SlideShare a Scribd company logo
1 of 36
 Traffic Management is the act of managing network
traffic , providing service guarantee to user
connections and ensuring optimal utilization of
network resources
.
• Traffic Contract Management.
• Traffic Shaping
.
• Traffic Policing
• Priority Control
.
• Flow Control
• Congestion Control
Traffic Contract Mng.
Traffic Shaping
Traffic Policing
• Connection admission
control(CAC)
• Leaky bucket
• Usage passage control
• Network passage control
Priority Control
Flow Control
Connection Control
• Selective cell discard
• Generic flow control
• ABR flow control
• Frame Discard
• EFCI
 It provides the means to allocate network resources
to contending user connection and to manage
network resources efficiently (i.e. deciding whether a
new connection request can be accepted or not).
 It is defined by two set of parameter : Network traffic
descriptor and QoS Parameters.
 It uses “Connection Admission Control”
mechanism.
 Set of actions taken by the network at the call
establishment phase in order to ensure whether a
VPC or VCC to be accepted or rejected.
 Decide whether new user call request is to be
accepted or rejected.
› CAC ensures sufficient resource available in the network to
support the new requested call
› CAC also ensure performance of existing connection should
not degrade by accepting new call.
 If sufficient resources are not present or acceptance
of connections may endanger QoS of existing
connections , network rejects the call.
 CAC also ensures resources are not allocated in
excess to existing capacity.
 Without CAC algorithm, unchecked admission lead to
Congestion(where demand>availability).So, CAC act
as preventive congestion control mechanism.
Non Statistical Or Peak Bandwidth Allocation
Algorithm: it allocate resources at the peak cell rate of the
connection.
 Merit : It is simple to implement
 Demerit : lead to gross underutilization(CAC will allocate
resources to peak rate but data which will not arrive at peak
rate suffers).
Statistical CAC Algorithm : Using statistical allocation the
sum of peak rate of all the connections can exceed the link
capacity. A parameter called Statistical gain measure
advantage over non statistical algorithm (i.e.) ratio of
connection admitted with statistical multiplexing to the
connection admitted with non statistical allocation.
 Merit : These connections do better resource utilization &
performance efficient.
 Demerit : Difficult to implement.
 Minimum processing complexity: Because ATM switch
operates in real time and require connection establishment
and release requests to be served with minimum latency.
CAC algorithms should be easy to implement.
 Model independence : CAC algorithm should be model
independent Because as we have seen 2nd element of
traffic management is traffic shaping , in altering shape of
model , CAC algorithm will also Alter.
 Balance between cell loss and link utilization: cell loss
directly concern with user and link utilization concern with
network. Low link utilization and greater bandwidth
allocation lead to low cell loss or vice versa.
 Algorithm should be scalable(computation required should
be independent of number of connections).
 It provides the means to alter traffic characteristics
of connection and deliver a more predictable,
conforming traffic to the network.
 It uses “Leaky Bucket” mechanism.
 Mechanism that alter the traffic characteristics of
stream of cells on VCC and VPC to achieve
desired traffic characteristics , in order to ensure
conformance or to achieve better network
efficiency to meet QoS objectives
 (HOST COMPUTER)
Bursty Flow(PACKETS)



