SlideShare a Scribd company logo
Congestion Control avoidance 
Seminar Presented 
by 
Mr. Anthony-Claret Onwutalobi 
On the 10th of March (Winter Session) 
University of Helsinki, Finland
Introduction 
 Definition of Terms: 
 Congestion - is a condition of severe 
delay caused by an overload of datagram 
at one or more switching point (router). 
[2] 
 Congestion Control: is a distributed 
algorithm use by TCP to share network 
resources among competing users. [3]
Area to Cover 
 Overview of Congestion Control 
 The use of Old TCP and its problem 
 The Introduction of New TCP and its 
Benefits 
 The limitation of the four Algorithm 
 Summary 
 Suggestions and questions
Introduction Continue.. 
 The Old TCP and How it operates: 
 UDP - 
 The Short Coming 
 Packet transmitted via Connectionless network 
 Packet can be lost or destroyed when network 
hardware fails 
 Packet loss due to heavy load. 
 Packet arrived out of order 
 Packet delivered after a long delay.
The New TCP 
(Positive Acknowledgement Transmission Protocol) 
 In principle, a reliable delivery with no 
duplicate or data loss as oppose to UDP 
protocol. 
 This mechanism requires both endpoints to be 
on a constant communication whereby the 
sender sends application packages (datagram) 
and wait for an acknowledgement from the 
receiver. 
 The sender stores the history of the packages 
sent and also set a timer when it sends a 
packet. It waits for a reply for a set periodic 
and will retransmit the package if no reply ACK 
received.
Short Coming of New TCP 
 solves the problem of Connectionless UDP 
protocol by ensuring the reliability of data 
transmitted over the network, 
 however it is too mechanical and it wastes 
a lot of network bandwidth. 
 It also has poor utilization of network 
resources because the sender must delay 
sending a new package until it receives an 
acknowledgement for the previous packet
Introducing Sliding Window 
 This limitation propels a research and introduction of 
sliding window. 
 Sliding window keeps tracks of transmitted and 
acknowledged packets. 
 Since the timer is set for each datagram sent over 
the network, the lost packets are easily identified 
and retransmitted 
 Although this sliding window protocol is connection-oriented 
which guarantee data connection.
Source http://www.tutorialsweb.com/networking/tcpip/images/Fig10_SlidingWindow.jpg
Slow Start 
 Slow-start is run when the pipe is empty (i.e., 
when first starting or re-starting after a timeout). 
Its goal is to get the "ack clock" started so 
packets will be metered into the network at a 
reasonable rate. 
 Algorithm: 
 Add a congestion window, cwnd, to the per-connection 
state. 
 When starting or restarting after a loss, set cwnd to 
one packet 
 On each Ack for new data, increase cwnd by one 
packet. 
 When sending, send the minimum of the receiver’s 
advertised window and cwnd.
Assumption: The maximum congestion window size is 8. Therefore, the congestion window size will not 
increase after it reaches the size 8. The sender starts with the congestion window size 1. Upon each ACK 
from the receiver, the sender increases the congestion window size by 1. For example, when the sender 
receives "ACK 1", its congestion window 
size is increased to be 2. Thus, in the next window, the sender can send 2 packets consecutively without 
receiving any ACKs from the receiver.
Congestion Avoidance 
 congestion avoidance, is run any 
time *except* when (re-)starting 
and is responsible for estimating the 
(dynamically varying) pipe size[4] 

