CONGESTION CONTROL.

Slides:



Advertisements
Similar presentations
CprE 458/558: Real-Time Systems
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
EE 4272Spring, 2003 Chapter 12 Congestion in Data Networks Effect of Congestion Control  Ideal Performance  Practical Performance Congestion Control.
Network layer -- May Network layer Computer Networks.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
01. Apr INF-3190: Congestion Control Congestion Control Foreleser: Carsten Griwodz
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Congestion Control Algorithms
The Network Layer Functions: Congestion Control
Review: Routing algorithms Distance Vector algorithm. –What information is maintained in each router? –How to distribute the global network information?
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Congestion Control Tanenbaum 5.3 Tanenbaum 6.5. Congestion Control Network Layer – Congestion control point to point Transport Layer – Congestion control.
Congestion Control Algorithms
Congestion Control Reasons: - too many packets in the network and not enough buffer space S = rate at which packets are generated R = rate at which receivers.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
Quality of Service Requirements
ATM : CONGESTION CONTROL Group 7 29 DECEMBER 2004.
1.  Congestion Control Congestion Control  Factors that Cause Congestion Factors that Cause Congestion  Congestion Control vs Flow Control Congestion.
Network Layer Chapter 5 Design Issues Routing Algorithms
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
CS 408 Computer Networks Congestion Control (from Chapter 05)
Leon-Garcia & Widjaja: Communication Networks Copyright ©2000 The McGraw Hill Companies A Little More on Chapter 7 And Start Chapter 8 TCP/IP.
Wide Area Networks School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
1 TCP Transport Control Protocol Reliable In-order delivery Flow control Responds to congestion “Nice” Protocol.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Chapter 12 Transmission Control Protocol (TCP)
Computer Networks with Internet Technology William Stallings
Multiplexing FDM & TDM. Multiplexing When two communicating nodes are connected through a media, it generally happens that bandwidth of media is several.
1 Congestion Control Computer Networks. 2 Where are we?
CSC 581 Communication Networks II Chapter 7c: Congestion Control Dr. Cheer-Sun Yang.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 23 Congestion Control and Quality of Service.
Lecture Network layer -- May Congestion control Algorithms.
Random Early Detection (RED) Router notifies source before congestion happens - just drop the packet (TCP will timeout and adjust its window) - could make.
1 Networking and Internetworking Devices we need networking and internetworking devices to extend physical distance and to improve efficiency and manageability.
-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
The Network Layer Congestion Control Algorithms & Quality-of-Service Chapter 5.
Lec # 25 Computer Network Muhammad Waseem Iqbal. Learn about the Internetworking Devices – Repeaters – Hubs – Switches – Bridges – Routers.
Network Processing Systems Design
UNIT 4.  Functions of network devices Separating (connecting) networks or expanding network e.g. repeaters, hubs, bridges, routers, switches, gateways.
The Network Layer Role Services Main Functions Standard Functions
Topics discussed in this section:
Congestion Control, Quality of Service, and Internetworking
Congestion Control Evaluation in Dynamic Network
Chapter 5 The Network Layer.
CONGESTION CONTROL.
Transport Layer Unit 5.
CONGESTION CONTROL, QUALITY OF SERVICE, & INTERNETWORKING
Border Gateway Protocol
Advanced Computer Networks
Congestion Control (from Chapter 05)
PRESENTATION COMPUTER NETWORKS
Congestion Control, Quality of Service, & Internetworking
Congestion Control (from Chapter 05)
Figure Areas in an autonomous system
Congestion Control (from Chapter 05)
CS4470 Computer Networking Protocols
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
The Network Layer Congestion Control Algorithms & Quality-of-Service
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Presentation transcript:

CONGESTION CONTROL

Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one of two things must happen: The subnet must prevent additional packets from entering the congested region until those already present can be processed. The congested routers can discard queued packets to make room for those that are arriving.

Factors that Cause Congestion Packet arrival rate exceeds the outgoing link capacity. Insufficient memory to store arriving packets Bursty traffic Slow processor

Congestion Control, cont. Congestion Control is concerned with efficiently using a network at high load. Several techniques can be employed. These include: Warning bit Choke packets Load shedding Random early discard Traffic shaping The first 3 deal with congestion detection and recovery. The last 2 deal with congestion avoidance.

Warning Bit A special bit in the packet header is set by the router to warn the source when congestion is detected. The bit is copied and piggy-backed on the ACK and sent to the sender. The sender monitors the number of ACK packets it receives with the warning bit set and adjusts its transmission rate accordingly.

