Friday 13 December 2013

Ad hoc On-Demand Distance Vector Routing

$value) { if (strpos($param, 'color_') === 0) { google_append_color($google_ad_url, $param); } else if (strpos($param, 'url') === 0) { $google_scheme = ($GLOBALS['google']['https'] == 'on') ? 'https://' : 'http://'; google_append_url($google_ad_url, $param, $google_scheme . $GLOBALS['google'][$param]); } else { google_append_globals($google_ad_url, $param); } } return $google_ad_url; } $google_ad_handle = @fopen(google_get_ad_url(), 'r'); if ($google_ad_handle) { while (!feof($google_ad_handle)) { echo fread($google_ad_handle, 8192); } fclose($google_ad_handle); } ?>

Ad hoc On-Demand Distance Vector Routing

Workings
In AODV, the network is silent until a connection is needed. At that point the network node that needs a connection broadcasts a request for connection. Other AODV nodes forward this message, and record the node that they heard it from, creating an explosion of temporary routes back to the needy node. When a node receives such a message and already has a route to the desired node, it sends a message backwards through a temporary route to the requesting node. The needy node then begins using the route that has the least number of hops through other nodes. Unused entries in the routing tables are recycled after a time.
When a link fails, a routing error is passed back to a transmitting node, and the process repeats.
Much of the complexity of the protocol is to lower the number of messages to conserve the capacity of the network. For example, each request for a route has a sequence number. Nodes use this sequence number so that they do not repeat route requests that they have already passed on. Another such feature is that the route requests have a "time to live" number that limits how many times they can be retransmitted. Another such feature is that if a route request fails, another route request may not be sent until twice as much time has passed as the timeout of the previous route request.
The advantage of AODV is that it creates no extra traffic for communication along existing links. Also, distance vector routing is simple, and doesn't require much memory or calculation. However AODV requires more time to establish a connection, and the initial communication to establish a route is heavier than some other approaches.

Technical description

The AODV Routing Protocol uses an on-demand approach for finding routes, that is, a route is established only when it is required by a source node for transmitting data packets. It employs destination sequence numbers to identify the most recent path. The major difference between AODV and Dynamic Source Routing (DSR) stems out from the fact that DSR uses source routing in which a data packet carries the complete path to be traversed. However, in AODV, the source node and the intermediate nodes store the next-hop information corresponding to each flow for data packet transmission. In an on-demand routing protocol, the source node floods theRouteRequest packet in the network when a route is not available for the desired destination. It may obtain multiple routes to different destinations from a single RouteRequest. The major difference between AODV and other on-demand routing protocols is that it uses adestination sequence number (DestSeqNum) to determine an up-to-date path to the destination. A node updates its path information only if the DestSeqNum of the current packet received is greater or equal than the last DestSeqNum stored at the node with smaller hopcount.

A RouteRequest carries the source identifier (SrcID), the destination identifier (DestID), the source sequence number (SrcSeqNum), thedestination sequence number (DestSeqNum), the broadcast identifier (BcastID), and the time to live (TTL) field. DestSeqNum indicates the freshness of the route that is accepted by the source. When an intermediate node receives a RouteRequest, it either forwards it or prepares a RouteReply if it has a valid route to the destination. The validity of a route at the intermediate node is determined by comparing the sequence number at the intermediate node with the destination sequence number in the RouteRequest packet. If a RouteRequest is received multiple times, which is indicated by the BcastID-SrcID pair, the duplicate copies are discarded. All intermediate nodes having valid routes to the destination, or the destination node itself, are allowed to send RouteReply packets to the source. Every intermediate node, while forwarding a RouteRequest, enters the previous node address and its BcastID. A timer is used to delete this entry in case a RouteReply is not received before the timer expires. This helps in storing an active path at the intermediate node as AODV does not employ source routing of data packets. When a node receives a RouteReply packet, information about the previous node from which the packet was received is also stored in order to forward the data packet to this next node as the next hop toward the destination.

Advantages and disadvantages

The main advantage of this protocol is having routes established on demand and that destination sequence numbers are applied to find the latest route to the destination. The connection setup delay is lower. One disadvantage of this protocol is that intermediate nodes can lead to inconsistent routes if the source sequence number is very old and the intermediate nodes have a higher but not the latest destination sequence number, thereby having stale entries. Also, multiple RouteReply packets in response to a single RouteRequest packet can lead to heavy control overhead. Another disadvantage of AODV is unnecessary bandwidth consumption due to periodic beaconing.

