BUILDING SCALABLE NETWORK MODEL TO ACCOMPLISH THE ADVANTAGES OF MULTICAST NETWORK
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 4
Abstract
In the current network architecture Network coding algorithms usually encourages the flow of transmission in the network medium. The difficulty of multicast connections over implicit packet networks cause exceed amount of cost and introduces a new procedure for evaluating the presentation of wireless network by exploring the complexity of high throughput via lower bandwidth. Multicast routing for wired as well as wireless networks has focused on metrics that estimates the quality of data to maximize the throughput efficiency, and the nodes must collaborate in order to compute the path metric and forward data. Network Coding helps boost up the throughput efficiency and reduce the cost of data transmission, especially for one-to-many multicast applications. An interesting problem is to understand and count the coding advantage and cost advantage that is the potential benefits of network coding, as compared to routing, in terms of increasing throughput and reducing transmission cost, respectively. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and aggregation, as well as during data forwarding, leads to unexpected consequences in adversarial networks where compromised nodes act maliciously. It also explores the use of network in wireless multicast and investigates its effectiveness and efficiency of cost. In this system we identify novel attacks against high-efficiency data transfer multicast protocols in wireless networks. The attacks exploit the local estimation and global aggregation of the metric to allow attackers to attract a large amount of traffic. The proposed system shows that these attacks are very effective against multicast protocols based on high-throughput and it is so difficult to stop packets while transferring to destinations. While it maximizes throughput and efficiency, it also increases attack effectiveness in the absence of defense mechanisms. This approach to defend against the identified attacks combines measurement-based detection and accusation-based reaction techniques. The entire architecture proves that the upper- and lower-bounds on multicast coding advantage and cost advantage in these models.
Authors and Affiliations
M. A. Abhiraami , R. Yogeswari
Simulation of Interleaved Boost Converter Using Closed Loop Fuzzy Logic Controller
Interleaved power converters can be very beneficial for high performance electrical equipment applications. Reductions in size and electromagnetic emission along with an increase in efficiency, transient response,...
ARTIFICIAL SOLAR OXYGEN TREE
An Artificial Oxygen Tree which aims at serving the humanity toward planet, having an ability to perform electrolysis of the sewage water and obtain the Hydrogen (for fuel) and Oxygen (to be emitted in the air) al...
A NOVEL ECO-FRIENDLY DYEING OF CATIONIZED POLYESTER FABRICS USING CURCUMIN NATURAL DYE
Due to the cheap in prize, high production and long life of polyester fabrics, its application is wide in apparel industry. But, concerning to their hydrophobicity and soiling properties it makes the wearer for les...
THEORETICAL COMPARATIVE STUDY OF INTERNAL QUANTUM EFFICIENCY OF THIN FILMS SOLAR CELLS BASED ON CuInSe2 : p + /p/n/n+, p/n/n+, p+/p/n and p/n MODELS
In this paper we propose to study the performances of thin films solar cells based on CuInSe2. The following models are studied : p/n ; p+/p/n ; p/n/n+; p+/p/n/n+ .The objective of this work is to study t...
Design and Performance analysis of Low power CMOS Op-Amp
This paper proposes a low power CMOS operational amplifier which operates at 1.8 V power supply. The unique behavior of the MOS transistors in sub-threshold region not only allows a designer to work at low input b...