SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2364-2366 ISSN: 2249-6645
www.ijmer.com 2364 | Page
Pathan Uddandu1
, Sayeed Yasin2
1
M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India.
2
Asst. Professor, Dept. of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India.
ABSTRACT: Modern IP network services provide for the simultaneous digital transmission of data, voice, and video.
These services require congestion control algorithms and protocols which can solve the packet loss parameter can be kept
under control. Congestion control is therefore, the cornerstone of the packet switching networks. It should prevent
congestion collapse, provide fairness to competing flows and optimize transport performance indexes such as throughput,
loss and delay. In this paper we propose a congestion control mechanism with application to Packet Loss in networks with
P2P traffic is proposed. In this new method the edge and the core routers will write a measure of the quality of service
guaranteed by the router by writing a digital number in the Option Field of the datagram of the network packet. This is
called as “token”. The token is read by the path routers and then interpreted as its value will give a measure of the
congestion especially at the edge routers. Based on the token number, the edge router at the source’s edge point will shape
the traffic generated by the source, thus reducing the congestion on the path.
KEYWORDS: Congestion, CSFQ, STLCC, Token.
I. INTRODUCTION
There are a number of very good reasons to avoid loss in today’s computer networks. Many of these stem from the
fact that the loss is often a symptom of overflowing router buffers in the network, which can also lead to high latency, jitter,
and poor fairness. In the last few years considerable effort has been expended on the design and implementation of the
packet switching networks [1] [2]. A principle reason for developing such packet networks has been to facilitate the sharing
of computer resources. In this paper, we study whether the benefits of a network architecture that embraces rather than
avoids widespread packet loss outweigh the potential loss in efficiency of the network. We propose an alternative approach
to Internet congestion control called as decongestion control.
In a departure from conventional approaches, end hosts strive to transmit packets faster than the network can deliver
them, leveraging end-to-end erasure coding and in-network fairness enforcement. In this paper we present a protocol design
and philosophy that supports the sharing of resources that exist in various packet switching networks. After a brief
introduction to inter network protocol issues, we describe the function of a gateway as an interface between the network and
discuss its role in the protocol [3][4]. We then consider the various details of the proposed work, including addressing,
formatting, buffering, sequencing, flow control, error control, and so forth.
A typical packet switching network is composed of a set of computer resources called as hosts, a set of one or more
packet switches, and a collection of communication media that interconnect the packet switches. The ensemble of packet
switches and communication media is called as packet switching subnet as shown in Figure 1. In a typical packet switching
subnet, data of a fixed maximum size are accepted from a source node, together with a formatted destination address which
is used to route the data in a store and forward fashion.
Figure 1: packet switching communications at network Edge
II. RELATED WORK
The basic idea of peer- to- peer network is to have peers participate in an application level overlay network and
operate as both A number of approaches for queue management at Internet gateways have been studied previously. Droptail
gateways are used almost universally in the current Internet because of their simplicity. A droptail gateway drops an
incoming packet only when the buffer becomes full, thus providing congestion notification to protocols like TCP. While
simple to implement, it distributes losses among the flows arbitrarily[5]. This often results in the bursty losses from a single
TCP connection, thereby reducing its window sharply. Thus, the flow rate and consequently the throughput for that flow
Token Based Packet Loss Control Mechanism for Networks
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2364-2366 ISSN: 2249-6645
www.ijmer.com 2365 | Page
drops. Tail dropping also results in multiple connections simultaneously suffering from losses leading to global
synchronization [6]. Random early detection(RED) addresses some of the drawbacks of droptail gateways. The RED
