SlideShare a Scribd company logo
Congestion Control
24.2
24-1 DATA TRAFFIC
The main focus of congestion control and quality of
service is data traffic. In congestion control we try to
avoid traffic congestion. In quality of service, we try to
create an appropriate environment for the traffic. So,
before talking about congestion control and quality of
service, we discuss the data traffic itself.
Traffic Descriptor
Traffic Profiles
Topics discussed in this section:
24.3
Figure 24.1 Traffic descriptors
24.4
Figure 24.2 Three traffic profiles
24.5
24-2 CONGESTION
Congestion in a network may occur if the load on the
network—the number of packets sent to the network—is
greater than the capacity of the network—the number of
packets a network can handle. Congestion control refers
to the mechanisms and techniques to control the
congestion and keep the load below the capacity.
Network Performance
Topics discussed in this section:
Congestion Control Algorithms
• Congestion - the situation in which too
many packets are present in the subnet.
Causes of Congestion
• Congestion occurs when a router receives
data faster than it can send it
– Insufficient bandwidth
– Slow hosts
– Data simultaneously arriving from multiple
lines destined for the same outgoing line.
• The system is not balanced
– Correcting the problem at one router will
probably just move the bottleneck to another
router.
Congestion Causes More Congestion
– Incoming messages must be placed in queues
• The queues have a finite size
– Overflowing queues will cause packets to be dropped
– Long queue delays will cause packets to be resent
– Dropped packets will cause packets to be resent
• Senders that are trying to transmit to a congested
destination also become congested
– They must continually resend packets that have been
dropped or that have timed-out
– They must continue to hold outgoing/unacknowledged
messages in memory.
Congestion Control versus Flow Control
• Flow control
– controls point-to-point traffic between sender
and receiver
– e.g., a fast host sending to a slow host
• Congestion Control
– controls the traffic throughout the network
24.10
24-3 CONGESTION CONTROL
Congestion control refers to techniques and mechanisms
that can either prevent congestion, before it happens, or
remove congestion, after it has happened. In general,
we can divide congestion control mechanisms into two
broad categories: open-loop congestion control
(prevention) and closed-loop congestion control
(removal).
Open-Loop Congestion Control
Closed-Loop Congestion Control
Topics discussed in this section:
11
Congestion Control
• When one part of the subnet (e.g. one or more
routers in an area) becomes overloaded,
congestion results.
• Because routers are receiving packets faster than
they can forward them, one of two things must
happen:
– The subnet must prevent additional packets from
entering the congested region until those already
present can be processed.
– The congested routers can discard queued packets to
make room for those that are arriving.
Two Categories of Congestion Control
• Open loop solutions
– Attempt to prevent problems rather than
correct them
– Does not utilize runtime feedback from the
system
• Closed loop solutions
– Uses feedback (measurements of system
performance) to make corrections at runtime.
November 4, 2016 Veton Këpuska 13
General Principles of Congestion Control
• Analogy with Control Theory:
– Open-loop, and
– Closed-loop approach.
• Open-loop approach
– Problem is solved at the design cycle
– Once the system is running midcourse correction are NOT made.
– Tools for doing open-loop control:
• Deciding when to accept new traffic,
• Deciding when to disregard packets and which ones.
• Making scheduling decision at various points in the network.
• Note that all those decisions are made without regard to the current state of the
network.
November 4, 2016 Veton Këpuska 14
General Principles of Congestion Control
• Closed-loop approach
– It is based on the principle of feedback-loop. The approach has
three parts when applied to congestion control:
1. Monitor the system to detect when and where congestion occurs,
2. Pass this information tot places where action can be taken
3. Adjust system operation to correct the problem.
24.15
Figure 24.5 Congestion control categories
16
Warning Bit/ Backpressure
• A special bit in the packet header is set by the
router to warn the source when congestion is
detected.
• The bit is copied and piggy-backed on the ACK
and sent to the sender.
• The sender monitors the number of ACK
packets it receives with the warning bit set
and adjusts its transmission rate accordingly.
24.17
Figure 24.6 Backpressure method for alleviating congestion
18
Choke Packets
• A more direct way of telling the source to
slow down.
• A choke packet is a control packet
generated at a congested node and
transmitted to restrict traffic flow.
• The source, on receiving the choke packet
must reduce its transmission rate by a
certain percentage.
• An example of a choke packet is the ICMP
