Enhancement in Path Diversity Technique in Inter Domain Routing Using Border Abstract:

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 1 - May 2014
Enhancement in Path Diversity Technique in
Inter Domain Routing Using Border
Gateway Protocol
Sumit Angrish1, Gunjan Gandhi2
Department of Electronics and Communication Engineering
Lovely Professional University
Phagwara, India
Abstract: In the Internet there are many autonomous
network like base stations is required. Nodes within
systems. To communicate with the other autonomous
each other radio range communicate directly via
system BGP is required. As BGP does not incorporate
wireless links while these which are far apart rely on
measures of round trip time into destination. The
other nodes to relay messages. All the nodes act as
Border Gateway Protocol (BGP) is a routing protocol
router in adhoc network. Mobile Ad hoc Network is a
designed for inter-autonomous systems that uses TCP
mobile multi-hop which is wireless distributed
sessions. In our work we will proposed a novel
technique that helps to establish a path between source
and destination in two Autonomous systems which
incorporates a inter domain routing and find the
network and self-organized in nature. MANET is the
type of the adhoc network. The primary objective of
routing protocol is to discover the route. The routing
alternate path to reach the destination when congestion
protocol for MANET undertakes to setup and
will occur.
maintain routes
between
nodes.
In
MANET,
constantly changing network topology causes link
Key Words: Autonomous Systems (AS), Path
breakage and invalidation of end-to-end route. The
diversity, Border gateway protocol (BGP), Inter
highly dynamic nature of wireless network imposes
domain routing.
severe restrictions on routing protocols. There are
mainly two types of routing protocol available. These
I.
Introduction
are as following:
Wireless Networks term is refers to a kind of
1.
Proactive Routing Protocol ( Table-driven)
networking that do not requires cables to connect
2.
Reactive Routing Protocol (On- demand)
with devices during communication. Ad hoc network
3.
Hybrid
is a decentralized type of wireless network. There is
no pre-existing infrastructure such as routers in wired
Proactive protocol contains fresh list of the route and
networks or access points in wireless networks on
their destination from source if the topology
which it is depended. Ad-hoc networks are a new
frequently
standard of wireless communication for mobile hosts.
propagate to every node of the network and update
Basically it’s a network which is used in urgent
table like DSDV, WRP etc. Reactive protocol is on-
situation causes [5]. No fixed infrastructure in ad hoc
demand protocol. It is lazy approach in which all the
ISSN: 2231-5381
changes
http://www.ijettjournal.org
than
update
information
Page 10
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 1 - May 2014
node are not contains the information of the all the
This research makes two important contributions.
nodes and maintains table only on demand. To find
First, the source node does not need to maintain a
the path route discovery process is follow [9].
map of the overall network; therefore the SPDA
Reactive routing protocols are bandwidth efficient. In
overcomes the scalability problem in source routing.
this, routes are built as and when they are required
Second, the average end-to-end delay can be reduced
like AODV, TORA etc. Hybrid is the combination of
by forwarding the packets over the best and alternate
both reactive and proactive protocol like ZRP. The
paths concurrently. Simulation results demonstrate
Border Gateway Protocol (BGP)[6] is an inter
that the proposed approach reduces average end-to-
autonomous system routing protocol. An autonomous
end delay and the average packet loss rate, while
system is a network or group of networks under a
increasing average throughput. Multipath inter-
common administration and with common routing
domain
policies.
routing
path(MIR-DPP) [3], which constructs a set of paths
information for the Internet and is the protocol used
that can be flexibly selected by end users. The MIR-
between Internet service providers (ISP).
DPP supports user flexible route choice which gives
BGP
is
used
to
exchange
routing
via
deviation
from
primary
users the ability to choose routes and has potential of
II.
fostering ISP competition to offer the value-added
Related Work:
service and improving end-to-end performance and
In previous papers inter-domain routing is based on
reliability. The cluster based scheme to remove
BGP-4[1] which does not allow for the use of
congestion in wireless mesh Network [4]. When
multiple paths, but rather selects a single path per
available are less and demand of resources are more
destination prefix. Inter-Domain Route Diversity
than congestion occurs. To solve the problem of
(IDRD) as a mechanism which allows for diverse
congestion clustering scheme is proposed. All the
inter-domain paths to be propagated among carriers
nodes choose their cluster head and all the nodes
and used for packet forwarding. The proposal is
share their resource with the cluster head.
aimed to be efficient, backwards compatible, and
incrementally deployable. Their extensive evaluation
III.
