SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 5 (May 2014), PP.82-86
82
Network Congestion Control through VTP Approach
1
Sandeep Choudhary,2
Pragati Karan, 3
Raghava Nallanthighal,
1
Delhi Technological University,Delhi-110042
2
Raj Kumar Goel Engineering College, Ghaziabad-245304
3
Delhi Technological University, Delhi-110042
Abstract:-Network congestion occurs when a link or node carries large data but its quality of service deteriorates.
Typical effects include queuing delay, packet loss or the blocking of new connections. It causes actual reduction in
network throughput. The paper outlines VLAN Trunking Protocol (VTP) approaches to control network
congestion and deliver maximum throughput. This approach helps to control network congestion and transmit
packets from source to destination more effectively. Once implemented on manageable switch to make VTP
server and client to control network congestion in local area network.
Keywords:-VLAN, Bursty Traffic, Delay Sensitive, High Speed Networks, Performance Metrics, Quality of
Service, NVRAM
I. INTRODUCTION
In a local area network, congestion can occur when a switch consumes more bandwidth but less useful
throughput (input) is available. It causes high level of packet delay and also the quality of service (QoS)[1] is
extremely poor. Packets travel internally from node to node and consume bandwidth heavily. Network congestion
[3] will increase as network speed increases and new effective congestion control methods are needed, especially
to handle heavy traffic.It affectsactual reduction in network throughput.
Fig. 1.Congestion occurred due to traffic demand
Typical effects include
1. Queuing delay
2. Packet loss
3. Blocking of new connections.
The data transfer between end systems in packet oriented network such as Internet occurs in shape of
fixed and variable units of packets of limited size. In general packet oriented networks get congested locally
therefore congestion control mechanism usually perform to improve network overall performance and hence it is
achieved by controlling the load produced by the network traffic. Based on the current load condition of the
network, the congestion control [3] is done through sending rate of data streams of each source which not only
used to prevent congestion but also leads to high utilization of the available bandwidth.
Network protocol[4] frequently inform the sending sources about the current load conditions of the network and as
a result the sources store these load conditions in the congestion control variable and these variables are
accordingly used for controlling the congestion which leads to achieve high bandwidth utilization and better
performance. But this approach has serious limitation i.e. additional overhead is required by the congestion
control information that is transferred through the network protocol.
Network Congestion Control through VTP Approach
83
II. OVERVIEW
Network Congestion occurs in local area network due to high traffic demand. It is required to identify the
problem,reason for these problems andthe best solution to solve them.
 Problem: When too many packets are transmitted through a network, congestion occurs at very high
traffic, performance collapses completely, and almost no packets are delivered
 Causes: Bursty nature of traffic is the root cause, when part of the network no longer canhandle a sudden
increase of traffic, congestion builds upon. Other factors, such as lack of bandwidth, ill-configuration and
slow switches can also bring up congestion.The following may cause slow VLANs:
1. Traffic Loop
2. Overloaded or oversubscribed VLAN
3. Congestion on the switch inbound path
4. Switch management processor utilization
5. Ingress errors on a cut through switch
6. Software or Hardware misconfiguration
7. Software Bugs
 Solution: congestion control, and two basic approaches
– Open-loop: try to prevent congestion occurring by good design
– Closed-loop: monitor the system to detect congestion, pass this information to where action can be
taken, and adjust system operation to correct the problem (detect feedback and correct)
Fig. 2 Congestion Control Overview
III. OUR APPROACH
In a local area network (LAN)[2] nodes are connected through different network topologies[5]. It
consists of various devices to connect these node via switches (it can be layer 2 or layer 3) and router. Congestion
in a local area network occur due to internal looping and can be controlled by making a local VTP (VLAN
trunking protocol)[6]server on a manageable switch and VTP clients on its adjoints switches.
VTP Modes:
1. VTP Server
- Advertise the VLAN information across theDomain
- Create, delete, modify
2. VTP Client
- Stores the VLAN information from the server
- Cannot create, delete, modify
3. VTP Transparent
