IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses security issues in mobile ad hoc networks (MANETs) and different routing protocols used in MANETs. It summarizes that MANETs have dynamic topology, node mobility and lack centralized management which makes security challenging. It evaluates different routing protocols like reactive, proactive and hybrid and their advantages and disadvantages. It also discusses various methods that can be used to secure routing protocols in MANETs like SAODV, SEAD, ARIADNE and ARAN which use techniques like digital signatures, hash functions and public key cryptography. The document concludes that while these protocols provide some security, using security with the proactive DSDV protocol may be a better approach for key management and packet transmission in MANET
This document discusses data transmission methods in multiprocessor interconnection networks. It begins with an abstract that outlines examining setup designs for robust commercial and experimental multiprocessor systems. High performance processor communication among nodes requires improvements over traditional host-to-network converters. Interchip and intrachip communication styles are traditionally designed separately under different constraints. The paper then discusses direct networks, communication protocols like TCP/IP, wormhole routing to reduce bandwidth usage, queuing models, and concludes that optical interconnections can overcome disadvantages of electrical networks by separating interchip and intrachip traffic flows.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document discusses security issues in ad-hoc networks. It begins by outlining some key problems in ad-hoc network routing including lack of infrastructure, dynamic topology changes, wireless communication vulnerabilities, and implicit trust between nodes. It then analyzes specific attacks like modifying routing protocol messages. Several solutions are proposed, including concealing network topology using security agents or zone routing, and using watchdog and pathrater mechanisms to identify and isolate misbehaving nodes to improve throughput. The watchdog detects nodes that fail to forward packets by listening to transmissions, while pathrater avoids routing through misbehaving nodes to choose more reliable paths.
The document discusses using Bayesian inference and Dempster-Shafer theory to establish trust relationships and achieve security in mobile ad hoc networks (MANETs). It proposes combining direct observation using Bayesian inference with indirect observation using Dempster-Shafer theory to calculate trust values for nodes. The approach is tested in simulations using the AODV routing protocol, showing improved packet delivery ratio, throughput, and end-to-end delay compared to existing systems.
Investigating effects of channel fading on routing protocols in wirelessIAEME Publication
This document analyzes the effects of channel fading on various routing protocols in wireless sensor networks. It investigates routing protocols like DSR, AODV, DYMO and ZRP under different fading environments (Rayleigh, Ricean, and fast Rayleigh fading). The document provides background on wireless sensor networks and discusses the challenges of routing in such networks. It also classifies routing protocols and describes some commonly used protocols for wireless sensor networks like DSR, AODV and ZRP. The aim of the study is to determine which protocol performs best under different fading conditions based on application layer parameters.
Black-Hole and Wormhole Attack in Routing Protocol AODV in MANETIJCSEA Journal
Mobile ad hoc network (MANET) is a self-configuring network that is formed automatically via wireless links by a collection of mobile nodes without the help of a fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes outside the wireless transmission range by hop to hop and the forward packets to each other. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important on-demand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “BlackvHole” and “Wormhole” attacks in existing AODV protocol. Black hole nodes are those malicious nodes that conform to forward packet to destination. But they do not forward packet intentionally to the destination node. The black hole nodes degrade the performance of network eventually by participating in the network actively. The propose watchdog mechanism detect the black hole nodes in a MANET. This method first detects a black hole attack in the network and then provide a new route to this node. In this, the performance of original AODV and modified AODV in the presence of multiple black hole nodes is find
out on the basis of throughput and packet delivery ratio. In a wormhole attack, intruders tunnel the data from one end of the network to the other, leading distant network nodes to trust they are neighbors’ and making them communicate through the wormhole link.
This document discusses an autonomous network reconfiguration system (ARS) for multi-radio wireless mesh networks. ARS allows a network to self-recover from local link failures in order to maintain performance. It uses a reconfiguration planning algorithm to determine the minimum necessary changes needed for recovery. When a link failure is detected, ARS triggers the formation of a local group and designates a leader to coordinate reconfiguration. The leader requests a reconfiguration plan from a gateway, which is then implemented by group members to resolve the failure. ARS aims to reconfigure autonomously and locally in response to failures while limiting effects on healthy parts of the network.
Reliable Metrics for Wireless Mesh NetworkIRJET Journal
This document summarizes and compares several routing metrics for wireless mesh networks, including Expected Transmission Count (ETX), Expected Transmission Time (ETT), and Load Aware Expected Transmission Time (LAETT). It finds that while ETX is simple, ETT and LAETT improve upon it by incorporating transmission rates and load balancing, resulting in higher packet delivery ratios, throughput, and bandwidth utilization according to simulations. The document provides background on wireless mesh networks and describes the routing metrics in detail.
Multiprocessor mesh interconnection networks are 2-dimensional networks, with the processors arranged at the nodes of a grid, and point-to-point links connecting each node to its neighbors.
A Study on IP Network Recovery through Routing Protocolsijeei-iaes
Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresEditor IJCATR
Ethernet a popular choice for metropolitan-area networks (MAN) due to simplicity, cost effectiveness and scalability. The
Spanning-Tree based switching mechanism, which is considered to be very efficient at avoiding switching loops in LAN environment,
is a performance bottleneck in Metro network context. Handling of link failure is an important issue in metro Ethernet networks. A
link failure may result in serious service disruptions. A local restoration method for metro Ethernet with multiple spanning trees, which
aims at fast handling of single link failures in a distributed manner, have been proposed in the literature. In this paper, we propose a
local restoration mechanism that uses MULTILINK algorithm for solving multiple link failures
Secured client cache sustain for maintaining consistency in manetseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics, such as dynamic topology and limited resources. It then classifies routing protocols as either proactive (table-driven) or reactive (on-demand) and describes several examples of each type. Proactive protocols maintain up-to-date routing tables through periodic updates but incur more overhead. Reactive protocols discover routes on demand but add latency. The document provides details on popular protocols like DSDV, AODV, DSR and TORA, explaining their route discovery, maintenance and metrics.
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETcscpconf
A Mobile Ad-Hoc Network (MANET) is a temporary, infrastructure-less and distributed network
having mobile nodes. MANET has limited resources like bandwidth and energy. Due to limited
battery power nodes die out early and affect the network lifetime. To make network energy
efficient, we have modified position based Location Aided Routing (LAR1) for energy
conservation in MANET. The proposed protocol is known as Variable Range Energy aware
Location Aided Routing (ELAR1-VAR). The proposed scheme controls the transmission power
of a node according to the distance between the nodes. It also includes energy information on
route request packet and selects the energy efficient path to route data packets. The comparative
analysis of proposed scheme and LAR1 is done by using the QualNet simulator. ELAR1-VAR
protocol improves the network lifetime by reducing energy consumption by 20% for dense and
mobile network while maintaining the packet delivery ratio above 90%.
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
Wireless mesh network has recently received a great deal of attention as a promising technology to provideubiquitous high bandwidth access for a large number of users. Such network may face a significant broadcast traffic that may consequently degrade the network reliability.
In this paper, we have focused interest to wireless mesh network based IEEE 802.11s and we have designed
a self-pruning method to control and reduce the broadcast traffic forwarding. Our scheme, namely Control of Broadcast Forwarding (CBF), defines two behaviours to manage the broadcasting operation. Routing
packets are managed differently from data broadcast messages to avoid afflicting the routing process.
The simulations results show that CBF ameliorates the network capacity by reducing considerably the
number of redundant packets, improving the end to end delay and providing high reachability and packet
delivery ration.
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...IRJET Journal
This document discusses security issues that can arise when using wireless sensor networks in industrial settings, specifically related to edge nodes that may have radio footprints extending beyond facility boundaries. It proposes using a mix of routing and non-routing sensor nodes, with non-routing nodes deployed along facility edges. However, this adds complexity to deployment and maintenance. As an alternative, the document suggests using sensor nodes equipped with blockchain technology. This would allow all nodes to route while restricting new nodes from joining the network unless approved on the blockchain ledger. It claims this approach simplifies deployment by removing the need to distinguish between routing and non-routing nodes.