gateway drops incoming packets with a dynamically computed probability when the exponential weighted moving average
queue size avg q exceeds a threshold.
In [6], the author does per-flow accounting maintaining only a single queue. It suggests changes to the RED
algorithm to ensure fairness and to penalize the misbehaving flows. It puts a maximum limit on the number of packets a flow
can have in the queue. Besides it also maintains the per flow queue occupancy. Drop or accept decision for an incoming
packet is then based on the average queue length and the state of that flow. It also keeps track of the flows which consistently
violate the limit requirement by maintaining a per-flow variable called as strike and penalizes those flows which have a high
value for strike. It is intended that this variable will become high for non- adaptive flows and so they will be penalized
aggressively. It has been shown through simulations [7] that FRED fails to ensure the fairness in many cases. CHOKe [8] is
an extension to RED protocol. It does not maintain any per flow state and works on the good heuristic that a flow sending at
a high rate is likely to have more packets in the queue during the time of the congestion. It decides to drop a packet during
congestion if in a random toss, it finds another packet of the same flow. In [9], the authors establish how rate guarantees can
be provided by simply using buffer management. They show that the buffer management approach is indeed capable of
providing reasonably accurate rate guarantees and the fair distribution of excess resources.
III. PROPOSED WORK
In the proposed work, a model called the Terminal Dependent Congestion Control case which is a best-effort
service in the Internet that was originally designed for a cooperative environment which is the congestion control but still it
is mainly dependent on the TCP congestion control algorithm at terminals, supplemented with load shedding at congestion
links is shown in Figure 2. In high speed networks Core Stateless Fair Queuing (CSFQ) is enhanced to fairness
set up an open- loop control system at the network layer, which inserts the label of the flow arrival rate onto the packet
header at edge routers and drops the packet at core routers based on the rate label if congestion happens. At the core routers
CSFQ is the first to achieve approximate fair bandwidth allocation among flows with O (1) complexity.
CSFQ can provide fairness to competing flows in the networks with P2P traffic, but unfortunately it is not what
end-users really want. By an end user Token Based Congestion Control (TBCC) restricts the total token resource consumed.
It cannot obtain extra bandwidth resources when TBCC is used so no matter how many connections the end user has set up.
The Self Verifying CSFQ tries to expand the CSFQ across the domain border. It randomly selects a flow, and then re-
estimates the flow’s rate, and checks whether the re-estimated rate is consistent with the label on the flow’s packet.
Consequently Self-Verifying CSFQ will put a heavy load on the border router and makes the weighted CSFQ null as well as
void.
Figure 2: Packet Loss Control
The congestion control architecture re- feedback, which aims to provide the fixed cost to end-users and bulk inter-
domain congestion charging to network operators. Re- feedback not only demands very high level complexity to identify the
malignant end user, but also is difficult to provide the fixed congestion charging to the inter domain interconnection with low
complexity. There are three types of inter domain interconnection polices: the Internet Exchange Points, the private peering
and the transit. In the private peering polices, the Sender Keep All (SKA) peering arrangements are those in which the traffic
is exchanged between two domains without mutual charge. As Re-feedback is based on the congestion charges to the peer
domain, it is difficult for re- feedback to support the requirements of SKA.
The modules of the proposed work are:
ď‚· NETWORK CONGESTION
ď‚· STABLE TOKEN LIMIT CONGESTION CONTROL (STLCC)
ď‚· TOKEN
ď‚· CORE ROUTER
ď‚· EDGE ROUTER
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2364-2366 ISSN: 2249-6645
www.ijmer.com 2366 | Page
Network Congestion: Congestion occurs when the number of packets being transmitted through the network crosses the
packet handling capacity of the network. Congestion control aims to keep number of packets below the level at which
performance falls off dramatically.
Stable Token Limit Congestion Control (STLCC): STLCC is able to shape output and input traffic at the inter
domain link with O(1) complexity. STLCC produces a congestion index, pushes the packet loss to the network edge and
