SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
SELF REPAIRING TREE TOPOLOGY
ENABLING CONTENT BASED ROUTING
    IN LOCAL AREA NETWORK
INTRODUCTION:

                  Content-based routing(CBR) differs from classical routing in that
messages are addressed based on their content instead of their destination. In CBR the
sender simply injects the message in the network, which determines how to route it
according to the nodes’ interests.

                  This ability is useful in many application scenarios. For instance, in a
stock quote application data procedures can publish stock updates on a CBR network,
which routes them only towards the consumers who subscribed to receive such updates.
Similarly, in a data sharing application repositories can advertise the attributes involved
in the query.

                  Most systems connect all the brokers(the CBR application-level
routers) in a single tree-shaped network. This broker tree is exploited to forward
messages.
Usually, these are not flooded to the entire tree, but routed towards
the interested components according to the message content and the subscriptions
stored at tree nodes.

                  CBR fosters a form of implicit communication that breaks the
coupling between senders and receivers. Senders no longer need to determine the
address of communication parties. Similarly, receivers do not know who is the sender
of a message, unless this information is somehow encoded in the message itself.

                  The sharp decoupling induced by this form of communication enables
one to easily add,remove, or change components at run-time with little impact on the
overall architecture.

                  Unfortunately, the advantages provided by this interaction model are
not supported by the state of the art of implemented systems. Indeed, the majority of
available CBR systems address scalability and ease of implementation by realizing the
broker tree as an overlay network, whose topology is assumed to be stable.
A requirement that clashes with the reality of dynamic scenarios like
LAN. Therefore, this situation leaves the potential of CBR largely unexploited precisely
in the application scenarios where it would make a huge difference.
OBJECTIVE:

               Content based routing (CBR) provides a powerful and flexible
foundation for distributed applications. Here we present LAN, a protocol to organize
the nodes of a LAN in a tree-shaped network able to


                 Self-Repair to tolerate the frequent topological reconfigurations
                typical of LAN;
                 Achieve this goal through repair strategies that minimize the
                changes that may impact the CBR layer exploiting the tree. LAN is
                implemented and publicly available.
              Here we report about its performance in simulated scenarios as well
               as in
               real-world experiments. The results confirm that its characteristics
              enable reliable and efficient CBR on LAN.
EXISTING SYSTEM:

                           Unfortunately, the advantages provided by this interaction
model are not supported by the state of the art of implemented systems.

                           Indeed, the majority of available CBR systems address
scalability and ease of implementation by realizing the broker tree as an overlay
network, whose topology is assumed to be stable.

                           A requirement that clashes with the reality of dynamic
scenarios like LAN.

                           Therefore, this situation leaves the potential of CBR largely
unexploited precisely in the application scenarios where it would make a huge
difference.
PROPOSED SYSTEM:
                              This paper overcomes the limitation above by achieving the
following goal :

                   defining a protocol to organize the nodes of a mobile LAN network in
                   a single, self-repairing tree that efficiently supports content-based
                   routing.

                              The goal of supporting CBR explains the rationale behind
the choice of a tree topology. As already mentioned, most of currently available CBR
protocols adopt this topology for interconnecting brokers, but assume that the tree does
not change.

                              Therefore, our self-repairing tree enables the reuse of
mainstream CBR protocols in the dynamic scenario characterizing LANs, by leveraging
off the consistent body of results related to tree-based CBR.
At the same time, providing a tree able to self-repair upon
changes in the physical topology of a LAN is only our minimal target.

                           Our ultimate goal is to design a protocol whose
characteristics simplify the operations of the CBR layer operating on it.
FEATURES OF THE PROJECT:

           * The feature of the project is based on tree topology.

           * It repairs the nodes by itself.
MODULES:


           Loading Screen

           Login Screen

           Route Request

           Route Reply

           Linkage breakage

           Partition Merging
MODULE DESCRIPTION
LOADING SCREEN:

               * This module is, just load your project for a certain times. It have
your title of the project and it loads for a time.

LOGIN SCREEN:
               * This module is used for enter the user and password. It have the
Username and Password.

               * We have to enter the username and password.

