SlideShare a Scribd company logo
Network Bottleneck Avoidance
using Edge Routers
Presented By:
Ankur Singhal
Mayank Manchanda
OUTLINE
 Introduction
 Current Scenario
 Problem Statement
 Solution Approach
 Feasibility Study
 Scope
 Existing System
 Proposed System
 Findings and Conclusion
 Future Work
INTRODUCTION
 The Internet’s excellent scalability and robustness result in part
from the end-to-end nature of Internet congestion control. End-
to-end congestion control algorithms alone, however, are
unable to prevent the congestion collapse and unfairness
created by applications that are unresponsive to network
congestion.
 The fundamental philosophy behind the Internet is expressed by
the scalability argument- no protocol, mechanism, or service
should be introduced into the Internet if it does not scale well. A
key corollary to the scalability argument is the end-to-end
argument: to maintain scalability, algorithmic complexity
should be pushed to the edges of the network whenever
possible.
CURRENT SCENARIO
 There is a need for faster data transfer without the
loss of packet while transmission either through
congestion, communication channel failure or
node failure.
 Users don’t want an overhead of retransmission of
lost or dropped packets.
 Utilization of maximum bandwidth available to
the systems.
PROBLEM STATEMENT
 Congestion collapse from undelivered packets
 Unfair bandwidth allocation to competing
network flows
SOLUTION APPROACH
 Compare, at the borders of a network, the rates
at which packets from each application flow are
entering and leaving the network.
 If a flow’s packets are entering the network faster
than they are leaving it, then the network is likely
buffering or, worse yet, discarding the flow’s
packets.
 Ensuring that each flow’s packets do not enter
the network at a rate greater than they are able
to leave the network.
 Using NBA with ECSFQ for allocation of fair
bandwidth.
FEASIBILITY STUDY
 TECHNICAL REQUIREMENTS
 Advanced Java
 Socket Programming
 File Concepts
 Threads.
 ECNOMICAL REQUIREMENTS
 Proposed system is cheaper
 Easily adaptable for both user and developer.
 OPERATIONAL REQUIREMENTS
 Message sending
 Routing the packet’s
 Controlling the packet flow
 Avoids packet loss.
HARDWARE REQUIREMENTS
The minimum configuration required to run
this project are:
 Main processor : Pentium III (or) IV
 RAM : 128MB
 Hard Disk : 10MB
 Clock Speed : 550 MHZ
 System Bus Speed : 400 MHz
 Cache RAM : 256 KB
SOFTWARE REQUIREMENTS
 Language : JDK1.7 & Above.
 Front End Design : Swing CONCEPTS
 Operating System : Windows XP and higher version.
SCOPE OF THE PROJECT
 Network Bottleneck Avoider entails the exchange
of feedback between routers at the borders of a
network
 Restrict unresponsive traffic flows
 Prevents congestion within the network.
EXISTING SYSTEM
 Congestion collapse.
 Retransmission.
 Unfair bandwidth allocation
 core-stateless fair queuing
 WFQ (Waited Fair Queuing) not sufficient
for avoiding congestion
PROPOSED SYSTEM
 Buffering of packets is carried out in the
edge routers
 No possibility of any undelivered packets
present in the network
 Fair allocation of bandwidth is ensured
MODULE ALLOCATION
 Module 1
SOURCE MODULE.
 Module 2
INGRESS ROUTER MODULE.
 Module 3
ROUTER MODULE.
 Module 4
EGRESS ROUTER MODULE.
 Module 5
DESTINATION MODULE
DATA FLOW DIAGRAM
Forward Forward
Feedback Feedback
Source
Source
Source
Destination
InRouter
Router
Router OutRouter
Router
Destination
Destination
Backward
Feedback
Backward
Feedback
SOURCE MODULE
Input Parameters:
 Source Machine Name is retrieved from the OS.
 Destination Machine Name is typed by User.
 Message is typed by User.
Output Parameters:
 Data Packets.
SOURCE DATA FLOW
DIAGRAM
USER INPUT
