MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS

Similar documents
A Fast Path Recovery Mechanism for MPLS Networks

Recovery Modeling in MPLS Networks

An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks

A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks

Maximizing Restorable Throughput in MPLS Networks Reuven Cohen, Senior Member, IEEE, and Gabi Nakibly, Member, IEEE

RSVP- A Fault Tolerant Mechanism in MPLS Networks

Architecture of distributed network processors: specifics of application in information security systems

Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors

A ROUTING ALGORITHM FOR MPLS TRAFFIC ENGINEERING IN LEO SATELLITE CONSTELLATION NETWORK. Received September 2012; revised January 2013

Multi Protocol Label Switching (MPLS) is a core networking technology that

TOPOLOGIES NETWORK SECURITY SERVICES

Disjoint Path Algorithm for Load Balancing in MPLS network

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

A Fast Pattern-Matching Algorithm for Network Intrusion Detection System

International Journal of Advanced Research in Computer Science and Software Engineering

A Catechistic Method for Traffic Pattern Discovery in MANET

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

A Study of Network Security Systems

CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

MPLS Traffic Engineering in ISP Network

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

Multiple Layer Traffic Engineering in NTT Network Service

Fault-Tolerant Framework for Load Balancing System

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Shared Backup Network Provision for Virtual Network Embedding

A Simulation Study of Effect of MPLS on Latency over a Wide Area Network (WAN)

Autonomous Fast Rerouting for Software Defined Network

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Active Internet Traffic Filtering to Denial of Service Attacks from Flash Crowds

Contents. Connection Guide. What is Dante? Connections Network Set Up System Examples Copyright 2015 ROLAND CORPORATION

2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Quality of Service Routing Network and Performance Evaluation*

A Novel Approach for Load Balancing In Heterogeneous Cellular Network

Traffic protection in MPLS networks using an off-line flow optimization model

November Defining the Value of MPLS VPNs

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Traffic Engineering & Network Planning Tool for MPLS Networks

Multi-protocol Label Switching

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks

Cisco IOS Flexible NetFlow Technology

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology.

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

Redundancy Removing Protocol to Minimize the Firewall Policies in Cross Domain

Integration Guide. EMC Data Domain and Silver Peak VXOA Integration Guide

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

QoS Strategy in DiffServ aware MPLS environment

Influence of Load Balancing on Quality of Real Time Data Transmission*

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations

New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

Path Selection Analysis in MPLS Network Based on QoS

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

Fast Reroute Techniques in MPLS Networks. George Swallow

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

MPLS L2VPN (VLL) Technology White Paper

Smart Queue Scheduling for QoS Spring 2001 Final Report

Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

A New Approach to Developing High-Availability Server

NETWORK ISSUES: COSTS & OPTIONS

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Gaining Operational Efficiencies with the Enterasys S-Series

LOAD BALANCING AS A STRATEGY LEARNING TASK

SBSCET, Firozpur (Punjab), India

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Configuration Example

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

Overview: Load Balancing with the MNLB Feature Set for LocalDirector

Challenges and Approaches in Providing QoS Monitoring

Efficient File Sharing Scheme in Mobile Adhoc Network

AUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD

4 Internet QoS Management

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

A New Forwarding Policy for Load Balancing in Communication Networks

Security and QoS requirements in Telemedicine. Kevin Wang CSCI E-139

LIST OF FIGURES. Figure No. Caption Page No.

