Fast Recovery from Topology Changes and Communication Link Failures

S. Vasundra*, Sathyanarayana B**
* Associate Professor, Department of CSE, JNTUA College of Engineering, Anantapur.
** Professor & Chairman BOS, Department of CA & T, S.K. University, Anantapur.
Periodicity:October - December'2010
DOI : https://doi.org/10.26634/jse.5.2.1336

Abstract

In our everyday communication infrastructure mobile ad hoc networks plays a central role. In mobile ad hoc networks, how to achieve the multicast communication is a challenging task due to the fact that the topology may change frequently and communication links may be broken because of users’ mobility. We introduced MANSI (Multicast for Ad hoe Network with Swarm Intelligence) protocol, which relies on a swarm intelligence based optimization technique to learn and discover efficient multicast connectivity. The proposed protocol instances that it can quickly and efficiently establish initial multicast connectivity and/or improved the resulting connectivity via different optimization techniques. Using a simulation approach, we investigated performance of the proposed algorithm through a comparison with an algorithm previously proposed in the literature. Based on the numerical results, we demonstrate that our proposed algorithm performs well.

Keywords

Mobile ad hoc networks,Multicast algorithm,Hybrid Swarm Intelligence, Optimization techniques.

How to Cite this Article?

S. Vasundra and B. Sathyanarayana (2010). Fast Recovery from Topology Changes and Communication Link Failures. i-manager’s Journal on Software Engineering, 5(2),50-57. https://doi.org/10.26634/jse.5.2.1336

References

[1]. Kvalbein, A. F. Hansen, T. ? Ci?ci´c, S. Gjessing, and O. Lysne, (2009). “Fast IP network recovery using multiple routing configurations,” in Proceedings of IEEE INFOCOM, April.
[2]. S. Nelakuditi, S. Lee, Y. Yu, Z.-L. Zhang, and C.-N. Chuah, (2007). “Fast local rerouting for handling transient link failures,” IEEE/ACM Trans. Networking, Vol. 15, No. 2, April.
[3]. A. Markopoulou, G. Iannaccone, S. Bhattacharyya, and C. Diot, (2004). “Characterization of failures in an IP backbone network,” in Proc. IEEE INFOCOM, Mar. Vol. 4.
[4]. G. Iannaccon e, C. N. Chuah, S. Bhattacharyya, and C. Diot, (2004). “Feasibility of IP restoration in a tier 1 backbone,” IEEE Network, Vol. 18, No.2, pp.13-19, March.
[5]. S. Ramamurthy, L. Sahasrabuddhe, “Survivable WDM mesh networks,” J. Lightwave Technol., Vol. 21,No.4.
[6]. J. Moy, (1998). “OSPF version 2,” RFC 2328 (Standard), April 1998. [Online]. Available: http://www.ietf. org/rfc/rfc2328.txt.
[7]. ISO,(2002).“Information technology – Telecommunications and information exchange between systems – Intermediate System to Intermediate System intra-domain routing information exchange protocol for use in conjunction with the protocol for providing the connectionless-mode network service,” 2002.
[8]. M. Shand and S. Bryant, (2005). “IP fast reroute framework,” Internet-Draft, Oct. 2005. [Online]. Available: http://www.ietf.org/internet-drafts/draftietf- rtgwg-ipfrrframework- 04.txt.
[9]. P. Baran, (2002). “The beginnings of packet switching: some underlying concepts,” IEEE Commun. Mag., Vol. 40, No. 7, July.
[10]. S. Q. Zhuang, D. Geels, I. Stoica, and R. H. Katz, (2005). “On failure detection algorithms in overlay networks,” in IEEE INFOCOM, Vol. 3, Mar.
[11]. L. Fang, A. Atlas, F. Chiussi, K. Kompella, and G. Swallow, (2004). “LDP failure detection and recovery,” IEEE Commun. Mag., Vol. 42, No. 10, pp. 117–123, October.
[12]. M. Goyal, K.K. Ramakrishnan, and W.-C. Feng, (2003). “Achieveing faster failure detection in OSPF networks,” in IEEE International Conf. on Commun. (ICC)'03, Vol. 40, May.
[13]. Madaba Barath-Mumar and Jeffrey M. Jaffe, (1983). Routing to Multiple Destinations in Computer Networks. IEEE Transactions on Communications, 31 (3).
[14]. H. Eim, and C. Kim, (2000). Multicast Tree Construction and Flooding in Wireless Ad Hoc Networks. In AC-Ad International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM).
[15]. Tony Ballardie, Paul Rancis, and Jon Crowcroft (1993). Core-based trees (CBT): An Architecture for Scalable Inter-Domain Multicast Routing. In Communications, Architectures, protocols, and applications San Francisco, CA, USA.
[16]. S. Deering, D.L. Estrin, D. Farinacci, V. Jacobson, C.- G. Liu, and L. Wei (1996). The PIM Architecture for Wide- Area Multicast Routing. IEEE/ACM Transactions on Networking, 4(2):153-162.
[17]. J. Moy (1994). Multicast Routing Extensions for OSPF. Communications of the ACM7 37(8):61-66.
[18]. Sung-Ju Lee, -William Su, Julian Hsu, Mario Gerla, and Rajive Bagrodia (2000). A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols. In IEEE IWOGOM 2000, pp.565-574.
[19]. Mingyan Liu, Rajesh R. Talpade, and Anthony McAuley, (1999). AMRoute: Ad hoc Multicast Routing Protocol. Technical Report 99, The Institute for Systems Research, University of Maryland.
[20]. C.W. Wu and Y.C. Tay_ (1999). AMRIS: A Multicast Protocol for Ad hoc Wireless Networks. In IEEE Military Communications Conference (MILGOM), Atlantic City, NJ, pp.25-29.
[21]. C. Ho, K. Obraczka, G. Tsudik, and K. Viswanath, (1999). Flooding for Reliable Multicast in Multihop Ad Hoc Networks. In The 3rd Intl. workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL-M'99).
[22]. Raghupathy Sivakumar, Bevan Das, and Vaduvur Bharghavan, (1998). Spine Routing in Ad hoc Networks. A CM/Baltzer Publications Cluster Computing Journal, Special Issue on Mobile Computing.
[23]. P. Sinha, R. Sivakumar, and Bi. Bharghavan, (1999). CEDAR: A Core- Extraction Distributed Ad hoc Routing Algorithm. In IEEE INFOCOM' 99, New York City, NY.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.