Discarded
drop of water
Fixed flow of water
 Leaky bucket shapes Busty
traffic into fixed rate traffic by
averaging data rate.
 In this mechanism peak cell
rate is reduced to get
Stability.
 It makes traffic characteristics
more predictable.
Bucket
Tap
Source
system
Gives busty
data
Data stored
in buffer
Lowers the
data rate
Stabilize
traffic with
lower peak
cell rate
ARRIVAL FUL
L?
Y
E
S
NO
QUEUE
LEAK
Y
PROCESSOR
0 2 7 10 0 10
12
mbps
Time:
0-2
12*2:24
mbits
2
mbps
2*3:6
mbits
After algo
3 mbps
Time :0-10
3*10:30mbits
 It provides means to ensure that the connection
adheres(compatible) to the parameters of its traffic
contract and non conforming connections are
penalized.
 It uses “usage parameter control/network
parameter control” policing mechanism.
 Set of actions taken by the network to monitor and
ensure that the traffic contract is represented in
terms of traffic offered at the user access and the
network access respectively.
 Mechanism to monitor traffic and enforce the traffic
contract is called as usage passage control(UPC).
 Depending on traffic monitoring at UNI called UPC or
NNI the monitoring functions called NPC respectively.
 UPC applies to both user connections and signalling
channels, implies along with controlling amount of
user cell ,it also monitor amount of signalling
information entering the network.
 Commonly used algorithm is GENERIC CELL RATE
ALGORITHM(GCRA).
 It define conformance of cell with respect to negotiated
traffic control(conformance means cells arrive either at
time or after).
 Defined in terms of 2 parameters i.e. GCRA(I,L):
› Increment(I) that specify when next cell is excepted.
› Limit (L) that specify permissible deviation from expected
arrival time.
 Checks conformance of traffic contract using twin
concept i.e.
› Expected arrival time =Theoretical arrival time (TAT).
› Actual arrival time.
 All cells arriving before time are marked as non
conforming cells
Conformance of a cell is decided on the basis of TAT as following:
1st incoming cell initialize algorithm
Set TAT of cell 1 .......(.i.e.) TAT1 = ta(1).
For kth cell conformance is decided on basis of TATk,
CASE I if k arrives after TATk cell is declared as conforming.
For k+1 cell TAT = TATk+1 is set to ta(k)+I , k is
incremented.
CASE II If cell arrive between TATk and TATk-L cell is
declared as conforming.
TAT for next cell will be TATk+I not ta(k)+I.
CASE III If cell arrive before TATk – L  cell is declared as Non-
conforming.
TAT for next cell is TATk.
 Bucket of capacity (I+L), where each cell pour I data
into it.
 Bucket is leaking @ 1data unit/time unit.
 Capacity of bucket is X at any time instance.
 Incoming cell is conforming if at its arrival the fluid in
bucket <= L, otherwise it is non conforming.
 Algorithm maintains last conformance time(LCT)
which store the last time the conforming cell was
accepted.
 The amount of fluid drained since LCT is subtracted
from bucket capacity i.e. X*=X-(ta(k)-LCT).
 Cell passing – cell simply pass through, network
is lightly loaded . It result in better utilization of
network resources, but while overloading it is not
preferred.
 Cell tagging – cell loss priority (CLP) bit in ATM:
CLP=0 (high priority/conforming cells) CLP=1
(low priority/non conforming cells).Marking
of CLP bit in ATM header marked as 1.
 Cell discarding – simply cell dumping.
 It ensures that the Packets with higher
priority should be preferable over the
Packets with lower priority.
 Processing every cell according to the
priority will mean additional delays ,
which might not be acceptable to network
users.
 It uses “Selective Cell Discard”
mechanism.
 Mainly this algorithm is based on
CLP(Cell Loss Priority) bit of ATM header
, as we know ATM Header include 48 bits
payload and 5 bits header(1bit for
Header error control=CLP).
 Mechanism discard cell based on priority .
 Cell with CLP bit = 1, consider as low priority.
 Cell with CLP bit = 0 , consider as high priority.
 If network is forced to drop some cells , the network
selectively drops the cells with lower priority.
 Example: layered video encoder ,having unequal
priority, where two data streams are produced having
essential(provide average picture quality) and
enhancement layer(improve picture quality).
• 0011
• 1100
1
• 1111
• 0000
0
• 1010
• 0101
1
11110
00000
 It ensure the synchronisation between sender and
receiver i.e. sender’s sending capacity should not be
greater than receiver’s receiving capacity.
 No hop by hop flow control for error correction.
 Used to optimize bandwidth utilization by feed back
mechanism.
 Feedback mechanisms are “Generic Flow Control”
and “ABR Flow Control” mechanism.
 GFC provides a link level flow control mechanism to
control data offered at UNI.
 ABR flow control is a fast resource management
mechanism to utilize any lower bandwidth in the
network for connection belonging to ABR service
category.
 It is a link level flow control scheme to control amount of
data flowing at the UNI.
 Applicable to data flowing in forward direction (user to
Network).
 In UNI cell header , there are 4 bits for GFC across UNI
and access control with in customer premises
network(CNP).
 GFC used to control flow of traffic from various ATM
connections and to limit the transmission capacity at the
UNI interface.
 Scope of GFC depend on configuration of end system .
