A Modern Dynamic Packet Generation Technique for Network Architecture M.V.B Chandra Sekhar B.Ramesh

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 2- May 2016
A Modern Dynamic Packet Generation Technique for
Network Architecture
1
Jarugulla Aswani, 2 M.V.B Chandra Sekhar , 3 B.Ramesh
1
M.Tech Scholar, 2 Associate Professor , 3 Assistant Professor
1,2,3
Department of Computer Science And Engineering,AITAM, Tekkali, Srikakulam(India)
Abstract: We are proposing a network model monitoring
system which constructs a small network of nodes and some
switches or routers virtually. Every node runs at some
physical location that is port number and data packet can be
transmitted between the nodes, topology can be defined by
router, so during the data transmission nodes should satisfy
the rules like forward rule, link rule and drop rule, these rules
can be applied verified with respect to packet headers at any
point. Traditional way of command line communication may
not give optimal results and topology construction is the
major factor while transmission of data packets and the main
disadvantages are Monitoring the network with regular
command is complex we are improving the topology work
with parameters of signal strength and channel capacity.
I. INTRODUCTION
Systems are getting bigger and more perplexing, yet
overseers depend on simple devices, for example, ping and
traceroute to investigate issues. We propose a robotized and
precise methodology for testing and investigating systems
called "Programmed Test Packet Generation" (ATPG).
ATPG peruses switch setups and creates a gadget
autonomous model. The model is utilized to create a base
arrangement of test bundles to (negligibly) practice each
connection in the system or (maximally) work out each
principle in the system [1][2]. Test parcels are sent
occasionally, and recognized disappointments trigger a
different system to restrict the deficiency. ATPG can identify
both useful (e.g., off base firewall principle) and execution
issues (e.g., congested line). ATPG supplements yet goes
past prior work in static checking (which can't recognize
liveness or execution blames) or blame confinement (which
just restrict issues given liveness results). We portray our
model ATPG execution and results on two genuine
information sets: Stanford University's spine system and
Internet2. We find that a little number of test parcels suffices
to test all guidelines in these systems: For instance, 4000
ISSN: 2231-5381
parcels can cover all guidelines in Stanford spine system,
while 54 are sufficient to cover all connections. Sending
4000 test parcels 10 times each second expends under 1% of
connection limit. ATPG code and the information sets are
freely accessible [3].
Test Packet Generator:
The test bundle generator, written in Python,
contains a Cisco IOS arrangement parser and a Juniper Junos
parser. The data plane data, including switch designs, FIBs,
MAC learning tables, and system topologies, is gathered and
parsed through the charge line interface (Cisco IOS) or XML
documents . The generator then uses the Hassel header space
examination library to develop switch and topology
capacities.
All-sets reachability is figured utilizing the parallelpreparing module delivered with Python. Every procedure
considers a subset of the test ports and discovers all the
reachable ports from every one. After reachability tests are
finished, results are gathered, and the expert procedure
executes the Min- Set-Cover calculation. Test parcels and the
arrangement of tried principles are put away in a SQLite
database [4].
The way blast issue has rather gotten more
consideration. Likewise to the hunt heuristics introduced,
look methodologies proposed in the past incorporate Best
First Search, Generational Seek, and Hybrid Concolic
Testing. Orthogonal to inquiry heuristics, specialists have
tended to the way blast problem by testing ways
compositionally and by following the qualities read and
composed by the system.
The long haul objective of our work is to have the
capacity to take a self-assertive program and routinely get
90%+ code scope, pounding it under experiments that
http://www.ijettjournal.org
Page 50
International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 2- May 2016
investigate all fascinating ways with every single intriguing
worth. While there is still a long approach to achieve this
objective, the outcomes in this paper demonstrate that the
methodology can get high code scope over a wide scope of
genuine applications, scope that surpassed that of an
excellent, manual test suites developed incrementally over a
time of 15 years, and also finding bugs that had been around
over 10 years. The strategies we depict ought to function
admirably with different devices and give comparative help
in taking care of a wide class of utilizations[5].
II. RELATED WORK
Even though various traditional approaches
proposed by various researchers from years of research,
every work has its own advantages and disadvantages.
