SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Flow Control
by
Md.Javedul Ferdous
East West University
Flow Control
Flow control is the process of managing
the rate of data transmission between two
nodes to prevent a fast sender from
outrunning a slow receiver. It provides a
mechanism for the receiver to control the
transmission speed, so that the receiving
node is not overwhelmed with data from
transmitting node.
So why need it
?????
 Prevent degradation and loss of
efficiency due to overload.
 Prevent degradation and loss of
efficiency due to overload.
 Deadlock avoidance.
 Prevent degradation and loss of
efficiency due to overload.
 Deadlock avoidance.
 Fair allocation of resources among
competing users.
 Prevent degradation and loss of
efficiency due to overload.
 Deadlock avoidance.
 Fair allocation of resources among
competing users.
 Speed matching between the network
and its attached users.
Type of ‘Flow Control’
 Stop-and-wait
Type of ‘Flow Control’
 Stop-and-wait
 Sliding Window
Stop-and-wait
 Fundamental technique to provide
reliable transfer under unreliable packet
delivery system
Stop-and-wait
 Fundamental technique to provide
reliable transfer under unreliable packet
delivery system
 Simplest form of flow control
Stop-and-wait
 Fundamental technique to provide
reliable transfer under unreliable packet
delivery system
 Simplest form of flow control
 Inefficiencies when sending longer
transmissions
Stop-and-wait
Sliding Window
 Technique for controlling transmitted
data packets between two network
computers where reliable and sequential
delivery of data packets is required.
Sliding Window
 Technique for controlling transmitted
data packets between two network
computers where reliable and sequential
delivery of data packets is required.
 Best utilized when the buffer size is
limited and pre-established.
Sliding Window
 Technique for controlling transmitted
data packets between two network
computers where reliable and sequential
delivery of data packets is required.
 Best utilized when the buffer size is
limited and pre-established.
 Better Performance.
Sliding Window
Levels of Flow Control
 Hop Level
Levels of Flow Control
 Hop Level
 Entry-to-Exit Level
Levels of Flow Control
 Hop Level
 Entry-to-Exit Level
 Network Access Level
Levels of Flow Control
 Hop Level
 Entry-to-Exit Level
 Network Access Level
 Transport Level
Hop Level
 Prevent store and forward buffer
congestion and its consequences
Hop Level
 Prevent store and forward buffer
congestion and its consequences
 Maintain a smooth flow of traffic
between two neighboring nodes In a
computer network
Entry-to-Exit Level
 Implement as a protocol between the
source and destination switch
Entry-to-Exit Level
 Implement as a protocol between the
source and destination switch
 Protect the exit node from congestion
Network Access Level
 Throttle external inputs based on
measurements of internal network
congestion.
Transport Level
 Efficient and reliable transmission of
messages within each user session and
the efficient sharing of common network
resources by several user sessions
Transport Level
 Efficient and reliable transmission of
messages within each user session and
the efficient sharing of common network
resources by several user sessions
 Events destination buffer congestion
and overflow is known as transport level
flow control
Problem of ‘Flow Control’
Can’t send too slow or too fast
Problem of ‘Flow Control’
Can’t send too slow or too fast
Too slow
Problem of ‘Flow Control’
Can’t send too slow or too fast
Too slow
wastes time
Problem of ‘Flow Control’
Can’t send too slow or too fast
Too slow
wastes time
Too fast
Problem of ‘Flow Control’
Can’t send too slow or too fast
Too slow
wastes time
can lead to buffer overflow

Weitere ähnliche Inhalte

Was ist angesagt?

Contention Evalution Factors-8 ccategories
Contention Evalution Factors-8 ccategoriesContention Evalution Factors-8 ccategories
Contention Evalution Factors-8 ccategories
jaya shanmuga
 

Was ist angesagt? (9)

Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Handover in 4G
Handover in 4GHandover in 4G
Handover in 4G
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBAN
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBANImprovement of Quality of Service Parameters in Dynamic and Heterogeneous WBAN
Improvement of Quality of Service Parameters in Dynamic and Heterogeneous WBAN
 
Remote Procedure Call
Remote Procedure CallRemote Procedure Call
Remote Procedure Call
 
Contention Evalution Factors-8 ccategories
Contention Evalution Factors-8 ccategoriesContention Evalution Factors-8 ccategories
Contention Evalution Factors-8 ccategories
 
A low complexity congestion control and scheduling algorithm for multihop wir...
A low complexity congestion control and scheduling algorithm for multihop wir...A low complexity congestion control and scheduling algorithm for multihop wir...
A low complexity congestion control and scheduling algorithm for multihop wir...
 