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
Abstract A mobile ad hoc networks (MANET) is characterized by multihop wireless connectivity consisting of independent nodes which move dynamically by changing its network connectivity without the uses of any pre-existent infrastructure. MANET offers[1, 2] such flexibility which helps the network to form anywhere, at any time, as long as two or more nodes are connected and communicate with each other either directly when they are in radio range or via intermediate mobile nodes. Routing is a significant issue and challenge in ad hoc networks and many routing protocols have been proposed like OLSR, AODV, DSDV,DSR, ZRP, and TORA, LAR so far to improve the routing performance and reliability. This research paper describes the characteristics of ad hoc routing protocols OLSR, AODV and ZRP based on the performance metrics like packet delivery ratio, end–to–end delay, throughput and jitter by increasing number of nodes in the network. This comparative study proves that OLSR, ZRP performs well in dense networks in terms of low mobility and low traffic but in high mobility and high traffic environment ZRP performs well than OLSR and AODV. Keywords: MANET, AODV, OLSR, ZRP, routing
A Review on Congestion Control using AODV and Enhance AODV IRJET Journal
This document summarizes and reviews congestion control protocols for mobile ad hoc networks (MANETs), specifically comparing the Ad hoc On-Demand Distance Vector (AODV) routing protocol and an enhanced version called Enhanced AODV (EAODV). It first introduces MANETs and discusses the issue of congestion in MANETs. It then provides an overview of how AODV works to establish and maintain routes between nodes. The paper proposes EAODV as an enhancement of AODV that aims to better control congestion by introducing a threshold time for acknowledging packets. Various performance metrics such as packet delivery ratio, packet loss ratio, end-to-end delay and throughput are compared between AODV and
The resistance of routing protocols against DDOS attack in MANET IJECEIAES
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol. The introduced model uses the NS-2 simulator to apply DDoS on the three chosen routing protocols. In terms of throughput and end-to-end latency under the consequences of the attack, the performance of three routings protocols was analyzed.
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
This document discusses network routing and routing algorithms. It begins by defining routing as the process of determining the path that data packets will take from a source to a destination across a network. There are three main functions of routing: path determination, switching, and call setup. The document then discusses several common routing algorithm strategies, including greedy, dynamic programming, and divide-and-conquer approaches. It also describes specific routing algorithms like Dijkstra's algorithm, Bellman-Ford algorithm, and Floyd-Warshall algorithm. Finally, it discusses performance metrics for comparing routing algorithms, such as throughput, latency, hop count, bandwidth, and packet loss.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
This document analyzes the performance of malicious nodes in different routing algorithms in mobile ad hoc networks (MANETs). It simulates the "black hole" attack in the AODV and DSR routing protocols using the NS2 simulator. The results show that DSR experiences around 45-55% data loss with black hole attacks, while AODV sees 35-40% data loss. Therefore, AODV shows better performance than DSR in the presence of malicious nodes like black holes, with only minimal additional delay and overhead.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
Traffic engineering is one of the major issues that has to be addressed in Metro Ethernet networks for quality of service and efficient resource utilization. This paper aims at understanding the relevant issues and outlines novel algorithms for multipoint traffic engineering in Metro Ethernet. We present an algorithmic solution for traffic engineering in Metro Ethernet using optimal multiple spanning trees. This iterative approach distributes traffic across the network uniformly without overloading network resources. We also introduce a new traffic specification model for Metro Ethernet, which is a hybrid of two widely used traffic specification models, the pipe and hose models.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Design of a modified leaf spring with an integrated damping system for added ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Reliable Metrics for Wireless Mesh NetworkIRJET Journal
This document summarizes and compares several routing metrics for wireless mesh networks, including Expected Transmission Count (ETX), Expected Transmission Time (ETT), and Load Aware Expected Transmission Time (LAETT). It finds that while ETX is simple, ETT and LAETT improve upon it by incorporating transmission rates and load balancing, resulting in higher packet delivery ratios, throughput, and bandwidth utilization according to simulations. The document provides background on wireless mesh networks and describes the routing metrics in detail.
Multiprocessor mesh interconnection networks are 2-dimensional networks, with the processors arranged at the nodes of a grid, and point-to-point links connecting each node to its neighbors.
A Study on IP Network Recovery through Routing Protocolsijeei-iaes
Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.
Local Restoration in Metro Ethernet Networks for Multiple Link FailuresEditor IJCATR
Ethernet a popular choice for metropolitan-area networks (MAN) due to simplicity, cost effectiveness and scalability. The
Spanning-Tree based switching mechanism, which is considered to be very efficient at avoiding switching loops in LAN environment,
is a performance bottleneck in Metro network context. Handling of link failure is an important issue in metro Ethernet networks. A
link failure may result in serious service disruptions. A local restoration method for metro Ethernet with multiple spanning trees, which
aims at fast handling of single link failures in a distributed manner, have been proposed in the literature. In this paper, we propose a
local restoration mechanism that uses MULTILINK algorithm for solving multiple link failures
Secured client cache sustain for maintaining consistency in manetseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document analyzes and compares different routing protocols for mobile ad hoc networks (MANETs). It begins with background on MANETs and their characteristics, such as dynamic topology and limited resources. It then classifies routing protocols as either proactive (table-driven) or reactive (on-demand) and describes several examples of each type. Proactive protocols maintain up-to-date routing tables through periodic updates but incur more overhead. Reactive protocols discover routes on demand but add latency. The document provides details on popular protocols like DSDV, AODV, DSR and TORA, explaining their route discovery, maintenance and metrics.
VARIABLE RANGE ENERGY EFFICIENT LOCATION AIDED ROUTING FOR MANETcscpconf
A Mobile Ad-Hoc Network (MANET) is a temporary, infrastructure-less and distributed network
having mobile nodes. MANET has limited resources like bandwidth and energy. Due to limited
battery power nodes die out early and affect the network lifetime. To make network energy
efficient, we have modified position based Location Aided Routing (LAR1) for energy
conservation in MANET. The proposed protocol is known as Variable Range Energy aware
Location Aided Routing (ELAR1-VAR). The proposed scheme controls the transmission power
of a node according to the distance between the nodes. It also includes energy information on
route request packet and selects the energy efficient path to route data packets. The comparative
analysis of proposed scheme and LAR1 is done by using the QualNet simulator. ELAR1-VAR
protocol improves the network lifetime by reducing energy consumption by 20% for dense and
mobile network while maintaining the packet delivery ratio above 90%.
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
Wireless mesh network has recently received a great deal of attention as a promising technology to provideubiquitous high bandwidth access for a large number of users. Such network may face a significant broadcast traffic that may consequently degrade the network reliability.
In this paper, we have focused interest to wireless mesh network based IEEE 802.11s and we have designed
a self-pruning method to control and reduce the broadcast traffic forwarding. Our scheme, namely Control of Broadcast Forwarding (CBF), defines two behaviours to manage the broadcasting operation. Routing
packets are managed differently from data broadcast messages to avoid afflicting the routing process.
The simulations results show that CBF ameliorates the network capacity by reducing considerably the
number of redundant packets, improving the end to end delay and providing high reachability and packet
delivery ration.
IRJET- Blockchain Secured Alternative to Mixed Routing/Non-Routing Wireless S...IRJET Journal
This document discusses security issues that can arise when using wireless sensor networks in industrial settings, specifically related to edge nodes that may have radio footprints extending beyond facility boundaries. It proposes using a mix of routing and non-routing sensor nodes, with non-routing nodes deployed along facility edges. However, this adds complexity to deployment and maintenance. As an alternative, the document suggests using sensor nodes equipped with blockchain technology. This would allow all nodes to route while restricting new nodes from joining the network unless approved on the blockchain ledger. It claims this approach simplifies deployment by removing the need to distinguish between routing and non-routing nodes.
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
Abstract A mobile ad hoc networks (MANET) is characterized by multihop wireless connectivity consisting of independent nodes which move dynamically by changing its network connectivity without the uses of any pre-existent infrastructure. MANET offers[1, 2] such flexibility which helps the network to form anywhere, at any time, as long as two or more nodes are connected and communicate with each other either directly when they are in radio range or via intermediate mobile nodes. Routing is a significant issue and challenge in ad hoc networks and many routing protocols have been proposed like OLSR, AODV, DSDV,DSR, ZRP, and TORA, LAR so far to improve the routing performance and reliability. This research paper describes the characteristics of ad hoc routing protocols OLSR, AODV and ZRP based on the performance metrics like packet delivery ratio, end–to–end delay, throughput and jitter by increasing number of nodes in the network. This comparative study proves that OLSR, ZRP performs well in dense networks in terms of low mobility and low traffic but in high mobility and high traffic environment ZRP performs well than OLSR and AODV. Keywords: MANET, AODV, OLSR, ZRP, routing
A Review on Congestion Control using AODV and Enhance AODV IRJET Journal
This document summarizes and reviews congestion control protocols for mobile ad hoc networks (MANETs), specifically comparing the Ad hoc On-Demand Distance Vector (AODV) routing protocol and an enhanced version called Enhanced AODV (EAODV). It first introduces MANETs and discusses the issue of congestion in MANETs. It then provides an overview of how AODV works to establish and maintain routes between nodes. The paper proposes EAODV as an enhancement of AODV that aims to better control congestion by introducing a threshold time for acknowledging packets. Various performance metrics such as packet delivery ratio, packet loss ratio, end-to-end delay and throughput are compared between AODV and
The resistance of routing protocols against DDOS attack in MANET IJECEIAES
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) attacks. The goal of this research is to implement a simulation model called DDoS Attack Simulation Model (DDoSM) in Network Simulator 2(NS-2) and to examine the effect of DDoS Attack on various routing protocol types in MANET namely: Zone Routing Protocol (ZRP), Ad hoc On-Demand Distance Vector (AODV) protocol and Location-Aided Routing (LAR) protocol. The introduced model uses the NS-2 simulator to apply DDoS on the three chosen routing protocols. In terms of throughput and end-to-end latency under the consequences of the attack, the performance of three routings protocols was analyzed.
