Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
Area of Research - Transfer the data securely from Source to Destination without loss. Motivation of this Research Top 2 Concerns are: 1. Prevent the Network from traffic. 2. Ensure no Data loss at the destination.
ABSTRACT
The end-to-end nature of Internet congestion control is an important factor in its scalability and robustness. End-to-end congestion control algorithms alone are incapable of preventing the congestion collapse and unfair bandwidth allocations created by applications, which are unresponsive to network congestion. In this project, we propose and investigate a new congestion avoidance mechanism coupled with authenticated mode of data transfer called Secured Network Packet Auditing System (SNPAS).
SNPAS is a core-stateless congestion avoidance mechanism, which relies on the exchange of feedback between routers at the borders of a network in order to detect and restrict unresponsive traffic flows before they enter the network and to transmit the data securely by employing the cryptographic technique. This project helps to audit packets that are received or sent in a Network. It also ensures that the packets are transferred without loss in a network.
PHASE 1 Literature Survey. Implementing Data transfer to the Source router Module. Implementing Existing System. Analyzing Existing System Efficiency, Control Data loss. PHASE 2 Data transfer/Auditing All in one Tool Implementation. Comparing & Analyzing Proposed system with existing system. Adding User Interface in the Application. Placing Interface between Client and Server. Manual and Automated Testing with SW Test Automation Framework .
MY CONTRIBUTION
Literature Survey
Titles [1] YE TIAN, KAI XU, AND NIRWAN ANSARI TCP in Wireless Environments: Problems and Solutions IEEE Network Radio Communications, March 2008. [2] Purvang Dalal Dr. K.S. Dasgupta , TCP Performance Issues and
Related Enhancement Schemes over Network Environment , April 2012.
Work Done
1. In these Articles they showed that the TCP protocol employs congestion problem in networks. As a result the packets might be getting lost at the destination. 2. They introduced the slow start, fast recovery/fast retransmit, mechanisms that refer to avoid packet loss in networking. 3. Congestion collapse may be controlled by Sliding window.
1. By studying this paper we can able to identify how congestion problem occurs in a network and how it can be resolved or prevented. From this paper I have studied the behavior of Data transfer over a network across routers to reach its ultimate destination and also how congestion problems can be resolved.
SOFTWARE REQUIREMENTS
Software : JAVA 1.3 Or Higher version
SWINGS
HARDWARE REQUIREMENTS
HARD DISK RAM PROCESSOR KEYBOARD MOUSE : : : : : 10 GB (Minimum) 128 MB (Minimum) PENTIUM III onwards TVS 108 keys Logitech (optical)
Project Modules
SOURCE MODULE The task of this Module is to send the packet to the Ingress router. INGRESS ROUTER MODULE An edge router operating on a flow passing it into a network is called an ingress router. ROUTER MODULE The task of this Module is to accept the packet from the Ingress router and send it to the Egress router. EGRESS ROUTER MODULE An edge router operating on a flow passing out of a network is called an egress router. DESTINATION MODULE The task of this Module is to accept the packet from the Egress router and store it in a file in the Destination machine.
ALGORITHM USED
LEAKY BUCKET
The leaky bucket analogy refers to a bucket with a hole in the bottom that causes it to "leak" at a certain rate corresponding to a traffic cell rate parameter.
FLOW DIAGRAM
Use case diagrams show the interaction between use cases, which represents system functionality, and actors, which represents the people or system that provide or receive information from the system.
Ingress router
Egress Router
Sender
Destination
Source
Router
Receiver
SYSTEM IMPLEMENTATION
SOURCE MODULE
Input Parameters:
Source Machine Name is retrieved from the OS. Destination Machine Name is typed by User. Message is typed by User.
Output Parameters:
Data Packets.
SOURCE WINDOW
INGRESS MODULE
Input Parameters:
Data Packets from Source Machine. Backward feedback from the Router.
Output Parameters:
Data Packets. Forward feedback.
INGRESS WINDOW
APPLICATIONS
This concept can be applied in LAN, WAN, MAN and in Internet in order to audit network packets and to prevent the traffic in the network. REFERENCE http://netresearch.ics.uci.edu Java Complete Reference Herbert Schildt
Thank U