Network monitoring is always a complex task to identify the
issue of the node or data failure, Complex to identify the
issue node, Simple weight metrics may not give the optimal
path and no rule based approach for failure of nodes
We introduce another typical execution apparatus,
KLEE, fit of naturally creating tests that accomplish high
scope on a differing set of complex and naturally serious
projects. We connected KLEE to each of the 90 programs in
the GNU COREUTILS utility suite, which frame the center
client level environment introduced on all Unix frameworks
and, in that capacity, speak to a few of the most intensely
utilized and tried open-source programs in presence. For 84%
of these utilities, KLEE's naturally created tests secured 80–
100% of executable articulations and, in total, fundamentally
beat the scope of the designers' own particular written by
hand test suites. KLEE additionally discovered nine genuine
bugs (counting three that had been missed for more than 15
years!) and created solid inputs that set off the blunders when
run on the uninstrumented code [6][7]. At the point when
connected to MINIX's adaptations of a little choice of the
same applications, KLEE accomplished comparable scope
(alongside two bugs). What's more, we additionally utilized
KLEE to consequently discover various off base contrasts
between a few MINIX and COREUTILS devices. At long
last, we checked the piece of the HISTAR working
framework, producing tests that accomplished 76.4%
(without paging empowered) and 67.1% scope (with paging)
and discovered one imperative security bug.
ISSN: 2231-5381
We display another typical execution device, KLEE,
which we composed without any preparation to be vigorous
and to profoundly check a wide scope of utilizations. We
utilized quite a long while of lessons from our past apparatus,
EXE. KLEE employments novel imperative unraveling
advancements that enhance execution by over a request of
greatness and let it handle numerous projects that are totally
immovable generally. Its space-productive representation of a
checked way implies it can have tens to a huge number of
such ways dynamic all the while. Its pursuit heuristics
successfully select from these huge arrangements of ways to
get high code scope. Its basic, direct way to deal with taking
care of the earth let it check a wide scope of framework
escalated programs [9].
System Monitor:
The system screens expect there are exceptional test
operators in the system that can send/get test bundles. The
system screen peruses the database and develops test bundles
and trains every specialists to send the suitable bundles.
Presently, test operators separate test parcels by IP Proto field
and TCP/UDP port number, however different fields, for
example, IP alternative, can likewise be utilized. On the off
chance that a portion of the tests fall flat, the screen chooses
extra test parcels from saved bundles to pinpoint the issue.
The process rehashes until the issue has been recognized. The
screen utilizes JSON to speak with the test operators, and
employments SQLite's string coordinating to lookup test
parcels productively [8][10].
III. PROPOSED WORK
We are proposing an empirical simulation model for network
monitoring which shows efficient path construction in terms
of signal strength and channel capacity and verifies three
rules at every node while transmission of packets and updates
the status to log. It in turn we can identify the status of the
path (whether it is passing the packets though node or port
number that is Forwarding rule) and verify the data packet
transmission without header change that is Link rule and
identifies the failure of packets at each node by the
acknowledgement from last node that is drop rule.
The main advantages with proposed system is Routing
implementation through signal strength and channel capacity
gives optimal path , rule based verification gives efficient
http://www.ijettjournal.org
Page 51
International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 2- May 2016
nodes failure acknowledgment and no need to ping the
network multiple times for node failure status
In node communication establishment module we
construct a general node to node communication through the
socket programming, Every node can communicate with each
other .data packet can be transmitted from source node to
destination node, each node acts as server, it can accept the
any connection and receives the data packets from any other
node and transmits the data packets to other nodes
Evolutionary approach for efficient cooperative
communication over nodes in network with the parameters
channel capacity and signal strength, it leads to the
communication cost between the nodes, here our approach
finds the optimal communication cost by applying the
process of path selection operation between the nodes, again
calculate the communication cost between the source and
destination nodes followed by relay nodes
To identify the correct routing and identify the failures while
transmission of data at port ends we are following rules like
forwarding rule, link rule and drop rule.
Forwarding Rule: A forwarding rule is behaving correctly if a
test packet exercises the rule and leaves on the correct port
with the correct header.
Link Rule: A link rule is a special case of a forwarding rule.
It can be tested by making sure a test packet passes correctly
over the link without header modifications.
Drop Rule: Testing drop rules is harder because we must
verify the absence of received test packets. We need to know
which test packets might reach an egress test terminal if a
drop rule was to fail
Input: Forward-rule set {Id, Snode, sport, dnode, dport,
P_size, packets, staus}
Output: Frule-Status, Lrule-Status-list, D-rule_Status
Cost model algorithm:
Step 1: initiate monitor thread
Obtains the optimal path which has the best communication
cost and transmits the data over the path.