               * Then select the login button ,If it is right, then it will go to the next
screen.

               * Else it will send the message of enter the correct username and
password.
ROUTE REQUEST:

               * In this module we have to send the file through the path.

               * First we have to select the file using open dialog box.

               * Using open dialog box we will choose the file, which we are going
to send.

               * Here we can open a file from any drive, directory, and folder.

               * After choosing the file, it will display the file.

               * After that we have to send the file to the next node.

               * When the next node is in active then it will send the content or file
to the next node. If it is failed then it will send the content or file to the next node.
ROUTE REPLY:

               * This Module is used to response for the request which is made by
the route.

               * When the node is send the content or file to the next node. If it is
active then it will receive the content or file.

               * When the node is failed then it will send a message that node is not
active to the user.

               * It will also send the message when the sub nodes are failed. If it is
in active then it receives the content or file.
LINKAGE BREAKAGE:

                * In this module, when your sending the file to the next node. When
 the next node is in active then the data to be received by the next node.



                * When the failure occurs in the next node. At that time the sub node
 of the next node will be exploit.

PARTITION MERGING:
                * In this module, when your sending the file to the next node. When
 the next node is not active. Then the sub node receives the file by another node.
DATA FLOW DIAGRAM:

                     Process The              Choose The                Choose The
Enter the Username   Input Valid              File or Data              File or Data
& Password           Or Not                   to be                     to be
                                              transferred               selected




                                              Check the                 The
                     It won’t         Yes     content of        Yes     Selected
                     save                     the file in the           File to be
                                              next node                 send to the
                                                                        next node

                                                       No                       No

                                   It Receives The               The sub node of the node
                                   Content and save the          will get the file and if we
                                   file                          want save it or forward to
                                                                 the sub node
ACTIVITY DIAGRAM:

                                         Selecting The File




                                        Sending to the next
                                              node



                                     Check It is activate or not


                               Yes                                 No


        Check the content of the file          Sub Node Receive the content and forward it
             in the next node                              to the sub nodes

                         No              Yes
 Save the receiving
 file in the next node


                                                                   Sub Node Receive the content and save it
                  Sub Node Receive the content and save it
                                                                     and then forward it to the sub nodes
                    and then forward it to the sub nodes
ARCHITECTURE OF SELF REPARING
      TREE TOPOLOGY:
                                                        S1 A

       S1 H                  L
                                                          F

                                        S1 E
               S1 A

                             H             A


       G




S1 H                                                E          S1 self
                             S1 G

                      B

                                    D
                                               S1   B



           C
                      S1 B
SCREEN SHOTS
SYSTEM REQUIREMENTS:

Software:

• Client               : Windows Client
• Software             : JAVA

Hardware:

•   Memory            : 128MB RAM or above
•   Secondary Storage : 40 GB HDD or above
•   FLOPPY DISK       : .44 MB or above
•   Display unit      : Color Monitor and other suitable accessories
•   Processor         : PIII or above
SOFTWARE FEATURES:
Simple:

                  Java was designed to be easy for the professional programmer to
learn and use effectively. Java has another attribute that makes it easy to learn. It makes
an effort not to have surprising features.

Object-Oriented:

                  Although influenced by its predecessors, Java was not designed to be
source-code compatible with any other language. This allowed the Java team the
freedom to design with a blank slate

Robust:

                  The multiplatformed environment of the web pages extraordinary
demands on a program, because the program must execute reliably in a variety of
systems. Thus the ability to create robust programs was given a high priority in the
design of Java.
Multithreaded:

                  Java was designed to meet the real-world requirement of creating
interactive, networked programs. To accomplish this, Java supports multithreaded
programming, which allows you to write programs that do many things simultaneously.

Architectural-Neutral:

                  A central issue for the designers was that of code longevity and
portability. One of the main problems facing programmers is that no guarantee exists
that if you write a program today, it will run tomorrow-even on the same machine.

