Mepco-conference-rajkumar

22
Title: New Congestion Control Algorithm For Wireless Network

Transcript of Mepco-conference-rajkumar

Page 1: Mepco-conference-rajkumar

Title:

New Congestion Control Algorithm

For

Wireless Network

Page 2: Mepco-conference-rajkumar

Presented By

S.Rajkumar,Mphil (Research Scholar),Alagappa University,Karaikudi.

Guided By

Mr.T.Meyyappan., M.Sc. ,MBA., MPhil., [Ph.D].

Alagappa University, Karaikudi.

Page 3: Mepco-conference-rajkumar

Motivation

This research work focuses on congestion control on multi-hop, wireless networks.

In a wireless network, an important constraint is due to the MAC (Media Access Control) layer.

Many wireless MACs use a time –division strategy for channel access. At any point in space, the physical channel can be accessed by a single

user at each instant of time. In this research work, a fair hop-by-hop congestion control algorithm

is proposed. It uses optimization based framework.

Page 4: Mepco-conference-rajkumar

In the presence of delay, the hop-by-hop control algorithm has the property of spatial spreading.

Focused loads at a particular spatial location in the network get “smoothed” over space.

Bounds on the “peak load” at a node are derived using both hop-by-hop controls.

Analytical results of this research work are compared with simulated results for time delay, packet loss, and periodic dropping delay variance with wireless network.

Continue….

Page 5: Mepco-conference-rajkumar

Introduction

Congestion occurs when the source sends more packets than the destination can handle.

If the source sends more number of packets than the destination buffer can handle, then this congestion occurs.

When congestion occurs, the destination has only two options with the arriving packets, to drop it or keep it.

If the destination drops the new arriving packets and keeps the old packets then this mechanism is called `Y’ model.

If the destination drops the old packets and fills them with new packet, then this mechanism is called Milk model.

In both the cases packets are dropped. Two common ways to detect congestion are timeout and duplicate

acknowledgement

Page 6: Mepco-conference-rajkumar

Congestion control

Congestion control can be used to calculate the amount of data the sender can send to the destination on the network.

Determining the amount of data is not easy, as the bandwidth changes from time to time, the connections get connected and disconnected.

Based on these factors the sender should be able to adjust the traffic. TCP congestion control algorithms are used to detect and control

congestion.

Page 7: Mepco-conference-rajkumar

Existing Method JELLYFISH ATTACK METHOD

A critical strength of the JellyFish Attack is that it maintains compliance with all control plane and data plane protocols in order to make detection and diagnosis costly and time consuming.

The key principle that JF use to facilitate the attack is targeting end-to-

end congestion control. CONGESTION CONTROL WITH DELAY METHOD

The time resource was large enough so that queuing in the presence of feedback delay.

Page 8: Mepco-conference-rajkumar

Proposed Methods JF Reorder Attack:

In this attack, JF deliver all packets, yet after placing them in a re-

ordering buffer rather than a FIFO buffer. JF Periodic Dropping Attack:

JF periodic dropping attack in which attacking nodes drop all packets

for a short duration. JF Delay Variance Attack:

JF delay variance attackers are wait for a variable amount of time before servicing each packet, maintaining FIFO order, but significantly

increasing delay variance.

Page 9: Mepco-conference-rajkumar

Results & Discussion In this wireless congestion control with out scheduling,

although time delay is minimum., there are chances for packet loss.

In wireless congestion control with scheduling time delay is high but packet loss is eliminated and packet reach the correct destination.

In existing methods, the following problems are prevailing: 1. Packet loss 2. Time Delay 3. Source to destination communication loss

In proposed method, the problem of packet loss, time delay, are removed to the maximum extent possible. The packets reaching destination are ensured

Page 10: Mepco-conference-rajkumar

JF-Reorder effect on throughput

JF-Drop effect on Throughput

Page 11: Mepco-conference-rajkumar

Jelly Fish Reorder Attacks

Page 12: Mepco-conference-rajkumar

JF Reorder Attack- Time Delay Packet Loss Tracking

Page 13: Mepco-conference-rajkumar

Jelly Fish Periodic Dropping Attacks

Page 14: Mepco-conference-rajkumar

JF Dropping Attack- Time Delay Packet Loss Tracking

Page 15: Mepco-conference-rajkumar

Jelly Fish Delay Variance Attacks

Page 16: Mepco-conference-rajkumar

JF Delay Variance Attack- Time Delay Packet Loss Tracking

Page 17: Mepco-conference-rajkumar

Congestion Control

without Scheduling with Scheduling

Page 18: Mepco-conference-rajkumar

Graph Showing

Without Scheduling With Scheduling

Page 19: Mepco-conference-rajkumar

CONCLUSION Attacks are studied in a variety of settings and the quantification of the

damage they can inflict are provided. Such attacks can actually increase the capacity of ad hoc networks as

they will starve all multihop flows. System clearly considers fairness measures and the mean number of

hops for a received packet, as critical performance measures for a system under attack.

One Tower using wireless connection, controls all the transfer of data from source to destination.

The congestion control parameters such as, Packet loss(through Graph) and time delay are measured in two proposed methods namely congestion control with scheduling and congestion control without scheduling.

Page 20: Mepco-conference-rajkumar

In this wireless congestion control with out scheduling, although time delay is minimum, there are chances for packet loss.

In wireless congestion control with scheduling time delay is high but packet loss is eliminated and packet reaches the correct destination.

In existing methods the following problems are prevailing.1. Packet loss2. Time Delay3. Source to destination communication loss

In proposed method, the problem of packet loss, time delay, are removed to the maximum extent possible.

The packets reaching destination are ensured.

Continue…..

Page 21: Mepco-conference-rajkumar

QUERIES???

Page 22: Mepco-conference-rajkumar

THANK YOU