- Forwards VTP advertisements
- Do not participate in VTP
Network Congestion Control through VTP Approach
84
Table IVtp Modes Response
Features Server Client Transparent
Source VTP
Message
Yes Yes No
Listen VTP message Yes Yes No
Create VLAN’s Yes No Yes
Remembers
VLAN’s
Yes No Yes
IV. ALGORITHM
Following steps are implemented on manageable switches (Layer 2 or Layer 3) to control congestion in
local area network:
Step 1.
Configure one switch as a VTP server and another as a VTP client. Domain name for both the switch should be
same as it used to forward VTP advertisements through any configured trunk links.
Configuration of switch (Sw1) as VTP Server :
Hostname Sw1
!
Interfacevlan 1
Ip address 172.30.1.101 255.255.255.0
No shutdown
Vtp mode server
Vtp domain dtu.lan
Vtp password cisco
!
Vlan 2
Name vlan_2
!
Interfacegigabit Ethernet 0/1
Switch port mode trunk
!
Interfacefastethernet 0/1
Switch port access vlan 2
Configuration of switch (Sw2) as VTP Client:
Hostname Sw2
Interfacevlan 1
Ip address 172.30.1.102 255.255.255.0
No shutdown
fig. 3Switch as a VTP Server and another as a Client
Vtp mode client
Vtp domain dtu.lan
Vtp password cisco
Interfacefastethernet 0/2
Switch port access vlan 2
Network Congestion Control through VTP Approach
85
Step 2.
Complete all VTP requirements by configuring trunking between two switches.
Fig. 4.Send VTP message on trunk
VTP Requirements
1) Same domain name
2) Same password (if used on either switch)
3) Messages sent only over operational trunks
Step 3.
Configure VLANs on the VTP server and confirm that the VTP client has learned about the VLANs.
Add VLAN 2 with the vlan 2 command
VTP Revision 0 +1 = 1
VTP Revision Number = 1
New VLAN 2 Learned
Add VlAN 2 with the vlan 2 command
VTP Revision Number 0 + 1 =1
Fig. 4. VTP messages with new VLAN database
Network Congestion Control through VTP Approach
86
V. WORKING
Every catalyst switch is a server by default. Every network or domain requires a server to
propagateVLAN [7] information throughout the network or domain. As a server switch, it will be able to create,
add, and delete VLANs domain.VTP server controls any change that’s to be made in the entire domain. When a
change is made in the server, it will be advertised throughout the entire VTP domain. VTP server configuration is
saved in the NVRAM [8].
Switches in a client mode receive information from VTP servers.VTP client switches also send and
receive updates, but one difference between clients & server is that; VTP client switches can’t create, change and
delete VLANs.In other words, none of the ports on the client switch can be added to a new VLAN without the
authorization or notification from server switch. Switches in client mode can process and forward VLAN
information. VLAN information on client switches is not saved in NVRAM[8].
Switches in transparent mode don’t take part in VTP domain or database. They behave more or less like servers in
that they create, modify and delete VLANs because they have their own database, which is only locally important.
VTP switch in transparent mode is used to forward VTP advertisements through any configured trunk links.
VI. CONCLUSION
Network congestion control based on VTP (VLAN Trunking Protocol) approach, we have outlined in
this paper to control congestion in a local area network which can occur due to internal looping on a device i.e
switches. It can happen by creating a loop on manageable switches, running multiple proxy’s in local area
network or traffic demand is high but little useful throughput is available. We have resolved these type issues
occurring in a local area network through VTP approach.
REFERENCES
[1] E. Brent Kelly " Quality of Service In Internet Protocol (IP) Networks", Wainhouse Research 2002.
[2] David D. Clark, Kenneth T. Pogran and David P. Reed"An Introduction to Local Area Network”
Proceedings of the IEEE, Vol. 66, No. 11, November 1978.
[3] JACOBSON, V. Congestion avoidance and control. In Proceedings of SIGCOMM ’88 (Stanford, CA,
Aug. 1988), ACM.
[4] Anders Berglund. (2002). “How do students understand network protocols” A phenomenographic study.
Technical Report, 2002-006, Department of Information Technology, Uppsala University, Uppsala,
Sweden.
[5] W. Willinger, M. Roughan, “Internet Topology Research Redux”, in H. Haddadi, O. Bonaventure
(Eds.),Recent Advancesin Networking, (2013)
[6] Wikipedia: http://en.wikipedia.org/wiki/VLAN_Trunking_ProtocolZeng Xiyang “Research on VLAN
Technology in L3 Switch” Intelligent Information Technology application 2009, IITA 2009, Third
International Symposium (Vol : 3)
[8] R. Agrawal and H.V Jagadish “Recovery Algorithms for Database Machines with Non Volatile Main
Memory” in Proceedings of the sixth international workshop on Database Machines ,Pages
269-285,1989.

