Anda di halaman 1dari 22

CAPTURING ROUTER CONGESTION AND DELAY

Internal guide:
Mrs.G.KALYANI Project Coordinator Information technology

Presented by:
B.DILEEP KUMAR(06R01A1213) B .RAKESH(07R01A1214) D.DEVI SINGH(07R01A1224)

Introduction
This system is helpful in transmitting data from source to destination with high security using cryptography algorithms and security enhanced routing methods that restricts loss of information

ABSTRACT
y Security has become one of the major issues for data

communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, we will propose a security enhanced dynamic routing algorithm that could randomize delivery paths for data transmission.

WHAT IS DYNAMIC ROUTING?


y Dynamic routing enables network devices to obtain

topology information, routes and IP addresses from other routers automatically. WHAT IS THE PURPOSE OF DYNAMIC ROUTING ?
y It allowed devices to dynamically learn network

information and reroute traffic around failed network. y Interior gateway protocols such as RIP and OSPF automatically discovered the addresses and states of different devices on the network and determined the optimal path for traffic

WHAT IS SECURITY?
y Security is the protection of a person, property or

organization from an attack. The types of protection include prevention ,response and pre-emptive attacks. HOW SECURITY PLAY A KEY ROLE IN NOW A DAYS? Security solutions such as firewalls and VPNS, protect network resources against attacks, intrusions ,and malicious activity.

ALGORITHMS FOR DYNAMIC ROUTING


y It is based on distributed routing information widely

supported in existing networks. In general routing protocols over network could be classified roughly in two parts . y 1.distance vector algorithms y Example: RIP and DSDV y 2.link state algorithm y Example :OSPF

ALGORITHMS FOR PROVIDING SECURITY


y Security enhanced dynamic routing algorithm y It is a distance vector based algorithm for dynamic

routing to improve the security of data transmission.

Existing System
y Existing work on security-enhanced data transmission

includes the designs of cryptography algorithms and system infrastructures and Security enhanced routing methods. y IPSec and SSL do greatly improve the security level for data transmission, they unavoidably introduce substantial overheads, especially on gateway/host performance and effective network

Limitations of Existing System


IP sec VPNS do not support a standard method of

exchanging route information over a encrypted tunnels. Extra control messages needed. Data transmission overhead.

Proposed System
y We will propose a security enhanced dynamic routing

algorithm to provide security enhanced data delivery without introducing any extra contol messages. y It is based on DDRA.It consists of two parts y A randomisation process for packet delivery y Maintenance of the extended routing table

AN EXAMPLE OF THE ROUTING TABLE FOR THE NODE Ni

Advantages of proposed system


y Random delivery paths for data transmission y Easy to implement and Compatible with popular

routing protocols y No extra control messages y Administrator has less work maintaining the configuration when adding or deleting networks. y Protocols automatically react to the topology changes y Configuration is less error phone y More scalable

Modules
y Network Module y Dynamic Routing y Randomization Process y Routing Table Maintenance y Load on Throughput

NETWORK MODULE: Client-server computing or networking is a distributed application architecture that partitions tasks or workloads between service providers (servers) and service requesters, called clients DYNAMIC ROUTING: To propose a distance-vector based algorithm for dynamic routing to improve the security of data transmission. RANDOMIZATION PROCESS: The delivery of a packet with the destination at a node.

ROUTING TABLE MAINTENANCE: In the network be given a routing table and a link table LOAD ON THROUGHPUT: The traffic is too generated based on changeable-bitrate applications such as file transfer overTransmission Control Protocol (TCP).

System Requirements
Hardware Requirements y System : Pentium IV 2.4 GHz. y Hard Disk : 40 GB. y Floppy Drive : 1.44 Mb. y Monitor : 15 VGA Colour. y Mouse : Logitech. y Ram : 256 Mb.

Software Requirements
y Operating system y Coding Language y Tool Used

: - Windows XP Professional. : - Java. : - Eclipse

Data Flow
SUB A1

ROUTER A
SUB A2

SUB B1

SOURCE
ROUTER B
SUB B2

DESTINATION

SUB C1

ROUTER C
SUB C2

USECASE DIAGRAM

Sequence Diagram
Sender Routing Information Available Routers Dynamic Routing Destinatoin Collect routing information

Select routing paths

Routing dynamically with security

Sending data to destination

Received data

Conclusion
This paper has proposed a security-enhanced dynamic routing algorithm based on distributed routing information widely supported in existing networks

Thank you

Anda mungkin juga menyukai