International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 1 - May 2014 Enhancement in Path Diversity Technique in Inter Domain Routing Using Border Gateway Protocol Sumit Angrish1, Gunjan Gandhi2 Department of Electronics and Communication Engineering Lovely Professional University Phagwara, India Abstract: In the Internet there are many autonomous network like base stations is required. Nodes within systems. To communicate with the other autonomous each other radio range communicate directly via system BGP is required. As BGP does not incorporate wireless links while these which are far apart rely on measures of round trip time into destination. The other nodes to relay messages. All the nodes act as Border Gateway Protocol (BGP) is a routing protocol router in adhoc network. Mobile Ad hoc Network is a designed for inter-autonomous systems that uses TCP mobile multi-hop which is wireless distributed sessions. In our work we will proposed a novel technique that helps to establish a path between source and destination in two Autonomous systems which incorporates a inter domain routing and find the network and self-organized in nature. MANET is the type of the adhoc network. The primary objective of routing protocol is to discover the route. The routing alternate path to reach the destination when congestion protocol for MANET undertakes to setup and will occur. maintain routes between nodes. In MANET, constantly changing network topology causes link Key Words: Autonomous Systems (AS), Path breakage and invalidation of end-to-end route. The diversity, Border gateway protocol (BGP), Inter highly dynamic nature of wireless network imposes domain routing. severe restrictions on routing protocols. There are mainly two types of routing protocol available. These I. Introduction are as following: Wireless Networks term is refers to a kind of 1. Proactive Routing Protocol ( Table-driven) networking that do not requires cables to connect 2. Reactive Routing Protocol (On- demand) with devices during communication. Ad hoc network 3. Hybrid is a decentralized type of wireless network. There is no pre-existing infrastructure such as routers in wired Proactive protocol contains fresh list of the route and networks or access points in wireless networks on their destination from source if the topology which it is depended. Ad-hoc networks are a new frequently standard of wireless communication for mobile hosts. propagate to every node of the network and update Basically it’s a network which is used in urgent table like DSDV, WRP etc. Reactive protocol is on- situation causes [5]. No fixed infrastructure in ad hoc demand protocol. It is lazy approach in which all the ISSN: 2231-5381 changes http://www.ijettjournal.org than update information Page 10 International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 1 - May 2014 node are not contains the information of the all the This research makes two important contributions. nodes and maintains table only on demand. To find First, the source node does not need to maintain a the path route discovery process is follow [9]. map of the overall network; therefore the SPDA Reactive routing protocols are bandwidth efficient. In overcomes the scalability problem in source routing. this, routes are built as and when they are required Second, the average end-to-end delay can be reduced like AODV, TORA etc. Hybrid is the combination of by forwarding the packets over the best and alternate both reactive and proactive protocol like ZRP. The paths concurrently. Simulation results demonstrate Border Gateway Protocol (BGP)[6] is an inter that the proposed approach reduces average end-to- autonomous system routing protocol. An autonomous end delay and the average packet loss rate, while system is a network or group of networks under a increasing average throughput. Multipath inter- common administration and with common routing domain policies. routing path(MIR-DPP) [3], which constructs a set of paths information for the Internet and is the protocol used that can be flexibly selected by end users. The MIR- between Internet service providers (ISP). DPP supports user flexible route choice which gives BGP is used to exchange routing via deviation from primary users the ability to choose routes and has potential of II. fostering ISP competition to offer the value-added Related Work: service and improving end-to-end performance and In previous papers inter-domain routing is based on reliability. The cluster based scheme to remove BGP-4[1] which does not allow for the use of congestion in wireless mesh Network [4]. When multiple paths, but rather selects a single path per available are less and demand of resources are more destination prefix. Inter-Domain Route Diversity than congestion occurs. To solve the problem of (IDRD) as a mechanism which allows for diverse congestion clustering scheme is proposed. All the inter-domain paths to be propagated among carriers nodes choose their cluster head and all the nodes and used for packet forwarding. The proposal is share their resource with the cluster head. aimed to be