SlideShare a Scribd company logo
Topic: Congestion control
23-Nov-19 1
Traffic Jam
Data Jam
Congestion Control -
Data Traffic
23-Nov-19 2Congestion Control -
The main focus of Congestion Control and
quality of service is data traffic.
Congestion control: To avoid Traffic Congestion
Quality of Service: To create an appropriate environment for the traffic
Traffic Description
1. Average data rate
2. Peak data rate
3. Maximum Burst size
4. Effective Bandwidth
23-Nov-19 3Congestion Control -
Data Traffic
ADR=Amt of Data/Time
Average Data Rate: Indicates the average bandwidth needed by the traffic
Peak Data Rate: Maximum data rate of the traffic. Peak bandwidth needs for traffic to pass
through without changing its data flow.
Max Burst Size: Maximum length of time the traffic is generated at the peak rate.
Effective bandwidth: Network needs to allocate for the flow of traffic:
Traffic Profiles
23-Nov-19 4Congestion Control -
Data flow have one of the traffic profiles:
Constant bit Rate: Fixed rate does not change. Both avg and peak rate are same. Very easy
since it is predictable
Variable bit Rate: May change in time smooth, average data rate and peak data rate are
different
Bursty data: Data rate changes suddenly in very short time. One of the main causes of
congestion in a network.
Traffic Profiles
23-Nov-19 5Congestion Control -
Congestion
23-Nov-19 6Congestion Control -
Congestion: The number of packets sent to the network is greater than the
capacity of the networks
Congestion Control: Mechanism and techniques to control
the congestion and keep the load below the capacity
Congestion
23-Nov-19 7Congestion Control -
Router: Have input and output queue for each interface.
Three steps before departing: The number of packets sent to the network is greater than
the capacity of the networks
1. Packets are put at the end of the input queue.
2. Router removes the packet from the input queue once it reaches the front of
the queue
3. Packet is put in the appropriate output queue and waits its turn to be sent
Network Performance
23-Nov-19 8Congestion Control -
Two factor for measuring performance of networks are:
1. Delay Vs Load: When the load is much less than the capacity of the network the delay is
at a minimum. When a packet is delayed the source not receiving the
acknowledgement, retransmits the packet, which makes delay and congestion.
2. Throughput Vs Load: Number of packets passing through the network in a unit of time.
When the load exceeds the capacity the queues become full and the routers have to
discard the packets.
Congestion control
23-Nov-19 9Congestion Control -
Mechanisms that can either
1.Prevent congestion, before it happens (Open loop congestion) or
2.Remove congestion, after it has happened(Closed loop congestion)
Open Loop congestion control
23-Nov-19 10Congestion Control -
1. Retransmission policy: If any lose or corrupted then Packet can be retransmit.
2. Window Policy: Use Selective reject window method
3. Ack Policy: Sending fewer acknowledgements means imposing less load on the network.
4. Discarding Policy: Router discard less sensitive packets when congestion is likely
happened.
5. Admission Policy: Quality of service mechanism(Router may deny establishing a virtual
circuit if there is congestion in network or possibility of future congestion.
Closed Loop congestion control
Backpressure method for alleviating congestion ( Warning is from one node to its upstream node
It may reach the source station.
Closed Loop congestion control
23-Nov-19 11Congestion Control -
Choke packet: Sent by a node to the source to inform it of congestion. (warning from router to
source station directly)
Implicit Signaling : When a source sends several packets and there is no acknowledgement
then the assumption is that the network is congested. The source should slow down.
Explicit Signaling : Send the direct signal is included in the packets that carry data to source
or destination in backward or forward direction.
Backward Signaling : A bit can be set in packet moving opposite direction to the congestion.
Source slow down the process
Forward Signaling : A bit can be set in packet moving in the direction of congestion. Warn
the destination to slow down the ack.
23-Nov-19 12Congestion Control -

More Related Content

What's hot

Congestion control
Congestion controlCongestion control
Congestion control
Madhusudhan G
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1
Aman Jaiswal
 
Admission control
Admission controlAdmission control
Admission control
Vishal Waghmare
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer networkDisi Dc
 
Qo s routing
Qo s  routingQo s  routing
Qo s routing
rajib_
 
Congestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCPCongestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCPAttila Balazs
 
Congestion control
Congestion controlCongestion control
Congestion control
Noushad Hasan
 
Quality of service
Quality of serviceQuality of service
Quality of service
Ismail Mukiibi
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
HayderThary
 
Congestion control
Congestion control Congestion control
Congestion control
arkaarka3
 
Quality of service
Quality of serviceQuality of service
Quality of service
arya krazydude
 
Congestion avoidance in TCP
Congestion avoidance in TCPCongestion avoidance in TCP
Congestion avoidance in TCP
selvakumar_b1985
 
