SlideShare a Scribd company logo
1 of 30
Download to read offline
SELF REPAIRING TREE TOPOLOGY
ENABLING CONTENT BASED ROUTING
    IN LOCAL AREA NETWORK
INTRODUCTION:

                  Content-based routing(CBR) differs from classical routing in that
messages are addressed based on their content instead of their destination. In CBR the
sender simply injects the message in the network, which determines how to route it
according to the nodes’ interests.

                  This ability is useful in many application scenarios. For instance, in a
stock quote application data procedures can publish stock updates on a CBR network,
which routes them only towards the consumers who subscribed to receive such updates.
Similarly, in a data sharing application repositories can advertise the attributes involved
in the query.

                  Most systems connect all the brokers(the CBR application-level
routers) in a single tree-shaped network. This broker tree is exploited to forward
messages.
Usually, these are not flooded to the entire tree, but routed towards
the interested components according to the message content and the subscriptions
stored at tree nodes.

                  CBR fosters a form of implicit communication that breaks the
coupling between senders and receivers. Senders no longer need to determine the
address of communication parties. Similarly, receivers do not know who is the sender
of a message, unless this information is somehow encoded in the message itself.

                  The sharp decoupling induced by this form of communication enables
one to easily add,remove, or change components at run-time with little impact on the
overall architecture.

                  Unfortunately, the advantages provided by this interaction model are
not supported by the state of the art of implemented systems. Indeed, the majority of
available CBR systems address scalability and ease of implementation by realizing the
broker tree as an overlay network, whose topology is assumed to be stable.
A requirement that clashes with the reality of dynamic scenarios like
LAN. Therefore, this situation leaves the potential of CBR largely unexploited precisely
in the application scenarios where it would make a huge difference.
OBJECTIVE:

               Content based routing (CBR) provides a powerful and flexible
foundation for distributed applications. Here we present LAN, a protocol to organize
the nodes of a LAN in a tree-shaped network able to


                 Self-Repair to tolerate the frequent topological reconfigurations
                typical of LAN;
                 Achieve this goal through repair strategies that minimize the
                changes that may impact the CBR layer exploiting the tree. LAN is
                implemented and publicly available.
              Here we report about its performance in simulated scenarios as well
               as in
               real-world experiments. The results confirm that its characteristics
              enable reliable and efficient CBR on LAN.
EXISTING SYSTEM:

                           Unfortunately, the advantages provided by this interaction
model are not supported by the state of the art of implemented systems.

                           Indeed, the majority of available CBR systems address
scalability and ease of implementation by realizing the broker tree as an overlay
network, whose topology is assumed to be stable.

                           A requirement that clashes with the reality of dynamic
scenarios like LAN.

                           Therefore, this situation leaves the potential of CBR largely
unexploited precisely in the application scenarios where it would make a huge
difference.
PROPOSED SYSTEM:
                              This paper overcomes the limitation above by achieving the
following goal :

                   defining a protocol to organize the nodes of a mobile LAN network in
                   a single, self-repairing tree that efficiently supports content-based
                   routing.

                              The goal of supporting CBR explains the rationale behind
the choice of a tree topology. As already mentioned, most of currently available CBR
protocols adopt this topology for interconnecting brokers, but assume that the tree does
not change.

                              Therefore, our self-repairing tree enables the reuse of
mainstream CBR protocols in the dynamic scenario characterizing LANs, by leveraging
off the consistent body of results related to tree-based CBR.
At the same time, providing a tree able to self-repair upon
changes in the physical topology of a LAN is only our minimal target.

                           Our ultimate goal is to design a protocol whose
characteristics simplify the operations of the CBR layer operating on it.
FEATURES OF THE PROJECT:

           * The feature of the project is based on tree topology.

           * It repairs the nodes by itself.
MODULES:


           Loading Screen

           Login Screen

           Route Request

           Route Reply

           Linkage breakage

           Partition Merging
MODULE DESCRIPTION
LOADING SCREEN:

               * This module is, just load your project for a certain times. It have
your title of the project and it loads for a time.

LOGIN SCREEN:
               * This module is used for enter the user and password. It have the
Username and Password.

               * We have to enter the username and password.

               * Then select the login button ,If it is right, then it will go to the next
screen.

               * Else it will send the message of enter the correct username and
password.
ROUTE REQUEST:

               * In this module we have to send the file through the path.

