SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 522
A NOVEL TOKEN BASED APPROACH TOWARDS PACKET LOSS
CONTROL
Ravindra Ramchandra Sonawane1
, G Varalaxmi2
1
Student, 2
Associate professor, Department of CSE, ATRI, Andhra Pradesh, India
ravindrasonawane0681@gmail.com, varacse@gmail.com
Abstract
Due to the advent of technologies like Web 2.0, the Internet applications are able to support transmission of multimedia content to end
users. In such applications the transmission might result in packet loss as well. In this context, it is essential to have packet loss
control mechanisms that can avoid deterioration of quality of services while rendering media rich content. The quality of service in
this case depends on congestion control. Many protocols have been introduced in order to supplement the standard TCP protocol in
order to control network congestion. The CSFQ which was built for fair service with open – loop controller has started deterioration
in quality as P2P flows dominated Internet traffic of late. One of the closed loop congestion control known as Token-Based Congestion
Control (TBCC) was able to restrict consuming resources and provide best service to end users. It monitors inter-domain traffic for
trust relationships. Recently, Shi et al. presented a new mechanism known as Stable Token-Limited Congestion Control (STLCC) for
controlling inter-domain congestion and improve network performance. In this paper we implement the STLCC mechanism. We built a
prototype application that demonstrates the proof of concept. The experimental results revealed that the proposed application is able
to control network congestion by controlling packet loss thus improving performance of network.
Keywords – Networking, packet loss control, data gram, packet, TCP, congestion control
----------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
Networks of all kinds support certain protocols. IP is one such
protocol which is open for many networks. As it became very
popular due to the success of Internet and its applications, IP is
used in transferring voice data over Internet instead of
traditional telephone networks. Voice over IP (VoIP) has
become a well known technology for this purpose. It allows
transferring voice and also data over IP protocol in Internet.
However, congestion is the problem in all networks.
Congestion control mechanisms play important role in all
networks for quality of service. In case of packet switching
networks, congestion control is like cornerstone in such
applications [1]. The congestion control mechanisms can
prevent congestion collapse, loss of packets and delay in
service. Lot of research was found in the literature in this area
[2], [3], and [4]. There are many network architectures that are
used in various networks [5], [6], [7], [8], [9], [10]. In case of
telecommunication networks, congestion control mechanisms
suffer from two problems which have not yet been completely.
The first problem is time-varying delay while he second one is
that the feedback signals are not strictly followed by traffic
sources. This is because the traffic sources are silent when they
have nothing in hand for data transmission. In this case, the
congestion control is best effort service available over networks
to avoid problems like packet loss, congestion and delay in
service.
Internet was originally built for cooperative communications.
The communications over Internet depend on the congestion
control mechanisms provided by TCP [11]. Terminal Dependent
Congestion Control is the model used in the Internet. The
routers over Internet are provided with Active Queue
Management (AQM) [12] which can improve transport
performance. However, they are not able to control congestion
properly. There was a need for improving fairness in high speed
networks [13]. The open loop control system inserts label of
flow arrival into packet header which helps in routing process.
The Core-Stateless Fair Queuing (CSFQ) is the mechanism
which achieved the first solution to allocate fair bandwidth
allocation at core routers based on the label in order avoids
congestion. Over Internet 60% traffic is flows as per the survey
made in 2004. Out of that only Bit-Torrent [14] caused 30%.
This is because P2P networks are overlay networks that became
very popular over Internet. These networks provide targeted
services to meet the specific requirements of end users.
Congestion control is very essential in such applications for
many reasons.
Many congestion control mechanisms came into existence. In
this paper we implement Stable Token Limited Congestion
Control which will make use of limited tokens in order to
reduce congestion. We built a prototype application that
demonstrates the proof of concept. The empirical results are