Interpreted and High Performance:

                  Java enables the creation of cross-platform programs by compiling
into an intermediate representation called java bytecode. This code can be interpreted
on any system that provides a Java Virtual Machine.
Distributed:
                  Java is designed for the distributed environment of the Internet,
because it handles TCP/IP protocols. In fact, accessing a resource using a URL is not
much different from accessing a file. The original version of Java(Oak) included
features for intra-address-space messaging..For example:RMI

Dynamic:

                  Java programs carry with them substantial amounts of run-time type
information that is used to verify and resolve accesses to objects at run time. This
makes it possible to dynamically link code in a safe and expedient manner.
BIBLIOGRAPHY:
                 * T.Camp, J.Boleng, and V.Davies. A survey of mobility models for
ad hoc network research.

                 * A.Bulut, A. K.Singh, and R. Vitenberg. Distributed data streams
indexing using content-based routing paradigm.
THANK YOU

Mais conteúdo relacionado

Mais procurados

Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...IBM India Smarter Computing
 
Energy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingEnergy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingVideoguy
 
Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNgandhimb
 
Wireless network basics
Wireless network basicsWireless network basics
Wireless network basicsKumar
 
(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...
(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...
(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...Naoki Shibata
 
Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)Johnson Liu
 
PCE, OpenFlow, & the Centralized Control Plane
PCE, OpenFlow, & the Centralized Control PlanePCE, OpenFlow, & the Centralized Control Plane
PCE, OpenFlow, & the Centralized Control PlaneMetaswitch NTD
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer NetworkingRuchita Tomar
 
Optimal Streaming Protocol for VoD Using Clients' Residual Bandwidth
Optimal Streaming Protocol for VoD Using Clients' Residual BandwidthOptimal Streaming Protocol for VoD Using Clients' Residual Bandwidth
Optimal Streaming Protocol for VoD Using Clients' Residual BandwidthIDES Editor
 
Apresentação feita em 2005 no Annual Simulation Symposium.
Apresentação feita em 2005 no Annual Simulation Symposium.Apresentação feita em 2005 no Annual Simulation Symposium.
Apresentação feita em 2005 no Annual Simulation Symposium.Antonio Marcos Alberti
 

Mais procurados (19)

Lec7
Lec7Lec7
Lec7
 
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
 
Ijariie1150
Ijariie1150Ijariie1150
Ijariie1150
 
Energy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingEnergy-Aware Wireless Video Streaming
Energy-Aware Wireless Video Streaming
 
Lecture04 H
Lecture04 HLecture04 H
Lecture04 H
 
Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPN
 
Wireless network basics
Wireless network basicsWireless network basics
Wireless network basics
 
(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...
(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...
(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...
 
Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)
 
MPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) TechnologyMPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) Technology
 
10 fn s42
10 fn s4210 fn s42
10 fn s42
 
4 network.key
4 network.key4 network.key
4 network.key
 
Exchange 2013 ABC's: Architecture, Best Practices and Client Access
Exchange 2013 ABC's: Architecture, Best Practices and Client AccessExchange 2013 ABC's: Architecture, Best Practices and Client Access
Exchange 2013 ABC's: Architecture, Best Practices and Client Access
 
PCE, OpenFlow, & the Centralized Control Plane
PCE, OpenFlow, & the Centralized Control PlanePCE, OpenFlow, & the Centralized Control Plane
PCE, OpenFlow, & the Centralized Control Plane
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer Networking
 
MPLS
MPLSMPLS
MPLS
 
Dsohowto
DsohowtoDsohowto
Dsohowto
 
Optimal Streaming Protocol for VoD Using Clients' Residual Bandwidth
Optimal Streaming Protocol for VoD Using Clients' Residual BandwidthOptimal Streaming Protocol for VoD Using Clients' Residual Bandwidth
Optimal Streaming Protocol for VoD Using Clients' Residual Bandwidth
 
Apresentação feita em 2005 no Annual Simulation Symposium.
Apresentação feita em 2005 no Annual Simulation Symposium.Apresentação feita em 2005 no Annual Simulation Symposium.
Apresentação feita em 2005 no Annual Simulation Symposium.
 

