Posted Date : 02nd Jan, 2026
International Journal of All Research Education & Scientific Metho...
Posted Date : 07th Mar, 2025
Peer-Reviewed Journals List: A Guide to Quality Research Publications ...
Posted Date : 07th Mar, 2025
Choosing the right journal is crucial for successful publication. Cons...
Posted Date : 27th Feb, 2025
Why Peer-Reviewed Journals Matter Quality Control: The peer revie...
Posted Date : 27th Feb, 2025
The Peer Review Process The peer review process typically follows sev...
Prevention and Protection Data Exchange between Communication Devices in Public Routers at Real Time
Author Name : N. Sendhil Kumar, I. Gnanasai, K.Dinesh Kumar, G. Naresh
ABSTRACT
Multi Link Topology can additionally incur heavy packet loss and degrade the community overall performance. Fast rerouting has been proposed to cope with this problem through allowing routing protections. However, the effectiveness and performance troubles of rapid rerouting aren't properly addressed. In particular, the safety overall performance of present methods isn't excellent although the overhead is high, and topology constraints want to be met for the methods to obtain a whole safety. To optimize the performance, we first solution the query that whether or not label-unfastened routing can offer a whole safety in opposition to arbitrary multi-hyperlink screw ups in any networks. We advocate a version for interface-specific-routing which may be visible as a fashionable label-unfastened routing. We examine the situations beneathneath which a multi-hyperlink failure will set off routing loops. And then, we gift that there exist a few networks wherein no interface-specific-routing (ISR) may be built to guard the routing in opposition to any k-hyperlink screw ups (k ≥ 2). Then, we advocate a tunneling on demand (TOD) approach, which covers maximum screw ups with ISR, and set off tunneling handiest while screw ups can not be detoured round through ISR. We expand algorithms to compute ISR well that allows you to limit the range of activated tunnels, and compute the safety tunnels if necessary.
Keywords: Router, Public, Exchange, Topologies