Case Study of Various Routing Algorithm

download Case Study of Various Routing Algorithm

of 25

Transcript of Case Study of Various Routing Algorithm

  • 5/25/2018 Case Study of Various Routing Algorithm

    1/25

    Case study of various routing algorithm

    a router is used to manage network traffic and find the best route for sending packets.But have you ever thought about how routers do this? Routers need to have someinformation about network status in order to make decisions regarding how and whereto send packets. But how do they gather this information?

    Routers use routing algorithmsto find the best route to a destination. When we say"best route," we consider parameters like the number of hops(the trip a packet takesfrom one router or intermediate point to another in the network), time delay andcommunication cost of packet transmission.

    Based on how routers gather information about the structure of a network and theiranalysis of information to specify the best route, we have two major routing algorithms:global routing algorithmsand decentralized routing algorithms. In decentralizedrouting algorithms, each router has information about the routers it is directly connectedto -- it doesn't know about every router in the network. These algorithms are also knownas DV(distance vector) algorithms

    Dijkstra's algorithm

  • 5/25/2018 Case Study of Various Routing Algorithm

    2/25

    Dijkstra's algorithm runtime

    Dijkstra's algorithm, conceived by Dutchcomputer scientistEdsger Dijkstrain

    1959,[1]is agraph search algorithmthat solves the single-sourceshortest path

    problemfor agraphwith nonnegativeedgepath costs, producing ashortest path

    tree.This algorithm is often used inrouting.An equivalent algorithm was

    developed byEdward F. Moorein 1957.[2]

    For a given sourcevertex(node) in the graph, the algorithm finds the path withlowest cost (i.e. the shortest path) between that vertex and every other vertex. It

    can also be used for finding costs of shortest paths from a single vertex to a singledestination vertex by stopping the algorithm once the shortest path to the

    destination vertex has been determined. For example, if the vertices of the graphrepresent cities and edge path costs represent driving distances between pairs of

    cities connected by a direct road, Dijkstra's algorithm can be used to find theshortest route between one city and all other cities. As a result, the shortest path

    first is widely used in networkrouting protocols,most notablyIS-ISandOSPF

    (Open Shortest Path First).

    Algorithm

    Let the node we are starting be called an initial node. Let a distance of a node Ybe the distance from the initial nodeto it. Dijkstra's algorithm will assign someinitial distance values and will try to improve them step-by-step.

    http://en.wikipedia.org/wiki/Computer_scientisthttp://en.wikipedia.org/wiki/Computer_scientisthttp://en.wikipedia.org/wiki/Edsger_Dijkstrahttp://en.wikipedia.org/wiki/Edsger_Dijkstrahttp://en.wikipedia.org/wiki/Edsger_Dijkstrahttp://en.wikipedia.org/wiki/Dijkstra's_algorithm#cite_note-0http://en.wikipedia.org/wiki/Dijkstra's_algorithm#cite_note-0http://en.wikipedia.org/wiki/Dijkstra's_algorithm#cite_note-0http://en.wikipedia.org/wiki/Graph_search_algorithmhttp://en.wikipedia.org/wiki/Graph_search_algorithmhttp://en.wikipedia.org/wiki/Graph_search_algorithmhttp://en.wikipedia.org/wiki/Shortest_path_problemhttp://en.wikipedia.org/wiki/Shortest_path_problemhttp://en.wikipedia.org/wiki/Shortest_path_problemhttp://en.wikipedia.org/wiki/Shortest_path_problemhttp://en.wikipedia.org/wiki/Graph_(mathematics)http://en.wikipedia.org/wiki/Graph_(mathematics)http://en.wikipedia.org/wiki/Graph_(mathematics)http://en.wikipedia.org/wiki/Edge_(graph_theory)http://en.wikipedia.org/wiki/Edge_(graph_theory)http://en.wikipedia.org/wiki/Edge_(graph_theory)http://en.wikipedia.org/wiki/Shortest_path_treehttp://en.wikipedia.org/wiki/Shortest_path_treehttp://en.wikipedia.org/wiki/Shortest_path_treehttp://en.wikipedia.org/wiki/Shortest_path_treehttp://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Edward_F._Moorehttp://en.wikipedia.org/wiki/Edward_F._Moorehttp://en.wikipedia.org/wiki/Edward_F._Moorehttp://en.wikipedia.org/wiki/Dijkstra's_algorithm#cite_note-1http://en.wikipedia.org/wiki/Dijkstra's_algorithm#cite_note-1http://en.wikipedia.org/wiki/Dijkstra's_algorithm#cite_note-1http://en.wikipedia.org/wiki/Vertex_(graph_theory)http://en.wikipedia.org/wiki/Vertex_(graph_theory)http://en.wikipedia.org/wiki/Vertex_(graph_theory)http://en.wikipedia.org/wiki/Routing_protocolhttp://en.wikipedia.org/wiki/Routing_protocolhttp://en.wikipedia.org/wiki/Routing_protocolhttp://en.wikipedia.org/wiki/IS-IShttp://en.wikipedia.org/wiki/IS-IShttp://en.wikipedia.org/wiki/IS-IShttp://en.wikipedia.org/wiki/OSPFhttp://en.wikipedia.org/wiki/OSPFhttp://en.wikipedia.org/wiki/OSPFhttp://en.wikipedia.org/wiki/File:Dijksta_Anim.gihttp://en.wikipedia.org/wiki/OSPFhttp://en.wikipedia.org/wiki/IS-IShttp://en.wikipedia.org/wiki/Routing_protocolhttp://en.wikipedia.org/wiki/Vertex_(graph_theory)http://en.wikipedia.org/wiki/Dijkstra's_algorithm#cite_note-1http://en.wikipedia.org/wiki/Edward_F._Moorehttp://en.wikipedia.org/wiki/Routinghttp://en.wikipedia.org/wiki/Shortest_path_treehttp://en.wikipedia.org/wiki/Shortest_path_treehttp://en.wikipedia.org/wiki/Edge_(graph_theory)http://en.wikipedia.org/wiki/Graph_(mathematics)http://en.wikipedia.org/wiki/Shortest_path_problemhttp://en.wikipedia.org/wiki/Shortest_path_problemhttp://en.wikipedia.org/wiki/Graph_search_algorithmhttp://en.wikipedia.org/wiki/Dijkstra's_algorithm#cite_note-0http://en.wikipedia.org/wiki/Edsger_Dijkstrahttp://en.wikipedia.org/wiki/Computer_scientist
  • 5/25/2018 Case Study of Various Routing Algorithm