It can be controlled configuration or uncontrolled
configuration.
 GFC is not for uncontrolled system equipment.
 Controlled connection: connection whose cell
emission rate is controlled by GFC signals . No
resource is reserved in advance for controlled
connections. Connection belonging to ABR,GFR
etc services are examples of connections that can
controlled.
 Uncontrolled connections: connections whose
cell emission rate is not controlled by GFC signals
(except HALT), resources are reserved in
advance. Connection belonging to CBR service
are generally uncontrolled.
• Terminal is
controlled and
controlled ATM
connection
Group B
• Terminal is
controlled and
controlled ATM
connection
Group A
• Terminal is
controlled . Cell
is assigned on
an uncontrolled
ATM connection
• Terminal is
uncontrolled .
Cell is assigned
on uncontrolled
ATM
Connection.
0000 0001
00110101
Bit values for GFC bits:
 GFC procedures assumes master slave relationship
between network and user, where network referred as
controlling and end system as controlled equipment.
 GFC signals are as follows:
› HALT: To stop transmission of assigned ATM layer cells for
both controlled and uncontrolled ATM connections . This
signal is sent to limit the amount of cell generated by ATM
end system at UNI. E.g.. HALT and NO_HALT signal is sent
alternatively , transmission capacity reduced to half.
› SET: controlling devices issues SET signal to counter to
specified integer value . Counter specifies the maximum
data the controlled device can send.
› NULL: control devices send this to show no action is taken.
GFC Bits in network to User Connection
1 2 3 4
Indicates HALT(1)/NO_HALT(0)
IN 1-q model , set to 0
IN 2-q model , indicates SET(1)/NULL(0)
for Class B
In I-q model, indicates SET(1)/NULL(0)
In 2-q model , indicates SET(1)/NULL for Class A
Reserve
for future
use , set
to 0
 ABR stands for “Available bit rate”.
 ABR does not provide any QoS guarantee but It ensures
efficient means to access bandwidth available in network
for which a flow control feedback loop is used.
 Two control approaches are there:
› Credit based flow control: HOP BY HOP flow control
mechanism. Source receives credit from next hop which specify
the amount of data to be sent by source. For every cell sent ,
sender decrement the credit available. At credit=0,sender
prohibited to send next data.
› Rate based flow control: END TO END feedback flow control
mechanism. There is one feedback loop from the source to
destination. Destination send control information to source and
intermediate node can change it and forward it to the source.
Credit-based
Desirable because in
temporary condition ,
all nodes have to stop
sending credits to
previous hops.
Require per – link per
VC monitoring , which
complicates the
design and hampers
scalability.
Rate-based
There will be delay in
feedback from
destination to source
even in case of
temporary condition.
Simple , Scalable and
does not require state
information of a no. of
VCs to be stored in
intermediate switches.
 “CAC” is an example of preventive mechanism.
 It provides means to ensure the total traffic on a
network is below its carrying capacity.
 It uses “Selective Cell Discard”, “ Frame Discard”
and “Explicit Forward Congestion indication”
mechanisms .
 Selective Cell Discard based on CLP(Cell loss
priority).
 Frame discard policy discard full IP packet instead of
a cell.
 Explicit forward congestion notification used to assist
the network in avoidance of and recovery from
congestion state.
 Large IP packets are segmented into number of cells.
 During congestion if one of the cell belonging to IP
packet is dropped, the remaining cells carried by ATM
network become dead cells because they don’t
reassemble properly, this can cause congestion to great
extent.
 So to discard a frame it will be enough to discard 1 from
it.
 Now to tackle this problem of frame discard few
schemes are there:
› Partial packet discard
› Early packet discard
› Random early discard
WORST CASE BEST CASE
 Partial packet discard(PPD): if one cell from a frame
is discarded whole frame is dropped than. Last frame
cell is not discarded as it indicate loss to the receiver.
› Drawback: Some of the dead cells are still carried till the
destination .
 Early packet discard(EPD): an entire frame is
discarded instead of carrying dead cell to the receiver
and avoid overflowing of the buffer .
› Drawback: lead to low bandwidth flow.
 Random Early discard(RED):Per flow buffer
accounting .It achieves fairness along with early
packet discard benefits. Whenever the queue size in
buffer exceeds certain threshold ,incoming packet is
dropped with certain probability.
Congestion Control Flow Control
Global Issue. .
Joint responsibility
of user and network
 Main task is to .
ensure that subnet is
able to carry the
offered load
Local Issue .
Issue between .
sender and reciever.
Main task is to .
ensure that a fast
sender does not
overwhelm a slow
receiver.
 Congestion notification is sent to the destination.
 In this congestion bit in ATM header is set to 1 to
indicate congestion in the network.
 After receiving this notification destination
communicate to source to slow down the
transmission rate (in source to destination
direction).
 This depend upon the protocols running at the end
system how destination conveys this information ,
no standard procedure exist .
Arrjay

More Related Content

What's hot

Improved EPRCA Congestion Control Scheme for ATM Networks
Improved EPRCA Congestion Control Scheme for ATM NetworksImproved EPRCA Congestion Control Scheme for ATM Networks
Improved EPRCA Congestion Control Scheme for ATM NetworksEswar Publications
 
Atm networks and intelligent packet filtering(synopsis)
Atm networks and intelligent packet filtering(synopsis)Atm networks and intelligent packet filtering(synopsis)
Atm networks and intelligent packet filtering(synopsis)Mumbai Academisc
 
Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11daniel ayalew
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptxNaveen Dubey
 
TCP Traffic Control Chapter12
TCP Traffic Control Chapter12TCP Traffic Control Chapter12
TCP Traffic Control Chapter12daniel ayalew
 
Congestion control
Congestion controlCongestion control
Congestion controlnandhulaks
 
Transmitting urgent data using ANKM method.
Transmitting urgent data using ANKM method.Transmitting urgent data using ANKM method.
Transmitting urgent data using ANKM method.IRJET Journal
 
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor NetworksQueue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor NetworksCSCJournals
 
KALMAN FILTER BASED CONGESTION CONTROLLER
KALMAN FILTER BASED CONGESTION CONTROLLERKALMAN FILTER BASED CONGESTION CONTROLLER
KALMAN FILTER BASED CONGESTION CONTROLLERijdpsjournal
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data NetworksWaqas !!!!
 

What's hot (19)

Lecture 13
Lecture 13Lecture 13
Lecture 13
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Improved EPRCA Congestion Control Scheme for ATM Networks
Improved EPRCA Congestion Control Scheme for ATM NetworksImproved EPRCA Congestion Control Scheme for ATM Networks
Improved EPRCA Congestion Control Scheme for ATM Networks
 
Atm networks and intelligent packet filtering(synopsis)
Atm networks and intelligent packet filtering(synopsis)Atm networks and intelligent packet filtering(synopsis)
Atm networks and intelligent packet filtering(synopsis)
 
Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1Vrajesh parikh handoff_presentation1
Vrajesh parikh handoff_presentation1
 
Lte mobility optimization
Lte mobility optimizationLte mobility optimization
Lte mobility optimization
 
Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11Link-Level Flow and Error Control Chapter11
Link-Level Flow and Error Control Chapter11
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Congestion control and quality of service
Congestion control and quality of serviceCongestion control and quality of service
Congestion control and quality of service
 
TCP Traffic Control Chapter12
TCP Traffic Control Chapter12TCP Traffic Control Chapter12
TCP Traffic Control Chapter12
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Admission control
Admission controlAdmission control
Admission control
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Transmitting urgent data using ANKM method.
Transmitting urgent data using ANKM method.Transmitting urgent data using ANKM method.
Transmitting urgent data using ANKM method.
 