Source Quench Packet.
24.19
Figure 24.7 Choke packet
Open-Loop Control
• Network performance is guaranteed to all
traffic flows that have been admitted into the
network
• Initially for connection-oriented networks
• Key Mechanisms
– Admission Control
– Policing
– Traffic Shaping
– Traffic Scheduling
Time
Bits/second
Peak rate
Average rate
Typical bit rate demanded by
a variable bit rate information
source
Admission Control
• Flows negotiate contract with
network
• Specify requirements:
– Peak, Avg., Min Bit rate
– Maximum burst size
– Delay, Loss requirement
• Network computes resources
needed
– “Effective” bandwidth
• If flow accepted, network
allocates resources to ensure
QoS delivered as long as
source conforms to contract
Policing
• Network monitors traffic flows continuously to ensure
they meet their traffic contract
• When a packet violates the contract, network can discard
or tag the packet giving it lower priority
• If congestion occurs, tagged packets are discarded first
• Leaky Bucket Algorithm is the most commonly used
policing mechanism
– Bucket has specified leak rate for average contracted rate
– Bucket has specified depth to accommodate variations in arrival
rate
– Arriving packet is conforming if it does not result in overflow
23
Traffic Shaping
• Another method of congestion control is to
“shape” the traffic before it enters the
network.
• Traffic shaping controls the rate at which
packets are sent (not just how many). Used
in ATM and Integrated Services networks.
• At connection set-up time, the sender and
carrier negotiate a traffic pattern (shape).
• Two traffic shaping algorithms are:
– Leaky Bucket
– Token Bucket
24
The Leaky Bucket Algorithm
• The Leaky Bucket Algorithm used to control
rate in a network. It is implemented as a
single-server queue with constant service
time. If the bucket (buffer) overflows then
packets are discarded.
25
The Leaky Bucket Algorithm
(a) A leaky bucket with water. (b) a leaky bucket with
packets.
26
Leaky Bucket Algorithm, cont.
• The leaky bucket enforces a constant output rate
(average rate) regardless of the burstiness of the
input. Does nothing when input is idle.
• The host injects one packet per clock tick onto the
network. This results in a uniform flow of packets,
smoothing out bursts and reducing congestion.
• When packets are the same size (as in ATM cells),
the one packet per tick is okay. For variable length
packets though, it is better to allow a fixed number
of bytes per tick. E.g. 1024 bytes per tick will allow
one 1024-byte packet or two 512-byte packets or
four 256-byte packets on 1 tick.
24.27
Figure 24.19 Leaky bucket
24.28
Figure 24.20 Leaky bucket implementation
24.29
A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging the
data rate. It may drop the packets if the bucket is full.
Note
24.30
The token bucket allows bursty traffic at a regulated maximum rate.
Note
Incoming traffic Shaped traffic
Size N
Packet
Server
Leaky Bucket Traffic Shaper
• Buffer incoming packets
• Play out periodically to conform to parameters
• Surges in arrivals are buffered & smoothed out
• Possible packet loss due to buffer overflow
• Too restrictive, since conforming traffic does not need to
be completely smooth
32
Token Bucket Algorithm
• In contrast to the LB, the Token Bucket Algorithm,
allows the output rate to vary, depending on the
size of the burst.
• In the TB algorithm, the bucket holds tokens. To
transmit a packet, the host must capture and
destroy one token.
• Tokens are generated by a clock at the rate of one
token every t sec.
• Idle hosts can capture and save up tokens (up to
the max. size of the bucket) in order to send
larger bursts later.
33
The Token Bucket Algorithm
(a) Before. (b) After.
5-34
24.34
Figure 24.21 Token bucket
Incoming traffic Shaped traffic
Size N
Size K
Tokens arrive
periodically
Server
Packet
Token
Token Bucket Traffic Shaper
• Token rate regulates transfer of packets
• If sufficient tokens available, packets enter network without delay
• K determines how much burstiness allowed into the network
An incoming packet must
have sufficient tokens
before admission into the
network
36
Leaky Bucket vs Token Bucket
• LB discards packets; TB does not. TB
discards tokens.
• With TB, a packet can only be transmitted if
there are enough tokens to cover its length
in bytes.
• LB sends packets at an average rate. TB
allows for large bursts to be sent faster by
speeding up the output.
• TB allows saving up tokens (permissions) to
send large bursts. LB does not allow saving.
37
Load Shedding
• When buffers become full, routers simply discard
packets.
• Which packet is chosen to be the victim depends on
the application and on the error strategy used in the
data link layer.
• For a file transfer, for, e.g. cannot discard older
packets since this will cause a gap in the received
data.
• For real-time voice or video it is probably better to
throw away old data and keep new packets.
• Get the application to mark packets with discard
priority.