encouraging. The remainder of the paper is structured as
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 523
follows. Section II reviews literature. Section III provides
details of the propose work in this paper. Section IV presents
results of experiments while section V concludes the paper.
2. RELATED WORKS
Token Based Congestion Control was explored in [15] which
restrict the tokens consumed by end users while making
communications over network. Later on in [16] self – Verifying
CSFQ extended CSFQ in order to improve the performance. It
chooses a flow and estimates the flows and then takes steps to
retransmit data without causing delay. In [17] and [18]
congestion control architecture is built which is based on Re-
feedback with fixed cost. It reduces congestion over network to
improve performance of the network. However, very high level
of complexity is required by the Re-feedback approach in order
to apply it. Inter-domain interconnection policies are of three
types. They include transit, private peering and Internet
Exchange Points. The sender keep all concept is used in private
peering policies. Congestion charges are the based for Re-
feedback. For congestion control in this paper a better approach
is followed. The aim of this paper to control packet loss by
reducing congestion thereby improving overall performance of
network In the new method, quality is guaranteed while
transmitting data. The core and edge routers are used in the
application. The routers write a digital number in the option
field of packet. This is known as token. However, the tokens
are limited. This token is important and used by the routers in
order to interpret edge point of given source and will organize
the traffic based on the source. This will reduce the congestion
on the path. In case of Token-Limited Congestion Control
(TLCC) [19] there is restriction imposed by inter-domain
routers. When the threshold is exceeded by the output token
rate, the token level of output packets is decreased by TLCC
thus increasing output token rate. TLCC is similar to TBCC and
CSFQ congestion control is estimated for long period to find
out a stable rate. When there is bad configuration, TLCC may
cause the traffic to be deteriorated so as to make bad
performance. The TCP window size flows when packets are
received and therefore the level of congestion increased in the
link. When there is congestion the flows lose packets. Once that
is over the link is kept idle as the congestion level decreases.
The two steps might be repeated and may cause the congestion
control not to reach the stability state.
3. PROPOSED CONGESTION CONTROL
MECHANISM
In order to overcome the problem specified in the previous
section, the STLCC has been introduced. It makes uses of
algorithms such as XCP and TLCC together. As per the
algorithm the rate of output is controlled in case of STLCC.
Access token resources are allocated by edge routers for flows
coming into network. When there is congestion, the incoming
rate increases at core router thereby increasing congestion level.
STLCC can measure the level of congestion automatically and
take necessary steps to reduce congestion. For doing this, the
network resources are allocated by STLCC and keep the
congestion stable. In order to achieve congestion control, the
inter-domain routers limit the number of tokens by monitoring
the incoming token rate. IN order to restrict the output token
rate, the tkbackdown, tkdown, and tkprev are the elements used
in order to keep additional data into the header field. The tkprev
is set at the source edge router who value is same as that of
tklevel. This value can’t be altered by routers. The tkdown is
used to represent decrements in token level at the routers as part
of the transmission in the path. When packets arrive at
destination, the tkpath and tkdown are combined and the
congestion index is found. In order to return the elements the
tkbackdown is kept in reverse packet and the tkdown is kept in
forwarding packet header that goes to the source edge router.
4. IMPLEMENTATION AND RESULTS
We built a prototype application in order to demonstrate the
proof of concept which controls the congestion and improves
the overall performance of the network. The environment used
to build the application is a PC with 4 GB RAM, core 2 dual
processor running Windows 7 operating system. The
application is a simulation of the concept of edge routers, core
routers and peers that involved in communication. The STLCC
mechanism has been implemented for reducing packet loss and
delay. Figure 1 shows the typical peer in the network which is
capable of sending data to other peers.
Fig. 1 – Peer interface
As can be seen in figure 1, the peer is capable of choosing data
