IJRIT International Journal of Research in Information Technology, Volume 1, Issue 9, September, 2013, Pg. 232-241

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Multiple Routing Configurations for Fast IP Network Recovery with Enhanced Selective Repeat Automatic RepeatRequest Laxman Vijay H.V.1, Sudheer Kumar K.2, Krishnaiah R.V.3 1

Department of computer science Engineering, DRK College of Engineering & Technology, Hyderabad, India 2 Department of computer science Engineering, DRK College of Engineering & Technology, Hyderabad, India 3 Department of computer science Engineering, DRK College of Engineering & Technology, Hyderabad, India 1

[email protected], [email protected], [email protected]

Abstract Internet takes vital role in our communications infrastructure; due to traffic and overflow of packets after network failure become a budding problem [1]. As a promising approach to improve network reliability, Proactive Failure Recovery (PFR) [9] re-routes failure affected traffic to backup paths without waiting for the completion of IP routing convergence. But it does not provide good acknowledgement mechanism over the packets forwarded. That is, when the sender is running on fast machine or lightly loaded machine and receiver is on slow or heavily loaded machine, then the transmitter will transmit frames faster than the receiver can accept them. As Multiple Routing Configuration (MRC)[10] reroutes failure affected traffic to backup paths or alternative paths, due to waiting or retransmitting of packets till the receiver sends positive(+ve) or negative(-ve) acknowledgement(ACK), may degrade the performance and which leads to congestion. Therefore for reliability and from congestion free, here we proposed a well scheme called enhanced selective repeat automatic repeat request(ESRARQ)[4] mechanism during data transmission in IP networks. This regulates the packet and makes the packet transmission without any loss in a packet, using buffer system.

Keywords: Computer network reliability, protection, flow control, communication system fault tolerance.

Laxman Vijay H.V.,IJRIT

232

1. Introduction The Internet (or internet)[5]-[6] is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support email. Internet is a short form of the technical term internetwork, the result of interconnecting computer networks with special gateways or routers. This can be known by seeing the figure (1) below:-

Fig1: Network architecture The biggest problems in a network are related to the allocation of network resources, as buffers and link bandwidth, to different users when node or link failures. A limited amount of resources has to be shared among many different competing traffic flows in an efficient way in order to maximize the performance and the use of the network resources. The behavior of routers in terms of packet handling can be controlled to achieve different kind of services. It is a primary design goal of the Internet to continue to function despite of the node or link failures. At the IP level, when routers or links fail, the network should still be able to deliver the packets as long as alternative paths exist. In current routing protocols, such as OSPF (Open Shortest Path First) and IS-IS [5] (Intermediate System to Intermediate System), routers are informed about network topology changes by update messages, and then recalculate their routing paths accordingly. However, this approach incurs convergence delay, as it takes considerable long time for the update messages to propagate throughout the network and for the routers to re-calculate routing path. Therefore a different approach for handling physical failures is proactive failure recovery(PFR) in which routers compute and store backup paths for potential failures beforehand and once a failure is detected, a router will redirect traffic to backup paths right away instead of waiting for the completion of network wide routing convergence. Laxman Vijay H.V.,IJRIT

