BUILDING SCALABLE NETWORK MODEL TO ACCOMPLISH THE ADVANTAGES OF MULTICAST NETWORK
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 4
Abstract
In the current network architecture Network coding algorithms usually encourages the flow of transmission in the network medium. The difficulty of multicast connections over implicit packet networks cause exceed amount of cost and introduces a new procedure for evaluating the presentation of wireless network by exploring the complexity of high throughput via lower bandwidth. Multicast routing for wired as well as wireless networks has focused on metrics that estimates the quality of data to maximize the throughput efficiency, and the nodes must collaborate in order to compute the path metric and forward data. Network Coding helps boost up the throughput efficiency and reduce the cost of data transmission, especially for one-to-many multicast applications. An interesting problem is to understand and count the coding advantage and cost advantage that is the potential benefits of network coding, as compared to routing, in terms of increasing throughput and reducing transmission cost, respectively. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and aggregation, as well as during data forwarding, leads to unexpected consequences in adversarial networks where compromised nodes act maliciously. It also explores the use of network in wireless multicast and investigates its effectiveness and efficiency of cost. In this system we identify novel attacks against high-efficiency data transfer multicast protocols in wireless networks. The attacks exploit the local estimation and global aggregation of the metric to allow attackers to attract a large amount of traffic. The proposed system shows that these attacks are very effective against multicast protocols based on high-throughput and it is so difficult to stop packets while transferring to destinations. While it maximizes throughput and efficiency, it also increases attack effectiveness in the absence of defense mechanisms. This approach to defend against the identified attacks combines measurement-based detection and accusation-based reaction techniques. The entire architecture proves that the upper- and lower-bounds on multicast coding advantage and cost advantage in these models.
Authors and Affiliations
M. A. Abhiraami , R. Yogeswari
HYDRODYNAMICS OF TWO-STAGE LIQUID-SOLID SEMI-FLUIDIZATION
To develop the concept of two-stage semi-fluidization on hydrodynamic characteristics viz. the bed pressure drop and formation of the top packed beds, investigation have been carried out in a two-stage semi-fl...
PhotoSynthesis – Photo Sharing Application (Android)
“PhotoSynthesis” is an Android application that provides its users a simple solution for sharing photos with friends and family. Traditionally, pictures are clicked and shared on numerous devices using social medi...
EVALUATION OF PERFORMANCE LEVEL OF SYMMETRIC AND ASYMMETRIC BUILDING BY ADOPTING A DUAL SYSTEM OF FRAMING
In the common practice, the building in the earthquake prone areas are very much easily influenceable to severe damage. The structure used to be designed in the earthquake prone areas the design shall not only be...
SOM ALGORITHM FOR CLOUD DATA CENTRE LOAD BALANCING
Cloud computing is an emerging technology in parallel and distributed computing which requires large amount of infrastructure and resources. To optimally serve the needs of the clients all over the world, their provider...
Production of Biodisel from Melon Seed
Oil from Melon seed was extracted using methanol and converted to biodiesel by sodium methoxide catalyst at the reaction temperature of 600C for the duration of thirty minutes. The pacentage oil yield was 41%. The phys...