International Journal of Engineering Trends and Technology (IJETT) – Volume 6 Number 1- Dec 2013 HOST-TO-HOSTCONGESTION CONTROL FOR TCP 1 2 M.V.L.Alekhya P. Chakradhar 1 PG Student, Rama Chandra College of Engineering, Eluru, A.P., India 2 Associate Professor, Rama Chandra College of Engineering, Eluru, A.P., India ___________________________________________________________ ABSTRACT: The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works. Performance characteristics of a particular version of TCP are defined by the congestion control algorithm it employs. This paper presents a survey of various congestion control proposals that preserve the original host-to-host idea of TCP— namely, that neither sender nor receiver relies on any explicit notification from the network. The proposed solutions focus on a variety of problems, starting with the basic problem of eliminating the phenomenon of congestion collapse, and also include the problems of effectively using the available network resources in different types of environments (wired, wireless, high-speed, long-delay, etc.). In a shared, highly distributed, and heterogeneous environment such as the Internet, effective network use depends not only on how well a single TCP based application can utilize the network capacity, but also on how well it cooperates with other applications transmitting data through the same network. I.INTRODUCTION To transfer data from one system to other system in TCP, packet congestion ISSN: 2231-5381 should be very less to send data packets without any loss. So we are focusing on an application to reduce the congestion that occurs in TCP, by proposing congestion avoidance algorithm by considering congestion window as rate limiting factor there by, the packet loss statistics is very less or the packet loss can be eliminated completely. Hence the object is to avoid the packet loss while transferring data from a system to another system by avoiding the congestion in the network. The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works. Performance characteristics of a particular version of TCP are defined by the congestion control algorithm it employs. This presents congestion control proposals that preserve the original host-to-host idea of TCP—namely, that neither sender nor receiver relies on any explicit notification from the network. The proposed solutions focus on a variety of problems, starting with the basic problem of eliminating the phenomenon of congestion collapse, and also include the problems of effectively using the available network resources in different types of environments (wired, wireless, high-speed, long-delay, etc). http://www.ijettjournal.org Page 9 International Journal of Engineering Trends and Technology (IJETT) – Volume 6 Number 1- Dec 2013 Currently we have as situation where there is no Single congestion control approach for TCP that can universally be applied to all network environments. One of the primary causes is a wide variety of network environments and different (and sometimes opposing) network owners’ views regarding which parameters should be optimized. A number of the congestion control algorithms. Moreover, the current version of Linux kernel provides an API for software developers to choose any one of the supported algorithms for a particular connection. However, there are not yet the well-defined and broadly-accepted criteria to serve as a good baseline for appropriately selecting a congestion control algorithm. Additionally, objective guidelines to select a proper congestion control for a concrete network environment are yet to be defined. Loss-based and delay-based techniques are used to estimate the congestion states in the network and to detect packet loss quickly. Sliding window based flow control is to control the flow between the systems. Sender buffers all the data before transmission and then assigns sequence numbers to all the buffered data bytes.The buffered data are packetized into TCP packets that includes the sequence number of the first data byte.So,these packets are transmitted by using the IP protocol between the systems.If the congestion is high, packet loss will be more. Thereby the receiver system sends the rate limiting factor to the sender.So,based on that factor the sender may increase/reduce its factor value. ISSN: 2231-5381 II. Congestion Control in TCP In connectionless networks, the role of flow control is to modify the natural sending rate of an application to match the realities of network capacity, and to make the data stream better behaved. This is done by insisting that some assertions about the data stream are always valid, for example, that no more than 12kbtyes of data will be outstanding (sent but unacknowledged) at any given time. The test of a flow control protocol is its effectiveness in making network operation smoother as a result of this modification . In a high speed network with large delays, problems can arise from two sources. This introduces the problem of slow start where a node slowly ramps up its rate of transmission of packets over the network until a comfortable rate can be established. This is a problem because the average file (approx 1 KB) would have been already completed transmission before this ramping up to a comfortable rate takes place. This causes network inefficiencies, since the file could have been transmitted much quicker had this feedback-based TCP Congestion Control not been employed. Therefore this project seeks to design an algorithm that can be implemented in a TCP that can determine the optimal transmission rate rapidly, eliminating the slow start problem. In the existing TCP system ,as the transmission rate and receiving rate are not considered ,the packet loss statistics will be very high due to inconvenience of flow control rate. The standard already requires receivers to report the sequence number of the last in-order delivered data packet each