SlideShare a Scribd company logo
1 of 6
Download to read offline
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (230-235), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 230
Paper Publications
Ephemeral Performance of Choke
Suhitha K.C
M P Nachimuthu M Jaganathan Engineering College, Chennimalai, Erode, India
Abstract: CHOKe is a simple and stateless active queue management (AQM) scheme. Highly attractive property of
Choke is that it can protect responsive TCP flows from unresponsive UDP flows. Packets currently queued in
buffer, to penalize the high bandwidth flows. It can be implemented by using RED algorithm. In RED algorithm
when packets arrives at a congested router. CHOKe draws a packet at a random from the FIFO buffer and
compares it with the arriving packet. If both belong to same flow, then they are both dropped; else randomly
chosen packet is left intact and arriving packet is admitted into the buffer with a probability that depend on the
level of congestion. These algorithms are typically implemented in the transport protocols (e.g., TCP) of end-
hosts. To ensure global fairness, such schemes require all users to adopt them and respond to network congestion
properly.
Keywords: CHOKe, Random Early Detection (RED), Congestion.
1. INTRODUCTION
CHOKe is a simple and stateless active queue management (AQM) scheme. Apart from low operational overhead, a
highly attractive property of CHOKe is that it can protect responsive TCP flows from unresponsive UDP flows. Choke is
able to bound both bandwidth share and buffer share a possible aggregate of UDP Traffic flow on a link. When packets
arrives at a congested router. CHOKe draws a packet at a random from the FIFO buffer and compares it with the arriving
packet. If both belong to same flow, then they are both dropped; else randomly chosen packet is left intact and arriving
packet is admitted into the buffer with a probability that depend on the level of congestion.
2. ADAPTIVE RED
The RED active queue management algorithm allows network operators to simultaneously achieve high throughput and
low average delay. The resulting average queue length is quite sensitive to the level of congestion and to the RED
parameter settings, and is therefore not predictable in advance. Delay being a major component of the quality of service
delivered to their customers, network operators would naturally like to have a rough a priori estimate of the average
delays in their congested routers; to achieve such predictable average delays with RED would require constant tuning of
the parameters to adjust to current traffic conditions.
Goal of paper is to solve this problem with minimal changes to the overall RED algorithm. We make several algorithmic
modifications to this proposal, while leaving the basic idea intact, and then evaluate its performance using simulation. We
find that this revised version of Adaptive RED, which can be implemented as a simple extension within RED routers,
removes the sensitivity to parameters that affect RED’s performance and can reliably achieve a specified target average
queue length in a wide variety of traffic scenarios. Based on extensive simulations, we believe that Adaptive RED is
sufficiently robust for deployment in routers.
This paper presents Random Early Detection (RED) gateways for congestion avoidance in packet-switched networks. The
gateway detects incipient congestion by computing the average queue size. The gateway could notify connections of
congestion either by dropping packets arriving at the gateway or by setting a bit in packet headers.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (230-235), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 231
Paper Publications
When the average queue size exceeds a preset threshold, the gateway drops or marks each arriving packet with a certain
probability, where the exact probability is a function of the average queue size.
RED gateways keep the average queue size low while allowing occasional bursts of packets in the queue. During
congestion, the probability that the gateway notifies a particular connection to reduce its window is roughly proportional
to that connection’s share of the bandwidth through the gateway. RED gateways are designed to accompany a transport-
layer congestion control protocol such as TCP. The RED gateway has no bias against burst traffic and avoids the global
synchronization of many connections decreasing their window at the same time. Simulations of a TCP/IP network are
used to illustrate the performance of RED gateways
3. WHY THE INTERNET TRAFFIC IS BURST IN SHORT TIME SCALES?
Internet exhibits multifaceted business and correlation structure over a wide span of time scales. This is focus on shorter
scales, typically less than 100-1000 milliseconds. Our objective is to identify the actual mechanisms that are responsible
for creating busty traffic in those scales. We show that TCP self-clocking, joint with queuing in the network, can shape
the packet inter arrivals of a TCP connection in a two-level ON-OFF pattern. This structure creates strong correlations and
burstiness in time scales that extend up to the Round- Trip Time (RTT) of the connection. This is more important for bulk
transfers that have a large bandwidth-delay product relative to their window size. Also, the aggregation of many flows,
without rescaling their packet inter arrivals, does not converge to a Poisson stream, as one might expect from classical
superposition results. Instead, the burstiness in those scales can be significantly reduced by TCP pacing. In particular, we
focus on the importance of the minimum pacing timer, and show that a 10-millisecond timer would be too coarse for
removing short-scale burstiness, while A 1-millisecond timer would be clients to make the almost as smooth as a Poisson
stream in sub-RTT scales
To achieve satisfying user experiences of diverse applications, quality of service (QoS) guaranteed mechanisms such as
per-flow queuing are required in routers. Deployment of per-flow queuing in high-speed routers is considered as a great
challenge since its industrial brute-force implementation is not scalable with the increase of the number of flows. In this
study, the authors propose a dynamic queues haring (DQS) mechanism to enable scalable per-flow queuing. DQS keeps
isolation of each concurrent active flow by sharing a small number of queues instead of maintaining a dedicated queue for
each in-progress flow, which is novel compared to the existing methods. According to DQS, a physical queue is created
and assigned to an active flow upon the arrival of its first packet, and is destroyed upon the departure of the last packet in
the queue. The authors combine hash method with binary sorting tree to construct and manage the dynamic mapping
between active flows and physical queues, which significantly reduce the number of required physical queues from
millions to hundreds and makes per-flow queuing feasible for high-performance routers.
Per-flow queuing mechanism suffers a great scalability problem with the dramatic increase in the number of in-progress
flows. In this paper, we first confirm the measurement result that the number of concurrent active flows in the routers is
typically in hundreds even though there may be tens of thousands of flows in-progress. Based on this observation, we
