SlideShare a Scribd company logo
1 of 6
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
CROSS LAYER APPROACH FOR MINIMIZING ROUTING 
DISRUPTION IN IP NETWORKS 
ABSTRACT 
Backup paths are widely used in IP networks to protect IP links from failures. 
However, existing solutions such as the commonly used independent model and 
Shared Risk Link Group (SRLG) model do not accurately reflect the correlation 
between IP link failures, and thus may not choose reliable backup paths. A cross-layer 
approach is proposed for minimizing routing disruption caused by IP link 
failures. A probabilistically correlated failure (PCF) model is developed to quantify 
the impact of IP link failure on the reliability of backup paths. With the PCF 
model, an algorithm is proposed to choose multiple reliable backup paths to protect 
each IP link. When an IP link fails, its traffic is split onto multiple backup paths to 
ensure that the rerouted traffic load on each IP link does not exceed the usable 
bandwidth. This approach using real ISP networks with both optical and IP layer 
topologies. Experimental results show that two backup paths are adequate for 
protecting a logical link. Compared with existing works, the backup paths selected 
by approach are at least 18 percent more reliable and the routing disruption is 
reduced by at least 22 percent.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
INTRODUCTION 
IP link failures are fairly common in the Internet for various reasons. In high speed 
IP networks like the Internet backbone, disconnection of a link for several seconds 
can lead to millions of packets being dropped. Therefore, quickly recovering from 
IP link failures is important for enhancing Internet reliability and availability, and 
has received much attention in recent years. Currently, backup path-based 
protection and is widely used by Internet Service Providers (ISPs) to protect their 
domains. 
In this approach, backup paths are precomputed, configured, and stored in routers. 
When a link failure is detected, traffic originally traversing the link is immediately 
switched to the backup path of this link. Through this, the routing disruption 
duration is reduced to the failure detection time which is typically less than 50 ms. 
Selecting backup paths is a critical problem in backup path-based protection.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
EXISTING SYSTEM 
 Existing approaches mainly focus on choosing reliable backup paths to 
reduce the routing disruption caused by IP link failures. 
 Logical link failures were considered as independent events and or modeled 
as a Shared Risk Link Group (SRLG). 
 Most existing approaches focus on selecting reliable backup paths, but 
ignore the fact that a backup path may not have enough bandwidth for the 
rerouted traffic. 
 As a result, the rerouted traffic load on some logical links may exceed their 
usable bandwidth, and thus cause link overload. 
 As Iyer et al. observed, most link overload in an IP backbone is caused by 
the traffic rerouted due to IP link failures. 
Disadvantages 
 The selected backup paths may be unreliable. 
 Consider backup path selection as a connectivity problem, but ignore the 
traffic load and bandwidth constraint of IP links. 
 Logical link failures are not independent because of the topology mapping. 
 Most prior works select single backup path for each logical link.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
PROPOSED SYSTEM 
 To propose a cross-layer approach to minimize routing disruption caused by 
IP link failures. 
 The basic idea is to consider the correlation between IP link failures in 
backup path selection and protect each IP link with multiple reliable backup 
paths. 
 A key observation is that the backup path for an IP link is used only when 
the IP link fails. 
 To develop a probabilistically correlated failure (PCF) model based on the 
topology mapping and the failure probability of fiber links and logical links. 
 With the PCF model, an algorithm is proposed to select at most N reliable 
backup paths for each IP link and compute the rerouted traffic load on each 
backup path. 
Advantages 
 Determine reliable backup paths with the PCF model. 
 Rerouted traffic load on each IP link does not exceed its usable bandwidth so 
as to avoid link overload.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
 Based on a cross-layer design, which considers the correlation between 
logical and physical topologies. 
 Protect each logical link with multiple backup paths to effectively reroute 
traffic and avoid link overload 
 Proposed approach prevents logical link overload caused by the rerouted 
traffic. 
HARDWARE REQUIREMENTS 
Processor : Any Processor above 500 MHz. 
Ram : 128Mb. 
Hard Disk : 10 Gb. 
Compact Disk : 650 Mb. 
Input device : Standard Keyboard and Mouse. 
Output device : VGA and High Resolution Monitor. 
SOFTWARE SPECIFICATION 
Operating System : Windows Family.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
Pages developed using : Java Swing 
Techniques : JDK 1.5 or higher 
Database : SQL Server 2000

More Related Content

Viewers also liked

Communities - Summa Technologies - philly tech week
Communities - Summa Technologies - philly tech weekCommunities - Summa Technologies - philly tech week
Communities - Summa Technologies - philly tech week
danielhfowler
 

Viewers also liked (9)

Retouched pictures
Retouched picturesRetouched pictures
Retouched pictures
 
Discontinuous modulation scheme for a differential mode cuk inverter
Discontinuous modulation scheme for a differential mode cuk inverterDiscontinuous modulation scheme for a differential mode cuk inverter
Discontinuous modulation scheme for a differential mode cuk inverter
 
An efficient and trustworthy p2 p and social network integrated file sharing ...
An efficient and trustworthy p2 p and social network integrated file sharing ...An efficient and trustworthy p2 p and social network integrated file sharing ...
An efficient and trustworthy p2 p and social network integrated file sharing ...
 