http://www.ijettjournal.org Page 10 International Journal of Engineering Trends and Technology (IJETT) – Volume 6 Number 1- Dec 2013 time a packet is received though the sequence number of the packet that it received is not in order. So the sender can’t detect the packet loss till the end of the transmission. Proposed System The proposed system overcomes the problems that occurred in existing system by considering the rate limiting factor inorder to avoid the congestion that occurs in the network. The Host to Host congestion control proposals that build a foundation for all currently known host-to-host algorithms. This foundation includes The basic principle of probing the available network resources Loss-based and delay-based techniques to estimate the congestion state in the network. Techniques to detect packet losses quickly. The objectives of the project are to avoid the packet loss by reducing the congestion that occurs during transmission of data in the network.Increase of efficiency and throughput of the original TCP Avoid unnecessary assumption of crash of servers by using RTO(Retransmission Time Out).Determines Optimal transmission rate rapidly, thereby eliminating slow start problem TCP standard specifies a sliding window based flow control. This flow control has several mechanisms. First, the sender buffers all data before the transmission, assigning a sequence number to each buffered byte. Continuous blocks of the buffered data are packetized into TCP packets that include a sequence number of the first data byte in the packet. Second, a ISSN: 2231-5381 portion (window) of the prepared packets is transmitted to the receiver using the IP protocol. As soon as the sender receives delivery confirmation for at least one data packet, it transmits a new portion of packets. Finally, the sender holds responsibility for a data block until the receiver explicitly confirms delivery of the block. As a result, the sender may eventually decide that a particular unacknowledged data block has been lost and start recovery procedures (e.g., retransmit one or several packets). To acknowledge data delivery, the receiver forms an ACK packet that carries one sequence number and (optionally) several pairs of sequence numbers. In order to reduce the congestion that occurs in TCP here we use proposed congestion avoidance algorithm. In this proposed system we consider congestion window as rate limiting factor there by, the packet loss statistics is very less or the packet loss can be eliminated completely. Wireless networks rely on the uninterrupted availability of the wireless medium to interconnect participating nodes. However, the open nature of this medium leaves it vulnerable to multiple security threats. Anyone with a transceiver can eavesdrop on wireless transmissions, inject spurious messages, or jam legitimate ones. While eavesdropping and message injection can be prevented using cryptographic methods, jamming attacks are much harder to counter. They have been shown to actualize severe Denial-of-Service (DoS) attacks against wireless networks. In the simplest form of jamming, the adversary interferes with the reception of messages by transmitting a continuous jamming signal, or http://www.ijettjournal.org Page 11 International Journal of Engineering Trends and Technology (IJETT) – Volume 6 Number 1- Dec 2013 several short jamming pulses. Typically, jamming attacks have been considered under an external threat model, in which the jammer is not part of the network. Under this model, jamming strategies include the continuous or random transmission of highpower interference signals. However, adopting an “always-on” strategy has several disadvantages. First, the adversary has to expend a significant amount of energy to jam frequency bands of interest. Second, the continuous presence of unusually high interference levels makes this type of attacks easy to detect. Conventional anti-jamming techniques rely extensively on spreadspectrum (SS) communications, or some form of jamming evasion (e.g., slow frequency hopping, or spatial retreats). SS techniques provide bit-level protection by spreading bits according to a secret pseudonoise (PN) code, known only to the communicating parties. These methods can only protect wireless transmissions under the external threat model. Potential disclosure of secrets due to node compromise neutralizes the gains of SS. Broadcast communications are particularly vulnerable under an internal threat model because all intended receivers must be aware of the secrets used to protect transmissions. Hence, the compromise of a single receiver is sufficient to reveal relevant cryptographic information. In this paper, we address the problem of jamming under an internal threat model. We consider a sophisticated adversary who is aware of network secrets and the implementation details of network protocols at any layer in the network stack. The adversary exploits his internal knowledge for launching selective jamming ISSN: 2231-5381 attacks in which specific messages of “high importance” are targeted. For example, a jammer can target route-request/route-reply messages at the routing layer to prevent route discovery, or target TCP acknowledgments in a TCP session to severely degrade the throughput of an endto-end flow. To launch selective jamming attacks, the adversary must be capable of implementing a “classify-then-jam” strategy before the completion of a wireless transmission. Such strategy can be actualized either by classifying transmitted packets using protocol semantics, or by decoding packets on the fly. In the latter method, the jammer may decode the first few bits of a packet for recovering useful packet identifiers such as packet type, source and destination address. After classification, the adversary must induce a sufficient number of bit errors so that the packet cannot be recovered at the receiver. Selective jamming requires an intimate knowledge of