have proposed a DQS mechanism to implement scalable per-flow queuing in high-performance routers.
4. ISSUES AND TRENDS IN ROUTER DESIGN
Routers knit together the constituent networks of the global Internet, creating the illusion of a unified whole. While their
primary role is to transfer packets from a set of input links to a set of output links, they must also deal with heterogeneous
link technologies, provide scheduling support for differential service, and participate in Complex distributed algorithms to
generate globally coherent routing tables. These demands, along with an insatiable need for bandwidth in the Internet,
complicate their design. Routers are found at every level in the Internet. Routers in access networks allow homes and
small businesses to connect to an Internet service provider (ISP). Routers in enterprise networks link tens of thousands of
computers within a campus or an enterprise. Routers in the backbone are not usually directly accessible to end systems.
Instead, they link together ISPs and enterprise networks with long distance trunks. The rapid growth of the Internet has
created different challenges for routers in backbone, enterprise, and access networks. The backbone needs routers capable
of routing at high speeds on a few links. Enterprise routers should have low cost per port and a large number of ports, be
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (230-235), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 232
Paper Publications
easy to configure, and support quality of service (QoS). Finally, access routers should support many heterogeneous high-
speed ports and a variety of protocols at each port, and try to bypass the central office voice switch.
This article presents the design issues and trends that arise in these three classes of routers. The following section
describes the structure of a generic router. The section after that discusses design issues in backbone, enterprise, and
access routers. Present some recent advances and trends in router design. Finally conclude with a description of some
open problems. Note that our main topic of discussion is packet forwarding; routing protocols, which create the
forwarding tables, are dealt with only in passing
A recently proposed active queue management, CHOKe, aims to protect TCP from UDP flows. Simulations have shown
that as UDP rate increases, its bandwidth share initially rises but eventually drops. We derive an approximate model of
CHOKe and show that, provided the number of TCP flows is large, the UDP bandwidth share peaks at(e+1)1 = 0:269
when the UDP input rate is slightly larger than the link capacity, and drops to zero as UDP input rate tends to infinity,
regardless of the TCP algorithm.
TCP is believed to be largely responsible for preventing congestion collapse while Internet has undergone dramatic
growth in the last decade. Indeed, numerous measurements have consistently shown that more than 90% of traffic on the
current Internet is still TCP packets, which, fortunately, are congestion controlled. Without a proper incentive structure,
this state is fragile and can be disrupted by the growing number of non-rate-adaptive (e.g., UDP-based) applications that
can monopolize network bandwidth to the detriment of rate-adaptive applications. This has motivated several active queue
management schemes.
5. MAXIMUM AND ASYMPTOTIC UDP THROUGHPUT UNDER CHOKE
A recently proposed active queue management, Choke, is stateless, simple to implement, yet surprisingly effective in
protecting TCP from UDP flows. We present an equilibrium model of TCP/CHOKe. We prove that, provided the number
of TCP flow is large, the UDP bandwidth share peaks at (+ 1) 1 = 0 269 when UDP input rate is slightly larger than link
capacity, and drops to zero as UDP input rate tends to infinity. We clarify the spatial characteristics of the leaky buffer
under CHOKe that produce this throughput behavior. Specifically, we prove that, as UDP input rate increases, even
though the total number of UDP packets in the queue increases, their spatial distribution becomes more and more
concentrated near the tail of the queue, and drops rapidly to zero toward the head of the queue. In stark contrast to a non
leaky FIFO buffer where UDP bandwidth shares would approach 1 as its input rate increases without bound, under
CHOKe, UDP simultaneously maintains a large number of packets in the queue and receives a vanishingly small
bandwidth share, the mechanism through which CHOKe protects TCP flows.
TCP is believed to be largely responsible for preventing congestion collapse while the Internet has undergone dramatic
growth in the last decade. Indeed, numerous measurements have consistently shown that more than 90% of the traffic on
the current Internet is still TCP packets, which, fortunately, are congestion controlled
6. APPROXIMATE FAIRNESS THROUGH LIMITED FLOW LIST.
Most of router mechanisms proposed for fair bandwidth sharing lack either (1) simplicity due to complexity of intricate
per flow management of all connections (e.g., WFQ, SFQ), (2) heterogeneity due to a design targeting a specific traffic
type, e.g., RED-PD and Fair RED (FRED) or (3) robustness due to requirement for proper router configurations (e.g.,
CSFQ). All of these severely impact the scalability of the schemes. This paper proposes a novel router fairness
mechanism, namely Approximate Fairness through Partial Finish Time (AFpFT). Key to the design of AFpFT is a tag
field the value of which defines the position of the packet in an aggregate queue shared by all flows. The specific of tag
computation depends on the router’s role—edge or inner— to the flow. While gateways closest to traffic source manage
all flows, successive or inner routers only manage a limited subset at flow level. The managed flows are usually of higher
rates than fair share. Following the heavy-tailed Internet flow distribution; these flows are indeed the minority in the
Internet. Using extensive simulations, we show that the scheme is highly fair and potentially scalable unlike other
proposed schemes.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (230-235), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 233
Paper Publications
Designing core-stateless versions of fair PFFQ is not an easy task. The main hurdle is that computation of flow parameters
is dependent on other interacting flows and it is impossible to determine these parameters at network edges. The goal of
AFpFT is to approximate the fairness of per flow fair queuing algorithms with minimum states possible.
There are two distinct but complementary ways to enforce flow fairness and protection in the Internet. The end-to-end
architectural design principle of the Internet, the more classical way has been via congestion control algorithms .These
algorithms are typically implemented in the transport protocols (e.g., TCP) of end-hosts. To ensure global fairness, such
schemes require all users to adopt them and respond to network congestion properly. This requirement can hardly be met
for at least two reasons. First, there is no performance incentive to end-users. This is because users who lack the
congestion control algorithms, intentionally or otherwise, may end up with a lion share of bandwidth. Second, in order to
meet real-time requirements, many applications do not implement congestion control. Hence, to protect responsive (e.g.,