improves the overall network performance. To solve the oscillation problem, the Stable Token-Limited Congestion Control
(STLCC) is also introduced. It integrates the algorithms of XCP and TLCC [10] altogether. In STLCC, the output rate of the
sender is controlled using the algorithm of XCP, so there is almost no packet lost at the congested link. At the same time, the
edge router allocates all the access token resources to the incoming flows equally. When congestion happens, the incoming
token rate increases at the core router, and then the congestion level of the congested link will also increased as well. Thus
STLCC can measure the congestion level analytically, and then allocate network resources according to the access link, and
further keep the congestion control system stable.
Token: A new and better mechanism for the congestion control with application to Packet Loss in networks with P2P
traffic is proposed. In this new method the edge and the core routers will write a measure of the quality of service guaranteed
by the router by writing the digital number in the Option Field of the datagram of the packet. This is called as token. The
token is read by the path routers and then interpreted as its value will give a measure of the congestion especially at the edge
routers. Based on the token number, the edge router at the source, thus reducing the congestion on the path.
Core Router: A core router is a router designed to operate in the Internet Backbone (or core). To fulfill this role, a router
must be able to support multiple telecommunications interfaces of the highest speed in use in the core Internet and must be
able to forward the IP packets at full speed on all of them. It must also support the routing protocols being used in the
backbone. A core router is distinct from the edge routers.
Edge Router: Edge routers sit at the edge of a backbone network and connect to the core routers. The token is read by the
path routers and then interpret as its value will give a measure of the congestion especially at the edge routers. Based on the
token number of the edge router at the source, thus reducing the congestion on the path.
IV. CONCLUSION
In this paper the architecture of Token based Congestion Control (TBCC) provides fair bandwidth allocation to end
users in the same domain is introduced. The two congestion control algorithms CSFQ and TBCC are elevated in this
proposed work. STLCC is accessible and the simulation is designed to demonstrate its validity. The Unified Congestion
Control Model which is the abstract model of the CSFQ, Re-feedback and STLCC. The simple version of the STLCC is
introduced and can be deployed on the current Internet. The inter domain router is added to the TBCC system as the two
TBCC domains are inter-connected.
REFERENCES
[1]. G. Appenzeller, N. McKeown, J. Sommers, and P. Barford, ―Recent Results on Sizing Router Buffers,‖ in Proceedings of the
Network Systems Design Conference, Oct. 2004.
[2]. M. Enachescu, Y. Ganjali, A. Goel, N. McKeown, and T. Roughgarden, ―Part III: Routers with very small buffers,‖
ACM/SIGCOMM Computer Communication Review, vol. 35, pp. 83- 90, July 2005.
[3]. L. Zhang, S. Shenker, and D. Clark, ―Observations on the dynamics of a congestion control algorithm: The effects of two-way
traffic,‖ in Proceeedings of ACM SIGCOMM, pp. 133–147, Sept. 1991. [3] F. R. E. Dell, ―Features of a proposed synchronous
data network,‖ in Proc. 2nd Symp. Problems in the Optimization of Data Communications Systems, 1971, pp. 50—57.
[4]. R. A. Scantlebury and P. T. Wilkinson, ―The design of a switching system to allow remote access to computer services by other
computers and terminal
[5]. devices,‖ in Proc. 2nd Symp. Problems in the Optimization of Data Communications Systems, 1971, pp. 160-167.
[6]. F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica. Widearea
[7]. cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP ’01), Chateau
Lake Louise, Banff, Canada, October 2001.
[8]. Das and R. Srikant. Diffusion approximations for a single node accessed by congestion-controlled sources. IEEE Transactions on
Automatic Control, 45(10):1783–1799, October 1998. [11] G. de Veciana and X. Yang. Fairness, incentives and
[9]. Sally Floyd, Van Jacobson, Link-sharing and Resource Management Models for Packet Networks, IEEEACM Transactions on
Networking, Vol.3, No.4, 1995.
[10]. John Nagle, RFC896 congestion collapse, January 1984.
[11]. S. H. Low and D. E. Lapsey, ―Optimization flow control—I: Basic algorithms and convergence,‖ IEEE/ACM Trans. Networking,
vol. 7, pp. 861–874, Dec. 1999.
[12]. Dina Katabi, Mark Handley, and Charles Rohrs, "Internet Congestion Control for Future High Bandwidth-Delay Product
Environments." ACM Sigcomm 2002, August 2002.