Understanding Network Routing Problem and Study of Routing Algorithms and Heu...IRJET Journal
This document discusses network routing and routing algorithms. It begins by defining routing as the process of determining the path that data packets will take from a source to a destination across a network. There are three main functions of routing: path determination, switching, and call setup. The document then discusses several common routing algorithm strategies, including greedy, dynamic programming, and divide-and-conquer approaches. It also describes specific routing algorithms like Dijkstra's algorithm, Bellman-Ford algorithm, and Floyd-Warshall algorithm. Finally, it discusses performance metrics for comparing routing algorithms, such as throughput, latency, hop count, bandwidth, and packet loss.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Performance Analysis of Malicious Node in the Different Routing Algorithms in...ijsrd.com
This document analyzes the performance of malicious nodes in different routing algorithms in mobile ad hoc networks (MANETs). It simulates the "black hole" attack in the AODV and DSR routing protocols using the NS2 simulator. The results show that DSR experiences around 45-55% data loss with black hole attacks, while AODV sees 35-40% data loss. Therefore, AODV shows better performance than DSR in the presence of malicious nodes like black holes, with only minimal additional delay and overhead.
Security Enhancement in AODV Routing Protocol for MANETsidescitation
Adhoc networks are a new wireless networking paradigm for mobile hosts.
Mobile Ad-hoc Networks (MANETs) are wireless networks with absence of infrastructure
centralized support. Routing in MANETs is challenging task due to mobility of nodes.
Several routing protocols have been developed for Mobile Ad-hoc Networks. This paper
describes concept of security enhancement in AODV routing protocol by detection and
tolerance of attacks using secure message transmission (SMT) protocol. Present AODV
routing protocol is not secure by malicious nodes. One main challenge in design of these
networks is their vulnerability to security attacks. In this paper we study how to make node
malicious and at same we will detect malicious node in AODV protocol using Network
Simulator-2(NS-2) tool.
Traffic engineering is one of the major issues that has to be addressed in Metro Ethernet networks for quality of service and efficient resource utilization. This paper aims at understanding the relevant issues and outlines novel algorithms for multipoint traffic engineering in Metro Ethernet. We present an algorithmic solution for traffic engineering in Metro Ethernet using optimal multiple spanning trees. This iterative approach distributes traffic across the network uniformly without overloading network resources. We also introduce a new traffic specification model for Metro Ethernet, which is a hybrid of two widely used traffic specification models, the pipe and hose models.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Design of a modified leaf spring with an integrated damping system for added ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A comparative evaluation on the properties of hma with variations in aggregat...eSAT Publishing House
This document discusses a study that evaluated the properties of Hot Mix Asphalt (HMA) mixtures designed using five different aggregate gradations within the specified limits for Bituminous Concrete Grade-I mixes according to Indian specifications. The study determined the optimum binder content and evaluated the Marshall properties and volumetric properties of mixes produced with each gradation. Results showed that mixes made with the mid-point gradation had higher stability values than other mixes. Optimum binder content increased from coarser to finer gradations. A gradation ratio parameter was also evaluated to indicate aggregate grading types and correlate them with mix design parameters for different gradations.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Effect of shade percentage on various properties of cotton knitted fabric dye...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Multi agent paradigm for cognitive parameter based feature similarity for soc...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document describes a system for automating power house control using wireless communication. The system uses microcontrollers, wireless modules like Zigbee, and a web interface to remotely monitor and control power outlets. Sensors measure current and send data to a server module over Zigbee. The system can automatically cut off power if a bill is unpaid or if overload is detected. A software module with PHP, JavaScript etc. allows users to view power status on internet-connected devices. The wireless system is low-cost, low data rate, self-healing and provides energy usage information to users for power management remotely.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The document analyzes problems with the shaft of a biomass grinder integrated with a briquetting plant. Finite element analysis was conducted using ANSYS software to model and simulate stresses on the stepped shaft under different loads and rotational speeds. The analysis found that maximum shear stress occurred at the point where the blower was fitted to the shaft. Increasing pressure led to higher von Mises and shear stresses. However, operating the shaft at higher rotational speeds reduced von Mises stresses, lowering the risk of failure. The study provides insights to reduce shaft stresses and improve reliability of the biomass grinder.
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
This document summarizes research on the performance of reinforced concrete shear walls that have been repaired after damage. It begins with an introduction to shear walls and their failure modes. The literature review then discusses the behavior of original shear walls as well as different repair techniques tested by other researchers, including conventional repair with new concrete, jacketing with steel plates or concrete, and use of fiber reinforced polymers. The document focuses on evaluating the strength retention of shear walls after being repaired with various methods.
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmIJSRD
Network on chip is an interconnection between several processing elements and routers. There are several possibilities for the occurrence of faults within the network. These faults degrade the performance of the network. In order to increase the performance several fault tolerant methods has been used. They involve themselves in rerouting and hence take longer paths. To make the path shorter, the router architecture has to be modified. For this efficient routers are needed to take place communication between these devices. This project, proposes a priority based solution for a bufferless network-on-chip, including an on-line fault-diagnosis mechanism to detect both transient and permanent faults, a hybrid automatic repeat request and forward error correction link-level error control scheme to handle transient faults.
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmIJSRD
Network on chip is an interconnection between several processing elements and routers. There are several possibilities for the occurrence of faults within the network. These faults degrade the performance of the network. In order to increase the performance several fault tolerant methods has been used. They involve themselves in rerouting and hence take longer paths. To make the path shorter, the router architecture has to be modified. For this efficient routers are needed to take place communication between these devices. This project, proposes a priority based solution for a bufferless network-on-chip, including an on-line fault-diagnosis mechanism to detect both transient and permanent faults, a hybrid automatic repeat request and forward error correction link-level error control scheme to handle transient faults.
Many intellectual property (IP) modules are present in contemporary system on chips (SoCs). This could provide an issue with interconnection among different IP modules, which would limit the system's ability to scale. Traditional bus-based SoC architectures have a connectivity bottleneck, and network on chip (NoC) has evolved as an embedded switching network to address this issue. The interconnections between various cores or IP modules on a chip have a significant impact on communication and chip performance in terms of power, area latency and throughput. Also, designing a reliable fault tolerant NoC became a significant concern. In fault tolerant NoC it becomes critical to identify faulty node and dynamically reroute the packets keeping minimum latency. This study provides an insight into a domain of NoC, with intention of understanding fault tolerant approach based on the XY routing algorithm for 4×4 mesh architecture. The fault tolerant NoC design is synthesized on field programmable gate array (FPGA).
18068 system software suppor t for router fault tolerance(word 2 column)Ashenafi Workie
This document discusses system software support for router fault tolerance. It begins with an introduction that describes how communication networks have shifted to rely more on software components and the importance of fault tolerance. The document then reviews literature on router fault tolerance techniques, including algorithms using redundancy. It discusses router architecture and functionality. The main objective is to develop a generalized algorithm for fault tolerance to handle different types of faults in routers. The proposed approach would classify network faults and use time, structure, and information redundancy to provide fault tolerance. More research is still needed to better address separating tolerance of temporary and permanent faults and to improve overall network reliability.
Design and Implementation Of Packet Switched Network Based RKT-NoC on FPGAIJERA Editor
This document proposes a new reliable dynamic network-on-chip (NoC) based on a modified XY routing algorithm and error detection mechanism. The proposed NoC uses a mesh structure of routers that can detect routing errors to enable adaptive routing. It includes packet error detection and correction. The error detection mechanism allows the NoC to accurately localize error sources to maintain throughput and network load. The modified XY routing algorithm is combined with a scheduler to route packets and avoid collisions in the proposed packet switched NoC implemented on an FPGA. Simulation results show that the proposed method efficiently transfers data between nodes with lower latency and higher throughput compared to contention-based networks.