Destaque

Introduction to Wide Area Network Routing
Introduction to Wide Area Network RoutingIntroduction to Wide Area Network Routing
Introduction to Wide Area Network RoutingNetwork Utility Force
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies3rdyeara
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
What is the main purpose of ospf
What is the main purpose of ospfWhat is the main purpose of ospf
What is the main purpose of ospfSwati Sharma
 

Destaque (7)

Introduction to Wide Area Network Routing
Introduction to Wide Area Network RoutingIntroduction to Wide Area Network Routing
Introduction to Wide Area Network Routing
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
TREE TOPOLOGY
TREE TOPOLOGY TREE TOPOLOGY
TREE TOPOLOGY
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
What is the main purpose of ospf
What is the main purpose of ospfWhat is the main purpose of ospf
What is the main purpose of ospf
 

Semelhante a Self Repairing Tree Topology Enabling Content Based Routing In Local Area Network

Mixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docx
Mixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docxMixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docx
Mixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docxannandleola
 
Understanding tcp=ip
Understanding tcp=ipUnderstanding tcp=ip
Understanding tcp=ipIlaya Raja
 
Nat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleNat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleLuis Nagasako
 
How to write shared libraries!
How to write shared libraries!How to write shared libraries!
How to write shared libraries!Stanley Ho
 
Chapter 4
Chapter 4Chapter 4
Chapter 4asguna
 
Axis2 architecture and implementation
Axis2 architecture and implementationAxis2 architecture and implementation
Axis2 architecture and implementationSreeni I
 
OOPSLA02 BehavioralSemantics.ppt
OOPSLA02 BehavioralSemantics.pptOOPSLA02 BehavioralSemantics.ppt
OOPSLA02 BehavioralSemantics.pptPtidej Team
 
Pivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSXPivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSXPooja Patel
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
UNIT V DIS.pptx
UNIT V DIS.pptxUNIT V DIS.pptx
UNIT V DIS.pptxSamPrem3
 
640 802-study-guide-sample
640 802-study-guide-sample640 802-study-guide-sample
640 802-study-guide-samplerickybcool
 

Semelhante a Self Repairing Tree Topology Enabling Content Based Routing In Local Area Network (20)

Mixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docx
Mixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docxMixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docx
Mixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docx
 
[OSS Upstream Training] 5 open stack liberty_recap
[OSS Upstream Training] 5 open stack liberty_recap[OSS Upstream Training] 5 open stack liberty_recap
[OSS Upstream Training] 5 open stack liberty_recap
 
open stackliberty_recap_by_VietOpenStack
open stackliberty_recap_by_VietOpenStackopen stackliberty_recap_by_VietOpenStack
open stackliberty_recap_by_VietOpenStack
 
005281271.pdf
005281271.pdf005281271.pdf
005281271.pdf
 
Understanding tcp=ip
Understanding tcp=ipUnderstanding tcp=ip
Understanding tcp=ip
 
Nat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleNat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_module
 
How to write shared libraries!
How to write shared libraries!How to write shared libraries!
How to write shared libraries!
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
 
Network layers
Network layersNetwork layers
Network layers
 
security in neo4j
security in neo4jsecurity in neo4j
security in neo4j
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Axis2 architecture and implementation
Axis2 architecture and implementationAxis2 architecture and implementation
Axis2 architecture and implementation
 
OOPSLA02 BehavioralSemantics.ppt
OOPSLA02 BehavioralSemantics.pptOOPSLA02 BehavioralSemantics.ppt
OOPSLA02 BehavioralSemantics.ppt
 
Pivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSXPivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSX
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 
T04124
T04124T04124
T04124
 
UNIT V DIS.pptx
UNIT V DIS.pptxUNIT V DIS.pptx
UNIT V DIS.pptx
 
640 802-study-guide-sample
640 802-study-guide-sample640 802-study-guide-sample
640 802-study-guide-sample
 
Subversion
SubversionSubversion
Subversion
 

Mais de ncct

Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological SignalsBiomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological Signalsncct
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Cockpit White Box
Cockpit White BoxCockpit White Box
Cockpit White Boxncct
 
Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspectorncct
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...ncct
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detectorncct
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protectionncct
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammerncct
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projectsncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects Bncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009ncct
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...ncct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S Pncct
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C Tncct
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projectsncct
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computingncct
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projectsncct
 