More Related Content

What's hot

Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETijsrd.com
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...ijasuc
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkIRJET Journal
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksAbir Hossain
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...inventionjournals
 
Cm chou 20050124
Cm chou 20050124Cm chou 20050124
Cm chou 20050124hinalala
 
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...dbpublications
 
An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...IAEME Publication
 
Gateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet ConnectivityGateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet Connectivityijsrd.com
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETiosrjce
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...JPINFOTECH JAYAPRAKASH
 
Hybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
Hybrid Periodical Flooding in Unstructured Peer-to-Peer NetworksHybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
Hybrid Periodical Flooding in Unstructured Peer-to-Peer NetworksZhenyun Zhuang
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current TrendsCongestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current TrendsEditor IJCATR
 

What's hot (20)

AWN_FINAL_TERM_PAPER
AWN_FINAL_TERM_PAPERAWN_FINAL_TERM_PAPER
AWN_FINAL_TERM_PAPER
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANET
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
 
Congestion control mechanism using network border protocol
Congestion control mechanism using network border protocolCongestion control mechanism using network border protocol
Congestion control mechanism using network border protocol
 
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh NetworkModified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networks
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
 
Cm chou 20050124
Cm chou 20050124Cm chou 20050124
Cm chou 20050124
 
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
 
An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...An optimistic sector oriented approach to mitigate broadcast storm problem in...
An optimistic sector oriented approach to mitigate broadcast storm problem in...
 
Gateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet ConnectivityGateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet Connectivity
 
Ex36918926
Ex36918926Ex36918926
Ex36918926
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANET
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...
 
Hybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
Hybrid Periodical Flooding in Unstructured Peer-to-Peer NetworksHybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
Hybrid Periodical Flooding in Unstructured Peer-to-Peer Networks
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current TrendsCongestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
 

Viewers also liked

Samecniero akademia
Samecniero akademiaSamecniero akademia
Samecniero akademiaNini Talabadze
 
Finite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat ExchangerFinite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat ExchangerIJMER
 
Management fundamentals
Management fundamentals Management fundamentals
Management fundamentals Jasimuddin Rony
 
Measurement Of Rn222 Concentrations In The Air Of Peshraw & Darbandikhan Tu...
Measurement Of Rn222  Concentrations In The Air Of Peshraw &  Darbandikhan Tu...Measurement Of Rn222  Concentrations In The Air Of Peshraw &  Darbandikhan Tu...
Measurement Of Rn222 Concentrations In The Air Of Peshraw & Darbandikhan Tu...IJMER
 
Application of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industryApplication of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industryIJMER
 
An Overview of Clearance Optimization in Sheet Metal Blanking Process
An Overview of Clearance Optimization in Sheet Metal Blanking ProcessAn Overview of Clearance Optimization in Sheet Metal Blanking Process
An Overview of Clearance Optimization in Sheet Metal Blanking ProcessIJMER
 
Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...
Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...
Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...IJMER
 
Eb3212531255
Eb3212531255Eb3212531255
Eb3212531255IJMER
 
Bg31189192
Bg31189192 Bg31189192
Bg31189192 IJMER
 
The Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisThe Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisIJMER
 
Liberty computerpub2
Liberty computerpub2Liberty computerpub2
Liberty computerpub2padisav17
 
At2419231928
At2419231928At2419231928
At2419231928IJMER
 
Az2419511954
Az2419511954Az2419511954
Az2419511954IJMER
 
Bl31218224
Bl31218224Bl31218224
Bl31218224IJMER
 
Smiling fish
Smiling fishSmiling fish
Smiling fishzdd19890823
 
Strehl Ratio with Higher-Order Parabolic Filter
Strehl Ratio with Higher-Order Parabolic FilterStrehl Ratio with Higher-Order Parabolic Filter
Strehl Ratio with Higher-Order Parabolic FilterIJMER
 
