ABSTRACT
The objective of this project is to simulate an overflowing ATM network and establish a router with congestion control based on the GCRA algorithm.
The TCP/IP protocol suite is the standard requirement for all applications that need to communicate over the Internet. As TCP/IP applications are unable to specify the QOS parameters needed for most Asynchronous Transfer Mode (ATM) services, we tend to use the GCRA Algorithm.
The purpose of Cell-Rate Guarantees for Traffic across ATM Network is to provide QOS. ATM is a connection-oriented switching technology, utilizing statistical multiplexing of fixed-length packets, known as cells.
The purpose of traffic control is to minimize congestion. In an ATM network when the Source Machine continuously sends cells to the Destination Machine through the Router Machine, there will be a possibility of occurring congestion. When congestion occurs the Routing Machine cannot accept more cells and hence these cells will be discarded. This causes regeneration and retransmission of the discarded ATM cells.
Through the classes in java.net package, Java programs can use TCP or UDP to communicate over the Internet. The Socket and Server Socket classes all use TCP to communicate over the network.
This project makes use of GCRA algorithm which is the combination of Leaky Bucket Algorithm and Virtual Scheduling Algorithm. Routing Machine makes use of this algorithm and knows about the occurrence of congestion and controls it. Thus eliminates the disadvantage of regeneration and retransmission of the ATM cells.
1. INTRODUCTION
The purpose of this project is to send packets from one machine to another machine by simulating an overflowing ATM network and establish a router with congestion control based on the GCRA algorithm. The basic concepts of networking are given below:
NETWORKS
The interconnected computers to do the job are known as Networking. There is a considerable confusion in the literature between a computer network and a distributed system. The key distinction is that in a distributed system a collection of independent computers appears to its users a single coherent system. Depending upon the physical setup and the configuration the networks can be classified into as follows: Local Area Network Metropolitan Area Network Wide Area Network
EXISTING SYSTEM
In the existing system when transferring data from sender to receiver there may be chances of data loss. No user can be known whether the router is free after he sends data to the router. Also no intimation when the buffer at the router is full or busy or free. It causes retransmission of data to the router and hence redundant bandwidth usage and consumption of time
PROPOSED SYSTEM
The main objective of this project is to reduce the congestion when data transfers between source and destination. When data transfers between source and destination there may be chances of occurrence of congestion and also it monitor when congestion occurs. If so that has to be intimated or warned to the user. In this System, using several algorithms viz. Leaky bucket algorithm and Virtual scheduling algorithm congestion can be avoided. Leaky Bucket Algorithm continuously receives and sends the data at the particular interval of time to avoid congestion or flooding of data. Virtual scheduling algorithm monitors the congestion occurrence, when congestion occurs it intimates or warns user and simultaneously intimates when the router is free and data transferred successfully to destination. This system can be implemented in a real network to control the traffic occurred in a network. User can get to know the status of the router whether router is busy in controlling the inflow and outflow of data to transfer data to the destination.
HARDWARE REQUIREMENTS
The most common set of requirements defined by any operating system or software application is the physical computer resources, also known as hardware. The hardware requirements required for this project are: 20 GB of Hard disk 256 MB RAM
Pentium 133 MHZ or above (Processor) PCs which are interconnected in LAN Network Adapter card configured with an IP address
SOFTWARE REQUIREMENTS
Software Requirements deal with defining software resource requirements and pre-requisites that need to be installed on a computer to provide optimal functioning of an application. These requirements or pre-requisites are generally not included in the software installation package and need to be installed separately before the software is installed. The software requirements that are required for this project are: Java 1.3 or more Windows 98 or more
SYSTEM REQUIREMENTS
System Requirements set out the system services and the constraints in detail. Some times the system requirements document is also called a functional specification. System Requirements are more detailed description of the user requirements. They may serve as the basis for contract for the implementation of the system and
should therefore be a complete and consistent specification of the whole system. They are used by software engineers as the starting point of the system design. In principle, the system requirements should state what the system should do and not, how it should be implemented.
MODULES
The project comprises of three modules as follows: Source Module. Router Module. Destination Module.
Source Module
The task of this Module is to divide the Message in the form of 48 Bytes and forward it into the Router. The allocated Bytes are called as Packets.
The message is divided into fixed-sized packets called cells. The cells are appended with appropriate header information. The header contains the destination machine name. The total packet length is 53 bytes i.e. 48-byte data + 5-byte header The packets are forwarded to the router for further processing.
Router Module
The task of this Module is to accept the packet from the Source. Each and Every packet arrived in the router are send to Destination based on the GCRA algorithm. GCRA algorithm implements two algorithms.
Destination Module
The task of this Module is to accept the packets from the router make all them into a message and stored in a file with the Destination machine. Accept the packet from the router. Create a text file with the name that of the destination machines name. Append the contents to the file and save it.