This document discusses techniques for improving the reliability of Network-on-Chip (NoC) designs. It begins by explaining the importance of fault tolerance in NoCs due to increasing technology scales. It then describes different types of faults and provides an overview of current reliability techniques including error correction codes, retransmission mechanisms, reliable task mapping, and fault-tolerant routing. Specific schemes for self-healing routers, error detection, power analysis, and resilience against negative bias temperature instability are also summarized. The document concludes by stating that while these techniques improve reliability, most increase power consumption, and future work should focus on reducing this overhead through thermal-aware designs and methods to selectively wear out cores.
Design and Performance Analysis of 8 x 8 Network on Chip RouterIRJET Journal
This document describes a study that designed and analyzed the performance of an 8x8 network-on-chip router. The researchers implemented a 2D mesh network-on-chip router with four ports connected in each of the four directions (north, south, east, west) and a fifth port connected to a local processing element. The goal was to improve quality-of-service by employing algorithms like wormhole routing, arbitration, and crossbar switching. The router architecture and modules were designed and synthesized using Xilinx ISE to optimize for lower power consumption while maintaining high throughput and quality-of-service.
Greetings from IGeekS Technologies ….
We were humbled to receive your enquiry regarding your academic project. We assure you to give all kinds of guidance for you to successfully complete your project.
IGeekS Technologies is a company located in Bangalore, India. We have being recognized as a quality provider of hardware and software solutions for the student’s in order carry out their academic Projects. We offer academic projects at various academic levels ranging from graduates to masters (Diploma, BCA, BE, M. Tech, MCA, M. Sc (CS/IT)). As a part of the development training, we offer Projects in Embedded Systems & Software to the Engineering College students in all major disciplines.
Academic Projects
As a part of our vision to provide a field experience to young graduates, we offering academic projects to MCA/B.Tech/BE/M.Tech/BCA students. Normally our way of project guidance will start with in-depth training. Why because unless and until a student know the technology, he cannot implement a project. We designed such courses based on industry requirements.
Placements
Our support never ends with training. We are maintaining a dedicated consulting division with 5 HR executives to assist our students to find good opportunities. Once a student finishes his course and project, immediately we will collect their profiles and will contact with the companies. Since January 2010, more than 450 students got placed with the help of our quality training, project assistance and placement support.
Facilities
• Project confirmation and completion certificate.
• Project base paper, synopsis and PPT.
• In-depth training by industry experts
• Project guidance from experienced people
• Regular seminars and group discussions
• Lab facility
• Good placement assistance
• A CD which contains all the required softwares and materials.
• Lab modules with 100s of examples to improve students programming skills.
Please visit our websites for further information:-
www.makefinalyearproject.com
www.igeekstechnoloiges.com
We look forward to have you in our office for a detailed technical discussion for in-depth understanding of the base paper and synopsis. Our training methodology includes to first prepare the candidates to the relevant technology used in the selected project and then start the project implementation; this gives the candidate the pre-requisite knowledge to understand not only the project but also the code in which the project is implemented.The program concludes by issuing of project completion certificate from our organization.
We attached the proposed project titles for the academic year 2015. Find the attachment. Select the titles we will send the synopsis and base paper...If have any own topic (base paper) pls send us.we will check and confirm the implementation.
We will explain the base paper and synopsis, for technical discussion or admission contact Mr. Nandu-9590544567.
This document contains abstracts from 14 IEEE papers on topics related to VLSI design including network-on-chip (NoC) architectures, multipliers, and other digital circuitry. The papers propose techniques for fast and accurate NoC simulation, cognitive NoC design, packet-switched NoCs with real-time services, low power FPGA-based NoC routers, reliable router architectures, 10-port routers, concentrated mesh and torus networks, application mapping on mesh NoCs, error control in NoC switches, real-time globally asynchronous locally synchronous NoCs, high speed signed/unsigned multipliers, Vedic mathematics multipliers, low power Vedic multiplier architectures, and reduced complexity Wallace tree multipliers.
1) A router and 2x2 mesh and torus topologies for a Network on Chip (NoC) were designed using Verilog and implemented on a Spartan 3E FPGA.
2) The router utilized only 2% of the FPGA slices, while a previously reported router used 3.16% of slices.
3) Simulations showed the designed router and 2x2 NoC topologies functioned correctly.
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMSIAEME Publication
An efficient Priority-Arbiter based Router is designed along with 2X2 and 3X3 mesh
topology based NOC architecture are designed. The Priority –Arbiter based Router
design includes Input registers, Priority arbiter, and XY- Routing algorithm. The
Priority-Arbiter based Router and NOC 2X2 and 3X3 Router designs are synthesized
and implemented using Xilinx ISE Tool and simulated using Modelsim6.5f. The
implementation is done by Artix-7 FPGA device, and the physically debugging of the
NOC 2X2 Router design is verified using Chipscope pro tool. The performance results
are analyzed in terms of the Area (Slices, LUT’s), Timing period, and Maximum
operating frequency. The comparison of the Priority-Arbiter based Router is made
concerning previous similar architecture with improvements.
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMSIAEME Publication
An efficient Priority-Arbiter based Router is designed along with 2X2 and 3X3 mesh
topology based NOC architecture are designed. The Priority –Arbiter based Router
design includes Input registers, Priority arbiter, and XY- Routing algorithm. The
Priority-Arbiter based Router and NOC 2X2 and 3X3 Router designs are synthesized
and implemented using Xilinx ISE Tool and simulated using Modelsim6.5f. The
implementation is done by Artix-7 FPGA device, and the physically debugging of the
NOC 2X2 Router design is verified using Chipscope pro tool. The performance results
are analyzed in terms of the Area (Slices, LUT’s), Timing period, and Maximum
operating frequency. The comparison of the Priority-Arbiter based Router is made
concerning previous similar architecture with improvements.
Reconfigurable High Performance Secured NoC Design Using Hierarchical Agent-b...IJECEIAES
With the rapid increase in demand for high performance computing, there is also a significant growth of data communication that leads to leverage the significance of network on chip. This paper proposes a reconfigurable fault tolerant on chip architecture with hierarchical agent based monitoring system for enhancing the performance of network based multiprocessor system on chip against faulty links and nodes. These distributed agents provide healthy status and congestion information of the network. This status information is used for further packet routing in the network with the help of XY routing algorithm. The functionality of Agent is enhanced not only to work as information provider but also to take decision for packet to either pass or stop to the processing element by setting the firewall in order to provide security. Proposed design provides a better performance and area optimization by avoiding deadlock and live lock as compared to existing approaches over network design.
Modified Headfirst Sliding Routing: A Time-Based Routing Scheme for Bus-Nochy...IJERA Editor
Several interesting topologies emerge by incorporating the third dimension in networks-on-chip (NoC). The Network-on-Chip (NoC) is Network-version of System on-Chip (SoC) means that on-chip communication is done through packet based networks. In NOC topology, routing algorithm and switching are main terminology .The routing algorithm is one of the key factor in NOC architecture. The routing algorithm, which defines as the path taken by a packet between the source and the destination. A good routing algorithm is necessary to improve the network performance. . Here we are proposing a new architecture to improve the throughput and latency of the network. In the proposed approach we are using a fixed path for the packet to transmit from source to destination
SURVEY OF ENERGY EFFICIENT HIGH PERFORMANCE LOW POWER ROUTER FOR NETWORK ON CHIPIJESM JOURNAL
This document summarizes research on efficient router designs for networks-on-chip (NOCs). It surveys several router architectures that aim to improve performance and energy efficiency, including a flexible router that handles requests to busy buffers, a hybrid two-layer router that supports both packet-switched and circuit-switched communications, and a clockless router called MANGO that provides guaranteed services. Fault tolerance is also addressed through simulation-based analysis of transient faults in NOC routers. The document surveys these efficient router designs for high-performance NOCs while balancing the tradeoff between area, power, and performance.
18068 system software suppor t for router fault tolerancelatex ieee journal s...Ashenafi Workie
This document discusses system software support for router fault tolerance. It proposes using the Generalized Algorithm of Fault Tolerance (GAFT) to detect and recover from faults in routers. GAFT uses different types of redundancy, including time, structure, and information redundancy. It can detect faults, identify fault types, locate faulty components, and reconfigure hardware to restore functionality. The document outlines how GAFT could be implemented in router software and hardware to improve reliability. Key aspects include periodic hardware checking, recovery points to restart operation after a fault, and distributed processing to enable mutual checking and recovery while excluding critical router components.