Tcp Reliability Flow Control
Tcp Reliability Flow ControlTcp Reliability Flow Control
Tcp Reliability Flow Control
 
Basics of Network Traffic Management
Basics of Network Traffic ManagementBasics of Network Traffic Management
Basics of Network Traffic Management
 

Andere mochten auch

Outsourced Innovation- Cold Storage Research
Outsourced Innovation- Cold Storage ResearchOutsourced Innovation- Cold Storage Research
Outsourced Innovation- Cold Storage Research
adambcarney
 
SharePoint Web part programming
SharePoint Web part programmingSharePoint Web part programming
SharePoint Web part programming
Quang Nguyễn Bá
 
INTERIOR-iD Portfolio
INTERIOR-iD PortfolioINTERIOR-iD Portfolio
INTERIOR-iD Portfolio
Radaschitz
 
2 phil lit, pre colonial period
2 phil lit, pre colonial period2 phil lit, pre colonial period
2 phil lit, pre colonial period
Marien Be
 
SharePoint 2010 Business Intelligence
SharePoint 2010 Business IntelligenceSharePoint 2010 Business Intelligence
SharePoint 2010 Business Intelligence
Quang Nguyễn Bá
 
Emerce eFinancials
Emerce eFinancialsEmerce eFinancials
Emerce eFinancials
BeFrank
 
Armed forces parade
Armed forces paradeArmed forces parade
Armed forces parade
Robert Bell
 
Corporate brochure BeFrank
Corporate brochure BeFrankCorporate brochure BeFrank
Corporate brochure BeFrank
BeFrank
 
Testanxiety 120316073051-phpapp01
Testanxiety 120316073051-phpapp01Testanxiety 120316073051-phpapp01
Testanxiety 120316073051-phpapp01
Marien Be
 

Andere mochten auch (20)

Terug naar eenvoud
Terug naar eenvoudTerug naar eenvoud
Terug naar eenvoud
 
Magazine TwentseWelle mei 2014
Magazine TwentseWelle mei 2014Magazine TwentseWelle mei 2014
Magazine TwentseWelle mei 2014
 
Produce Analytical Talent to Meet the Industry Needs
Produce Analytical Talent to Meet the Industry NeedsProduce Analytical Talent to Meet the Industry Needs
Produce Analytical Talent to Meet the Industry Needs
 
Morrissey & The Smiths: Passions Just Like Mine
Morrissey & The Smiths: Passions Just Like MineMorrissey & The Smiths: Passions Just Like Mine
Morrissey & The Smiths: Passions Just Like Mine
 
Outsourced Innovation- Cold Storage Research
Outsourced Innovation- Cold Storage ResearchOutsourced Innovation- Cold Storage Research
Outsourced Innovation- Cold Storage Research
 
Verborgen (?) talenten (keynote ECG congres 2016)
Verborgen (?) talenten (keynote ECG congres 2016)Verborgen (?) talenten (keynote ECG congres 2016)
Verborgen (?) talenten (keynote ECG congres 2016)
 
วารสารออนไลน์
วารสารออนไลน์วารสารออนไลน์
วารสารออนไลน์
 
SharePoint Web part programming
SharePoint Web part programmingSharePoint Web part programming
SharePoint Web part programming
 
INTERIOR-iD Portfolio
INTERIOR-iD PortfolioINTERIOR-iD Portfolio
INTERIOR-iD Portfolio
 
2 phil lit, pre colonial period
2 phil lit, pre colonial period2 phil lit, pre colonial period
2 phil lit, pre colonial period
 
SharePoint 2010 Business Intelligence
SharePoint 2010 Business IntelligenceSharePoint 2010 Business Intelligence
SharePoint 2010 Business Intelligence
 
Emerce eFinancials
Emerce eFinancialsEmerce eFinancials
Emerce eFinancials
 
Armed forces parade
Armed forces paradeArmed forces parade
Armed forces parade
 
Corporate brochure BeFrank
Corporate brochure BeFrankCorporate brochure BeFrank
Corporate brochure BeFrank
 
Increasing talent mobility: (Open) Badges @ Selor
Increasing talent mobility: (Open) Badges @ SelorIncreasing talent mobility: (Open) Badges @ Selor
Increasing talent mobility: (Open) Badges @ Selor
 
Testanxiety 120316073051-phpapp01
Testanxiety 120316073051-phpapp01Testanxiety 120316073051-phpapp01
Testanxiety 120316073051-phpapp01
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Prueba
PruebaPrueba
Prueba
 
Evidence-based HR: the Selor case
Evidence-based HR: the Selor caseEvidence-based HR: the Selor case
Evidence-based HR: the Selor case
 
Building a $100k and flexible design career
Building a $100k and flexible design careerBuilding a $100k and flexible design career
Building a $100k and flexible design career
 

Ähnlich wie Data communication

Introduction-to-TCP (Transmission Control Protocol).pptx
Introduction-to-TCP (Transmission Control Protocol).pptxIntroduction-to-TCP (Transmission Control Protocol).pptx
Introduction-to-TCP (Transmission Control Protocol).pptx
Electro00
 
END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...
END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...
END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...
IJNSA Journal
 
End to end quality of service
End to end quality of serviceEnd to end quality of service
End to end quality of service
IJNSA Journal
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3
Wen-Pai Lu
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission control
sangusajjan
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
eSAT Journals
 

Ähnlich wie Data communication (20)

Flow control 11
Flow control 11Flow control 11
Flow control 11
 
Introduction-to-TCP (Transmission Control Protocol).pptx
Introduction-to-TCP (Transmission Control Protocol).pptxIntroduction-to-TCP (Transmission Control Protocol).pptx
Introduction-to-TCP (Transmission Control Protocol).pptx
 
END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...
END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...
END TO END QUALITY OF SERVICE ASSURANCE FOR MULTI-SERVICE PROVISIONING IN MOB...
 
