Packet Loss Control Using Tokens at the Network Edge
ABSTRACT
Presently the
Internet accommodates simultaneous audio, video, and data traffic. This
requires the Internet to guarantee the packet loss which at its turn depends
very much on congestion control. A series of protocols have been introduced to
supplement the insufficient TCP mechanism controlling the network congestion.
CSFQ was designed as an open-loop controller to provide the fair best effort
service for supervising the per-flow bandwidth consumption and has become
helpless when the P2P flows started to dominate the traffic of the Internet.
Token-Based Congestion Control (TBCC) is based on a closed-loop congestion
control principle, which restricts token resources consumed by an end-user and
provides the fair best effort service with O(1) complexity. As Self-Verifying CSFQ and Re-feedback, it
experiences a heavy load by policing inter-domain traffic for lack of trust. In
this paper, Stable Token-Limited Congestion Control (STLCC) is introduced as
new protocols which appends inter-domain congestion control to TBCC and make
the congestion control system to be stable. STLCC is able to shape output and
input traffic at the inter-domain link with O(1) complexity. STLCC produces a congestion index, pushes the
packet loss to the network edge and improves the network performance. Finally,
the simple version of STLCC is introduced. This version is deployable in the
Internet without any IP protocols modifications and preserves also the packet
datagram.
EXISTING SYSTEM
In the existing system, the sender sends the
packets without the
intermediate station.
The data packets has been losses many and
time is wasted. Retransmission of data packets is difficulty.
PROPOSED SYSTEM
Modern IP network
services provide for the simultaneous digital transmission of voice, video, and
data. These services require congestion control protocols and algorithms which
can solve the packet loss parameter can be kept under control. Congestion control
is therefore, the cornerstone of packet switching networks . It should prevent
congestion collapse, provide fairness to competing flows and optimize transport
performance indexes such as throughput, delay and loss. The literature abounds
in papers on this subject; there are papers on high-level models of the flow of
packets through the network, and on specific network architecture.
MODULES:
- NETWORK CONGESTION:
- STABLE TOKEN LIMIT CONGESTION CONTROL (STLCC):
- TOKEN
- CORE ROUTER
- EDGE ROUTER
MODULE DESCRIPTION:
NETWORK CONGESTION:
•
Congestion
occurs when the number of packets being transmitted through the network
approaches the packet handling capacity of the network
•
Congestion
control aims to keep number of packets below level at which performance falls
off dramatically
STABLE
TOKEN LIMIT CONGESTION CONTROL (STLCC):
STLCC is able to shape
output and input traffic at theinter-domain link with O(1) complexity. STLCC produces a congestion index, pushes the
packet loss to the network edge and improves the network performance. To solve
the oscillation problem, the Stable Token-Limited Congestion Control (STLCC) is
introduced. It integrates the algorithms of TLCC and XCP [10] altogether. In
STLCC, the output rate of the sender is controlled according to the algorithm
of XCP, so there is almost no packet lost at the congested link. At the same time, the edge
router allocates all the access token
resource to the incoming flows equally. When congestion happens, the incoming
token rate increases at the core router, and then the congestion level of the
congested link will also increase. Thus STLCC can measure the congestion level
analytically, allocate network resources according to the access link, and
further keep the congestion control system stable.
TOKEN
In this paper a new and better mechanism for congestion control with
application to Packet Loss in networks with P2P traffic is proposed. In this
new method the edge and the core routers will write a measure of the quality of
service guaranteed by the router by writing a digital number in the Option
Field of the datagram of the packet. This is called a token. The token is read
by the path routers and interpreted as its value will give a measure of the
congestion especially at the edge routers. Based on the token number the edge
router at the source, thus reducing the congestion on the path.
CORE ROUTER:
A core router is a router
designed to operate in the Internet Backbone or core. To fulfill this role, a
router must be able to support multiple telecommunications interfaces of the
highest speed in use in the core Internet and must be able to forward IP
packets at full speed on all of them. It must also support the routing
protocols being used in the core. A core router is distinct from an edge
routers.
EDGE ROUTER:
Edge routers sit at the edge of a backbone
network and connect to core routers. The token is read by the path routers and
interpreted as its value will give a measure of the congestion especially at
the edge routers. Based on the token number the edge router at the source, thus
reducing the congestion on the path.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
•
System
: Pentium IV 2.4 GHz.
•
Hard Disk
: 40 GB.
•
Floppy Drive :
1.44 Mb.
•
Monitor :
15 VGA Colour.
•
Mouse :
Logitech.
•
Ram :
512 Mb.
SOFTWARE REQUIREMENTS:
•
Operating
system : - Windows XP.
•
Coding
Language :
JAVA, RMI, SWINGS
REFERENCE:
Z. Shi, D. Ionescu and D. Zhang, “Packet
Loss Control Using Tokens at the Network Edge”, IEEE LATIN AMERICA TRANSACTIONS, VOL. 10, NO. 1, JAN. 2012.