Custom Network Protocol on Modified Ring Topology Team: Radical Leader: Dallas Edwards Members: Sam Sieg Sani Musayev Changyong Jung

Embed Size (px)

DESCRIPTION

Motivation CUSTOM RING TOPOLOGY: -Five machines in a ring topology -Every node can act as a bridge/router or carry out its own functions as a single entity. OSI Model: -Modulization -Standard implementation model

Citation preview

Custom Network Protocol on Modified Ring Topology Team: Radical Leader: Dallas Edwards Members: Sam Sieg Sani Musayev Changyong Jung Introduction Modified ring topology Linux based chat system Rewrite/Build Custom OSI-Model Network Monitoring tools File transfer system Motivation CUSTOM RING TOPOLOGY: -Five machines in a ring topology -Every node can act as a bridge/router or carry out its own functions as a single entity. OSI Model: -Modulization -Standard implementation model Custom Ring Topology C1: 4 NICs, 4 connections, a gateway to other subnets B1, A1, A2, B2: 2 NICs, 2 connections Limitations Not scalable beyond 25 hosts Linux based system only No encryption in Presentation layer Method Connection to Physical Medium: - Discovery System (Remote-Hosts) Network Stack: - Discovery of hardware on a local host Routing algorithms - Vector distance routing algorithms - Packet forwarding Flow Control - Throttling - Drop rate analysis Dataflow multiplexing: - Pipelining dataflow into Programs - Management of multiple Program data flows Results Ability to send/receive Ethernet packets Communication among all layers Working chat application File transfer capability Each layer is autonomous and independent Conclusion Whole OSI network model is successfully re-built as our own Each layer works independently and can communi cate properly The Chat application is working in our network st ack environment Above our own network model, the ring topology is successfully constructed. For the future, advanced network stack might be needed to support multi-platform enviro nment References [1] Douglas E. Comer, Internetworking with TCP/IP, pp 95 173, Pre ntice Hall [2] RFC2003: IP Encapsulation within IP,[3] Richard Stevens, Unix Network Programming, pp 85 110, pp 655 70, pp 703 726, Prentice Hall [4] Kay A. Robbins & Steven Robbins, Practical UNIX Programming, pp333 400, Prentice Hall. [5] Andreas Schaufler, RAW Ethernet vs. UDP,dex.html [6] Chae Y. Lee & Seok J. Koh, A design of minimum cost ring-chain networ k with dual-homing survivability: A tabu search approach, Computers & Operations Research, Volume 24, Issue 9, September 1997, pp [7] Brian "Beej" Hall, Beej's Guide to Unix Interprocess Communication,[8] Pradeep Padala, NCURSES Programming HOWTO, Experiments