SlideShare a Scribd company logo
1 of 34
Group Member Roll Number 
Melvin Francis 13 
Madhusudhan G 17 
Kunal Jadhav 19 
Sameer Natekar 33 
Sooryakanth S 49
AGENDA 
 Learning… 
 Congestion 
 Network performance 
 Controlling… 
 Congestion 
 TCP controlling congestion 
 Additive-increase, multiplicative-decrease 
 Slow start. 
2
Congestion 
Definition: Congestion in a network may 
occur if load on the network or the no of 
packets sent to the network is greater than 
the capacity of the network 
Many possible causes 
 Rapid retransmissions of packets still in flight 
 Undelivered packets 
3
Congestion is Unavoidable 
 Two packets arrive at the same time 
 The node can only transmit one 
 … and either buffer or drop the other 
 Congestion in network happens because routers have input 
and output queues 
 If many packets arrive in a short period of time 
 The node cannot keep up with the arriving traffic 
 … and the buffer may eventually overflow 
4
 The packet is put at the end of input queue 
 The router removes the router from input queue and 
uses its routing table and destination address to find the 
route. 
 The packet is put in the appropriate output queue.
Issues 
 If the rate of arrival is higher than processing rate then 
the input queue becomes longer 
 If packet departure rate is less than processing rate 
then output queue becomes longer
Network Performance 
 Delay Versus Load 
 when the load is much less then delay is at minimum. 
 Delay becomes infinite when the load is greater than the 
network capacity. 
 when a packet is delayed, the source, not receiving the 
acknowledgment retransmit the packet which makes the 
delay and congestion, worse.
Network Performance 
 Throughput Versus Load 
 Throughput in a network is the number of packets 
passing through a network in a unit of time. 
 When the load exceeds capacity of network,throughput 
declines sharply because packets get discarded by router. 
 This does not reduce no of packets because source 
retransmit them.
Network Performance
Congestion Control 
 Congestion control refers to techniques and mechanisms that can 
either prevent congestion, before it happens, or remove congestion, 
after it has happened. 
 Categories :
Open loop Policies 
 In open-loop congestion, policies are applied to prevent 
congestion before it happens. 
 Congestion control is handled by either the source or the 
destination 
Retransmission Policy : 
 If the sent packet is lost or corrupted, the packed needs to 
be retransmitted by the sender. 
 Retransmission policy and retransmission timers must be 
designed to optimize efficiency and at the same time 
prevent congestion. 
 E.g.. Policy used by TCP for Retransmission
Window Policy : 
 Selective Repeat window is used instead of Go-Back-N 
window. 
Acknowledgment Policy : 
 The receiver does not acknowledges every packet it 
receives, it slows the sender and help prevent congestion. 
 Sending fewer acknowledgements means imposing less 
load on the network.
Discarding Policy : 
 A good discarding policy by the router may prevent 
congestion and at the same time may not harm the 
integrity of the transmission. 
Admission Policy : 
 It is a QoS mechanism which prevents congestion in 
virtual-circuit networks. 
 A router can deny establishing a virtual-circuit connection 
if there is congestion in the network or if there is a 
possibility of future congestion.
Discarding Policy : 
 A good discarding policy by the router may prevent 
congestion and at the same time may not harm the 
integrity of the transmission. 
Admission Policy : 
 It is a QoS mechanism which prevents congestion in 
virtual-circuit networks. 
 A router can deny establishing a virtual-circuit connection 
if there is congestion in the network or if there is a 
possibility of future congestion.
Closed- loop congestion control 
Closed loop congestion control mechanisms try to 
alleviate congestion after it happens. 
It is useful to network which had congestion during 
the transfer of messages from one node to other node.
Types of mechanism to prevent congestion after 
it happens 
1 Backpressure. 
2 Choke Packet. 