When to Enter Congestion Avoidance 
 Congestion avoidance is a TCP 
restriction technique of regulating 
slow start exponential duplication 
method to avoid flooding the 
network with segment which could 
cause congestion. 
 Sender receives Ack over a lost 
packet. 
 Sender timeout Expires
Slow Start and Congestion Avoidance 
Algorithm 
 Slow Start and Congestion Avoidance Algorithm: [3] 
 Initialization for a given connection 
 Sets cwnd to one segment and ssthresh to 65535 bytes 
 The TCP output routine never sends more than minimum of cwnd and 
the receiver’s advertised window 
 When congestion occurs (indicated by a timeout or the reception of 
duplicate Ack), 
 One-half of the current window size (the minimum of cwnd and the 
receiver's 
 advertised window, but at least two segments) is saved in ssthresh. 
 Additionally, if the congestion is indicated by a timeout, cwnd is set to 
one segment 
 (slow start) 
 When new data is acknowledged by the other end, increase cwnd, but 
the way it 
 increases depends on whether TCP is performing slow start or 
congestion avoidance.
Fast Retransmit 
 Since TCP does not know whether a duplicate ACK 
is caused by a lost segment or just a reordering 
of segments, it waits for a small number of 
duplicate ACKs to be received. 
 It is assumed that if there is just a reordering of 
the segments, there will be only one or two 
duplicate ACKs before the reordered segment is 
processed, which will then generate a new ACK. 
 If three or more duplicate ACKs are received in a 
row, it is a strong indication that a segment has 
been lost. TCP then performs a retransmission of 
what appears to be the missing segment, without 
waiting for a retransmission timer to expire.
Fast Recovery 
 After fast retransmit sends what 
appears to be the missing segment, 
congestion avoidance, but not slow 
start is performed. 
 This is the fast recovery algorithm. 
It is an improvement that allows 
high throughput under moderate 
congestion, especially for large 
windows. [2]
References 
 [1] The Great Idea Finder “Fascinating facts about the 
invention of the Traffic Light William L. Potts 
“http://www.ideafinder.com/history/inventions/trafficlight.ht 
m Date Accessed: 10th February 2008 
 [2] D. E. Commer, “Internetworking with TCP/IP, Volume 1: 
Principles, protocols, and Architecture, 2006 
 [3] W. R. Stevens, “TCP Slow Start, Congestion Avoidance, 
Fast Retransmit, and Fast Recovery Algorithms, “RFC 2001, 
Jan 1997 
 [4] D. E. Commer, “Internetworking with TCP/IP, Volume 1: 
Principles, protocols, and Architecture, 2006 
 [5] http://www.tutorialsweb.com/networking/tcp-ip/ 
images/Fig10_SlidingWindow.jpg
References - Continue 
 [6] V. Jacobson, “Modified TCP congestion 
Avoidance Algorithm, “end2end –internet April 
30, 1990 ftp://ftp.isi.edu/end2end/end2end-interest- 
1990.mail 
 [7] D. X. Wei C. Jin, S. H. Low, S. Hedge, “FAST 
TCP” Motivation, Architecture, Algorithm, 
Performance IEEE Network, 2005 
 [8]http://www.isi.edu/nsnam/DIRECTED_RESEAR 
CH/DR_WANIDA/DR/JavisInActionSlowStartFrame 
.html Date Accessed 15/02/08 
 [9]http://www.cs.rice.edu/~amsaha/Papers/Cexa 
m/notes/node109.html 15/02/08
Thank You for Paying Attention 
 Suggestions! and Questions???

More Related Content

What's hot

Analysis of TCP variants
Analysis of TCP variantsAnalysis of TCP variants
Congestion control
Congestion controlCongestion control
Congestion control
Abhay Pai
 
TCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
TCP-FIT: An Improved TCP Congestion Control Algorithm and its PerformanceTCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
TCP-FIT: An Improved TCP Congestion Control Algorithm and its PerformanceKevin Tong
 
Cubic
CubicCubic
Cubic
deawoo Kim
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
selvakumar_b1985
 
Lect9
Lect9Lect9
Lect9
Abdo sayed
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
partha pratim deb
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion Control
Adeel Rasheed
 
Adoptive retransmission in TCP
Adoptive retransmission in TCPAdoptive retransmission in TCP
Adoptive retransmission in TCP
selvakumar_b1985
 
Congestion control
Congestion controlCongestion control
Congestion control
Madhusudhan G
 
Tcp(no ip) review part2
Tcp(no ip) review part2Tcp(no ip) review part2
Tcp(no ip) review part2
Diptanshu singh
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
Umesh Gupta
 