               * First we have to select the file using open dialog box.

               * Using open dialog box we will choose the file, which we are going
to send.

               * Here we can open a file from any drive, directory, and folder.

               * After choosing the file, it will display the file.

               * After that we have to send the file to the next node.

               * When the next node is in active then it will send the content or file
to the next node. If it is failed then it will send the content or file to the next node.
ROUTE REPLY:

               * This Module is used to response for the request which is made by
the route.

               * When the node is send the content or file to the next node. If it is
active then it will receive the content or file.

               * When the node is failed then it will send a message that node is not
active to the user.

               * It will also send the message when the sub nodes are failed. If it is
in active then it receives the content or file.
LINKAGE BREAKAGE:

                * In this module, when your sending the file to the next node. When
 the next node is in active then the data to be received by the next node.



                * When the failure occurs in the next node. At that time the sub node
 of the next node will be exploit.

PARTITION MERGING:
                * In this module, when your sending the file to the next node. When
 the next node is not active. Then the sub node receives the file by another node.
DATA FLOW DIAGRAM:

                     Process The              Choose The                Choose The
Enter the Username   Input Valid              File or Data              File or Data
& Password           Or Not                   to be                     to be
                                              transferred               selected




                                              Check the                 The
                     It won’t         Yes     content of        Yes     Selected
                     save                     the file in the           File to be
                                              next node                 send to the
                                                                        next node

                                                       No                       No

                                   It Receives The               The sub node of the node
                                   Content and save the          will get the file and if we
                                   file                          want save it or forward to
                                                                 the sub node
ACTIVITY DIAGRAM:

                                         Selecting The File




                                        Sending to the next
                                              node



                                     Check It is activate or not


                               Yes                                 No


        Check the content of the file          Sub Node Receive the content and forward it
             in the next node                              to the sub nodes

                         No              Yes
 Save the receiving
 file in the next node


                                                                   Sub Node Receive the content and save it
                  Sub Node Receive the content and save it
                                                                     and then forward it to the sub nodes
                    and then forward it to the sub nodes
ARCHITECTURE OF SELF REPARING
      TREE TOPOLOGY:
                                                        S1 A

       S1 H                  L
                                                          F

                                        S1 E
               S1 A

                             H             A


       G




S1 H                                                E          S1 self
                             S1 G

                      B

                                    D
                                               S1   B



           C
                      S1 B
SCREEN SHOTS
SYSTEM REQUIREMENTS:

Software:

• Client               : Windows Client
• Software             : JAVA

Hardware:

•   Memory            : 128MB RAM or above
•   Secondary Storage : 40 GB HDD or above
•   FLOPPY DISK       : .44 MB or above
•   Display unit      : Color Monitor and other suitable accessories
•   Processor         : PIII or above
SOFTWARE FEATURES:
Simple:

                  Java was designed to be easy for the professional programmer to
learn and use effectively. Java has another attribute that makes it easy to learn. It makes
an effort not to have surprising features.

Object-Oriented:

                  Although influenced by its predecessors, Java was not designed to be
source-code compatible with any other language. This allowed the Java team the
freedom to design with a blank slate

Robust:

                  The multiplatformed environment of the web pages extraordinary
demands on a program, because the program must execute reliably in a variety of
systems. Thus the ability to create robust programs was given a high priority in the
design of Java.
Multithreaded:

                  Java was designed to meet the real-world requirement of creating
interactive, networked programs. To accomplish this, Java supports multithreaded
programming, which allows you to write programs that do many things simultaneously.

Architectural-Neutral:

                  A central issue for the designers was that of code longevity and
portability. One of the main problems facing programmers is that no guarantee exists
that if you write a program today, it will run tomorrow-even on the same machine.

Interpreted and High Performance:

                  Java enables the creation of cross-platform programs by compiling
into an intermediate representation called java bytecode. This code can be interpreted
on any system that provides a Java Virtual Machine.
Distributed:
                  Java is designed for the distributed environment of the Internet,
because it handles TCP/IP protocols. In fact, accessing a resource using a URL is not
much different from accessing a file. The original version of Java(Oak) included
features for intra-address-space messaging..For example:RMI

Dynamic:

                  Java programs carry with them substantial amounts of run-time type
information that is used to verify and resolve accesses to objects at run time. This
makes it possible to dynamically link code in a safe and expedient manner.
BIBLIOGRAPHY:
                 * T.Camp, J.Boleng, and V.Davies. A survey of mobility models for
ad hoc network research.