    3/25

    1. Assign to every node a distance value. Set it to zero for our initial node and

    to infinity for all other nodes.

    2. Mark all nodes as unvisited. Set initial node as current.

    3. For current node, consider all its unvisited neighbours and calculate their

    distance (from the initial node). For example, if current node (A) hasdistance of 6, and an edge connecting it with another node (B) is 2, the

    distance to B through A will be 6+2=8. If this distance is less than the

    previously recorded distance (infinity in the beginning, zero for the initial

    node), overwrite the distance.

    4. When we are done considering all neighbours of the current node, mark it

    as visited. A visited node will not be checked ever again; its distance

    recorded now is final and minimal.

    5. Set the unvisited node with the smallest distance (from the initial node) as

    the next "current node" and continue from step 3.

    Description of the algorithm

    Suppose you're marking over the streets on a street map (tracing the street with a

    marker) in a certain order, until you have a route marked in from the starting point

    to the destination. The order is conceptually simple: from all the street intersections

    of the already marked routes, find the closest unmarked intersection - closest to thestarting point (the "greedy" part). It's the whole marked route to the intersection,

    plus the street to the new, unmarked intersection. Mark that street to that

    intersection, draw an arrow with the direction, then repeat. Never mark any twointersections twice. When you get to the destination, follow the arrows backwards.There will be only one path back against the arrows, the shortest one.

  • 5/25/2018 Case Study of Various Routing Algorithm

    4/25

    BELLman ford Algorithms

    DV algorithms are also known as Bellman-Ford routing algorithms and Ford-Fulkerson

    routing algorithms. In these algorithms, every router has a routing table that shows it the

    best route for any destination. A typical graph and routing table for router J is shown

    below.

    Destination Weight Line

    A 8 A

    B 20 A

    C 28 I

    D 20 H

    E 17 I

    F 30 I

    G 18 H

    H 12 H

    I 10 I

    J 0 ---

    K 6 K

    L 15 K

  • 5/25/2018 Case Study of Various Routing Algorithm

    5/25

    A typical network graph and routing table for router J

    As the table shows, if router J wants to get packets to router D, it should send them torouter H. When packets arrive at router H, it checks its own table and decides how tosend the packets to D.

    In DV algorithms, each router has to follow these steps:

    1. It counts the weight of the links directly connected to it and saves the information to itstable.

    2. In a specific period of time, it send its table to its neighbor routers (not to all routers) andreceive the routing table of each of its neighbors.

    3. Based on the information in its neighbors' routing tables, it updates its own.One of the most important problems with DV algorithms is called "count to infinity."

    Let's examine this problem with an example:

    Imagine a network with a graph as shown below. As you see in this graph, there is onlyone link between A and the other parts of the network. Here you can see the graph androuting table of all nodes:

    A B C D

    A 0,- 1,A 2,B 3,C

    B 1,B 0,- 2,C 3,D

    C 2,B 1,C 0,- 1,C

    D 3,B 2,C 1,D 0,-

    Network graph and routing tables

    Now imagine that the link between A and B is cut. At this time, B corrects its table. Aftera specific amount of time, routers exchange their tables, and so B receives C's routingtable. Since C doesn't know what has happened to the link between A and B, it saysthat it has a link to A with the weight of 2 (1 for C to B, and 1 for B to A -- it doesn't knowB has no link to A). B receives this table and thinks there is a separate link between C

  • 5/25/2018 Case Study of Various Routing Algorithm

    6/25

    and A, so it corrects its table and changes infinity to 3 (1 for B to C, and 2 for C to A, asC said). Once again, routers exchange their tables. When C receives B's routing table, itsees that B has changed the weight of its link to A from 1 to 3, so C updates its tableand changes the weight of the link to A to 4 (1 for C to B, and 3 for B to A, as B said).

    This process loops until all nodes find out that the weight of link to A is infinity. Thissituation is shown in the table below. In this way, experts say DV algorithms have aslow convergence rate.

