SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Paper ID – IJTSRD23934 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 881
Security Issues and the Energy Consumption
in the Optical Burst Switched Networks
Palak Kesar1, Mandeep Kaur Sandhu2
1Research Scholar, 2Assistant Professor
1,2ECE Department, Rayat and Bahra University, Mohali, Punjab, India
How to cite this paper: Palak Kesar |
Mandeep Kaur Sandhu "Security Issues
and the Energy Consumption in the
Optical Burst Switched Networks"
Published in International Journal of
Trend in Scientific Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-4, June 2019,
pp.881-885, URL:
https://www.ijtsrd.c
om/papers/ijtsrd23
934.pdf
Copyright © 2019 by author(s) and
International Journal of Trend in
Scientific Research and Development
Journal. This is an Open Access article
distributed under
the terms of the
Creative Commons
Attribution License (CC BY 4.0)
(http://creativecommons.org/licenses/
by/4.0)
ABSTRACT
Optical burst switching is an optical network technology thathelpsin improving
the use of the optical networks resources. In OCS, the network is configured to
establish a circuit, from an entry to an exit node, by adjusting the optical cross
connects circuits in the core routers in a manner that the data signal, in an
optical form, can travel in an all-optical manner from sourcetodestination node.
This approach suffers from all the disadvantages knowntocircuitswitching- the
circuits require time to set up and to destroy, and while thecircuitisestablished,
the resources will not be efficiently used to the unpredictable nature of network
traffic. Security is one of the major problems in field of networks. Mainly this
work focused on security issues in optical burst switching and to decreased the
energy consumption. In this research work, a secure public key cryptography
technique is proposed and evaluated as a security solution to measure security
threats related to burst packet in optical burst switching networks.
Keywords: WDM, OCS, OBS, MPLS, BGP
Introduction
With recent advances in wavelength division multiplexing
(WDM) technology, the amount of raw bandwidth available
in fiber links has increased by many orders of magnitude.
Meanwhile, the rapid growth of Internettrafficrequireshigh
transmission rates beyonda conventionalelectronicrouter’s
capability. Optical fibers are found to the solution of this
increasingdemand.There arenumerousadvantagesof fibers
include security, no interference, and lower errors in
addition to enormous bandwidth. Initially, fibers were used
for point-to-point communication where the full capacity of
the fiber was not utilized [1]. Optical network is considered
as the optimal choice for the next generation high speed
network due to potentials and benefits of optical
components particularly its carrier i.e. optical fiber
[2].Optical fibers have the capability to transmit Tbps range
of data. After the successful research of the optical fiber
several optical network paradigms for future Internet
backbone have been under intensive research. Optical
switching techniques have great impact on the performance
of the optical network. Although there are many advantages
a well disadvantages of these optical switching paradigms.
There are mainly three typesof theswitchingparadigmsthat
are used which are as follows:-
1. Optical circuit switching (OCS).
2. Optical packet switching (OPS).
3. Optical Burst switching (OBS).
Fig. 1.1 Evolution of the switching techniques
Optical circuit switching:-OCS is a connection oriented
switching technique in which a connection is set up before
IJTSRD23934
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD23934 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 882
actual data transmission on a pre-defined lightpathfromthe
source to the destination [3].In OCS, the network is
configured to establish a circuit, from an entry to an exit
node, by adjusting the optical cross connects circuits in the
core routers in a manner that the data signal, in an optical
form, can travel in an all-optical manner from the entry to
the exit node. This approach suffers from all the
disadvantages known to circuit switching - the circuits
require time to set up and to destroy, and while the circuit is
established, the resources will not be efficiently used to the
unpredictable natureof networktraffic.Largeconnection set
up time and low bandwidth utilization in case of low traffic
load are the major limitations of the OCS.
Optical packet switching:-In OPS, a packet comprises data
and a header which are in optical domain. When the packet
comes at the core node, the header is extracted from the
packet and is converted into the electrical domain for
processing. The data in the packet has to be buffered in the
core node during header processing.
Optical burst switching:-OBS is the combination of the
optical circuit switching and optical packet switching. The
OBS is an upcoming network that has stroke a perfect
balance between the finely grained packet switching and the
coarse grained circuit switching. Optical burst switching is
an adaptation of theInternationalTelecommunicationUnion
Telecommunication StandardizationSector(ITU-T) whichis
also known as a standard for burst switching in ATM
networks, which is commonly known as ATM block transfer
(ABT). There are two versions of ABT: ABT with delayed
transmission and ABT with the immediate transmission.
Security issues in the OBS networks: Some of potential
threats in OBS network such as traffic analysis,
eavesdropping and spoofing and burst duplication attack
and service disruption via Denial of Service (DoS) [14].
During transmission, the scheduling request during
transmission, the scheduling request for a BHP may be
rejected due to overflowing demandsand the corresponding
data burst is disconnected thus becoming an Orphan Burst
[8]. These burst may flow along an unintended path wasting
the bandwidth or even be tapped by an attacker
compromising the security. Thevarioussecurityissuesinthe
OBS networks are as follows:-
1. Traffic analysis [14].
2. Eavesdropping.
3. Data delay.
4. Service denial.
5. QOS degradation.
6. Spoofing.
7. Burst duplication attack.
But the OBS are mostly affected by the traffic analysis, Eaves
dropping and Burst duplication. This is the main threats of
the OBS networks which affects the transmission of the
packets while transmission.
Multi-protocol label switching:-MPLS was intended by
Internet Engineering Task Force (IETF).Multi-protocol label
switching is a switching technology which is used by the
different service providers to enhance and boost up the
traffic and to increase the overall performanceof thesystem.
MPLS is mainly used by the providers to enhance the quality
of the service. MPLS uses the different protocol to transfer
the packets from one node to another node so it is also
known as “ Multi-protocol’ ’MPLS is a connection –oriented
approach which meant to transmitted the data packetsfrom
sender to the receiver by usingapreliminaryprotocolbefore