Transcription:

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai. ABSTRACT MPLS recovery mechanisms are increasing in popularity because they can guarantee fast restoration and high QoS assurance. Their main advantage is that their backup paths are established in advance, before a failure event takes place. Most research on the establishment of primary and backup paths has focused on minimizing the added capacity required by the backup paths in the network. This so-called Spare Capacity Allocation (SCA) metric is less practical for network operators who have a fixed capacitated network and want to maximize their revenues. We present a comprehensive study on restorable throughput maximization in MPLS networks. We present the first polynomial-time algorithms for the split table version of the problem. We provide a lower bound for the approximation ratio and propose an approximation algorithm with an almost identical bound. We present an efficient heuristic which is shown to have excellent performance. One of our most important conclusions is that when one seeks to maximize revenue, local recovery should be the recovery scheme of choice. Keywords: IP,LR(LOCAL RECOVERY). I. INTRODUCTION We present a comprehensive study on restorable throughput maximization in MPLS networks. We present the first polynomial-time algorithms for the split table version of the problem. We provide a lower bound for the approximation ratio and propose an approximation algorithm with an almost identical bound. We present an efficient heuristic which is shown to have excellent performance. One of our most important conclusions is that when one seeks to maximize revenue, local recovery should be the recovery scheme of choice. The IP routing protocols are not suitable for fast restoration. Using these protocols, a node first detects a failure and then disseminates routing updates to other nodes. These updates are used for calculating new paths. This process takes several seconds before proper routing of data can resume. During this time, packets Page 375

destined to some destinations may be dropped, and applications might be disrupted. Moreover, when QoS is supported, the routing protocol cannot guarantee that the alternate path will provide the same QoS as the failed one. We focus on MPLS-based protection mechanisms. However, our results are also applicable to other Layer 1 and Layer 2 protection mechanisms. MPLS terminology, we refer to the path that carries the traffic before a failure as a primary LSP, and the path that carries the traffic after the primary LSP fails as a backup LSP. Throughout the paper we consider only bandwidth guaranteed protection. For this kind of protection, the backup LSP must be able to provide the same amount of guaranteed bandwidth provided by the primary LSP. To this end, resources should be reserved upon the establishment of each backup LSP, to be used only when the protected element link or node fails. II.EXISTING SYSTEM: The IP routing protocols are not suitable for fast restoration. Using these protocols, a node first detects a failure and then disseminates routing updates to other nodes. These updates are used for calculating new paths. This process takes several seconds before proper routing of data can resume. During this time, packets destined to some destinations may be dropped, and applications might be disrupted. Moreover, when QoS is supported, the routing protocol cannot guarantee that the alternate path will provide the same QoS as the failed one. Unfortunately, failures are still common in the daily operation of networks, for reasons such as improper configuration, faulty interfaces, and accidental fiber cuts Disadvantage: It is not guarantee the destination receive the message. The primary path is failure and the intimate to other hop, so that other hops waiting for the response. Page 376

The IP routing protocol is not suitable for fast transmission. Any one hop relieve in this network and the generate the new path at the waste more time. III.PROPOSED SYSTEM: We developed two practical and efficient heuristics that were shown to achieve excellent performance. Using simulation, we compared the performance of the various MPLS recovery schemes. We showed that LR should be the scheme of choice since it has the fastest restoration time and almost the same performance as the best (UR) scheme Their main advantage is that their backup paths are established in advance, before a failure event takes place. Most research on the establishment of primary and backup paths has focused on minimizing the added capacity required by the backup paths in the network. Advantages The MPLS network overcomes the IP routing Protocols. In this network the backup path take in advance, so the failure occur in this network it is automatically take the backup and then send the message to the destination, so this network avoid waste of time. MPLS network using two techniques to transfer the message. It is guarantee the destination receive the message. The destination receives the message and then sends the acknowledgement. IV.MODULES 1. Network Construction. 2. Local recovery (LR) And Unrestricted recovery (UR) schemes. 3. Comparison Chart. Page 377

Network Construction In this module is used to construct the topology. The user enters the Hop name, IP Address and Port Number. If the Hop name and IP Address is already available in the Database to display the message box the Given Hop already available, otherwise to display the message box Hop add successfully. The user adds all Hops to click the complete button to display Connection Frame. In this frame to connect the two Hops. The user connects the Hop at the time network cost or distance is automatically generated and update in to the database. User connects the hop unidirectional or bidirectional links. Local recovery (LR) And Unrestricted recovery (UR) schemes In this module is used to transfer the message from source to the destination. The Source hop first selects the destination and takes the primary path. Primary path means which path is a small cost that is the primary path. Browse the message or type the message and select the techniques that is unrestricted or Local recovery schemes. Send button used to send the message to the selected destination at the time to check the primary path hop available in the network or not. If the primary hop path available in the network available in the network it directly transfer the message to the destination path otherwise if any primary hop not available in the network at time to select the backup path and then send the message. How to select the backup path means based on the throughput. If path is failure means to select the alternative path using MPLS network. Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. Page 378

