SlideShare una empresa de Scribd logo
1 de 7
INTERNET BORDER
PATROL
Under the guidance of
Dr.V.Prashanthi
CONTENTS:
Abstract
Introduction
Problem Statement
2
ABSTRACT
• The end-to-end nature of Internet congestion control is an
important factor in its scalability and robustness. However, end-
to-end congestion control algorithms alone are incapable of
preventing the congestion collapse.
• By not preventing congestion , unnecessary packets are utilized
by unauthorized users who may fill in the virus or worms that can
compromise the entire network or a system.
• We propose and investigate a new congestion avoidance
mechanism called Network Border Patrol.
3
INTRODUCTIO
N
What is Network
Congestion ?
Just like in road congestion, Network
Congestion occurs when a network is not
able to adequately handle the traffic
flowing through it. While network
congestion is usually a temporary state of
a network rather than a permanent feature,
there are cases where a network is always
congested signifying a lager issue at hand.
Why NBP ?
NBP relies on the exchange of
feedback between routers at borders
of a network in order to detect and
restrict unresponsive traffic flows
before they enter the network
PROBLEM
STATEMENT
• As end-to-end congestion algorithms like Leaky
Bucket Algorithm are incapable of preventing the
congestion collapse and unfair bandwidth
allocations created by applications which are
unresponsive to network congestion, we would like
to use Network Border Patrol(NBP).
• As NBP relies on the exchange of feedback
between routers at the borders of a network , it can
restrict unresponsive traffic flows before they enter
the network
5
6
Client request
for file
Packets are sent
from router
packet speed
is huge ?
NBP is activated and the
speed is reduced to avoid
congestion
Packet sent
successfully
Yes
No
THANK YOU
Done by:
Boorla Akshaya – 20071A6207
Mohammad Danish – 20071A6235
Sure Kalyani – 20071A6254
Yeshala Sri Varsha – 20071A6260
7

Más contenido relacionado

La actualidad más candente

E-Learning Project Write Up Case Study Ogun State Institute Of Technology
E-Learning Project Write Up Case Study Ogun State Institute Of TechnologyE-Learning Project Write Up Case Study Ogun State Institute Of Technology
E-Learning Project Write Up Case Study Ogun State Institute Of Technology
damilola isaac
 
「なにをどこまでやれば?」OWASP SAMMが導く開発セキュリティ強化戦略
「なにをどこまでやれば?」OWASP SAMMが導く開発セキュリティ強化戦略「なにをどこまでやれば?」OWASP SAMMが導く開発セキュリティ強化戦略
「なにをどこまでやれば?」OWASP SAMMが導く開発セキュリティ強化戦略
Riotaro OKADA
 
Capacity Planning for Cloud Computing
Capacity Planning for Cloud ComputingCapacity Planning for Cloud Computing
Capacity Planning for Cloud Computing
Adrian Cockcroft
 
Amazon Final internship presentation
Amazon Final internship presentationAmazon Final internship presentation
Amazon Final internship presentation
Steven Nguyen
 

La actualidad más candente (20)

A comparative study between cloud computing and fog
A comparative study between cloud computing and fog A comparative study between cloud computing and fog
A comparative study between cloud computing and fog
 
Quantum Networks
Quantum NetworksQuantum Networks
Quantum Networks
 
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
AWS Tutorial | AWS Certified Solutions Architect | Amazon AWS | AWS Training ...
 
E-Learning Project Write Up Case Study Ogun State Institute Of Technology
E-Learning Project Write Up Case Study Ogun State Institute Of TechnologyE-Learning Project Write Up Case Study Ogun State Institute Of Technology
E-Learning Project Write Up Case Study Ogun State Institute Of Technology
 
Azure ADアプリケーションを使用した認証のあれやこれ
Azure ADアプリケーションを使用した認証のあれやこれAzure ADアプリケーションを使用した認証のあれやこれ
Azure ADアプリケーションを使用した認証のあれやこれ
 
Progressive Web App
Progressive Web AppProgressive Web App
Progressive Web App
 
「なにをどこまでやれば?」OWASP SAMMが導く開発セキュリティ強化戦略
「なにをどこまでやれば?」OWASP SAMMが導く開発セキュリティ強化戦略「なにをどこまでやれば?」OWASP SAMMが導く開発セキュリティ強化戦略
「なにをどこまでやれば?」OWASP SAMMが導く開発セキュリティ強化戦略
 
Benefits of Cloud Computing
Benefits of Cloud ComputingBenefits of Cloud Computing
Benefits of Cloud Computing
 
Amazon EC2 notes.pdf
Amazon EC2 notes.pdfAmazon EC2 notes.pdf
Amazon EC2 notes.pdf
 
Cloud Computing Technology Overview 2012
Cloud Computing Technology Overview 2012Cloud Computing Technology Overview 2012
Cloud Computing Technology Overview 2012
 
Firewalls
FirewallsFirewalls
Firewalls
 
Automating Backup & Archiving with AWS and CommVault
Automating Backup & Archiving with AWS and CommVaultAutomating Backup & Archiving with AWS and CommVault
Automating Backup & Archiving with AWS and CommVault
 
Capacity Planning for Cloud Computing
Capacity Planning for Cloud ComputingCapacity Planning for Cloud Computing
Capacity Planning for Cloud Computing
 
Internet Of Things (IOT)
Internet Of Things (IOT)Internet Of Things (IOT)
Internet Of Things (IOT)
 
Internship on web development
Internship on web developmentInternship on web development
Internship on web development
 
Scheduling in cloud
Scheduling in cloudScheduling in cloud
Scheduling in cloud
 
Techiques for Writing Embedded Code_Internet of Things
Techiques for Writing Embedded Code_Internet of ThingsTechiques for Writing Embedded Code_Internet of Things
Techiques for Writing Embedded Code_Internet of Things
 
Iam presentation
Iam presentationIam presentation
Iam presentation
 
Amazon Final internship presentation
Amazon Final internship presentationAmazon Final internship presentation
Amazon Final internship presentation
 
AWS入門!!
AWS入門!!AWS入門!!
AWS入門!!
 

