The Network Layer Congestion Control Algorithms & Quality-of-Service Chapter 5.

Slides:



Advertisements
Similar presentations
Quality of Service CS 457 Presentation Xue Gu Nov 15, 2001.
Advertisements

1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
EE 4272Spring, 2003 Chapter 12 Congestion in Data Networks Effect of Congestion Control  Ideal Performance  Practical Performance Congestion Control.
Network layer -- May Network layer Computer Networks.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
01. Apr INF-3190: Congestion Control Congestion Control Foreleser: Carsten Griwodz
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Congestion Control Algorithms
Congestion Control Algorithms
The Network Layer Functions: Congestion Control
The Network Layer Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Network and Communications Hongsik Choi Department of Computer Science Virginia Commonwealth University.
Congestion Control Tanenbaum 5.3 Tanenbaum 6.5. Congestion Control Network Layer – Congestion control point to point Transport Layer – Congestion control.
Congestion Control Algorithms
Congestion Control Reasons: - too many packets in the network and not enough buffer space S = rate at which packets are generated R = rate at which receivers.
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 – QoS.
Traffic Shaping Why traffic shaping? Isochronous shaping
Quality of Service Requirements
24.1 Chapter 24 Congestion Control and Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ATM : CONGESTION CONTROL Group 7 29 DECEMBER 2004.
1.  Congestion Control Congestion Control  Factors that Cause Congestion Factors that Cause Congestion  Congestion Control vs Flow Control Congestion.
1 Quality of Service Requirements Techniques for Achieving Good Quality of Service Integrated Services Differentiated Services Label Switching and MPLS.
Network Layer Chapter 5 Design Issues Routing Algorithms
CS 408 Computer Networks Congestion Control (from Chapter 05)
Congestion Control Algorithms, Quality of Service & Internetworking
Differentiated Services. Service Differentiation in the Internet Different applications have varying bandwidth, delay, and reliability requirements How.
Congestion Control Tanenbaum 5.3, /12/2015Congestion Control (A Loss Based Technique: TCP)2 What? Why? Congestion occurs when –there is no reservation.
Next Generation Networks Chapter 10. Knowledge Concepts QoS concepts Bandwidth needs for Internet traffic.
CSc 461/561 CSc 461/561 Multimedia Systems Part C: 3. QoS.
24-1 Chapter 24. Congestion Control and Quality of Service part Quality of Service 23.6 Techniques to Improve QoS 23.7 Integrated Services 23.8.
The Network Layer Chapter 5.
CSE QoS in IP. CSE Improving QOS in IP Networks Thus far: “making the best of best effort”
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
QOS مظفر بگ محمدی دانشگاه ایلام. 2 Why a New Service Model? Best effort clearly insufficient –Some applications need more assurances from the network.
The Network Layer Week 5. Network Layer Design Isues Store-and-Forward Packet Switching Services Provided to the Transport Layer Implementation of Connectionless.
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Oppenheimer.
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
1 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services MPLS.
1 Lecture 14 High-speed TCP connections Wraparound Keeping the pipeline full Estimating RTT Fairness of TCP congestion control Internet resource allocation.
CSC 581 Communication Networks II Chapter 7c: Congestion Control Dr. Cheer-Sun Yang.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
1 Lecture, November 27, 2002 TCP Other Internet Protocols; Internet Traffic Scalability of Virtual Circuit Networks QoS.
CONGESTION CONTROL.
Lecture Network layer -- May Congestion control Algorithms.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
© 2006 Cisco Systems, Inc. All rights reserved. 3.2: Implementing QoS.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
Chapter 10 Congestion Control in Data Networks and Internets 1 Chapter 10 Congestion Control in Data Networks and Internets.
Chapter 30 Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
Congestion Control in Data Networks and Internets
Topics discussed in this section:
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Congestion Control, Quality of Service, and Internetworking
Chapter 5 The Network Layer.
CONGESTION CONTROL.
CONGESTION CONTROL, QUALITY OF SERVICE, & INTERNETWORKING
Advanced Computer Networks
Congestion Control, Quality of Service, & Internetworking
Figure Areas in an autonomous system
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
The Network Layer Congestion Control Algorithms & Quality-of-Service
Congestion Control (from Chapter 05)
Congestion Control Algorithms
Presentation transcript:

The Network Layer Congestion Control Algorithms & Quality-of-Service Chapter 5

Congestion Control Algorithms Approaches to Congestion Control Traffic-Aware Routing Admission Control Traffic Throttling Load Shedding

Congestion When too much traffic is offered, congestion sets in and performance degrades sharply.

General Principles of Congestion Control 1.Monitor the system –detect when and where congestion occurs. 2.Pass information to where action can be taken. 3.Adjust system operation to correct the problem. 4.Difference between Congestion control and flow control – Elaborate 5.Problem of infinite buffer - Elaborate

Approaches to Congestion Control Two solutions possible: 1)Increase resources 2)Decrease load Admission control in virtual networks – no more provisioning

Traffic-Aware Routing A network in which the East and West parts are connected by two links.

Admission Control (a)A congested network. (b) The portion of the network that is not congested. A virtual circuit from A to B is also shown. Problem is in virtual circuits – there may be provisioning but not real usage.

