Congestion Control Algorithm for Tree-based Reliable Multicast Protocols
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science topics
Active In SP

Posts: 610
Joined: Jun 2010
01-07-2010, 04:58 PM

Congestion Control Algorithm for Tree-based Reliable Multicast Protocols


This project and implimentation contains a detailed description of the congestion control algorithm of tree-based reliable multicast protocol. This algorithm takes advantage of regular acknowledgements from the receivers that propagate back to the sender via the repair tree. This scalable feedback mechanism is used to collect receiver credits. Complementing the windowing mechanism, packet transmission is smoothed by using a data rate commensurate with the window size. Additional details, such as how to prune slow receivers, and how to implement the rate scheduler on non-real-time systems are also discussed. The performance of the congestion control algorithm is then evaluated in extended LANs, and wide area networks. The fairness of bandwidth sharing with other (TCP) traffic is also evaluated.

 Scalability
The protocol should be able to work under a variety of conditions

 include multiple network topologies
 variable link speeds
 receiver set size can be to the order of at least 1000 - 10000
It is more important to have a good understanding of how and when a protocol breaks than when it works.

System Configuration

H/W System Configuration
Processor - Pentium “III

Speed - 1.1 Ghz
RAM - 256 MB(min)
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA

Software Requirements :-

Language : Java RMI, SWING
O/S : WIN2000 Server , TCP/IP
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Maximum Power Point Tracking using Perturb and Observe Algorithm For a PV System seminar flower 8 1,948 17-03-2015, 05:40 AM
Last Post: GT Racing
Thumbs Up Inventory Control System uttuswami 2 742 20-10-2014, 07:46 PM
Last Post: CxWfRyIPv
  MABS: Multicast Authentication Based on Batch Signature seminar class 20 12,346 03-07-2014, 06:19 PM
Last Post: Guest
  Image Data Acquisition and compression using K-RLE Algorithm on Embedded ARM ppt seminar projects maker 0 616 28-09-2013, 04:36 PM
Last Post: seminar projects maker
  Comparing AODV and OLSR Routing Protocols. seminar projects maker 0 353 26-09-2013, 02:19 PM
Last Post: seminar projects maker
  Fuzzy MLS: An Experiment on Quantified Risk– Adaptive Access Control seminar projects maker 0 352 26-09-2013, 02:10 PM
Last Post: seminar projects maker
  RATIONSHOP INVENTORY CONTROL SYSTEM full report smart paper boy 17 6,909 20-09-2013, 09:47 AM
Last Post: seminar projects maker
  Integer Wavelet Transform based Steganographic Method using OPA Algorithm pdf seminar projects maker 0 382 11-09-2013, 04:04 PM
Last Post: seminar projects maker
  Kalman Filter-Based Distributed Predictive Control of Large-Scale Multi-Rate pdf study tips 0 376 09-09-2013, 03:32 PM
Last Post: study tips
  A Time-based Cluster-Head Selection Algorithm for LEACH project girl 2 628 06-09-2013, 09:44 AM
Last Post: study tips