2. OBJECTIVE
To avoid the default path and take the
alternative path to find out the traffic of source to
destination
Computer Science & Engineering
3. EXISTING SYSTEM
Today’s wide-area Internet routing does not realize the full
potential of the existing network infrastructure in terms of
performance, reliability or flexibility
Today’s primary wide area routing protocol, BGP have a
great difficult in managing Autonomous systems (ASes)
Disadvantages:
Because ASes express their local routing policy during BGP route
advertisement by affecting the routes that are chosen and exported
to neighbors
ISPs struggle to understand and configure their networks while end
users are left to wonder why end-to-end connectivity is so poor
Large memory, processing, and message-passing overhead,
dependent on behavior in other ASes
Computer Science & Engineering
4. PROPOSED SYSTEM
To separate the issues of connectivity discovery and
path selection
Our source routing system can be used to implement
efficient overlay forwarding, select among multiple
ingress/egress routers
Advantages:
To increase the end-end performance
ISPs to verify the policy-compliance of traffic. It provide
authenticating source routed packets
Computer Science & Engineering
6. NETWORK CREATION
Enter the Peer Name,
IP Addr and Port No
No Check the peer Yes
already available
DB Successfully update Enter the Correct
Peer details
DB
Connecting the peers
Computer Science & Engineering
7. PEER LOGIN
Enter the Peer Name,
IP Addr and port No
False Check these True
Peer details
in DB
This peer details Successfully
not in DB Login the Peer
Computer Science & Engineering
8. FIND TRAFFIC
Select the alternative path
Check the Traffic
of each path
Select the Best Path
Computer Science & Engineering
9. MESSAGE TRANSMISSION
Msg Transmit to the
selected waypoint
Encrypt the message
If check the
No Yes
Destination
Enter the temporal key Enter the temporal key
Bind the IP Address Enter the Master key
Stamp and forward Decrypt the Message
to the next peer
Computer Science & Engineering
10. Secure and policy compliant source routing
Find default path and
Create peer Msg Tranmission
alternative path
Check the traffic of
Connecting Peer Encryption
each path
Select the
Best path
Check if it is
Decryption
Destination
Stamp and forward
to next peer
Fig: System Architecture
Computer Science & Engineering
11. CONCLUSION
Much of the complexity of Internet routing policy
stems from inflexibility of existing routing protocols
Computer Science & Engineering