Wave 6 - The Business of Social | UM | Social Media Tracker
Wave 6 - The Business of Social | UM | Social Media TrackerWave 6 - The Business of Social | UM | Social Media Tracker
Wave 6 - The Business of Social | UM | Social Media Tracker
 
annujj_resume (1) (1)
annujj_resume (1) (1)annujj_resume (1) (1)
annujj_resume (1) (1)
 
Communities - Summa Technologies - philly tech week
Communities - Summa Technologies - philly tech weekCommunities - Summa Technologies - philly tech week
Communities - Summa Technologies - philly tech week
 
Dominating set and network coding based routing in wireless mesh netwoks
Dominating set and network coding based routing in wireless mesh netwoksDominating set and network coding based routing in wireless mesh netwoks
Dominating set and network coding based routing in wireless mesh netwoks
 
Digi pack evaluation
Digi pack evaluationDigi pack evaluation
Digi pack evaluation
 
Wave 5 - The Socialisation of Brands | UM | Social Media Tracker
Wave 5 - The Socialisation of Brands | UM | Social Media TrackerWave 5 - The Socialisation of Brands | UM | Social Media Tracker
Wave 5 - The Socialisation of Brands | UM | Social Media Tracker
 

Similar to Cross layer approach for minimizing routing disruption in ip networks

11172017 SafeAssign Originality Reporthttpswilmu.blac.docx
11172017 SafeAssign Originality Reporthttpswilmu.blac.docx11172017 SafeAssign Originality Reporthttpswilmu.blac.docx
11172017 SafeAssign Originality Reporthttpswilmu.blac.docx
moggdede
 

Similar to Cross layer approach for minimizing routing disruption in ip networks (20)

IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
IEEE 2014 JAVA PARALLEL DISTRIBUTED PROJECTS Cross layer approach for minimiz...
 
Networking project list for java and dotnet
Networking project list for java and dotnetNetworking project list for java and dotnet
Networking project list for java and dotnet
 
IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)
 
Dynamic routing for data integrity and delay differentiated services in wirel...
Dynamic routing for data integrity and delay differentiated services in wirel...Dynamic routing for data integrity and delay differentiated services in wirel...
Dynamic routing for data integrity and delay differentiated services in wirel...
 
Video dissemination over hybrid cellular and ad hoc networks
Video dissemination over hybrid cellular and ad hoc networksVideo dissemination over hybrid cellular and ad hoc networks
Video dissemination over hybrid cellular and ad hoc networks
 
11172017 SafeAssign Originality Reporthttpswilmu.blac.docx
11172017 SafeAssign Originality Reporthttpswilmu.blac.docx11172017 SafeAssign Originality Reporthttpswilmu.blac.docx
11172017 SafeAssign Originality Reporthttpswilmu.blac.docx
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...
 
Incentive based data sharing in delay tolerant mobile networks
Incentive based data sharing in delay tolerant mobile networksIncentive based data sharing in delay tolerant mobile networks
Incentive based data sharing in delay tolerant mobile networks
 
Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17Networking for java and dotnet 2016 - 17
Networking for java and dotnet 2016 - 17
 
Traffic pattern based content leakage detection for trusted content delivery ...
Traffic pattern based content leakage detection for trusted content delivery ...Traffic pattern based content leakage detection for trusted content delivery ...
Traffic pattern based content leakage detection for trusted content delivery ...
 
Evolve IT: Why Performance Matters When Building Your New SD-WAN, Not all SD-...
Evolve IT: Why Performance Matters When Building Your New SD-WAN, Not all SD-...Evolve IT: Why Performance Matters When Building Your New SD-WAN, Not all SD-...
Evolve IT: Why Performance Matters When Building Your New SD-WAN, Not all SD-...
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 
Overlay Network Overview
Overlay Network OverviewOverlay Network Overview
Overlay Network Overview
 
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
REUSABILITY-AWARE ROUTING WITH ENHANCED SECURE DATA TRANSMISSION USING HOP-BY...
 
Cooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksCooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networks
 
Multapplied Networks - Bonding and Load Balancing together in Bonded Internet™
Multapplied Networks - Bonding and Load Balancing together in Bonded Internet™Multapplied Networks - Bonding and Load Balancing together in Bonded Internet™
Multapplied Networks - Bonding and Load Balancing together in Bonded Internet™
 
PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006PACE-IT: Wan Technologies (part 4) - N10 006
PACE-IT: Wan Technologies (part 4) - N10 006
 
Path reconstruction in dynamic wireless sensor networks using compressive sen...
Path reconstruction in dynamic wireless sensor networks using compressive sen...Path reconstruction in dynamic wireless sensor networks using compressive sen...
Path reconstruction in dynamic wireless sensor networks using compressive sen...
 
