Fault-Tolerant Adaptive Routing in Dragonfly Networks


  • R. Amsaleka Assistant Professor/ CSE, Vivekanandha College of Technology for Women, Tiruchengode, Tamil Nadu, India


Dragonfly Networks, Trust Zone innovation, Server


With the developing measure of information, the interest of huge information stockpiling altogether increments. Through the cloud community, information suppliers can advantageously share information put away in the middle with others. Nonetheless, one basically significant issue in enormous information stockpiling is security. During the sharing system, information is encoded to be classified and mysterious. Such activity can safeguard protection from being spilled out. To fulfill the useful circumstances, information it is likewise considered to communicate with multi collectors. Besides, this work proposes the idea of pre-validation interestingly, i.e., just clients with specific credits that have as of now. The proposed Trust Shadow that gives a thoroughly safeguarded execution climate for unmodified application running on Fault Attacks - based Secure gadgets. To overcome digital assaults, Trust Shadow exploits DRAGON FLY ROUTING Trust Zone innovation and allotments assets into the solid and ordinary universes. In the protected world, Trust Shadow develops a confided in execution climate for security-basic applications. This believed climate is kept up with by a lightweight runtime framework. The runtime framework doesn't give framework administrations itself. Dragonfly networks have been broadly utilized in this superior execution PCs or very good quality servers. Issue lenient directing in dragonfly networks is fundamental. The rich interconnects give great adaptation to non-critical failure capacity to the organization. Another gridlock free versatile shortcoming lenient directing calculation in light of another two-layer wellbeing data model. That has two capacity levels and can be utilized for archive confirmation. The private level is built by supplanting the dark modules by unambiguous finished designs. Issue assaults are a known danger to get inserted executions. We propose a conventional method to recognize and respond to blame assaults on inserted programming.




How to Cite

Amsaleka, R. (2023). Fault-Tolerant Adaptive Routing in Dragonfly Networks. International Journal of Communication and Computer Technologies, 10(2), 79–87. Retrieved from https://ijccts.org/index.php/pub/article/view/179



Research Article