233

But here routers redirect traffic affected by failures to alternative paths without a proper flow control mechanism. Why because in most networks, there are circumstances in which the externally offered load is larger than can be handled even with optimal routing. Then, if no measures are taken to restrict the entrance of traffic into the network, queue sizes at bottleneck links will grow and packet delays will increase, possibly violating maximum delay specifications. Furthermore, as queue sizes grow indefinitely, the buffer space at some nodes may be exhausted. When this happens, some of the packets arriving at these nodes will have to be discarded and later retransmitted, thereby wasting communication resources. As a result, a phenomenon similar to a highway traffic jam may occur whereby, as the offered load increases, the actual network throughput decreases while packet delay becomes excessive. It is thus necessary at times to prevent some of the offered traffic from entering the network to avoid this type of congestion. This is one of the main functions of flow control. But this flow control mechanism is not properly managed in the existing system of multiple routing configurations for fast IP network recovery. Why because, in MRC mechanism whenever a failure happens in the network it can generate an alternate link immediately by using preconfigured data and the packets are forwarded through that rout and continuous the network flow. As when the packet routes to other link when failures occurs, as that link also has its sufficient data packet to pass to the receiver as suddenly it comes makes more load therefore as it is using go-back-n technique if any data error occurs it rejects all frames and produce negative acknowledgement so that the sender must retransmit all the frames, but mean while the load suddenly which comes from other link when gets failed will also enter into in the queue to transmit to the user, as a receiver must quit all other data till it receives the error free data which leads to increase in queue size and makes congestion and may lose the data due to unproper flow control or another reason is that when the sender is running fast machine and receiver is on slow machine may lose the data. Which defeates the goal of minimizing the impacts of failures to the application performance. This is shown in the figure2 (b) below:-

Fig2 (a): Two networks connected by a router& forwarding packets

Laxman Vijay H.V.,IJRIT

234

Fig2 (b): small congested network 1.1 Effects on Congestion The effect on congestion on throughput of a network is shown in the fig below:-

Fig 3: Effect of congestion Ideally as offered load increases, throughput also increases. Practically throughput drops with increase in offered load because the buffers at each node’s are full and starts discarding packets. Therefore source station must retransmit the discarded packets in addition with the new packets. Under these circumstances, the network utilization and hence performance falls off.

Laxman Vijay H.V.,IJRIT

235

1.2 Congestion Control Congestion control is a process of maintaining the number of packets in a network below a certain level at which performance falls off. Congestion control makes sure that subnet is able to carry the offered traffic. Hence to avoid congestion, we present a new scheme called ESRARQ for minimizing the effect.

2. Related Work 2.1 system model In most networks, there are circumstances in which the externally offered load is larger than can be handled even with optimal routing. Then, if no measures are taken to restrict the entrance of traffic into the network, queue sizes at bottleneck links will grow and packet delays will increase, possibly violating maximum delay specifications. Furthermore, as queue sizes grow indefinitely, the buffer space at some nodes may be exhausted. When this happens, some of the packets arriving at these nodes will have to be discarded and later retransmitted, thereby wasting communication resources. As a result, a phenomenon similar to a highway traffic jam may occur whereby, as the offered load increases, the actual network throughput decreases while packet delay becomes excessive. It is thus necessary at times to prevent some of the offered traffic from entering the network to avoid this type of congestion. This is one of the main functions of flow control. But this flow control mechanism is not properly managed in the existing system of multiple routing configurations for fast IP network recovery. Why because, in MRC mechanism whenever a failure happens in the network it can generate an alternate link immediately by using preconfigured data and the packets are forwarded through that rout and continuous the network flow. As when the packet routes to other link when failures occurs, as that link also has its sufficient data packet to pass to the receiver as suddenly it comes makes more load therefore as it is using go-back-n technique if any data error occurs it rejects all frames and produce negative acknowledgement so that the sender must retransmit all the frames, but mean while the load suddenly which comes from other link when gets failed will also enter into in the queue to transmit to the user, as a receiver must quit all other data till it receives the error free data which leads to increase in queue size and makes congestion and may lose the data due to unproper flow control or another reason is that when the sender is running fast machine and receiver is on slow machine may lose the data. Therefore to prevent this proper flow control mechanism called SRARQ is incorporated which includes a feedback mechanism requesting transmitter a retransmission of only incorrect message block.

