SlideShare a Scribd company logo
The Network Layer
Congestion Control Algorithms &
Quality-of-Service
Chapter 5
Congestion Control Algorithms
• Approaches to Congestion Control
• Traffic-Aware Routing
• Admission Control
• Traffic Throttling
• Load Shedding
Congestion
When too much traffic is offered, congestion sets in and
performance degrades sharply.
General Principles of Congestion Control
1. Monitor the system
– detect when and where congestion occurs.
2. Pass information to where action can be taken.
3. Adjust system operation to correct the problem.
4. Difference between Congestion control and
flow control – Elaborate
5. Problem of infinite buffer - Elaborate
Approaches to Congestion Control
Two solutions possible:
1)Increase resources
2)Decrease load
Admission control in virtual networks – no more provisioning
Traffic-Aware Routing
A network in which the East and West parts
are connected by two links.
Admission Control
(a) A congested network. (b) The portion of the network that is
not congested. A virtual circuit from A to B is also shown.
Problem is in virtual circuits – there may be provisioning but not
real usage.
Traffic Throttling:Congestion Detection
• Routers must determine when congestion is approaching, ideally
before it has arrived.
• Each router can continuously monitor the resources it is using.
• 3 possibilities:
1. utilization of the output links
2. buffering of queued packets inside the router (most useful)
3. no. of packets that are lost due to insufficient buffering
EWMA (Exponentially Weighted Moving Average)
• dnew = αdold + (1 − α)s,
where, the constant α determines how fast the router forgets
recent history.
• Whenever d moves above the threshold, the router notes the
onset of congestion.
Traffic Throttling: Feedback
• Routers must deliver timely feedback to the senders that are
causing the congestion.
• The router must identify the appropriate senders.
• It must then warn them carefully, without sending many more
packets into the already congested network.
• Many feedback mechanisms:
Mechanism 1: Explicit Congestion Notification (ECN)
Mechanisms 2 & 3:
Direct Choke Packets,
Hop-by-Hop Backpressure
M-2: A choke packet that
affects only the source.
M-3: A choke packet that
affects each hop it passes
through.
Sending choke packets to the
source may be costly.
Mechanism 4: Load Shedding
• Performed when all other strategies fail.
• Cause blackout in some areas to save the entire
network from failing.
• Intelligent packet drop policy desired.
• Which packets to discard may depend on application
Multimedia – old packets (full frame not to be
discarded)
Text – Recent Packets
• Packet’s importance can be marked in the beginning
(application layer), then decision on which packets
to discard can be taken.
Mechanism 5: Random Early Detection
• Discard packets before all the buffer space is really
exhausted.
• To determine when to start discarding, routers
maintain a running average of their queue lengths.
• When average queue length exceeds a threshold, the
link is said to be congested – small fraction of packets
dropped at random.
• The affected sender will notice the loss when there is
no acknowledgement – transport protocol slowed
down.
Quality of Service
• Requirements
• Minimum throughput and maximum latency
• Techniques for Achieving Good Quality of Service
• Integrated Services
• Differentiated Services
• Label Switching and MPLS
Requirements
How stringent the quality-of-service requirements are.
5-30
Categories of QoS and Examples
1. Constant bit rate
• Telephony
2. Real-time variable bit rate
• Compressed videoconferencing
3. Non-real-time variable bit rate
• Watching a movie on demand
4. Available bit rate
• File transfer
Jitter Control
(a) High jitter. (b) Low jitter.
Schedule Delay according to Deadline Miss
Buffering
Smoothing the output stream by buffering packets.
Traffic Shaping
• Traffic in data networks is bursty – typically arrives
at non-uniform rates as the traffic rate varies.
• Traffic shaping is a technique for regulating the
average rate and burstiness of a flow of data that
enters the network.
• When a flow is set up, the user and the network
agree on a certain traffic pattern (shape).
• Sometimes this agreement is called an SLA
(Service Level Agreement).
The Leaky Bucket Algorithm
(a) A leaky bucket with water. (b) a leaky bucket with packets.
The Token Bucket Algorithm
(a) Before. (b) After.
5-34
Token Bucket Algorithm (2)
• Burst length – S sec.
• Maximum output rate – M bytes/sec
• Token bucket capacity – B bytes
• Token arrival rate – R bytes/sec
• An output burst contains a maximum of (B + RS) bytes.
• The number of bytes in a maximum speed burst of length
S seconds is MS.
• Hence, we have: B + RS = MS
• This equation can be solved to get S = B /(M − R)
Traffic Shaping (2)
(a) Traffic from a host. Output shaped by a token bucket of rate 200
Mbps and capacity (b) 9600 KB, (c) 0 KB.
Traffic Shaping (3)
Token bucket level for shaping with rate 200 Mbps and capacity (d)
16000 KB, (e) 9600 KB, and (f) 0KB..
Packet Scheduling
Kinds of resources that can potentially be
reserved for different flows:
1. Bandwidth.
2. Buffer space.
3. CPU cycles.
Packet Scheduling (2)
Round-robin Fair Queuing
Packet Scheduling (3)
(a) Weighted Fair Queueing.
(b) Finishing times for the packets.
Admission Control (1)
An example flow specification
a) T = 1/mu X 1/(1-lambda/mu) -- lambda = 0.95Mpackets/sec
b) mu = 1Mb packets/sec
Admission Control (2)
Bandwidth and delay guarantees with token buckets and WFQ.
Integrated Services:
RSVP—The Resource reSerVation Protocol
(a) A network. (b) The multicast spanning tree for host 1.
(c) The multicast spanning tree for host 2.
Hosts 1 and 2 are multicast sender
3,4, 5 are multicast receiver
Host 3 reserves for Host 1 and the Host 2
Host 5 reserves Host 1 (so the common path is utilized). However
depending on need (Host 5 may be a bigger TV) – provision is made for
the greediest part
RSVP (2)
(a) Host 3 requests a channel to host 1. (b) Host 3 then requests a
second channel, to host 2.
(c) Host 5 requests a channel to host 1.
Differentiated Services:
Expedited Forwarding
Expedited packets experience a traffic-free network
Class-Based Service
Per Hop Behaviors
Traffic within a class are given preferential treatment
Expedited Forwarding
Packets marked – Regular or Expedited
Assured Forwarding
Gold, Silver, Bronze, common
Packets that face congestion
low (short burst), medium and high _ this classes are determined
by tocken bucket algorithm
Differentiated Services:
Assured Forwarding
A possible implementation of assured forwarding, weighted fair
scheduling, RED (randome Early Detection discards packet
according to the class).
The Leaky
Bucket
Algorithm
(a) Input to a leaky bucket.
(b) Output from a leaky
bucket. Output from a token
bucket with capacities of (c)
250 KB, (d) 500 KB, (e)
750 KB, (f) Output from a
500KB token bucket feeding
a 10-MB/sec leaky bucket.