sending the data Multi-Protocol Label Switching is a method
that directs data from one system node to the next based on
short path labels rather than long network addresses in
high-performance telecommunications association. MPLS
offers high scalability, end-to-end IP services which contains
simple configuration and managementforcustomersas well
as to the service providers. It forwardspacketsinanysystem
protocol, which are mainly known as building blocks of data
transmitted over the Internet. Each packet has a header.In a
non-ATM contextual, the packet’s header contains 20-bit
label which contains 3-bit of the class of service and 1-bit of
the label stack but in the case of the ATM contextual, the
packet’s header contain only Virtual Channel
Identifier/Virtual Packet Identifier encoded label. These
labels reduce the time of a router to searchfortheaddressto
next node to forward packet.
A MPLS enabled Internet consists of a set of nodes called
Label Switch Routers (LSRs) and Label Edge Routers(LERs).
The LERs and LSRs are capable of switching and routing
packets through multiple paths called Label Switched Paths
(LSPs). LSPs are formed on the basis of a label which has
been appended to each packet instead of the Internet
Protocol (IP) address. The LERs present at the beginning
edge of the MPLS domain are called ingress nodes and the
LERs at ending edges of the MPLS domain are called ingress
nodes [3]. Load balancing is realized in MPLS networks by
redistributing the traffic over two or more LSPs, which
connect the same ingress and egress node pair. MPLS works
by prefixing packets with an MPLS header having one or
more label known as label stack. With the contribution of
MPLS-capable routers or switches in central gateway
protocols such as Open Shortest Path First (OSPF) or
Intermediate System to Intermediate System (IS-IS), the
network automatically builds routing tables. Label
Distribution Protocol (LDP) uses this table to establish label
values between neighboring devices [13].
Fig. 1.11 Block diagram of MPLS
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD23934 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 883
3.1 Border gateway protocol:
Border gateway protocol is the most important protocol of the Multi label switching technique. The Border Gateway Protocol
(BGP) is an inter-autonomous system protocol. BGP runs over any reliable transport levelprotocol.TCP willbeused, however,
since it is present in virtually all commercial routers and hosts. The primary function of a BGP system is to exchange network
reachability information with other BGP systems. This network reachability information includes information on the
autonomous systems (AS's) that traffic must transit to reach these networks [28]. This information is sufficient to construct a
graph of AS connectivity from which routing loops may be pruned and policy decisions at an AS level may be enforced. BGP is
actually two protocols - iBGP, designed for internalrouting,andeBGP,designed forexternalrouting.The routerswhich provide
the interface between domains run a protocol called Border GatewayProtocol(BGP).Figure1showsahigh-level abstractionof
BGP routers connecting up domains in the Internet. Each local routing domain is called an Autonomous System (AS)[24].
Fig.1.2 BGP routers
Proposed Methodology: Optical burst switchingisan opticalnetworktechnologythathelpsin improvingtheuseof theoptical
networks resources. In the previouswork,theauthorsfocusonarchitecturalsolutionswheretheyinvestigateQoSperformance
of non-slotted and slotted OBS in terms of burst loss ratio and throughput. The value of the BLR in the previous paper is very
much high so to solve this problem we use the MPLS technique with the help public key Cryptography. To avoid thesesecurity
issues in the optical burst switched networks the multi-protocol label switching techniqueused forimprovingtheseissuesthe
public key cryptography algorithm use in the proposed use.
Assemble data into burst
Select encryption key for data burst
Select key to encrypt burst encryption key
Encrypt burst encryption key
General burst header
Place encrypted burst encryption key in burst header
Select encryption key for burst header encryption
Encrypt burst header using selected burst header
encryption key
Send encrypt data burst on data channel
Encrypt data burst using selected data burst
Send encrypt data burst on data channel
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD23934 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 884
Firstly, the number of the nodes collapse with each other to
form a network after that the nodes of the networks areable
to start transferring the data to start the communication
between the sender to the receiver select the transmitted
node number and the receiver node after then the
transmitter will find out the shortest path for sending the
data packets from sender to the receiver.
A. After the path in a particular region the data packets are
assemble in a particular form in the form of burst.
B. Then encrypt the data by converting it into byte code so
that it can be readable only for the receiver.
C. Assign burst a key which is the receiver id if these key
matches with the receiver only then it will decrypt the
data.
D. After encryption it will sends data to the receiver node.
E. Then assign header to the each burst.
F. Assigns the burst encryption key to the burst header.
G. Also assigns the burst header a unique key for its
identity.
H. Encrypt the burst header so that no one can read it for
security purpose.
I. Send the burst header to the control channel.
J. The receiver decrypt the data burst when the key
matches.
K. After the key matches the receiver sends the ack to the
sender and after then the communication starts.
Algorithm used in the proposed work
1. Encrypt the data by converting it into byte code;
2. attach pK to packet ; (where pK==private Key)
3. send the packet through the route;
4. if (receiver id == pK)
5. {
6. decrypt the data;
7. send positive response ;
8. }
9. else
10. data remains encrypted;
11. if (sender doesn’t get the response)
12. it sends another packets through another route;
Results analysis:-
In this section, the results of the proposed and the existing
techniques are defined and also the comparison of the
existing results and the proposed work is explained. In the
existing paper the researchers introduces QoS Performance
Analysis of Non-slotted and Slotted Optical Burst Switched
Networks. They had taken two different parameters taken
Burst loss ratio and throughput. The evaluation of QoS
performance of slotted OBS represented by Hierarchical
Time Sliced (Hit SOBS).
Fig.5.1 Comparison of both existing and proposed
Burst loss ratio
Fig. 5.1 explains the burst loss ratio in which the X-axis
represents time and Y-axis represents burst loss. Red line
represents BLR. As a time increases BLR also increases.
Fig. 5.2 Comparison of both existing and proposed
Throughput
Fig. 5.2 explains throughput. Where X-axis represents time
