Simulation Based Exploration of SKC Block Cipher AlgorithmAn Exploration of Monetary Based Approach (MBA) in Peer-to-peer system Network: A Review
Durba Das Gupta1 , Faiyaz Ahamad2 , Mohammad Zunnun Khan3
Section:Review Paper, Product Type: Journal Paper
Volume-9 ,
Issue-8 , Page no. 63-71, Aug-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i8.6371
Online published on Aug 31, 2021
Copyright © Durba Das Gupta, Faiyaz Ahamad, Mohammad Zunnun Khan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Durba Das Gupta, Faiyaz Ahamad, Mohammad Zunnun Khan, “Simulation Based Exploration of SKC Block Cipher AlgorithmAn Exploration of Monetary Based Approach (MBA) in Peer-to-peer system Network: A Review,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.8, pp.63-71, 2021.
MLA Style Citation: Durba Das Gupta, Faiyaz Ahamad, Mohammad Zunnun Khan "Simulation Based Exploration of SKC Block Cipher AlgorithmAn Exploration of Monetary Based Approach (MBA) in Peer-to-peer system Network: A Review." International Journal of Computer Sciences and Engineering 9.8 (2021): 63-71.
APA Style Citation: Durba Das Gupta, Faiyaz Ahamad, Mohammad Zunnun Khan, (2021). Simulation Based Exploration of SKC Block Cipher AlgorithmAn Exploration of Monetary Based Approach (MBA) in Peer-to-peer system Network: A Review. International Journal of Computer Sciences and Engineering, 9(8), 63-71.
BibTex Style Citation:
@article{Gupta_2021,
author = {Durba Das Gupta, Faiyaz Ahamad, Mohammad Zunnun Khan},
title = {Simulation Based Exploration of SKC Block Cipher AlgorithmAn Exploration of Monetary Based Approach (MBA) in Peer-to-peer system Network: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2021},
volume = {9},
Issue = {8},
month = {8},
year = {2021},
issn = {2347-2693},
pages = {63-71},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5381},
doi = {https://doi.org/10.26438/ijcse/v9i8.6371}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i8.6371}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5381
TI - Simulation Based Exploration of SKC Block Cipher AlgorithmAn Exploration of Monetary Based Approach (MBA) in Peer-to-peer system Network: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - Durba Das Gupta, Faiyaz Ahamad, Mohammad Zunnun Khan
PY - 2021
DA - 2021/08/31
PB - IJCSE, Indore, INDIA
SP - 63-71
IS - 8
VL - 9
SN - 2347-2693
ER -
VIEWS | XML | |
387 | 215 downloads | 151 downloads |
Abstract
The major concept of the Monetary Based Approach (MBA) network uses the Label Switch Path (LSP) technique that pro- vides high performance in packet delivery without routing table lookup. Nevertheless, it needs more overhead to rebuild a new path when occurring link failure in the MBA network. MBA (Monetary Based Approach) networks are currently evolving towards a universal and convergent network, capable of flowing multiservice traffic (voice, data and video) over the same IP based infrastructure. Quality of Service (QoS) is more and more becoming a necessity for emerging applications carried by MBA networks. This fact stimulates service providers to improve network planning techniques to adequately provide network resources and overcome all failures. The paper presents typical network failures, which cause path recovery in MBA networks and experimental results of network failures, when MBA is used.
Key-Words / Index Term
Label Switch Path (LSP), Monetary Based Approach (MBA), peer-to-peer system, Quality of Service (QoS)
References
[1] Xu, F., Peng, M., Esmaeili, M., Rahnamay-Naeini, M., Khan, S., Ghani, N., & Hayat, M. Post-fault restoration in multi-domain networks with multiple failures. In 2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, pp. 593- 598, 2010. IEEE.
[2] Capone, A., Cascone, C., Nguyen, A. Q., & Sanso, B. Detour planning for fast and reliable failure recovery in SDN with Open-State. In 2015 11th International Conference on the Design of Reliable Communication Networks (DRCN), pp. 25-32, 2015, March. IEEE.
[3] Almandhari, T. M., & Shiginah, F. A. A performance study framework for Monetary Based Approach (MBA) networks. In 2015 IEEE 8th GCC Conference & Exhibition pp. 1-6, 2015, February. IEEE.
[4] Attar, H., Alhihi, M., Samour, M., Solyman, A. A., Igorovich, S. S., Georgievna, K. N., & Khalil, F. A Mathematical Model for Managing the Distribution of Information Flows for MBA -TE Networks under Critical Conditions. Communications and Network, 10(02), 31-42, 2018.
[5] Hanshi, S. M., & Al-Khateeb, W. (2010, September). Enhancing QoS protection in MBA networks. In 2010 Second International Conference on Network Applications, Protocols and Services (pp. 95-100). IEEE.
[6] Hassan, N., Baig, A., Qadir, J., & Din, I. , Recovery and bandwidth sharing techniques in MBA networks. In 8th International Conference on High-capacity Optical Networks and Emerging Technologies pp. 193-200, 2011, December. IEEE.
[7] Ridwan, M. A., Radzi, N. A. M., Ahmad, W. S. H. M. W., Abdullah, F., Jamaludin, M. Z., & Zakaria, M.
[8] N.,. Recent trends in MBA networks: Technologies, Applications and Challenges. IET Communications. 2019.
[9] Karakus, M., & Durresi, A. (2019, May). Economic analysis of software defined networking (sdn) under various network failure scenarios. In ICC. 2019-2019 IEEE International Conference on Communications (ICC) pp. 1-6, 2019.. IEEE.
[10] Li, S. M., & Liang, H. Y., A model of path fault recovery of MBA VPN and simulation. In 2011 International Conference on Electric Information and Control Engineering pp. 1925- 1928, 2011, April. IEEE.
