SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Group Member Roll Number 
Melvin Francis 13 
Madhusudhan G 17 
Kunal Jadhav 19 
Sameer Natekar 33 
Sooryakanth S 49
AGENDA 
 Learning… 
 Congestion 
 Network performance 
 Controlling… 
 Congestion 
 TCP controlling congestion 
 Additive-increase, multiplicative-decrease 
 Slow start. 
2
Congestion 
Definition: Congestion in a network may 
occur if load on the network or the no of 
packets sent to the network is greater than 
the capacity of the network 
Many possible causes 
 Rapid retransmissions of packets still in flight 
 Undelivered packets 
3
Congestion is Unavoidable 
 Two packets arrive at the same time 
 The node can only transmit one 
 … and either buffer or drop the other 
 Congestion in network happens because routers have input 
and output queues 
 If many packets arrive in a short period of time 
 The node cannot keep up with the arriving traffic 
 … and the buffer may eventually overflow 
4
 The packet is put at the end of input queue 
 The router removes the router from input queue and 
uses its routing table and destination address to find the 
route. 
 The packet is put in the appropriate output queue.
Issues 
 If the rate of arrival is higher than processing rate then 
the input queue becomes longer 
 If packet departure rate is less than processing rate 
then output queue becomes longer
Network Performance 
 Delay Versus Load 
 when the load is much less then delay is at minimum. 
 Delay becomes infinite when the load is greater than the 
network capacity. 
 when a packet is delayed, the source, not receiving the 
acknowledgment retransmit the packet which makes the 
delay and congestion, worse.
Network Performance 
 Throughput Versus Load 
 Throughput in a network is the number of packets 
passing through a network in a unit of time. 
 When the load exceeds capacity of network,throughput 
declines sharply because packets get discarded by router. 
 This does not reduce no of packets because source 
retransmit them.
Network Performance
Congestion Control 
 Congestion control refers to techniques and mechanisms that can 
either prevent congestion, before it happens, or remove congestion, 
after it has happened. 
 Categories :
Open loop Policies 
 In open-loop congestion, policies are applied to prevent 
congestion before it happens. 
 Congestion control is handled by either the source or the 
destination 
Retransmission Policy : 
 If the sent packet is lost or corrupted, the packed needs to 
be retransmitted by the sender. 
 Retransmission policy and retransmission timers must be 
designed to optimize efficiency and at the same time 
prevent congestion. 
 E.g.. Policy used by TCP for Retransmission
Window Policy : 
 Selective Repeat window is used instead of Go-Back-N 
window. 
Acknowledgment Policy : 
 The receiver does not acknowledges every packet it 
receives, it slows the sender and help prevent congestion. 
 Sending fewer acknowledgements means imposing less 
load on the network.
Discarding Policy : 
 A good discarding policy by the router may prevent 
congestion and at the same time may not harm the 
integrity of the transmission. 
Admission Policy : 
 It is a QoS mechanism which prevents congestion in 
virtual-circuit networks. 
 A router can deny establishing a virtual-circuit connection 
if there is congestion in the network or if there is a 
possibility of future congestion.
Discarding Policy : 
 A good discarding policy by the router may prevent 
congestion and at the same time may not harm the 
integrity of the transmission. 
Admission Policy : 
 It is a QoS mechanism which prevents congestion in 
virtual-circuit networks. 
 A router can deny establishing a virtual-circuit connection 
if there is congestion in the network or if there is a 
possibility of future congestion.
Closed- loop congestion control 
Closed loop congestion control mechanisms try to 
alleviate congestion after it happens. 
It is useful to network which had congestion during 
the transfer of messages from one node to other node.
Types of mechanism to prevent congestion after 
it happens 
1 Backpressure. 
2 Choke Packet. 
3 Implicit Signaling. 
4 Explicit Signaling. 
5 Backward Signaling. 
6 Forward Signaling.
Backpressure 
The technique of backpressure refers to a congestion 
control mechanisms in which a congested node stops 
receiving data from the immediate upstream node or 
nodes. 
This may cause the upstream nodes to become 
congested and they in turn reject data from their 
upstream nodes.
Backpressure 
Backpressure Backpressure 
I II III IV 
Congestion 
Source Destination 
Data Flow 
Fig 1.1 Backpressure method of alleviating congestion
Choke Packet 
A choke packet is a packet sent by a node to the source 
to inform it of that congestion had occurred on the 
network. 
Message is sent from congested node directly to the 
source station without informing the intermediate 
routers
Choke 
packet 
I II III IV 
Congestion 
Source Destination 
Data Flow 
Fig 1.2 Choke Packet
Implicit Signaling 
In implicit signaling ,there is no communication 
between the congested node or nodes and the source. 
The source guesses that there is a congestion somewhere 
in the network. 
For example, when a source sends several packets and 
there is no acknowledgement for a while, one 
assumption is that the network is congested
Explicit signaling 
The node that experiences congestion can explicitly send 
a signal to the source or destination . 
Difference between choke packet and explicit signaling 
is that in choke packet separate packet is used for the 
sending signal to source, whereas in explicit signaling 
method ,signal is included in the packets that carry data.
Backward Signaling 
A bit can be set in a packet moving in the direction 
opposite to the congestion . 
This bit can warn the source that there is congestion and 
that it needs to slow down to avoid the discarding of 
packets.
Forward Signaling 
A bit can be set in a packet moving in the direction of 
the congestion . 
This bit can warn the destination that there is 
congestion. 
The receiver in this case can use policies ,such as 
slowing down the acknowledgments ,to alleviate the 
congestion.
TCP Controlling Congestion 
 Congestion Window 
 Sender’s window size is determined not only by the 
receiver but also by congestion in the network. 
 Actual window size = minimum(rwnd, cwnd) 
 Congestion Policy 
 Slow start: Exponential Increase 
 Congestion Avoidance: Additive Increase 
 Congestion Detection: Multiplicative Decrease
TCP Controlling Congestion 
 Slow start: Exponential Increase 
 Size of the congestion window starts with one maximum 
segment size (MSS). 
 The size of window increases one MSS each time an ack is 
received. 
 Consider cwnd=1 MSS. Sender can only send one segment. 
After ack for 1 segment, cwnd size is increased by 1, now cwnd 
is 2 and two more segment can be sent. 
 When all seven segments are acknowledged, cwnd = 8. 
Size of cwnd increases exponentially.
TCP Controlling Congestion
TCP Controlling Congestion 
 Congestion Avoidance: Additive Increase 
 To avoid congestion, exponential growth must be stopped. 
 This algorithm undergoes an additive increase instead of an 
exponential one. 
 When the size of cwnd reaches slow-start threshold, slow-start 
phase stops and additive phase begins. 
 In this, when whole window of segment is acknowledged, the 
size of cwnd is increased by 1.
TCP controlling congestion
TCP Controlling Congestion 
 Congestion Detection: Multiplicative Decrease 
 The only way the sender can guess that congestion has 
occurred is by the need to re-transmit the segment. 
 It can occur in two cases: when timer times out or when 
three ACK’s are received, in both cases the size of the 
threshold is dropped to half.
TCP Controlling Congestion 
 If time-out occurs 
 Stronger possibility of congestion. 
 TCP set value of threshold to half of current window 
size. 
 Sets cwnd to the size of one segment 
 It starts the slow-start phase again 
 If three ACK’s are received 
 Weaker possibility of congestion. 
 TCP set value of threshold to half of current window 
size. 
 Sets cwnd to the vale of Threshold. 
 It starts the congestion avoidance phase.
Cases of congestion
Congestion control
Congestion control