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor NetworksQueue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
Queue Size Trade Off with Modulation in 802.15.4 for Wireless Sensor Networks
 
13 atm
13 atm13 atm
13 atm
 
KALMAN FILTER BASED CONGESTION CONTROLLER
KALMAN FILTER BASED CONGESTION CONTROLLERKALMAN FILTER BASED CONGESTION CONTROLLER
KALMAN FILTER BASED CONGESTION CONTROLLER
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networks
 

Similar to Arrjay

Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Meenakshi Devi
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking ConceptTushar Ranjan
 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer ModeNishant Munjal
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission controlsangusajjan
 
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKSENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKScscpconf
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
 
30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syedijaprr_editor
 
Asynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer networkAsynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer networkMH Shihab
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Ali Usman
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
 
Congestion control algorithms.pptx
Congestion control algorithms.pptxCongestion control algorithms.pptx
Congestion control algorithms.pptxujjwalmatoliya
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Shamima Akther
 

Similar to Arrjay (20)

Asychronous transfer mode(atm)
Asychronous transfer mode(atm)Asychronous transfer mode(atm)
Asychronous transfer mode(atm)
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
Atm 090904084052-phpapp02
Atm 090904084052-phpapp02Atm 090904084052-phpapp02
Atm 090904084052-phpapp02
 
Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer Mode
 
I1102014953
I1102014953I1102014953
I1102014953
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission control
 
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKSENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed30 ijaprr vol1-4-24-28syed
30 ijaprr vol1-4-24-28syed
 
Unit 2
Unit 2Unit 2
Unit 2
 
Asynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer networkAsynchronous transfer mode (atm) in computer network
Asynchronous transfer mode (atm) in computer network
 
4 fuzzy aqm
4 fuzzy aqm4 fuzzy aqm
4 fuzzy aqm
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )
 
Chap24
Chap24Chap24
Chap24
 
11 atm
11 atm11 atm
11 atm
 
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksEfficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
 
Congestion control algorithms.pptx
Congestion control algorithms.pptxCongestion control algorithms.pptx
Congestion control algorithms.pptx
 
DLL
DLLDLL
DLL
 
Frame relay
Frame relayFrame relay
Frame relay
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)
 

Recently uploaded

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 

Recently uploaded (20)

