0% found this document useful (0 votes)
66 views22 pages

Congestion Control Using NBP

This document proposes a congestion control system using Network Border Patrol (NBP). It involves exchanging feedback between routers at the borders of a network to restrict unresponsive traffic flows and prevent congestion. The system uses buffering at edge routers to avoid packet loss and ensures fair bandwidth allocation. It will be implemented using leaky bucket algorithms and involve source, ingress, router, and egress modules to transmit packets through the network and store received messages as text files.

Uploaded by

Ujjawal Mallik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views22 pages

Congestion Control Using NBP

This document proposes a congestion control system using Network Border Patrol (NBP). It involves exchanging feedback between routers at the borders of a network to restrict unresponsive traffic flows and prevent congestion. The system uses buffering at edge routers to avoid packet loss and ensures fair bandwidth allocation. It will be implemented using leaky bucket algorithms and involve source, ingress, router, and egress modules to transmit packets through the network and store received messages as text files.

Uploaded by

Ujjawal Mallik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 22

Congestion Control Using NBP

INTRODUCTION

The scalability and robustness of internet


The fundamental are no protocol
,mechanism ,service.
A key corollary is to maintain scalability,
algorithmic complexity on network.
FESIBILITY STUDY
TECHNICAL REQUIREMENTS
Advanced Java
Socket Programming
File Concepts
Threads.
ECNOMICAL REQUIREMENTS
Proposed system is cheaper
Easily adaptable for both user and developer.
OPERATIONAL REQUIREMENTS
Message sending
Routing the packets
Controlling the packet flow
Avoids packet loss.
HARDWARE REQUIREMENTS
The minimum configuration required to run this
project are:
Main processor : Pentium III (or) IV
RAM : 128MB
Hard Disk : 40GB
Clock Speed : 550 MHZ
System Bus Speed : 400 MHz
Cache RAM : 256 KB
SOFTWARE REQUIREMENTS

Language : JDK1.5.
Front End Design : Swing CONCEPTS
Operating System : Windows 2000 and
higher version.
SCOPE OF THE PROJECT

Network Border Patrol entails the


exchange of feedback between routers at
the borders of a network
Restrict unresponsive traffic flows
Prevents congestion within the network.
EXISTING SYSTEM

Congestion collapse.
Retransmission.
Unfair bandwidth allocation
PROPOSED SYSTEM

Buffering of packets in carried out in the


edge routers
No possibility of any undelivered packets
present in the network
Fair allocation of bandwidth is ensured
MODULE ALLOCATION
Module 1
SOURCE MODULE.
Module 2
INGRESS ROUTER MODULE.
Module 3
ROUTER MODULE.
Module 4
EGRESS ROUTER MODULE.
Module 5
DESTINATION MODULE
DATA FLOW DIAGRAM
Forward Forward
Feedback Feedback

Source Destination

Source InRouter OutRouter Destination


Router
Router Router

Source Destination

Backward Backward
Feedback Feedback
SOURCE MODULE

Input Parameters:
Source Machine Name is retrieved from the OS.
Destination Machine Name is typed by User.
Message is typed by User.
Output Parameters:
Data Packets.
SOURCE DATA FLOW DIAGRAM
USER INPUT

DESTINATION ANS
MESSAGE

PACKET SPLIT
INTO 48 BYTE

SENDING DATA TO
ROUTER

RECEIVING ACK
FROM ROUTER

PACKET RECEIVED IN
ROUER
INGRESS MODULE

Input Parameters:
Data Packets from Source Machine.
Backward feedback from the Router.
Output Parameters:
Data Packets.
Forward feedback.
INGRESS DATA FLOW DIAGRAM

DESTINATION

RETRIVE THE
ALLOCATED BYTE

COMBINE THE
PACKET IN(48 BYTES)

FINALLY THE M
SAVED IN
TEXT FILE
ALGORITHM IMPLEMENTED
LEAKY BUCKET ALGORITHM
ROUTER MODULE
Input Parameters:

Data Packets from Ingress Machine.


Forward feedback from the Router or Ingress Router.
Backward feedback from the Router or Egress Router.
Hop count.
Output Parameters:

Data Packets.
Forward feedback.
Incremented Hop count.
Backward feedback.
DATA FLOW DIAGRAM ROUTER
USER INPUT

DESTINATION ANS
MESSAGE

PACKET SPLIT
INTO 48 BYTE

SENDING DATA
TO ROUTER

RECEIVING ACK
FROM ROUTER

PACKET RECEIVED IN
ROUER
EGRESS MODULE

Input Parameters:
Data Packets from Router.
Forward feedback from the Router.
Output Parameters:
Data Packets.
Backward feedback
OUTGRESS DATA FLOW DIAGRAM

DESTINATION

RETRIVE THE
ALLOCATED BYTE

COMBINE THE
PACKET IN(48 BYTES)

FINALLY THE M
SAVED IN
TEXT FILE
DESTINATION MODULE

Message received from the egress router will be stored


in the corresponding folder as a text file depends upon
the Source Machine Name.
DESTINATION DATA FLOW
DIAGRAM
DESTINATION

RETRIVE THE
ALLOCATED BYTE

COMBINE THE
PACKET IN(48 BYTES)

FINALLY THE M
SAVED IN
TEXT FILE
THANK YOU

You might also like