DESTINATION AND
MESSAGE
PACKET SPLIT
INTO 48 BYTE
SENDING DATA TO
ROUTER
RECEIVING ACK
FROM ROUTER
PACKET RECEIVED IN
ROUER
INGRESS MODULE
Input Parameters:
 Data Packets from Source Machine.
 Backward feedback from the Router.
Output Parameters:
 Data Packets.
 Forward feedback.
ALGORITHM IMPLEMENTED
 LEAKY BUCKET ALGORITHM
TIME SLIDING ALGORITHM
Arrival of the Forward
Feedback at the
OutRouter Router
Start the timer
If Packets are
arrived
Wait until the packet is
forward
Current Packet is
send
Wait until the Packet is
arrived
Yes
No
Acknowledgement is backward
to InRouter
If Packets are
forwarded
Yes
No
If no Packet to
Forwarded
Stop the timer
Yes
Forward the next packet
No
ROUTER MODULE
Input Parameters:
 Data Packets from Ingress Machine.
 Forward feedback from the Router or Ingress Router.
 Backward feedback from the Router or Egress Router.
 Hop count.
Output Parameters:
 Data Packets.
 Forward feedback.
 Incremented Hop count.
 Backward feedback.
DATA FLOW DIAGRAM
ROUTER
USER INPUT
DESTINATION
AND MESSAGE
PACKET SPLIT
INTO 48 BYTE
SENDING DATA
TO ROUTER
RECEIVING ACK
FROM ROUTER
PACKET RECEIVED IN
ROUTER
EGRESS ROUTER MODULE
Input Parameters:
 Data Packets from Router.
 Forward feedback from the Router.
Output Parameters:
 Data Packets.
 Backward feedback
RATE CONTROL ALGORITHM
If
CurrentRTT<e.b
aseRTT
On arrival of backward feedback packet p from
OutRouter router e
Current RTT =Current Time -p.times tamp
Delta RTT=-Current RTT-
e.base RTT
e.base RTT=Current RTT
RTTs Elapsed= (Current Time-e.last
FeedbackTime)/CurrentRTT
e.last FeedbackTime=Current Time
For each flow f listed in p
Rate Quantum=min (MSS/currentRTT, f.egreesRate/QF)
A
B
True
False
f.phase=
CONGESTION_
AVOIDANCE
If
(deltaRTT*f.InRouterRate<MSS*e.h
opcount)
f.InRouter Rate=f.InRouterRate*2^RTTsElapsed
If f.phase
= = CONGESTION_
AVOIDANCE
If
(deltaRTT*f.InRouterRate<MSS*e.h
opcount)
f.InRouterRate=f.InRouter Rate + rate Quantum*RTTsElapsed
f. InRouter Rate=
f.OutRouterRate-
rateQuantum
NEXT
True
True
False
True
False
If f.phase
= = SLOW_START
B A
DESTINATION MODULE
 Message received from the egress router
will be stored in the corresponding folder
as a text file depends upon the Source
Machine Name.
DESTINATION DATA FLOW
DIAGRAM
DESTINATION
RETRIVE THE
ALLOCATED BYTE
COMBINE THE
PACKET IN(48 BYTES)
FINALLY SAVE
THEM IN TEXT FILE
FINDINGS
 One flow is a TCP flow generated by an
application that always has data to send
 The other flow is a constant bit rate UDP flow
generated by an application that is unresponsive
to congestion
FINDINGS
 Severe congestion collapse using FIFO only
FINDINGS
 Moderate congestion collapse using ECSFQ only
FINDINGS
 No congestion collapse using NBA with FIFO.
CONCLUSION
 NBA is able to prevent congestion collapse from
undelivered packets. NBA ensures at the border
of the network that each flow’s packets do not
enter the network faster than they are able to
leave it.
 Simulation results show that NBA successfully
prevents congestion collapse from undelivered
packets. They also show that, while NBA is unable
to eliminate unfairness on its own, but it can be
seen that it will be able to achieve approximate
global max-min fairness for competing network
flows when combined with ECSFQ, they
approximate global max-min fairness in a
completely core-stateless fashion.
FUTURE WORK
 Combining Enhanced Core Stateless Fair
Queuing mechanism With the Network
Bottleneck Avoider to achieve fair allocation of
bandwidth within the link.
 Simulate and compare the performance of NBA
system using multiple routers.
 Examine backward feedback packets from
more than one egress router.
 Determining the most congested ingress to
egress path (i.e., the one with the lowest flow
egress rate)
THANK YOU