Weitere ähnliche Inhalte

Was ist angesagt?

OpenSDWN: Programmatic control over home and enterprise Wi-Fi
OpenSDWN: Programmatic control over home and enterprise Wi-FiOpenSDWN: Programmatic control over home and enterprise Wi-Fi
OpenSDWN: Programmatic control over home and enterprise Wi-FiJulius Schulz-Zander
 
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...ijcsit
 
Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11daniel ayalew
 
TCP Traffic Control Chapter12
TCP Traffic Control Chapter12TCP Traffic Control Chapter12
TCP Traffic Control Chapter12daniel ayalew
 
Distributed gateway-based load balancing in software defined network
Distributed gateway-based load balancing in software defined networkDistributed gateway-based load balancing in software defined network
Distributed gateway-based load balancing in software defined networkTELKOMNIKA JOURNAL
 
Copy Of Copy Of Gprs
Copy Of Copy Of GprsCopy Of Copy Of Gprs
Copy Of Copy Of Gprsakash
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer NetworkDestro Destro
 
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesTutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesDheryta Jaisinghani
 
Gprs
GprsGprs
Gprsakash
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3Seung-Bum Lee
 
Handover &mobility in 4g5g
Handover &mobility in 4g5gHandover &mobility in 4g5g
Handover &mobility in 4g5gabolfazlzakeri
 
Ec8004 wireless networks unit 1 bluetooth
Ec8004 wireless networks unit 1 bluetoothEc8004 wireless networks unit 1 bluetooth
Ec8004 wireless networks unit 1 bluetoothHemalathaR31
 
Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2HemalathaR31
 
High Speed Networks - Applications in Finance
High Speed Networks - Applications in FinanceHigh Speed Networks - Applications in Finance
High Speed Networks - Applications in FinanceOmar Bashir
 

Was ist angesagt? (20)

OpenSDWN: Programmatic control over home and enterprise Wi-Fi
OpenSDWN: Programmatic control over home and enterprise Wi-FiOpenSDWN: Programmatic control over home and enterprise Wi-Fi
OpenSDWN: Programmatic control over home and enterprise Wi-Fi
 
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
 
Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11
 
TCP Traffic Control Chapter12
TCP Traffic Control Chapter12TCP Traffic Control Chapter12
TCP Traffic Control Chapter12
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Unit 4
Unit 4Unit 4
Unit 4
 
Arrjay
ArrjayArrjay
Arrjay
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Distributed gateway-based load balancing in software defined network
Distributed gateway-based load balancing in software defined networkDistributed gateway-based load balancing in software defined network
Distributed gateway-based load balancing in software defined network
 
Copy Of Copy Of Gprs
Copy Of Copy Of GprsCopy Of Copy Of Gprs
Copy Of Copy Of Gprs
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Transport Layer In Computer Network
Transport Layer In Computer NetworkTransport Layer In Computer Network
Transport Layer In Computer Network
 
Tutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and FramesTutorial on IEEE 802.11 - MAC Protocols and Frames
Tutorial on IEEE 802.11 - MAC Protocols and Frames
 
Gprs
GprsGprs
Gprs
 
High performance browser networking ch1,2,3
High performance browser networking ch1,2,3High performance browser networking ch1,2,3
High performance browser networking ch1,2,3
 
