ALL OPTICAL NETWORK-A NEW APPROACH FOR SECURITY

Similar documents
An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

A Review of Traffic Management in WDM Optical Networks: Progress and Challenges

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks

A Novel Optimization Method of Optical Network Planning. Wu CHEN 1, a

An Integer Programming Approach to Packing Lightpaths on WDM Networks 파장분할다중화망의광경로패킹에대한정수계획해법. 1. Introduction

WDM Network Provisioning

Efficient Segmentation based heuristic approach for Virtual Topology Design in Fiber Optical Networks

A Scalable Wavelength Assignment Algorithm Using Minimal Number of Wavelength Converters in Resilient WDM Networks

Survivability with P-Cycle in WDM Networks

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

Research Article Comparative Analysis of Routing and Wavelength Assignment Algorithms used in WDM Optical Networks

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks

Performance Analysis on Various Wavelength Assignment Algorithms with Traffic Grooming

RWA on Scheduled Lightpath Demands in WDM Optical Transport Networks with Time Disjoint Paths

IO2654 Optical Networking. WDM network design. Lena Wosinska KTH/ICT. The aim of the next two lectures. To introduce some new definitions

WDM Network Provisioning

Vol. 6, No. 5 May 2015 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Deadline-Aware Co-Scheduling Using Anycast Advance Reservations in Wavelength Routed Lambda Grids

EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks

Dynamic Routing and Wavelength Assignment in WDM Networks with Ant-Based Agents

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Dynamic service Allocation with Protection Path

Automatic Service and Protection Path Computation - A Multiplexing Approach

Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue

Available online at ScienceDirect

Fault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee

PLI IN WDM/DWDM RECEIVER

Simple Layout Algorithms To Maintain Network Connectivity Under Faults

Efficient path protection using Bi-directional WDM transmission technology. Title

Signal-Quality Consideration for Dynamic Connection Provisioning in All- Optical Wavelength-Routed Networks

A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks

Iterative Optimization in VTD to Maximize the Open Capacity of WDM Networks

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0

Attack-Aware Routing and Wavelength Assignment of Scheduled Lightpath Demands

An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops

TRAFFIC GROOMING WITH BLOCKING PROBABILITY REDUCTION IN DYNAMIC OPTICAL WDM NETWORKS

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

On The Offline Physical Layer Impairment Aware RWA Algorithms in Transparent Optical Networks: State-of-the-Art and Beyond

Design Of QOS Aware Light Path Planning And Technical Aspects In Wdm Networks

Threats in Optical Burst Switched Network

Network Topology Control and Routing under Interface Constraints by Link Evaluation

ECE442 Communications Lecture 4. Optical Networks

Splitter Placement in All-Optical WDM Networks

Survivable WDM Mesh Networks

MULTILEVEL FEEDBACK QUEUE WAVELENGTH ASSIGNMENT ALGORITHM IN SURVIVABLE OPTICAL WDM NETWORKS

Shared Risk Link Group (SRLG)-Diverse Path Provisioning Under Hybrid Service Level Agreements in Wavelength-Routed Optical Mesh Networks

Design of Hierarchical Crossconnect WDM Networks Employing a Two-Stage Multiplexing Scheme of Waveband and Wavelength

MODERN communication networks are constructed

Performance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License

Protection for Tree-Based EPON-FTTH Architecture Using Combination ACS and OXADM

A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization

Optical Communications and Networking 朱祖勍. Nov. 27, 2017

MULTICAST CONNECTION CAPACITY OF WDM SWITCHING NETWORKS WITHOUT WAVELENGTH CONVERSION

A Network Optimization Model for Multi-Layer IP/MPLS over OTN/DWDM Networks

Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation

Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks

Spectrum Allocation Policies for Flex Grid Network with Data Rate Limited Transmission

Research on Control Routing Technology in Communication Network

A New Architecture for Multihop Optical Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER

SUMMERY, CONCLUSIONS AND FUTURE WORK

Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms

Toward the joint design of electronic and optical layer protection

Survivable Virtual Topology Routing under Shared Risk Link Groups in WDM Networks

Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks

Performance of Multi-hop Communications Using Logical Topologies on Optical Torus Networks 1

Maximization of Single Hop Traffic with Greedy Heuristics

Design of Large-Scale Optical Networks Λ

A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings

CHAPTER-III WAVELENGTH ROUTING ALGORITHMS

FAULT TOLERANT REAL TIME COMMUNICATION IN MULTIHOP NETWORKS USING SEGMENTED BACKUP

Progress Report No. 15. Shared Segments Protection

ROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Computation of Multiple Node Disjoint Paths

DOE Award number: Name of recipient: Project Title: Principal investigator: Date of Report: Period covered by the report:

An Algorithm for Traffic Grooming in WDM Mesh Networks with Dynamically Changing Light-Trees

Performance of Optical Burst Switching Techniques in Multi-Hop Networks

Optical Signal-to-Noise Ratio Restoration Algorithm Applied to Optical Network Resilience to Node Failures

Dynamic Wavelength Provisioning in DWDM-Based Optical Network

Comparison of Protection Cost at IP or WDM Layer

INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY. Wavelength Division Multiplexing

Link Selection Algorithms for Link-Based ILPs and Applications to RWA in Mesh Networks

Design Methodologies and Algorithms for Survivable C-RAN


Designing WDM Optical Networks using Branch-and-Price

Optical networking technology

A Customizable Two-Step Framework for General Equipment Provisioning in Optical Transport Networks

An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks

Design of High capacity, reliable, efficient Long distance communication network. using DWDM

New QoS Measures for Routing and Wavelength Assignment in WDM Networks

Shared Protection by Concatenated Rings in Optical WDM Networks

THE EXPLOSIVE growth of Web-related services over the. A Practical Approach to Operating Survivable WDM Networks

Transcription:

ALL OPTICAL NETWORK-A NEW APPROACH FOR SECURITY 1 K. Kajendran, 2 K.Balaji, 3 N. Siva kumar 1 Associate Professor, Department of M.C.A, Panimalar Engineering College, Chennai 2 PG Scholar, Department of M.C.A, Panimalar Engineering College, Chennai 3 Asst Professor, Department of M.C.A, Panimalar Engineering College, Chennai INTRODUCTION The best way of accommodating the intensively growing network traffic and satisfying the ever tighter demands on throughput, delay and overall network performance is by using optical fiber technology. Optical fiber is characterized by huge bandwidth of up to 50 THz, low BER of 10 12 low loss of down to 0.2 db/km and low noise and interference characteristics. The best way of exploiting this immense potential is by dividing it among independent sets of different wavelengths, which is the underlying principle of Wavelength Division Multiplexing (WDM). Each wavelength supports one communication channel, operating independently at an arbitrary speed. Independently modulated wavelengths are all multiplexed and carried simultaneously over the same physical fiber. Transparent Optical Networks (TON) enable all-optical channels, called light paths, to be established between any pair of nodes ROUTING AND WAVELENGTH ASSIGNMENT The Routing and Wavelength Assignment problem consists of two sub problems: finding the physical routes for the given lightpath demands in the Routing (R) part of the problem, and assigning a wavelength to each of them in the Wavelength Assignment (WA) subproblem. Most common objectives ofthe RWA process include minimizing the number of physical hops in the established light paths or light path congestion (R), or minimizing the number of wavelengths used (WA). The wavelength assignment problem is subject to two main constraints. The wavelength clash constraint prohibits assigning the same wavelength to light paths which traverse a common directed physical link while the wavelength continuity constraint ensures each light path is assigned the same wavelength along its entire physical path. This constraint is relaxed when wavelength converters are available, but they are not yet economically viable. There are three variations of the RWA problem. In the static case, all demands are known in advance and the virtual topology does not change over time.in scheduled RWA, their set up and holding times are known in advance, and in the dynamic case they arrive unexpectedly with random ISSN 2231 5373-31- IJMTT