and divides the data into various packets and sends it to
destination. It also can receive the response and present it to the
end user. First of all the data goes to core router. The core
router sends the data through edge routers.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 524
Fig. 2 – Core Router Interface
As can be seen in figure 2, the core router interface which sends
data though edge router 2 and edge router 3. The packets are
sent through these routers before reaching the destination node.
Fig. 3 – Typical Edge Router Interface
As can be seen in figure 3, the edge router is sends data to other
peers. The data can go to many peers and the intended peers
can get the information. The response can go back to the
original peer which has originated the communication.
CONCLUSIONS
In this paper we focused on the problem of network congestion.
As the networks are supposed to support multimedia content,
congestion is very important area of research. Many solutions
came into existence to reduce congestion, to increase network
performance and reduce delay in communication. Reducing
packet loss is the main aim of this work. We use the technique
known as STLCC [6] which monitors inter-domain congestion
rate and controls it in order to improve the performance of
network. The congestion control mechanism implemented in
this paper is better than previous methods such as TBCC. We
built a prototype application that demonstrates the proof of
concept. The experimental results revealed that the proposed
application is able to control network congestion by controlling
packet loss thus improving performance of network.
REFERENCES
[1] Z. Shi, D. Ionescu and D. Zhang , ―Packet Loss Control
Using Tokens at the Network Edge ‖, IEEE LATIN AMERICA
TRANSACTIONS, VOL. 10, NO. 1, JAN. 2012.
[2] S. H. Low and D. E. Lapsey, ―Optimization flow control—I:
Basic al- gorithms and convergence,‖ IEEE/ACM Trans.
Networking, vol.7, pp. 861–874, Dec. 1999.
[3] L. Benmohamed and S. M. Meerkov, ―Feedback control of
congestion in packet switching networks: The case of a single
congested node,‖ IEEE/ACM Trans. Networking, vol. 1, pp.
693–708, Dec. 1993.
[4] E. Altman, T. Basar, and R. Srikant, ―Control methods for
communica- tion networks,‖ in Proc. 36th Conf. Decision and
Control, San Diego, CA, 1997, pp. TA 31774–1809, TM3
2368–2404, TP3 2903–2945.
[5] S. Mascolo, D. Cavendish, and M. Gerla, ―ATM rate-based
congestion control using a Smith predictor: An EPRC
implementation,‖ in Proc. IEEE INFOCOM’96, San Francisco,
CA, 1996, pp. 569–576.
[6] Z. Shi, D. Ionescu and D. Zhang, ―Packet Loss Control
Using Tokens at the Network Edge‖, IEEE, vol. 10, no. 1, Jan
2012
[7] Y. Zhao, S. Q. Li, and S. Sigarto, ―A linear dynamic model
for design of stable explicit-rate ABR control schemes,‖ in
Proc. IEEE INFOCOM, Kobe, Japan, Apr. 1997, pp. 283–292.
[8] N. Ghani and J. W. Mark, ―Enhanced distributed explicit
rate allocation for ABR services in ATM networks,‖
IEEE/ACM Trans. Networking, vol. 7, pp. 710–723, Oct. 1999
[9] S. J. Golestani and S. Bhattacharyya, ―A class of end-to-end
congestion- control algorithms for the Internet,‖ in Proc. Int.
Conf. Network Protocols (ICNP), Austin, TX, Oct. 1998, pp.
137–150.
[10] S. Kalyanaraman, R. Jain, R. Goyal, S. Fahmy, and B.
Vandalore, ―The ERICA switch algorithm for ABR traffic
management in ATM networks,‖ IEEE/ACM Trans.
Networking, vol. 8, pp. 87–98, Feb. 2000.
[11] Andrew S. Tanenbaum, Computer Networks, Prentice-
HallInternational, Inc.
[12] S. Floyd and V. Jacobson. Random Early Detection
Gateways for Congestion Avoidance, ACM/IEEE Transactions
on Networking, August 1993.
[13] Ion Stoica, Scott Shenker, Hui Zhang, "Core-Stateless Fair
Queueing: A Scalable Architecture to Approximate Fair
Bandwidth Allocations in High Speed Networks", In Proc. of
SIGCOMM, 1998.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 525
[14] D. Qiu and R. Srikant. Modeling and performance analysis
of BitTorrent-like peer-to-peer networks In Proc. of
SIGCOMM, 2004
[15] Zhiqiang Shi, Token-based congestion control: Achieving
fair resource allocations in P2P networks, Innovations in NGN:
Future Network and Services, 2008. K-INGN 2008. First ITU-
T Kaleidoscope Academic Conference
[16] I. Stoica, H. Zhang, S. Shenker , Self-Verifying CSFQ, in
Proceedings of INFOCOM, 2002.
[17] Bob Briscoe,Re-feedback:Freedom with Accountability for
Causing Congestion in a Connectionles
ethttp://www.cs.ucl.ac.uk/staff/B.Briscoe/
projects/e2ephd/e2ephd_y9_cutdown_appxs.pdf
[18] Bob Briscoe, Policing Congestion Response in an
Internetwork using Refeedback, In Proc. ACM
SIGGCOMM05, 2005,
[19] Zhiqiang Shi, Yuansong Qiao, Zhimei Wu, Congestion
Control with the Fixed Cost at the Domain Border, Future
Computer and Communication (ICFCC), 2010.