More Related Content

What's hot

AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
IJCNCJournal
 
CapAnalysis - Deep Packet Inspection
CapAnalysis - Deep Packet InspectionCapAnalysis - Deep Packet Inspection
CapAnalysis - Deep Packet Inspection
Chris Harrington
 
TCP RemoteFX and IPQ
TCP RemoteFX and IPQTCP RemoteFX and IPQ
TCP RemoteFX and IPQ
IPeak Networks
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
AnaniaKapala
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
transport layer
transport layer transport layer
transport layer
usman19
 
Network Layer
Network LayerNetwork Layer
Network Layer
Rutwik Jadhav
 
Networking Project(FINAL)
Networking Project(FINAL)Networking Project(FINAL)
Networking Project(FINAL)Priyojit Das
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overview
Sripati Mahapatra
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
Yoram Orzach
 
Network layer
Network layerNetwork layer
Network layer
sbkbca
 
Network analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark 4: Capture FiltersNetwork analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark 4: Capture Filters
Yoram Orzach
 
Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis
Yoram Orzach
 
Networking issues for distributed systems
Networking issues for distributed systemsNetworking issues for distributed systems
Networking issues for distributed systems
kingGovindi
 
Ch4 net layer network
Ch4 net layer networkCh4 net layer network
Ch4 net layer network
cairo university
 

What's hot (17)

AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
AN EXPLICIT LOSS AND HANDOFF NOTIFICATION SCHEME IN TCP FOR CELLULAR MOBILE S...
 
CapAnalysis - Deep Packet Inspection
CapAnalysis - Deep Packet InspectionCapAnalysis - Deep Packet Inspection
CapAnalysis - Deep Packet Inspection
 
TCP RemoteFX and IPQ
TCP RemoteFX and IPQTCP RemoteFX and IPQ
TCP RemoteFX and IPQ
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
transport layer
transport layer transport layer
transport layer
 
L2 tp
L2 tpL2 tp
L2 tp
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Networking Project(FINAL)
Networking Project(FINAL)Networking Project(FINAL)
Networking Project(FINAL)
 
Osi model with neworking overview
Osi model with neworking overviewOsi model with neworking overview
Osi model with neworking overview
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Network layer
Network layerNetwork layer
Network layer
 
Network analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark 4: Capture FiltersNetwork analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark 4: Capture Filters
 
Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis
 
Networking issues for distributed systems
Networking issues for distributed systemsNetworking issues for distributed systems
Networking issues for distributed systems
 
Ch4 net layer network
Ch4 net layer networkCh4 net layer network
Ch4 net layer network
 

Similar to Network Bottleneck Avoidance Using Edge Routers

IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
IEEEFINALSEMSTUDENTSPROJECTS
 
Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)Mumbai Academisc
 
Introduction to ns3
Introduction to ns3Introduction to ns3
Introduction to ns3
Shahid Beheshti University
 
Java Abs Network Border Patrol
Java Abs   Network Border PatrolJava Abs   Network Border Patrol
Java Abs Network Border Patrol
ncct
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
Chaynika Verma
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
IJARIIT
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
eSAT Journals
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
eSAT Publishing House
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
kkhan745
 
Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01
Sabiulla Barkathullah
 
Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
Sachin Morya
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
Ccna day1Ccna day1
Ccna day1
danishrafiq
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
partha pratim deb
 
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmHigh Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
IJSRD
 
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmHigh Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
IJSRD
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
Kamal Spring
 

Similar to Network Bottleneck Avoidance Using Edge Routers (20)

IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
 
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
 
Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)
 
Gokul
GokulGokul
Gokul
 
Introduction to ns3
Introduction to ns3Introduction to ns3
Introduction to ns3
 
Java Abs Network Border Patrol
Java Abs   Network Border PatrolJava Abs   Network Border Patrol
Java Abs Network Border Patrol
 
Chapter4 Network
Chapter4 NetworkChapter4 Network
Chapter4 Network
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01
 
Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
 
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmHigh Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
 
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing AlgorithmHigh Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
High Fault Coverage For On Chip Network Using Priority Based Routing Algorithm
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
 

