12
Computer Science & Engineering

Secure and Policy Compliant Source Routing

  • Upload
    pssumi2

  • View
    118

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Secure and Policy Compliant Source Routing

Computer Science & Engineering

Page 2: Secure and Policy Compliant Source Routing

To avoid the default path and take the alternative path to find out the traffic of source to destination

OBJECTIVEOBJECTIVE

Computer Science & Engineering

Page 3: Secure and Policy Compliant Source Routing

Today’s wide-area Internet routing does not realize the full potential of the existing network infrastructure in terms of performance, reliability or flexibility

Today’s primary wide area routing protocol, BGP have a great difficult in managing Autonomous systems (ASes)

Disadvantages:Because ASes express their local routing policy during BGP

route advertisement by affecting the routes that are chosen and exported to neighbors

ISPs struggle to understand and configure their networks while end users are left to wonder why end-to-end connectivity is so poor

Large memory, processing, and message-passing overhead, dependent on behavior in other ASes

EXISTING SYSTEMEXISTING SYSTEM

Computer Science & Engineering

Page 4: Secure and Policy Compliant Source Routing

To separate the issues of connectivity discovery and path selection

Our source routing system can be used to implement efficient overlay forwarding, select among multiple ingress/egress routers

Advantages:To increase the end-end performanceISPs to verify the policy-compliance of traffic.

It provide authenticating source routed packets

PROPOSED SYSTEMPROPOSED SYSTEM

Computer Science & Engineering

Page 5: Secure and Policy Compliant Source Routing

Network CreationPeer LoginFind TrafficMessage Transmission

MODULESMODULES

Computer Science & Engineering

Page 6: Secure and Policy Compliant Source Routing

NETWORK CREATIONNETWORK CREATIONEnter the Peer Name,IP Addr and Port No

Check the peer already available

Enter the Correct Peer details

Successfully updateDB

DBConnecting the peers

YesNo

Computer Science & Engineering

Page 7: Secure and Policy Compliant Source Routing

PEER LOGINPEER LOGIN

Enter the Peer Name,IP Addr and port No

Check these Peer details

in DB

This peer details not in DB

Successfully Login the Peer

TrueFalse

Computer Science & Engineering

Page 8: Secure and Policy Compliant Source Routing

FIND TRAFFICFIND TRAFFIC

Select the Best Path

Check the Traffic of each path

Select the alternative path

Computer Science & Engineering

Page 9: Secure and Policy Compliant Source Routing

MESSAGE TRANSMISSIONMESSAGE TRANSMISSION

Enter the temporal key

Bind the IP Address

Stamp and forward to the next peer

Enter the temporal key

Enter the Master key

Decrypt the Message

Encrypt the message

Msg Transmit to the selected waypoint

YesIf check the Destination

No

Computer Science & Engineering

Page 10: Secure and Policy Compliant Source Routing

Msg TranmissionCreate peer

Encryption

Select the Best path

Check if it is Destination

Decryption

Stamp and forward to next peer

Connecting Peer

Secure and policy compliant source routing

Check the traffic of each path

Find default path and alternative path

Computer Science & Engineering

Fig: System Architecture

Page 11: Secure and Policy Compliant Source Routing

Much of the complexity of Internet routing policy stems from inflexibility of existing routing protocols

CONCLUSIONCONCLUSION

Computer Science & Engineering

Page 12: Secure and Policy Compliant Source Routing

Computer Science & Engineering