International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 5- May 2013 Packet Loss Control using Early Random Control at the Network Edge G. Srinivasa Rao*1 , Assoc. Professor & HOD, Department of Computer Science & Engineering, Anurag Engineering College, Ananthagiri (v), Kodad (M), Nalgonda (Dt), AP, India,. P. Gurulingam*2, student, Department of Computer Science & Engineering, Anurag Engineering College, Ananthagiri (v), Kodad (M), Nalgonda (Dt), AP, India, Battu Hanumantha Rao*3, Assoc. Professor & Dean-Academics, N.H. College of Engineering, Parli Vaijanath, Beed District, Maharashtra – 431515, India Abstract— This paper discusses the use of link-sharing mechanisms in packet networks and presents algorithms for hierarchical link-sharing. Hierarchical link-sharing allows multiple agencies, protocol families, or traffic types to share the bandwidth on a link in a controlled fashion. This paper presents Random Early Detection (RED) gateways for congestion avoidance in packets witched networks. The gateway detects incipient congestion by computing the average queue size. The gateway could notify connections of congestion either by dropping packets arriving at the gateway or by setting a bit in packet headers. We propose fair adaptive bandwidth allocation (FABA), a buffer management discipline that ensures a fair bandwidth allocation amongst competing flows even in the presence of non-adaptive traffic. The RED gateway has no bias against bursty traffic and avoids the global synchronization of many connections decreasing their window at the same time. Simulations of a TCP/IP network are used to illustrate the performance of RED gateways. coupled with gateway scheduling algorithms that require perconnection state in the gateway. end-to-end delay, as well as from packet drops or other methods. Nevertheless, the view of an individual connection is limited by the timescales of the connection, the traffic pattern of the connection, the lack of knowledge of the number of congested gateways, the possibilities of routing changes, as well as by other difficulties in distinguishing propagation delay from persistent queueing delay. The most effective detection of congestion can occur in the gateway itself. Keywords— Bandwidth, Time Complexity, Space Complexity, Active flows. I. INTRODUCTION In high-speed networks with connections with large delaybandwidth products, gateways are likely to be designed with correspondingly large maximum queues to accommodate transient congestion. In the current Internet, the TCP transport protocol detects congestion only after a packet has been dropped at the gateway. However, it would clearly be undesirable to have large queues (possibly on the order of a delay-bandwidth product) that were full much of the time; this would significantly increase the average delay in the network. Therefore, with increasingly high-speed networks, it is increasingly important to have mechanisms that keep throughput high but average queue sizes low. In the absence of explicit feedback from the gateway, there are a number of mechanisms that have been proposed for transport-layer protocols to maintain high throughput and low delay in the network. Some of these proposed mechanisms are designed to work with current gateways while other mechanisms are ISSN: 2231-5381 Figure 1: System Architecture. The gateway can reliably distinguish between propagation delay and persistent queueing delay. Only the gateway has a unified view of the queueing behavior over time; the perspective of individual connections is limited by the packet arrival patterns for those connections. In addition, a gateway is shared by many active connections with a wide range of roundtrip times, tolerances of delay, throughput requirements, etc.; decisions about the duration and magnitude of transient congestion to be allowed at the gateway are best made by the gateway itself. The method of monitoring the average queue size at the gateway, and of notifying connections of incipient congestion, is based of the assumption that it will continue to http://www.ijettjournal.org Page 1954 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 5- May 2013 be useful to have queues at the gateway where traffic from a number of connections is multiplexed together, with FIFO scheduling. Not only is FIFO scheduling useful for sharing delay