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...Maximizing p2 p file access availability in mobile ad hoc networks though rep...
Maximizing p2 p file access availability in mobile ad hoc networks though rep...
 

More from LeMeniz Infotech

Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
LeMeniz Infotech
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
LeMeniz Infotech
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
LeMeniz Infotech
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
LeMeniz Infotech
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
LeMeniz Infotech
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
LeMeniz Infotech
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
LeMeniz Infotech
 

More from LeMeniz Infotech (20)

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Cross layer approach for minimizing routing disruption in ip networks

  • 1. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts CROSS LAYER APPROACH FOR MINIMIZING ROUTING DISRUPTION IN IP NETWORKS ABSTRACT Backup paths are widely used in IP networks to protect IP links from failures. However, existing solutions such as the commonly used independent model and Shared Risk Link Group (SRLG) model do not accurately reflect the correlation between IP link failures, and thus may not choose reliable backup paths. A cross-layer approach is proposed for minimizing routing disruption caused by IP link failures. A probabilistically correlated failure (PCF) model is developed to quantify the impact of IP link failure on the reliability of backup paths. With the PCF model, an algorithm is proposed to choose multiple reliable backup paths to protect each IP link. When an IP link fails, its traffic is split onto multiple backup paths to ensure that the rerouted traffic load on each IP link does not exceed the usable bandwidth. This approach using real ISP networks with both optical and IP layer topologies. Experimental results show that two backup paths are adequate for protecting a logical link. Compared with existing works, the backup paths selected by approach are at least 18 percent more reliable and the routing disruption is reduced by at least 22 percent.
  • 2. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts INTRODUCTION IP link failures are fairly common in the Internet for various reasons. In high speed IP networks like the Internet backbone, disconnection of a link for several seconds can lead to millions of packets being dropped. Therefore, quickly recovering from IP link failures is important for enhancing Internet reliability and availability, and has received much attention in recent years. Currently, backup path-based protection and is widely used by Internet Service Providers (ISPs) to protect their domains. In this approach, backup paths are precomputed, configured, and stored in routers. When a link failure is detected, traffic originally traversing the link is immediately switched to the backup path of this link. Through this, the routing disruption duration is reduced to the failure detection time which is typically less than 50 ms. Selecting backup paths is a critical problem in backup path-based protection.
  • 3. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts EXISTING SYSTEM  Existing approaches mainly focus on choosing reliable backup paths to reduce the routing disruption caused by IP link failures.  Logical link failures were considered as independent events and or modeled as a Shared Risk Link Group (SRLG).  Most existing approaches focus on selecting reliable backup paths, but ignore the fact that a backup path may not have enough bandwidth for the rerouted traffic.  As a result, the rerouted traffic load on some logical links may exceed their usable bandwidth, and thus cause link overload.  As Iyer et al. observed, most link overload in an IP backbone is caused by the traffic rerouted due to IP link failures. Disadvantages  The selected backup paths may be unreliable.  Consider backup path selection as a connectivity problem, but ignore the traffic load and bandwidth constraint of IP links.  Logical link failures are not independent because of the topology mapping.  Most prior works select single backup path for each logical link.
  • 4. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts PROPOSED SYSTEM  To propose a cross-layer approach to minimize routing disruption caused by IP link failures.  The basic idea is to consider the correlation between IP link failures in backup path selection and protect each IP link with multiple reliable backup paths.  A key observation is that the backup path for an IP link is used only when the IP link fails.  To develop a probabilistically correlated failure (PCF) model based on the topology mapping and the failure probability of fiber links and logical links.  With the PCF model, an algorithm is proposed to select at most N reliable backup paths for each IP link and compute the rerouted traffic load on each backup path. Advantages  Determine reliable backup paths with the PCF model.  Rerouted traffic load on each IP link does not exceed its usable bandwidth so as to avoid link overload.
  • 5. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts  Based on a cross-layer design, which considers the correlation between logical and physical topologies.  Protect each logical link with multiple backup paths to effectively reroute traffic and avoid link overload  Proposed approach prevents logical link overload caused by the rerouted traffic. HARDWARE REQUIREMENTS Processor : Any Processor above 500 MHz. Ram : 128Mb. Hard Disk : 10 Gb. Compact Disk : 650 Mb. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor. SOFTWARE SPECIFICATION Operating System : Windows Family.
  • 6. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts Pages developed using : Java Swing Techniques : JDK 1.5 or higher Database : SQL Server 2000