Congestion Control Tanenbaum 5.3 Tanenbaum 6.5. Congestion Control Network Layer – Congestion control point to point Transport Layer – Congestion control.

Slides:



Advertisements
Similar presentations
CprE 458/558: Real-Time Systems
Advertisements

Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
EE 4272Spring, 2003 Chapter 12 Congestion in Data Networks Effect of Congestion Control  Ideal Performance  Practical Performance Congestion Control.
Network layer -- May Network layer Computer Networks.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
01. Apr INF-3190: Congestion Control Congestion Control Foreleser: Carsten Griwodz
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Congestion Control Algorithms
The Network Layer Functions: Congestion Control
Review: Routing algorithms Distance Vector algorithm. –What information is maintained in each router? –How to distribute the global network information?
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Congestion Control Algorithms
CONGESTION CONTROL T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
24.1 Chapter 24 Congestion Control and Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1.  Congestion Control Congestion Control  Factors that Cause Congestion Factors that Cause Congestion  Congestion Control vs Flow Control Congestion.
Engineering Internet QoS
Jaringan Komputer Lanjut Traffic Management Aurelio Rahmadian.
Network Layer Chapter 5 Design Issues Routing Algorithms
NETWORK LAYER. CONGESTION CONTROL In congestion control we try to avoid traffic congestion. Traffic Descriptor Traffic descriptors are qualitative values.
Congestion Control An Overview -Jyothi Guntaka. Congestion  What is congestion ?  The aggregate demand for network resources exceeds the available capacity.
Congestion Control Tanenbaum 5.3, /12/2015Congestion Control (A Loss Based Technique: TCP)2 What? Why? Congestion occurs when –there is no reservation.
1 689 Lecture 2 Review of Last Lecture Networking basics TCP/UDP review.
1 TCP Transport Control Protocol Reliable In-order delivery Flow control Responds to congestion “Nice” Protocol.
Data Communication and Networks
L13: Sharing in network systems Dina Katabi Spring Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
Univ. of TehranAdv. topics in Computer Network1 Advanced topics in Computer Networks University of Tehran Dept. of EE and Computer Engineering By: Dr.
1 Lecture 14 High-speed TCP connections Wraparound Keeping the pipeline full Estimating RTT Fairness of TCP congestion control Internet resource allocation.
TCP Trunking: Design, Implementation and Performance H.T. Kung and S. Y. Wang.
1 Congestion Control Computer Networks. 2 Where are we?
CSC 581 Communication Networks II Chapter 7c: Congestion Control Dr. Cheer-Sun Yang.
9.7 Other Congestion Related Issues Outline Queuing Discipline Avoiding Congestion.
Copyright 2008 Kenneth M. Chipps Ph.D. Controlling Flow Last Update
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 - Queuing and Basics of QoS.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Deadline-based Resource Management for Information- Centric Networks Somaya Arianfar, Pasi Sarolahti, Jörg Ott Aalto University, Department of Communications.
Winter 2008CS244a Handout 81 CS244a: An Introduction to Computer Networks Handout 8: Congestion Avoidance and Active Queue Management Nick McKeown Professor.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
The Macroscopic behavior of the TCP Congestion Avoidance Algorithm.
CONGESTION CONTROL.
Lecture Network layer -- May Congestion control Algorithms.
LECTURE 12 NET301 11/19/2015Lect NETWORK PERFORMANCE measures of service quality of a telecommunications product as seen by the customer Can.
 First: Data Link Layer  1. Retransmission Policy: It deals with how fast a sender times out and what it transmit upon timeout. A jumpy sender that times.
24.1 Chapter 24 Congestion Control and Quality of Service ICE302 Term # 2 Lecture # 3 Md. Asif Hossain.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
The Network Layer Congestion Control Algorithms & Quality-of-Service Chapter 5.
Unit-4 Lecture 9 Network Layer 1. Congestion Prevention Polices. To avoid congestion by using the appropriate polices at different levels. Layers DL Layer.
Topics discussed in this section:
Congestion Control and
Chapter 6 Congestion Avoidance
Buffer Management in a Switch
Congestion Control Evaluation in Dynamic Network
CONGESTION CONTROL.
CONGESTION CONTROL, QUALITY OF SERVICE, & INTERNETWORKING
Lecture 19 – TCP Performance
Border Gateway Protocol
Advanced Computer Networks
The Network Layer Network Layer Design Issues:
Congestion Control, Quality of Service, & Internetworking
Figure Areas in an autonomous system
Chapter 11. Frame Relay Background Frame Relay Protocol Architecture
TCP Overview.
Network Performance Definitions
The Network Layer Congestion Control Algorithms & Quality-of-Service
Congestion Control.
Error Checking continued
Presentation transcript:

Congestion Control Tanenbaum 5.3 Tanenbaum 6.5

Congestion Control Network Layer – Congestion control point to point Transport Layer – Congestion control end-to-end Packets Delivered Packets Sent Maximum capacity of bottleneck link Objective Congestion Congestion Collapse

Congestion Control: Strategies Open loop – Prevent congestion by design – E.g., admission control Closed loop – Monitor some characteristics of system – Inform key elements that can take action – Adjust system operation whenever needed

Impact of Policies on Congestion Control Link Layer policies – Retransmission – Out-of-order caching – Acknowledgement – Flow control

Impact of Policies on Congestion Control (2) Network Layer policies – Virtual circuit/datagram – Packet scheduling – Queue management – Routing algorithm – Packet lifetime management

Impact of Policies on Congestion Control (3) Transport Layer policies – Retransmission – Out-of-order caching – Acknowledgement – Flow control – Timeout determination

Congestion Control in Packet Switched Networks Monitor some system state variable u u may be link utilization, loss rate Instantaneous u now Average value u computed as: – u new = .u last + (1-  ) u now – 0 <=  <= 1 Use of thresholds

Techniques at Network Layer DECBit (Warning bit) Source Quench packets (choke packets) Hop-by-hop choke packets Load shedding RED

How to Control the Load? Rate control: – A source control the rate with which it injects traffic (leacky bucket, token bucket) (Read section 5.4.2) Window control – A source controls the amount of OUTSTANDING traffic * Outstanding traffic: packets sent, not yet ack’ed

Leaky Bucket Source behaves “like” a leaky bucket In short: it is a G/D/1 (queueing system with constant rate) Implementation: – Source driven by clock – Every tick, source is allowed to inject some amount of traffic – When queue is full, further packets are dropped – When queue is empty…. (this is somewhat the problem)

Token Bucket In contrast with leaky bucket, Token bucket “collects” credit when queue is empty for “rainy” days. What is a “rainy” day? A burst Implementation: – Maintain a token counter Tk – Tk increases with time (every period P) – Tk decreases when packets are sent – A packet can be sent only if there is a token that it can “destroy” – When bucket fills up, stop collect tokens, but do not discard arriving packets.

Token Bucket – In short, Token bucket allows bursts (based on the arrival rate of tokens) – In general, we are interested by the maximum burst length S (in time) injected – C + .S = M.S M (maximum Line rate )  : token Arrival rate C: capacity