More Related Content

What's hot

Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...IDES Editor
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
 
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)IRJET Journal
 
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...IJECEIAES
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
 
TCP Performance Measurement in GPRS Link Adaptation Process
TCP Performance Measurement in GPRS Link Adaptation ProcessTCP Performance Measurement in GPRS Link Adaptation Process
TCP Performance Measurement in GPRS Link Adaptation ProcessCSCJournals
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
 
General Packet Radio Service(GPRS)
General Packet Radio Service(GPRS)General Packet Radio Service(GPRS)
General Packet Radio Service(GPRS)Radhika Talaviya
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
 
1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over lte1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over ltetanawan44
 
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current TrendsCongestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current TrendsEditor IJCATR
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkIRJET Journal
 
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET Journal
 

What's hot (19)

Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
 
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
 
Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1
 
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
Joint Routing and Congestion Control in Multipath Channel based on Signal to ...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
TCP Performance Measurement in GPRS Link Adaptation Process
TCP Performance Measurement in GPRS Link Adaptation ProcessTCP Performance Measurement in GPRS Link Adaptation Process
TCP Performance Measurement in GPRS Link Adaptation Process
 
I1102014953
I1102014953I1102014953
I1102014953
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
General Packet Radio Service(GPRS)
General Packet Radio Service(GPRS)General Packet Radio Service(GPRS)
General Packet Radio Service(GPRS)
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
 
1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over lte1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over lte
 
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current TrendsCongestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
 
Study on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia NetworkStudy on Performance of Simulation Analysis on Multimedia Network
Study on Performance of Simulation Analysis on Multimedia Network
 
C0351725
C0351725C0351725
C0351725
 
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
 

Viewers also liked

ויקיפדיה ומאגרי מידע באינטרנט
ויקיפדיה ומאגרי מידע באינטרנטויקיפדיה ומאגרי מידע באינטרנט
ויקיפדיה ומאגרי מידע באינטרנטDror Kamir
 
Problemas de los examenes del curso 2.007 2.008
Problemas de los examenes del curso 2.007 2.008Problemas de los examenes del curso 2.007 2.008
Problemas de los examenes del curso 2.007 2.008Aurelio Garcia Marcos
 
Буй-генератор
Буй-генераторБуй-генератор
Буй-генераторGregory Baev
 
Program of LS-DYNA conference
Program of LS-DYNA conferenceProgram of LS-DYNA conference
Program of LS-DYNA conferenceAlyotech
 
FNBE 0315: Social Psychology - Comic Project
FNBE 0315: Social Psychology - Comic ProjectFNBE 0315: Social Psychology - Comic Project
FNBE 0315: Social Psychology - Comic Projecthaeykceb
 
Lepetu reference dated 8 December 1997
Lepetu reference dated 8 December 1997Lepetu reference dated 8 December 1997
Lepetu reference dated 8 December 1997Bruce Robertson
 
Manejo del cuello en pacientes oncológicos de cabeza y cuello
Manejo del cuello en pacientes oncológicos de cabeza y cuelloManejo del cuello en pacientes oncológicos de cabeza y cuello
Manejo del cuello en pacientes oncológicos de cabeza y cuelloorlsalamancaymas
 
Chalmit 216 Zone 1 Wellglass Hazardous Area - Ex d e Luminaire, Hazardous Ar...
Chalmit 216 Zone 1 Wellglass Hazardous Area  - Ex d e Luminaire, Hazardous Ar...Chalmit 216 Zone 1 Wellglass Hazardous Area  - Ex d e Luminaire, Hazardous Ar...
Chalmit 216 Zone 1 Wellglass Hazardous Area - Ex d e Luminaire, Hazardous Ar...Thorne & Derrick International
 
Anypoint Studio - Mule ESB Error Handling
Anypoint Studio - Mule ESB Error HandlingAnypoint Studio - Mule ESB Error Handling
Anypoint Studio - Mule ESB Error HandlingMani Rathnam Gudi
 
Cómo sacarle partido a las redes sociales de la biblioteca sin ser un experto
Cómo sacarle partido a las redes sociales de la biblioteca sin ser un expertoCómo sacarle partido a las redes sociales de la biblioteca sin ser un experto
Cómo sacarle partido a las redes sociales de la biblioteca sin ser un expertoJulián Marquina
 
Cáncer de laringe
Cáncer de laringeCáncer de laringe
Cáncer de laringeGuencho Diaz
 