Step1: Initially Source node selects the destination to
transmit data packets
Step2:
For (int i=0;i<total.no.ofnodes;i++)
If(Header(Node[i])1=Header(Node[i+1]))
Step2: Request received by the processing module and
generates the paths in topology
Begin
fruleStatus[i]=false;
Step3: The Processing module computes the path with their
signal strength and channel capacity
return Frule-Status[i];
Step4: Compute communication cost with signal strength
and channel capacity for fitness
Communication cost = Signal strength + channel capacity
Step5: select optimal path (optimal communication cost) and
transmits the data.
end
end If
Next
Step3:
For(int i=0;i<frule.length;i++)
If(S==fail)
Rules Verification:
Update node[i] status at monitor
Set Lrule-status-list[i]=true;
ISSN: 2231-5381
http://www.ijettjournal.org
Page 52
International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 2- May 2016
Next;
Monitoring console always maintains the process which
receives the path computed between source node and
destination node in terms of signal strength and channel
capacity, path forwarded to processing console by router and
every port end acknowledgement can be received, no need to
user pass commands to check the status, so even though
failure occurs at particular node, it can be identified in this
console and all rule verification status can be acknowledged
here.
Step4:
If(frules=true &Lrule=true)
begin
Acknowledge(Node[i]=true)
Drule=false;
Experimental Analysis:
end
For experimental analysis we implemented our
proposed mechanism in Java platform with some static
number of nodes, communicates through socket
programming. Every node initially make a request for
optimal path in terms of signal strength and channel capacity
for cost computation as follows
end if
Else
Drule=true;
Step 5: exit
8
7
6
5
Weight Based
4
Packet Generation Model
3
Proposed Model
2
1
0
Time complexity
Reliability
Our experimental results shows efficient
results than the traditional approaches in terms of route
computation and auto verification of the rules for
identification of failures of node or data packet, we compared
the paths and time complexity generated by various factors
like weight computation, data rating computation and our
proposed approaches, Our proposed results shows efficient
results than the previous approaches as follows and Time
complexity reduced than the traditional approaches, rate of
ISSN: 2231-5381
Node failure Identification
success rate is more and improves the performance by
reducing response time.
IV.CONCLUSION
We have been concluding our research work with efficient
cache node failure verification with dynamic verification
model with rules integration to verify the packet delivery and
node failures at every intermediate level data transmission
and routing protocol based on signal strength and channel
capacity for calculation of communication cost. Our primary
http://www.ijettjournal.org
Page 53
International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 2- May 2016
factors give optimal performance than the traditional
approaches and improve the performance by reducing the
response time of the requested node and identify the node
failures dynamically.
REFERENCES
[1]”Distributed Cooperative Caching in Social Wireless
Networks,” Mahmoud Taghizadeh, Kristopher Micinski,
Charles Ofria, Eric Torng, and Subirbiswas
[2]Improving On-Demand Data Access Efficiency in
MANETS with Cooperative Caching by yu du
[3] A Survey of Web Cache Replacement Strategies
Stefan Podlipnig and Laszlo Bo_Sz_Rnenyi
[4] A. Chankhunthod and P.B.Danzig and C. Neerdaels and
M. F. Schwartz and K. J. worrell, “a hierarchical internet
object cache," in usenix annual technical conference,
1996.98
[5] l. Fan and P. Cao and J. Almeida and A. Z. Broder,
“summary cache: a scalable wide-area web cache sharing
protocol," IEEE/ACM Transactions on networking, vol. 8,
no. 3, pp. 281{293, 2000.
[6] C. Cadar, D. Dunbar, and D. Engler, “Klee: Unassisted
and automatic generation of high-coverage tests for complex
systems programs,” in Proc. OSDI, Berkeley, CA, USA,
2008, pp. 209–224.
[7] M. Canini, D. Venzano, P. Peresini, D. Kostic, and J.
Rexford, “A NICE way to test Open Flow applications,” in
Proc. NSDI, 2012, pp. 10–10.
[8] A. Dhamdhere, R. Teixeira, C. Dovrolis, and C. Diot,
“Netdiagnoser: Troubleshooting network unreachabilities
using end-to-end probes and routing data,” in Proc. ACM
CoNEXT, 2007, pp. 18:1–18:12..
[9] N. Duffield, “Network tomography of binary network
performance characteristics,” IEEE Trans. Inf. Theory, vol.
52, no. 12, pp. 5373–5388, Dec. 2006.
[10] Automatic Test Packet Generation
by Hongyi
Zeng, Peyman Kazemian, George Varghese, Member
and Nick McKeown
ISSN: 2231-5381
http://www.ijettjournal.org
Page 54
Download