TCP) flows from unresponsive (e.g., UDP) ones.
CHOKe is a simple and stateless active queue management (AQM) scheme. A highly attractive property of CHOKe is
that it can protect responsive TCP flows from unresponsive UDP flows. Choke is able to bound both bandwidth share and
buffer share a possible aggregate of UDP Traffic flow on a link.
When packets arrives at a congested router. CHOKe draws a packet at a random from the FIFO buffer and compares it
with the arriving packet. If both belong to same flow, then they are both dropped; else randomly chosen packet is left
intact and arriving packet is admitted into the buffer with a probability that depend on the level of congestion.
Fig 1 data flow diagram
7. CONCLUSION
This paper provides the first study on CHOKe behavior in the aftermath of rate changes in UDP traffic arrival. In
particular, we are concerned with CHOKe queue behaviors during the transient regime, which we model as a transition
from one steady queue state to another. We found that the performance limits stipulated in the steady state rarely hold for
such transient regimes. Depending on the nature of rate change, the queue exhibits instant fluctuations of UDP bandwidth
sharing in reverse direction. This behavior has ramifications on the smooth operation of the Internet where most flows are
rate-adaptive. Such flows may see fluctuating available link bandwidth and degrade in performance. By extending and
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (230-235), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 234
Paper Publications
leveraging the spatial distribution model, this paper analytically: 1) determines the extreme points of UDP utilization
(observed within an order of queuing delay after rate change); and 2) tracks the evolution of the transient UDP utilization
following rate change. In addition, the model allows us to obtain generic UDP utilization plots that help explain both the
transient extreme characteristics and steady-state characteristics. The analytic results have been rigorously validated
through extensive simulations. We believe the analytical approach used in this paper also sheds light on studying transient
behaviors of other leaky queues.
The analysis is independent of the specific flavor of TCP window control algorithm. The only condition placed upon TCP
flows is that they collectively are able to grab the remaining bandwidth left by the UDP flow. This can easily be fulfilled
by most TCP algorithms, making the analysis and results applicable to a wide variety of TCP algorithms. Recall from the
analysis that the transient behavior is mainly controlled by the UDP source rate and factor of rate change. Therefore, it is
plausible to formulate the analysis on a rate-based model, rather than window-based. The latter is commonly used for
investigating (microscopic) TCP behavior. The TCP flows are of secondary importance as they merely take up the
bandwidth left over by the UDP flow. As a result, detailed modeling of TCP window control algorithms seems orthogonal
to this work. However, window-based analysis may be suitable in other situations where the TCP itself is the primary
control (or parameter of interest) or where the network behavior is controlled by multiple parameters.
AKNOWLEDEMENT
I am heartily grateful to my Head of the Department Mr. K.N SIVAKUMAR M.E., Associate Professor of Computer
Science and Engineering, for his constructive suggestions and support.With immense pleasure I regard my deep sense of
indebtedness and gratitude to the Mrs. S.DEVISRI, M.E., Assistant Professor of Department of Computer Science and
Engineering, who gave her guidance and support throughout my work and made this as a successful project.
REFERENCES
[1] S. Floyd, R. Gummadi, and S. Shenker, ―Adaptive RED: An algorithm for increasing the robustness of RED’s active
queue management,‖ Tech. Rep., 2001.
[2] S. Floyd and V. Jacobson, ―Random early detection gateways for congestion avoidance,‖ IEEE/ACM Trans.
Netw., vol. 1, no. 4, pp. 397–413, Aug. 1993
[3] J. H. Saltzer, D. P. Reed, and D. D. Clark, ―End-to-end arguments in system design,‖ Trans. Computer. Syst., vol. 2,
no. 4, pp. 277–288, 1984.
[4] H. Jiang and C. Dovrolis, ―Why is the Internet traffic bursty in short time scales?,‖ in Proc. ACM SIGMETRICS,
2005, pp. 241–252.
[5] Hu, Y. Tang, X. Chen, and B. Liu, ―Per-flow queueing by dynamic queue sharing,‖ in Proc. IEEE INFOCOM, 2007,
pp. 1613–1621
[6] M. Allman, V. Paxson, and. Blanton, ―TCP congestion control,‖ RFC5681, Sep. 2009.
[7] Demers, S. Keshav, and S. Shenker, ―Analysis and simulation of fair queuing algorithm,‖ in Proc.
ACM/SIGCOMM, 1989, pp. 1–12..
[8] J. Wang, A. Tang, and S. H. Low, ―Maximum and asymptotic UDP throughput under CHOKe,‖ in Proc. ACM
SIGMETRICS, 2003, pp. 82–90
[9] Tang, J.Wang, and S.H. Low, ―Understanding CHOKe: Throughput and spatial characteristics,‖ IEEE/ACMTrans.
Netw., vol. 12, no. 4, pp. 694–707, Aug. 2004.
[10] Eshete and Y. Jiang, ―Approximate fairness through limited flow list,‖ in Proc. Int. Teletraffic Cong., 2011, pp. 198–
205.
[11] S. Keshav, An Engineering Approach to Computer Networking: ATM Networks, the Internet, and the Telephone
Network. Reading,MA,USA: Addison-Wesley-Longman, 1997.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (230-235), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 235
Paper Publications
[12] Kortebi, L. Muscariello, S. Oueslati, and J. Roberts, ―Evaluatingthe number of active flows in a scheduler realizing
fair statistical bandwidth sharing,‖ in Proc. ACM/SIGMETRICS, 2005, pp. 217–228.
[13] Suter, T. Lakshman, D. Stiliadis, and A. Choudhury, ―Buffer management schemes for supporting TCP in gigabit
routers with per-flow queueing,‖ IEEE J. Sel. Areas Commun., vol. 17, no. 6, pp. 1159–1169, Jun. 1999.
[14] Lin and R. Morris, ―Dynamics of random early detection,‖ Comput.Commun. Rev., vol. 27, no. 4, pp. 127–137,
1997.
[15] R. Mahajan, S. Floyd, and D. Wetherall, ―Controlling high-bandwidth flows at the congested router,‖ in Proc. IEEE
ICNP, 2001, pp. 192–201.
[16] R. Pan, B. Prabhakar, and K. Psounis, ―CHOKe—A stateless active queue management scheme for approximating
fair bandwidth allocation,‖in Proc. IEEE INFOCOM, 2000, pp. 942–951.
[17] R. Pan, C. Nair, B. Yang, and B. Prabhakar, ―Packet dropping schemes, some examples and analysis,‖ in Proc.
Allerton Conf. Commun. , Contro, Comput., 2001, pp. 563–572.
[18] F. Baccelli and D. Hong, ―AIMD, fairness and fractal scaling of TCP traffic,‖ in Proc. IEEE INFOCOM, 2002, pp.
229–238.
[19] M. E. Crovella and A. Bestavros, ―Self-similarity in World Wide Web traffic: Evidence and possible causes,‖ in
Proc. ACM SIGMETRICS, 1996, pp. 160–169.
[20] Eshete and Y. Jiang, ―Generalizing the choke flow protection,‖ Comput. Netw., vol. 57, no. 1, pp. 147–161, 2013.
[21] Tang, L. L. H. Andrew, K. Jacobsson, K. H. Johansson, H. Hjalmarsson, and S. H.Low, ―Queue dynamics with
window flow control,‖ IEEE/ACM Trans. Netw., vol. 18,no. 5, pp. 1422–1435, Oct. 2010.
[22] R. Shorten, F.Wirth, and D. Leith, ―A positive systems model of TCP like congestion control: asymptotic results,‖
IEEE/ACM Trans. Netw., vol. 14, no. 3, pp. 616–629, Jun.2006.
[23] Tang, L. L. H. Andrew, K. Jacobsson, K. H. Johansson, S. H. Low ,And H.Hjalmarsson, ―Window flow control:
Macroscopic properties From microscopic factors,‖ in Proc. IEEE INFOCOM, 2008, pp. 91–95.