and Y-axis represents throughput. Throughput increases
with time in this graph.
Fig. 5.3 Comparison of both existing and proposed
Energy consumption
Fig. 5.3 explains the energy where X-axis represents time
and Y-axis energy. In this graph energy consumption
decreases due to secure encryption technique.
Conclusion:
Optical circuit switching is a connection oriented switching
technique in which a connection is set up before actual data
transmission on a pre-defined light path from the source to
the destination. Optical burst switching technology has the
potential to be deployed today on a commercial scale to
speed up the provisioning of end-to-end optical paths
between and among communicating entities. Because of the
unique characteristics of optical burst switching network,
there is a degree of security vulnerabilityassociatedwiththe
burst. Security is one of the major problems in field of
networks. Mainly this work focused on security issues in
optical burst switching and decreased the energy
consumption. In this research work, a secure public key
cryptography technique is proposed and evaluated as a
security solution to measure securitythreatsrelated toburst
packet in optical burst switching networks. NS2 simulatoris
used for implementation purpose. It is analyzed that
proposed solution provides better results under attack
environment that will reduce the burst loss and increase
overall network throughput.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD23934 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 885
Future work:-
In future, proposed technique can be implemented on other
protocols such as RSVP and LDP to improve its security. By
using the Border gateway protocol on the other switching
paradigms ie; optical circuit switchingaswellandtheoptical
packet switching the securityissues in theseparametersalso
improved and also by using the different parameters the
energy consumption of the networks also decreased.
Moreover, other security issues also improved by using the
MPLS.
References
[1] Baldine, G.N. Rouskas, H.G. Perros, and D. Stevenson,
“JumpStart: A Just-in-Time Signaling Architecture for
WDM Burst-Switched Networks,” IEEE
Communications, vol. 40, no. 2, pp. 82-89, Feb. 2002.
[2] Phuritatkul, Jumpot, Yusheng Ji, and Shigeki
Yamada,"Proactive wavelength pre-emption for
supporting absolute QoS in optical-burst-switched
networks," Journal of Light wave Technology 25.5
pp.1130-1137, 2007.
[3] Y. Chen, C. Qiao and X. Yu, “Optical burst switching: A
new area in optical networking research,” IEEE
Network Magazine, Vol. 18, no. 3, pp. 16-23, May 2004.
[4] Y. Xiong, M. Vanderhoute, and H.C. Cankaya, “Control
Architecture in Optical Burst-Switched WDM
Networks,” IEEE Journal on Selected Areas in
Communications, vol. 18, no. 10, pp. 1838-1851, Oct.
2000.
[5] Siddharth Singh Chouhan and Sanjay Sharma,
"Identification of current attacks and their counter
measures in optical burst switched (OBS) network."
International Journal of Advanced Computer Research
volume 2, issue 3, March 2012.
[6] Vokkarane, Vinod M., Jason P. Jue, and Sriranjani
Sitaraman. “Burst segmentation: an approach for
reducing packet loss in optical burst switched
networks." In Communications, IEEE International
Conference on, vol. 5, pp. 2673-2677, May 2002.
[7] X. Yu, Y. Chen, and C. Qiao. “Study of traffic statistics of
assembled burst traffic in optical burst switched
networks”. In Proc. Opticomm, vol. 4874, pp. 149-159,
July2002.
[8] Y. Coulibaly, A. A. I. Al-Kilany, M. S. A. Latiff, G. Rouskas,
S. Mandala, and M. A. Razzaque. ’Secure burst control
packet scheme for Optical Burst Switching networks’’.
In Broadband and Photonics Conference (IBP), IEEE
International pp. 86-91, April 2015.
[9] Coulibaly, Y., Latiff, M. S. A. Umaru, A. M, & Garcia, N. M,
“QoS performance analysis of non-slotted and slotted
optical burst switched networks’’, IEEE 12th Malaysia
International Conference., In Communications (MICC),
pp. 153-156, November 2015.
[10] T. F. Fernandez and, C. N. Sreenath “Burstification
threat in optical burst switched networks”. In IEEE
proceeding of International Conference on
Communication and Signal Processing, pp. 1666-1670,
April 2014.
[11] J. Choi, H. L Vu, and M. Kang “On achieving the optimal
performance of FDL buffers using burst assembly”.
IEEE Communications Letters, vol.11, issue11,
November, 2007.
[12] F. Yu, Huang, M., J., Zhang, and X. Sun, 2005 August. “A
contention resolution schemebyusingfiberdelay lines
for optical burst switching.” In Microwave, Antenna,
Propagation and EMC Technologies for Wireless
Communications,MAPE IEEEInternationalSymposium
on vol. 2, pp. 1287-1290, August, 2005.
[13] X. Yu, Y. Chen and C. Qiao “Study of traffic statistics of
assembled burst traffic in optical burst switched
networks”. In Proc. Opticomm Vol. 4874, pp. 149-159,
July, 2002.
[14] F. Farahmand and J. P. Jue, "Look-ahead Window
Contention Resolution in Optical Burst Switched
Networks," IEEE Workshop on High-Performance
Switching and Routing (HPSR) 2003, pp. 147-151,
Torino, Italy, June 2003.
[15] S. Yao. S.J. Ben Yoo, and B. Mukherjee, “A Comparison
Study between Slotted andUnslottedAll-opticalPacket
Switched Network with Priority-Based Routing,”
Proceedings, Optical Fiber Communication Conference
and Exhibit (OFC), vol. 2, 2001.
[16] Niladhuri Sreenath, Fernandez, Terrance Frederick,
and Brabagaran Karunanithi "Spectral threats in TCP
over optical Burst switched networks." IEEE
proceeding of 1st International Conference on Trends
for Technology and convergence, Salem, Tamil Nadu,
India (2014).
[17] Y. Xiong Zheng, M. Vandenhout, and H. C. Cankaya,
“Hardware Design of a Channel Scheduling Algorithm
for Optical Burst SwitchingRouters,”Proceedings,SPIE
ITCOM 2002, vol. 4872, pp.199-209, 2000.
[18] R. Ramaswami and K. N. Sivarajan, “Routing and
wavelength assignment in all-optical networks,”
IEEE/ACM Trans. Network, vol. 3, no. 5, pp. 489–500,
Oct. 1995.
[19] P. Siva Subramanian and K. Muthuraj, "Threats in
optical burst switched network." Int. J. Comp. Tech.
Appl., vol. 2 issue 3, pp.510-514, 2011.
[20] Alouneh, S., Abed, S. E., Kharbutli, M., & Mohd, B. J,’’
MPLS technology in wireless networks. Wireless
networks, Springer, vol. 20, issue 5, pp.1037-1051,
November 2013.
[21] K.K.Nguyen & B.Jaumard, “A MPLS/LDP Distributed
architecture for Next Generation Routers,” Springer,
vol. 21, issue 4, pp. 535–561, December 2013.
[22] T. Usui, Y. Ketatsiyi, H.Yokota, ‘’A study on traffic
management cooperating with IMSinMPLS’’,Springer,
volume 52, .issue 2, pp. 671-680, February 2013.
[23] Acharya, A. Ganu, S. Misra, A., “DCMAALabelSwitching
MAC for Efficient packet Forwarding in Multihop
Wireless Network”, SelectedAreasin Communications,
IEEE Journal, vol. 24 on 11, pp. 1995-2004, Nov. 2006.
[24] A. S. Acampora and I. A. Shah, “Multihop light wave
networks: A comparison of store-and-forward and hot-
potato routing,” IEEE Transaction on Communication,
vol. 40, no. 6, pp. 1082–1090, Jun. 1992.

