Download
custom network protocol on modified ring topology n.
Skip this Video
Loading SlideShow in 5 Seconds..
Custom Network Protocol on Modified Ring Topology PowerPoint Presentation
Download Presentation
Custom Network Protocol on Modified Ring Topology

Custom Network Protocol on Modified Ring Topology

104 Vues Download Presentation
Télécharger la présentation

Custom Network Protocol on Modified Ring Topology

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Custom Network Protocol on Modified Ring Topology Team: Radical Leader: Dallas Edwards Members:Sam Sieg Sani Musayev Changyong Jung

  2. Introduction • Modified ring topology • Linux based chat system • Rewrite/Build Custom OSI-Model • Network Monitoring tools • File transfer system

  3. Motivation • CUSTOM RING TOPOLOGY: -Five machines in a ring topology -Every node can act as a bridge/router or carry out its own functions as a single entity. • OSI Model: -Modulization -Standard implementation model

  4. Custom Ring Topology C1: 4 NICs, 4 connections, a gateway to other subnets B1, A1, A2, B2: 2 NICs, 2 connections

  5. Limitations • Not scalable beyond 25 hosts • Linux based system only • No encryption in Presentation layer

  6. Method • Connection to Physical Medium: - Discovery System (Remote-Hosts) • Network Stack: - Discovery of hardware on a local host • Routing algorithms - Vector distance routing algorithms - Packet forwarding • Flow Control - Throttling - Drop rate analysis • Dataflow multiplexing: - Pipelining dataflow into Programs - Management of multiple Program data flows

  7. Results • Ability to send/receive Ethernet packets • Communication among all layers • Working chat application • File transfer capability • Each layer is autonomous and independent

  8. Conclusion • Whole OSI network model is successfully re-built as our own • Each layer works independently and can communicate properly • The Chat application is working in our network stack environment • Above our own network model, the ring topology is successfully constructed. • For the future, advanced network stack might be needed to support multi-platform environment

  9. References [1] Douglas E. Comer, Internetworking with TCP/IP, pp 95 – 173, 2000. Prentice Hall [2] RFC2003: IP Encapsulation within IP, http://portal.acm.org/citation.cfm?id=RFC2003 [3] Richard Stevens, Unix Network Programming, pp 85 – 110, pp 655 – 70, pp 703 – 726, 1998. Prentice Hall [4] Kay A. Robbins & Steven Robbins, Practical UNIX Programming, pp333 – 400, 1996. Prentice Hall. [5] Andreas Schaufler, RAW Ethernet vs. UDP, http://www.landshut.org/bnla01/members/Faustus/fh/linux/udp_vs_raw/index.html [6] Chae Y. Lee & Seok J. Koh, A design of minimum cost ring-chain network with dual-homing survivability: A tabu search approach, Computers & Operations Research, Volume 24, Issue 9, September 1997, pp 883-897 [7] Brian "Beej" Hall, Beej's Guide to Unix Interprocess Communication, http://beej.us/guide/ipc/ [8] Pradeep Padala, NCURSES Programming HOWTO, http://tldp.org/HOWTO/NCURSES-Programming-HOWTO/

  10. Experiments…