SlideShare a Scribd company logo
1 of 3
Download to read offline
NetWork Design Question
2.) How does TCP prevent Congestion? Dicuss the information identifying congestion in the
network as well as the mechanism for reducing congestion?
Solution
Congestion is a problem that occurs on shared networks when multiple users contend for access
to the same resources (bandwidth, buffers, and queues).
Transmission Control Protocol (TCP) uses a network congestion-avoidance algorithm that
includes various aspects of an additive increase/multiplicative decrease (AIMD) scheme, with
other schemes such as slow-start to achieve congestion avoidance.
The TCP congestion-avoidance algorithm is the primary basis for congestion control in the
Internet.
Congestion typically occurs where multiple links feed into a single link, such as where internal
LANs are connected to WAN links. Congestion also occurs at routers in core networks where
nodes are subjected to more traffic than they are designed to handle.
TCP/IP networks such as the Internet are especially susceptible to congestion because of their
basic connection- less nature. There are no virtual circuits with guaranteed bandwidth. Packets
are injected by any host at any time, and those packets are variable in size, which make
predicting traffic patterns and providing guaranteed service impossible. While connectionless
networks have advantages, quality of service is not one of them.
Shared LANs such as Ethernet have their own congestion control mechanisms in the form of
access controls that prevent multiple nodes from transmitting at the same time.
Identifying:
Congestion is primarily reflected by a conventional user feeling-- slowness. This statement
reflects the change in the network effective flow, that is the time required to transmit an entire
data from one point to another. The effective flow doenot exist as such, it consists in reality of
three seperate indicators:
*Latency:the effective flow is inversely proportional to the latency.
*Jitter:it is latency variation over time, impacts by influencing the flow latency
*Loss Rate:the theoritical bandwidth is inversely proportional to the square root of the loss rate
These Congestion symtoms allow us to rely on objective indicators to characterize it.
Mechanism to reduce congestion:
The standard fare in TCP implementations today has four standard congestion control algorithms
that are now in common use. Their usefulness has passed the test of time.
The four algorithms, Slow Start, Congestion Avoidance, Fast Retransmit and Fast Recovery are
described below. (a) Slow Start
Slow Start, a requirement for TCP software implementations is a mechanism used by the sender
to control the transmission rate, otherwise known as sender-based flow control. This is
accomplished through the return rate of acknowledgements from the receiver. In other words, the
rate of acknowledgements returned by the receiver determine the rate at which the sender can
transmit data. When a TCP connection first begins, the Slow Start algorithm initializes a
congestion window to one segment, which is the maximum segment size (MSS) initialized by
the receiver during the connection establishment phase. When acknowledgements are returned
by the receiver, the congestion window increases by one segment for each acknowledgement
returned. Thus, the sender can transmit the minimum of the congestion window and the
advertised window of the receiver, which is simply called the transmission window. Slow Start is
actually not very slow when the network is not congested and network response time is good.
For example, the first successful transmission and acknowledgement of a TCP segment increases
the window to two segments. After successful transmission of these two segments and
acknowledgements completes, the window is increased to four segments. Then eight segments,
then sixteen segments and so on, doubling from there on out up to the maximum window size
advertised by the receiver or until congestion finally does occur. At some point the congestion
window may become too large for the network or network conditions may change such that
packets may be dropped. Packets lost will trigger a timeout at the sender. When this happens, the
sender goes into congestion avoidance mode as described in the next section.
(b) Congestion Avoidance
During the initial data transfer phase of a TCP connection the Slow Start algorithm is used.
However, there may be a point during Slow Start that the network is forced to drop one or more
packets due to overload or congestion. If this happens, Congestion Avoidance is used to slow the
transmission rate. However, Slow Start is used in conjunction with Congestion Avoidance as the
means to get the data transfer going again so it doesn’t slow down and stay slow. In the
Congestion Avoidance algorithm a retransmission timer expiring or the reception of duplicate
ACKs can implicitly signal the sender that a network congestion situation is occurring. The
sender immediately sets its transmission window to one half of the current window size (the
minimum of the congestion window and the receiver’s advertised window size), but to at least
two segments. If congestion was indicated by a timeout, the congestion window is reset to one
segment, which automatically puts the sender into Slow Start mode. If congestion was indicated
by duplicate ACKs, the Fast Retransmit and Fast Recovery algorithms are invoked . As data is
received during Congestion Avoidance, the congestion window is increased. However, Slow
Start is only used up to the halfway point where congestion originally occurred. This halfway
point was recorded earlier as the new transmission window. After this halfway point, the
congestion window is increased by one segment for all segments in the transmission window that
are acknowledged. This mechanism will force the sender to more slowly grow its transmission
rate, as it will approach the point where congestion had previously been detected.
(c) Fast Retransmit
When a duplicate ACK is received, the sender does not know if it is because a TCP segment was
lost or simply that a segment was delayed and received out of order at the receiver. If the
receiver can re-order segments, it should not be long before the receiver sends the latest expected
acknowledgement. Typically no more than one or two duplicate ACKs should be received when
simple out of order conditions exist. If however more than two duplicate ACKs are received by
the sender, it is a strong indication that at least one segment has been lost. The TCP sender will
assume enough time has lapsed for all segments to be properly re-ordered by the fact that the
receiver had enough time to send three duplicate ACKs. When three or more duplicate ACKs are
received, the sender does not even wait for a retransmission timer to expire before retransmitting
the segment (as indicated by the position of the duplicate ACK in the byte stream). This process
is called the Fast Retransmit algorithm . Immediately following Fast Retransmit is the Fast
Recovery algorithm.
(d) Fast Recovery
Since the Fast Retransmit algorithm is used when duplicate ACKs are being received, the TCP
sender has implicit knowledge that there is data still flowing to the receiver. Why? The reason is
because duplicate ACKs can only be generated when a segment is received. This is a strong
indication that serious network congestion may not exist and that the lost segment was a rare
event. So instead of reducing the flow of data abruptly by going all the way into Slow Start, the
sender only enters Congestion Avoidance mode. Rather than start at a window of one segment as
in Slow Start mode, the sender resumes transmission with a larger window, incrementing as if in
Congestion Avoidance mode. This allows for higher throughput under the condition of only
moderate congestion .