Performance Analysis of Minimum Hop Source Routing Algorithm for Two Dimensio...IOSR Journals
Abstract: Network on Chip has emerged as new paradigm for the system designers to design an on chip interconnection network. However, NOC presents a large amount of array of design parameters and decision that are sometimes difficult to tackle. Apart from these issues NOC presents a framework of communication for complex SOC and has been widely accepted by the industries and academia’s. Today all the complex VLSI circuitry which requires an on chip communication between them are the part of NOC. The mature concepts of communication network such as routing algorithm, switching technique, flow and congestion control etc in the NOC are the important features on which the performance of NOC depends. This paper introduces the efficient source routing algorithm which generates the minimum hop from source to destination. Performance of NOC network in terms of latency and throughput for minimum hop source routing algorithm is also evaluated. Keywords: Network on chip, routing algorithm, topology, traffic.
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...csandit
Maintaining network stability and extending network lifetime to cope with breaking links and topology changes remain nowadays a unsolved issues in Wireless Multimedia Sensor Networks (WMSNs), which aim to ensure flow delivery while guaranteeing QoS requirements, particularly, during data transmission phase. Therefore, in this paper, we jointly consider multipath transmission, load balancing and fault tolerance, to enhance the reliability of transmitted data. We propose a Dynamic Curative Mechanism for Geographic Routing in WMSNs. Theoricals results and those obtained from simulation study demonstrate the validity and efficiency of our proposed mechanism, and indicate that it is highly advised for multimedia transmission and network stability
Hudhud cyclone caused extensive damage in Visakhapatnam, India in October 2014, especially to tree cover. This will likely impact the local environment in several ways: increased air pollution as trees absorb less; higher temperatures without tree canopy; increased erosion and landslides. It also created large amounts of waste from destroyed trees. Proper management of solid waste is needed to prevent disease spread. Suggested measures include restoring damaged plants, building fountains to reduce heat, mandating light-colored buildings, improving waste management, and educating public on health risks. Overall, changes are needed to water, land, and waste practices to rebuild the environment after the cyclone removed green cover.
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
1) In September-October 2009, unprecedented heavy rainfall and dam releases caused widespread flooding in Alampur village in Mahabub Nagar district, a historically drought-prone area.
2) The flood damaged or destroyed homes, buildings, infrastructure, crops, and documents. It displaced many residents and cut off the village.
3) The socioeconomic conditions and mud-based construction of homes in the village exacerbated the flood's impacts, making damage more severe and recovery more difficult.
The document summarizes the Hudhud cyclone that struck Visakhapatnam, India in October 2014. It describes the cyclone's formation, rapid intensification to winds of 175 km/h, and landfall near Visakhapatnam. The cyclone caused extensive damage estimated at over $1 billion and at least 109 deaths in India and Nepal. Infrastructure like buildings, bridges, and power lines were destroyed. Crops and fishing boats were also damaged. The document then discusses coping strategies and improvements needed to disaster management plans to better prepare for future cyclones.
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
This document summarizes the results of a geophysical investigation using vertical electrical sounding (VES) methods at 13 locations around an industrial area in India. The VES data was interpreted to generate geo-electric sections and pseudo-sections showing subsurface resistivity variations. Three main layers were typically identified - a high resistivity topsoil, a weathered middle layer, and a basement rock. Pseudo-sections revealed relatively more weathered areas in the northwest and southwest. Resistivity sections helped identify zones of possible high groundwater potential based on low resistivity anomalies sandwiched between more resistive layers. The study concluded the electrical resistivity method was useful for understanding subsurface geology and identifying areas prospective for groundwater exploration.
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
1. The document discusses urban flooding in Bangalore, India. It describes how factors like heavy rainfall, population growth, and improper land use have contributed to increased flooding in the city.
2. Flooding events in 2013 are analyzed in detail. A November rainfall caused runoff six times higher than the drainage capacity, inundating low-lying residential areas.
3. Impacts of urban flooding include disrupted daily life, damaged infrastructure, and decreased economic activity in affected areas. The document calls for improved flood management strategies to better mitigate urban flooding risks in Bangalore.
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
This document discusses enhancing post-disaster recovery through optimal infrastructure capacity building. It presents a model to minimize the cost of meeting demand using auxiliary capacities when disaster damages infrastructure. The model uses genetic algorithms to select optimal capacity combinations. The document reviews how infrastructure provides vital services supporting recovery activities and discusses classifying infrastructure into six types. When disaster reduces infrastructure services, a gap forms between community demands and available support, hindering recovery. The proposed research aims to identify this gap and optimize capacity selection to fill it cost-effectively.
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
This document analyzes the effect of lintels and lintel bands on the seismic performance of reinforced concrete masonry infilled frames through non-linear static pushover analysis. Four frame models are considered: a frame with a full masonry infill wall; a frame with a central opening but no lintel/band; a frame with a lintel above the opening; and a frame with a lintel band above the opening. The results show that the full infill wall model has 27% higher stiffness and 32% higher strength than the model with just an opening. Models with lintels or lintel bands have slightly higher strength and stiffness than the model with just an opening. The document concludes lintels and lintel
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
1) A cyclone with wind speeds of 175-200 kph caused massive damage to the green cover of Gitam University campus in Visakhapatnam, India. Thousands of trees were uprooted or damaged.
2) A study assessed different types of damage to trees from the cyclone, including defoliation, salt spray damage, damage to stems/branches, and uprooting. Certain tree species were more vulnerable than others.
3) The results of the study can help in selecting more wind-resistant tree species for future planting and reducing damage from future storms.
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
1) A visual study was conducted to assess wind damage from Cyclone Hudhud along the 27km Visakha-Bheemli Beach road in Visakhapatnam, India.
2) Residential and commercial buildings suffered extensive roof damage, while glass facades on hotels and restaurants were shattered. Infrastructure like electricity poles and bus shelters were destroyed.
3) Landscape elements faced damage, including collapsed trees that damaged pavements, and debris in parks. The cyclone wiped out over half the city's green cover and caused beach erosion around protected areas.
1) The document reviews factors that influence the shear strength of reinforced concrete deep beams, including compressive strength of concrete, percentage of tension reinforcement, vertical and horizontal web reinforcement, aggregate interlock, shear span-to-depth ratio, loading distribution, side cover, and beam depth.
2) It finds that compressive strength of concrete, tension reinforcement percentage, and web reinforcement all increase shear strength, while shear strength decreases as shear span-to-depth ratio increases.
3) The distribution and amount of vertical and horizontal web reinforcement also affects shear strength, but closely spaced stirrups do not necessarily enhance capacity or performance.
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
1) A team of 17 professional engineers from various disciplines called the "Griha Seva" team volunteered after the 2001 Gujarat earthquake to provide technical assistance.
2) The team conducted site visits, assessments, testing and recommended retrofitting strategies for damaged structures in Bhuj and Ahmedabad. They were able to fully assess and retrofit 20 buildings in Ahmedabad.
3) Factors observed that exacerbated the earthquake's impacts included unplanned construction, non-engineered buildings, improper prior retrofitting, and defective materials and workmanship. The professional engineers' technical expertise was crucial for effective post-disaster management.
This document discusses risk analysis and environmental hazard management. It begins by defining risk, hazard, and toxicity. It then outlines the steps involved in hazard identification, including HAZID, HAZOP, and HAZAN. The document presents a case study of a hypothetical gas collecting station, identifying potential accidents and hazards. It discusses quantitative and qualitative approaches to risk analysis, including calculating a fire and explosion index. The document concludes by discussing hazard management strategies like preventative measures, control measures, fire protection, relief operations, and the importance of training personnel on safety.
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
This document summarizes a study on monitoring and assessing air quality with respect to dust particles (PM10 and PM2.5) in the urban environment of Visakhapatnam, India. Sampling was conducted in residential, commercial, and industrial areas from October 2013 to August 2014. The average PM2.5 and PM10 concentrations were within limits in residential areas but moderate to high in commercial and industrial areas. Exceedance factor levels indicated moderate pollution for residential areas and moderate to high pollution for commercial and industrial areas. There is a need for management measures like improved public transport and green spaces to combat particulate air pollution in the study areas.
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
This document describes a low-cost wireless sensor network and smartphone application system for disaster management. The system uses an Arduino-based wireless sensor network comprising nodes with various sensors to monitor the environment. The sensor data is transmitted to a central gateway and then to the cloud for analysis. A smartphone app connected to the cloud can detect disasters from the sensor data and send real-time alerts to users to help with early evacuation. The system aims to provide low-cost localized disaster detection and warnings to improve safety.
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
This document summarizes an analysis of seismic vulnerability along the east coast of India. It discusses the geotectonic setting of the region as a passive continental margin and reports some moderate seismic activity from offshore in recent decades. While seismic stability cannot be assumed given events like the 2004 tsunami, no major earthquakes have been recorded along this coast historically. The document calls for further study of active faults, neotectonics, and implementation of improved seismic building codes to mitigate vulnerability.
