broadly embrace for secure deduplication, discriminating issue of making united encryption … Read more

A system for finding trip rate for both motorised and all modes (transport)

The primary purpose of the transportation planning process is to generate information useful for decision makers on the subject of the consequences of alternative transportation-related actions Transportation decisions impact many aspects of urban life. Young and old similar are pretentious by the viability and relative ease of travelling to destinations on foot, by bike, transit, … Read more

Search Logs Mining: Survey

Abstract. Search engine receives billions of queries every day and collect terabytes of user interaction data. These huge amount of data contains valuable information through which web search engine can be optimized. Search engine mostly relies on explicit judgement received from domain experts. To survive the competition search engine must understand user’s information needs very … Read more