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 

Arrjay

  • 1.
  • 2.  Traffic Management is the act of managing network traffic , providing service guarantee to user connections and ensuring optimal utilization of network resources
  • 3. . • Traffic Contract Management. • Traffic Shaping . • Traffic Policing • Priority Control . • Flow Control • Congestion Control
  • 4. Traffic Contract Mng. Traffic Shaping Traffic Policing • Connection admission control(CAC) • Leaky bucket • Usage passage control • Network passage control Priority Control Flow Control Connection Control • Selective cell discard • Generic flow control • ABR flow control • Frame Discard • EFCI
  • 5.  It provides the means to allocate network resources to contending user connection and to manage network resources efficiently (i.e. deciding whether a new connection request can be accepted or not).  It is defined by two set of parameter : Network traffic descriptor and QoS Parameters.  It uses “Connection Admission Control” mechanism.  Set of actions taken by the network at the call establishment phase in order to ensure whether a VPC or VCC to be accepted or rejected.
  • 6.  Decide whether new user call request is to be accepted or rejected. › CAC ensures sufficient resource available in the network to support the new requested call › CAC also ensure performance of existing connection should not degrade by accepting new call.  If sufficient resources are not present or acceptance of connections may endanger QoS of existing connections , network rejects the call.  CAC also ensures resources are not allocated in excess to existing capacity.  Without CAC algorithm, unchecked admission lead to Congestion(where demand>availability).So, CAC act as preventive congestion control mechanism.
  • 7. Non Statistical Or Peak Bandwidth Allocation Algorithm: it allocate resources at the peak cell rate of the connection.  Merit : It is simple to implement  Demerit : lead to gross underutilization(CAC will allocate resources to peak rate but data which will not arrive at peak rate suffers). Statistical CAC Algorithm : Using statistical allocation the sum of peak rate of all the connections can exceed the link capacity. A parameter called Statistical gain measure advantage over non statistical algorithm (i.e.) ratio of connection admitted with statistical multiplexing to the connection admitted with non statistical allocation.  Merit : These connections do better resource utilization & performance efficient.  Demerit : Difficult to implement.
  • 8.  Minimum processing complexity: Because ATM switch operates in real time and require connection establishment and release requests to be served with minimum latency. CAC algorithms should be easy to implement.  Model independence : CAC algorithm should be model independent Because as we have seen 2nd element of traffic management is traffic shaping , in altering shape of model , CAC algorithm will also Alter.  Balance between cell loss and link utilization: cell loss directly concern with user and link utilization concern with network. Low link utilization and greater bandwidth allocation lead to low cell loss or vice versa.  Algorithm should be scalable(computation required should be independent of number of connections).
  • 9.  It provides the means to alter traffic characteristics of connection and deliver a more predictable, conforming traffic to the network.  It uses “Leaky Bucket” mechanism.  Mechanism that alter the traffic characteristics of stream of cells on VCC and VPC to achieve desired traffic characteristics , in order to ensure conformance or to achieve better network efficiency to meet QoS objectives
  • 10.  (HOST COMPUTER) Bursty Flow(PACKETS)    Discarded drop of water Fixed flow of water  Leaky bucket shapes Busty traffic into fixed rate traffic by averaging data rate.  In this mechanism peak cell rate is reduced to get Stability.  It makes traffic characteristics more predictable. Bucket Tap Source system Gives busty data Data stored in buffer Lowers the data rate Stabilize traffic with lower peak cell rate
  • 11. ARRIVAL FUL L? Y E S NO QUEUE LEAK Y PROCESSOR 0 2 7 10 0 10 12 mbps Time: 0-2 12*2:24 mbits 2 mbps 2*3:6 mbits After algo 3 mbps Time :0-10 3*10:30mbits
  • 12.  It provides means to ensure that the connection adheres(compatible) to the parameters of its traffic contract and non conforming connections are penalized.  It uses “usage parameter control/network parameter control” policing mechanism.  Set of actions taken by the network to monitor and ensure that the traffic contract is represented in terms of traffic offered at the user access and the network access respectively.