More Related Content

Similar to NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf

tcp congestion .pptx
tcp congestion .pptxtcp congestion .pptx
tcp congestion .pptxECE01AJAYS
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...ijcseit
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...ijcseit
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit   Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit rajisri2
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network partha pratim deb
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptxNaveen Dubey
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPDilum Bandara
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot LayerMaulik Patel
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syedijaprr_editor
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputIJLT EMAS
 
transport layer pptxdkididkdkdkddjjdjffkfif
transport layer pptxdkididkdkdkddjjdjffkfiftransport layer pptxdkididkdkdkddjjdjffkfif
transport layer pptxdkididkdkdkddjjdjffkfifMujtabaFarooq5
 

Similar to NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf (20)

tcp congestion .pptx
tcp congestion .pptxtcp congestion .pptx
tcp congestion .pptx
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...
 
TCP Congestion Control
TCP Congestion ControlTCP Congestion Control
TCP Congestion Control
 
Unit 4
Unit 4Unit 4
Unit 4
 
Congestion control avoidance
Congestion control avoidanceCongestion control avoidance
Congestion control avoidance
 
Tieu luan qo s
Tieu luan qo sTieu luan qo s
Tieu luan qo s
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Mc unit 4-jwfiles
Mc unit 4-jwfilesMc unit 4-jwfiles
Mc unit 4-jwfiles
 
Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit   Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
transport layer pptxdkididkdkdkddjjdjffkfif
transport layer pptxdkididkdkdkddjjdjffkfiftransport layer pptxdkididkdkdkddjjdjffkfif
transport layer pptxdkididkdkdkddjjdjffkfif
 

More from optokunal1

Which asymmetric cryptosystem is used for digital signaturesA. DE.pdf
Which asymmetric cryptosystem is used for digital signaturesA. DE.pdfWhich asymmetric cryptosystem is used for digital signaturesA. DE.pdf
Which asymmetric cryptosystem is used for digital signaturesA. DE.pdfoptokunal1
 