                 * A.Bulut, A. K.Singh, and R. Vitenberg. Distributed data streams
indexing using content-based routing paradigm.
THANK YOU

More Related Content

What's hot

Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...IBM India Smarter Computing
 
Energy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingEnergy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingVideoguy
 
Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNgandhimb
 
Wireless network basics
Wireless network basicsWireless network basics
Wireless network basicsKumar
 
(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...
(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...
(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...Naoki Shibata
 
Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)Johnson Liu
 
PCE, OpenFlow, & the Centralized Control Plane
PCE, OpenFlow, & the Centralized Control PlanePCE, OpenFlow, & the Centralized Control Plane
PCE, OpenFlow, & the Centralized Control PlaneMetaswitch NTD
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer NetworkingRuchita Tomar
 
Optimal Streaming Protocol for VoD Using Clients' Residual Bandwidth
Optimal Streaming Protocol for VoD Using Clients' Residual BandwidthOptimal Streaming Protocol for VoD Using Clients' Residual Bandwidth
Optimal Streaming Protocol for VoD Using Clients' Residual BandwidthIDES Editor
 
Apresentação feita em 2005 no Annual Simulation Symposium.
Apresentação feita em 2005 no Annual Simulation Symposium.Apresentação feita em 2005 no Annual Simulation Symposium.
Apresentação feita em 2005 no Annual Simulation Symposium.Antonio Marcos Alberti
 

What's hot (19)

Lec7
Lec7Lec7
Lec7
 
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
Towards an Open Data Center with an Interoperable Network (ODIN) : Volume 2: ...
 
Ijariie1150
Ijariie1150Ijariie1150
Ijariie1150
 
Energy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingEnergy-Aware Wireless Video Streaming
Energy-Aware Wireless Video Streaming
 
Lecture04 H
Lecture04 HLecture04 H
Lecture04 H
 
Design And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPNDesign And Analysis Of MPLS based VPN
Design And Analysis Of MPLS based VPN
 
Wireless network basics
Wireless network basicsWireless network basics
Wireless network basics
 
(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...
(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...
(Paper) MTcast: Robust and Efficient P2P-based Video Delivery for Heterogeneo...
 
Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS)
 
MPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) TechnologyMPLS L2VPN (VLL) Technology
MPLS L2VPN (VLL) Technology
 
10 fn s42
10 fn s4210 fn s42
10 fn s42
 
4 network.key
4 network.key4 network.key
4 network.key
 
Exchange 2013 ABC's: Architecture, Best Practices and Client Access
Exchange 2013 ABC's: Architecture, Best Practices and Client AccessExchange 2013 ABC's: Architecture, Best Practices and Client Access
Exchange 2013 ABC's: Architecture, Best Practices and Client Access
 
PCE, OpenFlow, & the Centralized Control Plane
PCE, OpenFlow, & the Centralized Control PlanePCE, OpenFlow, & the Centralized Control Plane
PCE, OpenFlow, & the Centralized Control Plane
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer Networking
 
MPLS
MPLSMPLS
MPLS
 
Dsohowto
DsohowtoDsohowto
Dsohowto
 
Optimal Streaming Protocol for VoD Using Clients' Residual Bandwidth
Optimal Streaming Protocol for VoD Using Clients' Residual BandwidthOptimal Streaming Protocol for VoD Using Clients' Residual Bandwidth
Optimal Streaming Protocol for VoD Using Clients' Residual Bandwidth
 
Apresentação feita em 2005 no Annual Simulation Symposium.
Apresentação feita em 2005 no Annual Simulation Symposium.Apresentação feita em 2005 no Annual Simulation Symposium.
Apresentação feita em 2005 no Annual Simulation Symposium.
 