Model-based Automotive Software Development using Autosar, UML, and Domain-Sp...
Model-based Automotive Software Development using Autosar, UML, and Domain-Sp...Model-based Automotive Software Development using Autosar, UML, and Domain-Sp...
Model-based Automotive Software Development using Autosar, UML, and Domain-Sp...Alexander Nyßen
 

Viewers also liked (14)

ויקיפדיה ומאגרי מידע באינטרנט
ויקיפדיה ומאגרי מידע באינטרנטויקיפדיה ומאגרי מידע באינטרנט
ויקיפדיה ומאגרי מידע באינטרנט
 
Problemas de los examenes del curso 2.007 2.008
Problemas de los examenes del curso 2.007 2.008Problemas de los examenes del curso 2.007 2.008
Problemas de los examenes del curso 2.007 2.008
 
Буй-генератор
Буй-генераторБуй-генератор
Буй-генератор
 
Program of LS-DYNA conference
Program of LS-DYNA conferenceProgram of LS-DYNA conference
Program of LS-DYNA conference
 
FNBE 0315: Social Psychology - Comic Project
FNBE 0315: Social Psychology - Comic ProjectFNBE 0315: Social Psychology - Comic Project
FNBE 0315: Social Psychology - Comic Project
 
Andrew Young Resume 1.2016
Andrew Young Resume 1.2016Andrew Young Resume 1.2016
Andrew Young Resume 1.2016
 
Perpetual Help Engineering Brochure
Perpetual Help Engineering BrochurePerpetual Help Engineering Brochure
Perpetual Help Engineering Brochure
 
Lepetu reference dated 8 December 1997
Lepetu reference dated 8 December 1997Lepetu reference dated 8 December 1997
Lepetu reference dated 8 December 1997
 
Manejo del cuello en pacientes oncológicos de cabeza y cuello
Manejo del cuello en pacientes oncológicos de cabeza y cuelloManejo del cuello en pacientes oncológicos de cabeza y cuello
Manejo del cuello en pacientes oncológicos de cabeza y cuello
 
Chalmit 216 Zone 1 Wellglass Hazardous Area - Ex d e Luminaire, Hazardous Ar...
Chalmit 216 Zone 1 Wellglass Hazardous Area  - Ex d e Luminaire, Hazardous Ar...Chalmit 216 Zone 1 Wellglass Hazardous Area  - Ex d e Luminaire, Hazardous Ar...
Chalmit 216 Zone 1 Wellglass Hazardous Area - Ex d e Luminaire, Hazardous Ar...
 
Anypoint Studio - Mule ESB Error Handling
Anypoint Studio - Mule ESB Error HandlingAnypoint Studio - Mule ESB Error Handling
Anypoint Studio - Mule ESB Error Handling
 
Cómo sacarle partido a las redes sociales de la biblioteca sin ser un experto
Cómo sacarle partido a las redes sociales de la biblioteca sin ser un expertoCómo sacarle partido a las redes sociales de la biblioteca sin ser un experto
Cómo sacarle partido a las redes sociales de la biblioteca sin ser un experto
 
Cáncer de laringe
Cáncer de laringeCáncer de laringe
Cáncer de laringe
 
Model-based Automotive Software Development using Autosar, UML, and Domain-Sp...
Model-based Automotive Software Development using Autosar, UML, and Domain-Sp...Model-based Automotive Software Development using Autosar, UML, and Domain-Sp...
Model-based Automotive Software Development using Autosar, UML, and Domain-Sp...
 

Similar to A novel token based approach towards packet loss control

A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
 
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...IRJET Journal
 
IRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET Journal
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAlexander Decker
 
A Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling RouterA Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling RouterIJERA Editor
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...ijtsrd
 
A Review on Congestion Control Approaches for Real-Time Streaming Application...
A Review on Congestion Control Approaches for Real-Time Streaming Application...A Review on Congestion Control Approaches for Real-Time Streaming Application...
A Review on Congestion Control Approaches for Real-Time Streaming Application...IJCSIS Research Publications
 
Ephemeral Performance of Choke
Ephemeral Performance of ChokeEphemeral Performance of Choke
Ephemeral Performance of Chokepaperpublications3
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
 
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...IJNSA Journal
 
Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN IJECEIAES
 
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
 

Similar to A novel token based approach towards packet loss control (20)

A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
 
IRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP network
 
An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networks
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
A Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling RouterA Case Study on Ip Based Cdma Ran by Controlling Router
A Case Study on Ip Based Cdma Ran by Controlling Router
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
 
A Review on Congestion Control Approaches for Real-Time Streaming Application...
A Review on Congestion Control Approaches for Real-Time Streaming Application...A Review on Congestion Control Approaches for Real-Time Streaming Application...
A Review on Congestion Control Approaches for Real-Time Streaming Application...
 
