Network layer -- May 20041 Network layer Computer Networks.

Slides:



Advertisements
Similar presentations
1 IK1500 Communication Systems IK1330 Lecture 3: Networking Anders Västberg
Advertisements

1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
EE 4272Spring, 2003 Chapter 12 Congestion in Data Networks Effect of Congestion Control  Ideal Performance  Practical Performance Congestion Control.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
01. Apr INF-3190: Congestion Control Congestion Control Foreleser: Carsten Griwodz
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Congestion Control Algorithms
The Network Layer Functions: Congestion Control
Review: Routing algorithms Distance Vector algorithm. –What information is maintained in each router? –How to distribute the global network information?
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Congestion Control Tanenbaum 5.3 Tanenbaum 6.5. Congestion Control Network Layer – Congestion control point to point Transport Layer – Congestion control.
Congestion Control Algorithms
CONGESTION CONTROL T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System.
Congestion Control Reasons: - too many packets in the network and not enough buffer space S = rate at which packets are generated R = rate at which receivers.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
Quality of Service Requirements
1.  Congestion Control Congestion Control  Factors that Cause Congestion Factors that Cause Congestion  Congestion Control vs Flow Control Congestion.
Network Layer Chapter 5 Design Issues Routing Algorithms
CS 408 Computer Networks Congestion Control (from Chapter 05)
Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies A Little More on Chapter 7 And Start Chapter 8 TCP/IP.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
NETWORK LAYER. CONGESTION CONTROL In congestion control we try to avoid traffic congestion. Traffic Descriptor Traffic descriptors are qualitative values.
Congestion Control Tanenbaum 5.3, /12/2015Congestion Control (A Loss Based Technique: TCP)2 What? Why? Congestion occurs when –there is no reservation.
10 - Network Layer. Network layer r transport segment from sending to receiving host r on sending side encapsulates segments into datagrams r on rcving.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Semester Copyright USM EEE449 Computer Networks Congestion En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK) Room.
Data Transfer Case Study: TCP  Go-back N ARQ  32-bit sequence # indicates byte number in stream  transfers a byte stream, not fixed size user blocks.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
1 Lecture 14 High-speed TCP connections Wraparound Keeping the pipeline full Estimating RTT Fairness of TCP congestion control Internet resource allocation.
10/19/20151 The Network Layer. 10/19/20152 Introduction Route packets through subnet So, it must know the topology of the subnet It should also be able.
Chapter 12 Transmission Control Protocol (TCP)
4: Network Layer4-1 Schedule Today: r Finish Ch3 r Collect 1 st Project r See projects run r Start Ch4 Soon: r HW5 due Monday r Last chance for Qs r First.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
1 Congestion Control Computer Networks. 2 Where are we?
Forwarding.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
CONGESTION CONTROL.
Lecture Network layer -- May Congestion control Algorithms.
Data Transfer Case Study: TCP  Go-back N ARQ  32-bit sequence # indicates byte number in stream  transfers a byte stream, not fixed size user blocks.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
 First: Data Link Layer  1. Retransmission Policy: It deals with how fast a sender times out and what it transmit upon timeout. A jumpy sender that times.
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
Chapter 10 Congestion Control in Data Networks and Internets 1 Chapter 10 Congestion Control in Data Networks and Internets.
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach Featuring the Internet, 4th edition. Jim Kurose, Keith Ross Chapter.
The Network Layer Congestion Control Algorithms & Quality-of-Service Chapter 5.
Unit-4 Lecture 9 Network Layer 1. Congestion Prevention Polices. To avoid congestion by using the appropriate polices at different levels. Layers DL Layer.
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
Topics discussed in this section:
Congestion Control Evaluation in Dynamic Network
Network Layer Goals: Overview:
Chapter 5 The Network Layer.
CONGESTION CONTROL.
Notes and Handouts Congestion Control
Border Gateway Protocol
The Network Layer Network Layer Design Issues:
Congestion Control (from Chapter 05)
Congestion Control, Quality of Service, & Internetworking
Congestion Control (from Chapter 05)
Figure Areas in an autonomous system
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
The Network Layer Congestion Control Algorithms & Quality-of-Service
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control Algorithms
Presentation transcript:

Network layer -- May Network layer Computer Networks

Network layer -- May Network Layer  Design issues  Routing  Congestion  Internetworking  Internet Protocols  Multimedia or QoS  General principles  Prevention policies  Handling virtual circuit subnets  General techniques  Jitter control

Network layer -- May Congestion?  Too many packets in (a part of) the subnet!