Viewers also liked

Introduction to Wide Area Network Routing
Introduction to Wide Area Network RoutingIntroduction to Wide Area Network Routing
Introduction to Wide Area Network RoutingNetwork Utility Force
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies3rdyeara
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1CAVC
 
What is the main purpose of ospf
What is the main purpose of ospfWhat is the main purpose of ospf
What is the main purpose of ospfSwati Sharma
 

Viewers also liked (7)

Introduction to Wide Area Network Routing
Introduction to Wide Area Network RoutingIntroduction to Wide Area Network Routing
Introduction to Wide Area Network Routing
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
TREE TOPOLOGY
TREE TOPOLOGY TREE TOPOLOGY
TREE TOPOLOGY
 
Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1Routing Protocols and Concepts - Chapter 1
Routing Protocols and Concepts - Chapter 1
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
What is the main purpose of ospf
What is the main purpose of ospfWhat is the main purpose of ospf
What is the main purpose of ospf
 

Similar to Self Repairing Tree Topology Enabling Content Based Routing In Local Area Network

Mixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docx
Mixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docxMixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docx
Mixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docxannandleola
 
Understanding tcp=ip
Understanding tcp=ipUnderstanding tcp=ip
Understanding tcp=ipIlaya Raja
 
Nat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleNat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleLuis Nagasako
 
How to write shared libraries!
How to write shared libraries!How to write shared libraries!
How to write shared libraries!Stanley Ho
 
Chapter 4
Chapter 4Chapter 4
Chapter 4asguna
 
Axis2 architecture and implementation
Axis2 architecture and implementationAxis2 architecture and implementation
Axis2 architecture and implementationSreeni I
 
OOPSLA02 BehavioralSemantics.ppt
OOPSLA02 BehavioralSemantics.pptOOPSLA02 BehavioralSemantics.ppt
OOPSLA02 BehavioralSemantics.pptPtidej Team
 
Pivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSXPivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSXPooja Patel
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
UNIT V DIS.pptx
UNIT V DIS.pptxUNIT V DIS.pptx
UNIT V DIS.pptxSamPrem3
 
640 802-study-guide-sample
640 802-study-guide-sample640 802-study-guide-sample
640 802-study-guide-samplerickybcool
 

Similar to Self Repairing Tree Topology Enabling Content Based Routing In Local Area Network (20)

Mixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docx
Mixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docxMixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docx
Mixed 11b11g WLAN Performance3iLab Grading RubricCategoryP.docx
 
[OSS Upstream Training] 5 open stack liberty_recap
[OSS Upstream Training] 5 open stack liberty_recap[OSS Upstream Training] 5 open stack liberty_recap
[OSS Upstream Training] 5 open stack liberty_recap
 
open stackliberty_recap_by_VietOpenStack
open stackliberty_recap_by_VietOpenStackopen stackliberty_recap_by_VietOpenStack
open stackliberty_recap_by_VietOpenStack
 
005281271.pdf
005281271.pdf005281271.pdf
005281271.pdf
 
Understanding tcp=ip
Understanding tcp=ipUnderstanding tcp=ip
Understanding tcp=ip
 
Nat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_moduleNat load balance_5.0e_feature_module
Nat load balance_5.0e_feature_module
 
How to write shared libraries!
How to write shared libraries!How to write shared libraries!
How to write shared libraries!
 
OsI reference model
OsI reference modelOsI reference model
OsI reference model
 
Network layers
Network layersNetwork layers
Network layers
 
security in neo4j
security in neo4jsecurity in neo4j
security in neo4j
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Axis2 architecture and implementation
Axis2 architecture and implementationAxis2 architecture and implementation
Axis2 architecture and implementation
 
OOPSLA02 BehavioralSemantics.ppt
OOPSLA02 BehavioralSemantics.pptOOPSLA02 BehavioralSemantics.ppt
OOPSLA02 BehavioralSemantics.ppt
 
Pivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSXPivotal Cloud Foundry + NSX
Pivotal Cloud Foundry + NSX
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
Chap 2 network models
Chap 2 network modelsChap 2 network models
Chap 2 network models
 
T04124
T04124T04124
T04124
 
UNIT V DIS.pptx
UNIT V DIS.pptxUNIT V DIS.pptx
UNIT V DIS.pptx
 
640 802-study-guide-sample
640 802-study-guide-sample640 802-study-guide-sample
640 802-study-guide-sample
 
Subversion
SubversionSubversion
Subversion
 

More from ncct

Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological SignalsBiomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological Signalsncct
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detectionncct
 
Cockpit White Box
Cockpit White BoxCockpit White Box
Cockpit White Boxncct
 
Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspectorncct
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...ncct
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detectorncct
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protectionncct
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammerncct
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projectsncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects Bncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009ncct
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...ncct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S Pncct
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C Tncct
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projectsncct
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computingncct
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projectsncct
 

