Lecture 31-32 Network layer -- May 2004 1 Congestion control Algorithms.

Slides:



Advertisements
Similar presentations
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Advertisements

1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
EE 4272Spring, 2003 Chapter 12 Congestion in Data Networks Effect of Congestion Control  Ideal Performance  Practical Performance Congestion Control.
Network layer -- May Network layer Computer Networks.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
01. Apr INF-3190: Congestion Control Congestion Control Foreleser: Carsten Griwodz
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Congestion Control Algorithms
The Network Layer Functions: Congestion Control
Review: Routing algorithms Distance Vector algorithm. –What information is maintained in each router? –How to distribute the global network information?
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
Congestion Control Tanenbaum 5.3 Tanenbaum 6.5. Congestion Control Network Layer – Congestion control point to point Transport Layer – Congestion control.
Congestion Control Algorithms
Congestion Control Reasons: - too many packets in the network and not enough buffer space S = rate at which packets are generated R = rate at which receivers.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
IS333, Ch. 26: TCP Victor Norman Calvin College 1.
Quality of Service Requirements
Network Layer Chapter 5 Design Issues Routing Algorithms
CSE331: Introduction to Networks and Security Lecture 13 Fall 2002.
CS 408 Computer Networks Congestion Control (from Chapter 05)
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
NETWORK LAYER. CONGESTION CONTROL In congestion control we try to avoid traffic congestion. Traffic Descriptor Traffic descriptors are qualitative values.
Congestion Control An Overview -Jyothi Guntaka. Congestion  What is congestion ?  The aggregate demand for network resources exceeds the available capacity.
Congestion Control Tanenbaum 5.3, /12/2015Congestion Control (A Loss Based Technique: TCP)2 What? Why? Congestion occurs when –there is no reservation.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168)
Semester Copyright USM EEE449 Computer Networks Congestion En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK) Room.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
Data Transfer Case Study: TCP  Go-back N ARQ  32-bit sequence # indicates byte number in stream  transfers a byte stream, not fixed size user blocks.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
1 Lecture 14 High-speed TCP connections Wraparound Keeping the pipeline full Estimating RTT Fairness of TCP congestion control Internet resource allocation.
10/19/20151 The Network Layer. 10/19/20152 Introduction Route packets through subnet So, it must know the topology of the subnet It should also be able.
Chapter 12 Transmission Control Protocol (TCP)
1 Congestion Control Computer Networks. 2 Where are we?
Forwarding.
1 Lecture, November 27, 2002 TCP Other Internet Protocols; Internet Traffic Scalability of Virtual Circuit Networks QoS.
Review of key networking techniques: –Reliable communication over unreliable channels –Error detection and correction –Medium access control –routing –Congestion.
CONGESTION CONTROL.
Data Transfer Case Study: TCP  Go-back N ARQ  32-bit sequence # indicates byte number in stream  transfers a byte stream, not fixed size user blocks.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
 First: Data Link Layer  1. Retransmission Policy: It deals with how fast a sender times out and what it transmit upon timeout. A jumpy sender that times.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
-1- Georgia State UniversitySensorweb Research Laboratory CSC4220/6220 Computer Networks Dr. WenZhan Song Professor, Computer Science.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
Chapter 10 Congestion Control in Data Networks and Internets 1 Chapter 10 Congestion Control in Data Networks and Internets.
Chapter 5 Peer-to-Peer Protocols and Data Link Layer Timing Recovery.
The Network Layer Congestion Control Algorithms & Quality-of-Service Chapter 5.
Unit-4 Lecture 9 Network Layer 1. Congestion Prevention Polices. To avoid congestion by using the appropriate polices at different levels. Layers DL Layer.
Assignment 1  Chapter 1:  Question 11  Question 13  Question 14  Question 33  Question 34  Chapter 2:  Question 6  Question 39  Chapter 3: 
Topics discussed in this section:
Congestion Control Evaluation in Dynamic Network
Chapter 5 The Network Layer.
CONGESTION CONTROL.
Notes and Handouts Congestion Control
Border Gateway Protocol
The Network Layer Network Layer Design Issues:
Congestion Control (from Chapter 05)
PRESENTATION COMPUTER NETWORKS
Congestion Control, Quality of Service, & Internetworking
Congestion Control (from Chapter 05)
Figure Areas in an autonomous system
Congestion Control (from Chapter 05)
Congestion Control Reasons:
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
The Network Layer Congestion Control Algorithms & Quality-of-Service
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control Algorithms
Presentation transcript:

Lecture Network layer -- May Congestion control Algorithms

Congestion Control Algorithms Network layer -- May Design issues Routing Congestion Internetworking Internet Protocols General principles of congestion control Prevention policies Handling virtual circuit subnets General techniques Load shedding Jitter control

Congestion? Network layer -- May Too many packets in (a part of) the subnet!

