Multicast Routing Techniques To Make Optical Network Survivable Against Single Link/Node Failure.
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 3
Abstract
Link/Node failures are very common in any networks but these failures have a huge impact on the overall performance of the network. Due to these link/node failures sometimes it is impossible to communicate in b/w the network or to send or receive data from sender to receiver. So to overcome such problems researchers created few techniques which can tackle with these problems and can overcome them. In this paper those techniques are reviewed. These algorithms are used for protection of both single-link and single link/node failure scenarios.
Authors and Affiliations
Divashu Sharma#1, Gourav Karwar
Low Power High Speed Two’s Complement Multiplier
To reduce the area of partial product array size and improve the speed which is generated by a radix-4 Modified Booth Encoded Multiplier is used. This reduction is possible without any increase in the delay of the...
Novel Design and Implementation of Timesheet Management System Case Study
Time Sheet Management implementation is an internal application developed for efficient functioning of an organization. Time sheet management is used monitor all the employees of a particular organization working on vari...
Utility Based Routing in Mobile Networks
Self Adaptive Utility based Routing SAURP is characterized by the ability of identifying potential opportunities of forwarding messages to their destinations through a novel utility function based mechanism in whic...
Cloud Computing: A Responsibility data sharing in the cloud computing
Cloud computing provides highly efficient services to be easily accessed or used over the Internet on as needed basis. An important feature of the cloud services is that users’ data are usually processed remotely i...
Future Research Challenges of Peer-to-Peer Systems
PCs have become much more powerful, and they are able to handle the data processing locally rather than on central servers. Because of this, peer-to-peer computing can now occur when individual computers bypass central s...