Recently uploaded

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
Steel & Timber Design according to British Standard
Steel & Timber Design according to British StandardSteel & Timber Design according to British Standard
Steel & Timber Design according to British Standard
AkolbilaEmmanuel1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 

Recently uploaded (20)

Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
Steel & Timber Design according to British Standard
Steel & Timber Design according to British StandardSteel & Timber Design according to British Standard
Steel & Timber Design according to British Standard
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 

Network Bottleneck Avoidance Using Edge Routers

  • 1. Network Bottleneck Avoidance using Edge Routers Presented By: Ankur Singhal Mayank Manchanda
  • 2. OUTLINE  Introduction  Current Scenario  Problem Statement  Solution Approach  Feasibility Study  Scope  Existing System  Proposed System  Findings and Conclusion  Future Work
  • 3. INTRODUCTION  The Internet’s excellent scalability and robustness result in part from the end-to-end nature of Internet congestion control. End- to-end congestion control algorithms alone, however, are unable to prevent the congestion collapse and unfairness created by applications that are unresponsive to network congestion.  The fundamental philosophy behind the Internet is expressed by the scalability argument- no protocol, mechanism, or service should be introduced into the Internet if it does not scale well. A key corollary to the scalability argument is the end-to-end argument: to maintain scalability, algorithmic complexity should be pushed to the edges of the network whenever possible.
  • 4. CURRENT SCENARIO  There is a need for faster data transfer without the loss of packet while transmission either through congestion, communication channel failure or node failure.  Users don’t want an overhead of retransmission of lost or dropped packets.  Utilization of maximum bandwidth available to the systems.
  • 5. PROBLEM STATEMENT  Congestion collapse from undelivered packets  Unfair bandwidth allocation to competing network flows
  • 6. SOLUTION APPROACH  Compare, at the borders of a network, the rates at which packets from each application flow are entering and leaving the network.  If a flow’s packets are entering the network faster than they are leaving it, then the network is likely buffering or, worse yet, discarding the flow’s packets.  Ensuring that each flow’s packets do not enter the network at a rate greater than they are able to leave the network.  Using NBA with ECSFQ for allocation of fair bandwidth.
  • 7. FEASIBILITY STUDY  TECHNICAL REQUIREMENTS  Advanced Java  Socket Programming  File Concepts  Threads.  ECNOMICAL REQUIREMENTS  Proposed system is cheaper  Easily adaptable for both user and developer.  OPERATIONAL REQUIREMENTS  Message sending  Routing the packet’s  Controlling the packet flow  Avoids packet loss.
  • 8. HARDWARE REQUIREMENTS The minimum configuration required to run this project are:  Main processor : Pentium III (or) IV  RAM : 128MB  Hard Disk : 10MB  Clock Speed : 550 MHZ  System Bus Speed : 400 MHz  Cache RAM : 256 KB
  • 9. SOFTWARE REQUIREMENTS  Language : JDK1.7 & Above.  Front End Design : Swing CONCEPTS  Operating System : Windows XP and higher version.
  • 10. SCOPE OF THE PROJECT  Network Bottleneck Avoider entails the exchange of feedback between routers at the borders of a network  Restrict unresponsive traffic flows  Prevents congestion within the network.
  • 11. EXISTING SYSTEM  Congestion collapse.  Retransmission.  Unfair bandwidth allocation  core-stateless fair queuing  WFQ (Waited Fair Queuing) not sufficient for avoiding congestion
  • 12. PROPOSED SYSTEM  Buffering of packets is carried out in the edge routers  No possibility of any undelivered packets present in the network  Fair allocation of bandwidth is ensured
  • 13. MODULE ALLOCATION  Module 1 SOURCE MODULE.  Module 2 INGRESS ROUTER MODULE.  Module 3 ROUTER MODULE.  Module 4 EGRESS ROUTER MODULE.  Module 5 DESTINATION MODULE
