SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
NETWORK BORDER PATROL
    PREVENTING CONGESTION COLLAPSE
The fundamental philosophy behind the Internet is expressed by the scalability
argument: no protocol, mechanism, or service should be introduced into the
Internet if it does not scale well.

A key corollary to the scalability argument is the end-to-end argument: to maintain
scalability, algorithmic complexity should be pushed to the edges of the network
whenever possible.

Perhaps the best example of the Internet philosophy is TCP congestion control,
which is implemented primarily through algorithms operating at end systems.

Unfortunately, TCP congestion control also illustrates some of the shortcomings
the end-to-end argument. As a result of its strict adherence to end-to-end
congestion control, the current Internet suffers from main maladies: congestion
collapse from undelivered packets.

The Internet’s excellent scalability and robustness result in part from the end-to-
end nature of Internet congestion control. End-to-end congestion control algorithms
alone, however, are unable to prevent the congestion collapse and unfairness
created by applications that are unresponsive to network congestion.

To address these maladies, we propose and investigate a novel congestion-
avoidance mechanism called network border patrol (NBP).

NBP entails the exchange of feedback between routers at the borders of a network
in order to detect and restrict unresponsive traffic flows before they enter the
network, thereby preventing congestion within the network.


PROJECT MODULES
            The various modules in the protocol are as follows

Module 1:- SOURCE MODULE
Module 2:- INGRESS ROUTER MODULE
Module 3:- ROUTER MODULE
Module 4:- EGRESS ROUTER MODULE
Module 5:- DESTINATION MODULE
•   SOURCE MODULE
      The task of this Module is to send the packet to the Ingress router.


•   INGRESS ROUTER MODULE
      An edge router operating on a flow passing into a network is called an
      ingress router.
      NBP prevents congestion collapse through a combination of per-flow rate
      monitoring at egress routers and per-flow rate control at ingress routers.
      Rate control allows an ingress router to police the rate at which each flow’s
      packets enter the network.
      Ingress Router contains a flow classifier, per-flow traffic shapers (e.g., leaky
      buckets), a feedback controller, and a rate controller


•   ROUTER MODULE
      The task of this Module is to accept the packet from the Ingress router and
      send it to the Egress router.


•   EGRESS ROUTER MODULE
      An edge router operating on a flow passing out of a network is called an
      egress router. NBP prevents congestion collapse through a combination of
      per-flow rate monitoring at egress routers and per-flow rate control at
      ingress routers.
      Rate monitoring allows an egress router to determine how rapidly each
      flow’s packets are leaving the network.
      Rate monitored using a rate estimation algorithm such as the Time Sliding
      Window (TSW) algorithm. Egress Router contains a flow classifier, Rate
      monitor, a feedback controller.


•   DESTINATION MODULE
      The task of this Module is to accept the packet from the Egress router and
      stored in a file in the Destination machine.


ADVANTAGES OF PROPOSED SYSTEM
♦ Buffering of packets in carried out in the edge routers rather than in the core
  routers
♦ The packets are sent into the network based on the capacity of the network and
  hence there is no possibility of any undelivered packets present in the network.
♦ Absence of undelivered packets avoids overload due to retransmission.
♦ Fair allocation of bandwidth is ensured.
DRAWBACKS OF EXISTING SYSTEM (ATM)
•   Packets are buffered in the routers present in the network which causes
    Congestion collapse from undelivered packets arises when bandwidth is
    continuously consumed by packets that are dropped before reaching their
    ultimate destinations.
•   Retransmission of undelivered packets is required to ensure no loss of data.
•   Unfair bandwidth allocation arises in the Internet due to the presence of
    undelivered packets.


SOFTWARE REQUIREMENTS:-
•   Java1.3 or More
•   Swings
•   Windows 98 or more.


HARDWARE REQUIREMENTS:-
•   Hard disk      :   40 GB
•   RAM            :   128mb
•   Processor      :   Pentium


APPLICATIONS
    This concept can be applied in LAN, WAN, MAN and in Internet in order to
    prevent congestion collapse in the network.



                             SOURCE MODULE
•   Input Parameters
    •   Source Machine Name is retrieved from the OS
    •   Destination Machine Name is typed by User
    •   Message is typed by User


•   Output Parameters
    •   Data Packets



                             INGRESS MODULE
•   Input Parameters
    •   Data Packets from Source Machine
    •   Backward feedback from the Router
•   Output Parameters
•   Data Packets
•   Forward feedback



                             ROUTER MODULE
•   Input Parameters
    •   Data Packets from Ingress Machine
    •   Forward feedback from the Router or Ingress Router
    •   Backward feedback from the Router or Egress Router
    •   Hop count


•   Output Parameters
    •   Data Packets
    •   Forward feedback
    •   Incremented Hop count
    •   Backward feedback



                             EGRESS MODULE
•   Input Parameters
    •   Data Packets from Router
    •   Forward feedback from the Router


•   Output Parameters
    •   Data Packets
    •   Backward feedback



                           DESTINATION MODULE
•   Message received from the egress router will be stored in the
    corresponding folder as a text file depends upon the Source Machine
    Name

Contenu connexe

Plus de ncct

Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
ncct
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
ncct
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
ncct
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
ncct
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
ncct
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
ncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
ncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
ncct
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
ncct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
ncct
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
ncct
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
ncct
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
ncct
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
ncct
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
ncct
 
