Upload
pssumi2
View
118
Download
1
Tags:
Embed Size (px)
Citation preview
Computer Science & Engineering
To avoid the default path and take the alternative path to find out the traffic of source to destination
OBJECTIVEOBJECTIVE
Computer Science & Engineering
Today’s wide-area Internet routing does not realize the full potential of the existing network infrastructure in terms of performance, reliability or flexibility
Today’s primary wide area routing protocol, BGP have a great difficult in managing Autonomous systems (ASes)
Disadvantages:Because ASes express their local routing policy during BGP
route advertisement by affecting the routes that are chosen and exported to neighbors
ISPs struggle to understand and configure their networks while end users are left to wonder why end-to-end connectivity is so poor
Large memory, processing, and message-passing overhead, dependent on behavior in other ASes
EXISTING SYSTEMEXISTING SYSTEM
Computer Science & Engineering
To separate the issues of connectivity discovery and path selection
Our source routing system can be used to implement efficient overlay forwarding, select among multiple ingress/egress routers
Advantages:To increase the end-end performanceISPs to verify the policy-compliance of traffic.
It provide authenticating source routed packets
PROPOSED SYSTEMPROPOSED SYSTEM
Computer Science & Engineering
Network CreationPeer LoginFind TrafficMessage Transmission
MODULESMODULES
Computer Science & Engineering
NETWORK CREATIONNETWORK CREATIONEnter the Peer Name,IP Addr and Port No
Check the peer already available
Enter the Correct Peer details
Successfully updateDB
DBConnecting the peers
YesNo
Computer Science & Engineering
PEER LOGINPEER LOGIN
Enter the Peer Name,IP Addr and port No
Check these Peer details
in DB
This peer details not in DB
Successfully Login the Peer
TrueFalse
Computer Science & Engineering
FIND TRAFFICFIND TRAFFIC
Select the Best Path
Check the Traffic of each path
Select the alternative path
Computer Science & Engineering
MESSAGE TRANSMISSIONMESSAGE TRANSMISSION
Enter the temporal key
Bind the IP Address
Stamp and forward to the next peer
Enter the temporal key
Enter the Master key
Decrypt the Message
Encrypt the message
Msg Transmit to the selected waypoint
YesIf check the Destination
No
Computer Science & Engineering
Msg TranmissionCreate peer
Encryption
Select the Best path
Check if it is Destination
Decryption
Stamp and forward to next peer
Connecting Peer
Secure and policy compliant source routing
Check the traffic of each path
Find default path and alternative path
Computer Science & Engineering
Fig: System Architecture
Much of the complexity of Internet routing policy stems from inflexibility of existing routing protocols
CONCLUSIONCONCLUSION
Computer Science & Engineering
Computer Science & Engineering