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
This document discusses how fracture mechanics can be used to better predict damage and failure of structures. It notes that current design codes are based on small-scale laboratory tests and do not account for size effects, which can lead to more brittle failures in larger structures. The document outlines how fracture mechanics considers factors like size effect, ductility, and minimum reinforcement that influence the strength and failure behavior of structures. It provides examples of how fracture mechanics has been applied to problems like evaluating shear strength in deep beams and investigating a failure of an oil platform structure. The document argues that fracture mechanics provides a more scientific basis for structural design compared to existing empirical code provisions.
This document discusses the assessment of seismic susceptibility of reinforced concrete (RC) buildings. It begins with an introduction to earthquakes and the importance of vulnerability assessment in mitigating earthquake risks and losses. It then describes modeling the nonlinear behavior of RC building elements and performing pushover analysis to evaluate building performance. The document outlines modeling RC frames and developing moment-curvature relationships. It also summarizes the results of pushover analyses on sample 2D and 3D RC frames with and without shear walls. The conclusions emphasize that pushover analysis effectively assesses building properties but has limitations, and that capacity spectrum method provides appropriate results for evaluating building response and retrofitting impact.
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
1) A 6.0 magnitude earthquake occurred off the coast of Paradip, Odisha in the Bay of Bengal on May 21, 2014 at a depth of around 40 km.
2) Analysis of magnetic and bathymetric data from the area revealed the presence of major lineaments in NW-SE and NE-SW directions that may be responsible for seismic activity through stress release.
3) Movements along growth faults at the margins of large Bengal channels, due to large sediment loads, could also contribute to seismic events by triggering movements along the faults.
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
This document discusses the effects of Cyclone Hudhud on the development of Visakhapatnam as a smart and green city through a case study and preliminary surveys. The surveys found that 31% of participants had experienced cyclones, 9% floods, and 59% landslides previously in Visakhapatnam. Awareness of disaster alarming systems increased from 14% before the 2004 tsunami to 85% during Cyclone Hudhud, while awareness of disaster management systems increased from 50% before the tsunami to 94% during Hudhud. The surveys indicate that initiatives after the tsunami improved awareness and preparedness. Developing Visakhapatnam as a smart, green city should consider governance
This document summarizes a product called H-HUTS that aims to provide sustainable disaster recovery housing. H-HUTS uses cardboard and origami-inspired modular construction to quickly provide temporary shelters after disasters. The cardboard shelters are designed to be upgraded into permanent homes over time using low-cost materials like shotcrete or concrete. The modular design allows for flexibility and community participation in construction. Testing has shown the shelters can withstand wind loads and provide adequate insulation. The goal of H-HUTS is to not just provide initial shelter but help disaster-affected communities regain permanency in housing and recover in the long-term.
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensi...ManiMaran230751
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensics Process – Introduction – The
Identification Phase – The Collection Phase – The Examination Phase – The Analysis Phase – The
Presentation Phase.
Module4: Ventilation
Definition, necessity of ventilation, functional requirements, various system & selection criteria.
Air conditioning: Purpose, classification, principles, various systems
Thermal Insulation: General concept, Principles, Materials, Methods, Computation of Heat loss & heat gain in Buildings
MODULE 5 BUILDING PLANNING AND DESIGN SY BTECH ACOUSTICS SYSTEM IN BUILDINGDr. BASWESHWAR JIRWANKAR
: Introduction to Acoustics & Green Building -
Absorption of sound, various materials, Sabine’s formula, optimum reverberation time, conditions for good acoustics Sound insulation:
Acceptable noise levels, noise prevention at its source, transmission of noise, Noise control-general considerations
Green Building: Concept, Principles, Materials, Characteristics, Applications
UNIT-4-PPT UNIT COMMITMENT AND ECONOMIC DISPATCHSridhar191373
Statement of unit commitment problem-constraints: spinning reserve, thermal unit constraints, hydro constraints, fuel constraints and other constraints. Solution methods: priority list methods, forward dynamic programming approach. Numerical problems only in priority list method using full load average production cost. Statement of economic dispatch problem-cost of generation-incremental cost curve –co-ordination equations without loss and with loss- solution by direct method and lamda iteration method (No derivation of loss coefficients)
This presentation outlines testing methods and equipment for evaluating gas-phase air filtration media using flat sheet samples, in accordance with ISO 10121 standards—specifically designed for assessing the performance of media used in general ventilation and indoor air quality applications.
This presentation provides a comprehensive overview of a specialized test rig designed in accordance with ISO 4548-7, the international standard for evaluating the vibration fatigue resistance of full-flow lubricating oil filters used in internal combustion engines.
Key features include:
Kevin Corke Spouse Revealed A Deep Dive Into His Private Life.pdfMedicoz Clinic
Kevin Corke, a respected American journalist known for his work with Fox News, has always kept his personal life away from the spotlight. Despite his public presence, details about his spouse remain mostly private. Fans have long speculated about his marital status, but Corke chooses to maintain a clear boundary between his professional and personal life. While he occasionally shares glimpses of his family on social media, he has not publicly disclosed his wife’s identity. This deep dive into his private life reveals a man who values discretion, keeping his loved ones shielded from media attention.
May 2025: Top 10 Cited Articles in Software Engineering & Applications Intern...sebastianku31
The International Journal of Software Engineering & Applications (IJSEA) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Software Engineering & Applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts & establishing new collaborations in these areas.
This presentation showcases a detailed catalogue of testing solutions aligned with ISO 4548-9, the international standard for evaluating the anti-drain valve performance in full-flow lubricating oil filters used in internal combustion engines.
Topics covered include:
world subdivision.pdf...................bmmederos10
Fpga based highly reliable fault tolerant approach for network on chip (noc)
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 21
FPGA BASED HIGHLY RELIABLE FAULT TOLERANT APPROACH
FOR NETWORK ON CHIP (NOC)
Jehosheba Margaret.M1
, Mary Susanna. M2
, Rajapirian.P3
1
Student, VLSI Design, Kings college of Engineering, Thanjavur, Tamilnadu, India. E-mail:[email protected]
2
Faculty, Department of Electronics and Communication Engineering, PRIST University, Kumbakonam, Tamilnadu, India
3
Faculty, Department of Electronics and Communication Engineering, Kings College of Engineering, Thanjavur,
Tamilnadu, India
Abstract
Network on chip is an interconnection between several processing elements and routers. There are several possibilities for the
occurrence of faults within the network. These faults degrade the performance of the network. In order to increase the
performance several fault tolerant methods has been used. They involve themselves in rerouting and hence take longer paths. To
make the path shorter, the router architecture has to be modified. The introduction of minimal routing algorithm for faults in the
network increases the overall performance of the network. When we use the algorithm, it takes shortest path regardless of the
presence of faults. The proposed algorithm is much simpler than the previous existing algorithm. It provides link among the
surviving routers in the network. It proves to be more efficient even in the presence of multiple faults. It has the ability to connect
the routers both horizontally and orthogonally even in the presence of faults. It has reduced delay over the network. It has proved to
be more reliable of 99.5% when multiple faults are found in the network. It can be used in 4x4 mesh topology with six faulty
routers to analyse the reliability of network. It also helps to estimate the various parameters such as reliability, latency, speed,
area and power.
Keywords- Network on Chip, faulty router, fault tolerant algorithm, chip network, faulty link.
-----------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
The recent technology in VLSI has made the chip to be
much smaller in size. To make it possible, the inner
modules and their interconnections are brought into small
size. Networks-on-Chip (NoC) has emerged as a promising
solution for on-chip interconnection in Multi Core NoCs
due to its scalability, reusability, flexibility, and parallelism
[1] [2] [3]. NoC consists of Network Interfaces, Routers,
set of links interconnecting the Routers and a defined
communication protocol for IP core interaction [4]. NoC
architecture design follows the computation architecture
design, which partitions a behaviour model and maps it
onto an computation architecture model [5]. The first step
is communication modelling and analysis. The second step
is topology and protocol design based on the
communication requirements. The aim of this step is to use
the least network resource to fulfil the communication
requirements showed by the communication pattern. To
estimate the delay on each interconnection in term of clock
cycles and analyse power and area of a NoC design, the
chip floor plan should be estimated in the third step to get
some design requirements for interconnections. The fourth
step is the performance analysis which simulates the NoC
architecture. In the fifth step, logic design can help increase
the accuracy of power and area analysis, but the
interconnection design is the centre of the analysis.
Faults refer to the failure of the system. Transient and
permanent faults are two different types of faults that can
occur in on-chip networks [6]. Transient faults are
temporary and unpredictable. They are often difficult to be
detected and corrected. Permanent faults are caused by
physical damages such as manufacturing defects and device
wear-out. These faults should be recovered or tolerated in a
way that the network continues functioning. A
deterministic routing algorithm uses a fixed path for each
pair of nodes resulting in increased packet latency
especially in congested networks [7]. In adaptive routing
algorithms, packets are not restricted to a single path when
traversing from a source to a destination router [8].