2.2 ESRARQ Overview This powerful (i.e. SRARQ) [4] flow control mechanism is also sometimes necessary between two users for speed matching (i.e. for ensuring a fast transmitter does not overwhelm a slow receiver with more packets). Some others reserve the term “flow control” for this type of speed matching and use the term “congestion control” for regulating the packet population within the sub network. In this protocol receiver will have sufficient buffer space unlike go-back-n. If receiver receives any damages or error containing frame it will generates negative acknowledgement of that frame and it will stores correct frames in its buffer. When sender get negative acknowledgement of damaged or error containing frame its timer goes off after a certain time interval and it regenerate only the damaged frame. Thus there is less overhead in retransmission than in the case of go-back-n protocol. This is shown in the figure below:-

Laxman Vijay H.V.,IJRIT

236

Fig4: a selective repeat ARQ protocol

2.3 MAIN objectives of ESRARQ 1) 2) 3) 4)

Selective repeat ARQ retransmits only the damaged or lost frames instead of sending multiple frames. Keeping average delay and buffer overflow at reasonable level. Maintain fairness between sessions and providing the requisite quality of service (QOS). The selective retransmission increases the efficiency of transmission and is more suitable for noisy channel.

3. Algorithm while (true) { wait3for3event(&event); /* five possibilities: see event3type above */ switch(event) { case network3layer3ready: /* accept, save, and transmit a new frame */ nbuffered = nbuffered + 1; /* expand the window */ from3network3layer(&out3buf[next3frame3to3send % NR3BUFS]); /* fetch new packet */ send3frame(data, next3frame3to3send, frame3expected, out3buf);/* transmit the frame */ inc(next3frame3to3send); /* advance upper window edge */ break; case frame3arrival: /* a data or control frame has arrived */ from3physical3layer(&r); /* fetch incoming frame from physical layer */ Laxman Vijay H.V.,IJRIT

237

if (r.kind == data) { /* An undamaged frame has arrived. */ if ((r.seq != frame3expected) && no3nak) send3frame(nak, 0, frame3expected, out3buf); else start3ack3timer(); if (between(frame3expected, r.seq, too3far) && (arrived[r.seq%NR3BUFS] == false)) { /* Frames may be accepted in any order. */ arrived[r.seq % NR3BUFS] = true; /* mark buffer as full */ in3buf[r.seq % NR3BUFS] = r.info; /* insert data into buffer */ while (arrived[frame3expected % NR3BUFS]) { /* Pass frames and advance window. */ to3network3layer(&in3buf[frame3expected % NR3BUFS]); no3nak = true; arrived[frame3expected % NR3BUFS] = false; inc(frame3expected); /* advance lower edge of receiver’s window */ inc(too3far); /* advance upper edge of receiver’s window */ start3ack3timer(); /* to see if a separate ack is needed */ } } } if((r.kind==nak) && between(ack3expected,(r.ack+1)%(MAX3SEQ+1),next3frame3to3send)) send3frame(data, (r.ack+1) % (MAX3SEQ + 1), frame3expected, out3buf); while (between(ack3expected, r.ack, next3frame3to3send)) { nbuffered = nbuffered − 1; /* handle piggybacked ack */ stop3timer(ack3expected % NR3BUFS); /* frame arrived intact */ inc(ack3expected); /* advance lower edge of sender’s window */ } break; case cksum3err: if (no3nak) send3frame(nak, 0, frame3expected, out3buf); /* damaged frame */ break; case timeout: send3frame(data, oldest3frame, frame3expected, out3buf); /* we timed out */ break; case ack3timeout: send3frame(ack,0,frame3expected, out3buf); /* ack timer expired; send ack */ } if (nbuffered < NR3BUFS) enable3network3layer(); else disable3network3layer(); } }

4. Implementation The implementation of WFQ for network congestion free mainly uses 3- modules. 1. Client Module 2. Server Module 3. Router Module. 1. Client This module is used to send the data to server through routers. It will provide user friendly interface to send the data to the required destination. 2. Server It will receive the data send by the client which came from the active router. It can have any no. of clients.

Laxman Vijay H.V.,IJRIT

238

3. Routers These are placed in between server and client to transfer the data. Whenever client sends the data to the server it will pass through any router.