Network layer -- May Congestion?  Too many packets in (a part of) the subnet!  caused by othe same output line is used by many input lines omismatch between system parts slow processor low bandwidth lines  tends to feed upon itself  Congestion control <> flow control oCongestion: global issue oFlow control: point-to-point

Network layer -- May Congestion: principles  How? Good design oMake sure the problem does not occur  Tools oDecide when to accept traffic oDecide when to discard packets and which ones oMake scheduling decisions in the subnet  Monitor: where and when congestion? o% packets discarded oaverage queue length onumber of packets that time out oaverage packet delay  Pass collected info to places where actions can be taken = source of traffic oexplicit <> implicit feedback oexplicit: (extra) packet, flags (in other packets), probe packets  Adjust system operation oIncrease resources: bandwidth oDecrease load: deny, degrade service Control theory viewpoint open loopclosed loop

Network layer -- May Network Layer  Design issues  Routing  Congestion  Internetworking  Internet Protocols  Multimedia or QoS  General principles  Prevention policies  Handling virtual circuit subnets  General techniques  Jitter control

Network layer -- May Congestion: prevention  Minimize congestion LayerPolicies Transport  Retransmission policy  Out-of-order caching policy  Acknowledgement policy  Flow control policy  Timeout determination Network  Virtual circuits <> datagrams in subnet  Packet queueing and service policy  Packet discard policy  Routing algorithm  Packet lifetime management Data link  See transport layer

Network layer -- May Network Layer  Design issues  Routing  Congestion  Internetworking  Internet Protocols  Multimedia or QoS  General principles  Prevention policies  Handling virtual circuit subnets  General techniques  Jitter control

Network layer -- May Virtual circuit subnets  Dynamic approach: act when needed  Admission control oNo new virtual circuits when congestion is signalled oe.g. telephone network  Route new virtual circuits around problem areas

Network layer -- May Virtual circuit subnets  Dynamic approach  Admission control  Route new virtual circuits around problem areas  Negotiation when virtual circuit is set up oAbout kind of traffic + service desired oResource reservation in subnet Line capacity Buffers in routers  No congestion  Unused resources

Network layer -- May Network Layer  Design issues  Routing  Congestion  Internetworking  Internet Protocols  Multimedia or QoS  General principles  Prevention policies  Handling virtual circuit subnets  General techniques  Jitter control

Network layer -- May General techniques  Approaches: reduce traffic by oRequesting senders local measurements + info packets to senders + hope for …. oThrowing away packets local measurements + local actions to reduce load

Network layer -- May Source based approach  Basic algorithm oRouter monitors utilisation of output lines u recent utilisation: 0  u  1 good estimate of u u new = a  u old + (1 – a )  f oIn case of overload: u new > threshold Output line enters warning state Some action is taken: –Warning bit –Choke packets –Hop-by-hop choke packets fInstantaneous line utilisation aconstant

Network layer -- May Source based approach  Warning bit oOutput line in warning state Warning bit set in header Destination copies bit into next ack Source cuts back traffic oAlgorithm at source As long as warning bits arrive: reduce traffic Less warning bits: increase traffic oProblems voluntary action of host! correct source selected? oUsed in DecNet Frame relay

Network layer -- May Source based approach  Choke packet oIn case of overload: router sends choke packet to host causing the overload oHost receiving choke packet reduces traffic to the specified destination ignores choke packets for a fixed interval new choke packets during next listening interval? –Yes: reduce traffic –No: increase traffic oProblems: voluntary action of host! correct host selected?

Network layer -- May Source based approach  Choke packets: oExample showing slow reaction oSolution: Hop-by-Hop choke packets

Network layer -- May Source based approach  Hop-by-Hop choke packets oHave choke packet take effect at every hop oProblem: more buffers needed in routers

Network layer -- May Load shedding  Throw away packets that cannot be handled!!  Packet selection? oRandom oBased on application File transfer: discard new packet Multimedia: discard old packet oLet sender indicate importance of packets Low, high priority Incentive to mark a packet with low priority –Price –Allow hosts to exceed agreed upon limits  Random early detection …

Network layer -- May Load shedding  Throw away packets that cannot be handled!!  Packet selection?  Random early detection oDiscard packets before all buffer space is exhausted oRouters maintain running average of queue lengths oSelect at random a packet oInform source? Send choke packet?  more load!! No reporting oWhen does it work? Source slows down when packets are lost

Network layer -- May Network Layer  Design issues  Routing  Congestion  Internetworking  Internet Protocols  Multimedia or QoS  General principles  Prevention policies  Handling virtual circuit subnets  General techniques  Jitter control

Network layer -- May Congestion: jitter control  Important for audio and video applications? onot delay ovariance of delay

Network layer -- May Congestion: jitter control  Jitter = variation in packet delay  Compute feasible mean value for delay ocompute expected transit time for each hop orouter checks to see if packet is behind ahead schedule obehind: forward packet asap oahead: hold back packet to get it on schedule again  Buffering? Depends on characteristics: oVideo on demand: ok oVideoconferencing: nok

Network layer -- May Network Layer  Design issues  Routing  Congestion  Internetworking  Internet Protocols  Multimedia or QoS

Network layer -- May Network layer Computer Networks