More Related Content

What's hot

An enhanced group mobility protocol for 6 lowpan based wireless body area net...
An enhanced group mobility protocol for 6 lowpan based wireless body area net...An enhanced group mobility protocol for 6 lowpan based wireless body area net...
An enhanced group mobility protocol for 6 lowpan based wireless body area net...
Kamal Spring
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
Roopali Singh
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
IJCNCJournal
 
Modeling and Simulation of Wavelength-Routed optical Networks
Modeling and Simulation of Wavelength-Routed optical NetworksModeling and Simulation of Wavelength-Routed optical Networks
Modeling and Simulation of Wavelength-Routed optical Networks
ijceronline
 

What's hot (20)

BEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANETBEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANET
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Gi3112131218
Gi3112131218Gi3112131218
Gi3112131218
 
An enhanced group mobility protocol for 6 lowpan based wireless body area net...
An enhanced group mobility protocol for 6 lowpan based wireless body area net...An enhanced group mobility protocol for 6 lowpan based wireless body area net...
An enhanced group mobility protocol for 6 lowpan based wireless body area net...
 
Cw25585588
Cw25585588Cw25585588
Cw25585588
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
 
Review on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manetReview on design of advanced opportunistics routing in manet
Review on design of advanced opportunistics routing in manet
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
DEVELOPMENT OF SOM NEURAL NETWORK BASED ENERGY EFFICIENT CLUSTERING HIERARCHI...
 