More Related Content

What's hot

Data link layer
Data link layerData link layer
Data link layer
sbkbca
 
Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
Venkata Sreeram
 
Stop-and-Wait ARQ Protocol
Stop-and-Wait ARQ ProtocolStop-and-Wait ARQ Protocol
Stop-and-Wait ARQ Protocol
praneetayargattikar
 
Error control
Error controlError control
Error control
selvakumar_b1985
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
Hinal Lunagariya
 
Network Layer
Network LayerNetwork Layer
Network Layer
Dr Shashikant Athawale
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
Meenakshi Paul
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
Sudhanshu Srivastava
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
Taimoor Muzaffar Gondal
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
Saikrishna Tanguturu
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
Ahtesham Ullah khan
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
Naiyan Noor
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
Naveen Dubey
 
Ethernet
EthernetEthernet
Ethernet
sijil chacko
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
IIIT Manipur
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
Sparsh Samir
 

What's hot (20)

Gsm radio-interface
Gsm radio-interfaceGsm radio-interface
Gsm radio-interface
 
Data link layer
Data link layerData link layer
Data link layer
 
Stop and-wait protocol
Stop and-wait protocolStop and-wait protocol
Stop and-wait protocol
 
Stop-and-Wait ARQ Protocol
Stop-and-Wait ARQ ProtocolStop-and-Wait ARQ Protocol
Stop-and-Wait ARQ Protocol
 
Error control
Error controlError control
Error control
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)Presentation on cyclic redundancy check (crc)
Presentation on cyclic redundancy check (crc)
 
Data Link Layer| Error Detection
Data Link Layer| Error DetectionData Link Layer| Error Detection
Data Link Layer| Error Detection
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
Ethernet
EthernetEthernet
Ethernet
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 

Similar to Congestion control 1

Congestion Control
Congestion ControlCongestion Control
Congestion Control
VaishnaviVaishnavi17
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
SushmaShivani
 
Chap24
Chap24Chap24
Chap24
Waqas !!!!
 
Conjestion control
Conjestion controlConjestion control
Conjestion control
Barani Tharan
 
Congestion control and quality of service
Congestion control and quality of serviceCongestion control and quality of service
Congestion control and quality of service
JUW Jinnah University for Women
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
payal445263
 
NZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBRNZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBR
APNIC
 
Quality of service
Quality of serviceQuality of service
Quality of service
arya krazydude
 
Transport layer
Transport layerTransport layer
Transport layer
arvind pandey
 
ch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.pptch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.ppt
praveenkulkarni55
 
ch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.pptch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.ppt
AbyThomas54
 
Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet working
TharuniDiddekunta
 