Handover &mobility in 4g5g
Handover &mobility in 4g5gHandover &mobility in 4g5g
Handover &mobility in 4g5g
 
Ec8004 wireless networks unit 1 bluetooth
Ec8004 wireless networks unit 1 bluetoothEc8004 wireless networks unit 1 bluetooth
Ec8004 wireless networks unit 1 bluetooth
 
Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan 2
 
High Speed Networks - Applications in Finance
High Speed Networks - Applications in FinanceHigh Speed Networks - Applications in Finance
High Speed Networks - Applications in Finance
 
Switching
SwitchingSwitching
Switching
 

Andere mochten auch

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

Andere mochten auch (6)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
J1067783
J1067783J1067783
J1067783
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

Ähnlich wie International Journal of Engineering Research and Development

Network monitoringapproaches anoverview
Network monitoringapproaches anoverviewNetwork monitoringapproaches anoverview
Network monitoringapproaches anoverviewIrfaanKhanQasmi
 
Cisco discovery drs ent module 3 - v.4 in english.
Cisco discovery   drs ent module 3 - v.4 in english.Cisco discovery   drs ent module 3 - v.4 in english.
Cisco discovery drs ent module 3 - v.4 in english.igede tirtanata
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking ProtocolNetwax Lab
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss controleSAT Journals
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet losseSAT Publishing House
 
Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelijcses
 
Understanding network and service virtualization
Understanding network and service virtualizationUnderstanding network and service virtualization
Understanding network and service virtualizationSDN Hub
 
Design and Simulation of Secure Network for University Campus
Design and Simulation of Secure Network for University CampusDesign and Simulation of Secure Network for University Campus
Design and Simulation of Secure Network for University Campusijtsrd
 
VLAN (virtual local area network)
VLAN (virtual local area network)VLAN (virtual local area network)
VLAN (virtual local area network)Netwax Lab
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationSymantec
 
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer Dheeraj Giri
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission controlsangusajjan
 
Inter vlan routing plus configuration
Inter vlan routing plus configurationInter vlan routing plus configuration
Inter vlan routing plus configurationMohammedseleim
 
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...IJNSA Journal
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 

Ähnlich wie International Journal of Engineering Research and Development (20)

Network monitoringapproaches anoverview
Network monitoringapproaches anoverviewNetwork monitoringapproaches anoverview
Network monitoringapproaches anoverview
 
Lan Switching[1]
Lan Switching[1]Lan Switching[1]
Lan Switching[1]
 
Cisco discovery drs ent module 3 - v.4 in english.
Cisco discovery   drs ent module 3 - v.4 in english.Cisco discovery   drs ent module 3 - v.4 in english.
Cisco discovery drs ent module 3 - v.4 in english.
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback model
 
Understanding network and service virtualization
Understanding network and service virtualizationUnderstanding network and service virtualization
Understanding network and service virtualization
 
Design and Simulation of Secure Network for University Campus
Design and Simulation of Secure Network for University CampusDesign and Simulation of Secure Network for University Campus
Design and Simulation of Secure Network for University Campus
 
VLAN (virtual local area network)
VLAN (virtual local area network)VLAN (virtual local area network)
VLAN (virtual local area network)
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
 
summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer summer training report on Computer network and Cisco packet tracer
summer training report on Computer network and Cisco packet tracer
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission control
 
Inter vlan routing plus configuration
Inter vlan routing plus configurationInter vlan routing plus configuration
Inter vlan routing plus configuration
 
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
3 2
3 23 2
3 2
 
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)PACE-IT: Configuring Switches (part 2)
PACE-IT: Configuring Switches (part 2)
 