The implementation stage involves careful planning, investigation of the existing system and it s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Implementation is the process of converting a new system design into operation. It is the phase that focuses on user training, site preparation and file conversion for installing a candidate system. The important factor that should be considered here is that the conversion should not disrupt the functioning of the organization. The implementation can be preceded through Socket in java but it will be considered as one to all communication.for proactive broadcasting we need dynamic linking. So java will be more suitable for platform independence and networking concepts. For maintaining route information we go for SQL-server as database back end. The main objective of efficient broadcasting algorithms is to reduce the number of broadcasting. The proposed system implements the 1-hop and 2 or more hop. The proposed system using the efficient broadcasting algorithm and guarantee full delivery of the project. V. CONCLUSIONS The Internet serves an extremely large number of users with an even larger number of motivations, all attempting to simultaneously share widely distributed resources. Most importantly, there exists no single arbiter who can make informed access decisions. Moreover, we believe that much of the complexity of Internet routing policy stems from inflexibility of existing routing protocols. We aim to study how one might implement inter-as traffic engineering policies through capability pricing strategies. For example, an AS with multiple peering routers that wishes to encourage load balancing may be able to do so through variable pricing of capabilities for the corresponding Platypus waypoints. Page 379

Powered by TCPDF (www.tcpdf.org) International Journal of Advanced Research in While properly modeling the self-interested behavior of external entities may be difficult, we are hopeful that this challenge is simplified by the direct mapping between Platypus waypoints and path selection. VI. REFERENCES [1] Chieh-Jen Cheng, Chao-Ching Wang, Wei-Chun Ku, Tien-Fu Chen, and Jinn- Shyan Wang, Scalable High-Performance Virus Detection Processor Against a Large Pattern Set for Embedded Network Security Commun. vol. 51, pp. 62 70,2011. [2] O. Villa, D. P. Scarpazza, and F. Petrini, Accelerating real-time string searching with multicore processors, Computer, vol. 41, pp. 42 50,2008. [3] D. P. Scarpazza, O. Villa, and F. Petrini, High-speed string searching against large dictionaries on the Cell/B.E. processor, in Proc. IEEE Int. Symp. Parallel Distrib. Process., 2008, pp. 1 8. [4] D. P. Scarpazza, O. Villa, and F. Petrini, Peak-performance DFA based string matching on the Cell processor, in Proc. IEEE Int. Symp. Parallel Distrib. Process., 2007, pp. 1 8. [5] L. Tan and T. Sherwood, A high throughput string matching architecture for intrusion detection and prevention, in Proc. 32nd Annu. Int. Symp. Comput. Arch., 2005, pp. 112 122. [6] S. Dharmapurikar, P. Krishnamurthy, and T. S. Sproull, Deep packet inspection using parallel bloom filters, IEEE Micro, vol. 24, no. 1, pp.52 61, Jan. 2004. [7] R.-T. Liu, N.-F. Huang, C.-N. Kao, and C.-H. Chen, A fast string matching algorithm for network processor-based intrusion detection system, ACMTrans. Embed. Comput. Syst., vol. 3, pp. 614 633, 2004. [8] F. Yu, R. H. Katz, and T. V. Lakshman, Gigabit rate packet pattern matching using TCAM, in Proc. 12th IEEE Int. Conf. Netw. Protocols, 2004, pp. 174 178.intrusion detection system, ACMTrans. Embed. Comput. Syst., vol. 3, pp. 614 633, 2004. Page 380