Network Border Patrol: Preventing Congestion Collapse
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics
Active In SP
**

Posts: 2,492
Joined: Mar 2010
#1
02-04-2010, 08:36 PM


Network Border Patrol: Preventing Congestion Collapse
ABSTRACT:-
The fundamental philosophy behind the Internet is expressed by the scalability argument: no protocol, mechanism, or service should be introduced into the Internet if it does not scale well. A key corollary to the scalability argument is the end-to-end argument: to maintain scalability, algorithmic complexity should be pushed to the edges of the network whenever possible.
Perhaps the best example of the Internet philosophy is TCP congestion control, which is implemented primarily through algorithms operating at end systems. Unfortunately, TCP congestion control also illustrates some of the shortcomings the end-to-end argument. As a result of its strict adherence to end-to-end congestion control, the current Internet suffers from main maladies: congestion collapse from undelivered packets.
The Internetâ„¢s excellent scalability and robustness result in part from the end-to-end nature of Internet congestion control. End-to-end congestion control algorithms alone, however, are unable to prevent the congestion collapse and unfairness created by applications that are unresponsive to network congestion. To address these maladies, we propose and investigate a novel congestion-avoidance mechanism called network border patrol (NBP).
NBP entails the exchange of feedback between routers at the borders of a network in order to detect and restrict unresponsive traffic flows before they enter the network, thereby preventing congestion within the network.
PROJECT MODULE:-
The various modules in the protocol are as follows
Module 1:- SOURCE MODULE:-
The task of this Module is to send the packet to the Ingress router.
Module 2:- INGRESS ROUTER MODULE:-
An edge router operating on a flow passing into a network is called an ingress router. NBP prevents congestion collapse through a combination of per-flow rate monitoring at egress routers and per-flow rate control at ingress routers. Rate control allows an ingress router to police the rate at which each flowâ„¢s packets enter the network. Ingress Router contains a flow classifier, per-flow traffic shapers (e.g., leaky buckets), a feedback controller, and a rate controller
Module 3:- ROUTER MODULE:-
The task of this Module is to accept the packet from the Ingress router and send it to the Egress router.
Module 4:- EGRESS ROUTER MODULE:-
An edge router operating on a flow passing out of a network is called an egress router. NBP prevents congestion collapse through a combination of per-flow rate monitoring at egress routers and per-flow rate control at ingress routers. Rate monitoring allows an egress router to determine how rapidly each flowâ„¢s packets are leaving the network. Rate monitored using a rate estimation algorithm such as the Time Sliding Window (TSW) algorithm. Egress Router contains a flow classifier, Rate monitor, a feedback controller.
Module 5:- DESTINATION MODULE:-
The task of this Module is to accept the packet from the Egress router and stored in a file in the Destination machine.
DATA FLOW DIAGRAM:
EXISTING SYSTEM
Packets are buffered in the routers present in the network which causes Congestion collapse from undelivered packets arises when bandwidth is continuously consumed by packets that are dropped before reaching their ultimate destinations.
Retransmission of undelivered packets is required to ensure no loss of data.
Unfair bandwidth allocation arises in the Internet due to the presence of undelivered packets.
PROPOSED SYSTEM
Buffering of packets in carried out in the edge routers rather than in the core routers.
The packets are sent into the network based on the capacity of the network and hence there is no possibility of any undelivered packets present in the network.
Absence of undelivered packets avoids overload due to retransmission.
Fair allocation of bandwidth is ensured.
SOFTWARE REQUIREMENTS:-
Java1.5 or More
Swings
Windows 98 or more.
HARDWARE REQUIREMENTS:-
Hard disk : 40 GB
RAM : 128mb
Processor : Pentium IV


Attached Files
.doc   Network Border.doc (Size: 58.5 KB / Downloads: 162)
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
aysha
Active In SP
**

Posts: 2
Joined: May 2010
#2
18-05-2010, 12:36 PM

iam doing this project and implimentation for my final year engineering course.......plz can u help me by sendin som details about this other dan the pdf file..........lik advantages.disadvantages.n working principles..plz plz do reply as soon as possible................hope u ll help me in dis.............
Reply
projectsofme
Active In SP
**

Posts: 1,124
Joined: Jun 2010
#3
07-10-2010, 04:36 PM


.doc   Network border patrolBase Paper.doc (Size: 151.5 KB / Downloads: 67)
[i]NETWORK BORDER PATROL: PREVENTING CONGESTION COLLAPSE AND PROMOTING FAIRNESS IN THE INTERNET[/i]