3 Implicit Signaling. 
4 Explicit Signaling. 
5 Backward Signaling. 
6 Forward Signaling.
Backpressure 
The technique of backpressure refers to a congestion 
control mechanisms in which a congested node stops 
receiving data from the immediate upstream node or 
nodes. 
This may cause the upstream nodes to become 
congested and they in turn reject data from their 
upstream nodes.
Backpressure 
Backpressure Backpressure 
I II III IV 
Congestion 
Source Destination 
Data Flow 
Fig 1.1 Backpressure method of alleviating congestion
Choke Packet 
A choke packet is a packet sent by a node to the source 
to inform it of that congestion had occurred on the 
network. 
Message is sent from congested node directly to the 
source station without informing the intermediate 
routers
Choke 
packet 
I II III IV 
Congestion 
Source Destination 
Data Flow 
Fig 1.2 Choke Packet
Implicit Signaling 
In implicit signaling ,there is no communication 
between the congested node or nodes and the source. 
The source guesses that there is a congestion somewhere 
in the network. 
For example, when a source sends several packets and 
there is no acknowledgement for a while, one 
assumption is that the network is congested
Explicit signaling 
The node that experiences congestion can explicitly send 
a signal to the source or destination . 
Difference between choke packet and explicit signaling 
is that in choke packet separate packet is used for the 
sending signal to source, whereas in explicit signaling 
method ,signal is included in the packets that carry data.
Backward Signaling 
A bit can be set in a packet moving in the direction 
opposite to the congestion . 
This bit can warn the source that there is congestion and 
that it needs to slow down to avoid the discarding of 
packets.
Forward Signaling 
A bit can be set in a packet moving in the direction of 
the congestion . 
This bit can warn the destination that there is 
congestion. 
The receiver in this case can use policies ,such as 
slowing down the acknowledgments ,to alleviate the 
congestion.
TCP Controlling Congestion 
 Congestion Window 
 Sender’s window size is determined not only by the 
receiver but also by congestion in the network. 
 Actual window size = minimum(rwnd, cwnd) 
 Congestion Policy 
 Slow start: Exponential Increase 
 Congestion Avoidance: Additive Increase 
 Congestion Detection: Multiplicative Decrease
TCP Controlling Congestion 
 Slow start: Exponential Increase 
 Size of the congestion window starts with one maximum 
segment size (MSS). 
 The size of window increases one MSS each time an ack is 
received. 
 Consider cwnd=1 MSS. Sender can only send one segment. 
After ack for 1 segment, cwnd size is increased by 1, now cwnd 
is 2 and two more segment can be sent. 
 When all seven segments are acknowledged, cwnd = 8. 
Size of cwnd increases exponentially.
TCP Controlling Congestion
TCP Controlling Congestion 
 Congestion Avoidance: Additive Increase 
 To avoid congestion, exponential growth must be stopped. 
 This algorithm undergoes an additive increase instead of an 
exponential one. 
 When the size of cwnd reaches slow-start threshold, slow-start 
phase stops and additive phase begins. 
 In this, when whole window of segment is acknowledged, the 
size of cwnd is increased by 1.
TCP controlling congestion
TCP Controlling Congestion 
 Congestion Detection: Multiplicative Decrease 
 The only way the sender can guess that congestion has 
occurred is by the need to re-transmit the segment. 
 It can occur in two cases: when timer times out or when 
three ACK’s are received, in both cases the size of the 
threshold is dropped to half.
TCP Controlling Congestion 
 If time-out occurs 
 Stronger possibility of congestion. 
 TCP set value of threshold to half of current window 
size. 
 Sets cwnd to the size of one segment 
 It starts the slow-start phase again 
 If three ACK’s are received 
 Weaker possibility of congestion. 
 TCP set value of threshold to half of current window 
size. 
 Sets cwnd to the vale of Threshold. 
 It starts the congestion avoidance phase.
Cases of congestion
Congestion control
Congestion control