[11] Lin, J. W., & Liu, H. Y. (2010). Redirection based recovery for MBA network systems. Journal of Systems and Software, 83(4), 609-620.
[12] Qiu, Y., Zhu, H., Zhou, Y., & Gu, J. (2010, November). A Research of MBA -based Network Fault Recovery. In 2010 Third International Conference on Intelligent Networks and Intelligent Systems (pp. 699-702). IEEE.
[13] Cascone, C., Sanvito, D., Pollini, L., Capone, A., & Sanso, B. (2017). Fast failure detection and recovery in SDN with stateful data plane. International Journal of Network Management, 27(2), e1957.
[14] Wang, S., Xu, H., Huang, L., Yang, X., & Liu, J. (2019, August). Fast Recovery for Single Link Failure with Segment Routing in SDNs. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 2013-2018). IEEE.
[15] Lawrence, J. (2001). Designing multiprotocol label switching networks. IEEE Communications Magazine, 39(7), 134-142.
[16] Geary, N., Antonopoulos, A., Drakopoulos, E., & O`Reilly, J. (2001, April). Analysis of optimisation issues in multi-period DWDM network planning. In Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No. 01CH37213) (Vol. 1, pp. 152-158). IEEE.
[17] Saad, T., Yang, T., Makrakis, D., & Groza, V. (2001). Diff-Serv-enabled adaptive traffic engineering over MBA. In 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No. 01EX479) (Vol. 2, pp. 128- 133). IEEE.
[18] Xiao, X., Hannan, A., Bailey, B., & Ni, L. M. (2000). Traffic Engineering with MBA in the Internet. IEEE network, 14(2), 28-33.
[19] Nadeau, T., Srinivasan, C., Farrel, A., Hall, T., & Harrison, E. (2007). Generalized multiprotocol label switching (GMBA) label switching router (LSR) management information base. RFC4803, Feb.
[20] Wu, J., & Zhang, Y. (2010, September). A layered MBA network architecture. In 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM) (pp. 1-4). IEEE.
[21] Aazam, M., Syed, A. M., & Huh, E. N. (). Redefining flow label in IPv6 and MBA headers for end-to-end QoS in virtual networking for thin client. In 2013 19th Asia-Pacific Conference on Communications (APCC) (pp. 585- 590, 2013, August). IEEE.
[22] Wu, J., & Zhang, Y., A layered MBA network architecture. In 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM) (pp. 1-4, 2010, September). IEEE.
[23] Fineberg, V., QoS Support in MBA networks. MBA /FR Alliance. 2003.
[24] Han, L., Wang, J., Wang, C., & Cai, L., A variable forwarding equivalence class for MBA networks. In 2009 International Conference on Multimedia Information Networking and Security (Vol. 1, pp. 273-276, 2009, November). IEEE.
[25] Farrel, A., Papadimitriou, D., Vasseur, J. P., & Ayyangar, A. (). Encoding of attributes for multiprotocol label switching (MBA) label switched path (LSP) establishment using resource reservation protocol-traffic engineering (RSVP- TE). RFC 4420 (Proposed Standard), Internet Engineering Task Force, 2006.
[26] Vasseur, J. P., Le Roux, J. L., Yasukawa, S., Previdi, S., Psenak, P., & Mabbey, P., Routing Extensions for Discovery of Multiprotocol (MBA) Label Switch Router (LSR) Traffic Engineering (TE) Mesh Membership. RFC, 4972, 1-15, 2007.
[27] Smith, D., Mullooly, J., Jaeger, W., & Scholl, T., Label Edge Router Forwarding of IPv4 Option Packets. In RFC 6178 (Proposed Standard). Internet Engineering Task Force, 2011.
[28] Lasserre, M., & Kompella, V. (). Virtual private LAN service (VPLS) using label distribution protocol (LDP) signaling. RFC 4762, January. 2007.
[29] Haroon, M., Tripathi, M. M., & Ahmad, F., Application of Machine Learning In Forensic Science. In Critical Concepts, Standards, and Techniques in Cyber Forensics, pp. 228-239, 2020. IGI Global.
[30] Ahmad, F., Darbari, M., & Asthana, R., Different Approaches of Soft Computing Techniques (Inference System) which are used in Clinical Decision Support System for Risk based Prioritization. Asian Journal of Computer and Information Systems, 3(1). 2015.
[31] Ahmad, F., & Khalid, S., Scalable Design of Service Discovery Mechanism for Adhoc Network Using Wireless Mesh Network. International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) ISSN No. 2248?9738 Volume, 1., 2012.
[32] Saba Khalid, F. A., & Beg, M. R., Secure key pre-distribution in wireless sensor networks using combinatorial design and traversal design based key distribution, 2012.
[33] Ahmad, F., Khalid, S., & Hussain, M. S., Encrypting data using the features of memetic algorithm and cryptography. International Journal of Engineering Research and Applications, 2011. ISSN, 2248-9622.
[34] M. Z. Khan, M. S. Kidwai, F. Ahamad and M. U. Khan, "Hadoop based EMH framework: A Big Data approach," 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), pp. 1068-1070, 2021, doi: 10.1109/ICACITE51222.2021.9404710.
[35] Husain, M. S., & Khan, M. Z. (Eds.). (2019). Critical Concepts, Standards, and Techniques in Cyber Forensics. IGI Global, 2019.
[36] M. Suhaib Kidwai and M. Zunnun Khan, "A new perspective of detecting and classifying neurological disorders through recurrence and machine learning classifiers," 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), pp. 200-206, 2021, doi: 10.1109/ICACITE51222.2021.9404645.