Congestion? Network layer -- May Too many packets in (a part of) the subnet! caused by  the same output line is used by many input lines  mismatch between system parts  slow processor  low bandwidth lines tends to feed upon itself Congestion control <> flow control  Congestion: global issue ( subnet is able to carry the traffic)  Flow control: point-to-point ( control the traffic between a given sender and reciever)

Congestion: principles Network layer -- May How? Good design  Make sure the problem does not occur Tools  Decide when to accept traffic  Decide when to discard packets and which ones  Make scheduling decisions in the subnet They make decision without considering current state of network Monitor: where and when congestion?  % packets discarded  average queue length  number of packets that time out  average packet delay Rising no. Indicate growing congestion Pass collected info to places where actions can be taken = source of traffic  explicit <> implicit feedback  explicit: (extra) packet, flags (in other packets), probe packets ( ex. Radio stations have flying halicopters) Adjust system operation  Increase resources: bandwidth  Decrease load: deny, degrade service Control theory viewpoint: dividing all the solutions to two groups open loopclosed loop: feedback loop

Network Layer Network layer -- May Design issues Routing Congestion Internetworking Internet Protocols Multimedia or QoS General principles Prevention policies Handling virtual circuit subnets General techniques Jitter control

Congestion: prevention 7 open loop solutions: Minimize congestion, they try to achieve there goals by using appropriate policies at various levels LayerPolicies Transport  Retransmission policy  Out-of-order caching policy  Acknowledgement policy  Flow control policy  Timeout determination ( transit time over the network is hard to predict) Network  Virtual circuits <> datagrams in subnet( many cog. Control algo work only with VC)  Packet queueing and service policy ( 1 Q / input/output line and round robin)  Packet discard policy  Routing algorithm ( spreading traffic over all lines)  Packet lifetime management Data link  Retransmission policy( Go back N will put heavy load than Selective Reject)  Out-of-order caching policy ( Selective repeat is better )  Acknowledgement policy( piggyback onto reverse traffic )  Flow control policy ( small window reduce traffic and thus congestion )

Network Layer Network layer -- May Design issues Routing Congestion Internetworking Internet Protocols General principles Prevention policies Handling virtual circuit subnets General techniques Jitter control

Virtual circuit subnets 9 Dynamic approach: act when needed, closed loop solutions Admission control  No new virtual circuits when congestion is signalled  e.g. telephone network : when a switch gets overloaded, it also practice admission control by not giving dial tones. Route new virtual circuits around problem areas

Virtual circuit subnets 10 Dynamic approach Admission control Route new virtual circuits around problem areas Negotiation when virtual circuit is set up  About kind of traffic + service desired  Resource reservation in subnet  Line capacity  Buffers in routers  No congestion  Unused resources

Network Layer Network layer -- May Design issues Routing Congestion Internetworking Internet Protocols Multimedia or QoS General principles Prevention policies Handling virtual circuit subnets General techniques Jitter control

General techniques ( can be used in Datagram network and Virtual Circuit as well) Network layer -- May Approaches: reduce traffic by  Requesting senders local measurements + info packets to senders + hope for ….  Throwing away packets local measurements + local actions to reduce load

Source based approach Network layer -- May Basic algorithm  Router monitors utilisation of output lines  u recent utilisation: 0  u  1  good estimate of u u new = a  u old + (1 – a )  f  In case of overload: u new > threshold  Output line enters warning state  Some action is taken: Warning bit Choke packets Hop-by-hop choke packets fInstantaneous line utilisation aconstant

Source based approach Network layer -- May Warning bit  Output line in warning state  Warning bit set in packet header  Destination copies bit into next ack  Source cuts back traffic  Algorithm at source  As long as router is in warning state, warning bits arrive at source: reduce traffic  Less warning bits: increase traffic  Problems  voluntary action of host!  correct source selected?  Used in  DecNet  Frame relay

Source based approach 15 Choke packet: Tell host directly to slow down  In case of overload: router sends choke packet to host causing the overload  Host receiving choke packet  reduces traffic to the specified destination  ignores choke packets for a fixed interval  new choke packets during next listening interval? Yes: reduce traffic No: increase traffic  Problems:  voluntary action of host!  correct host selected?

Source based approach Network layer -- May Choke packets:  Example showing slow reaction  Solution: Hop-by-Hop choke packets

Source based approach Network layer -- May Hop-by-Hop choke packets  Have choke packet take effect at every hop  Problem: more buffers needed in routers

Load shedding 18 It is a fancy way of saying that ::::Throw away packets that cannot be handled!! Packet selection?  Random  Based on application  File transfer: discard new packet( out of order problem - wine)  Multimedia: discard old packet ( milk )  Let sender indicate importance of packets  Low, high priority  Incentive to mark a packet with low priority Price Allow hosts to exceed agreed upon limits Random early detection …

Load shedding 19 Throw away packets that cannot be handled!! Packet selection? Random early detection  Discard packets before all buffer space is exhausted( response to lost packet is for source to slow down- ex- TCP for wired network)  Routers maintain running average of queue lengths ( to determine when to start discarding )  Select at random a packet  Inform source?  Send choke packet?  more load!!  No reporting  When does it work?  Source slows down when packets are lost This approach can not be used in wireless networks

Network Layer Network layer -- May Design issues Routing Congestion Internetworking Internet Protocols General principles Prevention policies Handling virtual circuit subnets General techniques Jitter control

Congestion: jitter control 21 Important for audio and video applications?  not delay  variance of delay

Congestion: jitter control Network layer -- May Jitter = variation in packet delay Compute feasible mean value for delay  compute expected transit time for each hop  router checks to see if packet is  behind  ahead schedule  behind: forward packet asap  ahead: hold back packet to get it on schedule again Buffering? Depends on characteristics:  Video on demand: ok  Videoconferencing: nok

Network Layer Network layer -- May Design issues Routing Congestion Internetworking : Next Lecture