Ireland's Energy Futures
Ireland's Energy FuturesIreland's Energy Futures
Ireland's Energy Futuressaulcj
 
Optimization of Surface Impedance for Reducing Surface Waves between Antennas
Optimization of Surface Impedance for Reducing Surface Waves between AntennasOptimization of Surface Impedance for Reducing Surface Waves between Antennas
Optimization of Surface Impedance for Reducing Surface Waves between AntennasIJMER
 
Implementation of Monitoring System for Cloud Computing
Implementation of Monitoring System for Cloud ComputingImplementation of Monitoring System for Cloud Computing
Implementation of Monitoring System for Cloud ComputingIJMER
 

Viewers also liked (20)

Samecniero akademia
Samecniero akademiaSamecniero akademia
Samecniero akademia
 
Finite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat ExchangerFinite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat Exchanger
 
Management fundamentals
Management fundamentals Management fundamentals
Management fundamentals
 
Measurement Of Rn222 Concentrations In The Air Of Peshraw & Darbandikhan Tu...
Measurement Of Rn222  Concentrations In The Air Of Peshraw &  Darbandikhan Tu...Measurement Of Rn222  Concentrations In The Air Of Peshraw &  Darbandikhan Tu...
Measurement Of Rn222 Concentrations In The Air Of Peshraw & Darbandikhan Tu...
 
Application of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industryApplication of Analysis of variance and Chi- square to study diamond industry
Application of Analysis of variance and Chi- square to study diamond industry
 
An Overview of Clearance Optimization in Sheet Metal Blanking Process
An Overview of Clearance Optimization in Sheet Metal Blanking ProcessAn Overview of Clearance Optimization in Sheet Metal Blanking Process
An Overview of Clearance Optimization in Sheet Metal Blanking Process
 
Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...
Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...
Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...
 
Eb3212531255
Eb3212531255Eb3212531255
Eb3212531255
 
Bg31189192
Bg31189192 Bg31189192
Bg31189192
 
The Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its AnalysisThe Impacts of Social Networking and Its Analysis
The Impacts of Social Networking and Its Analysis
 
Liberty computerpub2
Liberty computerpub2Liberty computerpub2
Liberty computerpub2
 
At2419231928
At2419231928At2419231928
At2419231928
 
Az2419511954
Az2419511954Az2419511954
Az2419511954
 
Bl31218224
Bl31218224Bl31218224
Bl31218224
 
Smiling fish
Smiling fishSmiling fish
Smiling fish
 
Eleni
EleniEleni
Eleni
 
Strehl Ratio with Higher-Order Parabolic Filter
Strehl Ratio with Higher-Order Parabolic FilterStrehl Ratio with Higher-Order Parabolic Filter
Strehl Ratio with Higher-Order Parabolic Filter
 
Ireland's Energy Futures
Ireland's Energy FuturesIreland's Energy Futures
Ireland's Energy Futures
 
Optimization of Surface Impedance for Reducing Surface Waves between Antennas
Optimization of Surface Impedance for Reducing Surface Waves between AntennasOptimization of Surface Impedance for Reducing Surface Waves between Antennas
Optimization of Surface Impedance for Reducing Surface Waves between Antennas
 
Implementation of Monitoring System for Cloud Computing
Implementation of Monitoring System for Cloud ComputingImplementation of Monitoring System for Cloud Computing
Implementation of Monitoring System for Cloud Computing
 

Similar to Pathan Uddandu and Sayeed Yasin propose token-based congestion control

CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...IOSR Journals
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss controleSAT Journals
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet losseSAT Publishing House
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKcscpconf
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...ijtsrd
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Journals
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Publishing House
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ijgca
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...ijceronline
 
Bg4101335337
Bg4101335337Bg4101335337
Bg4101335337IJERA Editor
 

Similar to Pathan Uddandu and Sayeed Yasin propose token-based congestion control (20)

CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
 
C0351725
C0351725C0351725
C0351725
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
50120130405013
5012013040501350120130405013
50120130405013
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
 