A S P
A S PA S P
A S P
ncct
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S P
ncct
 
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
ncct
 
Ieee Projects Ieeeprojects
Ieee Projects IeeeprojectsIeee Projects Ieeeprojects
Ieee Projects Ieeeprojects
ncct
 

Plus de ncct (20)

Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
 
A S P
A S PA S P
A S P
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S P
 
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
 
Ieee Projects Ieeeprojects
Ieee Projects IeeeprojectsIeee Projects Ieeeprojects
Ieee Projects Ieeeprojects
 

Dernier

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Dernier (20)

Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 

Java Abs Network Border Patrol

  • 1. NETWORK BORDER PATROL PREVENTING CONGESTION COLLAPSE The fundamental philosophy behind the Internet is expressed by the scalability argument: no protocol, mechanism, or service should be introduced into the Internet if it does not scale well. A key corollary to the scalability argument is the end-to-end argument: to maintain scalability, algorithmic complexity should be pushed to the edges of the network whenever possible. Perhaps the best example of the Internet philosophy is TCP congestion control, which is implemented primarily through algorithms operating at end systems. Unfortunately, TCP congestion control also illustrates some of the shortcomings the end-to-end argument. As a result of its strict adherence to end-to-end congestion control, the current Internet suffers from main maladies: congestion collapse from undelivered packets. The Internet’s excellent scalability and robustness result in part from the end-to- end nature of Internet congestion control. End-to-end congestion control algorithms alone, however, are unable to prevent the congestion collapse and unfairness created by applications that are unresponsive to network congestion. To address these maladies, we propose and investigate a novel congestion- avoidance mechanism called network border patrol (NBP). NBP entails the exchange of feedback between routers at the borders of a network in order to detect and restrict unresponsive traffic flows before they enter the network, thereby preventing congestion within the network. PROJECT MODULES The various modules in the protocol are as follows Module 1:- SOURCE MODULE Module 2:- INGRESS ROUTER MODULE Module 3:- ROUTER MODULE Module 4:- EGRESS ROUTER MODULE Module 5:- DESTINATION MODULE
  • 2. SOURCE MODULE The task of this Module is to send the packet to the Ingress router. • INGRESS ROUTER MODULE An edge router operating on a flow passing into a network is called an ingress router. NBP prevents congestion collapse through a combination of per-flow rate monitoring at egress routers and per-flow rate control at ingress routers. Rate control allows an ingress router to police the rate at which each flow’s packets enter the network. Ingress Router contains a flow classifier, per-flow traffic shapers (e.g., leaky buckets), a feedback controller, and a rate controller • ROUTER MODULE The task of this Module is to accept the packet from the Ingress router and send it to the Egress router. • EGRESS ROUTER MODULE An edge router operating on a flow passing out of a network is called an egress router. NBP prevents congestion collapse through a combination of per-flow rate monitoring at egress routers and per-flow rate control at ingress routers. Rate monitoring allows an egress router to determine how rapidly each flow’s packets are leaving the network. Rate monitored using a rate estimation algorithm such as the Time Sliding Window (TSW) algorithm. Egress Router contains a flow classifier, Rate monitor, a feedback controller. • DESTINATION MODULE The task of this Module is to accept the packet from the Egress router and stored in a file in the Destination machine. ADVANTAGES OF PROPOSED SYSTEM ♦ Buffering of packets in carried out in the edge routers rather than in the core routers ♦ The packets are sent into the network based on the capacity of the network and hence there is no possibility of any undelivered packets present in the network. ♦ Absence of undelivered packets avoids overload due to retransmission. ♦ Fair allocation of bandwidth is ensured.
  • 3. DRAWBACKS OF EXISTING SYSTEM (ATM) • Packets are buffered in the routers present in the network which causes Congestion collapse from undelivered packets arises when bandwidth is continuously consumed by packets that are dropped before reaching their ultimate destinations. • Retransmission of undelivered packets is required to ensure no loss of data. • Unfair bandwidth allocation arises in the Internet due to the presence of undelivered packets. SOFTWARE REQUIREMENTS:- • Java1.3 or More • Swings • Windows 98 or more. HARDWARE REQUIREMENTS:- • Hard disk : 40 GB • RAM : 128mb • Processor : Pentium APPLICATIONS This concept can be applied in LAN, WAN, MAN and in Internet in order to prevent congestion collapse in the network. SOURCE MODULE • Input Parameters • Source Machine Name is retrieved from the OS • Destination Machine Name is typed by User • Message is typed by User • Output Parameters • Data Packets INGRESS MODULE • Input Parameters • Data Packets from Source Machine • Backward feedback from the Router
  • 4. Output Parameters • Data Packets • Forward feedback ROUTER MODULE • Input Parameters • Data Packets from Ingress Machine • Forward feedback from the Router or Ingress Router • Backward feedback from the Router or Egress Router • Hop count • Output Parameters • Data Packets • Forward feedback • Incremented Hop count • Backward feedback EGRESS MODULE • Input Parameters • Data Packets from Router • Forward feedback from the Router • Output Parameters • Data Packets • Backward feedback DESTINATION MODULE • Message received from the egress router will be stored in the corresponding folder as a text file depends upon the Source Machine Name