ETX METRIC FOR EXTREMELY OPPORTUNISTIC ROUTING TO IMPROVE THE PERFORMANCE OF ...
ETX METRIC FOR EXTREMELY OPPORTUNISTIC ROUTING TO IMPROVE THE PERFORMANCE OF ...ETX METRIC FOR EXTREMELY OPPORTUNISTIC ROUTING TO IMPROVE THE PERFORMANCE OF ...
ETX METRIC FOR EXTREMELY OPPORTUNISTIC ROUTING TO IMPROVE THE PERFORMANCE OF ...
 
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...Current issue- International Journal of Advanced Smart Sensor Network Systems...
Current issue- International Journal of Advanced Smart Sensor Network Systems...
 
Modeling and Simulation of Wavelength-Routed optical Networks
Modeling and Simulation of Wavelength-Routed optical NetworksModeling and Simulation of Wavelength-Routed optical Networks
Modeling and Simulation of Wavelength-Routed optical Networks
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
Improved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNsImproved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNs
 

Similar to Security Issues and the Energy Consumption in the Optical Burst Switched Networks

Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
ijtsrd
 
A Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor NetworksA Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor Networks
ijtsrd
 
J031101064069
J031101064069J031101064069
J031101064069
theijes
 
Ijeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksIjeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networks
Kumar Goud
 

Similar to Security Issues and the Energy Consumption in the Optical Burst Switched Networks (20)

my project publication
my project publicationmy project publication
my project publication
 
IRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network ArchitectureIRJET- GMPLS based Multilayer Service Network Architecture
IRJET- GMPLS based Multilayer Service Network Architecture
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Adaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data networkAdaptive resource allocation and internet traffic engineering on data network
Adaptive resource allocation and internet traffic engineering on data network
 
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
IRJET- A Survey on Hierarchical-Based Routing Protocols for Wireless Sensor N...
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
 
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
 
IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP NetworkIRJET-  	  Performance Analysis of MPLS-VPN and Traditional IP Network
IRJET- Performance Analysis of MPLS-VPN and Traditional IP Network
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
A study on “link
A study on “linkA study on “link
A study on “link
 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
 
A Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor NetworksA Review of Sensor Node in Wireless Sensor Networks
A Review of Sensor Node in Wireless Sensor Networks
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet Scheduling
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet SchedulingApproach to an Intelligent Based IP over MPLS VPLS Network for Packet Scheduling
Approach to an Intelligent Based IP over MPLS VPLS Network for Packet Scheduling
 
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
Traffic Engineering and Quality of Experience in MPLS Network by Fuzzy Logic ...
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
Ijeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksIjeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networks
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Security Issues and the Energy Consumption in the Optical Burst Switched Networks