Choke Packets A choke packet is a control packet generated at a congested node and transmitted to restrict traffic flow. The source, on receiving the choke packet must reduce its transmission rate by a certain percentage.

Choke Packets 1 2 3 6 5 4 7 Flow is reduced. Choke Choke Heavy flow

Hop-by-Hop Choke Packets Over long distances or at high speeds choke packets are not very effective. A more efficient method is to send to choke packets hop-by-hop. This requires each hop to reduce its transmission even before the choke packet arrive at the source.

Hop-by-Hop Choke Packets 1 2 3 Choke Choke Heavy flow Reduced flow To provide quick relief at the point of congestion at the price of using up more buffers upstream. 5 4 Choke Flow is reduced.

Load Shedding When buffers become full, routers simply discard packets. For a file transfer, for, e.g. cannot discard older packets since this will cause a gap in the received data. For real-time voice or video it is probably better to throw away old data and keep new packets. Get the application to mark packets with discard priority.

Random Early Discard (RED) This is a proactive approach in which the router discards one or more packets before the buffer becomes completely full. Each time a packet arrives, the RED algorithm computes the average queue length, avg. If avg is lower than some lower threshold, congestion is assumed to be minimal or non-existent and the packet is queued.

RED, cont. If avg is greater than some upper threshold, congestion is assumed to be serious and the packet is discarded. If avg is between the two thresholds, this might indicate the onset of congestion. The probability of congestion is then calculated.

Traffic Shaping Another method of congestion control is to “shape” the traffic before it enters the network. Traffic shaping controls the rate at which packets are sent (not just how many). Used in Integrated Services networks. At connection set-up time, the sender and carrier negotiate a traffic pattern (shape). Two traffic shaping algorithms are: Leaky Bucket Token Bucket

The Leaky Bucket Algorithm The Leaky Bucket Algorithm used to control rate in a network. It is implemented as a single-server queue with constant service time. If the bucket (buffer) overflows then packets are discarded.

Leaky Bucket

The Leaky Bucket Algorithm (a) A leaky bucket with water. (b) a leaky bucket with packets.

Flowchart for Leaky Bucket Algorithm

Token Bucket Algorithm In contrast to the LB, the Token Bucket Algorithm, allows the output rate to vary, depending on the size of the burst. In the TB algorithm, the bucket holds tokens. To transmit a packet, the host must capture and destroy one token. Tokens are generated by a clock at the rate of one token every t sec. Idle hosts can capture and save up tokens (up to the max. size of the bucket) in order to send larger bursts later.

The Token Bucket Algorithm 5-34 (a) Before. (b) After.

Token bucket

Leaky Bucket vs Token Bucket LB discards packets; TB does not. TB discards tokens. With TB, a packet can only be transmitted if there are enough tokens to cover its length in bytes. LB sends packets at an average rate. TB allows for large bursts to be sent faster by speeding up the output. TB allows saving up tokens (permissions) to send large bursts. LB does not allow saving.

Types of Fragmentation (a) Transparent fragmentation. (b) Nontransparent fragmentation. Transparent Fragmentation Non-Transparent Fragmentation

Elementary Fragmentation

Internetworking Devices Layer 1: Repeater or Amplifier To amplify or regenerate signals Layer 2: (Multi-protocol) Bridge Store-and-forward device Headers at layer 2 are translated if necessary. Layer 3: (Multi-protocol) Router Headers at layer 3 (and layer 2) are translated if necessary. Layer 4~7: Transport/Application Gateway

Devices on the Market Repeater, Hub Bridge (Multi-protocol) Router, Layer 3 Switch Layer 4 Switch Gateway with interfaces of distinct layer protocols Bridge/Router (or called B-Router)

How Networks Differ Service offered Protocol Addressing Connection-oriented versus Connectionless Protocol IP, IPX, CLNP, AppleTalk, DECnet, etc. Addressing Flat (802) versus hierarchical (IP, PDN, PSTN, ISDN, etc.) Multicasting/Broadcasting Present or absent

How Networks Differ (Cont.) Packet size Every network has its own maximum Quality of service Present or absent Error handling Reliable, ordered, and unordered delivery Flow control Sliding window, rate control, others, or none

How Networks Differ (Cont.) Congestion control Leaky bucket, choke packets, etc. Security Privacy rules, encryption, etc. Parameters Different timeouts, flow specifications, etc. Accounting By connection time, by packet, by byte, or not at all