MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai. ABSTRACT MPLS recovery mechanisms are increasing in popularity because they can guarantee fast restoration and high QoS assurance. Their main advantage is that their backup paths are established in advance, before a failure event takes place. Most research on the establishment of primary and backup paths has focused on minimizing the added capacity required by the backup paths in the network. This so-called Spare Capacity Allocation (SCA) metric is less practical for network operators who have a fixed capacitated network and want to maximize their revenues. We present a comprehensive study on restorable throughput maximization in MPLS networks. We present the first polynomial-time algorithms for the split table version of the problem. We provide a lower bound for the approximation ratio and propose an approximation algorithm with an almost identical bound. We present an efficient heuristic which is shown to have excellent performance. One of our most important conclusions is that when one seeks to maximize revenue, local recovery should be the recovery scheme of choice. Keywords: IP,LR(LOCAL RECOVERY). I. INTRODUCTION We present a comprehensive study on restorable throughput maximization in MPLS networks. We present the first polynomial-time algorithms for the split table version of the problem. We provide a lower bound for the approximation ratio and propose an approximation algorithm with an almost identical bound. We present an efficient heuristic which is shown to have excellent performance. One of our most important conclusions is that when one seeks to maximize revenue, local recovery should be the recovery scheme of choice. The IP routing protocols are not suitable for fast restoration. Using these protocols, a node first detects a failure and then disseminates routing updates to other nodes. These updates are used for calculating new paths. This process takes several seconds before proper routing of data can resume. During this time, packets Page 375
destined to some destinations may be dropped, and applications might be disrupted. Moreover, when QoS is supported, the routing protocol cannot guarantee that the alternate path will provide the same QoS as the failed one. We focus on MPLS-based protection mechanisms. However, our results are also applicable to other Layer 1 and Layer 2 protection mechanisms. MPLS terminology, we refer to the path that carries the traffic before a failure as a primary LSP, and the path that carries the traffic after the primary LSP fails as a backup LSP. Throughout the paper we consider only bandwidth guaranteed protection. For this kind of protection, the backup LSP must be able to provide the same amount of guaranteed bandwidth provided by the primary LSP. To this end, resources should be reserved upon the establishment of each backup LSP, to be used only when the protected element link or node fails. II.EXISTING SYSTEM: The IP routing protocols are not suitable for fast restoration. Using these protocols, a node first detects a failure and then disseminates routing updates to other nodes. These updates are used for calculating new paths. This process takes several seconds before proper routing of data can resume. During this time, packets destined to some destinations may be dropped, and applications might be disrupted. Moreover, when QoS is supported, the routing protocol cannot guarantee that the alternate path will provide the same QoS as the failed one. Unfortunately, failures are still common in the daily operation of networks, for reasons such as improper configuration, faulty interfaces, and accidental fiber cuts Disadvantage: It is not guarantee the destination receive the message. The primary path is failure and the intimate to other hop, so that other hops waiting for the response. Page 376
The IP routing protocol is not suitable for fast transmission. Any one hop relieve in this network and the generate the new path at the waste more time. III.PROPOSED SYSTEM: We developed two practical and efficient heuristics that were shown to achieve excellent performance. Using simulation, we compared the performance of the various MPLS recovery schemes. We showed that LR should be the scheme of choice since it has the fastest restoration time and almost the same performance as the best (UR) scheme Their main advantage is that their backup paths are established in advance, before a failure event takes place. Most research on the establishment of primary and backup paths has focused on minimizing the added capacity required by the backup paths in the network. Advantages The MPLS network overcomes the IP routing Protocols. In this network the backup path take in advance, so the failure occur in this network it is automatically take the backup and then send the message to the destination, so this network avoid waste of time. MPLS network using two techniques to transfer the message. It is guarantee the destination receive the message. The destination receives the message and then sends the acknowledgement. IV.MODULES 1. Network Construction. 2. Local recovery (LR) And Unrestricted recovery (UR) schemes. 3. Comparison Chart. Page 377