Weitere ähnliche Inhalte

Was ist angesagt?

Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing ProtocolsKABILESH RAMAR
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer networkDisi Dc
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlAdeel Rasheed
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocolManusha Dilan
 
Adaptation of tcp window
Adaptation of tcp windowAdaptation of tcp window
Adaptation of tcp windowpriya Nithya
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocolSTEFFY D
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link ControlJeoffnaRuth
 
Data link layer
Data link layerData link layer
Data link layerst2112
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake Alok Tripathi
 

Was ist angesagt? (20)

Data link layer
Data link layer Data link layer
Data link layer
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Transport layer
Transport layerTransport layer
Transport layer
 
Transport layer
Transport layerTransport layer
Transport layer
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
Connection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion ControlConnection Establishment & Flow and Congestion Control
Connection Establishment & Flow and Congestion Control
 
Tcp
TcpTcp
Tcp
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
 
Error control
Error controlError control
Error control
 
Adaptation of tcp window
Adaptation of tcp windowAdaptation of tcp window
Adaptation of tcp window
 
Admission control
Admission controlAdmission control
Admission control
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Go back-n protocol
Go back-n protocolGo back-n protocol
Go back-n protocol
 
Chapter 11: Data Link Control
Chapter 11: Data Link ControlChapter 11: Data Link Control
Chapter 11: Data Link Control
 
