SlideShare a Scribd company logo
1
COMPUTER NETWORK
PRESENTATION
ON
CONGESTION
PRESENTED BY :
PRIYOKUMARIY.
R.K.DISILA
BUNGBUNG CH.
S.CHINGU
DINESH S.
CONTENTS
 INTRODUCTIONTO CONGESTION
 GENERAL PRINCIPLE OF CONGESTION
 OPEN LOOP CONGESTION CONTRO
 CLOSED LOOP CONGESTION CONTROL
 CONGESTION CONTROL ALGORITHMS
 LEAKY BUCKETALGORITHM
 TOKEN BUCKET ALGORITHM
 CHOKE PACKETS
 HOP BY HOP CHOKE PACKETS
 LOAD SHEDDING
 CONCLUSION
 REFERENCE
2
INTRODUCTION
WHAT IS CONGESTION?
Congestion is a situation in communication network in which
too many packets are present in a part of the subnet or
contending for the same link so
 The queue overflows
 Packets get dropped
 Network is congested!
3
ROUTER
BUFFER
BUFFER
BUFFER
BUFFER
BUFFER
CONGESTION
Factors that Cause Congestion
 Packet arrival rate exceeds the outgoing link capacity.
 Insufficient memory to store arriving packets
 Bursty traffic
 Slow processor
Costs of congestion
 large queuing delays are experienced as the packet
arrival rate nears the link capacity.
 unneeded retransmissions by the sender
 when a packet is dropped along a path, the
transmission capacity of the upstream routers have
been wasted.
4
GENERAL PRINCIPLE OF CONGESTION CONTROL
Congestion control refers to techniques and mechanisms that can either
prevent congestion , before it happens or removes congestion,after it has
happened.
5
CONGESTION
CONTROL
OPEN LOOP
RETRANSMISSION
POLICY
WINDOW
POLICY
ACKNOWLEDGEMENT
POLICY
DISCARDING
POLICY
ADMISSION
POLICY
CLOSED
LOOP
BACK
PRESSURE
CHOKE
PACKET
IMPLICIT
SIGNALING
EXPLICIT
SIGNALING
•In this method, policies are used to prevent the congestion before
it happens.
Congestion control is handled either by the source or by the
destination.
1. Retransmission Policy
•The sender retransmits a packet, if it feels that the packet it
has sent is lost or corrupted.
•The retransmission policy and the retransmission timers need
to be designed to optimize efficiency and at the same time
prevent the congestion.
2. Window Policy
•To implement window policy, selective reject window method
is used for congestion control in which it sends only the specific
lost or damaged packets.
6
Open loop congestion control
3. Acknowledgement Policy
• If the receiver does not acknowledge every packet it receives it
may slow down the sender and help prevent congestion.
4. Discarding Policy
• A router may discard less sensitive packets when congestion is
likely to happen
5. Admission Policy
• A router can deny establishing a virtual circuit connection if
there is congestion in the "network or if there is a possibility of
future congestion.
6. Routing Algorithm
• spreading the traffic over all the lines
7
8
Congestion prevention policies in different layers
LAYER CONGESTION PREVENTION POLICIES
Transport -retransmission policy
-acknowledgement policy
-flow control policy
-timeout determination
Network -virtual circuits versus datagram inside the subnet
-packet queuing and service policy
-packet discard policy
-routing algorithm
-packet lifetime management
Datalink -retransmission policy
-out-of-order caching policy
-acknowledgement policy
-flow control policy
CLOSED LOOP CONGESTION CONTROL
• Closed loop congestion control mechanisms try to remove the
congestion after it happens.
1. Backpressure method
• Backpressure is a node-to-node congestion control that starts with a
node and propagates, in the opposite direction of data flow in which
the congested node stops receiving data from the immediate
upstream node(s).
9
Source 1 2 3 4 destination
congestion
Back pressure
DownstreamUpstream
Data flow
2. Choke Packet
• In choke packet method, congested node sends a
warning directly to the source station i.e. the
intermediate nodes through which the packet
has traveled are not warned.
10
Source 1 2 3 4 Destination
Choke packet
congestion
Data flow
3. Implicit Signaling
•The source guesses that there is congestion somewhere in
the network when it does not receive any acknowledgment.
Therefore the delay in receiving an acknowledgment is
interpreted as congestion in the network and the source
slows down.
- this policy is used inTCP(Transmission control protocol).
4. Explicit Signaling
• In this method, the congested nodes explicitly send a
signal to the source or destination to inform about the
congestion.
• Explicit signaling is different from the choke packet
method. In choke packed method, a separate packet is used
for this purpose whereas in explicit signaling method, the
signal is included in the packets that carry data .
11
LEAKY BUCKET ALGORITHM
12
Fig. 1 Fig. 2 13
TOKEN BUCKET ALGORITHM
 Choke Packet Technique
 Depicts the functioning of choke packets, (a) Heavy traffic
between nodes P and Q, (b) Node Q sends the Choke packet to P,
(c) Choke packet reaches P, (d) P reduces the flow and send a
reduced flow out, (e) Reduced flow reaches node Q .
14
Hop-by Hop Choke Packets
15
Depicts the functioning of Hop-by-Hop choke packets (a) Heavy traffic
between nodes P and Q, (b) Node Q sends the Choke packet to P, (c) Choke packet
reaches R, and the flow between R and Q is curtail down, Choke packer reaches P,
and P reduces the flow out .
Load Shedding
- In this method, whenever a router finds that there is congestion
in the network, it simply starts dropping out the packets.
- Which packet to discard depends on the applications running
-Wine policy: the older the better.
-Milk policy: fresher is better
-intelligent discard policy:packets in priority classes
16
conclusion
17
 With the increase in the number of internet
users, it has become quite essential to
develop an efficient congestion control
technique.
 In our presentation we have analyse Leaky
bucket algorithm,Token bucket algorithm,
Choked packet technique and Hop by hop
choke packet technique.
 A particular algorithm cannot be hundred
percent efficient, so there is always scope to
improve the congestion control technique.
Reference
 Computer control overview written by S. Chen
 “What is Congestion Control Describe the
Congestion Control Algorithm commonly used.”
written by DineshThakur.
 Computer Network:A system aproach,5E by Larry
L. Peterson & Bruce S. Davie
 [Ramakrishnan 1990] K. K. Ramakrishnan and Raj
Jain, "A Binary Feedback Scheme for Congestion
Avoidance in Computer Networks", ACM
Transactions on Computer Systems,Vol.8, No.2, pp.
158-181, May 1990.
18

