首页    期刊浏览 2024年12月02日 星期一
登录注册

文章基本信息

  • 标题:A Framework to Ensure Quality of Service with New Trail and Security in Networks
  • 本地全文:下载
  • 作者:HarithaPidikiti ; N. Subhash Chandra
  • 期刊名称:International Journal of Computer Trends and Technology
  • 电子版ISSN:2231-2803
  • 出版年度:2014
  • 卷号:15
  • 期号:2
  • 页码:56-59
  • 出版社:Seventh Sense Research Group
  • 摘要:We present a method to find another path, after link failures, from a source node to a destination node, before the Interior Gateway Protocol (e.g., OSPF or ISIS) has had a chance to reconverge in response to the failure. The target application is a small (up to tens of nodes) regional access subnetwork of a service providing networks, which is typical access scale encountered for the practice. We can illustrate the method and prove that it will found in a path if one exists. In the nonswapped mode once the fault is detected on the protected LSP, the LSR takes the packet from the local buffer and looks at the packet header (“shim” header or MPLS header) and then proceeds to swap it for the corresponding output label and changes the output interface. Note that this is the second time that the LSR looks at this header. The first was when the packet arrived at the LSR for the first time to be copied to the local buffer. This method introduces delays, processing overhead and additional CPU requirements. When it sending first time we are sending the data in an encryption format and we are selecting two paths of nodes information in that we are sending the encrypted data in first path if in case the data in first path was failed again immediately it will select the another second path and in this second path we are encrypting data again and resending the data after that it received in destination area again they will decrypt the data with the two algorithms we are used and the receiver can receive the data without damage and in a secured manner by using this process like this we can send the data in safe manner and very fast from source to destination.
  • 关键词:networking; nodes; encryption; delay process; recollecting; rerouting
国家哲学社会科学文献中心版权所有