End to end quality of service
End to end quality of serviceEnd to end quality of service
End to end quality of service
 
Transport SDN
Transport SDNTransport SDN
Transport SDN
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission control
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Keys to Enterprise WLAN Reliability
Keys to Enterprise WLAN ReliabilityKeys to Enterprise WLAN Reliability
Keys to Enterprise WLAN Reliability
 
Enterprise Wireless LAN Reliability
Enterprise Wireless LAN ReliabilityEnterprise Wireless LAN Reliability
Enterprise Wireless LAN Reliability
 
Various Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferVarious Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data Transfer
 
5G Handover.pptx
5G Handover.pptx5G Handover.pptx
5G Handover.pptx
 
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
OPTIMIZING CONGESTION CONTROL BY USING DEVICES AUTHENTICATION IN SOFTWARE-DEF...
 
congestionin datanetworks
congestionin datanetworkscongestionin datanetworks
congestionin datanetworks
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
Sangfor wan optimization data sheet 2015
Sangfor wan optimization data sheet 2015Sangfor wan optimization data sheet 2015
Sangfor wan optimization data sheet 2015
 
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
 
Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback model
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Data communication

  • 2. Flow Control Flow control is the process of managing the rate of data transmission between two nodes to prevent a fast sender from outrunning a slow receiver. It provides a mechanism for the receiver to control the transmission speed, so that the receiving node is not overwhelmed with data from transmitting node.
  • 3. So why need it ?????
  • 4.  Prevent degradation and loss of efficiency due to overload.
  • 5.  Prevent degradation and loss of efficiency due to overload.  Deadlock avoidance.
  • 6.  Prevent degradation and loss of efficiency due to overload.  Deadlock avoidance.  Fair allocation of resources among competing users.
  • 7.  Prevent degradation and loss of efficiency due to overload.  Deadlock avoidance.  Fair allocation of resources among competing users.  Speed matching between the network and its attached users.
  • 8. Type of ‘Flow Control’  Stop-and-wait
  • 9. Type of ‘Flow Control’  Stop-and-wait  Sliding Window
  • 10. Stop-and-wait  Fundamental technique to provide reliable transfer under unreliable packet delivery system
  • 11. Stop-and-wait  Fundamental technique to provide reliable transfer under unreliable packet delivery system  Simplest form of flow control
  • 12. Stop-and-wait  Fundamental technique to provide reliable transfer under unreliable packet delivery system  Simplest form of flow control  Inefficiencies when sending longer transmissions
  • 14. Sliding Window  Technique for controlling transmitted data packets between two network computers where reliable and sequential delivery of data packets is required.
  • 15. Sliding Window  Technique for controlling transmitted data packets between two network computers where reliable and sequential delivery of data packets is required.  Best utilized when the buffer size is limited and pre-established.
  • 16. Sliding Window  Technique for controlling transmitted data packets between two network computers where reliable and sequential delivery of data packets is required.  Best utilized when the buffer size is limited and pre-established.  Better Performance.
  • 18. Levels of Flow Control  Hop Level
  • 19. Levels of Flow Control  Hop Level  Entry-to-Exit Level
  • 20. Levels of Flow Control  Hop Level  Entry-to-Exit Level  Network Access Level
  • 21. Levels of Flow Control  Hop Level  Entry-to-Exit Level  Network Access Level  Transport Level
  • 22. Hop Level  Prevent store and forward buffer congestion and its consequences
  • 23. Hop Level  Prevent store and forward buffer congestion and its consequences  Maintain a smooth flow of traffic between two neighboring nodes In a computer network
  • 24. Entry-to-Exit Level  Implement as a protocol between the source and destination switch
  • 25. Entry-to-Exit Level  Implement as a protocol between the source and destination switch  Protect the exit node from congestion
  • 26. Network Access Level  Throttle external inputs based on measurements of internal network congestion.
  • 27. Transport Level  Efficient and reliable transmission of messages within each user session and the efficient sharing of common network resources by several user sessions
  • 28. Transport Level  Efficient and reliable transmission of messages within each user session and the efficient sharing of common network resources by several user sessions  Events destination buffer congestion and overflow is known as transport level flow control
  • 29. Problem of ‘Flow Control’ Can’t send too slow or too fast
  • 30. Problem of ‘Flow Control’ Can’t send too slow or too fast Too slow
  • 31. Problem of ‘Flow Control’ Can’t send too slow or too fast Too slow wastes time
  • 32. Problem of ‘Flow Control’ Can’t send too slow or too fast Too slow wastes time Too fast
  • 33. Problem of ‘Flow Control’ Can’t send too slow or too fast Too slow wastes time can lead to buffer overflow