More Related Content

What's hot

Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 
Computer network switching
Computer network switchingComputer network switching
Computer network switchingShivani Godha
 
QoS (quality of service)
QoS (quality of service)QoS (quality of service)
QoS (quality of service)Sri Safrina
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network ModelsWayne Jones Jnr
 
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPPankaj Debbarma
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structuresSweta Kumari Barnwal
 
Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Dr Rajiv Srivastava
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices21viveksingh
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsEast West University
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Kaushik Panta
 

What's hot (20)

Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
QoS (quality of service)
QoS (quality of service)QoS (quality of service)
QoS (quality of service)
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Computer network
Computer networkComputer network
Computer network
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
 
Switching
SwitchingSwitching
Switching
 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
 

Similar to 9_Network.ppt

Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1Aman Jaiswal
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Congestion control
Congestion controlCongestion control
Congestion controlNithin Raj
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfShivakrishnan18
 
Data link layer
Data link layerData link layer
Data link layersbkbca
 
Congestion_Control09.ppt
Congestion_Control09.pptCongestion_Control09.ppt
Congestion_Control09.ppttahaniali27
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxPondinesh2
 
CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfMayankRaj687571
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- finalTaymoor Nazmy
 
NZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBRNZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBRAPNIC
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdfShanthalaKV
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits typesgjeyasriitaamecnew
 

Similar to 9_Network.ppt (20)

Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Transport layer
Transport layerTransport layer
Transport layer
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdf
 
Data link layer
Data link layerData link layer
Data link layer
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion_Control09.ppt
Congestion_Control09.pptCongestion_Control09.ppt
Congestion_Control09.ppt
 
