Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ABSTRACT
I have done my Summer Training under HCL Career Development Centre, Jaipur Division. I have worked on ASP.NET and various pertinent technologies, used in the project provided to me to work upon, under professional guidance. The project, I worked on is based on collective information about Tours and Travels. The project aimed at providing online information to Tours and Travels anywhere in India and thus saving time and efficiency of the human resource and the system.
2) To provide a code execution environment that minimizes software deployment and versioning conflicts. 3) To provide a code execution environment that guarantees safe execution of code, including code created by an unknown or semi trusted third party. 4) To provide a code execution environment that eliminates the performance problem of scripted or interpreted environments. 5)To make the developer experience consistent across widely types of application, such as windows based applications and web based applications. 6) To build all communication on industry standards to ensure that code based on the .NET framework can integrate with any other code. 1.2.2 C#.NET: C# (pronounced "C Sharp") is a multi-paradigm programming language encompassing imperative, functional, generic, object-oriented (class-based), and component-oriented programming disciplines. It
was developed by Microsoft within the .NET initiative and later approved as a standard by Ecma (ECMA-334) and ISO (ISO/IEC 23270). C# is one of the programming languages designed for the Common Language Infrastructure. C# is intended to be a simple, modern, general-purpose, object-oriented programming language. It has an object-oriented syntax based on C++. It was initially named Cool, which stood for "C-like Object Oriented Language". However, in July 2000, when Microsoft made the project public, the name of the programming language was given as C#.
Sender Side:
Treat segment contents as sequence of 16-bit integers Checksum: addition (1s complement sum) of segment contents Sender puts checksum value into UDP checksum field
Receiver Side:
Compute checksum of received segment Check if computed checksum equals checksum field value: NO - error detected YES - no error detected.
The proposed System is developed on Processor RAM Hard Disk Drive Key Board Monitor Display Adapter Network Adapter Mouse : : : : : : : : INTEL Core2Duo 1GB 160GB Standard 101/102 or Digi Sync Family Display Panel (1024 X 764) Trident Super VGA SMC Ethernet Card Elite 16 Ultra Logitech Serial Mouse
Microsoft .NET is software that connects information, people, systems and devices. It spans clients, servers and developer tools and consists of: The .NET Framework programming model that enables developers to build Web-based applications which expose their functionality programmatically over a network using standard protocols such as SOAP and HTTP. Developer tools such as Microsoft Visual Studio .NET, which provide a rapid application integrated development environment for programming with the .NET Framework. A set of servers including Microsoft Windows 2000, Microsoft SQL, Server and Microsoft BizTalk Server that integrates, runs, operates and manages XML Web services and applications.
Client software such as Windows XP, Windows CE and Microsoft Office XP that helps developers deliver a deep and compelling user experience across a family of devices and existing products.
The .NET Framework is the programming model of the .NET environment for building, deploying and running Web- based applications, smart client applications and XML Web services. It manages much of the plumbing, enabling developers to focus on writing the business logic code for their applications. The .NET Framework includes the common language runtime and class libraries.
4.1 Go Back-N
4.1.1 State Transition Diagram:
4.3 OSPF
11
12
Sender: The sender assigns a sequence number to each frame, ranging from 0 up to some maximum number. At any instant of time, the sender maintains a list of consecutive sequence numbers corresponding to frames it is permitted to send. This list, termed the sending window, represents frames sent but not yet acknowledged. When an acknowledgment arrives, the lower edge of the window is advanced to the corresponding sequence number, thereby allowing the sender to transmit new frames. Let SWS be the maximum sender window size. Let LAR be the sequence number of the last acknowledgment received. Let LFS be the sequence number of the last frame sent. The sender maintains the invariant: LFS - LAR + 1 <= SWS. Since frames currently within the sender's window may ultimately be lost or damaged in transit, the sender must keep all these frames in its memory for possible retransmission. Thus, the sender must have a buffer large enough to hold as many frames as there are in its window. The sender records the time at which every packet is sent. If the sender does not receive an acknowledgment for a packet before the timeout period elapses, it retransmits the original frame.
13
Receiver:
The receiver also maintains a receiving window, corresponding to the number of out-of-order frames it is permitted to accept. Any frames falling outside the window are discarded without comment.