Congestion control algorithms.pptx
Congestion control algorithms.pptxCongestion control algorithms.pptx
Congestion control algorithms.pptx
ujjwalmatoliya
 
congestion control data communication.pdf
congestion control data communication.pdfcongestion control data communication.pdf
congestion control data communication.pdf
nqck82120b
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdf
Shivakrishnan18
 
Congestion control
Congestion controlCongestion control
Congestion control
Congestion controlCongestion control
Congestion control
nandhulaks
 
Quality of service
Quality of serviceQuality of service
Quality of service
Ismail Mukiibi
 
Congestion_Control09.ppt
Congestion_Control09.pptCongestion_Control09.ppt
Congestion_Control09.ppt
tahaniali27
 
congestion ujjwal matoliya.pptx
congestion ujjwal matoliya.pptxcongestion ujjwal matoliya.pptx
congestion ujjwal matoliya.pptx
ujjwalmatoliya
 

Similar to Congestion control 1 (20)

Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
 
Chap24
Chap24Chap24
Chap24
 
Conjestion control
Conjestion controlConjestion control
Conjestion control
 
Congestion control and quality of service
Congestion control and quality of serviceCongestion control and quality of service
Congestion control and quality of service
 
QoSintro.PPT
QoSintro.PPTQoSintro.PPT
QoSintro.PPT
 
NZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBRNZNOG 2020: Buffers, Buffer Bloat and BBR
NZNOG 2020: Buffers, Buffer Bloat and BBR
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
Transport layer
Transport layerTransport layer
Transport layer
 
ch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.pptch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.ppt
 
ch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.pptch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.ppt
 
Congection control and Internet working
Congection control and Internet workingCongection control and Internet working
Congection control and Internet working
 
Congestion control algorithms.pptx
Congestion control algorithms.pptxCongestion control algorithms.pptx
Congestion control algorithms.pptx
 
congestion control data communication.pdf
congestion control data communication.pdfcongestion control data communication.pdf
congestion control data communication.pdf
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdf
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
Congestion_Control09.ppt
Congestion_Control09.pptCongestion_Control09.ppt
Congestion_Control09.ppt
 
congestion ujjwal matoliya.pptx
congestion ujjwal matoliya.pptxcongestion ujjwal matoliya.pptx
congestion ujjwal matoliya.pptx
 

More from Aman Jaiswal

Transport protocols
Transport protocolsTransport protocols
Transport protocols
Aman Jaiswal
 
Chapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyChapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topology
Aman Jaiswal
 
Bca 221 network fundamentals
Bca 221 network fundamentalsBca 221 network fundamentals
Bca 221 network fundamentals
Aman Jaiswal
 
1network security encryption_methods-1
1network security encryption_methods-11network security encryption_methods-1
1network security encryption_methods-1
Aman Jaiswal
 
06 1 routing_algorithms
06 1 routing_algorithms06 1 routing_algorithms
06 1 routing_algorithms
Aman Jaiswal
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
Aman Jaiswal
 
Transmission medium
Transmission mediumTransmission medium
Transmission medium
Aman Jaiswal
 
Osi
OsiOsi
Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02
Aman Jaiswal
 
Ch03
Ch03Ch03
Dc unit i
Dc unit iDc unit i
Dc unit i
Aman Jaiswal
 

More from Aman Jaiswal (12)

Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Rules
RulesRules
Rules
 
Chapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyChapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topology
 
Bca 221 network fundamentals
Bca 221 network fundamentalsBca 221 network fundamentals
Bca 221 network fundamentals
 
1network security encryption_methods-1
1network security encryption_methods-11network security encryption_methods-1
1network security encryption_methods-1
 
06 1 routing_algorithms
06 1 routing_algorithms06 1 routing_algorithms
06 1 routing_algorithms
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Transmission medium
Transmission mediumTransmission medium
Transmission medium
 
Osi
OsiOsi
Osi
 
Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02Networkingdevices 120505003202-phpapp02
Networkingdevices 120505003202-phpapp02
 