Adoptive flowcontrol in TCP
Adoptive flowcontrol in TCPAdoptive flowcontrol in TCP
Adoptive flowcontrol in TCP
selvakumar_b1985
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
VaishnaviVaishnavi17
 
Congestion avoidance in TCP
Congestion avoidance in TCPCongestion avoidance in TCP
Congestion avoidance in TCP
selvakumar_b1985
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
Vimal Dewangan
 
Congestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCPCongestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCPAttila Balazs
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networksrapatil
 

What's hot (20)

Analysis of TCP variants
Analysis of TCP variantsAnalysis of TCP variants
Analysis of TCP variants
 
Congestion control
Congestion controlCongestion control
Congestion control
 
TCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
TCP-FIT: An Improved TCP Congestion Control Algorithm and its PerformanceTCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
TCP-FIT: An Improved TCP Congestion Control Algorithm and its Performance
 
Cubic
CubicCubic
Cubic
 
TCP Westwood
TCP WestwoodTCP Westwood
TCP Westwood
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Lect9
Lect9Lect9
Lect9
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion Control
 
Adoptive retransmission in TCP
Adoptive retransmission in TCPAdoptive retransmission in TCP
Adoptive retransmission in TCP
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Tcp(no ip) review part2
Tcp(no ip) review part2Tcp(no ip) review part2
Tcp(no ip) review part2
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
 
Adoptive flowcontrol in TCP
Adoptive flowcontrol in TCPAdoptive flowcontrol in TCP
Adoptive flowcontrol in TCP
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Congestion avoidance in TCP
Congestion avoidance in TCPCongestion avoidance in TCP
Congestion avoidance in TCP
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 
Congestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCPCongestion Control in Computer Networks - ATM and TCP
Congestion Control in Computer Networks - ATM and TCP
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networks
 

Viewers also liked

CS5229 Lecture 3: Congestion Avoidance and Control
CS5229 Lecture 3: Congestion Avoidance and ControlCS5229 Lecture 3: Congestion Avoidance and Control
CS5229 Lecture 3: Congestion Avoidance and ControlWei Tsang Ooi
 
Lecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceLecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceWei Tsang Ooi
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
Naveen Dubey
 
Grammar book by Alejandra Green
Grammar book by Alejandra Green Grammar book by Alejandra Green
Grammar book by Alejandra Green
alexandra2green
 
ICI project 2 (1).pdf
ICI project 2 (1).pdfICI project 2 (1).pdf
ICI project 2 (1).pdfFoo Zhi Fung
 
Vivir's ACFI financial modelling_January 2017
Vivir's ACFI financial modelling_January 2017Vivir's ACFI financial modelling_January 2017
Vivir's ACFI financial modelling_January 2017
Jenny Mowatt
 
El Computador
El ComputadorEl Computador
El Computador
jeansand1999
 
Da
DaDa
ICI Final Project.docx
ICI Final Project.docxICI Final Project.docx
ICI Final Project.docxFoo Zhi Fung
 
Presentation Strategies GEC Bvn Production Sem 1
Presentation Strategies GEC Bvn Production Sem 1Presentation Strategies GEC Bvn Production Sem 1
Presentation Strategies GEC Bvn Production Sem 1
fahimadmani
 
ICI project 2 (1).pdf
ICI project 2 (1).pdfICI project 2 (1).pdf
ICI project 2 (1).pdfFoo Zhi Fung
 
structuralengeeniring63-141128233958-conversion-gate02.ppt
structuralengeeniring63-141128233958-conversion-gate02.pptstructuralengeeniring63-141128233958-conversion-gate02.ppt
structuralengeeniring63-141128233958-conversion-gate02.pptFoo Zhi Fung
 
Functions of Money
Functions of MoneyFunctions of Money
Functions of Moneyangelineross
 
essay question August2014.doc
essay question August2014.docessay question August2014.doc
essay question August2014.docFoo Zhi Fung
 
scsi_residentialpropertyreview_2014
scsi_residentialpropertyreview_2014scsi_residentialpropertyreview_2014
scsi_residentialpropertyreview_2014Orla Deasy
 