Bg4101335337
Bg4101335337Bg4101335337
Bg4101335337
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Pathan Uddandu and Sayeed Yasin propose token-based congestion control

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2364-2366 ISSN: 2249-6645 www.ijmer.com 2364 | Page Pathan Uddandu1 , Sayeed Yasin2 1 M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India. 2 Asst. Professor, Dept. of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India. ABSTRACT: Modern IP network services provide for the simultaneous digital transmission of data, voice, and video. These services require congestion control algorithms and protocols which can solve the packet loss parameter can be kept under control. Congestion control is therefore, the cornerstone of the packet switching networks. It should prevent congestion collapse, provide fairness to competing flows and optimize transport performance indexes such as throughput, loss and delay. In this paper we propose a congestion control mechanism with application to Packet Loss in networks with P2P traffic is proposed. In this new method the edge and the core routers will write a measure of the quality of service guaranteed by the router by writing a digital number in the Option Field of the datagram of the network packet. This is called as “token”. The token is read by the path routers and then interpreted as its value will give a measure of the congestion especially at the edge routers. Based on the token number, the edge router at the source’s edge point will shape the traffic generated by the source, thus reducing the congestion on the path. KEYWORDS: Congestion, CSFQ, STLCC, Token. I. INTRODUCTION There are a number of very good reasons to avoid loss in today’s computer networks. Many of these stem from the fact that the loss is often a symptom of overflowing router buffers in the network, which can also lead to high latency, jitter, and poor fairness. In the last few years considerable effort has been expended on the design and implementation of the packet switching networks [1] [2]. A principle reason for developing such packet networks has been to facilitate the sharing of computer resources. In this paper, we study whether the benefits of a network architecture that embraces rather than avoids widespread packet loss outweigh the potential loss in efficiency of the network. We propose an alternative approach to Internet congestion control called as decongestion control. In a departure from conventional approaches, end hosts strive to transmit packets faster than the network can deliver them, leveraging end-to-end erasure coding and in-network fairness enforcement. In this paper we present a protocol design and philosophy that supports the sharing of resources that exist in various packet switching networks. After a brief introduction to inter network protocol issues, we describe the function of a gateway as an interface between the network and discuss its role in the protocol [3][4]. We then consider the various details of the proposed work, including addressing, formatting, buffering, sequencing, flow control, error control, and so forth. A typical packet switching network is composed of a set of computer resources called as hosts, a set of one or more packet switches, and a collection of communication media that interconnect the packet switches. The ensemble of packet switches and communication media is called as packet switching subnet as shown in Figure 1. In a typical packet switching subnet, data of a fixed maximum size are accepted from a source node, together with a formatted destination address which is used to route the data in a store and forward fashion. Figure 1: packet switching communications at network Edge II. RELATED WORK The basic idea of peer- to- peer network is to have peers participate in an application level overlay network and operate as both A number of approaches for queue management at Internet gateways have been studied previously. Droptail gateways are used almost universally in the current Internet because of their simplicity. A droptail gateway drops an incoming packet only when the buffer becomes full, thus providing congestion notification to protocols like TCP. While simple to implement, it distributes losses among the flows arbitrarily[5]. This often results in the bursty losses from a single TCP connection, thereby reducing its window sharply. Thus, the flow rate and consequently the throughput for that flow Token Based Packet Loss Control Mechanism for Networks