Mais de ncct (20)

Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological SignalsBiomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Cockpit White Box
Cockpit White BoxCockpit White Box
Cockpit White Box
 
Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspector
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Self Repairing Tree Topology Enabling Content Based Routing In Local Area Network

  • 1. SELF REPAIRING TREE TOPOLOGY ENABLING CONTENT BASED ROUTING IN LOCAL AREA NETWORK
  • 2. INTRODUCTION: Content-based routing(CBR) differs from classical routing in that messages are addressed based on their content instead of their destination. In CBR the sender simply injects the message in the network, which determines how to route it according to the nodes’ interests. This ability is useful in many application scenarios. For instance, in a stock quote application data procedures can publish stock updates on a CBR network, which routes them only towards the consumers who subscribed to receive such updates. Similarly, in a data sharing application repositories can advertise the attributes involved in the query. Most systems connect all the brokers(the CBR application-level routers) in a single tree-shaped network. This broker tree is exploited to forward messages.
  • 3. Usually, these are not flooded to the entire tree, but routed towards the interested components according to the message content and the subscriptions stored at tree nodes. CBR fosters a form of implicit communication that breaks the coupling between senders and receivers. Senders no longer need to determine the address of communication parties. Similarly, receivers do not know who is the sender of a message, unless this information is somehow encoded in the message itself. The sharp decoupling induced by this form of communication enables one to easily add,remove, or change components at run-time with little impact on the overall architecture. Unfortunately, the advantages provided by this interaction model are not supported by the state of the art of implemented systems. Indeed, the majority of available CBR systems address scalability and ease of implementation by realizing the broker tree as an overlay network, whose topology is assumed to be stable.
  • 4. A requirement that clashes with the reality of dynamic scenarios like LAN. Therefore, this situation leaves the potential of CBR largely unexploited precisely in the application scenarios where it would make a huge difference.
  • 5. OBJECTIVE: Content based routing (CBR) provides a powerful and flexible foundation for distributed applications. Here we present LAN, a protocol to organize the nodes of a LAN in a tree-shaped network able to Self-Repair to tolerate the frequent topological reconfigurations typical of LAN; Achieve this goal through repair strategies that minimize the changes that may impact the CBR layer exploiting the tree. LAN is implemented and publicly available. Here we report about its performance in simulated scenarios as well as in real-world experiments. The results confirm that its characteristics enable reliable and efficient CBR on LAN.
  • 6. EXISTING SYSTEM: Unfortunately, the advantages provided by this interaction model are not supported by the state of the art of implemented systems. Indeed, the majority of available CBR systems address scalability and ease of implementation by realizing the broker tree as an overlay network, whose topology is assumed to be stable. A requirement that clashes with the reality of dynamic scenarios like LAN. Therefore, this situation leaves the potential of CBR largely unexploited precisely in the application scenarios where it would make a huge difference.
  • 7. PROPOSED SYSTEM: This paper overcomes the limitation above by achieving the following goal : defining a protocol to organize the nodes of a mobile LAN network in a single, self-repairing tree that efficiently supports content-based routing. The goal of supporting CBR explains the rationale behind the choice of a tree topology. As already mentioned, most of currently available CBR protocols adopt this topology for interconnecting brokers, but assume that the tree does not change. Therefore, our self-repairing tree enables the reuse of mainstream CBR protocols in the dynamic scenario characterizing LANs, by leveraging off the consistent body of results related to tree-based CBR.
  • 8. At the same time, providing a tree able to self-repair upon changes in the physical topology of a LAN is only our minimal target. Our ultimate goal is to design a protocol whose characteristics simplify the operations of the CBR layer operating on it.
  • 9. FEATURES OF THE PROJECT: * The feature of the project is based on tree topology. * It repairs the nodes by itself.
  • 10. MODULES: Loading Screen Login Screen Route Request Route Reply Linkage breakage Partition Merging
  • 12. LOADING SCREEN: * This module is, just load your project for a certain times. It have your title of the project and it loads for a time. LOGIN SCREEN: * This module is used for enter the user and password. It have the Username and Password. * We have to enter the username and password. * Then select the login button ,If it is right, then it will go to the next screen. * Else it will send the message of enter the correct username and password.