  • 14. DATA FLOW DIAGRAM Forward Forward Feedback Feedback Source Source Source Destination InRouter Router Router OutRouter Router Destination Destination Backward Feedback Backward Feedback
  • 15. SOURCE MODULE Input Parameters:  Source Machine Name is retrieved from the OS.  Destination Machine Name is typed by User.  Message is typed by User. Output Parameters:  Data Packets.
  • 16. SOURCE DATA FLOW DIAGRAM USER INPUT DESTINATION AND MESSAGE PACKET SPLIT INTO 48 BYTE SENDING DATA TO ROUTER RECEIVING ACK FROM ROUTER PACKET RECEIVED IN ROUER
  • 17. INGRESS MODULE Input Parameters:  Data Packets from Source Machine.  Backward feedback from the Router. Output Parameters:  Data Packets.  Forward feedback.
  • 19. TIME SLIDING ALGORITHM Arrival of the Forward Feedback at the OutRouter Router Start the timer If Packets are arrived Wait until the packet is forward Current Packet is send Wait until the Packet is arrived Yes No Acknowledgement is backward to InRouter If Packets are forwarded Yes No If no Packet to Forwarded Stop the timer Yes Forward the next packet No
  • 20. ROUTER MODULE Input Parameters:  Data Packets from Ingress Machine.  Forward feedback from the Router or Ingress Router.  Backward feedback from the Router or Egress Router.  Hop count. Output Parameters:  Data Packets.  Forward feedback.  Incremented Hop count.  Backward feedback.
  • 21. DATA FLOW DIAGRAM ROUTER USER INPUT DESTINATION AND MESSAGE PACKET SPLIT INTO 48 BYTE SENDING DATA TO ROUTER RECEIVING ACK FROM ROUTER PACKET RECEIVED IN ROUTER
  • 22. EGRESS ROUTER MODULE Input Parameters:  Data Packets from Router.  Forward feedback from the Router. Output Parameters:  Data Packets.  Backward feedback
  • 23. RATE CONTROL ALGORITHM If CurrentRTT<e.b aseRTT On arrival of backward feedback packet p from OutRouter router e Current RTT =Current Time -p.times tamp Delta RTT=-Current RTT- e.base RTT e.base RTT=Current RTT RTTs Elapsed= (Current Time-e.last FeedbackTime)/CurrentRTT e.last FeedbackTime=Current Time For each flow f listed in p Rate Quantum=min (MSS/currentRTT, f.egreesRate/QF) A B True False
  • 24. f.phase= CONGESTION_ AVOIDANCE If (deltaRTT*f.InRouterRate<MSS*e.h opcount) f.InRouter Rate=f.InRouterRate*2^RTTsElapsed If f.phase = = CONGESTION_ AVOIDANCE If (deltaRTT*f.InRouterRate<MSS*e.h opcount) f.InRouterRate=f.InRouter Rate + rate Quantum*RTTsElapsed f. InRouter Rate= f.OutRouterRate- rateQuantum NEXT True True False True False If f.phase = = SLOW_START B A
  • 25. DESTINATION MODULE  Message received from the egress router will be stored in the corresponding folder as a text file depends upon the Source Machine Name.
  • 26. DESTINATION DATA FLOW DIAGRAM DESTINATION RETRIVE THE ALLOCATED BYTE COMBINE THE PACKET IN(48 BYTES) FINALLY SAVE THEM IN TEXT FILE
  • 27. FINDINGS  One flow is a TCP flow generated by an application that always has data to send  The other flow is a constant bit rate UDP flow generated by an application that is unresponsive to congestion
  • 28. FINDINGS  Severe congestion collapse using FIFO only
  • 29. FINDINGS  Moderate congestion collapse using ECSFQ only
  • 30. FINDINGS  No congestion collapse using NBA with FIFO.
  • 31. CONCLUSION  NBA is able to prevent congestion collapse from undelivered packets. NBA ensures at the border of the network that each flow’s packets do not enter the network faster than they are able to leave it.  Simulation results show that NBA successfully prevents congestion collapse from undelivered packets. They also show that, while NBA is unable to eliminate unfairness on its own, but it can be seen that it will be able to achieve approximate global max-min fairness for competing network flows when combined with ECSFQ, they approximate global max-min fairness in a completely core-stateless fashion.
  • 32. FUTURE WORK  Combining Enhanced Core Stateless Fair Queuing mechanism With the Network Bottleneck Avoider to achieve fair allocation of bandwidth within the link.  Simulate and compare the performance of NBA system using multiple routers.  Examine backward feedback packets from more than one egress router.  Determining the most congested ingress to egress path (i.e., the one with the lowest flow egress rate)