Conjestion control
Conjestion controlConjestion control
Conjestion control
 
CN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptxCN Unit 2 - cs8591.pptx
CN Unit 2 - cs8591.pptx
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
 
CN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdfCN Module 5 part 2 2022.pdf
CN Module 5 part 2 2022.pdf
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Congestion control and quality of service
Congestion control and quality of serviceCongestion control and quality of service
Congestion control and quality of service
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
 
NZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBRNZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBR
 
Computer Networks Module 2.pdf
Computer Networks Module 2.pdfComputer Networks Module 2.pdf
Computer Networks Module 2.pdf
 
Lect9
Lect9Lect9
Lect9
 
Lect9 (1)
Lect9 (1)Lect9 (1)
Lect9 (1)
 
UNIT-3 network security layers andits types
UNIT-3 network security layers andits typesUNIT-3 network security layers andits types
UNIT-3 network security layers andits types
 

Recently uploaded

Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdfAhmedHussein950959
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdfKamal Acharya
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdfKamal Acharya
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdfKamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGKOUSTAV SARKAR
 
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionjeevanprasad8
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringC Sai Kiran
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edgePaco Orozco
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamDr. Radhey Shyam
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageRCC Institute of Information Technology
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdfKamal Acharya
 
Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdfKamal Acharya
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdfKamal Acharya
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectRased Khan
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfAbrahamGadissa
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsAtif Razi
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxMd. Shahidul Islam Prodhan
 

Recently uploaded (20)

Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projection
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdf
 
Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdf
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
 
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptxCloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
Cloud-Computing_CSE311_Computer-Networking CSE GUB BD - Shahidul.pptx
 

