Download presentation
Presentation is loading. Please wait.
Published byEdgar Brittin Modified over 9 years ago
1
The Network Layer Chapter 5 5.3 - 5.5
2
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Congestion Control Algorithms (1) a)Approaches to congestion control b)Traffic-aware routing c)Admission control d)Traffic throttling e)Load shedding
3
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Congestion Control Algorithms (2) a)When too much traffic is offered, congestion sets in and performance degrades sharply.
4
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Approaches to Congestion Control a)Timescales of approaches to congestion control
5
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Traffic-Aware Routing a)A network in which the East and West parts are connected by two links.
6
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Traffic Throttling (1) a)(a) A congested network. (b) The portion of the network that is not congested. A virtual circuit from A to B is also shown.
7
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Traffic Throttling (2) a)Explicit congestion notification
8
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Load Shedding (1) a)A choke packet that affects only the source..
9
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Load Shedding (2) a)A choke packet that affects each hop it passes through.
10
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Quality of Service a)Application requirements b)Traffic shaping c)Packet scheduling d)Admission control e)Integrated services f)Differentiated services
11
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Application Requirements (1) a)How stringent the quality-of-service requirements are.
12
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Categories of QoS and Examples a)Constant bit rate –Telephony b)Real-time variable bit rate –Compressed videoconferencing c)Non-real-time variable bit rate –Watching a movie on demand d)Available bit rate –File transfer
13
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Traffic Shaping (1) a)(a) Shaping packets. (b) A leaky bucket. (c) A token bucket
14
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Traffic Shaping (2) a)(a) Traffic from a host. Output shaped by a token bucket of rate 200 Mbps and capacity (b) 9600 KB, (c) 0 KB.
15
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Traffic Shaping (3) a)Token bucket level for shaping with rate 200 Mbps and capacity (d) 16000 KB, (e) 9600 KB, and (f) 0KB..
16
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Packet Scheduling (1) a)Kinds of resources can potentially be reserved for different flows: b) Bandwidth. c) Buffer space. d) CPU cycles.
17
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Packet Scheduling (2) a)Round-robin Fair Queuing
18
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Packet Scheduling (3) (a)Weighted Fair Queueing. (b)Finishing times for the packets.
19
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Admission Control (1) a)An example flow specification
20
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Admission Control (2) a)Bandwidth and delay guarantees with token buckets and WFQ.
21
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Integrated Services (1) a)(a) A network. (b) The multicast spanning tree for host 1. (c) The multicast spanning tree for host 2.
22
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Integrated Services (2) a)(a) Host 3 requests a channel to host 1. (b) Host 3 then requests a second channel, to host 2. (c) Host 5 requests a channel to host 1.
23
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Differentiated Services (1) a)Expedited packets experience a traffic-free network
24
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Differentiated Services (2) a)A possible implementation of assured forwarding
25
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Internetworking a)How networks differ b)How networks can be connected c)Tunneling d)Internetwork routing e)Packet fragmentation
26
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 How Networks Differ a)Some of the many ways networks can differ
27
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 How Networks Can Be Connected (a)A packet crossing different networks. (b)Network and link layer protocol processing.
28
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Tunneling (1) a)Tunneling a packet from Paris to London.
29
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Tunneling (2) a)Tunneling a car from France to England
30
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Packet Fragmentation (1) a)Packet size issues: b)Hardware c)Operating system d)Protocols e)Compliance with (inter)national standard. f)Reduce error-induced retransmissions g)Prevent packet occupying channel too long.
31
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Packet Fragmentation (2) (a)Transparent fragmentation. (b)Nontransparent fragmentation
32
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Packet Fragmentation (3) a)Fragmentation when the elementary data size is 1 byte. (a) Original packet, containing 10 data bytes.
33
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Packet Fragmentation (4) a)Fragmentation when the elementary data size is 1 byte b)(b) Fragments after passing through a network c)with maximum packet size of 8 payload bytes plus header.
34
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Packet Fragmentation (5) a)Fragmentation when the elementary data size is 1 byte b)(c) Fragments after passing through a size 5 gateway.
35
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Packet Fragmentation (6) a)Path MTU Discovery
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.