SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
NETWORK BORDER PATROL
    PREVENTING CONGESTION COLLAPSE
The fundamental philosophy behind the Internet is expressed by the scalability
argument: no protocol, mechanism, or service should be introduced into the
Internet if it does not scale well.

A key corollary to the scalability argument is the end-to-end argument: to maintain
scalability, algorithmic complexity should be pushed to the edges of the network
whenever possible.

Perhaps the best example of the Internet philosophy is TCP congestion control,
which is implemented primarily through algorithms operating at end systems.

Unfortunately, TCP congestion control also illustrates some of the shortcomings
the end-to-end argument. As a result of its strict adherence to end-to-end
congestion control, the current Internet suffers from main maladies: congestion
collapse from undelivered packets.

The Internet’s excellent scalability and robustness result in part from the end-to-
end nature of Internet congestion control. End-to-end congestion control algorithms
alone, however, are unable to prevent the congestion collapse and unfairness
created by applications that are unresponsive to network congestion.

To address these maladies, we propose and investigate a novel congestion-
avoidance mechanism called network border patrol (NBP).

NBP entails the exchange of feedback between routers at the borders of a network
in order to detect and restrict unresponsive traffic flows before they enter the
network, thereby preventing congestion within the network.


PROJECT MODULES
            The various modules in the protocol are as follows

Module 1:- SOURCE MODULE
Module 2:- INGRESS ROUTER MODULE
Module 3:- ROUTER MODULE
Module 4:- EGRESS ROUTER MODULE
Module 5:- DESTINATION MODULE
•   SOURCE MODULE
      The task of this Module is to send the packet to the Ingress router.


•   INGRESS ROUTER MODULE
      An edge router operating on a flow passing into a network is called an
      ingress router.
      NBP prevents congestion collapse through a combination of per-flow rate
      monitoring at egress routers and per-flow rate control at ingress routers.
      Rate control allows an ingress router to police the rate at which each flow’s
      packets enter the network.
      Ingress Router contains a flow classifier, per-flow traffic shapers (e.g., leaky
      buckets), a feedback controller, and a rate controller


•   ROUTER MODULE
      The task of this Module is to accept the packet from the Ingress router and
      send it to the Egress router.


•   EGRESS ROUTER MODULE
      An edge router operating on a flow passing out of a network is called an
      egress router. NBP prevents congestion collapse through a combination of
      per-flow rate monitoring at egress routers and per-flow rate control at
      ingress routers.
      Rate monitoring allows an egress router to determine how rapidly each
      flow’s packets are leaving the network.
      Rate monitored using a rate estimation algorithm such as the Time Sliding
      Window (TSW) algorithm. Egress Router contains a flow classifier, Rate
      monitor, a feedback controller.


•   DESTINATION MODULE
      The task of this Module is to accept the packet from the Egress router and
      stored in a file in the Destination machine.


ADVANTAGES OF PROPOSED SYSTEM
♦ Buffering of packets in carried out in the edge routers rather than in the core
  routers
♦ The packets are sent into the network based on the capacity of the network and
  hence there is no possibility of any undelivered packets present in the network.
♦ Absence of undelivered packets avoids overload due to retransmission.
♦ Fair allocation of bandwidth is ensured.
DRAWBACKS OF EXISTING SYSTEM (ATM)
•   Packets are buffered in the routers present in the network which causes
    Congestion collapse from undelivered packets arises when bandwidth is
    continuously consumed by packets that are dropped before reaching their
    ultimate destinations.
•   Retransmission of undelivered packets is required to ensure no loss of data.
•   Unfair bandwidth allocation arises in the Internet due to the presence of
    undelivered packets.


SOFTWARE REQUIREMENTS:-
•   Java1.3 or More
•   Swings
•   Windows 98 or more.


HARDWARE REQUIREMENTS:-
•   Hard disk      :   40 GB
•   RAM            :   128mb
•   Processor      :   Pentium


APPLICATIONS
    This concept can be applied in LAN, WAN, MAN and in Internet in order to
    prevent congestion collapse in the network.



                             SOURCE MODULE
•   Input Parameters
    •   Source Machine Name is retrieved from the OS
    •   Destination Machine Name is typed by User
    •   Message is typed by User


•   Output Parameters
    •   Data Packets



                             INGRESS MODULE
•   Input Parameters
    •   Data Packets from Source Machine
    •   Backward feedback from the Router
•   Output Parameters
•   Data Packets
•   Forward feedback



                             ROUTER MODULE
•   Input Parameters
    •   Data Packets from Ingress Machine
    •   Forward feedback from the Router or Ingress Router
    •   Backward feedback from the Router or Egress Router
    •   Hop count


•   Output Parameters
    •   Data Packets
    •   Forward feedback
    •   Incremented Hop count
    •   Backward feedback



                             EGRESS MODULE
•   Input Parameters
    •   Data Packets from Router
    •   Forward feedback from the Router


•   Output Parameters
    •   Data Packets
    •   Backward feedback



                           DESTINATION MODULE
•   Message received from the egress router will be stored in the
    corresponding folder as a text file depends upon the Source Machine
    Name

Más contenido relacionado

Más de ncct

Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
ncct
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
ncct
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
ncct
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
ncct
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
ncct
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
ncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
ncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
ncct
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
ncct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
ncct
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
ncct
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
ncct
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
ncct
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
ncct
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
ncct
 
A S P
A S PA S P
A S P
ncct
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S P
ncct
 
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
ncct
 
Ieee Projects Ieeeprojects
Ieee Projects IeeeprojectsIeee Projects Ieeeprojects
Ieee Projects Ieeeprojects
ncct
 

Más de ncct (20)

Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...Botminer   Clustering Analysis Of Network Traffic For Protocol  And Structure...
Botminer Clustering Analysis Of Network Traffic For Protocol And Structure...
 
Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
 
A S P
A S PA S P
A S P
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S P
 
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
 
Ieee Projects Ieeeprojects
Ieee Projects IeeeprojectsIeee Projects Ieeeprojects
Ieee Projects Ieeeprojects
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Java Abs Network Border Patrol

  • 1. NETWORK BORDER PATROL PREVENTING CONGESTION COLLAPSE The fundamental philosophy behind the Internet is expressed by the scalability argument: no protocol, mechanism, or service should be introduced into the Internet if it does not scale well. A key corollary to the scalability argument is the end-to-end argument: to maintain scalability, algorithmic complexity should be pushed to the edges of the network whenever possible. Perhaps the best example of the Internet philosophy is TCP congestion control, which is implemented primarily through algorithms operating at end systems. Unfortunately, TCP congestion control also illustrates some of the shortcomings the end-to-end argument. As a result of its strict adherence to end-to-end congestion control, the current Internet suffers from main maladies: congestion collapse from undelivered packets. The Internet’s excellent scalability and robustness result in part from the end-to- end nature of Internet congestion control. End-to-end congestion control algorithms alone, however, are unable to prevent the congestion collapse and unfairness created by applications that are unresponsive to network congestion. To address these maladies, we propose and investigate a novel congestion- avoidance mechanism called network border patrol (NBP). NBP entails the exchange of feedback between routers at the borders of a network in order to detect and restrict unresponsive traffic flows before they enter the network, thereby preventing congestion within the network. PROJECT MODULES The various modules in the protocol are as follows Module 1:- SOURCE MODULE Module 2:- INGRESS ROUTER MODULE Module 3:- ROUTER MODULE Module 4:- EGRESS ROUTER MODULE Module 5:- DESTINATION MODULE
  • 2. SOURCE MODULE The task of this Module is to send the packet to the Ingress router. • INGRESS ROUTER MODULE An edge router operating on a flow passing into a network is called an ingress router. NBP prevents congestion collapse through a combination of per-flow rate monitoring at egress routers and per-flow rate control at ingress routers. Rate control allows an ingress router to police the rate at which each flow’s packets enter the network. Ingress Router contains a flow classifier, per-flow traffic shapers (e.g., leaky buckets), a feedback controller, and a rate controller • ROUTER MODULE The task of this Module is to accept the packet from the Ingress router and send it to the Egress router. • EGRESS ROUTER MODULE An edge router operating on a flow passing out of a network is called an egress router. NBP prevents congestion collapse through a combination of per-flow rate monitoring at egress routers and per-flow rate control at ingress routers. Rate monitoring allows an egress router to determine how rapidly each flow’s packets are leaving the network. Rate monitored using a rate estimation algorithm such as the Time Sliding Window (TSW) algorithm. Egress Router contains a flow classifier, Rate monitor, a feedback controller. • DESTINATION MODULE The task of this Module is to accept the packet from the Egress router and stored in a file in the Destination machine. ADVANTAGES OF PROPOSED SYSTEM ♦ Buffering of packets in carried out in the edge routers rather than in the core routers ♦ The packets are sent into the network based on the capacity of the network and hence there is no possibility of any undelivered packets present in the network. ♦ Absence of undelivered packets avoids overload due to retransmission. ♦ Fair allocation of bandwidth is ensured.
  • 3. DRAWBACKS OF EXISTING SYSTEM (ATM) • Packets are buffered in the routers present in the network which causes Congestion collapse from undelivered packets arises when bandwidth is continuously consumed by packets that are dropped before reaching their ultimate destinations. • Retransmission of undelivered packets is required to ensure no loss of data. • Unfair bandwidth allocation arises in the Internet due to the presence of undelivered packets. SOFTWARE REQUIREMENTS:- • Java1.3 or More • Swings • Windows 98 or more. HARDWARE REQUIREMENTS:- • Hard disk : 40 GB • RAM : 128mb • Processor : Pentium APPLICATIONS This concept can be applied in LAN, WAN, MAN and in Internet in order to prevent congestion collapse in the network. SOURCE MODULE • Input Parameters • Source Machine Name is retrieved from the OS • Destination Machine Name is typed by User • Message is typed by User • Output Parameters • Data Packets INGRESS MODULE • Input Parameters • Data Packets from Source Machine • Backward feedback from the Router
  • 4. Output Parameters • Data Packets • Forward feedback ROUTER MODULE • Input Parameters • Data Packets from Ingress Machine • Forward feedback from the Router or Ingress Router • Backward feedback from the Router or Egress Router • Hop count • Output Parameters • Data Packets • Forward feedback • Incremented Hop count • Backward feedback EGRESS MODULE • Input Parameters • Data Packets from Router • Forward feedback from the Router • Output Parameters • Data Packets • Backward feedback DESTINATION MODULE • Message received from the egress router will be stored in the corresponding folder as a text file depends upon the Source Machine Name