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2364-2366 ISSN: 2249-6645 www.ijmer.com 2365 | Page drops. Tail dropping also results in multiple connections simultaneously suffering from losses leading to global synchronization [6]. Random early detection(RED) addresses some of the drawbacks of droptail gateways. The RED gateway drops incoming packets with a dynamically computed probability when the exponential weighted moving average queue size avg q exceeds a threshold. In [6], the author does per-flow accounting maintaining only a single queue. It suggests changes to the RED algorithm to ensure fairness and to penalize the misbehaving flows. It puts a maximum limit on the number of packets a flow can have in the queue. Besides it also maintains the per flow queue occupancy. Drop or accept decision for an incoming packet is then based on the average queue length and the state of that flow. It also keeps track of the flows which consistently violate the limit requirement by maintaining a per-flow variable called as strike and penalizes those flows which have a high value for strike. It is intended that this variable will become high for non- adaptive flows and so they will be penalized aggressively. It has been shown through simulations [7] that FRED fails to ensure the fairness in many cases. CHOKe [8] is an extension to RED protocol. It does not maintain any per flow state and works on the good heuristic that a flow sending at a high rate is likely to have more packets in the queue during the time of the congestion. It decides to drop a packet during congestion if in a random toss, it finds another packet of the same flow. In [9], the authors establish how rate guarantees can be provided by simply using buffer management. They show that the buffer management approach is indeed capable of providing reasonably accurate rate guarantees and the fair distribution of excess resources. III. PROPOSED WORK In the proposed work, a model called the Terminal Dependent Congestion Control case which is a best-effort service in the Internet that was originally designed for a cooperative environment which is the congestion control but still it is mainly dependent on the TCP congestion control algorithm at terminals, supplemented with load shedding at congestion links is shown in Figure 2. In high speed networks Core Stateless Fair Queuing (CSFQ) is enhanced to fairness set up an open- loop control system at the network layer, which inserts the label of the flow arrival rate onto the packet header at edge routers and drops the packet at core routers based on the rate label if congestion happens. At the core routers CSFQ is the first to achieve approximate fair bandwidth allocation among flows with O (1) complexity. CSFQ can provide fairness to competing flows in the networks with P2P traffic, but unfortunately it is not what end-users really want. By an end user Token Based Congestion Control (TBCC) restricts the total token resource consumed. It cannot obtain extra bandwidth resources when TBCC is used so no matter how many connections the end user has set up. The Self Verifying CSFQ tries to expand the CSFQ across the domain border. It randomly selects a flow, and then re- estimates the flow’s rate, and checks whether the re-estimated rate is consistent with the label on the flow’s packet. Consequently Self-Verifying CSFQ will put a heavy load on the border router and makes the weighted CSFQ null as well as void. Figure 2: Packet Loss Control The congestion control architecture re- feedback, which aims to provide the fixed cost to end-users and bulk inter- domain congestion charging to network operators. Re- feedback not only demands very high level complexity to identify the malignant end user, but also is difficult to provide the fixed congestion charging to the inter domain interconnection with low complexity. There are three types of inter domain interconnection polices: the Internet Exchange Points, the private peering and the transit. In the private peering polices, the Sender Keep All (SKA) peering arrangements are those in which the traffic is exchanged between two domains without mutual charge. As Re-feedback is based on the congestion charges to the peer domain, it is difficult for re- feedback to support the requirements of SKA. The modules of the proposed work are: ď‚· NETWORK CONGESTION ď‚· STABLE TOKEN LIMIT CONGESTION CONTROL (STLCC) ď‚· TOKEN ď‚· CORE ROUTER ď‚· EDGE ROUTER
