首页    期刊浏览 2024年09月20日 星期五
登录注册

文章基本信息

  • 标题:Efficient Alias Resolution using MIDAR
  • 本地全文:下载
  • 作者:Dhanya c ; P.Jennifer
  • 期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
  • 印刷版ISSN:2320-9798
  • 电子版ISSN:2320-9801
  • 出版年度:2015
  • 卷号:3
  • 期号:4
  • DOI:10.15680/ijircce.2015.0304258
  • 出版社:S&S Publications
  • 摘要:Alias resolution is the process of identifying IP addresses belonging to the same router and it is a critical step in Internet topology. It is avoided by using MIDAR Technique.. Monotonic ID-Based Alias Resolution minimizes the false positive rate when compared to Radar Gun Technique. When entreaty grasped by the disseminator, it checks whether the tag is unique or variant. If the tag bounced by the entreaty is variant then the t idings handover to the entreaty with the TTL (Time to live). TTL is the counter or timestamp attached with the tidings. It is used to improve the privacy and caching. If the TTL time is attained then the tidings are automatically discarded. If the tag bounced by the entreaty is analogous then the pristine tag is engendered and then the further process is endured. Probe Packet consists of the TTL and also the other information. Probe packet consists of entreaty and disseminator tidings and also the tidings about where the traffic coming from and when it all happens. A complete execution of MIDAR is divided into five stages. The five stages include Estimation, Discovery, Elimination, Corroboration stage and Final Alias Inference. In Estimation stage, the tag for needed disseminator is engendered. Second stage involves the Discovery stage, in this the entreaty substantiate the tags which was engendered. In Elimination stage the tag which was substantiated in the second stage are eliminated if the tags engendered are unique. In Corroboration stage, the tag which was substantiated as unique is corroborated once, if not this stage will not be fumbled. In final Alias Inference, the alias node which was bargained are tilted with the other tidings such as the workgroup of the node involves, tag which was engendered. There are also other sufficient techniques to engendering the tag such as Radar Gun and Ally. These two techniques are also efficient to engendering the tags but the tag engendered is non-linear. Only utmost of thirty probes can be hurled. Due to this insufficiency the MIDAR Technique is contrivance
  • 关键词:MIDAR; TT; Engendered; Disseminator
国家哲学社会科学文献中心版权所有