holding times. For small-sized problems, exact solutions of the RWA problem can be found by, for example, formulating the problem as an integer linear program. Larger network instances, however,require heuristic approaches, such as those from [1], [2], [3] and [4]. The RWA problem has been shown to be NP-complete[5], so the Routing (R) and Wavelength Assignment (WA) subproblems are often solved subsequently. ROUTING SUBPROBLEM Given the physical network topology, i.e., set of nodes interconnected with physical links, and a set of lightpath demands, solving the Routing subproblem consists of finding a physical route for each of the lightpaths demands. Some of the commonly used approaches include [4]: 1) FIXED ROUTING - A lightpath demand between the same source node s and destination nodes d is always routed on the same, precalculated path, e.g. the shortest connecting path. 2) FIXED ALTERNATE ROUTING - The route of the lightpath is chosen among several possible routes to the destination, which are all kept in the source node s routing table. The default route is called primary, and it is usually the one corresponding to the shortest path. The term alternate route may describe a route which is link-disjoint to the primary path, or it may be a general term for all available routes between the source and destination node. 3) ADAPTIVE ROUTING - The route between the source and destination is chosen dynamically, taking into consideration the changing network state. For example, the chosen route may be the shortest-cost path, i.e., the path which yields the lowest cost in a network with wavelength converters. Another example is the least-congested path routing, where the least congested route among the precalculated routes is chosen. 4) FAULT-TOLERAT ROUTING - In order to improve network robustness against link and node failures, we can ensure backup capacity for the potentially affected traffic by reserving two link- and/or nodedisjoint paths for a pair of end node THE WAVELENGTH ASSIGNMENT SUBPROBLEM After finding a physical route for each of the lightpath demands, the wavelength assignment subproblem consists of assigning a wavelength to each of them subject to the wavelength continuity and clash constraints. Wavelength Assignment has been shown to be equivalent to the NP complete graph coloring problem [6] and, as such, requires heuristic approaches. 1) FIRST FIT- Wavelengths are indexed in sequential order. Each lightpath is assigned the wavelength with the lowest index which is available on all of the physical links included in the lightpath s path. A lightpath is assigned a wavelength with an index higher than any other used wavelengths in case when none of the already used wavelengths can accomodate it. 2) Least-used/SPREAD - In order to balance the load among wavelengths, each lightpath is assigned the wavelength which is the least used in the network. This method performs poorly in terms of blocking probability. ISSN 2231 5373-32- IJMTT

International Journal of Mathematics Trends and Technology- May to June Issue 2011 3) Most-used/PACK - Each lightpath is assigned the available wavelength which is the most used in the network. This method tends to pack lightpaths into the smallest possible number of wavelengths, minimizing the wavelength usage for future network needs. 4) RANDOM - Each lightpath is assigned a random wavelength among those which can accomodate the request. In recent years, the research community has given much attention to impairment-aware RWA approaches aimed at minimizing the degradation of the quality of transmission caused by physical-layer impairments. Namely, the intensity and effects of many physical-layer impairments greatly depend on the specific method of network planning [7], and their impact can be diminished or compensated for through careful network planning approaches. Fig: flowchart for physical layer attacks in optical fiber Fig.. (a) Gain competition in amplifiers and intrachannel crosstalk in switches. (b) Interchannel crosstalk in fibers. ATTACK CLASSIFICATION Distinguish two general types of security: physical and semantic. Physical security ensures that the data have a minimum privacy and quality of service (QoS), and that the users are informed when such conditions are violated. Semantic security protects the meaning of the data even if it has already been reached by an attacker, and it belongs to the domain of cryptography. As described in [10], [11], [12], depending on the goal of the attacker, network attacks can be broadly categorized into : ISSN 2231 5373-33- IJMTT