Bg4101335337
Bg4101335337Bg4101335337
Bg4101335337
 
Ephemeral Performance of Choke
Ephemeral Performance of ChokeEphemeral Performance of Choke
Ephemeral Performance of Choke
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
 
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
 
Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN
 
Ez33917920
Ez33917920Ez33917920
Ez33917920
 
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless network
 
U01725129138
U01725129138U01725129138
U01725129138
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
1720 1724
1720 17241720 1724
1720 1724
 
1720 1724
1720 17241720 1724
1720 1724
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Recently uploaded (20)

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

A novel token based approach towards packet loss control

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 522 A NOVEL TOKEN BASED APPROACH TOWARDS PACKET LOSS CONTROL Ravindra Ramchandra Sonawane1 , G Varalaxmi2 1 Student, 2 Associate professor, Department of CSE, ATRI, Andhra Pradesh, India ravindrasonawane0681@gmail.com, varacse@gmail.com Abstract Due to the advent of technologies like Web 2.0, the Internet applications are able to support transmission of multimedia content to end users. In such applications the transmission might result in packet loss as well. In this context, it is essential to have packet loss control mechanisms that can avoid deterioration of quality of services while rendering media rich content. The quality of service in this case depends on congestion control. Many protocols have been introduced in order to supplement the standard TCP protocol in order to control network congestion. The CSFQ which was built for fair service with open – loop controller has started deterioration in quality as P2P flows dominated Internet traffic of late. One of the closed loop congestion control known as Token-Based Congestion Control (TBCC) was able to restrict consuming resources and provide best service to end users. It monitors inter-domain traffic for trust relationships. Recently, Shi et al. presented a new mechanism known as Stable Token-Limited Congestion Control (STLCC) for controlling inter-domain congestion and improve network performance. In this paper we implement the STLCC mechanism. We built a prototype application that demonstrates the proof of concept. The experimental results revealed that the proposed application is able to control network congestion by controlling packet loss thus improving performance of network. Keywords – Networking, packet loss control, data gram, packet, TCP, congestion control ----------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION Networks of all kinds support certain protocols. IP is one such protocol which is open for many networks. As it became very popular due to the success of Internet and its applications, IP is used in transferring voice data over Internet instead of traditional telephone networks. Voice over IP (VoIP) has become a well known technology for this purpose. It allows transferring voice and also data over IP protocol in Internet. However, congestion is the problem in all networks. Congestion control mechanisms play important role in all networks for quality of service. In case of packet switching networks, congestion control is like cornerstone in such applications [1]. The congestion control mechanisms can prevent congestion collapse, loss of packets and delay in service. Lot of research was found in the literature in this area [2], [3], and [4]. There are many network architectures that are used in various networks [5], [6], [7], [8], [9], [10]. In case of telecommunication networks, congestion control mechanisms suffer from two problems which have not yet been completely. The first problem is time-varying delay while he second one is that the feedback signals are not strictly followed by traffic sources. This is because the traffic sources are silent when they have nothing in hand for data transmission. In this case, the congestion control is best effort service available over networks to avoid problems like packet loss, congestion and delay in service. Internet was originally built for cooperative communications. The communications over Internet depend on the congestion control mechanisms provided by TCP [11]. Terminal Dependent Congestion Control is the model used in the Internet. The routers over Internet are provided with Active Queue Management (AQM) [12] which can improve transport performance. However, they are not able to control congestion properly. There was a need for improving fairness in high speed networks [13]. The open loop control system inserts label of flow arrival into packet header which helps in routing process. The Core-Stateless Fair Queuing (CSFQ) is the mechanism which achieved the first solution to allocate fair bandwidth allocation at core routers based on the label in order avoids congestion. Over Internet 60% traffic is flows as per the survey made in 2004. Out of that only Bit-Torrent [14] caused 30%. This is because P2P networks are overlay networks that became very popular over Internet. These networks provide targeted services to meet the specific requirements of end users. Congestion control is very essential in such applications for many reasons. Many congestion control mechanisms came into existence. In this paper we implement Stable Token Limited Congestion Control which will make use of limited tokens in order to reduce congestion. We built a prototype application that demonstrates the proof of concept. The empirical results are encouraging. The remainder of the paper is structured as