    B C D

    Sum of weight to A after link cut ,A 2,B 3,C

    Sum of weight to B after 1st updating 3,C 2,B 3,C

    Sum of weight to A after 2nd updating 3,C 4,B 3,C

    Sum of weight to A after 3rd updating 5,C 4,B 5,C

    Sum of weight to A after 4th updating 5,C 6,B 5,C

    Sum of weight to A after 5th updating 7,C 6,B 7,C

    Sum of weight to A after nth updating ... ... ...

    The "count to infinity" problem

    One way to solve this problem is for routers to send information only to the neighborsthat are not exclusive links to the destination. For example, in this case, C shouldn'tsendany information to B about A, because B is the only way to A.

  • 5/25/2018 Case Study of Various Routing Algorithm

    7/25

    Q2. To study different type of LAN equipment?

    Ans: LAN equipments

    For making LAN we may require some or the entire following hardware category.

    Along with these are shown the OSI level of these equipments:

    1. Transmission media (Physical level)

    2. Hub (Physical level)

    3. Switches (Data link level)

    4. Routers (Network level)

    5. Gateways (Application level)

    1.Transmission media:

    A transmission medium(plural transmission media) is a material substance(solid,liquid,gas, orplasma) that canpropagateenergywaves. For example, thetransmission medium forsound received by the ears is usually air, but solids and liquidsmay also act as transmission media for sound. The term transmission mediumcanalso refer to a technical device that employs the material substance to transmit or guidewaves. Thus, an optical fiber or a copper cable is referred to as a transmission medium.

    Guided Transmission Media uses a "cabling" system that guides the data signals along

    a specific path. The data signals are bound by the "cabling" system. Guided Media isalso known as Bound Media. Cabling is meant in a generic sense in the previoussentences and is not meant to be interpreted as copper wire cabling only.

    Unguided Transmission Media consists of a means for the data signals to travel butnothing to guide them along a specific path. The data signals are not bound to a cablingmedia and as such are often called Unbound Media.

    2.Hub:

    A common connection point fordevices in anetwork. Hubs are commonly used toconnectsegments of aLAN.A hub contains multipleports.When apacket arrives at oneport, it is copied to the other ports so that all segments of the LAN can see all packets.

    Apassive hubserves simply as a conduit for the data, enabling it to go from one device(or segment) to another. So-called intelligent hubsinclude additional features thatenables an administrator to monitor the traffic passing through the hub and to configureeach port in the hub. Intelligent hubs are also called manageable hubs.

    http://en.wikipedia.org/wiki/Solidhttp://en.wikipedia.org/wiki/Liquidhttp://en.wikipedia.org/wiki/Gashttp://en.wikipedia.org/wiki/Plasma_(physics)http://en.wikipedia.org/wiki/Wave_propagationhttp://en.wikipedia.org/wiki/Energyhttp://en.wikipedia.org/wiki/Wavehttp://en.wikipedia.org/wiki/Soundhttp://www.webopedia.com/TERM/D/device.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/S/segment.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.htmlhttp://www.webopedia.com/TERM/P/port.htmlhttp://www.webopedia.com/TERM/P/packet.htmlhttp://www.webopedia.com/TERM/P/packet.htmlhttp://www.webopedia.com/TERM/P/port.htmlhttp://www.webopedia.com/TERM/L/local_area_network_LAN.htmlhttp://www.webopedia.com/TERM/S/segment.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/D/device.htmlhttp://en.wikipedia.org/wiki/Soundhttp://en.wikipedia.org/wiki/Wavehttp://en.wikipedia.org/wiki/Energyhttp://en.wikipedia.org/wiki/Wave_propagationhttp://en.wikipedia.org/wiki/Plasma_(physics)http://en.wikipedia.org/wiki/Gashttp://en.wikipedia.org/wiki/Liquidhttp://en.wikipedia.org/wiki/Solid
  • 5/25/2018 Case Study of Various Routing Algorithm

    8/25

    3.Switch:

    A network switchor switching hubis a computer networking device that connectsnetwork

    segments.The term commonly refers to a multi-portnetwork bridge that processes and routes

    data at thedata link layer (layer 2) of theOSI model.Switches that additionally process data at

    thenetwork layer (Layer 3) and above are often referred to as Layer 3 switches ormultilayer

    switches.The term network switchdoes not generally encompass unintelligent or passive

    network devices such ashubs andrepeaters.

    The network switch plays an integral part in most modernEthernetlocal area networks (LANs).

    Mid-to-large sized LANs contain a number of linkedmanaged switches.Small office/home

    office (SOHO) applications typically use a single switch, or an all-purposeconverged

    device such as agateway to access small office/homebroadband services such

    asDSL or cable internet. In most of these cases, the end-user device contains arouter and

    components that interface to the particular physical broadband technology. User devices may

    also include a telephone interface forVoIP.

    4. Routers:

    A routeris a device that forwardsdata packets acrosscomputer networks. Routers

    perform the data "traffic directing" functions on theInternet.A router is amicroprocessor-

    controlled device that is connected to two or more data lines from different networks.