More Related Content

What's hot

Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Sudha Hari Tech Solution Pvt ltd
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET Journal
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETijsrd.com
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 
TLS in manet
TLS in manetTLS in manet
TLS in manetJay Patel
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...JPINFOTECH JAYAPRAKASH
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksAbir Hossain
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sgDang Hop
 
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...EvaObinna
 
Multipath TCP-Goals and Issues
Multipath TCP-Goals and IssuesMultipath TCP-Goals and Issues
Multipath TCP-Goals and IssuesRSIS International
 
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...IJECEIAES
 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...ijwmn
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...ijwmn
 

What's hot (20)

Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANET
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
C0351725
C0351725C0351725
C0351725
 
Congestion control mechanism using network border protocol
Congestion control mechanism using network border protocolCongestion control mechanism using network border protocol
Congestion control mechanism using network border protocol
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
TLS in manet
TLS in manetTLS in manet
TLS in manet
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networks
 
Chapter03 sg
Chapter03 sgChapter03 sg
Chapter03 sg
 
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
 
Multipath TCP-Goals and Issues
Multipath TCP-Goals and IssuesMultipath TCP-Goals and Issues
Multipath TCP-Goals and Issues
 
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
Fairness Comparison of TCP Variants over Proactive and Reactive Routing Proto...
 
