Network Border Patrol: Preventing Congestion Collapse
#3
[attachment=5336]
[i]NETWORK BORDER PATROL: PREVENTING CONGESTION COLLAPSE AND PROMOTING FAIRNESS IN THE INTERNET[/i]

Introduction
The essential philosophy behind the Internet is expressed by the scalability argument: no protocol, algorithm or service should be introduced into the Internet if it does not scale well. A key corollary to the scalability argument is the end-to-end argument: to maintain scalability, algorithmic complexity should be pushed to the edges of the network whenever possible. Perhaps the best example of the Internet philosophy is TCP congestion control, which is achieved primarily through algorithms implemented at end systems. Unfortunately, TCP congestion control also illustrates some of the shortcomings of the end-to-end argument.
As a result of its strict adherence to end-to-end congestion control, the current Internet suffers from two maladies: congestion collapse from undelivered packets, and unfair allocations of bandwidth between competing traffic flows. The first malady--congestion collapse from undelivered packets--arises when bandwidth is continuously consumed by packets that are dropped before reaching their ultimate destinations . Unresponsive flows, which are becoming increasingly prevalent in the Internet as network applications using audio and video become more popular, are the primary cause of this type of congestion collapse, and the Internet currently has no way of effectively regulating them.
The second malady--unfair bandwidth allocation--arises in the Internet for a variety of reasons, one of which is the presence of unresponsive flows. Adaptive flows (e.g., TCP flows) that respond to congestion by rapidly reducing their transmission rates are likely to receive unfairly small bandwidth allocations when competing with unresponsive or malicious flows. The Internet protocols themselves also introduce unfairness. The TCP algorithm, for instance, inherently causes each TCP flow to receive a bandwidth that is inversely proportional to its round trip time . Hence, TCP connections with short round trip times may receive unfairly large allocations of network bandwidth when compared to connections with longer round trip times.
These maladies--congestion collapse from undelivered packets and unfair bandwidth allocations--have not gone unrecognized. Some have argued that they may be mitigated through the use of improved packet scheduling or queue management mechanisms in network routers. For instance, per-flow packet scheduling mechanisms like Weighted Fair Queueing (WFQ) attempt to offer fair allocations of bandwidth to flows contending for the same link. So does Core-Stateless Fair Queueing (CSFQ) , an approximation of WFQ that requires only edge routers to maintain per-flow state. Active queue management mechanisms like Fair Random Early Detection (FRED) achieve an effect similar to fair queueing by discarding packets from flows that are using more than their fair share of a link's bandwidth.
For more information about network border patrol,please follow the link:

http://studentbank.in/report-network-bor...s-in-the-i
http://studentbank.in/report-network-border-patrol
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: nbp to prevent congestion collapse java coding, civil air patrol ranks, network border patrol preventing conjacent collapse, patrol, congestion control algorithms in network layer, network border patrol preventing congestion collapse project source code, network border patrol preventing congestion collapse,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Network Border Patrol: Preventing Congestion Collapse - by projectsofme - 07-10-2010, 04:36 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Exploring the design space of social network-based Sybil defenses 1 937 15-02-2017, 02:55 PM
Last Post: jaseela123d
  Critical State-Based Filtering System for Securing SCADA Network Protocols 1 871 14-02-2017, 12:48 PM
Last Post: jaseela123d
  Packet-Hiding Methods for Preventing Selective Jamming Attacks 1 698 14-02-2017, 11:35 AM
Last Post: ijasti
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,280 19-09-2014, 12:52 AM
Last Post: [email protected]
  Packet-Hiding Methods for Preventing Selective Jamming Attacks Projects9 5 4,393 30-07-2013, 05:30 PM
Last Post: mounikabujji
  IEEE Project on Network Simulation using OMNeT++ 3.2 for M.Tech and B.Tech VickyBujju 3 3,063 03-06-2013, 11:13 AM
Last Post: computer topic
  The Wireless Sensor Network for Home-Care System Using ZigBee smart paper boy 1 1,985 31-01-2013, 11:34 AM
Last Post: seminar details
  Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Projects9 1 1,478 08-01-2013, 02:25 PM
Last Post: Guest
  Database Migration over Network project topics 12 7,263 06-01-2013, 07:54 AM
Last Post: Guest
  WISENET (Wireless Sensor Network) ppt. seminar surveyer 9 12,609 08-12-2012, 02:49 PM
Last Post: seminar details

Forum Jump: