Upload
javan
View
34
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Custom Network Protocol on Modified Ring Topology. Team: Radical Leader: Dallas Edwards Members: Sam Sieg Sani Musayev Changyong Jung. Introduction. Modified ring topology Linux based chat system Rewrite/Build Custom OSI-Model Network Monitoring tools - PowerPoint PPT Presentation
Citation preview
Custom Network Protocol on Modified Ring Topology
Team: Radical
Leader: Dallas Edwards Members: Sam Sieg
Sani Musayev Changyong Jung
Introduction
• Modified ring topology
• Linux based chat system
• Rewrite/Build Custom OSI-Model
• Network Monitoring tools
• File transfer system
Motivation
• CUSTOM RING TOPOLOGY:-Five machines in a ring topology-Every node can act as a
bridge/router or carry out its own functions as a single entity.
• OSI Model:-Modulization-Standard implementation model
Custom Ring Topology
C1: 4 NICs, 4 connections, a gateway to other subnets
B1, A1, A2, B2: 2 NICs, 2 connections
Limitations
• Not scalable beyond 25 hosts• Linux based system only• No encryption in Presentation
layer
Method• Connection to Physical Medium:
- Discovery System (Remote-Hosts)
• Network Stack:- Discovery of hardware on a local host
• Routing algorithms- Vector distance routing algorithms- Packet forwarding
• Flow Control- Throttling- Drop rate analysis
• Dataflow multiplexing: - Pipelining dataflow into Programs- Management of multiple Program data flows
Results
• Ability to send/receive Ethernet packets• Communication among all layers• Working chat application• File transfer capability• Each layer is autonomous and
independent
Conclusion
• Whole OSI network model is successfully re-built as our own
• Each layer works independently and can communicate properly
• The Chat application is working in our network stack environment
• Above our own network model, the ring topology is successfully constructed.
• For the future, advanced network stack might be needed to support multi-platform environment
References[1] Douglas E. Comer, Internetworking with TCP/IP, pp 95 – 173, 2000.
Prentice Hall[2] RFC2003: IP Encapsulation within IP, http://portal.acm.org/citation.cfm?id=RFC2003[3] Richard Stevens, Unix Network Programming, pp 85 – 110, pp 655 –
70, pp 703 – 726, 1998. Prentice Hall[4] Kay A. Robbins & Steven Robbins, Practical UNIX Programming,
pp333 – 400, 1996. Prentice Hall. [5] Andreas Schaufler, RAW Ethernet vs. UDP,
http://www.landshut.org/bnla01/members/Faustus/fh/linux/udp_vs_raw/index.html
[6] Chae Y. Lee & Seok J. Koh, A design of minimum cost ring-chain network with dual-homing survivability: A tabu search approach, Computers & Operations Research, Volume 24, Issue 9, September 1997, pp 883-897
[7] Brian "Beej" Hall, Beej's Guide to Unix Interprocess Communication,http://beej.us/guide/ipc/
[8] Pradeep Padala, NCURSES Programming HOWTO,http://tldp.org/HOWTO/NCURSES-Programming-HOWTO/
Experiments…