Introduction
The essential philosophy behind the Internet is expressed by the scalability argument: no protocol, algorithm or service should be introduced into the Internet if it does not scale well. A key corollary to the scalability argument is the end-to-end argument: to maintain scalability, algorithmic complexity should be pushed to the edges of the network whenever possible. Perhaps the best example of the Internet philosophy is TCP congestion control, which is achieved primarily through algorithms implemented at end systems. Unfortunately, TCP congestion control also illustrates some of the shortcomings of the end-to-end argument.
As a result of its strict adherence to end-to-end congestion control, the current Internet suffers from two maladies: congestion collapse from undelivered packets, and unfair allocations of bandwidth between competing traffic flows. The first malady--congestion collapse from undelivered packets--arises when bandwidth is continuously consumed by packets that are dropped before reaching their ultimate destinations . Unresponsive flows, which are becoming increasingly prevalent in the Internet as network applications using audio and video become more popular, are the primary cause of this type of congestion collapse, and the Internet currently has no way of effectively regulating them.
The second malady--unfair bandwidth allocation--arises in the Internet for a variety of reasons, one of which is the presence of unresponsive flows. Adaptive flows (e.g., TCP flows) that respond to congestion by rapidly reducing their transmission rates are likely to receive unfairly small bandwidth allocations when competing with unresponsive or malicious flows. The Internet protocols themselves also introduce unfairness. The TCP algorithm, for instance, inherently causes each TCP flow to receive a bandwidth that is inversely proportional to its round trip time . Hence, TCP connections with short round trip times may receive unfairly large allocations of network bandwidth when compared to connections with longer round trip times.
These maladies--congestion collapse from undelivered packets and unfair bandwidth allocations--have not gone unrecognized. Some have argued that they may be mitigated through the use of improved packet scheduling or queue management mechanisms in network routers. For instance, per-flow packet scheduling mechanisms like Weighted Fair Queueing (WFQ) attempt to offer fair allocations of bandwidth to flows contending for the same link. So does Core-Stateless Fair Queueing (CSFQ) , an approximation of WFQ that requires only edge routers to maintain per-flow state. Active queue management mechanisms like Fair Random Early Detection (FRED) achieve an effect similar to fair queueing by discarding packets from flows that are using more than their fair share of a link's bandwidth.
For more information about network border patrol,please follow the link:

topicideashow-to-network-border-patrol-preventing-congestion-collapse-and-promoting-fairness-in-the-i
topicideashow-to-network-border-patrol
Reply
mareddy
Active In SP
**

Posts: 1
Joined: Jan 2011
#4
09-01-2011, 06:38 PM

i want to know more details about this project and implimentation.
please let me know.
i am doing this project and implimentation as my major project and implimentation in my engineering.
so please help me out.
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#5
10-01-2011, 09:53 AM

you can find out more details from the attached files. so please download it.

Reply
geetikasingh
Active In SP
**

Posts: 4
Joined: Feb 2011
#6
25-03-2011, 08:28 PM

please send me uml diagrams of network border patrol.
please send me uml diagrams of network border patrol to my email id:
geethika.singh20@gmail.com
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#7
05-04-2012, 09:42 AM

to get information about the topic "Network border patrol" full report ppt and related topic refer the link bellow

topicideashow-to-network-border-patrol-preventing-congestion-collapse-and-promoting-fairness-in-the-i

topicideashow-to-network-border-patrol

topicideashow-to-network-border-patrol-preventing-congestion-collapse
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Wireless Sensor Network Security model using Zero Knowledge Protocol project uploader 1 1,037 28-02-2014, 01:44 AM
Last Post: mspadmini19
  Network Assisted Mobile Computing with Optimal Uplink Query Processing pdf seminar projects maker 0 467 20-09-2013, 04:01 PM
Last Post: seminar projects maker
  The Content-Based Image Retrieval using the Pulse Coupled Neural Network PPT seminar projects maker 0 546 14-09-2013, 01:58 PM
Last Post: seminar projects maker
  AUTOMATED BUSINESS INTELLIGENCE NETWORK FOR SOFTWARE REQUIREMENT SPECIFICATIONS seminar projects maker 0 430 12-09-2013, 03:46 PM
Last Post: seminar projects maker
  The Awareness Network PPT project girl 1 588 02-09-2013, 01:43 PM
Last Post: Guest
  A Study on Topological Characteristics of Wireless Sensor Network pdf study tips 0 401 30-08-2013, 04:57 PM
Last Post: study tips
  Inter Bank Fund Transfer in Distributed Network smart paper boy 1 1,416 01-08-2013, 03:07 PM
Last Post: Guest
  Sensor Network Based Oilwell Health Monitoring and Intelligent Control pdf study tips 0 418 01-08-2013, 12:47 PM
Last Post: study tips
  A Fast Pattern-Match Engine for Network Processor-Based Network Intrusion PPT study tips 0 303 18-06-2013, 12:17 PM
Last Post: study tips
  GENETIC ALGORITHM BASED APPROACH TO NETWORK INTRUSION DETECTION pdf study tips 0 281 29-05-2013, 03:59 PM
Last Post: study tips