SlideShare a Scribd company logo
Presented By
                                 Abhijit Bagchi (IT/2008/32)
                            Bikash Chandra Pal (IT/2008/07)
                                Soumya Sarkar (IT/2008/14)
Under The Guidance of Prof Moumita Deb
• Basics of Congestion     Retransmission
C   • Congestion a             Algorithm(TCP
                               Reno)
      Catastrophe?
o   • Basics Strategy to •     Issues in wireless
      combat congestion        Network.
n   • Congestion window •      TCP New Reno
    • Slow Start Phase     •   TCP Vegas .
t   • Congestion           •   TCP Westwood.
      Avoidance Phase •        Proposed Algorithm
e   • Congestion           •   Future Works
      Detection Phase
n   • Illustration of
      Congestion Control
t   • Fast Retransmit
s   • Fast Recovery
    • Adaptive
Basics of Congestion

A network is considered
congested when too many
packets try to access the
same router’s buffer, resulting
in a large amount of packets
being dropped.
Congestion a catastrophe?


• Impact of congestion may be
  temporary but if not handled it will
  be catastrophic .

• A congestive collapse effects
  network stability, throughput and
  fair resource allocation to network
  users

• Congestion control in a TCP/IP
  based internet is complex and
  challenging and over the years a lot
  of effort and resources have been
  dedicated to the research in this
  area.
Basic Strategy to Combat Congestion



• In case of network congestion TCP limits sender transmission
  rate to reduce load in the path between sender and receiver

• TCP employs a window-based scheme to control the
  transmission rate where size of the window directly impacts
  transmission

• Acknowledgements are used to pace the transmission of
  packets by the sender
Congestion Window


 Congestion Window (cwnd) is a variable held by the TCP source
  for each connection




Cwnd is set based on the perceived level of Congestion in the
  network
Slow Start Phase


• When a new connection is established the congestion window is
  initialized to one MSS(Maximum Segment Size)

•    Each time an ACK is received, the congestion window is
    increased by one MSS.

•   The sender can transmit up to the minimum of the congestion
    window and the advertised receiver window size.

• Thus, the size of congestion window increases exponentially
  until a threshold value is reached
Slow Start Phase(contd..)


The sender keeps track of a variable called ssthresh (slow start
threshold) When cwnd reaches this threshold slow start ends and
next phase starts
Congestion Avoidance Phase


• Every connection       is   associated   with   a   threshold
  value(ssthresh) .

• When cwnd reaches the due threshold, congestion
  avoidance (additive increase) algorithm takes over.

• In this phase the window size increases linearly until timeout
  occurs or duplicate acknowledgement is received
Congestion Detection Phase


• Congestion may be detected via either timeout or reception
  of duplicate acknowledgement packets

• If detection by timeout then, ssthresh=0.5 X window size and
  a new slow start phase starts with cwnd=1MSS

• If detection by 3 duplicate acknowledgement then,
  ssthresh=0.5 X window size and cwnd=ssthresh and a new
  congestion avoidance phase starts

• This is called Multiplicative decrease where in either case the
  ssthresh variable is reinitialized to half the current cwnd
Illustrations of Congestion Control
Fast Retransmit

• Hence congestion avoidance algorithm was later modified

• It is assumed that if there is just a reordering of the segments,
  there will be only one or two duplicate ACKs before the
  reordered segment is processed, which will then generate a
  new ACK .

• If more than 3 ACK is received for same segment the sender
  sends that particular segment even before its timer expires
Fast Recovery

• After fast retransmit sends what appears to be the missing
  segment, congestion avoidance, but not slow start is
  performed. This is the fast recovery algorithm.


• It is an improvement that allows high throughput under
  moderate congestion, especially for large windows.

• It was added with Tcp Reno , another variant of Tcp
Adaptive Retransmission Algorithm


tout   calculated as a function of RTT

Send packet and keep timestamp ts

When ACK arrives, record timestamp ta

                             SampleRTT=ts – ta

   EstimatedRTT=α EstimatedRTT + (1 – α) SampleRTT(0.8<α<0.9)

                        tout=ß × EstimatedRTT (ß=2)
Issues of Wireless Networks


• In wireless network, current TCP network cannot recognize
  packet loss from congestion or from fading radio signals

• This results in unnecessary shrinking of congestion window
  which results in degradation of performance

• However via significant research certain techniques have been
  discovered to solve these problems
TCP New Reno
• New Reno is a slight modification over Tcp Reno. It is able to detect
  multiple packet losses

• Like Reno, New-Reno also enters into fast-retransmit when it receives
  multiple duplicate packets, however It differs from Reno in that it doesn’t
  exit fast-recovery until all the data which was outstanding at the time it
  entered fast recovery is acknowledged