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 4, Jul. - Aug. 2013 pp-2364-2366 ISSN: 2249-6645 www.ijmer.com 2366 | Page Network Congestion: Congestion occurs when the number of packets being transmitted through the network crosses the packet handling capacity of the network. Congestion control aims to keep number of packets below the level at which performance falls off dramatically. Stable Token Limit Congestion Control (STLCC): STLCC is able to shape output and input traffic at the inter domain link with O(1) complexity. STLCC produces a congestion index, pushes the packet loss to the network edge and improves the overall network performance. To solve the oscillation problem, the Stable Token-Limited Congestion Control (STLCC) is also introduced. It integrates the algorithms of XCP and TLCC [10] altogether. In STLCC, the output rate of the sender is controlled using the algorithm of XCP, so there is almost no packet lost at the congested link. At the same time, the edge router allocates all the access token resources to the incoming flows equally. When congestion happens, the incoming token rate increases at the core router, and then the congestion level of the congested link will also increased as well. Thus STLCC can measure the congestion level analytically, and then allocate network resources according to the access link, and further keep the congestion control system stable. Token: A new and better mechanism for the congestion control with application to Packet Loss in networks with P2P traffic is proposed. In this new method the edge and the core routers will write a measure of the quality of service guaranteed by the router by writing the digital number in the Option Field of the datagram of the packet. This is called as token. The token is read by the path routers and then interpreted as its value will give a measure of the congestion especially at the edge routers. Based on the token number, the edge router at the source, thus reducing the congestion on the path. Core Router: A core router is a router designed to operate in the Internet Backbone (or core). To fulfill this role, a router must be able to support multiple telecommunications interfaces of the highest speed in use in the core Internet and must be able to forward the IP packets at full speed on all of them. It must also support the routing protocols being used in the backbone. A core router is distinct from the edge routers. Edge Router: Edge routers sit at the edge of a backbone network and connect to the core routers. The token is read by the path routers and then interpret as its value will give a measure of the congestion especially at the edge routers. Based on the token number of the edge router at the source, thus reducing the congestion on the path. IV. CONCLUSION In this paper the architecture of Token based Congestion Control (TBCC) provides fair bandwidth allocation to end users in the same domain is introduced. The two congestion control algorithms CSFQ and TBCC are elevated in this proposed work. STLCC is accessible and the simulation is designed to demonstrate its validity. The Unified Congestion Control Model which is the abstract model of the CSFQ, Re-feedback and STLCC. The simple version of the STLCC is introduced and can be deployed on the current Internet. The inter domain router is added to the TBCC system as the two TBCC domains are inter-connected. REFERENCES [1]. G. Appenzeller, N. McKeown, J. Sommers, and P. Barford, ―Recent Results on Sizing Router Buffers,‖ in Proceedings of the Network Systems Design Conference, Oct. 2004. [2]. M. Enachescu, Y. Ganjali, A. Goel, N. McKeown, and T. Roughgarden, ―Part III: Routers with very small buffers,‖ ACM/SIGCOMM Computer Communication Review, vol. 35, pp. 83- 90, July 2005. [3]. L. Zhang, S. Shenker, and D. Clark, ―Observations on the dynamics of a congestion control algorithm: The effects of two-way traffic,‖ in Proceeedings of ACM SIGCOMM, pp. 133–147, Sept. 1991. [3] F. R. E. Dell, ―Features of a proposed synchronous data network,‖ in Proc. 2nd Symp. Problems in the Optimization of Data Communications Systems, 1971, pp. 50—57. [4]. R. A. Scantlebury and P. T. Wilkinson, ―The design of a switching system to allow remote access to computer services by other computers and terminal [5]. devices,‖ in Proc. 2nd Symp. Problems in the Optimization of Data Communications Systems, 1971, pp. 160-167. [6]. F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica. Widearea [7]. cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP ’01), Chateau Lake Louise, Banff, Canada, October 2001. [8]. Das and R. Srikant. Diffusion approximations for a single node accessed by congestion-controlled sources. IEEE Transactions on Automatic Control, 45(10):1783–1799, October 1998. [11] G. de Veciana and X. Yang. Fairness, incentives and [9]. Sally Floyd, Van Jacobson, Link-sharing and Resource Management Models for Packet Networks, IEEEACM Transactions on Networking, Vol.3, No.4, 1995. [10]. John Nagle, RFC896 congestion collapse, January 1984. [11]. S. H. Low and D. E. Lapsey, ―Optimization flow control—I: Basic algorithms and convergence,‖ IEEE/ACM Trans. Networking, vol. 7, pp. 861–874, Dec. 1999. [12]. Dina Katabi, Mark Handley, and Charles Rohrs, "Internet Congestion Control for Future High Bandwidth-Delay Product Environments." ACM Sigcomm 2002, August 2002.