among connections, reducing delay for a particular connection during its periods of burstiness [4], but it scales well and is easy to implement efficiently. In an alternate approach, some congestion control mechanisms that use variants of Fair Queueing [20] or hop-by-hop flow control schemes [22] propose that the gateway scheduling algorithm make use of per-connection state for every active connection. We would suggest instead that per-connection gateway mechanisms should be used only in those circumstances where gateway scheduling mechanisms without perconnection mechanisms are clearly inadequate. Requirements for resource management in the Internet include both services for real-time traffic and link-sharing services. Realtime traffic is characterized by a (fixed or adaptive) playback time at the receiver; real-time packets arriving at the receiver after the playback time are discarded. In a congested network, resource management mechanisms are required at the gateway to meet realtime traffic requirements for controlled delay and limited packet drops. While there has been an abundance of research about the needs of real-time traffic, link-sharing services have received somewhat less attention in the research community. The approach to controlled link-sharing described in this paper has evolved in the context of the Internet. Because the Internet is decentralized in nature, composed of multiple administrative domains with a wide range of resource limitations, the control of Internet resources involves local decisions on usage as well as considerations of per-connection end-to-end requirements. One function of link-sharing mechanisms is to enable gateways to control the distribution of bandwidth on local links in response to purely local needs. By allowing isolation between real-time and best-effort traffic in cooperation with packet scheduling algorithms that give priority to the real-time traffic, controlled link-sharing can also be a key component in enabling the deployment of priority-based packet scheduling algorithms designed to meet the end-to-end service requirements of realtime traffic. II. BACKGROUND WORK The basic idea of P2P network is to have peers participate in an application level overlay network and operate as both A number of approaches for queue management at Internet gateways have been studied earlier. Droptail gateways are used almost universally in the current Internet due to their simplicity. A droptail gateway drops an incoming packet only when the buffer is full, thus providing congestion notification to protocols like TCP. While simple to implement, it distributes losses among flows arbitrarily[9]. This often results in bursty losses from a single TCP connection, thereby reducing its window sharply. Thus, the flow rate and consequently the throughput for that flow drops. Tail dropping also results in multiple connections simultaneously suffering losses leading to global synchronization [10]. RED addresses some of the drawbacks of droptail gateways. An RED ISSN: 2231-5381 gateway drops incoming packets with a dynamically computed probability when the exponential weighted moving average queue size avg q exceeds a threshold called min th. This probability increases linearly with increasing avg q till max th after which all packets are dropped until the avg q again drops below max th. The RED drop probability also depends on the number of packets enqueued since the last packet drop. The goal of RED is to drop packets from each flow in proportion to the amount of bandwidth it is using. However, from each connection _s point of view the packet loss rate during a short period is independent of the bandwidth usage as shown in [10]. This contributes to unfair link sharing in the following ways: • Even a low bandwidth TCP connection observes packet loss which prevents it from using its fair share of bandwidth. • A non-adaptive flow can increase the drop probability of all the other flows by sending at a fast rate, which increases the drop probability for all flows. • The calculation of avg q for every packet arrival is computationally intensive. To ensure fairness amongst flows in terms of bandwidth received and to identify and penalize misbehaving users, it is necessary to maintain some sort of per-flow state [14]. Many approaches based on per-flow accounting have been suggested