• Thus it over comes the problem faced by Reno of reducing the cwnd
  multiples times

• Disadvantage:-New-Reno suffers from the fact that its take one RTT to
  detect each packet loss. When the ACK for the first retransmitted segment
  is received only then can we deduce which other segment was lost.
TCP Vegas
• TCP Vegas emphasizes on packet delay rather than on packet loss.
• Vegas sets Base RTT to the smallest measured RTT, and the
  expected throughput is computed according to
          Expected throughput =window size/ Base RTT .
          Actual throughput= window size/ current RTT.
• Vegas Calculates the difference in throughputs
          Diff=ӀActual throughput-Expected Throughputӏ      .
• If Diff < α, Vegas increases the window size linearly during the next
  RTT. If Diff > β, then Vegas decreases the window size linearly
  during the next RTT. Otherwise, it leaves the window size
  unchanged.
TCP Vegas(Contd.)




Disadvantage:-Since Vegas changes the window size linearly , it may not be utilizing bandwidth
properly
Tcp Westwood

• In TCP Westwood the sender continuously computes the
  connection BandWidth Estimate (BWE) which is defined as the
  share of bottleneck bandwidth used by the connection.

• After a packet loss indication, the sender resets the congestion
  window and the slow start threshold based on BWE. More
  precisely,
                   cwnd=BWE x RTT.

• Disadvantage :- TCPW performs poorly when random packet
   loss rate exceeds a few percent
Tcp Westwood (cont..)
Proposed Algorithm


• We would first set the baseRTT to minimum of
  measured round-trip times
• Calculate the
        Expected ACK rate(e)=cwnd/baseRTT;
        Actual ACK rate(a)=cwnd/RTT;
• Compare the Actual throughput with the expected
  throughput .
Proposed Algorithm(contd.)

• If (e==a)||(e<a) then , cwnd =BWE x RTT

• Else cwnd= β x (BWE x RTT) where 0< β< 1

• Bandwidth Estimate(BWE)=dk /tk-t(k-1)
   where dk=data sent between tk-t(k-1)
             interval.
Future Works
• In this project we intend to simulate the devised algorithm via
  ns 2.34 simulator and find out results in various test cases

• This test case results will be compared with existing values to
  come to a proper conclusion about the merits of this
  algorithm
Congestion control in tcp

More Related Content

What's hot

Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
techbed
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
VijayaLakshmi514
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
Rahul Hada
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
Jyothishmathi Institute of Technology and Science Karimnagar
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
Ahtesham Ullah khan
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : PresentationDistance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Subhajit Sahu
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
Manal Shah
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
ArunChokkalingam
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
Basit Hussain
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
tes31
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Congestion control
Congestion controlCongestion control
Congestion control
Nithin Raj
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
Aung Thu Rha Hein
 
Distributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithmDistributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithm
pinki soni
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniquesGupta6Bindu
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed system
Sunita Sahu
 
0 1 knapsack using branch and bound
0 1 knapsack using branch and bound0 1 knapsack using branch and bound
0 1 knapsack using branch and bound
Abhishek Singh
 

What's hot (20)

Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : PresentationDistance Vector Multicast Routing Protocol (DVMRP) : Presentation
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
 
Csma protocols
Csma protocolsCsma protocols
Csma protocols
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Distributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithmDistributed system lamport's and vector algorithm
Distributed system lamport's and vector algorithm
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed system
 
0 1 knapsack using branch and bound
0 1 knapsack using branch and bound0 1 knapsack using branch and bound
0 1 knapsack using branch and bound
 

Similar to Congestion control in tcp

Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
NYversity
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
Ram Dutt Shukla
 
Part9-congestion.pptx
Part9-congestion.pptxPart9-congestion.pptx
Part9-congestion.pptx
Olivier Bonaventure
 
Lect9 (1)
Lect9 (1)Lect9 (1)
Lect9 (1)
Abdo sayed
 
Lect9
Lect9Lect9
Lect9
Abdo sayed
 
NE #1.pptx
NE #1.pptxNE #1.pptx
NE #1.pptx
tahaniali27
 
TCP Theory
TCP TheoryTCP Theory
TCP Theory
soohyunc
 
congestion control data communication.pdf
congestion control data communication.pdfcongestion control data communication.pdf
congestion control data communication.pdf
nqck82120b
 
TCP_Congestion_Control.ppt
TCP_Congestion_Control.pptTCP_Congestion_Control.ppt
TCP_Congestion_Control.ppt
19UCSA032ASANJAYKUMA
 