Moreover, non-minimal methods are usually more complex
with a larger number of virtual channels. These algorithms
are used in order to reroute packets around faults [9].
Some fault-tolerant algorithms are proposed to support
special cases of faults, such as one-faulty routers, convex or
concave regions. These algorithms either disable the
healthy components or require a large number of virtual
channels to avoid deadlock. There are other fault-tolerant
approaches [10] [11] [12] which do not require any virtual
channels. A common behaviour in fault-tolerant approaches
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 22
is that packets are routed normally in the network until they
face a fault. At this time, turn models or other techniques
are used to reroute packets around the faults such that no
cycles be formed in the network.
In this paper, we present a new approach to tolerate
multiple faults in the network. This approach is termed as
Connection Retaining Fault tolerant approach which works
more effectively under faults. When a router becomes
faulty, the router is considered as a link to send the data
from source router to destination router. If a link is faulty, it
changes its direction so that the data reaches its destination
router.
The rest of this paper is organized as follows: Section II
reviews the related work. Basic details of the router are
given in Section III. The proposed fault-tolerant routing
algorithm is presented in Section IV. Multiple faulty cases
are discussed in Section V. The results are investigated in
Section VI. Finally the paper is concluded with a summary
in the last section.
2. RELATED WORK
There are few papers discussed to deal with faults in links
[12][13] and routers[11][14]. Few methods never use
virtual channels[9][10][11][15]. Some methods like
FTDR[17] and HARAQ[18] use routing table. Hence they
require large area [16][17]. Few approaches do not use
routing table [18] but they take non minimal path. The
routing algorithm scans the position in descending order
and selects its position. BFT-NoC[2] tolerate faulty links by
dynamic sharing of surviving channels. The algorithm [12]
tolerate single fault. Another algorithm [14] tolerates two
faulty links in the network. DBP [19] approach uses a
lightweight approach to maintain the network connectivity
among non-faulty routers. Here the connections are
embedded inside the chip. The turn based model is used to
avoid deadlock conditions [12][15][16]. The turn-based
routing methods have lower hardware costs but also lower
performance because of having less adaptivity.
The connection retaining algorithm has the following
advantages:(i) It provides shortest path in the network. (ii)
It requires knowledge about neighbouring router. (iii) It
consists few lines of codes. (iv) requires only two virtual
channels. (v) When router is faulty, it is considered as link.
(vi) High reliability. (vii) Does not convey extra
information about the routing process. Reachability is
another important factor as it consists of reachable faulty
neighbours.
2.1 Basic Router
Routers are considered to be the most important blocks in
network on chip. Routers consist of few main components
like buffers, ports, crossbar switch, flow control and arbiter.
There are four ports indicating the four directions namely
North, South, East and West. A Local port is always
connected to the processing element. In a XY network,
each input pair is connected to the output pair.
Fig.1. Basic Router
The type of router used in this method is double-Y network.
It provides adaptiveness with minimum number of virtual
channels. The network is partitioned into two sub networks
namely +X and -X. Eastward channel route through the +X
part in Y-direction whereas Westward channel route
through the -X part in Y-direction.
Fig 2. Router in Double-Y network
Flow control is a mechanism decides how the network
resources are allocated in the network. Buffers hold the
data in the router which are stored temporarily. Buffers are
provided for the four different directions namely North,
South, West and East.
3. ARCHITECTURE
3.1 Router Architecture
Faults are considered to be failure of a system. There are
several possibilities for the occurrence of faults in the
network. Since NoC consist of link, core and router, it may
lead to link fault, core fault and router fault respectively.
The network continues to work in case of link fault and
core fault but fail to work when the router fails. Faults in
the link can be rectified by the dynamic sharing of the
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 23
remaining channels. When a router fails, it cannot send or
receive the data from one location to another. It causes
entire system to fail leaving the core and link as faulty. The
core can perform its regular operation only when the fault
is recovered.
Fig.3. Modified router architecture
In this proposed method, the router architecture can still be
used even in the presence of faults. In the normal router
architecture, it consists of input buffers, routing unit, virtual
channel allocator, switch allocator and crossbar switch. In
this method, the architecture is modified with reference to
the normal architecture. It needs extra multiplexer,
demultiplexer, link checker and wiring connections. When
the router is faulty, the west input channel is directed
towards the east output channel while the east input channel
is directed towards the west output channel. In the same
way, the north input channel is directed towards the south
output channel while south input channel is directed
towards the north output channel. It needs extra wiring and
costs overhead.
The above architecture is used in 4x4 mesh topology. It can
tolerate multiple number of faults in the network by acting
as a link with its neighbouring routers.
Fig 4 4x4 Mesh topology network with fault and their
result after applying algorithm
3.2 Fault Tolerant Algorithm In Router Architecture
In this section, the fault tolerant algorithm is used to
tolerate the number of faults present in the entire network.
It supports the faulty router by taking non minimal paths.
Due to the characteristics of adaptiveness, the data chooses
different path by bypassing the faulty router to reach the
destination router from the source router. By default all the
data are routed in the Y-direction of the network. If the
neighbouring routers are faulty in the Y-direction then the
data is routed in the X-direction.
If there are three routers in the network with one as faulty
then the data is transferred by bypassing the faulty router.
In case of six routers in the network with one faulty router
in the Y-direction of the source router then the data is sent
in the X-direction. After selecting the path, it further sends
the data to the next router to reach destination. If the next
hop router is faulty, it is considered as a link. Finally, it
reaches its destination router. If the destination is two hops
away from the source then the data is routed to the non
faulty router first. It tries the best to avoid routing through
the faulty router.
Suppose, if both the direction are non faulty then it moves
through the less congested area. If the network is designed
to tolerate a few numbers of faults, packets can be routed
adaptively in the network as long as the remaining distance
along both directions is equal or greater than two hops. To
sum up, it is guaranteed that all situations of a single faulty
router are covered by the retaining algorithm taking only
the shortest paths between each pair of source and
destination routers. In addition, fully adaptiveness is
provided when the packet is not close to the destination
router (i.e. the packet is close to the destination when the
distance along one dimension is at most one hop).
However, for better reliability, the adaptiveness of
algorithm can be limited. If the distance is equal in both
directions then the data is sent in either way.
Fig 5 Tolerating one fault
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 24
Moreover, this algorithm requires only the information
about the adjacent neighbouring routers. So, it requires low
area overhead. The presence of faults occurs mostly in
additional resources and less used resources. This makes
the reliability to be more efficient.
3.3 Link Checker
Link checker is used to check the connection (i.e., link)
between the two adjacent routers. In a network, all routers
are well connected to each other in a well established
manner. There are several possibilities for the failure of
link. Care must be taken so that these failures do not affect
network performance.
Fig 6 Link checker with router
If a link fails, the transfer of data is stopped. It is necessary
to have the information about the status of the links in order
to complete the data transfer from source router to
destination router. The usage of link checker prevents
performance degradation in the network.
4. RELIABILITY OF ROUTERS
In this section, it deals how the faulty routers are tolerated
in the presence of two or more faults. When the number of
faults is increased, it undergoes several problems in the
network. The solution can be brought by analysing the
probabilities of faults occurrence.
4.1 Reliability for Two Faulty Routers
Fig. 7.Tolerating two faulty routers
Reliability estimation is carried out under two possible
conditions in the network.
Reliabilty1:
By using the fault tolerant approach how the data is
successfully sent under the existence of faults in the network.
At first, we have to calculate the number of total
combinations of two faulty routers in the network. Then, we
have to measure the number of combinations in which two
faults occur in diagonal positions. By dividing these two
numbers, the reliability value is obtained. The number of
different combinations of two faulty switches in an nxn mesh
network can be measured by using the formula,
N(all combinations):
N=(n2
(n2
-1))/2 (1)
N(diagonal combinations):
N=2(n-1)2
(2)
Reliability1=1-4((n-1)2
/n2
(n2
-1)) (3)
Reliability2:
The estimation of reliability considered when the data is sent
over the faulty router. Only the healthy routers send the data
to another router. Any faulty router cannot send the data but
only can receive them. The total number of data per
combination is given by,
N(delivered per combination)=(n2
-2)(n2
-3) (4)
Total=N(deliveredpercombination)*N(all combinations).
Total number of data defeated,
Defeated=2X N(diagonal combinations)=4(n-1)2
(5)
Reliability2, R2=1-(Defeated/Total).