More Related Content

What's hot

Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
Shivani Godha
 
Resource management
Resource managementResource management
Resource management
Dr Sandeep Kumar Poonia
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
Dr. SELVAGANESAN S
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
Kruti Niranjan
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
IIIT Manipur
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
Alagappa Govt Arts College, Karaikudi
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memoryAshish Kumar
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
Ahtesham Ullah khan
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
Shehara Abeythunga
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
Syed Shaheer Gilani
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
JAIGANESH SEKAR
 
Congestion avoidance in TCP
Congestion avoidance in TCPCongestion avoidance in TCP
Congestion avoidance in TCP
selvakumar_b1985
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
Ramesh Giri
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
Parameswaran Selvakumar
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
Student
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
Vishal kakade
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
Rahul Hada
 

What's hot (20)

Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Resource management
Resource managementResource management
Resource management
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 
Framing in data link layer
Framing in data link layerFraming in data link layer
Framing in data link layer
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
Congestion avoidance in TCP
Congestion avoidance in TCPCongestion avoidance in TCP
Congestion avoidance in TCP
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Communication primitives
Communication primitivesCommunication primitives
Communication primitives
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 

Similar to Congestion on computer network

Internet congestion
Internet congestionInternet congestion
Internet congestion
Vikas Gupta
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
VaishnaviVaishnavi17
 
Congestion control
Congestion controlCongestion control
Congestion control
Nithin Raj
 
Conjestion control
Conjestion controlConjestion control
Conjestion control
Barani Tharan
 