Similar a InTERNET Border patrol.pptx

Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)
Mumbai Academisc
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
eSAT Journals
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
inventionjournals
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
irjes
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
Iaetsd Iaetsd
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
ijwmn
 

Similar a InTERNET Border patrol.pptx (20)

Congestion control mechanism using network border protocol
Congestion control mechanism using network border protocolCongestion control mechanism using network border protocol
Congestion control mechanism using network border protocol
 
Network monitoringapproaches anoverview
Network monitoringapproaches anoverviewNetwork monitoringapproaches anoverview
Network monitoringapproaches anoverview
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)Network border patrol preventing c ongestion collapse(synopsis)
Network border patrol preventing c ongestion collapse(synopsis)
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax NetworkReduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
Reduce Handover Delay Using the HSBCC Based Buffer Over Flow In Wimax Network
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A survey
 
Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback model
 
Token Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for NetworksToken Based Packet Loss Control Mechanism for Networks
Token Based Packet Loss Control Mechanism for Networks
 
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKS
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKSA STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKS
A STUDY ON HYBRID CONGESTION CONTROL MECHANISM IN WIRELESS SENSOR NETWORKS
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
 
TCP for Wireless Environments
TCP for Wireless EnvironmentsTCP for Wireless Environments
TCP for Wireless Environments
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
C0351725
C0351725C0351725
C0351725
 

Más de Srinivas Kanakala (13)

FLOWCHARTS.pptx
FLOWCHARTS.pptxFLOWCHARTS.pptx
FLOWCHARTS.pptx
 
Minor project ppt (1).pptx
Minor project ppt (1).pptxMinor project ppt (1).pptx
Minor project ppt (1).pptx
 
system hacking.pptx
system hacking.pptxsystem hacking.pptx
system hacking.pptx
 
RDBMS WIT &WIL.pptx
RDBMS WIT &WIL.pptxRDBMS WIT &WIL.pptx
RDBMS WIT &WIL.pptx
 
UNIT-1-SQE-Dr.K.Srinivas-CSE.pptx
UNIT-1-SQE-Dr.K.Srinivas-CSE.pptxUNIT-1-SQE-Dr.K.Srinivas-CSE.pptx
UNIT-1-SQE-Dr.K.Srinivas-CSE.pptx
 
JAVA PROGRAMMING (1).pptx
JAVA PROGRAMMING (1).pptxJAVA PROGRAMMING (1).pptx
JAVA PROGRAMMING (1).pptx
 
BHARADWAJ.pptx
BHARADWAJ.pptxBHARADWAJ.pptx
BHARADWAJ.pptx
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
vaagdevi paper.pdf
vaagdevi paper.pdfvaagdevi paper.pdf
vaagdevi paper.pdf
 
griet paper pblished(13-9-2021).pdf
griet paper pblished(13-9-2021).pdfgriet paper pblished(13-9-2021).pdf
griet paper pblished(13-9-2021).pdf
 
ijatcse21932020.pdf
ijatcse21932020.pdfijatcse21932020.pdf
ijatcse21932020.pdf
 
Turkey music( june 2021).pdf
Turkey music( june 2021).pdfTurkey music( june 2021).pdf
Turkey music( june 2021).pdf
 
patent_vpr.pdf
patent_vpr.pdfpatent_vpr.pdf
patent_vpr.pdf
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
SoniaTolstoy
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Último (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

InTERNET Border patrol.pptx

  • 1. INTERNET BORDER PATROL Under the guidance of Dr.V.Prashanthi
  • 3. ABSTRACT • The end-to-end nature of Internet congestion control is an important factor in its scalability and robustness. However, end- to-end congestion control algorithms alone are incapable of preventing the congestion collapse. • By not preventing congestion , unnecessary packets are utilized by unauthorized users who may fill in the virus or worms that can compromise the entire network or a system. • We propose and investigate a new congestion avoidance mechanism called Network Border Patrol. 3
  • 4. INTRODUCTIO N What is Network Congestion ? Just like in road congestion, Network Congestion occurs when a network is not able to adequately handle the traffic flowing through it. While network congestion is usually a temporary state of a network rather than a permanent feature, there are cases where a network is always congested signifying a lager issue at hand. Why NBP ? NBP relies on the exchange of feedback between routers at borders of a network in order to detect and restrict unresponsive traffic flows before they enter the network
  • 5. PROBLEM STATEMENT • As end-to-end congestion algorithms like Leaky Bucket Algorithm are incapable of preventing the congestion collapse and unfair bandwidth allocations created by applications which are unresponsive to network congestion, we would like to use Network Border Patrol(NBP). • As NBP relies on the exchange of feedback between routers at the borders of a network , it can restrict unresponsive traffic flows before they enter the network 5
  • 6. 6 Client request for file Packets are sent from router packet speed is huge ? NBP is activated and the speed is reduced to avoid congestion Packet sent successfully Yes No
  • 7. THANK YOU Done by: Boorla Akshaya – 20071A6207 Mohammad Danish – 20071A6235 Sure Kalyani – 20071A6254 Yeshala Sri Varsha – 20071A6260 7