Mehr von IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Mehr von IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 5 (May 2014), PP.82-86 82 Network Congestion Control through VTP Approach 1 Sandeep Choudhary,2 Pragati Karan, 3 Raghava Nallanthighal, 1 Delhi Technological University,Delhi-110042 2 Raj Kumar Goel Engineering College, Ghaziabad-245304 3 Delhi Technological University, Delhi-110042 Abstract:-Network congestion occurs when a link or node carries large data but its quality of service deteriorates. Typical effects include queuing delay, packet loss or the blocking of new connections. It causes actual reduction in network throughput. The paper outlines VLAN Trunking Protocol (VTP) approaches to control network congestion and deliver maximum throughput. This approach helps to control network congestion and transmit packets from source to destination more effectively. Once implemented on manageable switch to make VTP server and client to control network congestion in local area network. Keywords:-VLAN, Bursty Traffic, Delay Sensitive, High Speed Networks, Performance Metrics, Quality of Service, NVRAM I. INTRODUCTION In a local area network, congestion can occur when a switch consumes more bandwidth but less useful throughput (input) is available. It causes high level of packet delay and also the quality of service (QoS)[1] is extremely poor. Packets travel internally from node to node and consume bandwidth heavily. Network congestion [3] will increase as network speed increases and new effective congestion control methods are needed, especially to handle heavy traffic.It affectsactual reduction in network throughput. Fig. 1.Congestion occurred due to traffic demand Typical effects include 1. Queuing delay 2. Packet loss 3. Blocking of new connections. The data transfer between end systems in packet oriented network such as Internet occurs in shape of fixed and variable units of packets of limited size. In general packet oriented networks get congested locally therefore congestion control mechanism usually perform to improve network overall performance and hence it is achieved by controlling the load produced by the network traffic. Based on the current load condition of the network, the congestion control [3] is done through sending rate of data streams of each source which not only used to prevent congestion but also leads to high utilization of the available bandwidth. Network protocol[4] frequently inform the sending sources about the current load conditions of the network and as a result the sources store these load conditions in the congestion control variable and these variables are accordingly used for controlling the congestion which leads to achieve high bandwidth utilization and better performance. But this approach has serious limitation i.e. additional overhead is required by the congestion control information that is transferred through the network protocol.
  • 2. Network Congestion Control through VTP Approach 83 II. OVERVIEW Network Congestion occurs in local area network due to high traffic demand. It is required to identify the problem,reason for these problems andthe best solution to solve them.  Problem: When too many packets are transmitted through a network, congestion occurs at very high traffic, performance collapses completely, and almost no packets are delivered  Causes: Bursty nature of traffic is the root cause, when part of the network no longer canhandle a sudden increase of traffic, congestion builds upon. Other factors, such as lack of bandwidth, ill-configuration and slow switches can also bring up congestion.The following may cause slow VLANs: 1. Traffic Loop 2. Overloaded or oversubscribed VLAN 3. Congestion on the switch inbound path 4. Switch management processor utilization 5. Ingress errors on a cut through switch 6. Software or Hardware misconfiguration 7. Software Bugs  Solution: congestion control, and two basic approaches – Open-loop: try to prevent congestion occurring by good design – Closed-loop: monitor the system to detect congestion, pass this information to where action can be taken, and adjust system operation to correct the problem (detect feedback and correct) Fig. 2 Congestion Control Overview III. OUR APPROACH In a local area network (LAN)[2] nodes are connected through different network topologies[5]. It consists of various devices to connect these node via switches (it can be layer 2 or layer 3) and router. Congestion in a local area network occur due to internal looping and can be controlled by making a local VTP (VLAN trunking protocol)[6]server on a manageable switch and VTP clients on its adjoints switches. VTP Modes: 1. VTP Server - Advertise the VLAN information across theDomain - Create, delete, modify 2. VTP Client - Stores the VLAN information from the server - Cannot create, delete, modify 3. VTP Transparent - Forwards VTP advertisements - Do not participate in VTP