More from ncct (20)

Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological SignalsBiomedical Wearable Device For Remote Monitoring Ofphysiological Signals
Biomedical Wearable Device For Remote Monitoring Ofphysiological Signals
 
Digital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy DetectionDigital Water Marking For Video Piracy Detection
Digital Water Marking For Video Piracy Detection
 
Cockpit White Box
Cockpit White BoxCockpit White Box
Cockpit White Box
 
Rail Track Inspector
Rail Track InspectorRail Track Inspector
Rail Track Inspector
 
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Self Repairing Tree Topology Enabling Content Based Routing In Local Area Network

  • 1. SELF REPAIRING TREE TOPOLOGY ENABLING CONTENT BASED ROUTING IN LOCAL AREA NETWORK
  • 2. INTRODUCTION: Content-based routing(CBR) differs from classical routing in that messages are addressed based on their content instead of their destination. In CBR the sender simply injects the message in the network, which determines how to route it according to the nodes’ interests. This ability is useful in many application scenarios. For instance, in a stock quote application data procedures can publish stock updates on a CBR network, which routes them only towards the consumers who subscribed to receive such updates. Similarly, in a data sharing application repositories can advertise the attributes involved in the query. Most systems connect all the brokers(the CBR application-level routers) in a single tree-shaped network. This broker tree is exploited to forward messages.
  • 3. Usually, these are not flooded to the entire tree, but routed towards the interested components according to the message content and the subscriptions stored at tree nodes. CBR fosters a form of implicit communication that breaks the coupling between senders and receivers. Senders no longer need to determine the address of communication parties. Similarly, receivers do not know who is the sender of a message, unless this information is somehow encoded in the message itself. The sharp decoupling induced by this form of communication enables one to easily add,remove, or change components at run-time with little impact on the overall architecture. Unfortunately, the advantages provided by this interaction model are not supported by the state of the art of implemented systems. Indeed, the majority of available CBR systems address scalability and ease of implementation by realizing the broker tree as an overlay network, whose topology is assumed to be stable.
  • 4. A requirement that clashes with the reality of dynamic scenarios like LAN. Therefore, this situation leaves the potential of CBR largely unexploited precisely in the application scenarios where it would make a huge difference.
  • 5. OBJECTIVE: Content based routing (CBR) provides a powerful and flexible foundation for distributed applications. Here we present LAN, a protocol to organize the nodes of a LAN in a tree-shaped network able to Self-Repair to tolerate the frequent topological reconfigurations typical of LAN; Achieve this goal through repair strategies that minimize the changes that may impact the CBR layer exploiting the tree. LAN is implemented and publicly available. Here we report about its performance in simulated scenarios as well as in real-world experiments. The results confirm that its characteristics enable reliable and efficient CBR on LAN.
  • 6. EXISTING SYSTEM: Unfortunately, the advantages provided by this interaction model are not supported by the state of the art of implemented systems. Indeed, the majority of available CBR systems address scalability and ease of implementation by realizing the broker tree as an overlay network, whose topology is assumed to be stable. A requirement that clashes with the reality of dynamic scenarios like LAN. Therefore, this situation leaves the potential of CBR largely unexploited precisely in the application scenarios where it would make a huge difference.
  • 7. PROPOSED SYSTEM: This paper overcomes the limitation above by achieving the following goal : defining a protocol to organize the nodes of a mobile LAN network in a single, self-repairing tree that efficiently supports content-based routing. The goal of supporting CBR explains the rationale behind the choice of a tree topology. As already mentioned, most of currently available CBR protocols adopt this topology for interconnecting brokers, but assume that the tree does not change. Therefore, our self-repairing tree enables the reuse of mainstream CBR protocols in the dynamic scenario characterizing LANs, by leveraging off the consistent body of results related to tree-based CBR.
  • 8. At the same time, providing a tree able to self-repair upon changes in the physical topology of a LAN is only our minimal target. Our ultimate goal is to design a protocol whose characteristics simplify the operations of the CBR layer operating on it.
  • 9. FEATURES OF THE PROJECT: * The feature of the project is based on tree topology. * It repairs the nodes by itself.
  • 10. MODULES: Loading Screen Login Screen Route Request Route Reply Linkage breakage Partition Merging