Network Construction In this module is used to construct the topology. The user enters the Hop name, IP Address and Port Number. If the Hop name and IP Address is already available in the Database to display the message box the Given Hop already available, otherwise to display the message box Hop add successfully. The user adds all Hops to click the complete button to display Connection Frame. In this frame to connect the two Hops. The user connects the Hop at the time network cost or distance is automatically generated and update in to the database. User connects the hop unidirectional or bidirectional links. Local recovery (LR) And Unrestricted recovery (UR) schemes In this module is used to transfer the message from source to the destination. The Source hop first selects the destination and takes the primary path. Primary path means which path is a small cost that is the primary path. Browse the message or type the message and select the techniques that is unrestricted or Local recovery schemes. Send button used to send the message to the selected destination at the time to check the primary path hop available in the network or not. If the primary hop path available in the network available in the network it directly transfer the message to the destination path otherwise if any primary hop not available in the network at time to select the backup path and then send the message. How to select the backup path means based on the throughput. If path is failure means to select the alternative path using MPLS network. Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. Page 378
The implementation stage involves careful planning, investigation of the existing system and it s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Implementation is the process of converting a new system design into operation. It is the phase that focuses on user training, site preparation and file conversion for installing a candidate system. The important factor that should be considered here is that the conversion should not disrupt the functioning of the organization. The implementation can be preceded through Socket in java but it will be considered as one to all communication.for proactive broadcasting we need dynamic linking. So java will be more suitable for platform independence and networking concepts. For maintaining route information we go for SQL-server as database back end. The main objective of efficient broadcasting algorithms is to reduce the number of broadcasting. The proposed system implements the 1-hop and 2 or more hop. The proposed system using the efficient broadcasting algorithm and guarantee full delivery of the project. V. CONCLUSIONS The Internet serves an extremely large number of users with an even larger number of motivations, all attempting to simultaneously share widely distributed resources. Most importantly, there exists no single arbiter who can make informed access decisions. Moreover, we believe that much of the complexity of Internet routing policy stems from inflexibility of existing routing protocols. We aim to study how one might implement inter-as traffic engineering policies through capability pricing strategies. For example, an AS with multiple peering routers that wishes to encourage load balancing may be able to do so through variable pricing of capabilities for the corresponding Platypus waypoints. Page 379
Powered by TCPDF (www.tcpdf.org) International Journal of Advanced Research in While properly modeling the self-interested behavior of external entities may be difficult, we are hopeful that this challenge is simplified by the direct mapping between Platypus waypoints and path selection. VI. REFERENCES [1] Chieh-Jen Cheng, Chao-Ching Wang, Wei-Chun Ku, Tien-Fu Chen, and Jinn- Shyan Wang, Scalable High-Performance Virus Detection Processor Against a Large Pattern Set for Embedded Network Security Commun. vol. 51, pp. 62 70,2011. [2] O. Villa, D. P. Scarpazza, and F. Petrini, Accelerating real-time string searching with multicore processors, Computer, vol. 41, pp. 42 50,2008. [3] D. P. Scarpazza, O. Villa, and F. Petrini, High-speed string searching against large dictionaries on the Cell/B.E. processor, in Proc. IEEE Int. Symp. Parallel Distrib. Process., 2008, pp. 1 8. [4] D. P. Scarpazza, O. Villa, and F. Petrini, Peak-performance DFA based string matching on the Cell processor, in Proc. IEEE Int. Symp. Parallel Distrib. Process., 2007, pp. 1 8. [5] L. Tan and T. Sherwood, A high throughput string matching architecture for intrusion detection and prevention, in Proc. 32nd Annu. Int. Symp. Comput. Arch., 2005, pp. 112 122. [6] S. Dharmapurikar, P. Krishnamurthy, and T. S. Sproull, Deep packet inspection using parallel bloom filters, IEEE Micro, vol. 24, no. 1, pp.52 61, Jan. 2004. [7] R.-T. Liu, N.-F. Huang, C.-N. Kao, and C.-H. Chen, A fast string matching algorithm for network processor-based intrusion detection system, ACMTrans. Embed. Comput. Syst., vol. 3, pp. 614 633, 2004. [8] F. Yu, R. H. Katz, and T. V. Lakshman, Gigabit rate packet pattern matching using TCAM, in Proc. 12th IEEE Int. Conf. Netw. Protocols, 2004, pp. 174 178.intrusion detection system, ACMTrans. Embed. Comput. Syst., vol. 3, pp. 614 633, 2004. Page 380