More Related Content

What's hot

Transport layer services
Transport layer servicesTransport layer services
Transport layer servicesMelvin Cabatuan
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And CorrectionRenu Kewalramani
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer networkDisi Dc
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols BE Smârt
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)Ramola Dhande
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingVimal Dewangan
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 

What's hot (20)

Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...
Transport layer protocols : Simple Protocol , Stop and Wait Protocol , Go-Bac...
 
Flow Control
Flow ControlFlow Control
Flow Control
 
Datalinklayer tanenbaum
Datalinklayer tanenbaumDatalinklayer tanenbaum
Datalinklayer tanenbaum
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
User datagram protocol (udp)
User datagram protocol (udp)User datagram protocol (udp)
User datagram protocol (udp)
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 

Similar to Congestion control

Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3Hossam El-Deen Osama
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfoptokunal1
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion AvoidanceRam Dutt Shukla
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
 
congestion control data communication.pdf
congestion control data communication.pdfcongestion control data communication.pdf
congestion control data communication.pdfnqck82120b
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit   Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit rajisri2
 
Internet congestion
Internet congestionInternet congestion
Internet congestionVikas Gupta
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptxFALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptxuseonlyfortech140
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptxFALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptxuseonlyfortech140
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptxNaveen Dubey
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...ijcseit
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...ijcseit
 
Congestion control
Congestion controlCongestion control
Congestion controlnandhulaks
 
Congestion control
Congestion control Congestion control
Congestion control arkaarka3
 

Similar to Congestion control (20)

Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 
congestion control data communication.pdf
congestion control data communication.pdfcongestion control data communication.pdf
congestion control data communication.pdf
 
CONGESTION AVOIDANCE.pptx
CONGESTION AVOIDANCE.pptxCONGESTION AVOIDANCE.pptx
CONGESTION AVOIDANCE.pptx
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit   Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit
 
Tieu luan qo s
Tieu luan qo sTieu luan qo s
Tieu luan qo s
 
Internet congestion
Internet congestionInternet congestion
Internet congestion
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptxFALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptxFALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion control
Congestion control Congestion control
Congestion control
 