Traffic profiles, congestion and network performance
Traffic profiles, congestion and network performanceTraffic profiles, congestion and network performance
Traffic profiles, congestion and network performance
Raj Parekh
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networksrapatil
 
Quality of Service
Quality  of  ServiceQuality  of  Service
Quality of Service
S. M. Shakib Limon
 
Quality of service(qos) by M.BILAL.SATTI
Quality of service(qos) by M.BILAL.SATTIQuality of service(qos) by M.BILAL.SATTI
Quality of service(qos) by M.BILAL.SATTI
Muhammad Bilal Satti
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission controlsangusajjan
 

What's hot (20)

Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1
 
Admission control
Admission controlAdmission control
Admission control
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
Qo s routing
Qo s  routingQo s  routing
Qo s routing
 
Congestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCPCongestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCP
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
Qos Quality of services
Qos   Quality of services Qos   Quality of services
Qos Quality of services
 
Congestion control
Congestion control Congestion control
Congestion control
 
Quality of service
Quality of serviceQuality of service
Quality of service
 
Congestion avoidance in TCP
Congestion avoidance in TCPCongestion avoidance in TCP
Congestion avoidance in TCP
 
Traffic profiles, congestion and network performance
Traffic profiles, congestion and network performanceTraffic profiles, congestion and network performance
Traffic profiles, congestion and network performance
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networks
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Quality of Service
Quality of ServiceQuality of Service
Quality of Service
 
Quality of Service
Quality  of  ServiceQuality  of  Service
Quality of Service
 
Quality of service(qos) by M.BILAL.SATTI
Quality of service(qos) by M.BILAL.SATTIQuality of service(qos) by M.BILAL.SATTI
Quality of service(qos) by M.BILAL.SATTI
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission control
 

Similar to Congestion control

Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
Deepak John
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
Hossam El-Deen Osama
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptx
BHAVYPATEL34
 
Transport layer
Transport layerTransport layer
Transport layer
arvind pandey
 
Internet congestion
Internet congestionInternet congestion
Internet congestion
Vikas Gupta
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
SushmaShivani
 
congestion control data communication.pdf
congestion control data communication.pdfcongestion control data communication.pdf
congestion control data communication.pdf
nqck82120b
 
Congestion control algorithms.pptx
Congestion control algorithms.pptxCongestion control algorithms.pptx
Congestion control algorithms.pptx
ujjwalmatoliya
 
DLC_23 (3).pptx
DLC_23 (3).pptxDLC_23 (3).pptx
DLC_23 (3).pptx
zulhelmanz
 
Computer Communication Networks, network layer performance.pptx
Computer Communication Networks, network layer performance.pptxComputer Communication Networks, network layer performance.pptx
Computer Communication Networks, network layer performance.pptx
Electro00
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
Taymoor Nazmy
 
Nigga.pdf
Nigga.pdfNigga.pdf
Nigga.pdf
pdegree76
 
09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt
ShaliniKumariGupta1
 
congestion ujjwal matoliya.pptx
congestion ujjwal matoliya.pptxcongestion ujjwal matoliya.pptx
congestion ujjwal matoliya.pptx
ujjwalmatoliya
 
broadband and high speed commu Chapter10.ppt
broadband and high speed commu Chapter10.pptbroadband and high speed commu Chapter10.ppt
broadband and high speed commu Chapter10.ppt
AbrahamGadissa
 
CN UNIT III.pptx
CN UNIT III.pptxCN UNIT III.pptx
CN UNIT III.pptx
VISWANATHAN R V
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
Ronoh Kennedy
 
MODULE II.ppt
MODULE II.pptMODULE II.ppt
MODULE II.ppt
SibenConor
 
MODULE II.pdf
MODULE II.pdfMODULE II.pdf
MODULE II.pdf
ADARSHN40
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdf
Shivakrishnan18
 

Similar to Congestion control (20)

Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
Data communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptxData communication network ppt_Unit_4.pptx
Data communication network ppt_Unit_4.pptx
 
Transport layer
Transport layerTransport layer
Transport layer
 
Internet congestion
Internet congestionInternet congestion
Internet congestion
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
 
congestion control data communication.pdf
congestion control data communication.pdfcongestion control data communication.pdf
congestion control data communication.pdf
 
Congestion control algorithms.pptx
Congestion control algorithms.pptxCongestion control algorithms.pptx
Congestion control algorithms.pptx
 
DLC_23 (3).pptx
DLC_23 (3).pptxDLC_23 (3).pptx
DLC_23 (3).pptx
 
Computer Communication Networks, network layer performance.pptx
Computer Communication Networks, network layer performance.pptxComputer Communication Networks, network layer performance.pptx
Computer Communication Networks, network layer performance.pptx
 
Computer network coe351- part4- final
Computer network coe351- part4- finalComputer network coe351- part4- final
Computer network coe351- part4- final
 