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 4 | May-Jun 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Paper ID – IJTSRD23934 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 881 Security Issues and the Energy Consumption in the Optical Burst Switched Networks Palak Kesar1, Mandeep Kaur Sandhu2 1Research Scholar, 2Assistant Professor 1,2ECE Department, Rayat and Bahra University, Mohali, Punjab, India How to cite this paper: Palak Kesar | Mandeep Kaur Sandhu "Security Issues and the Energy Consumption in the Optical Burst Switched Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-4, June 2019, pp.881-885, URL: https://www.ijtsrd.c om/papers/ijtsrd23 934.pdf Copyright © 2019 by author(s) and International Journal of Trend in Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/ by/4.0) ABSTRACT Optical burst switching is an optical network technology thathelpsin improving the use of the optical networks resources. In OCS, the network is configured to establish a circuit, from an entry to an exit node, by adjusting the optical cross connects circuits in the core routers in a manner that the data signal, in an optical form, can travel in an all-optical manner from sourcetodestination node. This approach suffers from all the disadvantages knowntocircuitswitching- the circuits require time to set up and to destroy, and while thecircuitisestablished, the resources will not be efficiently used to the unpredictable nature of network traffic. Security is one of the major problems in field of networks. Mainly this work focused on security issues in optical burst switching and to decreased the energy consumption. In this research work, a secure public key cryptography technique is proposed and evaluated as a security solution to measure security threats related to burst packet in optical burst switching networks. Keywords: WDM, OCS, OBS, MPLS, BGP Introduction With recent advances in wavelength division multiplexing (WDM) technology, the amount of raw bandwidth available in fiber links has increased by many orders of magnitude. Meanwhile, the rapid growth of Internettrafficrequireshigh transmission rates beyonda conventionalelectronicrouter’s capability. Optical fibers are found to the solution of this increasingdemand.There arenumerousadvantagesof fibers include security, no interference, and lower errors in addition to enormous bandwidth. Initially, fibers were used for point-to-point communication where the full capacity of the fiber was not utilized [1]. Optical network is considered as the optimal choice for the next generation high speed network due to potentials and benefits of optical components particularly its carrier i.e. optical fiber [2].Optical fibers have the capability to transmit Tbps range of data. After the successful research of the optical fiber several optical network paradigms for future Internet backbone have been under intensive research. Optical switching techniques have great impact on the performance of the optical network. Although there are many advantages a well disadvantages of these optical switching paradigms. There are mainly three typesof theswitchingparadigmsthat are used which are as follows:- 1. Optical circuit switching (OCS). 2. Optical packet switching (OPS). 3. Optical Burst switching (OBS). Fig. 1.1 Evolution of the switching techniques Optical circuit switching:-OCS is a connection oriented switching technique in which a connection is set up before IJTSRD23934
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD23934 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 882 actual data transmission on a pre-defined lightpathfromthe source to the destination [3].In OCS, the network is configured to establish a circuit, from an entry to an exit node, by adjusting the optical cross connects circuits in the core routers in a manner that the data signal, in an optical form, can travel in an all-optical manner from the entry to the exit node. This approach suffers from all the disadvantages known to circuit switching - the circuits require time to set up and to destroy, and while the circuit is established, the resources will not be efficiently used to the unpredictable natureof networktraffic.Largeconnection set up time and low bandwidth utilization in case of low traffic load are the major limitations of the OCS. Optical packet switching:-In OPS, a packet comprises data and a header which are in optical domain. When the packet comes at the core node, the header is extracted from the packet and is converted into the electrical domain for processing. The data in the packet has to be buffered in the core node during header processing. Optical burst switching:-OBS is the combination of the optical circuit switching and optical packet switching. The OBS is an upcoming network that has stroke a perfect balance between the finely grained packet switching and the coarse grained circuit switching. Optical burst switching is an adaptation of theInternationalTelecommunicationUnion Telecommunication StandardizationSector(ITU-T) whichis also known as a standard for burst switching in ATM networks, which is commonly known as ATM block transfer (ABT). There are two versions of ABT: ABT with delayed transmission and ABT with the immediate transmission. Security issues in the OBS networks: Some of potential threats in OBS network such as traffic analysis, eavesdropping and spoofing and burst duplication attack and service disruption via Denial of Service (DoS) [14]. During transmission, the scheduling request during transmission, the scheduling request for a BHP may be rejected due to overflowing demandsand the corresponding data burst is disconnected thus becoming an Orphan Burst [8]. These burst may flow along an unintended path wasting the bandwidth or even be tapped by an attacker compromising the security. Thevarioussecurityissuesinthe OBS networks are as follows:- 1. Traffic analysis [14]. 2. Eavesdropping. 3. Data delay. 4. Service denial. 5. QOS degradation. 6. Spoofing. 