Congestion control
Congestion controlCongestion control
Congestion control
Madhusudhan G
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
Hossam El-Deen Osama
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
Ram Dutt Shukla
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1
Aman Jaiswal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
SushmaShivani
 
Congestion control
Congestion controlCongestion control
Congestion control
Congestion controlCongestion control
Congestion control
nandhulaks
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismPredictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
IDES Editor
 
Transport layer
Transport layerTransport layer
Transport layer
arvind pandey
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
Deepak John
 
congestion control.pdf
congestion control.pdfcongestion control.pdf
congestion control.pdf
Jayaprasanna4
 
Congestion control algorithms.pptx
Congestion control algorithms.pptxCongestion control algorithms.pptx
Congestion control algorithms.pptx
ujjwalmatoliya
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
congestion ujjwal matoliya.pptx
congestion ujjwal matoliya.pptxcongestion ujjwal matoliya.pptx
congestion ujjwal matoliya.pptx
ujjwalmatoliya
 

Similar to Congestion on computer network (20)

Internet congestion
Internet congestionInternet congestion
Internet congestion
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Conjestion control
Conjestion controlConjestion control
Conjestion control
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismPredictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
 
Transport layer
Transport layerTransport layer
Transport layer
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
congestion control.pdf
congestion control.pdfcongestion control.pdf
congestion control.pdf
 
Congestion control algorithms.pptx
Congestion control algorithms.pptxCongestion control algorithms.pptx
Congestion control algorithms.pptx
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Tieu luan qo s
Tieu luan qo sTieu luan qo s
Tieu luan qo s
 
congestion ujjwal matoliya.pptx
congestion ujjwal matoliya.pptxcongestion ujjwal matoliya.pptx
congestion ujjwal matoliya.pptx
 