Data link layer
Data link layerData link layer
Data link layer
 
TCP/IP 3-way Handshake
TCP/IP 3-way Handshake TCP/IP 3-way Handshake
TCP/IP 3-way Handshake
 
The medium access sublayer
 The medium  access sublayer The medium  access sublayer
The medium access sublayer
 
go back n protocol
go back n protocolgo back n protocol
go back n protocol
 

Ähnlich wie Congestion control

Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3Hossam El-Deen Osama
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfoptokunal1
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion AvoidanceRam Dutt Shukla
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasIOSR Journals
 
congestion control data communication.pdf
congestion control data communication.pdfcongestion control data communication.pdf
congestion control data communication.pdfnqck82120b
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit   Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit rajisri2
 
Internet congestion
Internet congestionInternet congestion
Internet congestionVikas Gupta
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptxFALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptxuseonlyfortech140
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptxFALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptxuseonlyfortech140
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptxNaveen Dubey
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...ijcseit
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...ijcseit
 
Congestion control
Congestion controlCongestion control
Congestion controlnandhulaks
 
Congestion control
Congestion control Congestion control
Congestion control arkaarka3
 

Ähnlich wie Congestion control (20)

Ch 18 intro to network layer - section 3
Ch 18   intro to network layer - section 3Ch 18   intro to network layer - section 3
Ch 18 intro to network layer - section 3
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and VegasComparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
Comparison of TCP congestion control mechanisms Tahoe, Newreno and Vegas
 
congestion control data communication.pdf
congestion control data communication.pdfcongestion control data communication.pdf
congestion control data communication.pdf
 
CONGESTION AVOIDANCE.pptx
CONGESTION AVOIDANCE.pptxCONGESTION AVOIDANCE.pptx
CONGESTION AVOIDANCE.pptx
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit   Congestion control, slow start, fast retransmit
Congestion control, slow start, fast retransmit
 
Tieu luan qo s
Tieu luan qo sTieu luan qo s
Tieu luan qo s
 
Internet congestion
Internet congestionInternet congestion
Internet congestion
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptxFALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptxFALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion control
Congestion control Congestion control
Congestion control
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Congestion control