earlier. FRED [10] does per-flow accounting maintaining only a single queue. It suggests changes to the RED algorithm to ensure fairness and to penalize misbehaving flows. It puts a limit on the number of packets a flow can have in the queue. Besides it maintains the per flow queue occupancy. Drop or accept decision for an incoming packet is then based on average queue length and the state of that flow. It also keeps track of the flows which consistently violate the limit requirement by maintaining a per-flow variable called strike and penalizes those flows which have a high value for strike. It is intended that this variable will become high for nonadaptive flows and so they will be penalized aggressively. It has been shown through simulations [12] that FRED fails to ensure fairness in many cases. CHOKe [13] is an extension to RED. It does not maintain any per flow state and works on the good heuristic that a flow sending at a high rate is likely to have more packets in the queue during the time of congestion. It decides to drop a packet during congestion if in a random toss; it finds another packet of the same flow. In a significant paper by Guerin et al. [19], the authors establish how rate guarantees can be provided by simply using buffer management. They show that the buffer management approach is indeed capable of providing reasonably accurate rate guarantees and fair distribution of excess resources. III. METHODS FABA algorithm If the buffer size of the bottleneck router is B, then it is easy to see that the space complexity of FABA algorithm is. This can be argued as follows: the number of token buckets is equal to the number of active flows passing through the router and in the worst case, there are B active flows at the http://www.ijettjournal.org Page 1955 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 5- May 2013 bottleneck buffer. We have already argued that by the nature of token distribution, if a packet is in position x from the front of the queue, the average number of tokens added to its bucket when the packet is dequeued is x=N. [3] [4] [5] [6] [7] [8] [9] [10] Figure 2: Simulation Setup [11] [12] [13] [14] [15] [16] [17] Figure 3: Packet Loss control using FABA [18] [19] IV. CONCLUSION [20] The primary advantage of the probing mechanism can be understood as follows. For normal messages without the probing mechanism, the source does not have any idea about the status of the destination. So fi the request to connect is lost, the entire process is in jeopardy. In messages using the probing mechanism, the request is sent only if the status of the destination is optimal for transactions to being. Therefore, the entire process is more stabilized in the previous version. One of the defects in this model is the use of static routing and the model can be improved by implementing dynamic routing. Using Java we created a sample intranet structure to simulate probing mechanism. After the network topology has been chosen, the parameters necessary to execute it are supplied to the simulator. Likewise various network structures can be created using this tool and various congestion detecting and control mechanisms can be simulated. [21] [22] [23] [24] [25] [26] [27] REFERENCES [1] [2] L.L. Peterson, B.S. Davie, Computer Networks: A Systems Approach, Morgan Kaufmann, Los Altos, CA, 1996. D.C. Verma, Policy-Based Networking: Architecture and Algorithms, New Riders Publishing, Indianapolis, IN, USA, 2000. ISSN: 2231-5381 [28] S. Keshav, An Engineering Approach to Computer Networking: ATM Networks, the Internet, and the Telephone Network, Addison-Wesley, Reading, MA, 1997. D. Bertsekas and R. Gallager. Data Networks. Prentice Hall, Englewood Cliffs, NJ, 1987. P. Billingsley. Convergence of Probability Measures. Wiley, 1968. F. Clevenot and P. Nain. A Simple Fluid Model for the Analysis of the Squirrel Peer-to-Peer Caching System. In Proceedings of IEEE INFOCOM, 2004. F. Clevenot, P. Nain, and K. Ross. Stochastic Fluid Models for Cache Clusters. Technical Report 4815, INRIA, Sophia Antipolis, 2003. To appear in Performance Evaluation. B. Cohen. Incentives build robustness in bittorrent, May 2003. http://bitconjurer.org/BitTorrent /bittorrentecon.pdf. F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica. Widearea cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP ’01), Chateau