Recently uploaded

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

Congestion on computer network

  • 1. 1 COMPUTER NETWORK PRESENTATION ON CONGESTION PRESENTED BY : PRIYOKUMARIY. R.K.DISILA BUNGBUNG CH. S.CHINGU DINESH S.
  • 2. CONTENTS  INTRODUCTIONTO CONGESTION  GENERAL PRINCIPLE OF CONGESTION  OPEN LOOP CONGESTION CONTRO  CLOSED LOOP CONGESTION CONTROL  CONGESTION CONTROL ALGORITHMS  LEAKY BUCKETALGORITHM  TOKEN BUCKET ALGORITHM  CHOKE PACKETS  HOP BY HOP CHOKE PACKETS  LOAD SHEDDING  CONCLUSION  REFERENCE 2
  • 3. INTRODUCTION WHAT IS CONGESTION? Congestion is a situation in communication network in which too many packets are present in a part of the subnet or contending for the same link so  The queue overflows  Packets get dropped  Network is congested! 3 ROUTER BUFFER BUFFER BUFFER BUFFER BUFFER CONGESTION
  • 4. Factors that Cause Congestion  Packet arrival rate exceeds the outgoing link capacity.  Insufficient memory to store arriving packets  Bursty traffic  Slow processor Costs of congestion  large queuing delays are experienced as the packet arrival rate nears the link capacity.  unneeded retransmissions by the sender  when a packet is dropped along a path, the transmission capacity of the upstream routers have been wasted. 4
  • 5. GENERAL PRINCIPLE OF CONGESTION CONTROL Congestion control refers to techniques and mechanisms that can either prevent congestion , before it happens or removes congestion,after it has happened. 5 CONGESTION CONTROL OPEN LOOP RETRANSMISSION POLICY WINDOW POLICY ACKNOWLEDGEMENT POLICY DISCARDING POLICY ADMISSION POLICY CLOSED LOOP BACK PRESSURE CHOKE PACKET IMPLICIT SIGNALING EXPLICIT SIGNALING
  • 6. •In this method, policies are used to prevent the congestion before it happens. Congestion control is handled either by the source or by the destination. 1. Retransmission Policy •The sender retransmits a packet, if it feels that the packet it has sent is lost or corrupted. •The retransmission policy and the retransmission timers need to be designed to optimize efficiency and at the same time prevent the congestion. 2. Window Policy •To implement window policy, selective reject window method is used for congestion control in which it sends only the specific lost or damaged packets. 6 Open loop congestion control
  • 7. 3. Acknowledgement Policy • If the receiver does not acknowledge every packet it receives it may slow down the sender and help prevent congestion. 4. Discarding Policy • A router may discard less sensitive packets when congestion is likely to happen 5. Admission Policy • A router can deny establishing a virtual circuit connection if there is congestion in the "network or if there is a possibility of future congestion. 6. Routing Algorithm • spreading the traffic over all the lines 7
  • 8. 8 Congestion prevention policies in different layers LAYER CONGESTION PREVENTION POLICIES Transport -retransmission policy -acknowledgement policy -flow control policy -timeout determination Network -virtual circuits versus datagram inside the subnet -packet queuing and service policy -packet discard policy -routing algorithm -packet lifetime management Datalink -retransmission policy -out-of-order caching policy -acknowledgement policy -flow control policy
  • 9. CLOSED LOOP CONGESTION CONTROL • Closed loop congestion control mechanisms try to remove the congestion after it happens. 1. Backpressure method • Backpressure is a node-to-node congestion control that starts with a node and propagates, in the opposite direction of data flow in which the congested node stops receiving data from the immediate upstream node(s). 9 Source 1 2 3 4 destination congestion Back pressure DownstreamUpstream Data flow
  • 10. 2. Choke Packet • In choke packet method, congested node sends a warning directly to the source station i.e. the intermediate nodes through which the packet has traveled are not warned. 10 Source 1 2 3 4 Destination Choke packet congestion Data flow
  • 11. 3. Implicit Signaling •The source guesses that there is congestion somewhere in the network when it does not receive any acknowledgment. Therefore the delay in receiving an acknowledgment is interpreted as congestion in the network and the source slows down. - this policy is used inTCP(Transmission control protocol). 4. Explicit Signaling • In this method, the congested nodes explicitly send a signal to the source or destination to inform about the congestion. • Explicit signaling is different from the choke packet method. In choke packed method, a separate packet is used for this purpose whereas in explicit signaling method, the signal is included in the packets that carry data . 11
  • 13. Fig. 1 Fig. 2 13 TOKEN BUCKET ALGORITHM
  • 14.  Choke Packet Technique  Depicts the functioning of choke packets, (a) Heavy traffic between nodes P and Q, (b) Node Q sends the Choke packet to P, (c) Choke packet reaches P, (d) P reduces the flow and send a reduced flow out, (e) Reduced flow reaches node Q . 14
  • 15. Hop-by Hop Choke Packets 15 Depicts the functioning of Hop-by-Hop choke packets (a) Heavy traffic between nodes P and Q, (b) Node Q sends the Choke packet to P, (c) Choke packet reaches R, and the flow between R and Q is curtail down, Choke packer reaches P, and P reduces the flow out .
  • 16. Load Shedding - In this method, whenever a router finds that there is congestion in the network, it simply starts dropping out the packets. - Which packet to discard depends on the applications running -Wine policy: the older the better. -Milk policy: fresher is better -intelligent discard policy:packets in priority classes 16
  • 17. conclusion 17  With the increase in the number of internet users, it has become quite essential to develop an efficient congestion control technique.  In our presentation we have analyse Leaky bucket algorithm,Token bucket algorithm, Choked packet technique and Hop by hop choke packet technique.  A particular algorithm cannot be hundred percent efficient, so there is always scope to improve the congestion control technique.
  • 18. Reference  Computer control overview written by S. Chen  “What is Congestion Control Describe the Congestion Control Algorithm commonly used.” written by DineshThakur.  Computer Network:A system aproach,5E by Larry L. Peterson & Bruce S. Davie  [Ramakrishnan 1990] K. K. Ramakrishnan and Raj Jain, "A Binary Feedback Scheme for Congestion Avoidance in Computer Networks", ACM Transactions on Computer Systems,Vol.8, No.2, pp. 158-181, May 1990. 18