  • 1. Group Member Roll Number Melvin Francis 13 Madhusudhan G 17 Kunal Jadhav 19 Sameer Natekar 33 Sooryakanth S 49
  • 2. AGENDA  Learning…  Congestion  Network performance  Controlling…  Congestion  TCP controlling congestion  Additive-increase, multiplicative-decrease  Slow start. 2
  • 3. Congestion Definition: Congestion in a network may occur if load on the network or the no of packets sent to the network is greater than the capacity of the network Many possible causes  Rapid retransmissions of packets still in flight  Undelivered packets 3
  • 4. Congestion is Unavoidable  Two packets arrive at the same time  The node can only transmit one  … and either buffer or drop the other  Congestion in network happens because routers have input and output queues  If many packets arrive in a short period of time  The node cannot keep up with the arriving traffic  … and the buffer may eventually overflow 4
  • 5.  The packet is put at the end of input queue  The router removes the router from input queue and uses its routing table and destination address to find the route.  The packet is put in the appropriate output queue.
  • 6. Issues  If the rate of arrival is higher than processing rate then the input queue becomes longer  If packet departure rate is less than processing rate then output queue becomes longer
  • 7. Network Performance  Delay Versus Load  when the load is much less then delay is at minimum.  Delay becomes infinite when the load is greater than the network capacity.  when a packet is delayed, the source, not receiving the acknowledgment retransmit the packet which makes the delay and congestion, worse.
  • 8. Network Performance  Throughput Versus Load  Throughput in a network is the number of packets passing through a network in a unit of time.  When the load exceeds capacity of network,throughput declines sharply because packets get discarded by router.  This does not reduce no of packets because source retransmit them.
  • 10. Congestion Control  Congestion control refers to techniques and mechanisms that can either prevent congestion, before it happens, or remove congestion, after it has happened.  Categories :
  • 11. Open loop Policies  In open-loop congestion, policies are applied to prevent congestion before it happens.  Congestion control is handled by either the source or the destination Retransmission Policy :  If the sent packet is lost or corrupted, the packed needs to be retransmitted by the sender.  Retransmission policy and retransmission timers must be designed to optimize efficiency and at the same time prevent congestion.  E.g.. Policy used by TCP for Retransmission
  • 12. Window Policy :  Selective Repeat window is used instead of Go-Back-N window. Acknowledgment Policy :  The receiver does not acknowledges every packet it receives, it slows the sender and help prevent congestion.  Sending fewer acknowledgements means imposing less load on the network.
  • 13. Discarding Policy :  A good discarding policy by the router may prevent congestion and at the same time may not harm the integrity of the transmission. Admission Policy :  It is a QoS mechanism which prevents congestion in virtual-circuit networks.  A router can deny establishing a virtual-circuit connection if there is congestion in the network or if there is a possibility of future congestion.
  • 14. Discarding Policy :  A good discarding policy by the router may prevent congestion and at the same time may not harm the integrity of the transmission. Admission Policy :  It is a QoS mechanism which prevents congestion in virtual-circuit networks.  A router can deny establishing a virtual-circuit connection if there is congestion in the network or if there is a possibility of future congestion.
  • 15. Closed- loop congestion control Closed loop congestion control mechanisms try to alleviate congestion after it happens. It is useful to network which had congestion during the transfer of messages from one node to other node.
  • 16. Types of mechanism to prevent congestion after it happens 1 Backpressure. 2 Choke Packet. 3 Implicit Signaling. 4 Explicit Signaling. 5 Backward Signaling. 6 Forward Signaling.
  • 17. Backpressure The technique of backpressure refers to a congestion control mechanisms in which a congested node stops receiving data from the immediate upstream node or nodes. This may cause the upstream nodes to become congested and they in turn reject data from their upstream nodes.
  • 18. Backpressure Backpressure Backpressure I II III IV Congestion Source Destination Data Flow Fig 1.1 Backpressure method of alleviating congestion
  • 19. Choke Packet A choke packet is a packet sent by a node to the source to inform it of that congestion had occurred on the network. Message is sent from congested node directly to the source station without informing the intermediate routers
  • 20. Choke packet I II III IV Congestion Source Destination Data Flow Fig 1.2 Choke Packet
  • 21. Implicit Signaling In implicit signaling ,there is no communication between the congested node or nodes and the source. The source guesses that there is a congestion somewhere in the network. For example, when a source sends several packets and there is no acknowledgement for a while, one assumption is that the network is congested
  • 22. Explicit signaling The node that experiences congestion can explicitly send a signal to the source or destination . Difference between choke packet and explicit signaling is that in choke packet separate packet is used for the sending signal to source, whereas in explicit signaling method ,signal is included in the packets that carry data.
  • 23. Backward Signaling A bit can be set in a packet moving in the direction opposite to the congestion . This bit can warn the source that there is congestion and that it needs to slow down to avoid the discarding of packets.
  • 24. Forward Signaling A bit can be set in a packet moving in the direction of the congestion . This bit can warn the destination that there is congestion. The receiver in this case can use policies ,such as slowing down the acknowledgments ,to alleviate the congestion.
  • 25. TCP Controlling Congestion  Congestion Window  Sender’s window size is determined not only by the receiver but also by congestion in the network.  Actual window size = minimum(rwnd, cwnd)  Congestion Policy  Slow start: Exponential Increase  Congestion Avoidance: Additive Increase  Congestion Detection: Multiplicative Decrease
  • 26. TCP Controlling Congestion  Slow start: Exponential Increase  Size of the congestion window starts with one maximum segment size (MSS).  The size of window increases one MSS each time an ack is received.  Consider cwnd=1 MSS. Sender can only send one segment. After ack for 1 segment, cwnd size is increased by 1, now cwnd is 2 and two more segment can be sent.  When all seven segments are acknowledged, cwnd = 8. Size of cwnd increases exponentially.
  • 28. TCP Controlling Congestion  Congestion Avoidance: Additive Increase  To avoid congestion, exponential growth must be stopped.  This algorithm undergoes an additive increase instead of an exponential one.  When the size of cwnd reaches slow-start threshold, slow-start phase stops and additive phase begins.  In this, when whole window of segment is acknowledged, the size of cwnd is increased by 1.
  • 30. TCP Controlling Congestion  Congestion Detection: Multiplicative Decrease  The only way the sender can guess that congestion has occurred is by the need to re-transmit the segment.  It can occur in two cases: when timer times out or when three ACK’s are received, in both cases the size of the threshold is dropped to half.
  • 31. TCP Controlling Congestion  If time-out occurs  Stronger possibility of congestion.  TCP set value of threshold to half of current window size.  Sets cwnd to the size of one segment  It starts the slow-start phase again  If three ACK’s are received  Weaker possibility of congestion.  TCP set value of threshold to half of current window size.  Sets cwnd to the vale of Threshold.  It starts the congestion avoidance phase.