Advanced Routing Technology for Fast Internet Protocol Network Recovery(2011)

Note: Please Scroll Down to See the Download Link.

ABSTRACT:

            As the Internet takes an increasingly central role in our communications infrastructure, the slow convergence o routing protocols after a network failure becomes a growing problem. To assure RAPID recovery from link and node failures in IP networks, we present a new recovery scheme called Numerous Routing Configurations (NRC). Our proposed scheme guarantees recovery in all single failure scenarios, using a single mechanism to handle both link and node failures, and without knowing the root cause of the failure. NRC is strictly connectionless, and assumes only destination based hop-by-hop forwarding. NRC is based on keeping additional routing information in the routers, and allows packet forwarding to continue on an alternative output link immediately after the detection of a failure. It can be implemented with only minor changes to existing solutions. In this paper us presenters, and analyze its performance with respect to scalability, endorsement path lengths, and load distribution after a failure. We also show how an estimate of the traffic demands in the network can be used to improve the distribution of the recovered traffic, and thus reduce the chances of congestion when NRC is used.

EXISTING SYSTEM:

Ø  Link and Node failures of IP networks.

Ø  The slow convergence of routing protocols after a network failure becomes a growing problem.

Ø  Packet loss or packet delay due to congestion.

Ø  Time consumed to send the data is increased due to resending of lost data.

Disadvatages:

  • Load Distribution failed.
  • Congestion occurring.
  • There is no guarantee for data to reach the destination
  • There is no back-up path
  • It is time consuming
  • It has no precise knowledge of failure locations

PROPOSED SYSTEM:

Ø  We present a new scheme for handling link and node failures in IP networks.

Ø   Multiple Routing Configurations (MRC) is a proactive and local protection mechanism that allows recovery in the range of milliseconds.

Ø  MRC allows packet forwarding to continue over preconfigured alternative next-hops immediately after the detection of the failure.

Ø  Recovery in all single failure scenarios without knowing root cause of the failure.

Ø  Each and Every Node having Preconfigured Backup Path. That Backup path maintains the routing table.

Ø  MRC assumes only destination of hop by hop forwarding.

        Advantages:

  • 100% message transfer is guaranteed.
  •  During message transfer the load is distributed which increases the speed of transmission.
  •  Overcome retransmission of large data.
  •  Reduces traffic on the same link.
  • The failure of particular link is identified

MODULES:

  1. Topology Construction
  2. Restrict and Isolate Link
  3. Routing Table (Backup Path)
  4. Data Transmission

Module 1: Topology Construction

Ø  In this module is used to construct the topology.

Ø  The user gives the number of node used to construct the topology.

Ø   The node is added to give the name of the node, system number and port address of that node.

Ø   If the node name and port address is already available means to display the message box "Node already Add", otherwise to display the message box "Node add successfully".

Ø  If the entire node adds successfully to display the node connection frames.

Ø   In this frame to enter the source node name, near node name and weight of that path connection.

Module 2: Restrict and Isolate Link

Ø In this module is used to restrict and Isolate the Link.

Ø Each and Every node having a related link in Jlist   box.

Ø User selects the particular link and Click the Restrict button clicked means the particular link weight is increased.

Ø Message Transmission time sender node does not use the particular link.

Ø Sender node finds the backup path to send the messages from source to destination.

Ø User selects the particular link and Click the Isolate button clicked means the particular link is Eliminated form the Database.

Ø Message Transmission time sender node does not use the particular link.

Ø Sender node finds the backup path to send the messages from source to destination.

Module 3: Routing Table (Backup Path)

Ø In this module is used to maintaining preconfigured Backup path (Routing Table).

Ø If any of the node or link is Restricted means weight value is increased.

Ø At the time we can’t use the particular link or node. Sender node searches the Corresponding preconfigured backup to the routing table.

Ø In the sender node uses the backup path to send the packets from source to destination.

Ø Acknowledgement will be received from the same backup path.

Ø No (link or node) failure means Sender sends Messages from the source to destination sender using the directed path .

Ø If any of the node or link is isolated means weight value is increased.

Ø At the time we can’t use the particular link or node is permanently. Sender node searches the Corresponding preconfigured backup to the routing table.

Ø In the sender node uses the backup path to send the packets from source to destination.

Ø Acknowledgement will be received from the  same backup pathj

Module 4: Data Transmission

Ø In the Data Transmission module, the Message transfer relates with that the sender node wants to send a message to the destination node

Ø Sender node first selects the Destination node.

Ø Sender types the data or browses the .txt file and uploads the url from the textbox.

Ø Checks the corresponding node and corresponding path is available .

Ø After the path is selected also find out that node or link is failure and status of the destination node through is true.

Ø If anyone of the node or link is failed means sender use the preconfigured backup path.

The receiver node receives the message completely and then it send the acknowledgement to the sender node also near by nodes through the router nodes where it is received the message.

SYSTEM REQUIREMENT SPECIFICATIONS:

Hardware Requirements:

Ø  Processor               :     Pentium IV

Ø  Hard disk                :     40 GB

Ø  RAM                          :     512 MB

Software Requirements:

Ø  Operating System      :           Windows XP

Ø  Front end                     :           JDK 1.6

Ø  Back end                      :           SQL Server 2000

Click here to download Advanced Routing Technology for Fast Internet Protocol Network Recovery(2011) source code