4.2 Reliability for Multiple Routers
Reliability check is made for multiple router faults. The
number of faults in the routers cannot be increased for
small size networks. Atleast one non faulty router must
present in the network. As the number faulty routers
increases, the performance decreases. Even under these
severe fault conditions, the rest of the packets can be routed
to their destinations through the shortest paths. The focus of
this work is to tolerate faults by using the shortest paths
without any performance loss. However, non minimal paths
or virtual channels can be used to support the remaining
cases.
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 25
Based on the above two methods the reliability of the router
is estimated.
Fig. 8 Tolerating multiple faulty router
5. EXPERIMENTAL RESULTS
To evaluate the performance of the network, an NoC
simulator is used along with the VHDL codes is applied
over the entire components of the Network on Chip. The
data width is set to 32 bits for all routers. Each input buffer
can accommodate 8 flits in each virtual channel. As a
performance metric, we use latency defined as the number
of cycles between the initiation of a message issued by a
Processing Element (PE) and the time when the message is
completely delivered to the destination PE.
The performance estimation of this connection retaining
approach is compared with two methods, called
Reconfigurable Switch algorithm [13] and Reconfigurable
Links algorithm [14]. In the other methods, packets may
take unnecessary longer paths to reach destinations.
Reconfigurable Switch algorithm requires one virtual
channel along each dimension and is able to tolerate all
single faulty routers. Reconfigurable Links utilizes two
virtual channels to support all two faulty routers.
5.1 Reliability for Uniform Traffic
In the uniform traffic profile, each processing element (PE)
generates data packets and sends them to another PE using
a uniform distribution [20]. The mesh size is considered to
be 4×4. To evaluate the reliability of connection retaining
algorithm, the number of faulty routers increases from one
to six. All faulty routers are selected using a random
function and its performance is evaluated.
Fig 9 Reliability Analysis
Reliability is based on the above two performance metric
measurement. When the faults are considered to be
minimum, the reliability is good for all the three methods.
As the number of faults increases, the other two methods
degrade in their performance. Unlike the other methods
connection retaining method holds good under multiple
faults. It is proved to be moreefficient with the reliability
estimation of about 99.5% under multiple faults in the
network.
5.2 Performance Analysis for Uniform Traffic
The average communication latency of Reconfigurable
Switch algorithm and Reconfigurable Links are obtained
under the cases of single and two faulty routers as more
faulty routers are not well supported. The average
communication latency of Connection retaining fault
tolerant algorithm is measured under one to six faulty
routers in the network. To have a fair performance
comparison we use two virtual channels in all three
methods. The extra virtual channels are used for the
performance purposes. In a fault-free network, the
performance of all methods is comparable while
Reconfigurable Links outperforms others because of its
better adaptiveness. As the number of faults increases, the
performance of Reconfigurable Switch algorithm and
Reconfigurable Links significantly decreases. We increase
the number of faulty routers to six faults and measure the
performance of connection retaining method. Surprisingly,
the performance gradually starts growing under the same
traffic load.
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 26
Fig 10 Performance Analysis under uniform traffic
5.3 Performance Analysis for Hotspot Traffic
Under the hotspot traffic pattern, one or more routers are
chosen as hotspots receiving an extra portion of the traffic
in addition to the regular uniform traffic. The performance
Analysis is for Connection retaining algorithm,
Reconfigurable Link and Reconfigurable Switch.
Connection retaining algorithm proves to more promising
under hot spot condition.
Fig 11 Performance Analysis under hotspot traffic
6. CONCLUSIONS
In this paper, we proposed a fault-tolerant approach to
retain the connectivity of the network. In the presented
approach, data are routed through the shortest paths,
maintaining the performance of NoC even in the presence
of multiple faults. The router architecture is slightly
modified to route the data safely between the routers. The
main purpose of the modification in the router architecture
is to maintain the connectivity among the remaining
routers. For this to happen, when a router becomes faulty,
the router links are connected to each other along the
horizontal and orthogonal directions. This method is a very
simple, lightweight, and adaptive approach. It takes only
one andtwo virtual channels along the X and Y dimensions
respectively. Obtaining high reliability by a simple
approach is the conclusion of this work.
REFERENCES
[1] Xu, Jiang, W. Wolf, J. Hankel, S. Charkdhar, “A
Methodology for design, modeling and analysis for
networks-on-Chip,” in Proc. of IEEE International
Symposium on Circuits and Systems, pp. 1778-1781,
2005.
[2] W. Tsai, D. Zheng, S. Chen, and Y.H. Hu, “A fault-
tolerant NoC scheme using bidirectional channel”,
in Proc. DAC, pp.918-923, 2011.
[3] E. Rijpkema et al., “Tradeoffs in the design of a
router with both guaranteed and best-effort services
for networks on chip,” in Proc . Of DATE’03, pp. 350-
355, 2003.
[4] Kangmin Lee, Se-Joong Lee, Hoi-Jun Yoo, “Low-
power network-on- chip for high-performance SoC
design”,press, 2008.
[5] L. Benini, G. De Micheli, “Networks on chip: a new
paradigm for systems on chip design”, Design,
Automation and Test in Europe Conference and
Exhibition, 2002.
[6] M. Ali, M. Welzl, S.Hessler, “A Fault tolerant
mechanism for handling Permanent and Transient
Failures in a Network on Chip,” in Proc. Of
international conference on Information Technology,
pp.1027-1032, 2007.
[7] J. Duato, S. Yalamanchili, L. Ni, “Interconnection
networks: an engineering approach”, Morgan
Kaufmann Publishers, 2003.
[8] M. Daneshtalab, M. Kamali, M. Ebrahimi, S.
Mohammadi, A. Afzali-Kusha, and J. Plosila,
"Adaptive Input-output Selection Based On-Chip
Router Architecture," Journal of Low Power
Electronics (JOLPE), Vol.8, No. 1, pp. 11-29, 2012.
[9] F. Chaix, et al., “A fault-tolerant deadlock-free
adaptive routing for On Chip interconnects,” in Proc.
of DATE, pp. 1-4, 2011.
[10] S. Jovanovic, C. Tanougast, et al., “A new
deadlock-free fault- tolerant routing algorithm for
NoC interconnections”, in Proc. of FPL, pp.326-331,
2009.
[11] J. Wu and D. Wang, “Fault-tolerant and deadlock-free
routing in 2- Dmeshes using rectilinear-monotone
polygonal fault blocks”, in Proc. Of Parallel
Algorithms., pp.99-111, 2005.
[12] Z. Zhen, A. Greiner, S. Taktak, “A reconfigurable
routing algorithm for a fault-tolerant 2D-Mesh
Network-on-Chip”, DAC, pp. 441-446, 2008.
[13] M. Ebrahimi et al., “MAFA: Adaptive Fault-Tolerant
Routing Algorithm for Networks-on-Chip,” in Proc.
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 27
of DSD, pp. 201-206, 2012.
[14] M. Valinataja, S. Mohammadi, J. Plosila, P. Liljeberg,
H. Tenhunen, “A reconfigurable and adaptive
routing method for fault-tolerant meshbased
networks-on-chip,” International Journal of
Electronics and Communications (AEU), v. 65, I.7, pp.
630-640, 2011.
[15] D.Fick, A. DeOrio, G. Chen, V. Bertacco, D.
Sylvester and D. Blaauw,“A highly resilient routing
algorithm for fault-tolerant NoCs,” Design,Automation
and Test in Europe (DATE), pp. 21-26, 2009.
[16] M. Valinataj, S. Mohammadi, S. Safari and J. Plosila,
“A link failure aware routing algorithm for
Networks-on-Chip in nano technologies,”IEEE
Conference on Nanotechnology, pp. 841-844, 2009.
[17] Ch. Feng, Zh. L, A. Jantsch, J. Li, M. Zhang, “A
Reconfigurable Fault tolerant Deflection Routing
Algorithm Based on Reinforcement Learning for
Network-on-Chip”, in Proc. of NoCArc, 2010.
[18] M. Ebrahimi, M. Daneshtalab, F. Farahnakian, P.
Liljeberg, J. Plosila, M. Palesi, and H. Tenhunen,
"HARAQ: Congestion-Aware Learning Model for
Highly Adaptive Routing Algorithm in On-Chip
Networks," in Proc of NOCS, pp. 19-26, 2012.
[19] M. Koibuchi, H. Matsutani, H. Amano, T.M.
Pinkston, “A Lightweight Fault-Tolerant Mechanism
for Network-on-Chip”, in Proc. of NoCS, pp.13-22,
2008.
[20] C.J. Glass et al., “The Turn Model for Adaptive
Routing”, in Proc. Of 19th Int'l Symp. Computer
Architecture, pp. 278-287, 1992