7. Burst duplication attack. But the OBS are mostly affected by the traffic analysis, Eaves dropping and Burst duplication. This is the main threats of the OBS networks which affects the transmission of the packets while transmission. Multi-protocol label switching:-MPLS was intended by Internet Engineering Task Force (IETF).Multi-protocol label switching is a switching technology which is used by the different service providers to enhance and boost up the traffic and to increase the overall performanceof thesystem. MPLS is mainly used by the providers to enhance the quality of the service. MPLS uses the different protocol to transfer the packets from one node to another node so it is also known as “ Multi-protocol’ ’MPLS is a connection –oriented approach which meant to transmitted the data packetsfrom sender to the receiver by usingapreliminaryprotocolbefore sending the data Multi-Protocol Label Switching is a method that directs data from one system node to the next based on short path labels rather than long network addresses in high-performance telecommunications association. MPLS offers high scalability, end-to-end IP services which contains simple configuration and managementforcustomersas well as to the service providers. It forwardspacketsinanysystem protocol, which are mainly known as building blocks of data transmitted over the Internet. Each packet has a header.In a non-ATM contextual, the packet’s header contains 20-bit label which contains 3-bit of the class of service and 1-bit of the label stack but in the case of the ATM contextual, the packet’s header contain only Virtual Channel Identifier/Virtual Packet Identifier encoded label. These labels reduce the time of a router to searchfortheaddressto next node to forward packet. A MPLS enabled Internet consists of a set of nodes called Label Switch Routers (LSRs) and Label Edge Routers(LERs). The LERs and LSRs are capable of switching and routing packets through multiple paths called Label Switched Paths (LSPs). LSPs are formed on the basis of a label which has been appended to each packet instead of the Internet Protocol (IP) address. The LERs present at the beginning edge of the MPLS domain are called ingress nodes and the LERs at ending edges of the MPLS domain are called ingress nodes [3]. Load balancing is realized in MPLS networks by redistributing the traffic over two or more LSPs, which connect the same ingress and egress node pair. MPLS works by prefixing packets with an MPLS header having one or more label known as label stack. With the contribution of MPLS-capable routers or switches in central gateway protocols such as Open Shortest Path First (OSPF) or Intermediate System to Intermediate System (IS-IS), the network automatically builds routing tables. Label Distribution Protocol (LDP) uses this table to establish label values between neighboring devices [13]. Fig. 1.11 Block diagram of MPLS
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD23934 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 883 3.1 Border gateway protocol: Border gateway protocol is the most important protocol of the Multi label switching technique. The Border Gateway Protocol (BGP) is an inter-autonomous system protocol. BGP runs over any reliable transport levelprotocol.TCP willbeused, however, since it is present in virtually all commercial routers and hosts. The primary function of a BGP system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the autonomous systems (AS's) that traffic must transit to reach these networks [28]. This information is sufficient to construct a graph of AS connectivity from which routing loops may be pruned and policy decisions at an AS level may be enforced. BGP is actually two protocols - iBGP, designed for internalrouting,andeBGP,designed forexternalrouting.The routerswhich provide the interface between domains run a protocol called Border GatewayProtocol(BGP).Figure1showsahigh-level abstractionof BGP routers connecting up domains in the Internet. Each local routing domain is called an Autonomous System (AS)[24]. Fig.1.2 BGP routers Proposed Methodology: Optical burst switchingisan opticalnetworktechnologythathelpsin improvingtheuseof theoptical networks resources. In the previouswork,theauthorsfocusonarchitecturalsolutionswheretheyinvestigateQoSperformance of non-slotted and slotted OBS in terms of burst loss ratio and throughput. The value of the BLR in the previous paper is very much high so to solve this problem we use the MPLS technique with the help public key Cryptography. To avoid thesesecurity issues in the optical burst switched networks the multi-protocol label switching techniqueused forimprovingtheseissuesthe public key cryptography algorithm use in the proposed use. Assemble data into burst Select encryption key for data burst Select key to encrypt burst encryption key Encrypt burst encryption key General burst header Place encrypted burst encryption key in burst header Select encryption key for burst header encryption Encrypt burst header using selected burst header encryption key Send encrypt data burst on data channel Encrypt data burst using selected data burst Send encrypt data burst on data channel
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD23934 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 884 Firstly, the number of the nodes collapse with each other to form a network after that the nodes of the networks areable to start transferring the data to start the communication between the sender to the receiver select the transmitted node number and the receiver node after then the transmitter will find out the shortest path for sending the data packets from sender to the receiver. A. After the path in a particular region the data packets are assemble in a particular form in the form of burst. B. Then encrypt the data by converting it into byte code so that it can be readable only for the receiver. C. Assign burst a key which is the receiver id if these key matches with the receiver only then it will decrypt the data. D. After encryption it will sends data to the receiver node. E. Then assign header to the each burst. F. Assigns the burst encryption key to the burst header. G. Also assigns the burst header a unique key for its identity. H. Encrypt the burst header so that no one can read it for security purpose. I. Send the burst header to the control channel. J. The receiver decrypt the data burst when the key matches. K. After the key matches the receiver sends the ack to the sender and after then the communication starts. Algorithm used in the proposed work 1. Encrypt the data by converting it into byte code; 2. attach pK to packet ; (where pK==private Key) 3. send the packet through the route; 4. if (receiver id == pK) 5. { 6. decrypt the data; 7. send positive response ; 8. } 9. else 10. data remains encrypted; 11. if (sender doesn’t get the response) 12. it sends another packets through another route; Results analysis:- In this section, the results of the proposed and the existing techniques are defined and also the comparison of the existing results and the proposed work is explained. In the existing paper the researchers introduces QoS Performance Analysis of Non-slotted and Slotted Optical Burst Switched Networks. They had taken two different parameters taken Burst loss ratio and throughput. The evaluation of QoS performance of slotted OBS represented by Hierarchical Time Sliced (Hit SOBS). Fig.5.1 Comparison of both existing and proposed Burst loss ratio Fig. 5.1 explains the burst loss ratio in which the X-axis represents time and Y-axis represents burst loss. Red line represents BLR. As a time increases BLR also increases. Fig. 5.2 Comparison of both existing and proposed Throughput Fig. 5.2 explains throughput. Where X-axis represents time and Y-axis represents