  • 13.  Mechanism to monitor traffic and enforce the traffic contract is called as usage passage control(UPC).  Depending on traffic monitoring at UNI called UPC or NNI the monitoring functions called NPC respectively.  UPC applies to both user connections and signalling channels, implies along with controlling amount of user cell ,it also monitor amount of signalling information entering the network.  Commonly used algorithm is GENERIC CELL RATE ALGORITHM(GCRA).
  • 14.  It define conformance of cell with respect to negotiated traffic control(conformance means cells arrive either at time or after).  Defined in terms of 2 parameters i.e. GCRA(I,L): › Increment(I) that specify when next cell is excepted. › Limit (L) that specify permissible deviation from expected arrival time.  Checks conformance of traffic contract using twin concept i.e. › Expected arrival time =Theoretical arrival time (TAT). › Actual arrival time.  All cells arriving before time are marked as non conforming cells
  • 15. Conformance of a cell is decided on the basis of TAT as following: 1st incoming cell initialize algorithm Set TAT of cell 1 .......(.i.e.) TAT1 = ta(1). For kth cell conformance is decided on basis of TATk, CASE I if k arrives after TATk cell is declared as conforming. For k+1 cell TAT = TATk+1 is set to ta(k)+I , k is incremented. CASE II If cell arrive between TATk and TATk-L cell is declared as conforming. TAT for next cell will be TATk+I not ta(k)+I. CASE III If cell arrive before TATk – L  cell is declared as Non- conforming. TAT for next cell is TATk.
  • 16.
  • 17.  Bucket of capacity (I+L), where each cell pour I data into it.  Bucket is leaking @ 1data unit/time unit.  Capacity of bucket is X at any time instance.  Incoming cell is conforming if at its arrival the fluid in bucket <= L, otherwise it is non conforming.  Algorithm maintains last conformance time(LCT) which store the last time the conforming cell was accepted.  The amount of fluid drained since LCT is subtracted from bucket capacity i.e. X*=X-(ta(k)-LCT).
  • 18.  Cell passing – cell simply pass through, network is lightly loaded . It result in better utilization of network resources, but while overloading it is not preferred.  Cell tagging – cell loss priority (CLP) bit in ATM: CLP=0 (high priority/conforming cells) CLP=1 (low priority/non conforming cells).Marking of CLP bit in ATM header marked as 1.  Cell discarding – simply cell dumping.
  • 19.  It ensures that the Packets with higher priority should be preferable over the Packets with lower priority.  Processing every cell according to the priority will mean additional delays , which might not be acceptable to network users.  It uses “Selective Cell Discard” mechanism.  Mainly this algorithm is based on CLP(Cell Loss Priority) bit of ATM header , as we know ATM Header include 48 bits payload and 5 bits header(1bit for Header error control=CLP).
  • 20.  Mechanism discard cell based on priority .  Cell with CLP bit = 1, consider as low priority.  Cell with CLP bit = 0 , consider as high priority.  If network is forced to drop some cells , the network selectively drops the cells with lower priority.  Example: layered video encoder ,having unequal priority, where two data streams are produced having essential(provide average picture quality) and enhancement layer(improve picture quality). • 0011 • 1100 1 • 1111 • 0000 0 • 1010 • 0101 1 11110 00000
  • 21.  It ensure the synchronisation between sender and receiver i.e. sender’s sending capacity should not be greater than receiver’s receiving capacity.  No hop by hop flow control for error correction.  Used to optimize bandwidth utilization by feed back mechanism.  Feedback mechanisms are “Generic Flow Control” and “ABR Flow Control” mechanism.  GFC provides a link level flow control mechanism to control data offered at UNI.  ABR flow control is a fast resource management mechanism to utilize any lower bandwidth in the network for connection belonging to ABR service category.
  • 22.  It is a link level flow control scheme to control amount of data flowing at the UNI.  Applicable to data flowing in forward direction (user to Network).  In UNI cell header , there are 4 bits for GFC across UNI and access control with in customer premises network(CNP).  GFC used to control flow of traffic from various ATM connections and to limit the transmission capacity at the UNI interface.  Scope of GFC depend on configuration of end system . It can be controlled configuration or uncontrolled configuration.  GFC is not for uncontrolled system equipment.
  • 23.  Controlled connection: connection whose cell emission rate is controlled by GFC signals . No resource is reserved in advance for controlled connections. Connection belonging to ABR,GFR etc services are examples of connections that can controlled.  Uncontrolled connections: connections whose cell emission rate is not controlled by GFC signals (except HALT), resources are reserved in advance. Connection belonging to CBR service are generally uncontrolled.