Let RWS be the maximum receiver window size. Let HFA be the highest-numbered frame that will be accepted. Let NFE be the next frame expected.
When a frame with sequence number s arrives, the receiver takes the following action. If s < NFE or s > HFA, then the frame is outside the receiver's window and so it is discarded.
An acknowledgment for s is sent if the following conditions are met: 1) s has not yet been acknowledged. 2) All frames in the range from NFE to s have been received.
In this way, the acknowledgments are cumulative. When the acknowledgment is sent, the receiver sets NFE = s + 1 and HFA = s + RWS.
5.1.2 Go Back-N Protocol: Go-Back-N ARQ is a specific instance of the automatic repeat request (ARQ) protocol, in which the sending process continues to send a number of frames specified by a window size even without receiving an acknowledgement (ACK) packet from the receiver. It is a special case of the general sliding window protocol with the transmit window size of N and receive window size of 1. The receiver process keeps track of the sequence number of the next frame it expects to receive, and sends that number with every ACK it sends. The receiver will ignore any frame that does not have the exact sequence number it expects whether that frame is a "past" duplicate of a frame it has already acknowledged [1] or whether that frame is a "future" frame past the last packet it is waiting for. Once the sender has sent all of the frames in its window, it will detect that all of the frames since the first lost frame are outstanding, and will go back to sequence number of the last ACK it received from the receiver process and fill its window starting with that frame and continue the process over again.
14
Sender Window:
Normal Operation:
15
16
-If no error, ACK as usual with next frame expected -Use window to control number of outstanding frames -If error, reply with rejection -Discard that frame and all future frames until error frame received correctly -Transmitter must go back and retransmit that frame and all subsequent frames Damaged Frame:
-Receiver detects error in frame i -Receiver sends rejection-i -Transmitter gets rejection-i -Transmitter retransmits frame i and all subsequent
-Frame i lost -Transmitter sends i+1 -Receiver gets frame i+1 out of sequence -Receiver send reject i -Transmitter goes back to frame i and retransmits
-Frame i lost and no additional frame sent -Receiver gets nothing and returns neither acknowledgement nor rejection -Transmitter times out and sends acknowledgement frame with P bit set to 1 -Receiver interprets this as command which it acknowledges with the number of the next frame it expects (frame i ) -Transmitter then retransmits frame i Damaged Acknowledgement:
-Receiver gets frame i and send acknowledgement (i+1) which is lost -Acknowledgements are cumulative, so next acknowledgement (i+n) may arrive before transmitter times out on frame i -If transmitter times out, it sends acknowledgement with P bit set as before -This can be repeated a number of times before a reset procedure are initiated. 5.1.3 Selective Repeat ARQ:
17
Selective Repeat ARQ / Selective Reject ARQ is a specific instance of the Automatic Repeat-request (ARQ) Protocol. It may be used as a protocol for the delivery and acknowledgement of message units, or it may be used as a protocol for the delivery of subdivided message sub-units. When used as the protocol for the delivery of messages, the sending process continues to send a number of frames specified by a window size even after a frame loss. Unlike Go-Back-N ARQ, the receiving process will continue to accept and acknowledge frames sent after an initial error; this is the general case of the sliding window protocol with both transmit and receive window sizes greater than 1.It does the following:
Sender window
-N consecutive sequence #s -again limits sequence #s of sent, unacknowledged packets Sender Window:
18
19
20
for (each n not equal to M ) Dn = dsn; while (M not equal to all nodes) do Find w not equal toM for which Dw = min{Dj ; j not equal toM}; Add w to M; for each n not equal to M Dn = minw [ Dn, Dw + dwn ]; Update route; End do Features of OSPF: Provides authentication of routing messages. Enables load balancing by allowing traffic to be split evenly across routes with equal cost Type-of-Service routing allows to setup different routes dependent on the TOS field. Supports subletting, multicasting and 2 level hierarchical model. SPF calculation is performed independently for each area. Typically faster convergence than DVRPs and has Relatively low, steady state bandwidth. Uses metricspath cost Typically faster convergence than DVRPs. Support for CIDR, VLSM, authentication, multipath, and IP unnumbered. Relatively low, steady state bandwidth Requirements.