the physical (PHY) layer, as well as of the specifics of upper layers. Real Time Packet Classification Consider the generic communication system depicted in Fig. At the PHY layer, a packet m is encoded, interleaved, and modulated before it is transmitted over the wireless channel. At the receiver, the signal is demodulated, deinterleaved, and decoded, to recover the original packet m. Selective Jamming Module We illustrate the impact of selective jamming attacks on the network performance. Implement selective jamming attacks in two multi-hop wireless network scenarios. In the first scenario, the attacker targeted a TCP connection established over http://www.ijettjournal.org Page 12 International Journal of Engineering Trends and Technology (IJETT) – Volume 6 Number 1- Dec 2013 a multi-hop wireless route. In the second scenario, the jammer targeted network-layer control messages transmitted during the route establishment process selective jamming would be the encryption of transmitted packets (including headers) with a static key. However, for broadcast communications, this static decryption key must be known to all intended receivers and hence, is susceptible to compromise. An adversary in possession of the decryption key can start decrypting as early as the reception of the first cipher text block. Strong Hiding Commitment Scheme (SHCS) We propose a strong hiding commitment scheme (SHCS), which is based on symmetric cryptography. Our main motivation is to satisfy the strong hiding property while keeping the computation and communication overhead to a minimum. Cryptographic Puzzle Hiding Scheme (CPHS) We present a packet hiding scheme based on cryptographic puzzles. The main idea behind such puzzles is to force the recipient of a puzzle execute a pre-defined set of computations before he is able to extract a secret of interest. The time required for obtaining the solution of a puzzle depends on its hardness and the computational ability of the solver. The advantage of the puzzle based scheme is that its security does not rely on the PHY layer parameters. However, it has higher computation and communication overhead s o u rc e d e s tin a tion w s n p a ck e t h id in g co n n e c t S o u ce co nn e c t D es tin a tio n C h a n n e l E n c o d in g in t e r le a v in g pa cke t se nd d e i n t e r le a v in g c h a n n e l d e c o d in g p a ck et h id in g / q u e u e J a m m i n g a t t a c k a n a ly s is Figure 1 Sequence Diagram W SN jamming networks ` Sour ce connect Destination Channel Encoding interleaving De-interleaving Pa cket Hiding/queue Channel Decoding Show results Figure 2 Activity Diagram IV. Results and Discussions This paper advocates the concept of congestion control that occurs in TCP .This introducesthe technique of probing the network resources and relying on packet loss to detect that the network limit has been reached by sending the transmission and receiving rate. Here we consider congestion window as rate limiting factor, In case of server or client, not in the position of sending or receiving files, RTO (Retransmission Time Out) is developed to avoid unnecessary assumption of crash of servers. Thus this project provides an effective method for avoiding ISSN: 2231-5381 http://www.ijettjournal.org Page 13 International Journal of Engineering Trends and Technology (IJETT) – Volume 6 Number 1- Dec 2013 congestion in the network and no packet loss occurs during transmission. A group of congestion control proposals that are focused on environments where packets are frequently reordered. These proposals show that in such environments, efficiency can be improved significantly by delaying the control actions or by Figure 6 Receiving Packets System Screen undoing previously applied actions if reordering is detected or by refining the network state estimation REFERENCES heuristic . we showed that basic host to-host congestion control principles can solve not only the direct congestion problem but also provide a simple traffic prioritizing feature. [1] M. Cagalj, S. Capkun, and J.-P. Hubaux. Wormhole-based ant jamming techniques in sensor networks. IEEE Transactions on Mobile Computing, 6(1):100–114, 2007. [3] A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming: Resilience and identification of traitors. In Proceedings of ISIT, 2007. [3] H. Balakrishnan, V. N. Padmanabhan, Figure 3 Implemented System Screen Login Page Figure 4 Packet conversion Screen Shot S. Seshan, and R. H. Katz, “A comparison of mechanisms performance for improving overwireless TCP links,” IEEE/ACM Trans.Netw., vol. 5, no. 6, pp. 756–769,December 1997. [4] J. Widmer, R. Denda, and M. Mauve, “A survey on TCP-friendlycongestion control,” IEEE Network, vol. 15, no. 3, pp. 28–37, May/June2001. [5] S. Floyd and K. Fall, “Promoting the use of end-to-end congestioncontrol in the Figure 5 Control Message System Screen Internet,” IEEE/ACMTrans. Netw., vol. 7, no. 4, pp.458–472, August 1999. ISSN: 2231-5381 http://www.ijettjournal.org Page 14 International Journal of Engineering Trends and Technology (IJETT) – Volume 6 Number 1- Dec 2013 [6] Z. Wang and J. Crowcroft, “Eliminating periodic packet losses in 4.3–Tahoe BSD TCP congestion control,” ACMComputer CommunicationReview, vol. 22, no. 2, pp. 9–16, 1992. [7]Alexander Afanasyev, Neil Tilley, Peter Reiher, and Leonard Kleinrock ,”Host to Host Congestion Control For TCP”,IEEE Communications Surveys & Tutorials, vol. 12, no. 3, Third quarter 2010 [8] S. Low, F. Paganini, and J. Doyle, “Internet congestion control,” IEEEControlSyst. Mag., vol. 22, no. 1, pp. 28–43, February 2002. Authors Profile: M.V.L. Alekhya is pursuing her master’s Degree (M. Tech) from Rama Chandra College of Engineering, Eluru. She completed her Graduation Bapatla (B.Tech) Engineering from College, Bapatla. P. Chakradhar is working as Associate Professor, in Rama Chandra College of Engineering, Eluru. ISSN: 2231-5381 http://www.ijettjournal.org Page 15