PPT CPD
PPT CPDPPT CPD
PPT CPD
fahimadmani
 
Matthew Brazwell's Refuel Outage 20 Logo
Matthew Brazwell's Refuel Outage 20 Logo Matthew Brazwell's Refuel Outage 20 Logo
Matthew Brazwell's Refuel Outage 20 Logo
Matthew Brazwell
 
Africans: Tracing your root by Anthony claret
Africans: Tracing your root by Anthony claretAfricans: Tracing your root by Anthony claret
Africans: Tracing your root by Anthony claret
Anthony-Claret Onwutalobi
 

Viewers also liked (19)

CS5229 Lecture 3: Congestion Avoidance and Control
CS5229 Lecture 3: Congestion Avoidance and ControlCS5229 Lecture 3: Congestion Avoidance and Control
CS5229 Lecture 3: Congestion Avoidance and Control
 
Lecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceLecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and Avoidance
 
Ch24
Ch24Ch24
Ch24
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
Grammar book by Alejandra Green
Grammar book by Alejandra Green Grammar book by Alejandra Green
Grammar book by Alejandra Green
 
ICI project 2 (1).pdf
ICI project 2 (1).pdfICI project 2 (1).pdf
ICI project 2 (1).pdf
 
Vivir's ACFI financial modelling_January 2017
Vivir's ACFI financial modelling_January 2017Vivir's ACFI financial modelling_January 2017
Vivir's ACFI financial modelling_January 2017
 
El Computador
El ComputadorEl Computador
El Computador
 
Da
DaDa
Da
 
ICI Final Project.docx
ICI Final Project.docxICI Final Project.docx
ICI Final Project.docx
 
Presentation Strategies GEC Bvn Production Sem 1
Presentation Strategies GEC Bvn Production Sem 1Presentation Strategies GEC Bvn Production Sem 1
Presentation Strategies GEC Bvn Production Sem 1
 
ICI project 2 (1).pdf
ICI project 2 (1).pdfICI project 2 (1).pdf
ICI project 2 (1).pdf
 
structuralengeeniring63-141128233958-conversion-gate02.ppt
structuralengeeniring63-141128233958-conversion-gate02.pptstructuralengeeniring63-141128233958-conversion-gate02.ppt
structuralengeeniring63-141128233958-conversion-gate02.ppt
 
Functions of Money
Functions of MoneyFunctions of Money
Functions of Money
 
essay question August2014.doc
essay question August2014.docessay question August2014.doc
essay question August2014.doc
 
scsi_residentialpropertyreview_2014
scsi_residentialpropertyreview_2014scsi_residentialpropertyreview_2014
scsi_residentialpropertyreview_2014
 
PPT CPD
PPT CPDPPT CPD
PPT CPD
 
Matthew Brazwell's Refuel Outage 20 Logo
Matthew Brazwell's Refuel Outage 20 Logo Matthew Brazwell's Refuel Outage 20 Logo
Matthew Brazwell's Refuel Outage 20 Logo
 
Africans: Tracing your root by Anthony claret
Africans: Tracing your root by Anthony claretAfricans: Tracing your root by Anthony claret
Africans: Tracing your root by Anthony claret
 

Similar to Congestion control avoidance

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
Ram Dutt Shukla
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
IOSR Journals
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
IOSR Journals
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
Maulik Patel
 
Mcseminar
McseminarMcseminar
Mcseminar
Ankit Anand
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
ijcseit
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...
ijcseit
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
optokunal1
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
Dilum Bandara
 
Tcp performance simulationsusingns2
Tcp performance simulationsusingns2Tcp performance simulationsusingns2
Tcp performance simulationsusingns2
Justin Frankel
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
NYversity
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
IJLT EMAS
 
tcp-wireless-tutorial.ppt
tcp-wireless-tutorial.ppttcp-wireless-tutorial.ppt
tcp-wireless-tutorial.ppt
Radwan Mahmoud
 