Cost applied on all routers link paths -16-bit positive number 165,535. -The lower the more desirable. Relevant going out an interface only. Route decisions made on total cost of path
-The protocol remains relatively quiet during steady-state conditions. -Periodic refresh of LSAs every 30 minutes Otherwise, updates only sent when there are changes. They share a common protocol header - Routing protocol packets are sent with type of service (TOS) of 0.
21
22
Fig 6.1 GBN Client Side Simulation 6.1.2 Server Side Simulation:
23
24
Fig 6.5 Normal Interface of Selective Repeat ARQ 6.2.2 Sending a File:
26
27
Chapter 7 Limitations
Our project has followings constraints: Less Improved router memory and CPU utilization when compared to dynamic routing algorithms. Non-Intelligent bandwidth control Dynamic protocols take into consideration the available bandwidth when determining the rate at which it will transmit updates. Interfaces can also be configured to use a certain (maximum) percentage of the bandwidth, so that even during routing topology computations, a defined portion of the link capacity remains available for data traffic. Dynamic protocols do not require a hierarchical network design to operate efficiently. These will automatically summarize routes where applicable which is not the case with static protocols like ours. Unlike our static protocols, which only takes bandwidth into consideration when calculating the cost of a route, dynamic protocols can be configured to use bandwidth, delay, reliability, and load when calculating optimum routes. This has proven to be a valuable consideration in a wireless environment. Dynamic protocols have greater control on timing issues, such as hold times and hello intervals, than does OSPF. This allows greater flexibility with wireless connections, where these intervals must be fine-tuned to a particular device or bandwidth. Dynamic protocols are less complex and have less cost (manpower and time) involved in configuration and administration.
28
Chapter 8 Conclusions
The current global Internet based on IP protocol supports only the best effort service, i.e., network resources are contended and fairly shared by all traffic injected into the networks. Data packets of a session may follow different paths to the destination. However, with the success of Internet in recent years, IP networks are also expected to support various services, not only the traditional services (e.g., email, ftp), but also the upcoming high-speed and real-time services (e.g., audio-video real-time transmission, virtual private networks). The latter ones exhibit much different traffic characteristics from the former ones in terms of bit rate and burst, and they require fixed QoS assurances in the duration of transmission. Considering this problem, how to support the QoS requirements is becoming a hot topic in the Internet community. Our project has been able to successfully simulate the routing algorithms and provide the routers enough information in order for them to be able to handle complex network characteristics like congestion control, flow and error control, cost metrics calculation. However this project is still in its infancy and can be used to take useful real time information from routers and provide simulation to router. As time goes on it should be able to provide rich and user interactive information regarding simulation and overall flow of data and information across various nodes.
29
Feasibility and benefit/cost analysis of QoS routing: Link state updates algorithms Route calculation algorithms
Specially, we are interested in examining the determination of the timer value in periodic algorithm and the threshold value in the threshold based algorithm. An integrated software platform should be developed to examine our interests. This platform must contain a suit of components such as state maintenance and distribution, path calculation, resource reservation and so on. Moreover, the platform should provide an easy interface to measure the cost and facilitate our study in other aspects of QoS routing area in future study.
Generality - Multimedia applications tend to have diverse QoS requirements on bandwidth, delay, delay jitter, cost, and so on. From a network designer's point of view, it would be beneficial to develop a generic routing algorithm instead of implementing different routing algorithms for different types of QoS requirements independently. The generic algorithm captures the common messaging and computational structure.
Extensibility - As the network infrastructure evolves and capacity increases, new applications are made possible. It requires the routing algorithms to adapt in order to accommodate new service types. It is important to design extensible algorithms and make them adapt to new applications, because the networks become increasingly complex and the deployment of new routing algorithms is very costly.
Simplicity - The simplicity of a routing algorithm in terms of time/logical complexity often allows efficient implementation, debugging and evaluation. It also makes the algorithm easier to understand, maintain, and upgrade. Scalability QoS based routing should be scalable.
30
2.
3.
4. www.cs.rice.edu/Conferences.
5. www.en.wikipedia.org/wiki/Category:Routing_algorithms
6. www.cs.northwestern.edu
7.
Quality of Service - Delivering QoS on the Internet and in Corporate Networks. P.Ferguson, G. Huston. John Wiley & Sons, 1998.
8.
31