1) Service disruption, which prevents communication or degrades the quality of service (QoS), and 2) Tapping, which compromises privacy by providing unauthorized users access to data, which can then be used for eavesdropping or traffic analyses. When it comes to physical-layer attacks, the authors in discern three categories: Direct attacks. Characteristics of certain physical link elements are more likely to be intruded and exploited as direct attack ports. Such attacks include: Attacks aimed at network transmission: tapping, tapping and jamming following signal processing, jamming only. Attacks aimed at optical amplifiers: gain competition due to local or remote attacks, crosstalk. Attacks aimed at optical transmission: fiber cut. Indirect attacks. Certain network elements are more likely to be attacked indirectly, because it is too complicated to attack them directly, or they are not easily accessible. This type of attacks include: Indirect crosstalk Unauthorized access through add/drop ports Intentional crosstalk propagation from preceeding blocks 3) Pseudo-attacks - anomalies which are not intrusions, but may be interpreted as such, due to significant changes in the signal quality depending on the physical network design. There are many other ways of classifying attacks. For example, each attack can be classified by its resources (passive or active), its means of attack (transmission/reception,protocol, control system), the target (specific users or network/subnetwork), the intended effect (service disruption or tapping), the location of the attack (terminal, node, link, multiple locations), and the attacker s willingness to be discovered in an economically more viable way. ALGORITHM TABU SEARCH: Tabu search is an iterative meta-heuristic that guides simpler search procedures through various areas of the solution space preventing them from remaining in local optima. In each iteration, the search begins with a current solution, explores all its neighboring solutions, and chooses the best neighboring solution (which is not forbidden by the tabu list) to become the current solution in the next iteration. A tabu list is a memory structure specific to tabu search that memorizes a certain number of previously visited solutions to prevent the algorithm from cycling and getting stuck in local optima. Potential solutions are evaluated with respect to a certain fitness function. After a desired number of iterations, the algorithm terminates, and the bestfound solution is deemed the final result. Tabu search was chosen since it was shown to give results for the RWA of scheduled lightpath demands in [3]. Wavelength assignment is solved subsequently using the graph coloring algorithm from ISSN 2231 5373-34- IJMTT

PROPOSED SYSTEM To address the existing problem, we propose a novel approach to optical networks security that is aimed at minimizing the potential damage caused by physical-layer attacks. Our goal is to achieve significant prevention measures without the need for specialized equipment, i.e., at minimal extra cost, through careful network planning. Namely, we propose to consider the potential consequences of physical-layer attacks while solving the RWA problem. The aim is to arrange the set of lightpaths in such a way as to minimize the possible disruption caused by various attack scenarios, i.e., minimize the maximum number of lightpaths that can be disrupted in such situations. Consequently, if fewer lightpaths are attacked, not only is network service disruption reduced, but failure detection and localization algorithms can be faster since they search for the source among fewer potential lightpaths. This extends our preliminary work, which introduced the problem and provided an initial version of the solution approach. To the best of our knowledge, attacks have not yet been considered in the literature in the context of routing and wavelength assignment. MODULES USED i. SOURCE MODULE ii. LISTENER MODULE LOGIN: Authorized user only can allowed to access. By the way of providing username and password SOURCE MODULE: This module contains a login page for authentication purpose. This module provides facilities to select the current workgroup of the source system. Once the workgroup is realized the workgroup collection is navigated to find the active nodes that can be reached from the source. After mentioning the nodes position in the network and a source node, the module works on the other nodes in the network to work out and reduce the maximum lightpath attack radius during transmission from the source to the destination. Then a data entered into an input field is transmitted from source to destination via the path with maxlar reduction. LISTNER MODULE: The Listener module receives data from source module or another listener module. If the listener module is represents the destination node then it provides a mean to persist the data in the node and hence stops the data transmission process. Else, if the listener module represents an intermediate node then, it retransmits the data received to the next node in the transmission path. PERFORMANCE ANLAYSIS ISSN 2231 5373-35- IJMTT