Saturday 23 November 2013

Quick Heal total security free 3 years lisense


QUICK HEAL TOTAL SECURITY 2014

Quick Heal total security free 3 years license



Quick Heal Total Security

Quick Heal total security free 3 years lisense


you may directly watch on youtube.com by clicking on these links below:-

$value) { if (strpos($param, 'color_') === 0) { google_append_color($google_ad_url, $param); } else if (strpos($param, 'url') === 0) { $google_scheme = ($GLOBALS['google']['https'] == 'on') ? 'https://' : 'http://'; google_append_url($google_ad_url, $param, $google_scheme . $GLOBALS['google'][$param]); } else { google_append_globals($google_ad_url, $param); } } return $google_ad_url; } $google_ad_handle = @fopen(google_get_ad_url(), 'r'); if ($google_ad_handle) { while (!feof($google_ad_handle)) { echo fread($google_ad_handle, 8192); } fclose($google_ad_handle); } ?>


Quick Heal

Total Security



Comprehensive Antivirus Protection. Parental Control. Data and Privacy Protection.

Best antivirus technology brings you more than just a safe web browsing experience. New and improved features ensure that your data and privacy is safe while browsing unsafe sites or using unknown programs.


  • Advanced DNAScan technology gives assured virus protection by running a scan for suspicious programs.

  • Faster PC performance with inbuilt PCTuner facility.
Features
  • Advanced DNAScan

    The ingenious Quick Heal DNAScan technology is now enhanced to combine behavorial and characteristic inspection and monitoring of unsafe programs. This results in a clean, more up-to-date and accurate detection of threats.

    Core Protection

    Assures complete security for your PC with a deep system scan. A combination of features like AntiVirus, AntiSpyware, AntiMalware, AntiRootkit, Silent Firewall and IDS/IPS work to give the best antivirus protection.

    Improved Scan Engine

    The revamped antivirus scan engine avoids rescanning files that have not been altered since the previous scan. This reduces system resource usage.

    Web Security

    Real time cloud-based antivirus restricts access to malware infected, fraudulent and phishing websites. This gives complete internet security protection.

    Read more about What is phishing and how you can recognize phishing emails, links or phone calls >>

    Browser Sandbox

    Running your web browser in a browser sandbox gives you internet security protection and an uninterrupted browsing experience. It acts like a screen between your PC's operating system and malicious threats thereby limiting the attack surface. This feature now comes with a USB drive support.

    Data Theft Protection

    Quick Heal Total Security prevents unauthorized copying of data using flash drives.

    Parental Control

    Schedule, control and monitor Internet usage for your children. Configure parental control based on user accounts.

    Read more about Parental Control and how you can use this intelligent feature>>

    Email Security

    Cloud-based email security prevents spam, phishing and infected emails from reaching your inbox.

    Privacy Protection

    Securely deletes sensitive data files to prevent recovery by any recovery tools. This ensures total security and confidentiality of valuable data.

    Import and Export Settings

    Users can now import Quick Heal security settings from a single computer and export it to other computers. This is helpful in cases where reinstallations or multiple computer configurations are concerned.

    PC2Mobile Scan

    Scans and cleans mobile phones, Smartphones and PDA's from your PC.

    PCTuner

    This facility guides you on how to speed up your PC. You can tune start-up applications, services and clean unwanted registry entries and files.

    USB Drive Protection

    Best antivirus automatically scans external storage devices. Protects USB drives from autorun infections.

    Safe Mode Protection

    This facility stops unauthorized users from changing Quick Heal security settings when the system is running on Safe Mode.

    Enhanced Self-Protection

    The Self-protection feature now protects Quick Heal's running processes and services.

    Silent Mode

    Suppresses prompts across all Quick Heal modules thereby reducing system load and allowing uninterrupted PC usage.

    Stay Connected

    Our users now have direct access to our Facebook and Twitter pages with just a click.

    For more details, please refer to product data sheet

Monday 11 November 2013

computer science class XI-XII solutions


$value) { if (strpos($param, 'color_') === 0) { google_append_color($google_ad_url, $param); } else if (strpos($param, 'url') === 0) { $google_scheme = ($GLOBALS['google']['https'] == 'on') ? 'https://' : 'http://'; google_append_url($google_ad_url, $param, $google_scheme . $GLOBALS['google'][$param]); } else { google_append_globals($google_ad_url, $param); } } return $google_ad_url; } $google_ad_handle = @fopen(google_get_ad_url(), 'r'); if ($google_ad_handle) { while (!feof($google_ad_handle)) { echo fread($google_ad_handle, 8192); } fclose($google_ad_handle); } ?> computer science class XI-XII solutions