Nigga.pdf
Nigga.pdfNigga.pdf
Nigga.pdf
 
09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt09 Data Link LayerFlow Control.ppt
09 Data Link LayerFlow Control.ppt
 
congestion ujjwal matoliya.pptx
congestion ujjwal matoliya.pptxcongestion ujjwal matoliya.pptx
congestion ujjwal matoliya.pptx
 
broadband and high speed commu Chapter10.ppt
broadband and high speed commu Chapter10.pptbroadband and high speed commu Chapter10.ppt
broadband and high speed commu Chapter10.ppt
 
CN UNIT III.pptx
CN UNIT III.pptxCN UNIT III.pptx
CN UNIT III.pptx
 
Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1Lecture 2 data link layer 1 v1
Lecture 2 data link layer 1 v1
 
MODULE II.ppt
MODULE II.pptMODULE II.ppt
MODULE II.ppt
 
MODULE II.pdf
MODULE II.pdfMODULE II.pdf
MODULE II.pdf
 
Module 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdfModule 2.pptx.............sdvsdcdssdfsdf
Module 2.pptx.............sdvsdcdssdfsdf
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Congestion control

  • 1. Topic: Congestion control 23-Nov-19 1 Traffic Jam Data Jam Congestion Control -
  • 2. Data Traffic 23-Nov-19 2Congestion Control - The main focus of Congestion Control and quality of service is data traffic. Congestion control: To avoid Traffic Congestion Quality of Service: To create an appropriate environment for the traffic Traffic Description 1. Average data rate 2. Peak data rate 3. Maximum Burst size 4. Effective Bandwidth
  • 3. 23-Nov-19 3Congestion Control - Data Traffic ADR=Amt of Data/Time Average Data Rate: Indicates the average bandwidth needed by the traffic Peak Data Rate: Maximum data rate of the traffic. Peak bandwidth needs for traffic to pass through without changing its data flow. Max Burst Size: Maximum length of time the traffic is generated at the peak rate. Effective bandwidth: Network needs to allocate for the flow of traffic:
  • 4. Traffic Profiles 23-Nov-19 4Congestion Control - Data flow have one of the traffic profiles: Constant bit Rate: Fixed rate does not change. Both avg and peak rate are same. Very easy since it is predictable Variable bit Rate: May change in time smooth, average data rate and peak data rate are different Bursty data: Data rate changes suddenly in very short time. One of the main causes of congestion in a network.
  • 6. Congestion 23-Nov-19 6Congestion Control - Congestion: The number of packets sent to the network is greater than the capacity of the networks Congestion Control: Mechanism and techniques to control the congestion and keep the load below the capacity
  • 7. Congestion 23-Nov-19 7Congestion Control - Router: Have input and output queue for each interface. Three steps before departing: The number of packets sent to the network is greater than the capacity of the networks 1. Packets are put at the end of the input queue. 2. Router removes the packet from the input queue once it reaches the front of the queue 3. Packet is put in the appropriate output queue and waits its turn to be sent
  • 8. Network Performance 23-Nov-19 8Congestion Control - Two factor for measuring performance of networks are: 1. Delay Vs Load: When the load is much less than the capacity of the network the delay is at a minimum. When a packet is delayed the source not receiving the acknowledgement, retransmits the packet, which makes delay and congestion. 2. Throughput Vs Load: Number of packets passing through the network in a unit of time. When the load exceeds the capacity the queues become full and the routers have to discard the packets.
  • 9. Congestion control 23-Nov-19 9Congestion Control - Mechanisms that can either 1.Prevent congestion, before it happens (Open loop congestion) or 2.Remove congestion, after it has happened(Closed loop congestion)
  • 10. Open Loop congestion control 23-Nov-19 10Congestion Control - 1. Retransmission policy: If any lose or corrupted then Packet can be retransmit. 2. Window Policy: Use Selective reject window method 3. Ack Policy: Sending fewer acknowledgements means imposing less load on the network. 4. Discarding Policy: Router discard less sensitive packets when congestion is likely happened. 5. Admission Policy: Quality of service mechanism(Router may deny establishing a virtual circuit if there is congestion in network or possibility of future congestion. Closed Loop congestion control Backpressure method for alleviating congestion ( Warning is from one node to its upstream node It may reach the source station.
  • 11. Closed Loop congestion control 23-Nov-19 11Congestion Control - Choke packet: Sent by a node to the source to inform it of congestion. (warning from router to source station directly) Implicit Signaling : When a source sends several packets and there is no acknowledgement then the assumption is that the network is congested. The source should slow down. Explicit Signaling : Send the direct signal is included in the packets that carry data to source or destination in backward or forward direction. Backward Signaling : A bit can be set in packet moving opposite direction to the congestion. Source slow down the process Forward Signaling : A bit can be set in packet moving in the direction of congestion. Warn the destination to slow down the ack.