Congestion control algorithms.pptx

704 views 15 slides May 26, 2023
Slide 1
Slide 1 of 15
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15

About This Presentation

A state occurring in network layer when the message traffic is so heavy that it slows down network response time.
Effects of Congestion
As delay increases, performance decreases.
If delay increases, retransmission occurs, making situation worse.


Slide Content

Submitted By Ujjwal matoliya Assignment computer network What is congestion? Traffic Shaping Congestion control algorithms Choke Packet

Content What is congestion? Traffic Shaping Congestion control algorithms Choke Packet

What is congestion? A state occurring in network layer when the message traffic is so heavy that it slows down network response time. Effects  of Congestion As delay increases, performance decreases. If delay increases, retransmission occurs, making situation worse.

Traffic Shaping  A network traffic management technique. Traffic shaping is used to control bandwidth of the network to ensure quality of service to business-critical applications This technique uses parameters to shape the flow of network traffic : Average bandwidth Peak bandwidth

Average Bandwidth : It is configured to set permitted bits per second across a port group level or a virtual/distributed virtual switch, over time. The rate of data transfer is permitted over time. Peak bandwidth : It decides maximum number of bits per second permitted across a port group level or a virtual/distributed virtual switch without discarding or queuing the frames.

Time Data rate Average Bandwidth Peak bandwidth

Congestion control algorithms 1.Leaky Bucket Algorithm 2.Token bucket Algorithm

Imagine a bucket with a small hole in the bottom.No matter at what rate water enters the bucket, the outflow is at constant rate.When the bucket is full with water additional water entering spills over the sides and is lost. Leaky Bucket Algorithm

The leaky bucket algorithm enforces output pattern at the average rate, no matter how bursty the traffic is. So in order to deal with the bursty traffic we need a flexible algorithm so that the data is not lost. One such algorithm is token bucket algorithm. Token bucket Algorithm

2 10 mbps 1 5 mbps

Formula:   M * s = C + ρ * s where S – is time taken M – Maximum output rate ρ – Token arrival rate C – Capacity of the token bucket in byte

Choke Packet A choke packet is used in network maintenance and quality management to inform a specific node or transmitter that its transmitted traffic is creating congestion over the network. This forces the node or transmitter to reduce its output rate. Choke packets are used for congestion and flow control over a network. The source node is addressed directly by the router, forcing it to decrease its sending rate .The source node acknowledges this by reducing the sending rate by some percentage.