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 523 follows. Section II reviews literature. Section III provides details of the propose work in this paper. Section IV presents results of experiments while section V concludes the paper. 2. RELATED WORKS Token Based Congestion Control was explored in [15] which restrict the tokens consumed by end users while making communications over network. Later on in [16] self – Verifying CSFQ extended CSFQ in order to improve the performance. It chooses a flow and estimates the flows and then takes steps to retransmit data without causing delay. In [17] and [18] congestion control architecture is built which is based on Re- feedback with fixed cost. It reduces congestion over network to improve performance of the network. However, very high level of complexity is required by the Re-feedback approach in order to apply it. Inter-domain interconnection policies are of three types. They include transit, private peering and Internet Exchange Points. The sender keep all concept is used in private peering policies. Congestion charges are the based for Re- feedback. For congestion control in this paper a better approach is followed. The aim of this paper to control packet loss by reducing congestion thereby improving overall performance of network In the new method, quality is guaranteed while transmitting data. The core and edge routers are used in the application. The routers write a digital number in the option field of packet. This is known as token. However, the tokens are limited. This token is important and used by the routers in order to interpret edge point of given source and will organize the traffic based on the source. This will reduce the congestion on the path. In case of Token-Limited Congestion Control (TLCC) [19] there is restriction imposed by inter-domain routers. When the threshold is exceeded by the output token rate, the token level of output packets is decreased by TLCC thus increasing output token rate. TLCC is similar to TBCC and CSFQ congestion control is estimated for long period to find out a stable rate. When there is bad configuration, TLCC may cause the traffic to be deteriorated so as to make bad performance. The TCP window size flows when packets are received and therefore the level of congestion increased in the link. When there is congestion the flows lose packets. Once that is over the link is kept idle as the congestion level decreases. The two steps might be repeated and may cause the congestion control not to reach the stability state. 3. PROPOSED CONGESTION CONTROL MECHANISM In order to overcome the problem specified in the previous section, the STLCC has been introduced. It makes uses of algorithms such as XCP and TLCC together. As per the algorithm the rate of output is controlled in case of STLCC. Access token resources are allocated by edge routers for flows coming into network. When there is congestion, the incoming rate increases at core router thereby increasing congestion level. STLCC can measure the level of congestion automatically and take necessary steps to reduce congestion. For doing this, the network resources are allocated by STLCC and keep the congestion stable. In order to achieve congestion control, the inter-domain routers limit the number of tokens by monitoring the incoming token rate. IN order to restrict the output token rate, the tkbackdown, tkdown, and tkprev are the elements used in order to keep additional data into the header field. The tkprev is set at the source edge router who value is same as that of tklevel. This value can’t be altered by routers. The tkdown is used to represent decrements in token level at the routers as part of the transmission in the path. When packets arrive at destination, the tkpath and tkdown are combined and the congestion index is found. In order to return the elements the tkbackdown is kept in reverse packet and the tkdown is kept in forwarding packet header that goes to the source edge router. 