Ch03
Ch03Ch03
Ch03
 
Dc unit i
Dc unit iDc unit i
Dc unit i
 

Recently uploaded

2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
luforfor
 
一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单
zvaywau
 
IrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptxIrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptx
Aine Greaney Ellrott
 
Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)
SuryaKalyan3
 
Sundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Slot gacor dan terpercaya mudah menangSundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Situs Slot gacor dan terpercaya
 
Caffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonCaffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire Wilson
ClaireWilson398082
 
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
taqyed
 
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives ProjectthGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
Marc Dusseiller Dusjagr
 
2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories
luforfor
 
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
iraqartsandculture
 
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERSART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
Sandhya J.Nair
 
CLASS XII- HISTORY-THEME 4-Thinkers, Bes
CLASS XII- HISTORY-THEME 4-Thinkers, BesCLASS XII- HISTORY-THEME 4-Thinkers, Bes
CLASS XII- HISTORY-THEME 4-Thinkers, Bes
aditiyad2020
 
acting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaacting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaa
angelicafronda7
 
Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)
SuryaKalyan3
 
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
zvaywau
 
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
beduwt
 
ashokathegreat project class 12 presentation
ashokathegreat project class 12 presentationashokathegreat project class 12 presentation
ashokathegreat project class 12 presentation
aditiyad2020
 
Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)
CristianMestre
 
The Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance LindallThe Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance Lindall
BBaez1
 

Recently uploaded (20)

2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...2137ad  Merindol Colony Interiors where refugee try to build a seemengly norm...
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
 
一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单
 
IrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptxIrishWritersCtrsPersonalEssaysMay29.pptx
IrishWritersCtrsPersonalEssaysMay29.pptx
 
Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)Memory Rental Store - The Ending(Storyboard)
Memory Rental Store - The Ending(Storyboard)
 
Sundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Slot gacor dan terpercaya mudah menangSundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Slot gacor dan terpercaya mudah menang
 
European Cybersecurity Skills Framework Role Profiles.pdf
European Cybersecurity Skills Framework Role Profiles.pdfEuropean Cybersecurity Skills Framework Role Profiles.pdf
European Cybersecurity Skills Framework Role Profiles.pdf
 
Caffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonCaffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire Wilson
 
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
一比一原版(qut毕业证)昆士兰科技大学毕业证如何办理
 
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives ProjectthGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
 
2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories
 
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
The Last Polymath: Muntadher Saleh‎‎‎‎‎‎‎‎‎‎‎‎
 
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERSART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
 
CLASS XII- HISTORY-THEME 4-Thinkers, Bes
CLASS XII- HISTORY-THEME 4-Thinkers, BesCLASS XII- HISTORY-THEME 4-Thinkers, Bes
CLASS XII- HISTORY-THEME 4-Thinkers, Bes
 
acting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaacting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaa
 
Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)
 
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
一比一原版(GU毕业证)格里菲斯大学毕业证成绩单
 
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
 
ashokathegreat project class 12 presentation
ashokathegreat project class 12 presentationashokathegreat project class 12 presentation
ashokathegreat project class 12 presentation
 
Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)Inter-Dimensional Girl Boards Segment (Act 3)
Inter-Dimensional Girl Boards Segment (Act 3)
 
The Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance LindallThe Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance Lindall
 