throughput. Throughput increases with time in this graph. Fig. 5.3 Comparison of both existing and proposed Energy consumption Fig. 5.3 explains the energy where X-axis represents time and Y-axis energy. In this graph energy consumption decreases due to secure encryption technique. Conclusion: Optical circuit switching is a connection oriented switching technique in which a connection is set up before actual data transmission on a pre-defined light path from the source to the destination. Optical burst switching technology has the potential to be deployed today on a commercial scale to speed up the provisioning of end-to-end optical paths between and among communicating entities. Because of the unique characteristics of optical burst switching network, there is a degree of security vulnerabilityassociatedwiththe burst. Security is one of the major problems in field of networks. Mainly this work focused on security issues in optical burst switching and decreased the energy consumption. In this research work, a secure public key cryptography technique is proposed and evaluated as a security solution to measure securitythreatsrelated toburst packet in optical burst switching networks. NS2 simulatoris used for implementation purpose. It is analyzed that proposed solution provides better results under attack environment that will reduce the burst loss and increase overall network throughput.
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD23934 | Volume – 3 | Issue – 4 | May-Jun 2019 Page: 885 Future work:- In future, proposed technique can be implemented on other protocols such as RSVP and LDP to improve its security. By using the Border gateway protocol on the other switching paradigms ie; optical circuit switchingaswellandtheoptical packet switching the securityissues in theseparametersalso improved and also by using the different parameters the energy consumption of the networks also decreased. Moreover, other security issues also improved by using the MPLS. References [1] Baldine, G.N. Rouskas, H.G. Perros, and D. Stevenson, “JumpStart: A Just-in-Time Signaling Architecture for WDM Burst-Switched Networks,” IEEE Communications, vol. 40, no. 2, pp. 82-89, Feb. 2002. [2] Phuritatkul, Jumpot, Yusheng Ji, and Shigeki Yamada,"Proactive wavelength pre-emption for supporting absolute QoS in optical-burst-switched networks," Journal of Light wave Technology 25.5 pp.1130-1137, 2007. [3] Y. Chen, C. Qiao and X. Yu, “Optical burst switching: A new area in optical networking research,” IEEE Network Magazine, Vol. 18, no. 3, pp. 16-23, May 2004. [4] Y. Xiong, M. Vanderhoute, and H.C. Cankaya, “Control Architecture in Optical Burst-Switched WDM Networks,” IEEE Journal on Selected Areas in Communications, vol. 18, no. 10, pp. 1838-1851, Oct. 2000. [5] Siddharth Singh Chouhan and Sanjay Sharma, "Identification of current attacks and their counter measures in optical burst switched (OBS) network." International Journal of Advanced Computer Research volume 2, issue 3, March 2012. [6] Vokkarane, Vinod M., Jason P. Jue, and Sriranjani Sitaraman. “Burst segmentation: an approach for reducing packet loss in optical burst switched networks." In Communications, IEEE International Conference on, vol. 5, pp. 2673-2677, May 2002. [7] X. Yu, Y. Chen, and C. Qiao. “Study of traffic statistics of assembled burst traffic in optical burst switched networks”. In Proc. Opticomm, vol. 4874, pp. 149-159, July2002. [8] Y. Coulibaly, A. A. I. Al-Kilany, M. S. A. Latiff, G. Rouskas, S. Mandala, and M. A. Razzaque. ’Secure burst control packet scheme for Optical Burst Switching networks’’. In Broadband and Photonics Conference (IBP), IEEE International pp. 86-91, April 2015. [9] Coulibaly, Y., Latiff, M. S. A. Umaru, A. M, & Garcia, N. M, “QoS performance analysis of non-slotted and slotted optical burst switched networks’’, IEEE 12th Malaysia International Conference., In Communications (MICC), pp. 153-156, November 2015. [10] T. F. Fernandez and, C. N. Sreenath “Burstification threat in optical burst switched networks”. In IEEE proceeding of International Conference on Communication and Signal Processing, pp. 1666-1670, April 2014. [11] J. Choi, H. L Vu, and M. Kang “On achieving the optimal performance of FDL buffers using burst assembly”. IEEE Communications Letters, vol.11, issue11, November, 2007. [12] F. Yu, Huang, M., J., Zhang, and X. Sun, 2005 August. “A contention resolution schemebyusingfiberdelay lines for optical burst switching.” In Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications,MAPE IEEEInternationalSymposium on vol. 2, pp. 1287-1290, August, 2005. [13] X. Yu, Y. Chen and C. Qiao “Study of traffic statistics of assembled burst traffic in optical burst switched networks”. In Proc. Opticomm Vol. 4874, pp. 149-159, July, 2002. [14] F. Farahmand and J. P. Jue, "Look-ahead Window Contention Resolution in Optical Burst Switched Networks," IEEE Workshop on High-Performance Switching and Routing (HPSR) 2003, pp. 147-151, Torino, Italy, June 2003. [15] S. Yao. S.J. Ben Yoo, and B. Mukherjee, “A Comparison Study between Slotted andUnslottedAll-opticalPacket Switched Network with Priority-Based Routing,” Proceedings, Optical Fiber Communication Conference and Exhibit (OFC), vol. 2, 2001. [16] Niladhuri Sreenath, Fernandez, Terrance Frederick, and Brabagaran Karunanithi "Spectral threats in TCP over optical Burst switched networks." IEEE proceeding of 1st International Conference on Trends for Technology and convergence, Salem, Tamil Nadu, India (2014). [17] Y. Xiong Zheng, M. Vandenhout, and H. C. Cankaya, “Hardware Design of a Channel Scheduling Algorithm for Optical Burst SwitchingRouters,”Proceedings,SPIE ITCOM 2002, vol. 4872, pp.199-209, 2000. [18] R. Ramaswami and K. N. Sivarajan, “Routing and wavelength assignment in all-optical networks,” IEEE/ACM Trans. Network, vol. 3, no. 5, pp. 489–500, Oct. 1995. [19] P. Siva Subramanian and K. Muthuraj, "Threats in optical burst switched network." Int. J. Comp. Tech. Appl., vol. 2 issue 3, pp.510-514, 2011. [20] Alouneh, S., Abed, S. E., Kharbutli, M., & Mohd, B. J,’’ MPLS technology in wireless networks. Wireless networks, Springer, vol. 20, issue 5, pp.1037-1051, November 2013. [21] K.K.Nguyen & B.Jaumard, “A MPLS/LDP Distributed architecture for Next Generation Routers,” Springer, vol. 21, issue 4, pp. 535–561, December 2013. [22] T. Usui, Y. Ketatsiyi, H.Yokota, ‘’A study on traffic management cooperating with IMSinMPLS’’,Springer, volume 52, .issue 2, pp. 671-680, February 2013. [23] Acharya, A. Ganu, S. Misra, A., “DCMAALabelSwitching MAC for Efficient packet Forwarding in Multihop Wireless Network”, SelectedAreasin Communications, IEEE Journal, vol. 24 on 11, pp. 1995-2004, Nov. 2006. [24] A. S. Acampora and I. A. Shah, “Multihop light wave networks: A comparison of store-and-forward and hot- potato routing,” IEEE Transaction on Communication, vol. 40, no. 6, pp. 1082–1090, Jun. 1992.