0% found this document useful (0 votes)
33 views22 pages

Project

Uploaded by

sneha75501
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views22 pages

Project

Uploaded by

sneha75501
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

FILTERING UNWANTED PACKETS

ON ATM NETWORK

NAME:
ENROLL NO.:
INTRODUCTION

 The ATM Lexicon defines QoS as "A term which refers to the
set of ATM performance parameters that characterize the
traffic over a given virtual connection."
 QOS parameters apply mostly to lower level protocol layers,
and were not meant to be directly observable or verifiable by
the application.
 These parameters include cell loss ratio, cell error rate, cell
misinsertion rate, cell delay variation, cell transfer delay, and
average cell transfer delay.
 Five service classes are defined in terms of QOS parameters.
 It refers to best effort service in which no specific traffic
parameters and no absolute guarantees are provided.
HARDWARE SPECIFICATION

 Processor : Intel I3 Core Processor


 Ram : 4 GB (or) Higher
 Hard disk : 1TB
SOFTWARE SPECIFICATION

 Web Server: Apache Tomcat Latest Version


 Server-side Technologies: Java, Java Server Pages
 Client-side Technologies: Hyper Text Markup
Language, Cascading Style Sheets, Java Script, AJAX
 Database Server: MS SQL
 Operating System: Windows (or) Linux (or) Mac any
version
EXISTING SYSTEM

 1. In the existing system when transferring data from sender


to receiver there may be chances of data loss.

 2. No user can be known whether the router is free after he


sends data to the router. Also no intimation when the buffer at
the router is full or busy or free.

 3. It causes retransmission of data to the router and hence


redundant bandwidth usage and consumption of time.
PROPOSED SYSTEM
 1. In this System, using several algorithms viz. Leaky bucket
algorithm and Virtual scheduling algorithm congestion can be
avoided.

 2. Leaky Bucket Algorithm continuously receives and sends


the data at the particular interval of time to avoid congestion
or flooding of data.

 3. Virtual scheduling algorithm monitors the congestion


occurrence, when congestion occurs it intimates or warns user
and simultaneously intimates when the router is free and data
transferred successfully to destination.
MODULES

 SOURCE MODULE

 ROUTER MODULE

 DESTINATION MODULE
DATA FLOW DIAGRAM

USER

SOURCE NODE ROUTER NODE DESTINATION


NODE

RECIVING
PACKET
LEARNING
SPLITING

FORWARDING
&
LISTENING DISCARDING

FILTERING
SYSTEM FLOW DIAGRAM
LEVEL 0

Source Select Destination

Packet Splitted

Sending packets to
Sending ACK to Source
Router

Router
Listening

Blocking Switching
Learning

Send Message to
Forwarding
Discarding Destination

Save That Message in


Destination
Level 1: SOURCE MODULE FLOW
DIAGRAM

USER INPUT

DESTINATION
ANS MESSAGE

PACKET SPLIT
INTO 48 BYTE

SENDING DATA
TO ROUTER

RECEIVING ACK
FROM ROUTER

PACKET RECEIVED IN
ROUER
Level 2: ROUTER MODULE FLOW
DIAGRAM

LOGIN
AUTHENTICATION

ADMINISTRATOR

MAIN MENU SWITCHING


MODULE

FORWARDING
BLOCKING

DISCARDING
LISTENING

FILTERING
LEARNING

RECEIVE ACK
Level 3: DESTINATION MODULE
FLOW DIAGRAM

DESTINATION

RETRIVE THE
ALLOCATED
BYTE

COMBINE THE
PACKET IN(48
BYTES)

FINALLY THEM
SAVED IN TEXT
FILE
MODULE DESCRIPTION
SOURCE MODULE:

 The task of this Module is to divide the Message in the form


of 48 Bytes and forward it into the Router.
 The allocated Bytes are called as Packets.

ROUTER MODULE:

 The task of this Module is to accept the packet from the


Source. Each and Every packet arrived in the router are send
to Destination.
• In this module following operations can be done:

1. Blocking
2. Listening
3. Learning
4. Switching

DESTINATION MODULE:

• The task of this Module is to accept the packet from the


Egress router and stored in a file in the Destination
machine.
SAMPLE SCREEN
ROUTER
BLOCKING MODULE
LISTENING MODULE
CONCLUSION

 Advances in ATM technology provide the opportunity to


create a global infrastructure providing high-speed data
transmission integrated with voice and video services.

 To achieve this goal many new protocol specifications


and standards have been developed to route data,
emulate connectionless media, inter work ATM with
existing LAN and WAN technologies, and guarantee the
quality of service delivered across ATM backbones.
FUTURE SCOPE
 Send particular packet to be sent to the particular destination
and discard a particular packet not to be sent to particular
destination.

 Do Encryption at the Source end, when user monitors the


data at the router side, the original data should not be viewed
by the user.

 Rather the user will only be able to view the data in other
form (i.e. encrypted form).

 The encrypted date should be decrypted at the destination end


and ultimately which would be written into a file.
REFERENCE

 Computer Networks by Tanenbaum

 Java 2: The Complete Reference, Fifth Edition


(Paperback) by Herbert Schildt “.

 Java Unleashed (Unleashed S.) by Michael Morrison.

 Java 2 Bible by Justin Couch and Daniel H. Steinberg


THANK YOU

You might also like