0% found this document useful (0 votes)
56 views18 pages

Network Border Protocol

The document proposes a congestion control mechanism using a Network Border Protocol (NBP) framework. The NBP framework aims to prevent congestion collapse by buffering packets at edge routers and exchanging feedback between routers at network borders. It regulates traffic flow rates using algorithms like leaky bucket and controls feedback between edge routers using a feedback control algorithm. This allows flexible congestion control within networks, unlike existing end-to-end schemes. The proposed system is implemented using modules like source, router and destination, with rate monitoring and control at the ingressing and egressing routers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views18 pages

Network Border Protocol

The document proposes a congestion control mechanism using a Network Border Protocol (NBP) framework. The NBP framework aims to prevent congestion collapse by buffering packets at edge routers and exchanging feedback between routers at network borders. It regulates traffic flow rates using algorithms like leaky bucket and controls feedback between edge routers using a feedback control algorithm. This allows flexible congestion control within networks, unlike existing end-to-end schemes. The proposed system is implemented using modules like source, router and destination, with rate monitoring and control at the ingressing and egressing routers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

D.

Thangamuthu
721211621057
Congestion Control Mechanism
using
Network Border Protocol
Abstract
Congestion in the network is increasing due to
growth in the multimedia application. This lead to
unresponsive and misbehaving traffic flows.

Few primitive scheduling schemes are used to
control the congestion in the network, where it worked
only at end-to-end network, due which they were unable
to prevent the congestion collapse.

To make a flexible solution for building a congestion
controlling scheme in network, a network border
protocol framework is used.




Existing system

The current Internet suffers facing 2 main problem
related to congestion

1. Congestion collapse due to undelivered packets

2. Unfair allocations of bandwidth between competing
traffic flows
Proposed system
Buffering of packets are carried out in the edge routers
so that the possibility of undelivered packets present in the
network will be avoided.

If the packets are entering the network faster than they
are transferred, then the network is likely to buffer the
packets or it may discard it.

Network Border Patrol entail the exchange of feedback
between routers at the borders of a network

Restrict unresponsive traffic flows

Prevents congestion within the network.



Hardware & Software Requirements
Hardware Requirements
Processor : Pentium IV & Above
Ram : 512MB
Hard Disk : 80GB

Software Requirements
Front End : JavaSwing
Operating System : Windows XP





Modules

1.Source Module
InRouter - Router Module
2. Router Module
OutRouter - Router Module
3. Destination Module
Module Description

Source Module
The task of this Module is to send the packet to the
InRouter

InRouter Module
1. An edge router operating on a flow passing in to the
Network
2. CFR (Congestion Free Router) prevents congestion
collapse through monitoring



Router Module
The task of this Module is to accept the packet from the
InRouter and send it to the OutRouter (The normal routing
process is done)

OutRouter Module
1. An edge router operating on a flow passing out of a network
2. CFR (Congestion Free Router) prevents congestion collapse
through monitoring
Destination Module
The task of this Module is to accept the packet from the
OutRouter and stored in a file in the Destination machine.
DATA FLOW DIAGRAM
Forward Forward
Feedback Feedback

Source
Source
Source
Destination







InRouter









Router








OutRouter
Router

Destination
Destination
Backward
Feedback
Backward
Feedback
Screen Shots
Algorithms Used
Rate Control Algorithm
The rate-control algorithm regulates the rate at which
each flow is allowed to enter the network

Leaky Bucket Algorithm:
The leaky bucket algorithm is used to regulate the
traffic flow from the input port to the output port.

Feedback Control Algorithm:
The feedback control algorithm determines how and
when feedback packets are exchanged between edge
routers.
Conclusion
Using Network Border Protocol framework the
congestion-avoidance mechanism has been introduced for
the Internet.
Unlike the existing primitive Internet congestion
control schemes, which were solely on end-to-end control,
where the NBP framework is able to prevent congestion
collapse from undelivered packets.
NBP framework prevents congestion collapse through a
combination of per-flow rate monitoring at OutRouter and
per-flow rate control at InRouter.
YOU
THANK

You might also like