    When a data packet comes in on one of the lines, the router reads the address

    information in the packet to determine its ultimate destination. Then, using information in

    itsrouting table,it directs the packet to the next network on its journey. A data packet is

    typically passed from router to router through the networks of the Internet until it gets to

    http://en.wikipedia.org/wiki/Computer_networking_devicehttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Network_hubhttp://en.wikipedia.org/wiki/Repeatershttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Network_switch#Configuration_optionshttp://en.wikipedia.org/wiki/Small_office/home_officehttp://en.wikipedia.org/wiki/Small_office/home_officehttp://en.wikipedia.org/wiki/Technological_convergencehttp://en.wikipedia.org/wiki/Technological_convergencehttp://en.wikipedia.org/wiki/Residential_gatewayhttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Digital_Subscriber_Linehttp://en.wikipedia.org/wiki/Cable_internethttp://en.wikipedia.org/wiki/Routerhttp://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Microprocessorhttp://en.wikipedia.org/wiki/Routing_tablehttp://en.wikipedia.org/wiki/Routing_tablehttp://en.wikipedia.org/wiki/Microprocessorhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/VoIPhttp://en.wikipedia.org/wiki/Routerhttp://en.wikipedia.org/wiki/Cable_internethttp://en.wikipedia.org/wiki/Digital_Subscriber_Linehttp://en.wikipedia.org/wiki/Broadbandhttp://en.wikipedia.org/wiki/Residential_gatewayhttp://en.wikipedia.org/wiki/Technological_convergencehttp://en.wikipedia.org/wiki/Technological_convergencehttp://en.wikipedia.org/wiki/Small_office/home_officehttp://en.wikipedia.org/wiki/Small_office/home_officehttp://en.wikipedia.org/wiki/Network_switch#Configuration_optionshttp://en.wikipedia.org/wiki/Local_area_networkhttp://en.wikipedia.org/wiki/Ethernethttp://en.wikipedia.org/wiki/Repeatershttp://en.wikipedia.org/wiki/Network_hubhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Multilayer_switchhttp://en.wikipedia.org/wiki/Network_layerhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/Data_link_layerhttp://en.wikipedia.org/wiki/Network_bridgehttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Network_segmenthttp://en.wikipedia.org/wiki/Computer_networking_device
  • 5/25/2018 Case Study of Various Routing Algorithm

    9/25

    its destination computer. Routers also perform other tasks such as translating the data

    transmission protocol of the packet to the appropriate protocol of the next network, and

    preventing unauthorized access to a network by the use of afirewall.[1]

    5.Gateways:

    A gateway may contain devices such asprotocol translators,impedance matching devices,

    rate converters,fault isolators, orsignaltranslators as necessary to

    providesysteminteroperability. It also requires the establishment of mutually acceptable

    administrative procedures between both networks.

    A protocol translation/mapping gateway interconnects networks with different network

    protocol technologies by performing the required protocol conversions.

    Gateways, also called protocol converters, can operate at network layer and above. The jobof a gateway is much more complex than that of arouter orswitch

    Q6. To study and configure various type of routersand bridge?

    Ans: A router is a device that forwardsdata packets acrosscomputer networks.Routers perform thedata "traffic directing" functions on theInternet. A router is amicroprocessor-controlled device that is

    connected to two or more data lines from different networks. When a data packet comes in on one of the

    lines, the router reads the address information in the packet to determine its ultimate destination. Then,

    using information in itsrouting table,it directs the packet to the next network on its journey. A data packet

    is typically passed from router to router through the networks of the Internet until it gets to its destination

    computer. Routers also perform other tasks such as translating the data transmission protocol of the

    packet to the appropriate protocol of the next network, and preventing unauthorized access to a network

    by the use of afirewall.[1]

    Types of Routers

    There are several types of routers that you will want to understand. You need to know the

    difference so that you can set up your network or at least so that you can understand what

    the local computer guy tells you to do.

    http://en.wikipedia.org/wiki/Firewall_(computing)http://en.wikipedia.org/wiki/Router#cite_note-0http://en.wikipedia.org/wiki/Router#cite_note-0http://en.wikipedia.org/wiki/Communications_protocolhttp://en.wikipedia.org/wiki/Impedance_matchinghttp://en.wikipedia.org/wiki/Fault_(technology)http://en.wikipedia.org/wiki/Signalling_(telecommunications)http://en.wikipedia.org/wiki/Systemhttp://en.wikipedia.org/wiki/Interoperabilityhttp://en.wikipedia.org/wiki/Routerhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Microprocessorhttp://en.wikipedia.org/wiki/Routing_tablehttp://en.wikipedia.org/wiki/Firewall_(computing)http://en.wikipedia.org/wiki/Router#cite_note-0http://en.wikipedia.org/wiki/Router#cite_note-0http://en.wikipedia.org/wiki/Router#cite_note-0http://en.wikipedia.org/wiki/Router#cite_note-0http://en.wikipedia.org/wiki/Firewall_(computing)http://en.wikipedia.org/wiki/Routing_tablehttp://en.wikipedia.org/wiki/Microprocessorhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Computer_networkhttp://en.wikipedia.org/wiki/Data_packethttp://en.wikipedia.org/wiki/Network_switchhttp://en.wikipedia.org/wiki/Routerhttp://en.wikipedia.org/wiki/Interoperabilityhttp://en.wikipedia.org/wiki/Systemhttp://en.wikipedia.org/wiki/Signalling_(telecommunications)http://en.wikipedia.org/wiki/Fault_(technology)http://en.wikipedia.org/wiki/Impedance_matchinghttp://en.wikipedia.org/wiki/Communications_protocolhttp://en.wikipedia.org/wiki/Router#cite_note-0http://en.wikipedia.org/wiki/Firewall_(computing)
  • 5/25/2018 Case Study of Various Routing Algorithm

    10/25

    1.Broadband Routers

    Broadband routers can be used to do several different types of things. They can be used to

    connect two different computers or to connect two computers to the Internet. They can also

    be used to create a phone connection.