Which of these theories fit into the contextual world-viewQuestio.pdf
Which of these theories fit into the contextual world-viewQuestio.pdfWhich of these theories fit into the contextual world-viewQuestio.pdf
Which of these theories fit into the contextual world-viewQuestio.pdfoptokunal1
 
Which of the following distinguishes prophase of meiosis I from proph.pdf
Which of the following distinguishes prophase of meiosis I from proph.pdfWhich of the following distinguishes prophase of meiosis I from proph.pdf
Which of the following distinguishes prophase of meiosis I from proph.pdfoptokunal1
 
What is meant by primary growth What is meant by secondary growth .pdf
What is meant by primary growth  What is meant by secondary growth .pdfWhat is meant by primary growth  What is meant by secondary growth .pdf
What is meant by primary growth What is meant by secondary growth .pdfoptokunal1
 
What to the characteristic X-ray radiation What is the originSo.pdf
What to the characteristic X-ray radiation What is the originSo.pdfWhat to the characteristic X-ray radiation What is the originSo.pdf
What to the characteristic X-ray radiation What is the originSo.pdfoptokunal1
 
What other blood cell related problems are often seen in patients wi.pdf
What other blood cell related problems are often seen in patients wi.pdfWhat other blood cell related problems are often seen in patients wi.pdf
What other blood cell related problems are often seen in patients wi.pdfoptokunal1
 
what is inductive and deductive reasoningSolutionDeductive and.pdf
what is inductive and deductive reasoningSolutionDeductive and.pdfwhat is inductive and deductive reasoningSolutionDeductive and.pdf
what is inductive and deductive reasoningSolutionDeductive and.pdfoptokunal1
 
What are the major evolutionary feats shared by all 3 phyla( Platyhe.pdf
What are the major evolutionary feats shared by all 3 phyla( Platyhe.pdfWhat are the major evolutionary feats shared by all 3 phyla( Platyhe.pdf
What are the major evolutionary feats shared by all 3 phyla( Platyhe.pdfoptokunal1
 
What are some of the advantages in the use of AOA notation as oppose.pdf
What are some of the advantages in the use of AOA notation as oppose.pdfWhat are some of the advantages in the use of AOA notation as oppose.pdf
What are some of the advantages in the use of AOA notation as oppose.pdfoptokunal1
 
Verify the identity.StartFraction sine left parenthesis alpha plus.pdf
Verify the identity.StartFraction sine left parenthesis alpha plus.pdfVerify the identity.StartFraction sine left parenthesis alpha plus.pdf
Verify the identity.StartFraction sine left parenthesis alpha plus.pdfoptokunal1
 
Use C++class Node{public   Node ( int = 0 );       constru.pdf
Use C++class Node{public   Node ( int = 0 );        constru.pdfUse C++class Node{public   Node ( int = 0 );        constru.pdf
Use C++class Node{public   Node ( int = 0 );       constru.pdfoptokunal1
 
This is a lab for a java program that I am very unsure of, it has to.pdf
This is a lab for a java program that I am very unsure of, it has to.pdfThis is a lab for a java program that I am very unsure of, it has to.pdf
This is a lab for a java program that I am very unsure of, it has to.pdfoptokunal1
 
The concentration of carbon dioxide in the atmosphere today is about .pdf
The concentration of carbon dioxide in the atmosphere today is about .pdfThe concentration of carbon dioxide in the atmosphere today is about .pdf
The concentration of carbon dioxide in the atmosphere today is about .pdfoptokunal1
 
Research and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdfResearch and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdfoptokunal1
 
Proteins can be attached to a membrane in a variety of ways. How doe.pdf
Proteins can be attached to a membrane in a variety of ways. How doe.pdfProteins can be attached to a membrane in a variety of ways. How doe.pdf
Proteins can be attached to a membrane in a variety of ways. How doe.pdfoptokunal1
 
Problem 1-What is environmental engineering (20 pts) Below you wil.pdf
Problem 1-What is environmental engineering (20 pts) Below you wil.pdfProblem 1-What is environmental engineering (20 pts) Below you wil.pdf
Problem 1-What is environmental engineering (20 pts) Below you wil.pdfoptokunal1
 