Congestion control 1

  • 2. 24.2 24-1 DATA TRAFFIC The main focus of congestion control and quality of service is data traffic. In congestion control we try to avoid traffic congestion. In quality of service, we try to create an appropriate environment for the traffic. So, before talking about congestion control and quality of service, we discuss the data traffic itself. Traffic Descriptor Traffic Profiles Topics discussed in this section:
  • 4. 24.4 Figure 24.2 Three traffic profiles
  • 5. 24.5 24-2 CONGESTION Congestion in a network may occur if the load on the network—the number of packets sent to the network—is greater than the capacity of the network—the number of packets a network can handle. Congestion control refers to the mechanisms and techniques to control the congestion and keep the load below the capacity. Network Performance Topics discussed in this section:
  • 6. Congestion Control Algorithms • Congestion - the situation in which too many packets are present in the subnet.
  • 7. Causes of Congestion • Congestion occurs when a router receives data faster than it can send it – Insufficient bandwidth – Slow hosts – Data simultaneously arriving from multiple lines destined for the same outgoing line. • The system is not balanced – Correcting the problem at one router will probably just move the bottleneck to another router.
  • 8. Congestion Causes More Congestion – Incoming messages must be placed in queues • The queues have a finite size – Overflowing queues will cause packets to be dropped – Long queue delays will cause packets to be resent – Dropped packets will cause packets to be resent • Senders that are trying to transmit to a congested destination also become congested – They must continually resend packets that have been dropped or that have timed-out – They must continue to hold outgoing/unacknowledged messages in memory.
  • 9. Congestion Control versus Flow Control • Flow control – controls point-to-point traffic between sender and receiver – e.g., a fast host sending to a slow host • Congestion Control – controls the traffic throughout the network
  • 10. 24.10 24-3 CONGESTION CONTROL Congestion control refers to techniques and mechanisms that can either prevent congestion, before it happens, or remove congestion, after it has happened. In general, we can divide congestion control mechanisms into two broad categories: open-loop congestion control (prevention) and closed-loop congestion control (removal). Open-Loop Congestion Control Closed-Loop Congestion Control Topics discussed in this section:
  • 11. 11 Congestion Control • When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. • Because routers are receiving packets faster than they can forward them, one of two things must happen: – The subnet must prevent additional packets from entering the congested region until those already present can be processed. – The congested routers can discard queued packets to make room for those that are arriving.
  • 12. Two Categories of Congestion Control • Open loop solutions – Attempt to prevent problems rather than correct them – Does not utilize runtime feedback from the system • Closed loop solutions – Uses feedback (measurements of system performance) to make corrections at runtime.
  • 13. November 4, 2016 Veton Këpuska 13 General Principles of Congestion Control • Analogy with Control Theory: – Open-loop, and – Closed-loop approach. • Open-loop approach – Problem is solved at the design cycle – Once the system is running midcourse correction are NOT made. – Tools for doing open-loop control: • Deciding when to accept new traffic, • Deciding when to disregard packets and which ones. • Making scheduling decision at various points in the network. • Note that all those decisions are made without regard to the current state of the network.
  • 14. November 4, 2016 Veton Këpuska 14 General Principles of Congestion Control • Closed-loop approach – It is based on the principle of feedback-loop. The approach has three parts when applied to congestion control: 1. Monitor the system to detect when and where congestion occurs, 2. Pass this information tot places where action can be taken 3. Adjust system operation to correct the problem.
  • 15. 24.15 Figure 24.5 Congestion control categories
  • 16. 16 Warning Bit/ Backpressure • A special bit in the packet header is set by the router to warn the source when congestion is detected. • The bit is copied and piggy-backed on the ACK and sent to the sender. • The sender monitors the number of ACK packets it receives with the warning bit set and adjusts its transmission rate accordingly.
  • 17. 24.17 Figure 24.6 Backpressure method for alleviating congestion
  • 18. 18 Choke Packets • A more direct way of telling the source to slow down. • A choke packet is a control packet generated at a congested node and transmitted to restrict traffic flow. • The source, on receiving the choke packet must reduce its transmission rate by a certain percentage. • An example of a choke packet is the ICMP Source Quench Packet.