9_Network.ppt

  • 1. The Network Layer Congestion Control Algorithms & Quality-of-Service Chapter 5
  • 2. Congestion Control Algorithms • Approaches to Congestion Control • Traffic-Aware Routing • Admission Control • Traffic Throttling • Load Shedding
  • 3. Congestion When too much traffic is offered, congestion sets in and performance degrades sharply.
  • 4. General Principles of Congestion Control 1. Monitor the system – detect when and where congestion occurs. 2. Pass information to where action can be taken. 3. Adjust system operation to correct the problem. 4. Difference between Congestion control and flow control – Elaborate 5. Problem of infinite buffer - Elaborate
  • 5. Approaches to Congestion Control Two solutions possible: 1)Increase resources 2)Decrease load Admission control in virtual networks – no more provisioning
  • 6. Traffic-Aware Routing A network in which the East and West parts are connected by two links.
  • 7. Admission Control (a) A congested network. (b) The portion of the network that is not congested. A virtual circuit from A to B is also shown. Problem is in virtual circuits – there may be provisioning but not real usage.
  • 8. Traffic Throttling:Congestion Detection • Routers must determine when congestion is approaching, ideally before it has arrived. • Each router can continuously monitor the resources it is using. • 3 possibilities: 1. utilization of the output links 2. buffering of queued packets inside the router (most useful) 3. no. of packets that are lost due to insufficient buffering EWMA (Exponentially Weighted Moving Average) • dnew = αdold + (1 − α)s, where, the constant α determines how fast the router forgets recent history. • Whenever d moves above the threshold, the router notes the onset of congestion.
  • 9. Traffic Throttling: Feedback • Routers must deliver timely feedback to the senders that are causing the congestion. • The router must identify the appropriate senders. • It must then warn them carefully, without sending many more packets into the already congested network. • Many feedback mechanisms: Mechanism 1: Explicit Congestion Notification (ECN)
  • 10. Mechanisms 2 & 3: Direct Choke Packets, Hop-by-Hop Backpressure M-2: A choke packet that affects only the source. M-3: A choke packet that affects each hop it passes through. Sending choke packets to the source may be costly.
  • 11. Mechanism 4: Load Shedding • Performed when all other strategies fail. • Cause blackout in some areas to save the entire network from failing. • Intelligent packet drop policy desired. • Which packets to discard may depend on application Multimedia – old packets (full frame not to be discarded) Text – Recent Packets • Packet’s importance can be marked in the beginning (application layer), then decision on which packets to discard can be taken.
  • 12. Mechanism 5: Random Early Detection • Discard packets before all the buffer space is really exhausted. • To determine when to start discarding, routers maintain a running average of their queue lengths. • When average queue length exceeds a threshold, the link is said to be congested – small fraction of packets dropped at random. • The affected sender will notice the loss when there is no acknowledgement – transport protocol slowed down.
  • 13. Quality of Service • Requirements • Minimum throughput and maximum latency • Techniques for Achieving Good Quality of Service • Integrated Services • Differentiated Services • Label Switching and MPLS
  • 14. Requirements How stringent the quality-of-service requirements are. 5-30
  • 15. Categories of QoS and Examples 1. Constant bit rate • Telephony 2. Real-time variable bit rate • Compressed videoconferencing 3. Non-real-time variable bit rate • Watching a movie on demand 4. Available bit rate • File transfer
  • 16. Jitter Control (a) High jitter. (b) Low jitter. Schedule Delay according to Deadline Miss
  • 17. Buffering Smoothing the output stream by buffering packets.
  • 18. Traffic Shaping • Traffic in data networks is bursty – typically arrives at non-uniform rates as the traffic rate varies. • Traffic shaping is a technique for regulating the average rate and burstiness of a flow of data that enters the network. • When a flow is set up, the user and the network agree on a certain traffic pattern (shape). • Sometimes this agreement is called an SLA (Service Level Agreement).
  • 19. The Leaky Bucket Algorithm (a) A leaky bucket with water. (b) a leaky bucket with packets.
  • 20. The Token Bucket Algorithm (a) Before. (b) After. 5-34
  • 21. Token Bucket Algorithm (2) • Burst length – S sec. • Maximum output rate – M bytes/sec • Token bucket capacity – B bytes • Token arrival rate – R bytes/sec • An output burst contains a maximum of (B + RS) bytes. • The number of bytes in a maximum speed burst of length S seconds is MS. • Hence, we have: B + RS = MS • This equation can be solved to get S = B /(M − R)
  • 22. Traffic Shaping (2) (a) Traffic from a host. Output shaped by a token bucket of rate 200 Mbps and capacity (b) 9600 KB, (c) 0 KB.
  • 23. Traffic Shaping (3) Token bucket level for shaping with rate 200 Mbps and capacity (d) 16000 KB, (e) 9600 KB, and (f) 0KB..
  • 24. Packet Scheduling Kinds of resources that can potentially be reserved for different flows: 1. Bandwidth. 2. Buffer space. 3. CPU cycles.
  • 26. Packet Scheduling (3) (a) Weighted Fair Queueing. (b) Finishing times for the packets.
  • 27. Admission Control (1) An example flow specification
  • 28. a) T = 1/mu X 1/(1-lambda/mu) -- lambda = 0.95Mpackets/sec b) mu = 1Mb packets/sec
  • 29. Admission Control (2) Bandwidth and delay guarantees with token buckets and WFQ.
  • 30. Integrated Services: RSVP—The Resource reSerVation Protocol (a) A network. (b) The multicast spanning tree for host 1. (c) The multicast spanning tree for host 2.
  • 31. Hosts 1 and 2 are multicast sender 3,4, 5 are multicast receiver Host 3 reserves for Host 1 and the Host 2 Host 5 reserves Host 1 (so the common path is utilized). However depending on need (Host 5 may be a bigger TV) – provision is made for the greediest part
  • 32. RSVP (2) (a) Host 3 requests a channel to host 1. (b) Host 3 then requests a second channel, to host 2. (c) Host 5 requests a channel to host 1.
  • 33. Differentiated Services: Expedited Forwarding Expedited packets experience a traffic-free network
  • 34. Class-Based Service Per Hop Behaviors Traffic within a class are given preferential treatment Expedited Forwarding Packets marked – Regular or Expedited Assured Forwarding Gold, Silver, Bronze, common Packets that face congestion low (short burst), medium and high _ this classes are determined by tocken bucket algorithm
  • 35. Differentiated Services: Assured Forwarding A possible implementation of assured forwarding, weighted fair scheduling, RED (randome Early Detection discards packet according to the class).
  • 36. The Leaky Bucket Algorithm (a) Input to a leaky bucket. (b) Output from a leaky bucket. Output from a token bucket with capacities of (c) 250 KB, (d) 500 KB, (e) 750 KB, (f) Output from a 500KB token bucket feeding a 10-MB/sec leaky bucket.