Virtual
VirtualVirtual
Virtual
 
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
 

Viewers also liked

Viewers also liked (10)

Trivial works.com introduction
Trivial works.com introductionTrivial works.com introduction
Trivial works.com introduction
 
international publication 3
international publication 3international publication 3
international publication 3
 
India union budget 2017 2018
India union budget 2017 2018 India union budget 2017 2018
India union budget 2017 2018
 
Transformation program
Transformation programTransformation program
Transformation program
 
Що ти знаєш про америку
Що ти знаєш про америкуЩо ти знаєш про америку
Що ти знаєш про америку
 
Camera analysis 4
Camera analysis 4Camera analysis 4
Camera analysis 4
 
Dialecticvs nvncivs. il punto di vista del repubblicanesimo geopolitico attra...
Dialecticvs nvncivs. il punto di vista del repubblicanesimo geopolitico attra...Dialecticvs nvncivs. il punto di vista del repubblicanesimo geopolitico attra...
Dialecticvs nvncivs. il punto di vista del repubblicanesimo geopolitico attra...
 
pradeep publication 1
pradeep publication 1pradeep publication 1
pradeep publication 1
 
Malaria 130719065352-phpapp02
Malaria 130719065352-phpapp02Malaria 130719065352-phpapp02
Malaria 130719065352-phpapp02
 
murima 3
murima 3murima 3
murima 3
 

Similar to Ephemeral Performance of Choke

A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss controleSAT Journals
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet losseSAT Publishing House
 
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
 
Assessing Buffering with Scheduling Schemes in a QoS Internet Router
Assessing Buffering with Scheduling Schemes in a QoS Internet RouterAssessing Buffering with Scheduling Schemes in a QoS Internet Router
Assessing Buffering with Scheduling Schemes in a QoS Internet RouterIOSR Journals
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)Krishan Pareek
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...ijtsrd
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd Iaetsd
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...IOSR Journals
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...ijceronline
 
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...IRJET Journal
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...IJERA Editor
 
IRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET Journal
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network partha pratim deb
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksRushin Shah
 

Similar to Ephemeral Performance of Choke (20)

A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
Bg4101335337
Bg4101335337Bg4101335337
Bg4101335337
 
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless network
 
U01725129138
U01725129138U01725129138
U01725129138
 
Assessing Buffering with Scheduling Schemes in a QoS Internet Router
Assessing Buffering with Scheduling Schemes in a QoS Internet RouterAssessing Buffering with Scheduling Schemes in a QoS Internet Router
Assessing Buffering with Scheduling Schemes in a QoS Internet Router
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incast
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
 
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
 
50120130405013
5012013040501350120130405013
50120130405013
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...Review on buffer management schemes for packet queues in wired & wireless net...
Review on buffer management schemes for packet queues in wired & wireless net...
 
IRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP networkIRJET-A Survey on congestion control with TCP network
IRJET-A Survey on congestion control with TCP network
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
 
Transport layer
Transport layer Transport layer
Transport layer
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Ephemeral Performance of Choke

