{"title":"数据流中带宽的有效分配与拥塞避免","authors":"Y.N. Prajapati, Pranob Adhikari","doi":"10.1109/ICFIRTP56122.2022.10059436","DOIUrl":null,"url":null,"abstract":"Today’s internet sender-to-receiver congestion control is crucial for scalability and robustness, but it’s important to note that the end-to-end algorithms are plagued by two distinct types of issues. The first is the potential for congestion collapse, and the second is the inequitable distribution of bandwidth among various applications. We propose and study a novel congestion avoidance technique called Network Border Patrol The feedback exchange between the routers that are located at the beginning and conclusion of the data exchange is this situation’s primary functionality. Here, the starting point router’s buffer scheme is also being used effectively. Simulated data is used to study effective bandwidth allocation and congestion avoidance during data flow. The effective transfer of preventing them from loss and discarding will be made possible by this method. By exchanging feedback with edge routers, it will monitor the packet flow rate.","PeriodicalId":413065,"journal":{"name":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Efficient Allocation of Bandwidth & Congestion Avoidance during Data Flow\",\"authors\":\"Y.N. Prajapati, Pranob Adhikari\",\"doi\":\"10.1109/ICFIRTP56122.2022.10059436\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today’s internet sender-to-receiver congestion control is crucial for scalability and robustness, but it’s important to note that the end-to-end algorithms are plagued by two distinct types of issues. The first is the potential for congestion collapse, and the second is the inequitable distribution of bandwidth among various applications. We propose and study a novel congestion avoidance technique called Network Border Patrol The feedback exchange between the routers that are located at the beginning and conclusion of the data exchange is this situation’s primary functionality. Here, the starting point router’s buffer scheme is also being used effectively. Simulated data is used to study effective bandwidth allocation and congestion avoidance during data flow. The effective transfer of preventing them from loss and discarding will be made possible by this method. By exchanging feedback with edge routers, it will monitor the packet flow rate.\",\"PeriodicalId\":413065,\"journal\":{\"name\":\"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICFIRTP56122.2022.10059436\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFIRTP56122.2022.10059436","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Efficient Allocation of Bandwidth & Congestion Avoidance during Data Flow
Today’s internet sender-to-receiver congestion control is crucial for scalability and robustness, but it’s important to note that the end-to-end algorithms are plagued by two distinct types of issues. The first is the potential for congestion collapse, and the second is the inequitable distribution of bandwidth among various applications. We propose and study a novel congestion avoidance technique called Network Border Patrol The feedback exchange between the routers that are located at the beginning and conclusion of the data exchange is this situation’s primary functionality. Here, the starting point router’s buffer scheme is also being used effectively. Simulated data is used to study effective bandwidth allocation and congestion avoidance during data flow. The effective transfer of preventing them from loss and discarding will be made possible by this method. By exchanging feedback with edge routers, it will monitor the packet flow rate.