The reason behind using different traffic classes is due to the observation that subscribing content providers can be highly heterogeneous in terms of their traffic patterns and the type of content they handle. Hence, end-users request for content of varying sizes (ranging from small to large). The processing requirements also vary based on size of the content requested. The use of different traffic types allows us to reflect different user preferences and content request types. After using available number of resources in the current site based on the additional demand given by the users. The user shares the media and the details are stored in database. We can generate the report and display from the database. CONCLUSION: The vulnerabilities of optical network fundamental physical components, as well as the attack techniques that exploit them combined with the transparency property of emerging all optical networks demand new, specific ways of attack detection, localization and network restoration. Besides upgrading existing ways of dealing with network failures and attacks and developing new ones, significant attention should be paid to prevention mechanisms, by taking physical layer impairments and attacks that exploit them into consideration already in the network planning phase. This approach, i.e., prevention oriented network planning is a new concept which may play a significant role in increasing the all-optical network security in an economically more viable way REFERENCES: 1. H. Zang, J. P. Jue and B. Mukherjee, A Review of Routing and Wavelength Assignment Approaches for Wavelength- Routed Optical WDM Networks, Optical Networks Magazine, vol. 1, pp. 47 60, January 2000. 2. I. Chlamtac, A. Ganz and G. Karmi, Lightpath communications: an approach to high-bandwidth optical WANs, IEEE Transactions on Communications, vol. 40, pp. 1171 1182, 1992. 3. R. Ramaswami and K. N. Sivarajan, Optical Networks: A Practical Perspective, 2nd edition, R. Adams, Ed., San Diego: Academic Press, 2002, pp. 437 488. 4. T. Song, H. Zhang, Y. Guo and X. Zheng, Statistical Study of Crosstalk Accumulation in WDM Optical Network Using Different RWA, Optics Communication 202, pp. 131 138, 2002. 5. S. Azodomolky, M. Klinkowski, E. Marin, D. Careglio, J. Sol e Pareta and I. Tomkos, A survey on physical layer impairments aware routing and wavelength assignemnt algorithms in optical networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 53, no. 7, p. 926 944, May 2009. 6. C. C. Saradhi and S. Subramaniam, Physical Layer Impairment Aware Routing (PLIAR) in WDM Optical Networks: Issues and Challenges, IEEE Communications Surveys & Tutorials, vol. 11, no. 4, pp. 109 130, 4th quarter 2009. 7.M. M edard, D. Marquis, R. A. Barry and S. G. Finn, Security Issues ISSN 2231 5373-36- IJMTT

in All-Optical Networks, IEEE Network Magazine, vol. 11, no. 3, pp. 42 48, May 1997. 8. T. Wu and A. K. Somani, Cross-Talk Attack Monitoring and Localization in All- Optical Networks, IEEE/ACM Transactions on Networking 13, pp. 1390-1401 (2005). 9. M. M edard, D. Marquis, S. R. Chinn, Attack Detection Methods for All-Optical Networks, in in Proc. of Network and Distributed Systems Security Symposium, Session 3, paper 2, San Diego, California, 1998. 10. J. K. Patel, S. U. Kim, D. H. Su, S. Subramaniam and H.-A. Choi, A Framework for Managing Faults and Attacks in WDM Optical Networks, Proc. of the DARPA Information Survivability Conference and Exposition, Anaheim, California 2001. 11. C. Mas, I. Tomkos and O. K. Tonguz, Failure Location Algorithm for Transparent Optical Networks,, IEEE Journal on Selected Areas in Communication, vol. 23, no. 8, pp. 1508 1519, August 2005. 12. T. Deng and S. Subramaniam, Covert low-power QoS attack in alloptical wavelength routed network, in Proc. of IEEE Global Telecommunications Conference (GLOBECOM)vol. 3, pp. 1948-1952, 200 ISSN 2231 5373-37- IJMTT