Congestion control

NoushadHasan 565 views 21 slides Aug 03, 2018
Slide 1
Slide 1 of 21
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21

About This Presentation

Congestion control


Slide Content

CONGESTION CONTROL GROUP member TABASSUM HAIDARY ABU TAHERA CHOWDHORY M ow NOUSHAD HASAN JABIN

WELCOME To Our Presentation

Topic Congestion Control

What is Congestion? Too much traffic on subnet cause congestion. It occur when subnet is out of buffer. Congestion On route. Queue overflows Packets droped Network congested.

Facts that Cause Congestion? Insufficient memory. Slow Processor. Packet arrival rate. Low Bandwidth line also cause congestion. The main cause of congestion is bursty nature of traffic.

Congestion Control To prevent the congestion we need some several principles or rules. These are: Load Sheding Choke Packets Traffic Shapping Random Early Discard

Load shedding Simple method drop packets Concept from electric power generation. Buffer full router discard packets. throw away packets. depends on application for discarded.

Wine Policy Example: File transmission. Milk Policy Example: Live Streaming.

Choke Packets Congested router generate choke packets Transmit them Upon receiving sender reduce transmission rate

Choke Packets Choke Packet Source Congested Router

Choke Packets A D E F A A E E D D F

Explicit Congestion Notification Congested router mark packets Forward to destination Destination send Congestion Signal to Source Source slow down

Hop By Hop Choke Packets Choke packet effect all hops Reduce congestion instantly More effective than Choke Packets over long distance

Hop By Hop Choke Packets A D F E F E A D D A E F A E F D

Random Early Detection Doesn’t wait for queue to be completely fill up Maintain an Average length of queue Average length exceeds, discard few packets Lost packets works as choke packets Sender notice them and slow down

Traffic Shaping Regulating the average rate and burstiness Of a flow of data that enters the network. Two traffic shaping algorithm are- #1: Leaky Bucket #2: Token Bucket

Leaky Bucket Shapes bursty traffic into fixed-rate traffic by averaging the data rate . Drop the packet if the bucket is full. Does nothing when input is idle.

Leaky bucket implementation

Token bucket The token bucket allows bursty traffic at a regulated maximum rate. -bucket holds tokens. -to transmit a packet, the host must capture and destroy one token. -tokens are generated by a clock at a rate one token every  t sec.

Token bucket

Thank You Any Question?
Tags