Mosses and liverworts are early colonizers during ecological success.pdf
Mosses and liverworts are early colonizers during ecological success.pdfMosses and liverworts are early colonizers during ecological success.pdf
Mosses and liverworts are early colonizers during ecological success.pdfoptokunal1
 
Many programming languages, especially older ones, provide no langua.pdf
Many programming languages, especially older ones, provide no langua.pdfMany programming languages, especially older ones, provide no langua.pdf
Many programming languages, especially older ones, provide no langua.pdfoptokunal1
 
Inferior nasal concha Lacrimal bone Mandible Maxilla Nasal bone .pdf
Inferior nasal concha  Lacrimal bone  Mandible  Maxilla  Nasal bone  .pdfInferior nasal concha  Lacrimal bone  Mandible  Maxilla  Nasal bone  .pdf
Inferior nasal concha Lacrimal bone Mandible Maxilla Nasal bone .pdfoptokunal1
 
import java.util.;public class Program{public static void.pdf
import java.util.;public class Program{public static void.pdfimport java.util.;public class Program{public static void.pdf
import java.util.;public class Program{public static void.pdfoptokunal1
 

More from optokunal1 (20)

Which asymmetric cryptosystem is used for digital signaturesA. DE.pdf
Which asymmetric cryptosystem is used for digital signaturesA. DE.pdfWhich asymmetric cryptosystem is used for digital signaturesA. DE.pdf
Which asymmetric cryptosystem is used for digital signaturesA. DE.pdf
 
Which of these theories fit into the contextual world-viewQuestio.pdf
Which of these theories fit into the contextual world-viewQuestio.pdfWhich of these theories fit into the contextual world-viewQuestio.pdf
Which of these theories fit into the contextual world-viewQuestio.pdf
 
Which of the following distinguishes prophase of meiosis I from proph.pdf
Which of the following distinguishes prophase of meiosis I from proph.pdfWhich of the following distinguishes prophase of meiosis I from proph.pdf
Which of the following distinguishes prophase of meiosis I from proph.pdf
 
What is meant by primary growth What is meant by secondary growth .pdf
What is meant by primary growth  What is meant by secondary growth .pdfWhat is meant by primary growth  What is meant by secondary growth .pdf
What is meant by primary growth What is meant by secondary growth .pdf
 
What to the characteristic X-ray radiation What is the originSo.pdf
What to the characteristic X-ray radiation What is the originSo.pdfWhat to the characteristic X-ray radiation What is the originSo.pdf
What to the characteristic X-ray radiation What is the originSo.pdf
 
What other blood cell related problems are often seen in patients wi.pdf
What other blood cell related problems are often seen in patients wi.pdfWhat other blood cell related problems are often seen in patients wi.pdf
What other blood cell related problems are often seen in patients wi.pdf
 
what is inductive and deductive reasoningSolutionDeductive and.pdf
what is inductive and deductive reasoningSolutionDeductive and.pdfwhat is inductive and deductive reasoningSolutionDeductive and.pdf
what is inductive and deductive reasoningSolutionDeductive and.pdf
 
What are the major evolutionary feats shared by all 3 phyla( Platyhe.pdf
What are the major evolutionary feats shared by all 3 phyla( Platyhe.pdfWhat are the major evolutionary feats shared by all 3 phyla( Platyhe.pdf
What are the major evolutionary feats shared by all 3 phyla( Platyhe.pdf
 
What are some of the advantages in the use of AOA notation as oppose.pdf
What are some of the advantages in the use of AOA notation as oppose.pdfWhat are some of the advantages in the use of AOA notation as oppose.pdf
What are some of the advantages in the use of AOA notation as oppose.pdf
 
Verify the identity.StartFraction sine left parenthesis alpha plus.pdf
Verify the identity.StartFraction sine left parenthesis alpha plus.pdfVerify the identity.StartFraction sine left parenthesis alpha plus.pdf
Verify the identity.StartFraction sine left parenthesis alpha plus.pdf
 
Use C++class Node{public   Node ( int = 0 );       constru.pdf
Use C++class Node{public   Node ( int = 0 );        constru.pdfUse C++class Node{public   Node ( int = 0 );        constru.pdf
Use C++class Node{public   Node ( int = 0 );       constru.pdf
 