Designing TCP-Friendly Window-based Congestion Control
Designing TCP-Friendly Window-based Congestion ControlDesigning TCP-Friendly Window-based Congestion Control
Designing TCP-Friendly Window-based Congestion Control
soohyunc
 
Tcp(no ip) review part1
Tcp(no ip) review part1Tcp(no ip) review part1
Tcp(no ip) review part1
Diptanshu singh
 
Tcp congestion control
Tcp congestion controlTcp congestion control
Tcp congestion control
Abdo sayed
 
Tcp congestion control (1)
Tcp congestion control (1)Tcp congestion control (1)
Tcp congestion control (1)
Abdo sayed
 
chapter 3.2 TCP.pptx
chapter 3.2 TCP.pptxchapter 3.2 TCP.pptx
chapter 3.2 TCP.pptx
Tekle12
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
Dilum Bandara
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
optokunal1
 
Transport layer
Transport layerTransport layer
Transport layer
arvind pandey
 
Tcp congestion avoidance
Tcp congestion avoidanceTcp congestion avoidance
Tcp congestion avoidance
Ahmed Kamel Taha
 

Similar to Congestion control in tcp (20)

Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Part9-congestion.pptx
Part9-congestion.pptxPart9-congestion.pptx
Part9-congestion.pptx
 
Lect9 (1)
Lect9 (1)Lect9 (1)
Lect9 (1)
 
Lect9
Lect9Lect9
Lect9
 
NE #1.pptx
NE #1.pptxNE #1.pptx
NE #1.pptx
 
TCP Theory
TCP TheoryTCP Theory
TCP Theory
 
congestion control data communication.pdf
congestion control data communication.pdfcongestion control data communication.pdf
congestion control data communication.pdf
 
Tieu luan qo s
Tieu luan qo sTieu luan qo s
Tieu luan qo s
 
TCP_Congestion_Control.ppt
TCP_Congestion_Control.pptTCP_Congestion_Control.ppt
TCP_Congestion_Control.ppt
 
Designing TCP-Friendly Window-based Congestion Control
Designing TCP-Friendly Window-based Congestion ControlDesigning TCP-Friendly Window-based Congestion Control
Designing TCP-Friendly Window-based Congestion Control
 
Tcp(no ip) review part1
Tcp(no ip) review part1Tcp(no ip) review part1
Tcp(no ip) review part1
 
Tcp congestion control
Tcp congestion controlTcp congestion control
Tcp congestion control
 
Tcp congestion control (1)
Tcp congestion control (1)Tcp congestion control (1)
Tcp congestion control (1)
 
chapter 3.2 TCP.pptx
chapter 3.2 TCP.pptxchapter 3.2 TCP.pptx
chapter 3.2 TCP.pptx
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
 
Transport layer
Transport layerTransport layer
Transport layer
 
Tcp congestion avoidance
Tcp congestion avoidanceTcp congestion avoidance
Tcp congestion avoidance
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Congestion control in tcp