5. Results and Performance Graphs: The network performance results can be achieved by ESRARQ protocol when offered load is large, limited delay and buffer overflow can be achieved only by lowering the input to the network. Thus, there is a natural tradeoff between giving session’s free access to the network and keeping delay at a level low enough so that retransmissions or other inefficiencies do not degrade network performance. Below are the performance graphs shown:-

Fig5(a): cost graph using go-back-n

Laxman Vijay H.V.,IJRIT

239

Fig5(b): cost graph using esrarq

6. Conclusion We have presented ESRARQ as an approach to achieve congestion control in ip-network. This ESRARQ maintains a buffer space, to store all the correct frames in its buffer other than unlike go-back-n and generates negative acknowledgement of that only the damages or error containing frame. This provides best flow control and efficient transmission of data.

7. References [1]

D. D. Clark, “The design philosophy of theDARPAinternet protocols,” ACM SIGCOMM Comput. Commun. Rev., vol. 18, no. 4, pp. 106–114, Aug. 1988.

[2]

A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C.-N. Chuah, and C. Diot, “Characterization of failures in an IP backbone network,” in Proc. IEEE INFOCOM, Mar. 2004, vol. 4, pp. 2307–2317.

[3]

Amund Kvalbein, Audun Fosselie Hansen, Tarik ˇ Ciˇcic, Stein Gjessing and Olav Lysne “Multiple Routing Configuration For Fast IP Network Recovery” IEEE/ACM Transactions on networking, Vol. 17, No. 2, April 2009.

[4]

Automatic-repeat-request error-control schemes. Shu Lin, Costello, D. Miller, M. This paper appears in: Communications Magazine, IEEE Publication Date: Dec 1984.

[5]

B. Carpenter, “Architectural Principles of the Internet,” RFC 1958 (Informational), June 1996, updated by RFC 3439. [Online]. Available:http://www.ietf.org/rfc/rfc1958.txt.

[6]

Tommy Andre, Skancke nyquist, “Evaluating local proactive recovery schemes for ip networks” Master thesis.

[7]

Braden, R., Requirements for Internet Hosts Communication Layers IETF Request for Comments: 1122, 1989.

Laxman Vijay H.V.,IJRIT

240

[8] [9]

[10]

“DATA NETWORKS” by Dimitri bertsekas and Robert gallager. Tommy Andre, Skancke nyquist,“Evaluating local proactive recovery schemes for ip networks” Master thesis. Amund Kvalbein, Audun Fosselie Hansen, Tarik ˇ Ciˇcic, Stein Gjessing and Olav Lysne “Multiple Routing Configuration For Fast IP Network Recovery” IEEE/ACM Transactions on networking, Vol. 17, No. 2, April 2009.

8. Authors Bibliographies

H.V. Laxman Vijay is a student of DRK College of Engineering & Technology, Ranga Reddy, and Andhra Pradesh, India. He has received B.TECH degree in computer science Engineering & currently pursuing M.TECH Degree. His main research interest include on networks.

K. Sudheer Kumar is working as an Asst Prof at DRK College of Engineering & Technology, Ranga Reddy, and Andhra Pradesh, India. He has received M.TECH Degree in computer science engineering.

R.V. Krishnaiah is working as principal at DRK Institute of Science & Technology, Ranga Reddy, Andhra Pradesh, India. He received M.TECH Degree (EIE & CSE) & PH.D. His main research interest includes data mining, software engineering.

Laxman Vijay H.V.,IJRIT

241

Multiple Routing Configurations for Fast IP Network Recovery with ...

properly managed in the existing system of multiple routing configurations for fast IP network recovery. Why because, in MRC mechanism whenever a failure happens in the network it can generate an alternate link immediately by using preconfigured data and the packets are forwarded through that rout and continuous the.

4MB Sizes 3 Downloads 257 Views

Recommend Documents

Multiple Gateway Cellular IP Network
Multiple Gateway Cellular IP Network. Manas R. Panda [email protected]. E6951 Project, Dated: 05/06/02. ABSTRACT. In the current Cellular IP architecture, only one gateway serves the entire CIP network. So, the gateway is single point of failure

PDF Network Routing Basics: Understanding IP ...
PDF Network Routing Basics: Understanding IP. Routing in Cisco Systems Full eBook. Books detail. Title : PDF Network Routing Basics: Understanding q.