efficient, backwards compatible, and incrementally deployable. Their extensive evaluation III. Proposed Method: of path disjointness in the Internet connectivity graph illustrates the potential benefits of IDRD. While the evaluation shows that the traditional “prefer customer” rule heavily impedes the use and propagation of the underlying diversity, it also demonstrates that our proposed relaxation of the multipath route selection policy enables near-optimal utilization of the underlying path diversity in the real Internet inter-domain topology. The SPDA [2] uses source routing to find an alternate path from a source node to a destination node, and allows for a flexible division of traffic over the best and alternate paths. The mobile nodes are deployed in the fixed area. The whole network is divided into the fixed size clusters and cluster heads are chosen with the use of BGP protocol. It is assumed in the clusters the same protocol is used for the communication and it will follow the rules of the intra communication. For the inter cluster communication, BGP protocol is used. The path between the source and destination which are on the different cluster heads are selected with the use of route request packets and route packets. In the simulation, we show that the on the selected route the congestion will occur and due to the congestion ISSN: 2231-5381 http://www.ijettjournal.org Page 11 International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 1 - May 2014 packet loss will be there on the selected route IV. Results and Simulations: between source and destination. To overcome the problem of congestion, the diversity technique is been used in the base paper. In the diversity technique, the source selects the alternative paths between source and destination. When the network performance degrades to a threshold value other possible path is selected for communication. We will enhance the efficiency of the diversity technique in which while selected the alternative path, the technique of neural network is applied. In such a technique, the source learns from the path experiences and on the basis of path route records the alternative paths are selected between source and destination. Graph 1: Packet Losss Figure 3.1. Proposed Method Graph 2 : Energy Consumption As illustrate in Graph1. red line shows old packet loss in a network and green new packet loss in a network. It indicates that with new proposed technique packet loss is less as compare to existing ISSN: 2231-5381 http://www.ijettjournal.org Page 12 International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 1 - May 2014 technique. In graph 1 red line shows new energy consumption and green line shows old energy consumption. Red line is lower than green line which indicates that new proposed technique is less energy consumption as compared to an old technique. [8] Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, “An Overview of Mobile Ad Hoc Networks: Applications and Challenges” ,2005 [9] sunil Taneja, Dr. Ashwani Kush, Amandeep Makkar, “End to End Delay Analysis of Prominent On-demand Routing Protocols”, IJCST Vol. 2, Issue1, March 2011. V. Conclusion In this paper, we conclude that BGP Protocol used for the inter-domain communication. The gateway nodes maintain the routing tables for intra-domain communication. This reduces the network efficiency due to node movement. In this paper, we propose enhancement in BGP to inter-domain clustering. The simulation results show that proposed enhancement performance well in the simulated environment. ACKNOWLEDGMENT I hereby thanks and acknowledge this work to all my teachers, who helps me to complete this work and also I will thanks to my parents who gave me all their support to complete my work. References [1] Xavier Misseri “IDRD: Enabling Inter-Domain Route Diversity”, IEEE 2013 [2] Y.-P. Shieh W.-H. Hsu , “Simple path diversity algorithm for inter-domain routing”, IEEE, 2011 [3] Donghong Qin, “Multipath Inter-domain Routing via Deviation from Primary Path” Volume 1 No. 6, October 2011 ISSN-22234985 International Journal of Information and Communication Technology Research [4] Adebanjo Adekiigbe and Kamalrulnizam Abu Bakar “Development of a Routing Framework for a Cluster-Based Congestion Avoidance and Load Balancing Algorithm for IEEE802.11s Mesh Network” Research Journal of Applied Sciences Year: 2012 | Volume: 7 | Issue: 2 | Page No.: 71-83 [5] Kamarularifin Abd. Jalil , Zaid Ahmad , Jamalul-Lail Ab Manan,” Mitigation of Black Hole Attacks for AODV Routing Protocol”, Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA Malaysia, Shah Alam, Selangor, Malaysia. [6] Kashif Bashir and Mohammad Khalid Khan,” Modification in Kerberos Assisted Authentication in Mobile Ad-Hoc Networks to Prevent Ticket Replay Attacks”, IACSIT International Journal of Engineering and Technology, Vol. 4, No. 3, June 2012 [7]Giovanni Vigna Sumit Gwalani Kavitha Srinivasan Elizabeth M. Belding-Royer Richard A. Kemmerer, “An Intrusion Detection Tool for AODV-based Ad hocWireless Networks”, 2004 ISSN: 2231-5381 http://www.ijettjournal.org Page 13