BUILDING SCALABLE NETWORK MODEL TO ACCOMPLISH THE ADVANTAGES OF MULTICAST NETWORK
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 4)Publication Date: 2015-04-30
Authors : R.Yogeswari;
Page : 65-71
Keywords : Multicast Network; Bandwidth; Transmission; Multicast Protocols.;
Abstract
In the current network architecture Network coding algorithms usually encourages the flow of transmission in the network medium. The difficulty of multicast connections over implicit packet networks cause exceed amount of cost and introduces a new procedure for evaluating the presentation of wireless network by exploring the complexity of high throughput via lower bandwidth. Multicast routing for wired as well as wireless networks has focused on metrics that estimates the quality of data to maximize the throughput efficiency, and the nodes must collaborate in order to compute the path metric and forward data. Network Coding helps boost up the throughput efficiency and reduce the cost of data transmission, especially for one-to-many multicast applications. An interesting problem is to understand and count the coding advantage and cost advantage that is the potential benefits of network coding, as compared to routing, in terms of increasing throughput and reducing transmission cost, respectively. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and aggregation, as well as during data forwarding, leads to unexpected consequences in adversarial networks where compromised nodes act maliciously. It also explores the use of network in wireless multicast and investigates its effectiveness and efficiency of cost. In this system we identify novel attacks against high-efficiency data transfer multicast protocols in wireless networks. The attacks exploit the local estimation and global aggregation of the metric to allow attackers to attract a large amount of traffic. The proposed system shows that these attacks are very effective against multicast protocols based on high-throughput and it is so difficult to stop packets while transferring to destinations. While it maximizes throughput and efficiency, it also increases attack effectiveness in the absence of defense mechanisms. This approach to defend against the identified attacks combines measurement-based detection and accusation-based reaction techniques. The entire architecture proves that the upper- and lower-bounds on multicast coding advantage and cost advantage in these models.
Other Latest Articles
- A DATA GUIDED LEXI-SERACH APPROACH FOR TIME DEPENDENT TRAVELLING SALEMSMAN PROBLEM
- LONGITUDINAL ELECTRO-KINETIC WAVE IN ION-IMPLANTED QUANTUM SEMICONDUCTOR PLASMAS IN PRESENCE OF MAGNETIC FIELD
- ANALYSIS OF HELICAL BAFFLE HEAT EXCHANGER FOR OPTIMUM HELIX ANGLE THROUGH NUMERICAL SIMULATIONS
- COMPARATIVE STUDY OF THE METHODS USING HAAR-LIKE FEATURES
- EFFECT OF EXCITONS ON THE EXTERNAL QUANTUM EFFICIENCY OF THE INORGANIC SOLAR CELLS BASED ON SILICON
Last modified: 2015-04-21 22:57:27