Lake Louise, Banff, Canada, October 2001. A. Das and R. Srikant. Diffusion approximations for a single node accessed by congestion-controlled sources. IEEE Transactions on Automatic Control, 45(10):1783–1799, October 1998. G. de Veciana and X. Yang. Fairness, incentives and performance in peer-to-peer networks. In the Forty-first Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, Oct. 2003. Sally Floyd, Van Jacobson, Link-sharing and Resource Management Models for Packet Networks, IEEE\ACM Transactions on Networking, Vol.3, No.4, 1995. John Nagle, RFC896 congestion collapse, January 1984. Sally Floyd and Kevin Fall, Promoting the Use of End-to-End Congestion Control in the Internet, IEEE/ACM Transactions on Networking, August 1999. V. Jacobson. “Congestion Avoidance and Control”. SIGCOMM Symposium on Communications Architectures and Protocols, pages 314– 329, 1988. http://www.isi.edu/nsnam/ns/ L. Benmohamed and S. M. Meerkov, “Feedback control of congestion in packet switching networks: The case of a single congested node,” IEEE/ACM Trans. Networking, vol. 1, pp. 693–708, Dec. 1993. E. Altman, T. Basar, and R. Srikant, “Control methods for communication networks,” in Proc. 36th Conf. Decision and Control, San Diego, CA, 1997, pp. TA 31774–1809, TM3 2368–2404, TP3 2903–2945. S. H. Low and D. E. Lapsey, “Optimization flow control—I: Basic algorithms and convergence,” IEEE/ACM Trans. Networking, vol. 7, pp. 861–874, Dec. 1999. S. Floyd and K. Fall, “Promoting the use of end-to-end congestion con- trol in the Internet,” IEEE/ACM Trans. Networking, vol. 7, pp.458–472, Aug. 1999. S. J. Golestani and S. Bhattacharyya, “A class of end-to-end congestioncontrol algorithms for the Internet,” in Proc. Int. Conf. Network Protocols (ICNP), Austin, TX, Oct. 1998, pp. 137–150. A. Kolarov and G. Ramamurthy, “A control theoretic Approach to the design of explicit rate controller for ABR service,” IEEE/ACM Trans. Networking, vol. 7, pp. 781–753, Oct. 1999. N. Ghani and J. W. Mark, “Enhanced distributed explicit rate allocation for ABR services in ATM networks,” IEEE/ACM Trans. Networking, vol. 7, pp. 710–723, Oct. 1999. S. Kalyanaraman, R. Jain, R. Goyal, S. Fahmy, and B. Vandalore, “The ERICA switch algorithm for ABR traffic management in ATM networks,” IEEE/ACM Trans. Networking, vol. 8, pp. 87–98, Feb. 2000. T. V. Lakshman, P. P. Mishra, and K. K. Ramakrishan, “Transporting compressed video over ATM networks with explicit-rate feedback control,” IEEE/ACM Trans. Networking, vol. 8, pp. 71–86, Feb. 2000. R. Muthukrishnan, S. Dasgupta, A. Varma, L. Kalampoukas, and K. K. Ramakrishnan, “Design, implementation and evaluation of an explicit rate allocation algorithm in an ATM switch,” in Proc. IEEE INFOCOM, Tel Aviv, Israel, Apr. 2000, pp. 1313–1322. Y. Zhao, S. Q. Li, and S. Sigarto, “A linear dynamic model for design of stable explicit-rate ABR control schemes,” in Proc. IEEE INFOCOM, Kobe, Japan, Apr. 1997, pp. 283–292. S. Mascolo, D. Cavendish, and M. Gerla, “ATM rate-based congestion control using a Smith predictor: An EPRCA implementation,” in Proc. IEEE INFOCOM’96, San Francisco, CA, 1996, pp. 569–576. http://www.ijettjournal.org Page 1956 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 5- May 2013 [1] G.Srinivasa Rao is currently working as an Associate Professor & Head of the Department of Computer Science & Engineering at Anurag Engineering College, Kodad. He guided many projects in the area of image processing for CSE & IT Departments. His research intrests are at the areas of Data Warehousing and Network Security. [2] P.Gurulingam is pursuing M.Tech(CSE) at the Department of Computer Science & Engineering , Anurag Engineering College Kodad. He received B.Tech CSE from SV Univeristy, Tirupati. His research intrests are at the area of Computer Networks. [3] B.Hanumantha Rao is currently working as an Associate Professor at the Department of Computer Science & Engineering, and also DeanAcademics, NH College of Engineering. He is also a research scholar at the Department of Computer Science and Engineering, Acharya Nagarjuna University,Guntu. He completed his M.Sc (Computer Scinece), M.Tech(CSE) and MBA ..His research work focouses on Software Development Methodologies, and also he intrests at the areas of Computer Networks and Operating Systems. ISSN: 2231-5381 http://www.ijettjournal.org Page 1957