  • 24. • Terminal is controlled and controlled ATM connection Group B • Terminal is controlled and controlled ATM connection Group A • Terminal is controlled . Cell is assigned on an uncontrolled ATM connection • Terminal is uncontrolled . Cell is assigned on uncontrolled ATM Connection. 0000 0001 00110101 Bit values for GFC bits:
  • 25.  GFC procedures assumes master slave relationship between network and user, where network referred as controlling and end system as controlled equipment.  GFC signals are as follows: › HALT: To stop transmission of assigned ATM layer cells for both controlled and uncontrolled ATM connections . This signal is sent to limit the amount of cell generated by ATM end system at UNI. E.g.. HALT and NO_HALT signal is sent alternatively , transmission capacity reduced to half. › SET: controlling devices issues SET signal to counter to specified integer value . Counter specifies the maximum data the controlled device can send. › NULL: control devices send this to show no action is taken.
  • 26. GFC Bits in network to User Connection 1 2 3 4 Indicates HALT(1)/NO_HALT(0) IN 1-q model , set to 0 IN 2-q model , indicates SET(1)/NULL(0) for Class B In I-q model, indicates SET(1)/NULL(0) In 2-q model , indicates SET(1)/NULL for Class A Reserve for future use , set to 0
  • 27.  ABR stands for “Available bit rate”.  ABR does not provide any QoS guarantee but It ensures efficient means to access bandwidth available in network for which a flow control feedback loop is used.  Two control approaches are there: › Credit based flow control: HOP BY HOP flow control mechanism. Source receives credit from next hop which specify the amount of data to be sent by source. For every cell sent , sender decrement the credit available. At credit=0,sender prohibited to send next data. › Rate based flow control: END TO END feedback flow control mechanism. There is one feedback loop from the source to destination. Destination send control information to source and intermediate node can change it and forward it to the source.
  • 28. Credit-based Desirable because in temporary condition , all nodes have to stop sending credits to previous hops. Require per – link per VC monitoring , which complicates the design and hampers scalability. Rate-based There will be delay in feedback from destination to source even in case of temporary condition. Simple , Scalable and does not require state information of a no. of VCs to be stored in intermediate switches.
  • 29.  “CAC” is an example of preventive mechanism.  It provides means to ensure the total traffic on a network is below its carrying capacity.  It uses “Selective Cell Discard”, “ Frame Discard” and “Explicit Forward Congestion indication” mechanisms .  Selective Cell Discard based on CLP(Cell loss priority).  Frame discard policy discard full IP packet instead of a cell.  Explicit forward congestion notification used to assist the network in avoidance of and recovery from congestion state.
  • 30.  Large IP packets are segmented into number of cells.  During congestion if one of the cell belonging to IP packet is dropped, the remaining cells carried by ATM network become dead cells because they don’t reassemble properly, this can cause congestion to great extent.  So to discard a frame it will be enough to discard 1 from it.  Now to tackle this problem of frame discard few schemes are there: › Partial packet discard › Early packet discard › Random early discard
  • 32.  Partial packet discard(PPD): if one cell from a frame is discarded whole frame is dropped than. Last frame cell is not discarded as it indicate loss to the receiver. › Drawback: Some of the dead cells are still carried till the destination .  Early packet discard(EPD): an entire frame is discarded instead of carrying dead cell to the receiver and avoid overflowing of the buffer . › Drawback: lead to low bandwidth flow.  Random Early discard(RED):Per flow buffer accounting .It achieves fairness along with early packet discard benefits. Whenever the queue size in buffer exceeds certain threshold ,incoming packet is dropped with certain probability.
  • 33.
  • 34. Congestion Control Flow Control Global Issue. . Joint responsibility of user and network  Main task is to . ensure that subnet is able to carry the offered load Local Issue . Issue between . sender and reciever. Main task is to . ensure that a fast sender does not overwhelm a slow receiver.
  • 35.  Congestion notification is sent to the destination.  In this congestion bit in ATM header is set to 1 to indicate congestion in the network.  After receiving this notification destination communicate to source to slow down the transmission rate (in source to destination direction).  This depend upon the protocols running at the end system how destination conveys this information , no standard procedure exist .