Proposed Method:
of path disjointness in the Internet connectivity graph
illustrates the potential benefits of IDRD. While the
evaluation
shows
that
the
traditional
“prefer
customer” rule heavily impedes the use and
propagation of the underlying diversity, it also
demonstrates that our proposed relaxation of the
multipath route selection policy enables near-optimal
utilization of the underlying path diversity in the real
Internet inter-domain topology. The SPDA [2] uses
source routing to find an alternate path from a source
node to a destination node, and allows for a flexible
division of traffic over the best and alternate paths.
The mobile nodes are deployed in the fixed area. The
whole network is divided into the fixed size clusters
and cluster heads are chosen with the use of BGP
protocol. It is assumed in the clusters the same
protocol is used for the communication and it will
follow the rules of the intra communication. For the
inter cluster communication, BGP protocol is used.
The path between the source and destination which
are on the different cluster heads are selected with the
use of route request packets and route packets. In the
simulation, we show that the on the selected route the
congestion will occur and due to the congestion
ISSN: 2231-5381
http://www.ijettjournal.org
Page 11
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 1 - May 2014
packet loss will be there on the selected route
IV.
Results and Simulations:
between source and destination. To overcome the
problem of congestion, the diversity technique is
been used in the base paper. In the diversity
technique, the source selects the alternative paths
between source and destination. When the network
performance degrades to a threshold value other
possible path is selected for communication. We will
enhance the efficiency of the diversity technique in
which while selected the alternative path, the
technique of neural network is applied. In such a
technique,
the
source
learns
from
the
path
experiences and on the basis of path route records the
alternative paths are selected between source and
destination.
Graph 1: Packet Losss
Figure 3.1. Proposed Method
Graph 2 : Energy Consumption
As illustrate in Graph1. red line shows old packet
loss in a network and green new packet loss in a
network.
It indicates that with new proposed
technique packet loss is less as compare to existing
ISSN: 2231-5381
http://www.ijettjournal.org
Page 12
International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 1 - May 2014
technique. In graph 1 red line shows new energy
consumption and green line shows old energy
consumption. Red line is lower than green line
which indicates that new proposed technique is less
energy consumption as compared to an old technique.
[8] Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet
Demeester, “An Overview of Mobile Ad Hoc Networks:
Applications and Challenges” ,2005
[9] sunil Taneja, Dr. Ashwani Kush, Amandeep Makkar, “End to
End Delay Analysis of Prominent On-demand Routing Protocols”,
IJCST Vol. 2, Issue1, March 2011.
V.
Conclusion
In this paper, we conclude that BGP Protocol used
for the inter-domain communication. The gateway
nodes maintain the routing tables for intra-domain
communication. This reduces the network efficiency
due to node movement. In this paper, we propose
enhancement in BGP to inter-domain clustering. The
simulation results show that proposed enhancement
performance well in the simulated environment.
ACKNOWLEDGMENT
I hereby thanks and acknowledge this work to all my
teachers, who helps me to complete this work and
also I will thanks to my parents who gave me all their
support to complete my work.
References
[1]
Xavier Misseri
“IDRD: Enabling Inter-Domain Route
Diversity”, IEEE 2013
[2] Y.-P. Shieh W.-H. Hsu , “Simple path diversity algorithm for
inter-domain routing”, IEEE, 2011
[3] Donghong Qin, “Multipath Inter-domain Routing via Deviation
from Primary Path” Volume 1 No. 6, October 2011 ISSN-22234985 International Journal of Information and Communication
Technology Research
[4]
Adebanjo
Adekiigbe and
Kamalrulnizam
Abu
Bakar
“Development of a Routing Framework for a Cluster-Based
Congestion Avoidance and Load Balancing Algorithm for
IEEE802.11s Mesh Network” Research Journal of Applied
Sciences Year: 2012 | Volume: 7 | Issue: 2 | Page No.: 71-83
[5] Kamarularifin Abd. Jalil , Zaid Ahmad , Jamalul-Lail Ab
Manan,” Mitigation of Black Hole Attacks for AODV Routing
Protocol”, Faculty of Computer and Mathematical Sciences,
Universiti Teknologi MARA Malaysia, Shah Alam, Selangor,
Malaysia.
[6] Kashif Bashir and Mohammad Khalid Khan,” Modification in
Kerberos Assisted Authentication in Mobile Ad-Hoc Networks to
Prevent Ticket Replay Attacks”, IACSIT International Journal of
Engineering and Technology, Vol. 4, No. 3, June 2012
[7]Giovanni Vigna Sumit Gwalani Kavitha Srinivasan Elizabeth
M. Belding-Royer Richard A. Kemmerer, “An Intrusion Detection
Tool for AODV-based Ad hocWireless Networks”, 2004
ISSN: 2231-5381
http://www.ijettjournal.org
Page 13
Download