TCP_Congestion_Control.ppt
TCP_Congestion_Control.pptTCP_Congestion_Control.ppt
TCP_Congestion_Control.ppt
19UCSA032ASANJAYKUMA
 
Studying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfStudying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdf
IUA
 
NE #1.pptx
NE #1.pptxNE #1.pptx
NE #1.pptx
tahaniali27
 
Tcp congestion control (1)
Tcp congestion control (1)Tcp congestion control (1)
Tcp congestion control (1)
Abdo sayed
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similar to Congestion control avoidance (20)

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Mcseminar
McseminarMcseminar
Mcseminar
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
 
Tcp performance simulationsusingns2
Tcp performance simulationsusingns2Tcp performance simulationsusingns2
Tcp performance simulationsusingns2
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
tcp-wireless-tutorial.ppt
tcp-wireless-tutorial.ppttcp-wireless-tutorial.ppt
tcp-wireless-tutorial.ppt
 
TCP_Congestion_Control.ppt
TCP_Congestion_Control.pptTCP_Congestion_Control.ppt
TCP_Congestion_Control.ppt
 
Tieu luan qo s
Tieu luan qo sTieu luan qo s
Tieu luan qo s
 
Studying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfStudying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdf
 
NE #1.pptx
NE #1.pptxNE #1.pptx
NE #1.pptx
 
Tcp congestion control (1)
Tcp congestion control (1)Tcp congestion control (1)
Tcp congestion control (1)
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Congestion control avoidance