  • 1. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (230-235), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 230 Paper Publications Ephemeral Performance of Choke Suhitha K.C M P Nachimuthu M Jaganathan Engineering College, Chennimalai, Erode, India Abstract: CHOKe is a simple and stateless active queue management (AQM) scheme. Highly attractive property of Choke is that it can protect responsive TCP flows from unresponsive UDP flows. Packets currently queued in buffer, to penalize the high bandwidth flows. It can be implemented by using RED algorithm. In RED algorithm when packets arrives at a congested router. CHOKe draws a packet at a random from the FIFO buffer and compares it with the arriving packet. If both belong to same flow, then they are both dropped; else randomly chosen packet is left intact and arriving packet is admitted into the buffer with a probability that depend on the level of congestion. These algorithms are typically implemented in the transport protocols (e.g., TCP) of end- hosts. To ensure global fairness, such schemes require all users to adopt them and respond to network congestion properly. Keywords: CHOKe, Random Early Detection (RED), Congestion. 1. INTRODUCTION CHOKe is a simple and stateless active queue management (AQM) scheme. Apart from low operational overhead, a highly attractive property of CHOKe is that it can protect responsive TCP flows from unresponsive UDP flows. Choke is able to bound both bandwidth share and buffer share a possible aggregate of UDP Traffic flow on a link. When packets arrives at a congested router. CHOKe draws a packet at a random from the FIFO buffer and compares it with the arriving packet. If both belong to same flow, then they are both dropped; else randomly chosen packet is left intact and arriving packet is admitted into the buffer with a probability that depend on the level of congestion. 2. ADAPTIVE RED The RED active queue management algorithm allows network operators to simultaneously achieve high throughput and low average delay. The resulting average queue length is quite sensitive to the level of congestion and to the RED parameter settings, and is therefore not predictable in advance. Delay being a major component of the quality of service delivered to their customers, network operators would naturally like to have a rough a priori estimate of the average delays in their congested routers; to achieve such predictable average delays with RED would require constant tuning of the parameters to adjust to current traffic conditions. Goal of paper is to solve this problem with minimal changes to the overall RED algorithm. We make several algorithmic modifications to this proposal, while leaving the basic idea intact, and then evaluate its performance using simulation. We find that this revised version of Adaptive RED, which can be implemented as a simple extension within RED routers, removes the sensitivity to parameters that affect RED’s performance and can reliably achieve a specified target average queue length in a wide variety of traffic scenarios. Based on extensive simulations, we believe that Adaptive RED is sufficiently robust for deployment in routers. This paper presents Random Early Detection (RED) gateways for congestion avoidance in packet-switched networks. The gateway detects incipient congestion by computing the average queue size. The gateway could notify connections of congestion either by dropping packets arriving at the gateway or by setting a bit in packet headers.
  • 2. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (230-235), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 231 Paper Publications When the average queue size exceeds a preset threshold, the gateway drops or marks each arriving packet with a certain probability, where the exact probability is a function of the average queue size. RED gateways keep the average queue size low while allowing occasional bursts of packets in the queue. During congestion, the probability that the gateway notifies a particular connection to reduce its window is roughly proportional to that connection’s share of the bandwidth through the gateway. RED gateways are designed to accompany a transport- layer congestion control protocol such as TCP. The RED gateway has no bias against burst traffic and avoids the global synchronization of many connections decreasing their window at the same time. Simulations of a TCP/IP network are used to illustrate the performance of RED gateways 3. WHY THE INTERNET TRAFFIC IS BURST IN SHORT TIME SCALES? Internet exhibits multifaceted business and correlation structure over a wide span of time scales. This is focus on shorter scales, typically less than 100-1000 milliseconds. Our objective is to identify the actual mechanisms that are responsible for creating busty traffic in those scales. We show that TCP self-clocking, joint with queuing in the network, can shape the packet inter arrivals of a TCP connection in a two-level ON-OFF pattern. This structure creates strong correlations and burstiness in time scales that extend up to the Round- Trip Time (RTT) of the connection. This is more important for bulk transfers that have a large bandwidth-delay product relative to their window size. Also, the aggregation of many flows, without rescaling their packet inter arrivals, does not converge to a Poisson stream, as one might expect from classical superposition results. Instead, the burstiness in those scales can be significantly reduced by TCP pacing. In particular, we focus on the importance of the minimum pacing timer, and show that a 10-millisecond timer would be too coarse for removing short-scale burstiness, while A 1-millisecond timer would be clients to make the almost as smooth as a Poisson stream in sub-RTT scales To achieve satisfying user experiences of diverse applications, quality of service (QoS) guaranteed mechanisms such as per-flow queuing are required in routers. Deployment of per-flow queuing in high-speed routers is considered as a great challenge since its industrial brute-force implementation is not scalable with the increase of the number of flows. In this study, the authors propose a dynamic queues haring (DQS) mechanism to enable scalable per-flow queuing. DQS keeps isolation of each concurrent active flow by sharing a small number of queues instead of maintaining a dedicated queue for each in-progress flow, which is novel compared to the existing methods. According to DQS, a physical queue is created and assigned to an active flow upon the arrival of its first packet, and is destroyed upon the departure of the last packet in the queue. The authors combine hash method with binary sorting tree to construct and manage the dynamic mapping between active flows and physical queues, which significantly reduce the number of required physical queues from millions to hundreds and makes per-flow queuing feasible for high-performance routers. Per-flow queuing mechanism suffers a great scalability problem with the dramatic increase in the number of in-progress flows. In this paper, we first confirm the measurement result that the number of concurrent active flows in the routers is typically in hundreds even though there may be tens of thousands of flows in-progress. Based on this observation, we have proposed a DQS mechanism to implement scalable per-flow queuing in high-performance routers. 