This is a lab for a java program that I am very unsure of, it has to.pdf
This is a lab for a java program that I am very unsure of, it has to.pdfThis is a lab for a java program that I am very unsure of, it has to.pdf
This is a lab for a java program that I am very unsure of, it has to.pdf
 
The concentration of carbon dioxide in the atmosphere today is about .pdf
The concentration of carbon dioxide in the atmosphere today is about .pdfThe concentration of carbon dioxide in the atmosphere today is about .pdf
The concentration of carbon dioxide in the atmosphere today is about .pdf
 
Research and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdfResearch and discuss two operating systems and how incident response.pdf
Research and discuss two operating systems and how incident response.pdf
 
Proteins can be attached to a membrane in a variety of ways. How doe.pdf
Proteins can be attached to a membrane in a variety of ways. How doe.pdfProteins can be attached to a membrane in a variety of ways. How doe.pdf
Proteins can be attached to a membrane in a variety of ways. How doe.pdf
 
Problem 1-What is environmental engineering (20 pts) Below you wil.pdf
Problem 1-What is environmental engineering (20 pts) Below you wil.pdfProblem 1-What is environmental engineering (20 pts) Below you wil.pdf
Problem 1-What is environmental engineering (20 pts) Below you wil.pdf
 
Mosses and liverworts are early colonizers during ecological success.pdf
Mosses and liverworts are early colonizers during ecological success.pdfMosses and liverworts are early colonizers during ecological success.pdf
Mosses and liverworts are early colonizers during ecological success.pdf
 
Many programming languages, especially older ones, provide no langua.pdf
Many programming languages, especially older ones, provide no langua.pdfMany programming languages, especially older ones, provide no langua.pdf
Many programming languages, especially older ones, provide no langua.pdf
 
Inferior nasal concha Lacrimal bone Mandible Maxilla Nasal bone .pdf
Inferior nasal concha  Lacrimal bone  Mandible  Maxilla  Nasal bone  .pdfInferior nasal concha  Lacrimal bone  Mandible  Maxilla  Nasal bone  .pdf
Inferior nasal concha Lacrimal bone Mandible Maxilla Nasal bone .pdf
 
import java.util.;public class Program{public static void.pdf
import java.util.;public class Program{public static void.pdfimport java.util.;public class Program{public static void.pdf
import java.util.;public class Program{public static void.pdf
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 

Recently uploaded (20)