    If you are using Voice over IP (VoIP) technology, then you will need a broadband router to

    connect your Internet to your phone. These are often a special type of modem that will have

    both Ethernet and phone jacks. Although this may seem a little confusing, simply follow the

    instructions that your VoIP provider sends with your broadband router - usually you must

    purchase the router from the company in order to obtain the service.

    2.Wireless Routers

    Wireless routers connect to your modem and create a wireless signal in your home or

    office. So, any computer within range can connect to your wireless router and use yourbroadband Internet for free. The only way to keep anyone from connecting to your system is

    to secure your router.

    A word of warning about wireless routers: Be sure your secure them, or you will be

    susceptible to hackers and identity thieves. In order to secure your router, you simply need

    to come to WhatIsMyIPAddress.com, and get your IP address. Then, you'll type that into

    your web browser and log into your router (the user ID and password will come with your

    router).

    Types of bridges

    There are six main types of bridges:beam bridges,cantilever bridges,arch bridges,suspension

    bridges,cable-stayed bridges.

    http://en.wikipedia.org/wiki/Beam_bridgehttp://en.wikipedia.org/wiki/Cantilever_bridgehttp://en.wikipedia.org/wiki/Arch_bridgehttp://en.wikipedia.org/wiki/Suspension_bridgehttp://en.wikipedia.org/wiki/Suspension_bridgehttp://en.wikipedia.org/wiki/Cable-stayed_bridgehttp://en.wikipedia.org/wiki/Cable-stayed_bridgehttp://en.wikipedia.org/wiki/Suspension_bridgehttp://en.wikipedia.org/wiki/Suspension_bridgehttp://en.wikipedia.org/wiki/Arch_bridgehttp://en.wikipedia.org/wiki/Cantilever_bridgehttp://en.wikipedia.org/wiki/Beam_bridge
  • 5/25/2018 Case Study of Various Routing Algorithm

    11/25

    1.Beam bridges

    Beam bridges are horizontal beams supported at each end by abutments, hence their structural name

    ofsimply supported.When there is more than one span the intermediate supports are known as piers.

    The earliest beam bridges were simple logs that sat across streams and similar simple structures. In

    modern times, beam bridges are large box steel girder bridges. Weight on top of the beam pushes

    straight down on the abutments at either end of the bridge.[11]

    They are made up mostly of wood or metal.

    Beam bridges typically do not exceed 250 feet (76 m) long. The longer the bridge, the weaker. The

    world's longest beam bridge isLake Pontchartrain Causeway in southernLouisiana in the United States,

    at 23.83 miles (38.35 km), with individual spans of 56 feet (17 m).[12]

    2.Cantilever bridges

    Cantilever bridges are built using cantilevershorizontal beams that are supported on only one end. Most

    cantilever bridges use a pair ofcontinuous spans extending from opposite sides of the supporting piers,

    meeting at the center of the obstacle to be crossed. Cantilever bridges are constructed using much the

    same materials & techniques as beam bridges. The difference comes in the action of the forces through

    the bridge. The largest cantilever bridge is the 549-metre (1,801 ft)Quebec Bridge in Quebec, Canada.

    3.Arch bridges

    Arch bridges haveabutments at each end. The earliest known arch bridges were built

    by the Greeks and include theArkadiko Bridge.The weight of the bridge is thrust into

    theabutments at either side.Dubai in theUnited Arab Emiratesis currently building

    theSheikh Rashid bin Saeed Crossing which is scheduled for completion in 2012. When completed, it will

    be the largest arch bridge in the world.[13]

    4.Suspension bridges

    Suspension bridges are suspended from cables. The earliest suspension bridges were made of ropes or

    vines covered with pieces of bamboo. In modern bridges, the cables hang from towers that are attached

    to caissons or cofferdams. The caissons or cofferdams are implanted deep into the floor of a lake or river.

    The longest suspension bridge in the world is the 12,826 feet (3,909 m)Akashi Kaikyo Bridge in

    Japan.[14]

    Seesimple suspension bridge,stressed ribbon bridge,underspanned suspension

    bridge,suspended-deck suspension bridge,andself-anchored suspension bridge.