4. ISSUES AND TRENDS IN ROUTER DESIGN Routers knit together the constituent networks of the global Internet, creating the illusion of a unified whole. While their primary role is to transfer packets from a set of input links to a set of output links, they must also deal with heterogeneous link technologies, provide scheduling support for differential service, and participate in Complex distributed algorithms to generate globally coherent routing tables. These demands, along with an insatiable need for bandwidth in the Internet, complicate their design. Routers are found at every level in the Internet. Routers in access networks allow homes and small businesses to connect to an Internet service provider (ISP). Routers in enterprise networks link tens of thousands of computers within a campus or an enterprise. Routers in the backbone are not usually directly accessible to end systems. Instead, they link together ISPs and enterprise networks with long distance trunks. The rapid growth of the Internet has created different challenges for routers in backbone, enterprise, and access networks. The backbone needs routers capable of routing at high speeds on a few links. Enterprise routers should have low cost per port and a large number of ports, be
  • 3. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (230-235), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 232 Paper Publications easy to configure, and support quality of service (QoS). Finally, access routers should support many heterogeneous high- speed ports and a variety of protocols at each port, and try to bypass the central office voice switch. This article presents the design issues and trends that arise in these three classes of routers. The following section describes the structure of a generic router. The section after that discusses design issues in backbone, enterprise, and access routers. Present some recent advances and trends in router design. Finally conclude with a description of some open problems. Note that our main topic of discussion is packet forwarding; routing protocols, which create the forwarding tables, are dealt with only in passing A recently proposed active queue management, CHOKe, aims to protect TCP from UDP flows. Simulations have shown that as UDP rate increases, its bandwidth share initially rises but eventually drops. We derive an approximate model of CHOKe and show that, provided the number of TCP flows is large, the UDP bandwidth share peaks at(e+1)1 = 0:269 when the UDP input rate is slightly larger than the link capacity, and drops to zero as UDP input rate tends to infinity, regardless of the TCP algorithm. TCP is believed to be largely responsible for preventing congestion collapse while Internet has undergone dramatic growth in the last decade. Indeed, numerous measurements have consistently shown that more than 90% of traffic on the current Internet is still TCP packets, which, fortunately, are congestion controlled. Without a proper incentive structure, this state is fragile and can be disrupted by the growing number of non-rate-adaptive (e.g., UDP-based) applications that can monopolize network bandwidth to the detriment of rate-adaptive applications. This has motivated several active queue management schemes. 5. MAXIMUM AND ASYMPTOTIC UDP THROUGHPUT UNDER CHOKE A recently proposed active queue management, Choke, is stateless, simple to implement, yet surprisingly effective in protecting TCP from UDP flows. We present an equilibrium model of TCP/CHOKe. We prove that, provided the number of TCP flow is large, the UDP bandwidth share peaks at (+ 1) 1 = 0 269 when UDP input rate is slightly larger than link capacity, and drops to zero as UDP input rate tends to infinity. We clarify the spatial characteristics of the leaky buffer under CHOKe that produce this throughput behavior. Specifically, we prove that, as UDP input rate increases, even though the total number of UDP packets in the queue increases, their spatial distribution becomes more and more concentrated near the tail of the queue, and drops rapidly to zero toward the head of the queue. In stark contrast to a non leaky FIFO buffer where UDP bandwidth shares would approach 1 as its input rate increases without bound, under CHOKe, UDP simultaneously maintains a large number of packets in the queue and receives a vanishingly small bandwidth share, the mechanism through which CHOKe protects TCP flows. TCP is believed to be largely responsible for preventing congestion collapse while the Internet has undergone dramatic growth in the last decade. Indeed, numerous measurements have consistently shown that more than 90% of the traffic on the current Internet is still TCP packets, which, fortunately, are congestion controlled 6. APPROXIMATE FAIRNESS THROUGH LIMITED FLOW LIST. Most of router mechanisms proposed for fair bandwidth sharing lack either (1) simplicity due to complexity of intricate per flow management of all connections (e.g., WFQ, SFQ), (2) heterogeneity due to a design targeting a specific traffic type, e.g., RED-PD and Fair RED (FRED) or (3) robustness due to requirement for proper router configurations (e.g., CSFQ). All of these severely impact the scalability of the schemes. This paper proposes a novel router fairness mechanism, namely Approximate Fairness through Partial Finish Time (AFpFT). Key to the design of AFpFT is a tag field the value of which defines the position of the packet in an aggregate queue shared by all flows. The specific of tag computation depends on the router’s role—edge or inner— to the flow. While gateways closest to traffic source manage all flows, successive or inner routers only manage a limited subset at flow level. The managed flows are usually of higher rates than fair share. Following the heavy-tailed Internet flow distribution; these flows are indeed the minority in the Internet. Using extensive simulations, we show that the scheme is highly fair and potentially scalable unlike other proposed schemes.
  • 4. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (230-235), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 233 Paper Publications Designing core-stateless versions of fair PFFQ is not an easy task. The main hurdle is that computation of flow parameters is dependent on other interacting flows and it is impossible to determine these parameters at network edges. The goal of AFpFT is to approximate the fairness of per flow fair queuing algorithms with minimum states possible. There are two distinct but complementary ways to enforce flow fairness and protection in the Internet. The end-to-end architectural design principle of the Internet, the more classical way has been via congestion control algorithms .These algorithms are typically implemented in the transport protocols (e.g., TCP) of end-hosts. To ensure global fairness, such schemes require all users to adopt them and respond to network congestion properly. This requirement can hardly be met for at least two reasons. First, there is no performance incentive to end-users. This is because users who lack the congestion control algorithms, intentionally or otherwise, may end up with a lion share of bandwidth. Second, in order to meet real-time requirements, many applications do not implement congestion control. Hence, to protect responsive (e.g., TCP) flows from unresponsive (e.g., UDP) ones. CHOKe is a simple and stateless active queue management (AQM) scheme. A highly attractive property of CHOKe is that it can protect responsive TCP flows from unresponsive UDP flows. Choke is able to bound both bandwidth share and buffer share a possible aggregate of UDP Traffic flow on a link. When packets arrives at a congested router. CHOKe draws a packet at a random from the FIFO buffer and compares it with the arriving packet. If both belong to same flow, then they are both dropped; else randomly chosen packet is left intact and arriving packet is admitted into the buffer with a probability that depend on the level of congestion. Fig 1 data flow diagram 7. CONCLUSION This paper provides the first study on CHOKe behavior in the aftermath of rate changes in UDP traffic arrival. In particular, we are concerned with CHOKe queue behaviors during the transient regime, which we model as a transition from one steady queue state to another. We found that the performance limits stipulated in the steady state rarely hold for such transient regimes. Depending on the nature of rate change, the queue exhibits instant fluctuations of UDP bandwidth sharing in reverse direction. This behavior has ramifications on the smooth operation of the Internet where most flows are rate-adaptive. Such flows may see fluctuating available link bandwidth and degrade in performance. By extending and
  • 5. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (230-235), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 234 Paper Publications leveraging the spatial distribution model, this paper analytically: 1) determines the extreme points of UDP utilization (observed within an order of queuing delay after rate change); and 2) tracks the evolution of the transient UDP utilization following rate change. In addition, the model allows us to obtain generic UDP utilization plots that help explain both the transient extreme characteristics and steady-state characteristics. The analytic results have been rigorously validated through extensive simulations. We believe the analytical approach used in this paper also sheds light on studying transient behaviors of other leaky queues. The analysis is independent of the specific flavor of TCP window control algorithm. The only condition placed upon TCP flows is that they collectively are able to grab the remaining bandwidth left by the UDP flow. This can easily be fulfilled by most TCP algorithms, making the analysis and results applicable to a wide variety of TCP algorithms. Recall from the analysis that the transient behavior is mainly controlled by the UDP source rate and factor of rate change. Therefore, it is plausible to formulate the analysis on a rate-based model, rather than window-based. The latter is commonly used for investigating (microscopic) TCP behavior. The TCP flows are of secondary importance as they merely take up the bandwidth left over by the UDP flow. As a result, detailed modeling of TCP window control algorithms seems orthogonal to this work. However, window-based analysis may be suitable in other situations where the TCP itself is the primary control (or parameter of interest) or where the network behavior is controlled by multiple parameters. AKNOWLEDEMENT I am heartily grateful to my Head of the Department Mr. K.N SIVAKUMAR M.E., Associate Professor of Computer Science and Engineering, for his constructive suggestions and support.With immense pleasure I regard my deep sense of indebtedness and gratitude to the Mrs. S.DEVISRI, M.E., Assistant Professor of Department of Computer Science and Engineering, who gave her guidance and support throughout my work and made this as a successful project. REFERENCES [1] S. Floyd, R. Gummadi, and S. Shenker, ―Adaptive RED: An algorithm for increasing the robustness of RED’s active queue management,‖ Tech. Rep., 2001. [2] S. Floyd and V. Jacobson, ―Random early detection gateways for congestion avoidance,‖ IEEE/ACM Trans. Netw., vol. 1, no. 4, pp. 397–413, Aug. 1993 [3] J. H. Saltzer, D. P. Reed, and D. D. Clark, ―End-to-end arguments in system design,‖ Trans. Computer. Syst., vol. 2, no. 4, pp. 277–288, 1984. [4] H. Jiang and C. Dovrolis, ―Why is the Internet traffic bursty in short time scales?,‖ in Proc. ACM SIGMETRICS, 2005, pp. 241–252. [5] Hu, Y. Tang, X. Chen, and B. Liu, ―Per-flow queueing by dynamic queue sharing,‖ in Proc. IEEE INFOCOM, 2007, pp. 1613–1621 [6] M. Allman, V. Paxson, and. Blanton, ―TCP congestion control,‖ RFC5681, Sep. 2009. [7] Demers, S. Keshav, and S. Shenker, ―Analysis and simulation of fair queuing algorithm,‖ in Proc. ACM/SIGCOMM, 1989, pp. 1–12.. [8] J. Wang, A. Tang, and S. H. Low, ―Maximum and asymptotic UDP throughput under CHOKe,‖ in Proc. ACM SIGMETRICS, 2003, pp. 82–90 [9] Tang, J.Wang, and S.H. Low, ―Understanding CHOKe: Throughput and spatial characteristics,‖ IEEE/ACMTrans. Netw., vol. 12, no. 4, pp. 694–707, Aug. 2004. [10] Eshete and Y. Jiang, ―Approximate fairness through limited flow list,‖ in Proc. Int. Teletraffic Cong., 2011, pp. 198– 205. [11] S. Keshav, An Engineering Approach to Computer Networking: ATM Networks, the Internet, and the Telephone Network. Reading,MA,USA: Addison-Wesley-Longman, 1997.
  • 6. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (230-235), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 235 Paper Publications [12] Kortebi, L. Muscariello, S. Oueslati, and J. Roberts, ―Evaluatingthe number of active flows in a scheduler realizing fair statistical bandwidth sharing,‖ in Proc. ACM/SIGMETRICS, 2005, pp. 217–228. [13] Suter, T. Lakshman, D. Stiliadis, and A. Choudhury, ―Buffer management schemes for supporting TCP in gigabit routers with per-flow queueing,‖ IEEE J. Sel. Areas Commun., vol. 17, no. 6, pp. 1159–1169, Jun. 1999. [14] Lin and R. Morris, ―Dynamics of random early detection,‖ Comput.Commun. Rev., vol. 27, no. 4, pp. 127–137, 1997. [15] R. Mahajan, S. Floyd, and D. Wetherall, ―Controlling high-bandwidth flows at the congested router,‖ in Proc. IEEE ICNP, 2001, pp. 192–201. [16] R. Pan, B. Prabhakar, and K. Psounis, ―CHOKe—A stateless active queue management scheme for approximating fair bandwidth allocation,‖in Proc. IEEE INFOCOM, 2000, pp. 942–951. [17] R. Pan, C. Nair, B. Yang, and B. Prabhakar, ―Packet dropping schemes, some examples and analysis,‖ in Proc. Allerton Conf. Commun. , Contro, Comput., 2001, pp. 563–572. [18] F. Baccelli and D. Hong, ―AIMD, fairness and fractal scaling of TCP traffic,‖ in Proc. IEEE INFOCOM, 2002, pp. 229–238. [19] M. E. Crovella and A. Bestavros, ―Self-similarity in World Wide Web traffic: Evidence and possible causes,‖ in Proc. ACM SIGMETRICS, 1996, pp. 160–169. [20] Eshete and Y. Jiang, ―Generalizing the choke flow protection,‖ Comput. Netw., vol. 57, no. 1, pp. 147–161, 2013. [21] Tang, L. L. H. Andrew, K. Jacobsson, K. H. Johansson, H. Hjalmarsson, and S. H.Low, ―Queue dynamics with window flow control,‖ IEEE/ACM Trans. Netw., vol. 18,no. 5, pp. 1422–1435, Oct. 2010. [22] R. Shorten, F.Wirth, and D. Leith, ―A positive systems model of TCP like congestion control: asymptotic results,‖ IEEE/ACM Trans. Netw., vol. 14, no. 3, pp. 616–629, Jun.2006. [23] Tang, L. L. H. Andrew, K. Jacobsson, K. H. Johansson, S. H. Low ,And H.Hjalmarsson, ―Window flow control: Macroscopic properties From microscopic factors,‖ in Proc. IEEE INFOCOM, 2008, pp. 91–95.