  • 3. Network Congestion Control through VTP Approach 84 Table IVtp Modes Response Features Server Client Transparent Source VTP Message Yes Yes No Listen VTP message Yes Yes No Create VLAN’s Yes No Yes Remembers VLAN’s Yes No Yes IV. ALGORITHM Following steps are implemented on manageable switches (Layer 2 or Layer 3) to control congestion in local area network: Step 1. Configure one switch as a VTP server and another as a VTP client. Domain name for both the switch should be same as it used to forward VTP advertisements through any configured trunk links. Configuration of switch (Sw1) as VTP Server : Hostname Sw1 ! Interfacevlan 1 Ip address 172.30.1.101 255.255.255.0 No shutdown Vtp mode server Vtp domain dtu.lan Vtp password cisco ! Vlan 2 Name vlan_2 ! Interfacegigabit Ethernet 0/1 Switch port mode trunk ! Interfacefastethernet 0/1 Switch port access vlan 2 Configuration of switch (Sw2) as VTP Client: Hostname Sw2 Interfacevlan 1 Ip address 172.30.1.102 255.255.255.0 No shutdown fig. 3Switch as a VTP Server and another as a Client Vtp mode client Vtp domain dtu.lan Vtp password cisco Interfacefastethernet 0/2 Switch port access vlan 2
  • 4. Network Congestion Control through VTP Approach 85 Step 2. Complete all VTP requirements by configuring trunking between two switches. Fig. 4.Send VTP message on trunk VTP Requirements 1) Same domain name 2) Same password (if used on either switch) 3) Messages sent only over operational trunks Step 3. Configure VLANs on the VTP server and confirm that the VTP client has learned about the VLANs. Add VLAN 2 with the vlan 2 command VTP Revision 0 +1 = 1 VTP Revision Number = 1 New VLAN 2 Learned Add VlAN 2 with the vlan 2 command VTP Revision Number 0 + 1 =1 Fig. 4. VTP messages with new VLAN database
  • 5. Network Congestion Control through VTP Approach 86 V. WORKING Every catalyst switch is a server by default. Every network or domain requires a server to propagateVLAN [7] information throughout the network or domain. As a server switch, it will be able to create, add, and delete VLANs domain.VTP server controls any change that’s to be made in the entire domain. When a change is made in the server, it will be advertised throughout the entire VTP domain. VTP server configuration is saved in the NVRAM [8]. Switches in a client mode receive information from VTP servers.VTP client switches also send and receive updates, but one difference between clients & server is that; VTP client switches can’t create, change and delete VLANs.In other words, none of the ports on the client switch can be added to a new VLAN without the authorization or notification from server switch. Switches in client mode can process and forward VLAN information. VLAN information on client switches is not saved in NVRAM[8]. Switches in transparent mode don’t take part in VTP domain or database. They behave more or less like servers in that they create, modify and delete VLANs because they have their own database, which is only locally important. VTP switch in transparent mode is used to forward VTP advertisements through any configured trunk links. VI. CONCLUSION Network congestion control based on VTP (VLAN Trunking Protocol) approach, we have outlined in this paper to control congestion in a local area network which can occur due to internal looping on a device i.e switches. It can happen by creating a loop on manageable switches, running multiple proxy’s in local area network or traffic demand is high but little useful throughput is available. We have resolved these type issues occurring in a local area network through VTP approach. REFERENCES [1] E. Brent Kelly " Quality of Service In Internet Protocol (IP) Networks", Wainhouse Research 2002. [2] David D. Clark, Kenneth T. Pogran and David P. Reed"An Introduction to Local Area Network” Proceedings of the IEEE, Vol. 66, No. 11, November 1978. [3] JACOBSON, V. Congestion avoidance and control. In Proceedings of SIGCOMM ’88 (Stanford, CA, Aug. 1988), ACM. [4] Anders Berglund. (2002). “How do students understand network protocols” A phenomenographic study. Technical Report, 2002-006, Department of Information Technology, Uppsala University, Uppsala, Sweden. [5] W. Willinger, M. Roughan, “Internet Topology Research Redux”, in H. Haddadi, O. Bonaventure (Eds.),Recent Advancesin Networking, (2013) [6] Wikipedia: http://en.wikipedia.org/wiki/VLAN_Trunking_ProtocolZeng Xiyang “Research on VLAN Technology in L3 Switch” Intelligent Information Technology application 2009, IITA 2009, Third International Symposium (Vol : 3) [8] R. Agrawal and H.V Jagadish “Recovery Algorithms for Database Machines with Non Volatile Main Memory” in Proceedings of the sixth international workshop on Database Machines ,Pages 269-285,1989.