    http://en.wikipedia.org/wiki/Beam_bridgehttp://en.wikipedia.org/wiki/Simply_supportedhttp://en.wikipedia.org/wiki/Simply_supportedhttp://en.wikipedia.org/wiki/Simply_supportedhttp://en.wikipedia.org/wiki/Bridge_pierhttp://en.wikipedia.org/wiki/Bridge#cite_note-beambridge-10http://en.wikipedia.org/wiki/Bridge#cite_note-beambridge-10http://en.wikipedia.org/wiki/Bridge#cite_note-beambridge-10http://en.wikipedia.org/wiki/Lake_Pontchartrain_Causewayhttp://en.wikipedia.org/wiki/Louisianahttp://en.wikipedia.org/wiki/Bridge#cite_note-11http://en.wikipedia.org/wiki/Bridge#cite_note-11http://en.wikipedia.org/wiki/Bridge#cite_note-11http://en.wikipedia.org/wiki/Cantilever_bridgehttp://en.wikipedia.org/wiki/Continuous_spanhttp://en.wikipedia.org/wiki/Quebec_Bridgehttp://en.wikipedia.org/wiki/Arch_bridgehttp://en.wikipedia.org/wiki/Abutmentshttp://en.wikipedia.org/wiki/Arkadiko_Bridgehttp://en.wikipedia.org/wiki/Abutmentshttp://en.wikipedia.org/wiki/Dubaihttp://en.wikipedia.org/wiki/United_Arab_Emirateshttp://en.wikipedia.org/wiki/United_Arab_Emirateshttp://en.wikipedia.org/wiki/Sheikh_Rashid_bin_Saeed_Crossinghttp://en.wikipedia.org/wiki/Bridge#cite_note-dubai-12http://en.wikipedia.org/wiki/Bridge#cite_note-dubai-12http://en.wikipedia.org/wiki/Bridge#cite_note-dubai-12http://en.wikipedia.org/wiki/Suspension_bridgehttp://en.wikipedia.org/wiki/Akashi_Kaikyo_Bridgehttp://en.wikipedia.org/wiki/Bridge#cite_note-suspension-13http://en.wikipedia.org/wiki/Bridge#cite_note-suspension-13http://en.wikipedia.org/wiki/Bridge#cite_note-suspension-13http://en.wikipedia.org/wiki/Simple_suspension_bridgehttp://en.wikipedia.org/wiki/Stressed_ribbon_bridgehttp://en.wikipedia.org/wiki/Underspanned_suspension_bridgehttp://en.wikipedia.org/wiki/Underspanned_suspension_bridgehttp://en.wikipedia.org/wiki/Suspended-deck_suspension_bridgehttp://en.wikipedia.org/wiki/Self-anchored_suspension_bridgehttp://en.wikipedia.org/wiki/Self-anchored_suspension_bridgehttp://en.wikipedia.org/wiki/Suspended-deck_suspension_bridgehttp://en.wikipedia.org/wiki/Underspanned_suspension_bridgehttp://en.wikipedia.org/wiki/Underspanned_suspension_bridgehttp://en.wikipedia.org/wiki/Stressed_ribbon_bridgehttp://en.wikipedia.org/wiki/Simple_suspension_bridgehttp://en.wikipedia.org/wiki/Bridge#cite_note-suspension-13http://en.wikipedia.org/wiki/Akashi_Kaikyo_Bridgehttp://en.wikipedia.org/wiki/Suspension_bridgehttp://en.wikipedia.org/wiki/Bridge#cite_note-dubai-12http://en.wikipedia.org/wiki/Sheikh_Rashid_bin_Saeed_Crossinghttp://en.wikipedia.org/wiki/United_Arab_Emirateshttp://en.wikipedia.org/wiki/Dubaihttp://en.wikipedia.org/wiki/Abutmentshttp://en.wikipedia.org/wiki/Arkadiko_Bridgehttp://en.wikipedia.org/wiki/Abutmentshttp://en.wikipedia.org/wiki/Arch_bridgehttp://en.wikipedia.org/wiki/Quebec_Bridgehttp://en.wikipedia.org/wiki/Continuous_spanhttp://en.wikipedia.org/wiki/Cantilever_bridgehttp://en.wikipedia.org/wiki/Bridge#cite_note-11http://en.wikipedia.org/wiki/Louisianahttp://en.wikipedia.org/wiki/Lake_Pontchartrain_Causewayhttp://en.wikipedia.org/wiki/Bridge#cite_note-beambridge-10http://en.wikipedia.org/wiki/Bridge_pierhttp://en.wikipedia.org/wiki/Simply_supportedhttp://en.wikipedia.org/wiki/Beam_bridge
  • 5/25/2018 Case Study of Various Routing Algorithm

    12/25

    5.Cable-stayed bridges

    Cable-stayed bridges,like suspension bridges, are held up by cables. However, in a cable-stayed bridge,

    less cable is required and the towers holding the cables are proportionately shorter.

    [15]

    The first knowncable-stayed bridge was designed in 1784 by C.T. Loescher.

    [16]The longest cable-stayed bridge is

    theSutong Bridge over the Yangtze River in China.

    Q7:implement various routing protocol algorithms?

    Distance vector routing algo:#include

    #include

    int graph[12][12];

    int e[12][12];

    int ad[12];

    int no,id,adc,small,chosen;

    char nodes[12]={a b c d e f g h i j k l};

    int main()

    {

    int i,j,k,ch1,ch2=0;

    adc=0;

    printf("enter the no nodes");

    scanf("%d",&no);

    printf("enter the value for adjacency matrix");

    http://en.wikipedia.org/wiki/Cable-stayed_bridgehttp://en.wikipedia.org/wiki/Bridge#cite_note-cable-14http://en.wikipedia.org/wiki/Bridge#cite_note-cable-14http://en.wikipedia.org/wiki/Bridge#cite_note-cable-14http://en.wikipedia.org/wiki/Bridge#cite_note-loescher-15http://en.wikipedia.org/wiki/Bridge#cite_note-loescher-15http://en.wikipedia.org/wiki/Bridge#cite_note-loescher-15http://en.wikipedia.org/wiki/Sutong_Bridgehttp://en.wikipedia.org/wiki/Sutong_Bridgehttp://en.wikipedia.org/wiki/Bridge#cite_note-loescher-15http://en.wikipedia.org/wiki/Bridge#cite_note-cable-14http://en.wikipedia.org/wiki/Cable-stayed_bridge
  • 5/25/2018 Case Study of Various Routing Algorithm