  • 13. ROUTE REQUEST: * In this module we have to send the file through the path. * First we have to select the file using open dialog box. * Using open dialog box we will choose the file, which we are going to send. * Here we can open a file from any drive, directory, and folder. * After choosing the file, it will display the file. * After that we have to send the file to the next node. * When the next node is in active then it will send the content or file to the next node. If it is failed then it will send the content or file to the next node.
  • 14. ROUTE REPLY: * This Module is used to response for the request which is made by the route. * When the node is send the content or file to the next node. If it is active then it will receive the content or file. * When the node is failed then it will send a message that node is not active to the user. * It will also send the message when the sub nodes are failed. If it is in active then it receives the content or file.
  • 15. LINKAGE BREAKAGE: * In this module, when your sending the file to the next node. When the next node is in active then the data to be received by the next node. * When the failure occurs in the next node. At that time the sub node of the next node will be exploit. PARTITION MERGING: * In this module, when your sending the file to the next node. When the next node is not active. Then the sub node receives the file by another node.
  • 16. DATA FLOW DIAGRAM: Process The Choose The Choose The Enter the Username Input Valid File or Data File or Data & Password Or Not to be to be transferred selected Check the The It won’t Yes content of Yes Selected save the file in the File to be next node send to the next node No No It Receives The The sub node of the node Content and save the will get the file and if we file want save it or forward to the sub node
  • 17. ACTIVITY DIAGRAM: Selecting The File Sending to the next node Check It is activate or not Yes No Check the content of the file Sub Node Receive the content and forward it in the next node to the sub nodes No Yes Save the receiving file in the next node Sub Node Receive the content and save it Sub Node Receive the content and save it and then forward it to the sub nodes and then forward it to the sub nodes
  • 18. ARCHITECTURE OF SELF REPARING TREE TOPOLOGY: S1 A S1 H L F S1 E S1 A H A G S1 H E S1 self S1 G B D S1 B C S1 B
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. SYSTEM REQUIREMENTS: Software: • Client : Windows Client • Software : JAVA Hardware: • Memory : 128MB RAM or above • Secondary Storage : 40 GB HDD or above • FLOPPY DISK : .44 MB or above • Display unit : Color Monitor and other suitable accessories • Processor : PIII or above
  • 26. SOFTWARE FEATURES: Simple: Java was designed to be easy for the professional programmer to learn and use effectively. Java has another attribute that makes it easy to learn. It makes an effort not to have surprising features. Object-Oriented: Although influenced by its predecessors, Java was not designed to be source-code compatible with any other language. This allowed the Java team the freedom to design with a blank slate Robust: The multiplatformed environment of the web pages extraordinary demands on a program, because the program must execute reliably in a variety of systems. Thus the ability to create robust programs was given a high priority in the design of Java.
  • 27. Multithreaded: Java was designed to meet the real-world requirement of creating interactive, networked programs. To accomplish this, Java supports multithreaded programming, which allows you to write programs that do many things simultaneously. Architectural-Neutral: A central issue for the designers was that of code longevity and portability. One of the main problems facing programmers is that no guarantee exists that if you write a program today, it will run tomorrow-even on the same machine. Interpreted and High Performance: Java enables the creation of cross-platform programs by compiling into an intermediate representation called java bytecode. This code can be interpreted on any system that provides a Java Virtual Machine.
  • 28. Distributed: Java is designed for the distributed environment of the Internet, because it handles TCP/IP protocols. In fact, accessing a resource using a URL is not much different from accessing a file. The original version of Java(Oak) included features for intra-address-space messaging..For example:RMI Dynamic: Java programs carry with them substantial amounts of run-time type information that is used to verify and resolve accesses to objects at run time. This makes it possible to dynamically link code in a safe and expedient manner.
  • 29. BIBLIOGRAPHY: * T.Camp, J.Boleng, and V.Davies. A survey of mobility models for ad hoc network research. * A.Bulut, A. K.Singh, and R. Vitenberg. Distributed data streams indexing using content-based routing paradigm.