4. IMPLEMENTATION AND RESULTS We built a prototype application in order to demonstrate the proof of concept which controls the congestion and improves the overall performance of the network. The environment used to build the application is a PC with 4 GB RAM, core 2 dual processor running Windows 7 operating system. The application is a simulation of the concept of edge routers, core routers and peers that involved in communication. The STLCC mechanism has been implemented for reducing packet loss and delay. Figure 1 shows the typical peer in the network which is capable of sending data to other peers. Fig. 1 – Peer interface As can be seen in figure 1, the peer is capable of choosing data and divides the data into various packets and sends it to destination. It also can receive the response and present it to the end user. First of all the data goes to core router. The core router sends the data through edge routers.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 524 Fig. 2 – Core Router Interface As can be seen in figure 2, the core router interface which sends data though edge router 2 and edge router 3. The packets are sent through these routers before reaching the destination node. Fig. 3 – Typical Edge Router Interface As can be seen in figure 3, the edge router is sends data to other peers. The data can go to many peers and the intended peers can get the information. The response can go back to the original peer which has originated the communication. CONCLUSIONS In this paper we focused on the problem of network congestion. As the networks are supposed to support multimedia content, congestion is very important area of research. Many solutions came into existence to reduce congestion, to increase network performance and reduce delay in communication. Reducing packet loss is the main aim of this work. We use the technique known as STLCC [6] which monitors inter-domain congestion rate and controls it in order to improve the performance of network. The congestion control mechanism implemented in this paper is better than previous methods such as TBCC. We built a prototype application that demonstrates the proof of concept. The experimental results revealed that the proposed application is able to control network congestion by controlling packet loss thus improving performance of network. REFERENCES [1] Z. Shi, D. Ionescu and D. Zhang , ―Packet Loss Control Using Tokens at the Network Edge ‖, IEEE LATIN AMERICA TRANSACTIONS, VOL. 10, NO. 1, JAN. 2012. [2] S. H. Low and D. E. Lapsey, ―Optimization flow control—I: Basic al- gorithms and convergence,‖ IEEE/ACM Trans. Networking, vol.7, pp. 861–874, Dec. 1999. [3] L. Benmohamed and S. M. Meerkov, ―Feedback control of congestion in packet switching networks: The case of a single congested node,‖ IEEE/ACM Trans. Networking, vol. 1, pp. 693–708, Dec. 1993. [4] E. Altman, T. Basar, and R. Srikant, ―Control methods for communica- tion networks,‖ in Proc. 36th Conf. Decision and Control, San Diego, CA, 1997, pp. TA 31774–1809, TM3 2368–2404, TP3 2903–2945. [5] S. Mascolo, D. Cavendish, and M. Gerla, ―ATM rate-based congestion control using a Smith predictor: An EPRC implementation,‖ in Proc. IEEE INFOCOM’96, San Francisco, CA, 1996, pp. 569–576. [6] Z. Shi, D. Ionescu and D. Zhang, ―Packet Loss Control Using Tokens at the Network Edge‖, IEEE, vol. 10, no. 1, Jan 2012 [7] Y. Zhao, S. Q. Li, and S. Sigarto, ―A linear dynamic model for design of stable explicit-rate ABR control schemes,‖ in Proc. IEEE INFOCOM, Kobe, Japan, Apr. 1997, pp. 283–292. [8] N. Ghani and J. W. Mark, ―Enhanced distributed explicit rate allocation for ABR services in ATM networks,‖ IEEE/ACM Trans. Networking, vol. 7, pp. 710–723, Oct. 1999 [9] S. J. Golestani and S. Bhattacharyya, ―A class of end-to-end congestion- control algorithms for the Internet,‖ in Proc. Int. Conf. Network Protocols (ICNP), Austin, TX, Oct. 1998, pp. 137–150. [10] S. Kalyanaraman, R. Jain, R. Goyal, S. Fahmy, and B. Vandalore, ―The ERICA switch algorithm for ABR traffic management in ATM networks,‖ IEEE/ACM Trans. Networking, vol. 8, pp. 87–98, Feb. 2000. [11] Andrew S. Tanenbaum, Computer Networks, Prentice- HallInternational, Inc. [12] S. Floyd and V. Jacobson. Random Early Detection Gateways for Congestion Avoidance, ACM/IEEE Transactions on Networking, August 1993. [13] Ion Stoica, Scott Shenker, Hui Zhang, "Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High Speed Networks", In Proc. of SIGCOMM, 1998.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 525 [14] D. Qiu and R. Srikant. Modeling and performance analysis of BitTorrent-like peer-to-peer networks In Proc. of SIGCOMM, 2004 [15] Zhiqiang Shi, Token-based congestion control: Achieving fair resource allocations in P2P networks, Innovations in NGN: Future Network and Services, 2008. K-INGN 2008. First ITU- T Kaleidoscope Academic Conference [16] I. Stoica, H. Zhang, S. Shenker , Self-Verifying CSFQ, in Proceedings of INFOCOM, 2002. [17] Bob Briscoe,Re-feedback:Freedom with Accountability for Causing Congestion in a Connectionles ethttp://www.cs.ucl.ac.uk/staff/B.Briscoe/ projects/e2ephd/e2ephd_y9_cutdown_appxs.pdf [18] Bob Briscoe, Policing Congestion Response in an Internetwork using Refeedback, In Proc. ACM SIGGCOMM05, 2005, [19] Zhiqiang Shi, Yuansong Qiao, Zhimei Wu, Congestion Control with the Fixed Cost at the Domain Border, Future Computer and Communication (ICFCC), 2010.