Traffic Throttling:Congestion Detection Routers must determine when congestion is approaching, ideally before it has arrived. Each router can continuously monitor the resources it is using. 3 possibilities: 1. utilization of the output links 2. buffering of queued packets inside the router (most useful) 3. no. of packets that are lost due to insufficient buffering EWMA (Exponentially Weighted Moving Average) d new = αd old + (1 − α)s, where, the constant α determines how fast the router forgets recent history. Whenever d moves above the threshold, the router notes the onset of congestion.

Traffic Throttling: Feedback Routers must deliver timely feedback to the senders that are causing the congestion. The router must identify the appropriate senders. It must then warn them carefully, without sending many more packets into the already congested network. Many feedback mechanisms: Mechanism 1: Explicit Congestion Notification (ECN)

Mechanisms 2 & 3: Direct Choke Packets, Hop-by-Hop Backpressure M-2: A choke packet that affects only the source. M-3: A choke packet that affects each hop it passes through. Sending choke packets to the source may be costly.

Mechanism 4: Load Shedding Performed when all other strategies fail. Cause blackout in some areas to save the entire network from failing. Intelligent packet drop policy desired. Which packets to discard may depend on application Multimedia – old packets (full frame not to be discarded) Text – Recent Packets Packet’s importance can be marked in the beginning (application layer), then decision on which packets to discard can be taken.

Mechanism 5: Random Early Detection Discard packets before all the buffer space is really exhausted. To determine when to start discarding, routers maintain a running average of their queue lengths. When average queue length exceeds a threshold, the link is said to be congested – small fraction of packets dropped at random. The affected sender will notice the loss when there is no acknowledgement – transport protocol slowed down.

Quality of Service Requirements Minimum throughput and maximum latency Techniques for Achieving Good Quality of Service Integrated Services Differentiated Services Label Switching and MPLS

Requirements How stringent the quality-of-service requirements are. 5-30

Categories of QoS and Examples 1.Constant bit rate Telephony 2.Real-time variable bit rate Compressed videoconferencing 3.Non-real-time variable bit rate Watching a movie on demand 4.Available bit rate File transfer

Jitter Control (a) High jitter. (b) Low jitter. Schedule Delay according to Deadline Miss

Buffering Smoothing the output stream by buffering packets.

Traffic Shaping Traffic in data networks is bursty – typically arrives at non-uniform rates as the traffic rate varies. Traffic shaping is a technique for regulating the average rate and burstiness of a flow of data that enters the network. When a flow is set up, the user and the network agree on a certain traffic pattern (shape). Sometimes this agreement is called an SLA (Service Level Agreement).

The Leaky Bucket Algorithm (a) A leaky bucket with water. (b) a leaky bucket with packets.

The Token Bucket Algorithm (a) Before. (b) After. 5-34

Token Bucket Algorithm (2) Burst length – S sec. Maximum output rate – M bytes/sec Token bucket capacity – B bytes Token arrival rate – R bytes/sec An output burst contains a maximum of (B + RS) bytes. The number of bytes in a maximum speed burst of length S seconds is MS. Hence, we have: B + RS = MS This equation can be solved to get S = B /(M − R)

Traffic Shaping (2) (a) Traffic from a host. Output shaped by a token bucket of rate 200 Mbps and capacity (b) 9600 KB, (c) 0 KB.

Traffic Shaping (3) Token bucket level for shaping with rate 200 Mbps and capacity (d) KB, (e) 9600 KB, and (f) 0KB..

Packet Scheduling Kinds of resources that can potentially be reserved for different flows: 1. Bandwidth. 2. Buffer space. 3. CPU cycles.

Packet Scheduling (2) Round-robin Fair Queuing

Packet Scheduling (3) (a)Weighted Fair Queueing. (b)Finishing times for the packets.

Admission Control (1) An example flow specification

a)T = 1/\mu X 1/(1-\lambda/\mu) -- \lambda = 0.95Mpackets/sec b)\mu = 1Mb packets/sec

Admission Control (2) Bandwidth and delay guarantees with token buckets and WFQ.

Integrated Services: RSVP—The Resource reSerVation Protocol (a) A network. (b) The multicast spanning tree for host 1. (c) The multicast spanning tree for host 2.

Hosts 1 and 2 are multicast sender 3,4, 5 are multicast receiver Host 3 reserves for Host 1 and the Host 2 Host 5 reserves Host 1 (so the common path is utilized). However depending on need (Host 5 may be a bigger TV) – provision is made for the greediest part

RSVP (2) (a) Host 3 requests a channel to host 1. (b) Host 3 then requests a second channel, to host 2. (c) Host 5 requests a channel to host 1.

Differentiated Services: Expedited Forwarding Expedited packets experience a traffic-free network

Class-Based Service Per Hop Behaviors Traffic within a class are given preferential treatment Expedited Forwarding Packets marked – Regular or Expedited Assured Forwarding Gold, Silver, Bronze, common Packets that face congestion low (short burst), medium and high _ this classes are determined by tocken bucket algorithm

Differentiated Services: Assured Forwarding A possible implementation of assured forwarding, weighted fair scheduling, RED (randome Early Detection discards packet according to the class).

The Leaky Bucket Algorithm (a) Input to a leaky bucket. (b) Output from a leaky bucket. Output from a token bucket with capacities of (c) 250 KB, (d) 500 KB, (e) 750 KB, (f) Output from a 500KB token bucket feeding a 10-MB/sec leaky bucket.