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 

NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf

  • 1. NetWork Design Question 2.) How does TCP prevent Congestion? Dicuss the information identifying congestion in the network as well as the mechanism for reducing congestion? Solution Congestion is a problem that occurs on shared networks when multiple users contend for access to the same resources (bandwidth, buffers, and queues). Transmission Control Protocol (TCP) uses a network congestion-avoidance algorithm that includes various aspects of an additive increase/multiplicative decrease (AIMD) scheme, with other schemes such as slow-start to achieve congestion avoidance. The TCP congestion-avoidance algorithm is the primary basis for congestion control in the Internet. Congestion typically occurs where multiple links feed into a single link, such as where internal LANs are connected to WAN links. Congestion also occurs at routers in core networks where nodes are subjected to more traffic than they are designed to handle. TCP/IP networks such as the Internet are especially susceptible to congestion because of their basic connection- less nature. There are no virtual circuits with guaranteed bandwidth. Packets are injected by any host at any time, and those packets are variable in size, which make predicting traffic patterns and providing guaranteed service impossible. While connectionless networks have advantages, quality of service is not one of them. Shared LANs such as Ethernet have their own congestion control mechanisms in the form of access controls that prevent multiple nodes from transmitting at the same time. Identifying: Congestion is primarily reflected by a conventional user feeling-- slowness. This statement reflects the change in the network effective flow, that is the time required to transmit an entire data from one point to another. The effective flow doenot exist as such, it consists in reality of three seperate indicators: *Latency:the effective flow is inversely proportional to the latency. *Jitter:it is latency variation over time, impacts by influencing the flow latency *Loss Rate:the theoritical bandwidth is inversely proportional to the square root of the loss rate These Congestion symtoms allow us to rely on objective indicators to characterize it. Mechanism to reduce congestion: The standard fare in TCP implementations today has four standard congestion control algorithms
  • 2. that are now in common use. Their usefulness has passed the test of time. The four algorithms, Slow Start, Congestion Avoidance, Fast Retransmit and Fast Recovery are described below. (a) Slow Start Slow Start, a requirement for TCP software implementations is a mechanism used by the sender to control the transmission rate, otherwise known as sender-based flow control. This is accomplished through the return rate of acknowledgements from the receiver. In other words, the rate of acknowledgements returned by the receiver determine the rate at which the sender can transmit data. When a TCP connection first begins, the Slow Start algorithm initializes a congestion window to one segment, which is the maximum segment size (MSS) initialized by the receiver during the connection establishment phase. When acknowledgements are returned by the receiver, the congestion window increases by one segment for each acknowledgement returned. Thus, the sender can transmit the minimum of the congestion window and the advertised window of the receiver, which is simply called the transmission window. Slow Start is actually not very slow when the network is not congested and network response time is good. For example, the first successful transmission and acknowledgement of a TCP segment increases the window to two segments. After successful transmission of these two segments and acknowledgements completes, the window is increased to four segments. Then eight segments, then sixteen segments and so on, doubling from there on out up to the maximum window size advertised by the receiver or until congestion finally does occur. At some point the congestion window may become too large for the network or network conditions may change such that packets may be dropped. Packets lost will trigger a timeout at the sender. When this happens, the sender goes into congestion avoidance mode as described in the next section. (b) Congestion Avoidance During the initial data transfer phase of a TCP connection the Slow Start algorithm is used. However, there may be a point during Slow Start that the network is forced to drop one or more packets due to overload or congestion. If this happens, Congestion Avoidance is used to slow the transmission rate. However, Slow Start is used in conjunction with Congestion Avoidance as the means to get the data transfer going again so it doesn’t slow down and stay slow. In the Congestion Avoidance algorithm a retransmission timer expiring or the reception of duplicate ACKs can implicitly signal the sender that a network congestion situation is occurring. The sender immediately sets its transmission window to one half of the current window size (the minimum of the congestion window and the receiver’s advertised window size), but to at least two segments. If congestion was indicated by a timeout, the congestion window is reset to one segment, which automatically puts the sender into Slow Start mode. If congestion was indicated by duplicate ACKs, the Fast Retransmit and Fast Recovery algorithms are invoked . As data is received during Congestion Avoidance, the congestion window is increased. However, Slow
  • 3. Start is only used up to the halfway point where congestion originally occurred. This halfway point was recorded earlier as the new transmission window. After this halfway point, the congestion window is increased by one segment for all segments in the transmission window that are acknowledged. This mechanism will force the sender to more slowly grow its transmission rate, as it will approach the point where congestion had previously been detected. (c) Fast Retransmit When a duplicate ACK is received, the sender does not know if it is because a TCP segment was lost or simply that a segment was delayed and received out of order at the receiver. If the receiver can re-order segments, it should not be long before the receiver sends the latest expected acknowledgement. Typically no more than one or two duplicate ACKs should be received when simple out of order conditions exist. If however more than two duplicate ACKs are received by the sender, it is a strong indication that at least one segment has been lost. The TCP sender will assume enough time has lapsed for all segments to be properly re-ordered by the fact that the receiver had enough time to send three duplicate ACKs. When three or more duplicate ACKs are received, the sender does not even wait for a retransmission timer to expire before retransmitting the segment (as indicated by the position of the duplicate ACK in the byte stream). This process is called the Fast Retransmit algorithm . Immediately following Fast Retransmit is the Fast Recovery algorithm. (d) Fast Recovery Since the Fast Retransmit algorithm is used when duplicate ACKs are being received, the TCP sender has implicit knowledge that there is data still flowing to the receiver. Why? The reason is because duplicate ACKs can only be generated when a segment is received. This is a strong indication that serious network congestion may not exist and that the lost segment was a rare event. So instead of reducing the flow of data abruptly by going all the way into Slow Start, the sender only enters Congestion Avoidance mode. Rather than start at a window of one segment as in Slow Start mode, the sender resumes transmission with a larger window, incrementing as if in Congestion Avoidance mode. This allows for higher throughput under the condition of only moderate congestion .