    13/25

    for(i=0;i

  • 5/25/2018 Case Study of Various Routing Algorithm

    14/25

    adc++;

    printf("%c",nodes[i]);

    }

    }

    for(i=0;i

  • 5/25/2018 Case Study of Various Routing Algorithm

    15/25

    while(ch2==1);

    return 0;#include#include

    int graph[12][12];

    int e[12][12];

    int ad[12];

    int no,id,adc,small,chosen;

    char nodes[12]={a b c d e f g h i j k l};

    int main()

    {

    int i,j,k,ch1,ch2=0;

    adc=0;

    printf("enter the no nodes");scanf("%d",&no);

    printf("enter the value for adjacency matrix");

    for(i=0;i

  • 5/25/2018 Case Study of Various Routing Algorithm

    16/25

    printf("2.estimated table\n ");

    scanf("%d",&ch1);

    switch(ch1)

    {

    case 1:

    printf("\n which node should routing table be built(1-a)(2-b)...");

    scanf("%d",&id);

    id--;

    adc=0;

    printf("neighbours for particular node");

    for(i=0;i

  • 5/25/2018 Case Study of Various Routing Algorithm

    17/25

    } else

    e[id][i]=0;

    }

    break;

    case 2:

    printf("\n");

    for(i=0;i

  • 5/25/2018 Case Study of Various Routing Algorithm

    18/25

    for(i=0;i

  • 5/25/2018 Case Study of Various Routing Algorithm

    19/25

    int e;/* the number of edges */

    Edge edges[1024];/* large enough for n

  • 5/25/2018 Case Study of Various Routing Algorithm

    20/25

    int i,j;

    int w;

    FILE *fin =fopen("dist.txt","r");

    fscanf(fin,"%d",&n);

    e =0;

    for(i =0;i

  • 5/25/2018 Case Study of Various Routing Algorithm

    21/25

    Q8. Study and implemantation of VOI P concept?

    Ans: Voice over Internet Protocol(Voice over IP, VoIP) is one of a family of internet

    technologies,communication protocols, and transmission technologies for delivery ofvoice

    communications andmultimedia sessions overInternet Protocol (IP) networks, such as theInternet.

    Other terms frequently encountered and often used synonymously with VoIP are IP telephony, Internet

    telephony, voice over broadband(VoBB),broadband telephony, and broadband phone.

    Internet telephony refers to communications servicesvoice,fax,SMS, and/or voice-messaging

    applicationsthat are transported via the Internet, rather than thepublic switched telephone

    network (PSTN). The steps involved in originating a VoIP telephone call are signaling and media channel

    setup, digitization of the analog voice signal, encoding, packetization, and transmission as Internet

    Protocol (IP) packets over a packet-switched network. On the receiving side, similar steps (usually in the

    reverse order) such as reception of the IP packets, decoding of the packets and digital-to-analog

    conversion reproduce the original voice stream.[1]

    VoIP systems employ session control protocols to control the set-up and tear-down of calls as well

    asaudio codecs which encode speech allowing transmission over an IP network asdigital audio via

    anaudio stream.The codec used is varied between different implementations of VoIP (and often a range

    of co

    decs are used); some implementations rely onnarrowband andcompressed speech, while others

    supporthigh fidelitystereo codecs.

    http://en.wikipedia.org/wiki/Communication_protocolhttp://en.wikipedia.org/wiki/Voice_communicationhttp://en.wikipedia.org/wiki/Voice_communicationhttp://en.wikipedia.org/wiki/Multimediahttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Faxhttp://en.wikipedia.org/wiki/SMShttp://en.wikipedia.org/wiki/Public_switched_telephone_networkhttp://en.wikipedia.org/wiki/Public_switched_telephone_networkhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Voice_over_IP#cite_note-0http://en.wikipedia.org/wiki/Voice_over_IP#cite_note-0http://en.wikipedia.org/wiki/Voice_over_IP#cite_note-0http://en.wikipedia.org/wiki/Audio_codechttp://en.wikipedia.org/wiki/Digital_audiohttp://en.wikipedia.org/wiki/Streaming_mediahttp://en.wikipedia.org/wiki/Narrowbandhttp://en.wikipedia.org/wiki/Speech_codinghttp://en.wikipedia.org/wiki/High_fidelityhttp://en.wikipedia.org/wiki/Stereophonic_soundhttp://en.wikipedia.org/wiki/Stereophonic_soundhttp://en.wikipedia.org/wiki/High_fidelityhttp://en.wikipedia.org/wiki/Speech_codinghttp://en.wikipedia.org/wiki/Narrowbandhttp://en.wikipedia.org/wiki/Streaming_mediahttp://en.wikipedia.org/wiki/Digital_audiohttp://en.wikipedia.org/wiki/Audio_codechttp://en.wikipedia.org/wiki/Voice_over_IP#cite_note-0http://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Public_switched_telephone_networkhttp://en.wikipedia.org/wiki/Public_switched_telephone_networkhttp://en.wikipedia.org/wiki/SMShttp://en.wikipedia.org/wiki/Faxhttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internet_Protocolhttp://en.wikipedia.org/wiki/Multimediahttp://en.wikipedia.org/wiki/Voice_communicationhttp://en.wikipedia.org/wiki/Voice_communicationhttp://en.wikipedia.org/wiki/Communication_protocol
  • 5/25/2018 Case Study of Various Routing Algorithm

    22/25

    There are three types of VoIP tools that are commonly used; IP Phones,Software VoIP and Mobile and

    Integrated VoIP. The IP Phones are the most institutionally established but still the least obvious of the

    VoIP tools. Of all the software VoIP tools that exist,Skype is probably the most easily identifiable. The

    use of software VoIP has increased during the global recession as many persons, looking for ways to cut

    costs have turned to these tools for free or inexpensive calling orvideo conferencing applications.

