Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Analysis of link failures and recoveries on 6to4 tunneling network with different routing protocol.

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • معلومة اضافية
    • نبذة مختصرة :
      Failure recovery is an essential discussion in communication to guarantee the network's undisturbed and reliable service. Failed links have been affecting the communication network performance for various real-time applications for many years. Thus, it is necessary to address the issue, as it affects both users and service provider's, leading to catastrophic collapse and cascading or interdependent failures. Therefore, designing a survivable network is the primary concern. Estimating and predicting network performance in advance for network survivability and traffic reachability is advantageous for network engineers. Therefore, in this paper, we analyze the network performance by failing and recovering network links for multiple time durations. The 6to4 tunneling network has been configured where two isolated IPv6 networks are connected through the tunnel's to the IPv4 backbone network, and we have failed the links that are connecting these networks. The 6to4 automatic and manual tunneling networks are defined separately. The network is simulated using Routing Information Protocol/Routing Information Protocol Next Generation and Open Shortest Path First/Open Shortest Path First version 3 for real-time voice and video streaming applications. The network's performance is calculated for links over each routing protocol and tunneling technique in these cases. Therefore, this analysis allows us the pre-computation of performance for failing the main link connecting the IPv6 networks to the IPv4 backbone network or vice-versa. The performance parameters studied and evaluated in this paper are network convergence, traffic dropped, throughput, queuing delay, and router performance. The different route table characteristics for Router A, Router C, and IPv4 backbone are also analyzed as links between them are failed and recovered multiple times. This novel analysis and discussion bring out a practical, realistic analysis of recovery and system vulnerability. [ABSTRACT FROM AUTHOR]
    • نبذة مختصرة :
      Copyright of Journal of Intelligent Manufacturing is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)