Securing Your Network with BIG-IP Firewall Solutions for Service ...
Page 1 ... As mobile network operators and other communications service providers ... and has a negative effect on network performance and the subscriber ...

Revisiting IP Routing Control Platforms with OpenFlow-based ...
view, we define an initial Routing-as-a-Service platform based on the RouteFlow ... In line with the design rationale and best practices of scale-out cloud ...

Multiple Listing - United Network for Organ Sharing
The number for Patient. Services is 1-888-894-6361. Transplant candidate/family member. Date received. Transplant candidate/family member (printed).

Deploying the BIG-IP LTM with multiple BIG-IP ... - F5 Networks
Nov 3, 2011 - devices, resulting in the best possible user experience. For more ... h You must be running BIG-IP version 10.x. ... In the configuration described in this guide, a client requests a web application. ... You can host the the virtual ser

Deploying the BIG-IP LTM with multiple BIG-IP ... - F5 Networks
h You must be running BIG-IP version 10.x. ... The LTM then intelligently directs the request to the best available web application server. You can host both the internal and external virtual servers on the same BIG-IP LTM, or you may.

Cross-Layer Routing and Multiple-Access Protocol for ...
packet flows or real-time streams, we are able to provide quality of service guarantees for selected group of flows. Transmission power control in wireless ...

Cross-Layer Routing and Multiple-Access Protocol for ... - CiteSeerX
Requests are considered for store-and-forward service by allocating slots for ..... [21] S. M. Selkow, The Independence Number of Graphs in. Terms of Degrees ...

Connecting Sensor Networks with TCP/IP Network
works with an external network by using Application-level Gateways [1] as the inter face. Different .... TCP/IP network to provide meaningful services. In this paper ...

Implementing Cisco IP Routing Foundation Learning Guide.pdf ...
Loading… Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu. There was a problem previewing

Connecting Sensor Networks with TCP/IP Network
mapping the node label (ID) or location address with IP address in gateway. The IP ... All these information are stored in a database which physically locat-.

Worst Configurations (Instantons) for Compressed ...
ISA. We say that the BasP fails on a vector e if e = d, where d solves Eq. (2). We start with the following two definitions. Definition 1 (Instanton): Let e be a k-sparse vector (i.e. the number of nonzero entries in e is equal to k). Consider an err

mobile backbone network routing with flow control and ...
into the network so that the Quality-of-Service of admitted flows could be ..... values between 7 and 9 hops yield the best delay-throughput performance behavior. .... on Broadband Networks (BroadNets), page 661-670, Oct. 2004. Authorized ...

Cognitive Multiple-Antenna Network with Outage and Rate Margins at ...
Content may change prior to final publication. Citation information: DOI. 10.1109/TVT.2014.2345588, IEEE Transactions on Vehicular Technology. 1. Cognitive Multiple-Antenna Network with Outage and Rate Margins at the Primary System. Behrouz Maham, Me

A fast convex conjugated algorithm for sparse recovery
of l1 minimization and run very fast on small dataset, they are still computationally expensive for large-scale ... quadratic constraint problem and make use of alternate minimiza- tion to solve it. At each iteration, we compute the ..... Windows XP

Fast Network Synchronization
algorithm through an improved PC-PDA synchronizer. PalmPilot PDAs (Personal Digital Assistants) synchro- nize their data with that on a host PC either locally ...

generic technique for interconnection between wsn and ip network
transparent interconnection between WSN and IP network. It is generic as it can work with address- centric and data-centric WSNs. It does not require ...

Electron Configurations for All Elements.pdf
Distrib Livre.fm Page 11 Mardi, 20. octobre 2009 11:13 11. Page 3 of 16. Electron Configurations for All Elements.pdf. Electron Configurations for All Elements.

Network Security using IP Traceback Techniques - IJRIT
The original aim of the Internet was to provide an open and scalable network among ... Blocking the availability of an Internet service may imply large financial.