  • 20. Open-Loop Control • Network performance is guaranteed to all traffic flows that have been admitted into the network • Initially for connection-oriented networks • Key Mechanisms – Admission Control – Policing – Traffic Shaping – Traffic Scheduling
  • 21. Time Bits/second Peak rate Average rate Typical bit rate demanded by a variable bit rate information source Admission Control • Flows negotiate contract with network • Specify requirements: – Peak, Avg., Min Bit rate – Maximum burst size – Delay, Loss requirement • Network computes resources needed – “Effective” bandwidth • If flow accepted, network allocates resources to ensure QoS delivered as long as source conforms to contract
  • 22. Policing • Network monitors traffic flows continuously to ensure they meet their traffic contract • When a packet violates the contract, network can discard or tag the packet giving it lower priority • If congestion occurs, tagged packets are discarded first • Leaky Bucket Algorithm is the most commonly used policing mechanism – Bucket has specified leak rate for average contracted rate – Bucket has specified depth to accommodate variations in arrival rate – Arriving packet is conforming if it does not result in overflow
  • 23. 23 Traffic Shaping • Another method of congestion control is to “shape” the traffic before it enters the network. • Traffic shaping controls the rate at which packets are sent (not just how many). Used in ATM and Integrated Services networks. • At connection set-up time, the sender and carrier negotiate a traffic pattern (shape). • Two traffic shaping algorithms are: – Leaky Bucket – Token Bucket
  • 24. 24 The Leaky Bucket Algorithm • The Leaky Bucket Algorithm used to control rate in a network. It is implemented as a single-server queue with constant service time. If the bucket (buffer) overflows then packets are discarded.
  • 25. 25 The Leaky Bucket Algorithm (a) A leaky bucket with water. (b) a leaky bucket with packets.
  • 26. 26 Leaky Bucket Algorithm, cont. • The leaky bucket enforces a constant output rate (average rate) regardless of the burstiness of the input. Does nothing when input is idle. • The host injects one packet per clock tick onto the network. This results in a uniform flow of packets, smoothing out bursts and reducing congestion. • When packets are the same size (as in ATM cells), the one packet per tick is okay. For variable length packets though, it is better to allow a fixed number of bytes per tick. E.g. 1024 bytes per tick will allow one 1024-byte packet or two 512-byte packets or four 256-byte packets on 1 tick.
  • 28. 24.28 Figure 24.20 Leaky bucket implementation
  • 29. 24.29 A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging the data rate. It may drop the packets if the bucket is full. Note
  • 30. 24.30 The token bucket allows bursty traffic at a regulated maximum rate. Note
  • 31. Incoming traffic Shaped traffic Size N Packet Server Leaky Bucket Traffic Shaper • Buffer incoming packets • Play out periodically to conform to parameters • Surges in arrivals are buffered & smoothed out • Possible packet loss due to buffer overflow • Too restrictive, since conforming traffic does not need to be completely smooth
  • 32. 32 Token Bucket Algorithm • In contrast to the LB, the Token Bucket Algorithm, allows the output rate to vary, depending on the size of the burst. • In the TB algorithm, the bucket holds tokens. To transmit a packet, the host must capture and destroy one token. • Tokens are generated by a clock at the rate of one token every t sec. • Idle hosts can capture and save up tokens (up to the max. size of the bucket) in order to send larger bursts later.
  • 33. 33 The Token Bucket Algorithm (a) Before. (b) After. 5-34
  • 35. Incoming traffic Shaped traffic Size N Size K Tokens arrive periodically Server Packet Token Token Bucket Traffic Shaper • Token rate regulates transfer of packets • If sufficient tokens available, packets enter network without delay • K determines how much burstiness allowed into the network An incoming packet must have sufficient tokens before admission into the network
  • 36. 36 Leaky Bucket vs Token Bucket • LB discards packets; TB does not. TB discards tokens. • With TB, a packet can only be transmitted if there are enough tokens to cover its length in bytes. • LB sends packets at an average rate. TB allows for large bursts to be sent faster by speeding up the output. • TB allows saving up tokens (permissions) to send large bursts. LB does not allow saving.
  • 37. 37 Load Shedding • When buffers become full, routers simply discard packets. • Which packet is chosen to be the victim depends on the application and on the error strategy used in the data link layer. • For a file transfer, for, e.g. cannot discard older packets since this will cause a gap in the received data. • For real-time voice or video it is probably better to throw away old data and keep new packets. • Get the application to mark packets with discard priority.