    Software VoIP can be further broken down into three classes or subcategories; Web Calling, Voice and

    Video Instant Messaging and Web Conferencing. Mobile and Integrated VoIP is just another example of

    the adaptability of VoIP. VoIP is available on many smartphones and internet devices so even the users

    of portable devices that are not phones can still make calls or send SMS text messages over 3G or

    WIFI.[2]

    H.323

    IP Multimedia Subsystem (IMS)

    Media Gateway Control Protocol (MGCP)

    Session Initiation Protocol (SIP)

    Real-time Transport Protocol (RTP)

    Session Description Protocol (SDP)

    The H.323 protocol was one of the first VoIP protocols that found

    widespread implementation for long-distance traffic, as well as local area

    network services. However, since the development of newer, less

    complex protocols, such as MGCP and SIP, H.323 deployments are

    increasingly limited to carrying existing long-haul network traffic. In

    particular, the Session Initiation Protocol (SIP) has gained widespread

    VoIP market penetration.

    A notable proprietary implementation is theSkype protocol, which is in

    part based on the principles ofPeer-to-Peer (P2P) networking.

    http://en.wikipedia.org/wiki/Skypehttp://en.wikipedia.org/wiki/Video_conferencinghttp://en.wikipedia.org/wiki/Voice_over_IP#cite_note-EBSCOhost-1http://en.wikipedia.org/wiki/Voice_over_IP#cite_note-EBSCOhost-1http://en.wikipedia.org/wiki/Voice_over_IP#cite_note-EBSCOhost-1http://en.wikipedia.org/wiki/H.323http://en.wikipedia.org/wiki/IP_Multimedia_Subsystemhttp://en.wikipedia.org/wiki/Media_Gateway_Control_Protocol_(MGCP)http://en.wikipedia.org/wiki/Session_Initiation_Protocolhttp://en.wikipedia.org/wiki/Real-time_Transport_Protocolhttp://en.wikipedia.org/wiki/Session_Description_Protocolhttp://en.wikipedia.org/wiki/Skype_protocolhttp://en.wikipedia.org/wiki/Peer-to-Peerhttp://en.wikipedia.org/wiki/Peer-to-Peerhttp://en.wikipedia.org/wiki/Skype_protocolhttp://en.wikipedia.org/wiki/Session_Description_Protocolhttp://en.wikipedia.org/wiki/Real-time_Transport_Protocolhttp://en.wikipedia.org/wiki/Session_Initiation_Protocolhttp://en.wikipedia.org/wiki/Media_Gateway_Control_Protocol_(MGCP)http://en.wikipedia.org/wiki/IP_Multimedia_Subsystemhttp://en.wikipedia.org/wiki/H.323http://en.wikipedia.org/wiki/Voice_over_IP#cite_note-EBSCOhost-1http://en.wikipedia.org/wiki/Video_conferencinghttp://en.wikipedia.org/wiki/Skype
  • 5/25/2018 Case Study of Various Routing Algorithm

    23/25

    Q10 Write down the 2 cryptography algo and comparison

    b/w them?opAns: RSA:

    #include< stdio.h>

    #include< conio.h>

    int phi,M,n,e,d,C,FLAG;

    int check()

    {

    int i;

    for(i=3;e%i==0 && phi%i==0;i+2)

    {

    FLAG = 1;

    return;

    }

    FLAG = 0;

    }

    void encrypt()

    {

    int i;

    C = 1;

    for(i=0;i< e;i++)C=C*M%n;

    C = C%n;

    printf("\n\tEncrypted keyword : %d",C);

    }

    void decrypt()

    {

    int i;

    M = 1;

    for(i=0;i< d;i++)

    M=M*C%n;

    M = M%n;

    printf("\n\tDecrypted keyword : %d",M);

    }

    void main()

  • 5/25/2018 Case Study of Various Routing Algorithm

    24/25

    {

    int p,q,s;

    clrscr();

    printf("Enter Two Relatively Prime Numbers\t: ");

    scanf("%d%d",&p;,&q;);

    n = p*q;

    phi=(p-1)*(q-1);

    printf("\n\tF(n)\t= %d",phi);

    do

    {

    printf("\n\nEnter e\t: ");

    scanf("%d",&e;);

    check();

    }while(FLAG==1);

    d = 1;do

    {

    s = (d*e)%phi;

    d++;

    }while(s!=1);

    d = d-1;

    printf("\n\tPublic Key\t: d,%d}",e,n);

    printf("\n\tPrivate Key\t: d,%d}",d,n);

    printf("\n\nEnter The Plain Text\t: ");

    scanf("%d",&M;);

    encrypt();

    printf("\n\nEnter the Cipher text\t: ");

    scanf("%d",&C;);

    decrypt();

    getch();

    }

  • 5/25/2018 Case Study of Various Routing Algorithm

    25/25