Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Consequences of incorporation of congestion control into BGP
Don’t take our word for it - see why 10 million students trust us with their essay needs.
IV. Research Methodology Firstly, implement a normal BGP topology in a multi-AS environment. The topology will consist of ten Autonomous Systems and BGP will have all the possible paths from which the packet can be delivered from the source to the destination and it will select the best path on the basis of path attributes. Thereafter, simulate a congested BGP scenario by congesting a particular AS by continuously flooding stream of data and observe the traffic pattern causing delay and packet loss. To observe the traffic pattern, simulate different BGP congestion scenarios between peer-peer, customer-ISP, and ISPs acting as transit for other ISPs. Secondly, implement the topology on ITGURU using its in-built BGP module. Once the simulation is done and the data is logged, analyze the various performance parameters like average end-to-end delay, average packet loss rate, and average throughput. Process the data if required and graph the results before and after congestion using ITGURU or mathplotlib. Since, congestion control is not taken care of in BGP; there are a few mechanisms ...
Lab 1 demonstrates the capabilities of congestion control algorithms implemented by Transmission Control Protocol (TCP). It provides three scenarios to simulate these algorithms and will later compare the results.
In this lab, we used Transmission Control Protocol (TCP) which is a connection oriented protocol, to demonstrate congestion control algorithms. As the name itself describes, these algorithms are used to avoid network congestion. The algorithms were implemented in three different scenarios i.e. No Drop Scenario, Drop_Fast Scenario and Drop_NoFast Scenario.
Blackhole attack is another type of DoS attack that generates and disseminates build routing information. As mentioned in [20], a attacker, exploiting the flooding based routing protocol, advertises itself as having a valid shortest route to the destined node. If the atacker replies to the requesting node before the actual node replies, a bogus route will be created. Hence packets are not forwarded to the certain destination node; instead, the attacker intercepts the packets, drops them and thus, attracts network traffic [21].
Cisco’s annual Internet Traffic Report (2013) shows that mobile traffic, perhaps the largest growing bucket of data in the world, continues to rocket upwards as people consume more video.
Netflix consumes about 29.7% of peak downstream traffic because of its online video streaming service. (Adhikari, et al., 2012). The network architecture of Netflix should be well organized to support the features of high availability and scalability. Netflix previously had its own data center to host the services and functions required for efficient video streaming availability to its customers. Currently, Netflix has adopted cloud techn...
common forms of threat to the world of Internet today is BGP hijacking. BGP Route Hijacking
Sakellari, G., Morfopoulou, C., & Gelenbe, E. (2013). Investigating the tradeoffs between power consumption and quality of service in a backbone network. Future Internet, 5(2), 268. doi: 10.3390/fi5020268
Lighthill M.J. and Whith Am G. B. 1955): On kinetic waves II: A theory of traffic flow on long crowded roads. Proceedings Royal Society, London, A 229, 317-345
Once we are prepared with all these measures, our next goal would be to appropriately detect the correct issue. This involves answering questions like: Where exactly has hijacking been done, is it a prefix hijacking or sub-prefix hijacking, which AS route has been maligned, etc. Thus, in order to understand the technique of detection, it is important to understand the difference between the two types of BGP hijacking: Prefix hijacking and Sub-prefix hijacking [4]:
Indian government is facing the problem of traffic congestion in its four metro cities namely Delhi, Mumbai, Kolkata and Chennai. Delhi is the worst affected. Reports say that on an average 1,200 vehicles are added to delhi roads daily. In September 2010, Mail Today carried a report quoting CRRI scientists. It said, "Six years of Delhites’, careers are spent in snarls as 7 million man hours and Rs. 100 crore in productivity are lost to gridlocks, making the capital the worst congested city in India."What has the ministry worried is that though the Master Plan projection for public transport usage is an impressive 80 per cent by 2020, it has actually slipped to under 40 per cent at current rates. For the purpose of managing the traffic and to meet the goals of the Master Plan, the government of Delhi has shortlisted your company in providing advice to conquer this problem.
Traffic calming measures are quite common in modern society. Traffic calming measures are physical design techniques that encourage or force motorists to drive slow and constant speed. They prevent speeding and can increase overall road safety. Traffic calming can also make streets more accessible and livable for other users such as pedestrians, cyclists and nearby residents. The main purpose of traffic calming measures is to reduce speed and create a safer traffic environment. Road bumps are one type of measures that is frequently used to reduce speed in residential areas. Traffic calming measures have to adapt to the specific condition of each location but in principle only one design of road bumps is needed. This design should lead to a comfortable crossing at speed lower than 15-20 km/h but as soon the speed increased it should be more uncomfortable to cross the road bumps. The design of ideal road bumps would make drivers hold their speed below 25 km/h at least when crossing a road bumps.
Hollows, P 2002, 'Essentials of a smooth-running network', Communications News, vol. 39, no. 7, p. 16.
Assigning the precise amount of network capacity in the right place at the right time is no simple task. Network Planners cannot afford to overbuild, as this would consume scarce investment resources that could be better used elsewhere. They also cannot delay expansion as this may result in poor service to customers and under-utilize other network assets. A balanced approach is needed in order to meet the rapidly growing and changing traffic demands. Advanced network planning and design software provides benefit to network planners in the following ways:
Due to the demand for the internet to be fast, networks are designed for maximum speed, rather than to be secure or track users (“Interpol” par. 1). The adage of the adage.... ... middle of paper ... ...
Wikipedia defines traffic congestion as the condition on road networks that occur as the use as use increase is characterized by slower speed, longer trip times and increased vehicular queuing. Congestion occurs when the demand for transport is greater than the supply of transport in a particular part of the transport system. Congestion is deemed bad for the economy as it has a negative impact on the business activities that are common in towns like Windhoek. Traffic congestion is popular during the mornings when everybody is travelling to school, work it is also popular during the night when people have knocked off and are returning to their homes.