Your SlideShare is downloading. ×
Network border patrol preventing c ongestion collapse(synopsis)
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Network border patrol preventing c ongestion collapse(synopsis)

1,506

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,506
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Network Border Patrol: Preventing Congestion Collapse (Synopsis)
  • 2. Project Prerequisations:The fundamental philosophy behind the Internet is expressed by the scalability argument: no protocol, mechanism, or service should be introduced into the Internet if it does not scale well. A key corollary to the scalability argument is the endto-end argument: to maintain scalability, algorithmic complexity should be pushed to the edges of the network whenever possible. Perhaps the best example of the Internet philosophy is TCP congestion control, which is implemented primarily through algorithms operating at end systems. Unfortunately, TCP congestion control also illustrates some of the shortcomings the end-to-end argument. As a result of its strict adherence to end-to-end congestion control, the current Internet suffers from main maladies: congestion collapse from undelivered packets. The Internet’s excellent scalability and robustness result in part from the end-to-end nature of Internet congestion control. End-to-end congestion control algorithms alone, however, are unable to prevent the congestion collapse and unfairness created by applications that are unresponsive to network congestion. To address these maladies, we propose and investigate a novel congestionavoidance mechanism called network border patrol (NBP). NBP entails the exchange of feedback between routers at the borders of a network in order to detect and restrict unresponsive traffic flows before they enter the network, thereby preventing congestion within the network.
  • 3. Project Modules:The various modules in the protocol are as follows Module 1: SOURCE MODULE. Module 2: INGRESS ROUTER MODULE. Module 3: ROUTER MODULE. Module 4: EGRESS ROUTER MODULE. Module 5: DESTINATION MODULE. SOURCE MODULE:The task of this Module is to send the packet to the Ingress router. INGRESS ROUTER MODULE:An edge router operating on a flow passing into a network is called an ingress router. NBP prevents congestion collapse through a combination of per-flow rate monitoring at egress routers and per-flow rate control at ingress routers. Rate control allows an ingress router to police the rate at which each flow’s packets enter the network. Ingress Router contains a flow classifier, per-flow traffic shapers (e.g., leaky buckets), a feedback controller, and a rate controller
  • 4. ROUTER MODULE:The task of this Module is to accept the packet from the Ingress router and send it to the Egress router. EGRESS ROUTER MODULE:An edge router operating on a flow passing out of a network is called an egress router. NBP prevents congestion collapse through a combination of per-flow rate monitoring at egress routers and per-flow rate control at ingress routers. Rate monitoring allows an egress router to determine how rapidly each flow’s packets are leaving the network. Rate monitored using a rate estimation algorithm such as the Time Sliding Window (TSW) algorithm. Egress Router contains a flow classifier, Rate monitor, a feedback controller. DESTINATION MODULE:The task of this Module is to accept the packet from the Egress router and stored in a file in the Destination machine.
  • 5. DRAWBACKS OF EXISTING SYSTEM (ATM)  Packets are buffered in the routers present in the network which causes Congestion collapse from undelivered packets arises when bandwidth is continuously consumed by packets that are dropped before reaching their ultimate destinations.  Retransmission of undelivered packets is required to ensure no loss of data.  Unfair bandwidth allocation arises in the Internet due to the presence of undelivered packets. ADVANTAGES OF PROPOSED SYSTEM  Buffering of packets in carried out in the edge routers rather than in the core routers .  The packets are sent into the network based on the capacity of the network and hence there is no possibility of any undelivered packets present in the network.  Absence of undelivered packets avoids overload due to retransmission.  Fair allocation of bandwidth is ensured.
  • 6. SOFTWARE REQUIREMENTS: Java1.3 or More  Swings  Windows 98 or more. HARDWARE REQUIREMENTS: Hard disk : 40 GB  RAM : 128mb  Processor : Pentium
  • 7. SOFTWARE REQUIREMENTS: Java1.3 or More  Swings  Windows 98 or more. HARDWARE REQUIREMENTS: Hard disk : 40 GB  RAM : 128mb  Processor : Pentium

×