  • 1. Presented By Abhijit Bagchi (IT/2008/32) Bikash Chandra Pal (IT/2008/07) Soumya Sarkar (IT/2008/14) Under The Guidance of Prof Moumita Deb
  • 2. • Basics of Congestion Retransmission C • Congestion a Algorithm(TCP Reno) Catastrophe? o • Basics Strategy to • Issues in wireless combat congestion Network. n • Congestion window • TCP New Reno • Slow Start Phase • TCP Vegas . t • Congestion • TCP Westwood. Avoidance Phase • Proposed Algorithm e • Congestion • Future Works Detection Phase n • Illustration of Congestion Control t • Fast Retransmit s • Fast Recovery • Adaptive
  • 3. Basics of Congestion A network is considered congested when too many packets try to access the same router’s buffer, resulting in a large amount of packets being dropped.
  • 4. Congestion a catastrophe? • Impact of congestion may be temporary but if not handled it will be catastrophic . • A congestive collapse effects network stability, throughput and fair resource allocation to network users • Congestion control in a TCP/IP based internet is complex and challenging and over the years a lot of effort and resources have been dedicated to the research in this area.
  • 5. Basic Strategy to Combat Congestion • In case of network congestion TCP limits sender transmission rate to reduce load in the path between sender and receiver • TCP employs a window-based scheme to control the transmission rate where size of the window directly impacts transmission • Acknowledgements are used to pace the transmission of packets by the sender
  • 6. Congestion Window Congestion Window (cwnd) is a variable held by the TCP source for each connection Cwnd is set based on the perceived level of Congestion in the network
  • 7. Slow Start Phase • When a new connection is established the congestion window is initialized to one MSS(Maximum Segment Size) • Each time an ACK is received, the congestion window is increased by one MSS. • The sender can transmit up to the minimum of the congestion window and the advertised receiver window size. • Thus, the size of congestion window increases exponentially until a threshold value is reached
  • 8. Slow Start Phase(contd..) The sender keeps track of a variable called ssthresh (slow start threshold) When cwnd reaches this threshold slow start ends and next phase starts
  • 9. Congestion Avoidance Phase • Every connection is associated with a threshold value(ssthresh) . • When cwnd reaches the due threshold, congestion avoidance (additive increase) algorithm takes over. • In this phase the window size increases linearly until timeout occurs or duplicate acknowledgement is received
  • 10. Congestion Detection Phase • Congestion may be detected via either timeout or reception of duplicate acknowledgement packets • If detection by timeout then, ssthresh=0.5 X window size and a new slow start phase starts with cwnd=1MSS • If detection by 3 duplicate acknowledgement then, ssthresh=0.5 X window size and cwnd=ssthresh and a new congestion avoidance phase starts • This is called Multiplicative decrease where in either case the ssthresh variable is reinitialized to half the current cwnd
  • 12. Fast Retransmit • Hence congestion avoidance algorithm was later modified • It is assumed that if there is just a reordering of the segments, there will be only one or two duplicate ACKs before the reordered segment is processed, which will then generate a new ACK . • If more than 3 ACK is received for same segment the sender sends that particular segment even before its timer expires
  • 13. Fast Recovery • After fast retransmit sends what appears to be the missing segment, congestion avoidance, but not slow start is performed. This is the fast recovery algorithm. • It is an improvement that allows high throughput under moderate congestion, especially for large windows. • It was added with Tcp Reno , another variant of Tcp
  • 14. Adaptive Retransmission Algorithm tout calculated as a function of RTT Send packet and keep timestamp ts When ACK arrives, record timestamp ta SampleRTT=ts – ta EstimatedRTT=α EstimatedRTT + (1 – α) SampleRTT(0.8<α<0.9) tout=ß × EstimatedRTT (ß=2)
  • 15. Issues of Wireless Networks • In wireless network, current TCP network cannot recognize packet loss from congestion or from fading radio signals • This results in unnecessary shrinking of congestion window which results in degradation of performance • However via significant research certain techniques have been discovered to solve these problems
  • 16. TCP New Reno • New Reno is a slight modification over Tcp Reno. It is able to detect multiple packet losses • Like Reno, New-Reno also enters into fast-retransmit when it receives multiple duplicate packets, however It differs from Reno in that it doesn’t exit fast-recovery until all the data which was outstanding at the time it entered fast recovery is acknowledged • Thus it over comes the problem faced by Reno of reducing the cwnd multiples times • Disadvantage:-New-Reno suffers from the fact that its take one RTT to detect each packet loss. When the ACK for the first retransmitted segment is received only then can we deduce which other segment was lost.
  • 17. TCP Vegas • TCP Vegas emphasizes on packet delay rather than on packet loss. • Vegas sets Base RTT to the smallest measured RTT, and the expected throughput is computed according to Expected throughput =window size/ Base RTT . Actual throughput= window size/ current RTT. • Vegas Calculates the difference in throughputs Diff=ӀActual throughput-Expected Throughputӏ . • If Diff < α, Vegas increases the window size linearly during the next RTT. If Diff > β, then Vegas decreases the window size linearly during the next RTT. Otherwise, it leaves the window size unchanged.
  • 18. TCP Vegas(Contd.) Disadvantage:-Since Vegas changes the window size linearly , it may not be utilizing bandwidth properly
  • 19. Tcp Westwood • In TCP Westwood the sender continuously computes the connection BandWidth Estimate (BWE) which is defined as the share of bottleneck bandwidth used by the connection. • After a packet loss indication, the sender resets the congestion window and the slow start threshold based on BWE. More precisely, cwnd=BWE x RTT. • Disadvantage :- TCPW performs poorly when random packet loss rate exceeds a few percent
  • 21. Proposed Algorithm • We would first set the baseRTT to minimum of measured round-trip times • Calculate the Expected ACK rate(e)=cwnd/baseRTT; Actual ACK rate(a)=cwnd/RTT; • Compare the Actual throughput with the expected throughput .
  • 22. Proposed Algorithm(contd.) • If (e==a)||(e<a) then , cwnd =BWE x RTT • Else cwnd= β x (BWE x RTT) where 0< β< 1 • Bandwidth Estimate(BWE)=dk /tk-t(k-1) where dk=data sent between tk-t(k-1) interval.
  • 23. Future Works • In this project we intend to simulate the devised algorithm via ns 2.34 simulator and find out results in various test cases • This test case results will be compared with existing values to come to a proper conclusion about the merits of this algorithm