Recently uploaded

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Congestion control

  • 1. Group Member Roll Number Melvin Francis 13 Madhusudhan G 17 Kunal Jadhav 19 Sameer Natekar 33 Sooryakanth S 49
  • 2. AGENDA  Learning…  Congestion  Network performance  Controlling…  Congestion  TCP controlling congestion  Additive-increase, multiplicative-decrease  Slow start. 2
  • 3. Congestion Definition: Congestion in a network may occur if load on the network or the no of packets sent to the network is greater than the capacity of the network Many possible causes  Rapid retransmissions of packets still in flight  Undelivered packets 3
  • 4. Congestion is Unavoidable  Two packets arrive at the same time  The node can only transmit one  … and either buffer or drop the other  Congestion in network happens because routers have input and output queues  If many packets arrive in a short period of time  The node cannot keep up with the arriving traffic  … and the buffer may eventually overflow 4
  • 5.  The packet is put at the end of input queue  The router removes the router from input queue and uses its routing table and destination address to find the route.  The packet is put in the appropriate output queue.
  • 6. Issues  If the rate of arrival is higher than processing rate then the input queue becomes longer  If packet departure rate is less than processing rate then output queue becomes longer
  • 7. Network Performance  Delay Versus Load  when the load is much less then delay is at minimum.  Delay becomes infinite when the load is greater than the network capacity.  when a packet is delayed, the source, not receiving the acknowledgment retransmit the packet which makes the delay and congestion, worse.
  • 8. Network Performance  Throughput Versus Load  Throughput in a network is the number of packets passing through a network in a unit of time.  When the load exceeds capacity of network,throughput declines sharply because packets get discarded by router.  This does not reduce no of packets because source retransmit them.
  • 10. Congestion Control  Congestion control refers to techniques and mechanisms that can either prevent congestion, before it happens, or remove congestion, after it has happened.  Categories :
  • 11. Open loop Policies  In open-loop congestion, policies are applied to prevent congestion before it happens.  Congestion control is handled by either the source or the destination Retransmission Policy :  If the sent packet is lost or corrupted, the packed needs to be retransmitted by the sender.  Retransmission policy and retransmission timers must be designed to optimize efficiency and at the same time prevent congestion.  E.g.. Policy used by TCP for Retransmission
  • 12. Window Policy :  Selective Repeat window is used instead of Go-Back-N window. Acknowledgment Policy :  The receiver does not acknowledges every packet it receives, it slows the sender and help prevent congestion.  Sending fewer acknowledgements means imposing less load on the network.
  • 13. Discarding Policy :  A good discarding policy by the router may prevent congestion and at the same time may not harm the integrity of the transmission. Admission Policy :  It is a QoS mechanism which prevents congestion in virtual-circuit networks.  A router can deny establishing a virtual-circuit connection if there is congestion in the network or if there is a possibility of future congestion.
  • 14. Discarding Policy :  A good discarding policy by the router may prevent congestion and at the same time may not harm the integrity of the transmission. Admission Policy :  It is a QoS mechanism which prevents congestion in virtual-circuit networks.  A router can deny establishing a virtual-circuit connection if there is congestion in the network or if there is a possibility of future congestion.
  • 15. Closed- loop congestion control Closed loop congestion control mechanisms try to alleviate congestion after it happens. It is useful to network which had congestion during the transfer of messages from one node to other node.
  • 16. Types of mechanism to prevent congestion after it happens 1 Backpressure. 2 Choke Packet. 3 Implicit Signaling. 4 Explicit Signaling. 5 Backward Signaling. 6 Forward Signaling.
  • 17. Backpressure The technique of backpressure refers to a congestion control mechanisms in which a congested node stops receiving data from the immediate upstream node or nodes. This may cause the upstream nodes to become congested and they in turn reject data from their upstream nodes.
  • 18. Backpressure Backpressure Backpressure I II III IV Congestion Source Destination Data Flow Fig 1.1 Backpressure method of alleviating congestion
  • 19. Choke Packet A choke packet is a packet sent by a node to the source to inform it of that congestion had occurred on the network. Message is sent from congested node directly to the source station without informing the intermediate routers
  • 20. Choke packet I II III IV Congestion Source Destination Data Flow Fig 1.2 Choke Packet
  • 21. Implicit Signaling In implicit signaling ,there is no communication between the congested node or nodes and the source. The source guesses that there is a congestion somewhere in the network. For example, when a source sends several packets and there is no acknowledgement for a while, one assumption is that the network is congested
  • 22. Explicit signaling The node that experiences congestion can explicitly send a signal to the source or destination . Difference between choke packet and explicit signaling is that in choke packet separate packet is used for the sending signal to source, whereas in explicit signaling method ,signal is included in the packets that carry data.
  • 23. Backward Signaling A bit can be set in a packet moving in the direction opposite to the congestion . This bit can warn the source that there is congestion and that it needs to slow down to avoid the discarding of packets.
  • 24. Forward Signaling A bit can be set in a packet moving in the direction of the congestion . This bit can warn the destination that there is congestion. The receiver in this case can use policies ,such as slowing down the acknowledgments ,to alleviate the congestion.
  • 25. TCP Controlling Congestion  Congestion Window  Sender’s window size is determined not only by the receiver but also by congestion in the network.  Actual window size = minimum(rwnd, cwnd)  Congestion Policy  Slow start: Exponential Increase  Congestion Avoidance: Additive Increase  Congestion Detection: Multiplicative Decrease
  • 26. TCP Controlling Congestion  Slow start: Exponential Increase  Size of the congestion window starts with one maximum segment size (MSS).  The size of window increases one MSS each time an ack is received.  Consider cwnd=1 MSS. Sender can only send one segment. After ack for 1 segment, cwnd size is increased by 1, now cwnd is 2 and two more segment can be sent.  When all seven segments are acknowledged, cwnd = 8. Size of cwnd increases exponentially.
  • 28. TCP Controlling Congestion  Congestion Avoidance: Additive Increase  To avoid congestion, exponential growth must be stopped.  This algorithm undergoes an additive increase instead of an exponential one.  When the size of cwnd reaches slow-start threshold, slow-start phase stops and additive phase begins.  In this, when whole window of segment is acknowledged, the size of cwnd is increased by 1.
  • 30. TCP Controlling Congestion  Congestion Detection: Multiplicative Decrease  The only way the sender can guess that congestion has occurred is by the need to re-transmit the segment.  It can occur in two cases: when timer times out or when three ACK’s are received, in both cases the size of the threshold is dropped to half.
  • 31. TCP Controlling Congestion  If time-out occurs  Stronger possibility of congestion.  TCP set value of threshold to half of current window size.  Sets cwnd to the size of one segment  It starts the slow-start phase again  If three ACK’s are received  Weaker possibility of congestion.  TCP set value of threshold to half of current window size.  Sets cwnd to the vale of Threshold.  It starts the congestion avoidance phase.