  • 12. LOADING SCREEN: * This module is, just load your project for a certain times. It have your title of the project and it loads for a time. LOGIN SCREEN: * This module is used for enter the user and password. It have the Username and Password. * We have to enter the username and password. * Then select the login button ,If it is right, then it will go to the next screen. * Else it will send the message of enter the correct username and password.
  • 13. ROUTE REQUEST: * In this module we have to send the file through the path. * First we have to select the file using open dialog box. * Using open dialog box we will choose the file, which we are going to send. * Here we can open a file from any drive, directory, and folder. * After choosing the file, it will display the file. * After that we have to send the file to the next node. * When the next node is in active then it will send the content or file to the next node. If it is failed then it will send the content or file to the next node.
  • 14. ROUTE REPLY: * This Module is used to response for the request which is made by the route. * When the node is send the content or file to the next node. If it is active then it will receive the content or file. * When the node is failed then it will send a message that node is not active to the user. * It will also send the message when the sub nodes are failed. If it is in active then it receives the content or file.
  • 15. LINKAGE BREAKAGE: * In this module, when your sending the file to the next node. When the next node is in active then the data to be received by the next node. * When the failure occurs in the next node. At that time the sub node of the next node will be exploit. PARTITION MERGING: * In this module, when your sending the file to the next node. When the next node is not active. Then the sub node receives the file by another node.
  • 16. DATA FLOW DIAGRAM: Process The Choose The Choose The Enter the Username Input Valid File or Data File or Data & Password Or Not to be to be transferred selected Check the The It won’t Yes content of Yes Selected save the file in the File to be next node send to the next node No No It Receives The The sub node of the node Content and save the will get the file and if we file want save it or forward to the sub node
  • 17. ACTIVITY DIAGRAM: Selecting The File Sending to the next node Check It is activate or not Yes No Check the content of the file Sub Node Receive the content and forward it in the next node to the sub nodes No Yes Save the receiving file in the next node Sub Node Receive the content and save it Sub Node Receive the content and save it and then forward it to the sub nodes and then forward it to the sub nodes
  • 18. ARCHITECTURE OF SELF REPARING TREE TOPOLOGY: S1 A S1 H L F S1 E S1 A H A G S1 H E S1 self S1 G B D S1 B C S1 B
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. SYSTEM REQUIREMENTS: Software: • Client : Windows Client • Software : JAVA Hardware: • Memory : 128MB RAM or above • Secondary Storage : 40 GB HDD or above • FLOPPY DISK : .44 MB or above • Display unit : Color Monitor and other suitable accessories • Processor : PIII or above
  • 26. SOFTWARE FEATURES: Simple: Java was designed to be easy for the professional programmer to learn and use effectively. Java has another attribute that makes it easy to learn. It makes an effort not to have surprising features. Object-Oriented: Although influenced by its predecessors, Java was not designed to be source-code compatible with any other language. This allowed the Java team the freedom to design with a blank slate Robust: The multiplatformed environment of the web pages extraordinary demands on a program, because the program must execute reliably in a variety of systems. Thus the ability to create robust programs was given a high priority in the design of Java.
  • 27. Multithreaded: Java was designed to meet the real-world requirement of creating interactive, networked programs. To accomplish this, Java supports multithreaded programming, which allows you to write programs that do many things simultaneously. Architectural-Neutral: A central issue for the designers was that of code longevity and portability. One of the main problems facing programmers is that no guarantee exists that if you write a program today, it will run tomorrow-even on the same machine. Interpreted and High Performance: Java enables the creation of cross-platform programs by compiling into an intermediate representation called java bytecode. This code can be interpreted on any system that provides a Java Virtual Machine.
  • 28. Distributed: Java is designed for the distributed environment of the Internet, because it handles TCP/IP protocols. In fact, accessing a resource using a URL is not much different from accessing a file. The original version of Java(Oak) included features for intra-address-space messaging..For example:RMI Dynamic: Java programs carry with them substantial amounts of run-time type information that is used to verify and resolve accesses to objects at run time. This makes it possible to dynamically link code in a safe and expedient manner.
  • 29. BIBLIOGRAPHY: * T.Camp, J.Boleng, and V.Davies. A survey of mobility models for ad hoc network research. * A.Bulut, A. K.Singh, and R. Vitenberg. Distributed data streams indexing using content-based routing paradigm.