  • 1. Congestion Control avoidance Seminar Presented by Mr. Anthony-Claret Onwutalobi On the 10th of March (Winter Session) University of Helsinki, Finland
  • 2. Introduction  Definition of Terms:  Congestion - is a condition of severe delay caused by an overload of datagram at one or more switching point (router). [2]  Congestion Control: is a distributed algorithm use by TCP to share network resources among competing users. [3]
  • 3. Area to Cover  Overview of Congestion Control  The use of Old TCP and its problem  The Introduction of New TCP and its Benefits  The limitation of the four Algorithm  Summary  Suggestions and questions
  • 4. Introduction Continue..  The Old TCP and How it operates:  UDP -  The Short Coming  Packet transmitted via Connectionless network  Packet can be lost or destroyed when network hardware fails  Packet loss due to heavy load.  Packet arrived out of order  Packet delivered after a long delay.
  • 5. The New TCP (Positive Acknowledgement Transmission Protocol)  In principle, a reliable delivery with no duplicate or data loss as oppose to UDP protocol.  This mechanism requires both endpoints to be on a constant communication whereby the sender sends application packages (datagram) and wait for an acknowledgement from the receiver.  The sender stores the history of the packages sent and also set a timer when it sends a packet. It waits for a reply for a set periodic and will retransmit the package if no reply ACK received.
  • 6. Short Coming of New TCP  solves the problem of Connectionless UDP protocol by ensuring the reliability of data transmitted over the network,  however it is too mechanical and it wastes a lot of network bandwidth.  It also has poor utilization of network resources because the sender must delay sending a new package until it receives an acknowledgement for the previous packet
  • 7. Introducing Sliding Window  This limitation propels a research and introduction of sliding window.  Sliding window keeps tracks of transmitted and acknowledged packets.  Since the timer is set for each datagram sent over the network, the lost packets are easily identified and retransmitted  Although this sliding window protocol is connection-oriented which guarantee data connection.
  • 9. Slow Start  Slow-start is run when the pipe is empty (i.e., when first starting or re-starting after a timeout). Its goal is to get the "ack clock" started so packets will be metered into the network at a reasonable rate.  Algorithm:  Add a congestion window, cwnd, to the per-connection state.  When starting or restarting after a loss, set cwnd to one packet  On each Ack for new data, increase cwnd by one packet.  When sending, send the minimum of the receiver’s advertised window and cwnd.
  • 10. Assumption: The maximum congestion window size is 8. Therefore, the congestion window size will not increase after it reaches the size 8. The sender starts with the congestion window size 1. Upon each ACK from the receiver, the sender increases the congestion window size by 1. For example, when the sender receives "ACK 1", its congestion window size is increased to be 2. Thus, in the next window, the sender can send 2 packets consecutively without receiving any ACKs from the receiver.
  • 11. Congestion Avoidance  congestion avoidance, is run any time *except* when (re-)starting and is responsible for estimating the (dynamically varying) pipe size[4] 
  • 12. When to Enter Congestion Avoidance  Congestion avoidance is a TCP restriction technique of regulating slow start exponential duplication method to avoid flooding the network with segment which could cause congestion.  Sender receives Ack over a lost packet.  Sender timeout Expires
  • 13. Slow Start and Congestion Avoidance Algorithm  Slow Start and Congestion Avoidance Algorithm: [3]  Initialization for a given connection  Sets cwnd to one segment and ssthresh to 65535 bytes  The TCP output routine never sends more than minimum of cwnd and the receiver’s advertised window  When congestion occurs (indicated by a timeout or the reception of duplicate Ack),  One-half of the current window size (the minimum of cwnd and the receiver's  advertised window, but at least two segments) is saved in ssthresh.  Additionally, if the congestion is indicated by a timeout, cwnd is set to one segment  (slow start)  When new data is acknowledged by the other end, increase cwnd, but the way it  increases depends on whether TCP is performing slow start or congestion avoidance.
  • 14. Fast Retransmit  Since TCP does not know whether a duplicate ACK is caused by a lost segment or just a reordering of segments, it waits for a small number of duplicate ACKs to be received.  It is assumed that if there is just a reordering of the segments, there will be only one or two duplicate ACKs before the reordered segment is processed, which will then generate a new ACK.  If three or more duplicate ACKs are received in a row, it is a strong indication that a segment has been lost. TCP then performs a retransmission of what appears to be the missing segment, without waiting for a retransmission timer to expire.
  • 15. Fast Recovery  After fast retransmit sends what appears to be the missing segment, congestion avoidance, but not slow start is performed.  This is the fast recovery algorithm. It is an improvement that allows high throughput under moderate congestion, especially for large windows. [2]
  • 16. References  [1] The Great Idea Finder “Fascinating facts about the invention of the Traffic Light William L. Potts “http://www.ideafinder.com/history/inventions/trafficlight.ht m Date Accessed: 10th February 2008  [2] D. E. Commer, “Internetworking with TCP/IP, Volume 1: Principles, protocols, and Architecture, 2006  [3] W. R. Stevens, “TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms, “RFC 2001, Jan 1997  [4] D. E. Commer, “Internetworking with TCP/IP, Volume 1: Principles, protocols, and Architecture, 2006  [5] http://www.tutorialsweb.com/networking/tcp-ip/ images/Fig10_SlidingWindow.jpg
  • 17. References - Continue  [6] V. Jacobson, “Modified TCP congestion Avoidance Algorithm, “end2end –internet April 30, 1990 ftp://ftp.isi.edu/end2end/end2end-interest- 1990.mail  [7] D. X. Wei C. Jin, S. H. Low, S. Hedge, “FAST TCP” Motivation, Architecture, Algorithm, Performance IEEE Network, 2005  [8]http://www.isi.edu/nsnam/DIRECTED_RESEAR CH/DR_WANIDA/DR/JavisInActionSlowStartFrame .html Date Accessed 15/02/08  [9]http://www.cs.rice.edu/~amsaha/Papers/Cexa m/notes/node109.html 15/02/08
  • 18. Thank You for Paying Attention  Suggestions! and Questions???

Editor's Notes

  1. The diagram below shows the scenario of TCP slow-start mechanism: Assumption: The maximum congestion window size is 8. Therefore, the congestion window size will not increase after it reaches the size 8. The sender starts with the congestion window size 1. Upon each ACK from the receiver, the sender increases the congestion window size by 1. For example, when the sender receives "ACK 1", its congestion window size is increased to be 2. Thus, in the next window, the sender can send 2 packets consecutively without receiving any ACKs from the receiver.