Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Congestion Control Computer Networks. 2 Where are we?

Similar presentations


Presentation on theme: "1 Congestion Control Computer Networks. 2 Where are we?"— Presentation transcript:

1 1 Congestion Control Computer Networks

2 2 Where are we?

3 3 Recall Data Link Layer Link level specific transmission Network Layer End-to-End host addressing and routing Transport Layer End-to-End application multiplexing and message flow-control An expert: Sally Floyd http://www.aciri.org/floyd/ An expert: Van Jacobson

4 4 Note Flow control is a subset of congestion control. The former attempts to properly match the rate of the sender with that of the network and receiver. The later deals with the sustained overload of intermediate network elements such as internetwork routers.

5 5 Congestion Collapse As the network load increases, packet drops and thus packet retransmissions increase Fragments dropped are especially annoying, the remaining fragments get sent, but cannot be used As retransmissions increase, less actual work gets done

6 6 Some Congestion Fixes When congestion increases, slow down! Additive Increase, Multiplicative Decrease is used in TCP Setup reservations or service classes Packets failing to adhere to their class or reservation are simply discarded or put onto a low priority queue/link Discover end-to-end MTU if fragments are getting dropped

7 7 Fairness Equal share bandwidth to end stations Fair share based on application Fair share based on timeliness of data Fair share based on value of data Fair share based on price paid...and so on

8 8 Active Congestion Control Mechanisms Eligible discard Queue management Network Signaling and Notification End station avoidance Class of service signaling Quality of service reservations

9 9 Eligible Discard Frames, cells or packets are marked according to a drop priority Source or edge intermediate device may mark based on some policy watermark/threshold reached data type source destination cost Usually implemented at data link or network layer

10 10 Eligible Discard Illustrated

11 11 Queue Management First in, first dropped (FIFO) Tail drop (LIFO) Leaky bucket Token bucket Random early detection (RED) Weighted Fair Queueing Usually implemented in intermediate devices such as routers and switches

12 12 First In, First Out Illustrated Queue pointers need to be updated Sender learns of drop sooner

13 13 Last In, First Out Illustrated Simple - no queue pointers to update Source cannot react as quick

14 14 Leaky Bucket Illustrated From Tanenbaum Figure 5-24, graphic will print to a Postscript printer

15 15 Token Bucket Illustrated From Tanenbaum Figure 5-26, graphic will print to a Postscript printer

16 16 RED Illustrated Probability marking applied to each packet based on queue length, packet being dropped

17 17 Weighted Fair Queueing

18 18 Network Signaling and Notification Also called choke packets In Frame Relay Forward Explicit Congestion Notification (FECN) Backward Explicit Congestion Notification (BECN) Bit in frame set Experimental Internet mechanism Explicit Congestion Notification (ECN) Bits set in packets to hosts

19 19 End Station Avoidance Also called end-to-end control TCP Slow start Congestion avoidance Fast Retransmit Fast Recovery

20 20 Class of Service Signaling Packets marked to a particular traffic class IEEE 802.1p Differentiated Services (DiffServ) Re-defines IP Type of Service (ToS) bit fields Asynchronous Transfer Mode

21 21 Quality of Service Reservations Resource ReSerVation Protocol Reserve resources in routers Requires stateful path Asynchronous Transfer Mode (ATM)


Download ppt "1 Congestion Control Computer Networks. 2 Where are we?"

Similar presentations


Ads by Google