SlideShare a Scribd company logo
1 of 57
24.1
Chapter 24
Congestion Control and
Quality of Service
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
24.2
24-1 DATA TRAFFIC
The main focus of congestion control and quality of
service is data traffic. In congestion control we try to
avoid traffic congestion. In quality of service, we try to
create an appropriate environment for the traffic. So,
before talking about congestion control and quality of
service, we discuss the data traffic itself.
Traffic Descriptor
Traffic Profiles
Topics discussed in this section:
24.3
Figure 24.1 Traffic descriptors
24.4
Average date rate
The average data rate is the number of bits
sent during a period of time, divided by the
number of seconds in that period.
Average data rate= amount of data/time
24.5
Figure 24.2 Three traffic profiles
24.6
24-2 CONGESTION
Congestion in a network may occur if the load on the
network—the number of packets sent to the network—
is greater than the capacity of the network—the
number of packets a network can handle. Congestion
control refers to the mechanisms and techniques to
control the congestion and keep the load below the
capacity.
Network Performance
Topics discussed in this section:
24.7
Figure 24.3 Queues in a router
24.8
Figure Packet delay and throughput as functions of load
Network Performance
24.9
24-3 CONGESTION CONTROL
Congestion control refers to techniques and
mechanisms that can either prevent congestion, before
it happens, or remove congestion, after it has
happened. In general, we can divide congestion
control mechanisms into two broad categories: open-
loop congestion control (prevention) and closed-loop
congestion control (removal).
Open-Loop Congestion Control
Closed-Loop Congestion Control
Topics discussed in this section:
24.10
Figure 24.5 Congestion control categories
24.11
Open Loop Congestion Control
Open loop congestion control policies are applied to prevent congestion
before it happens. The congestion control is handled either by the source or
the destination.
Retransmission Policy :
It is the policy in which retransmission of the packets are taken care of. If
the sender feels that a sent packet is lost or corrupted, the packet needs to be
retransmitted. This transmission may increase the congestion in the
network.
To prevent congestion, retransmission timers must be designed to prevent
congestion and also able to optimize efficiency.
Window Policy :
The type of window at the sender’s side may also affect the congestion.
Several packets in the Go-back-n window are re-sent, although some
packets may be received successfully at the receiver side. This duplication
may increase the congestion in the network and make it worse.
Therefore, Selective repeat window should be adopted as it sends the
specific packet that may have been lost.
24.12
Discarding Policy : A good discarding policy adopted
by the routers is that the routers may prevent congestion
and at the same time partially discard the corrupted or
less sensitive packages and also be able to maintain the
quality of a message.
Acknowledgment Policy : Since acknowledgements
are also the part of the load in the network, the
acknowledgment policy imposed by the receiver may
also affect congestion. Several approaches can be used
to prevent congestion related to acknowledgment. The
receiver should send acknowledgement for N packets
rather than sending acknowledgement for a single
packet. The receiver should send an acknowledgment
only if it has to send a packet or a timer expires.
24.13
Admission Policy :
In admission policy a mechanism should be
used to prevent congestion. Switches in a flow
should first check the resource requirement of a
network flow before transmitting it further. If
there is a chance of a congestion or there is a
congestion in the network, router should deny
establishing a virtual network connection to
prevent further congestion.
24.14
Closed Loop Congestion Control
Closed loop congestion control techniques are used to
treat or alleviate congestion after it happens. Several
techniques are used by different protocols; some of
them are:
Backpressure :
Backpressure is a technique in which a congested
node stops receiving packets from upstream node.
This may cause the upstream node or nodes to
become congested and reject receiving data from
above nodes. Backpressure is a node-to-node
congestion control technique that propagate in the
opposite direction of data flow. The backpressure
technique can be applied only to virtual circuit where
each node has information of its above upstream
24.15
Figure 24.6 Backpressure method for alleviating congestion
In above diagram the 3rd node is congested and stops
receiving packets as a result 2nd node may be get
congested due to slowing down of the output data flow.
Similarly 1st node may get congested and inform the
source to slow down.
24.16
Figure 24.7 Choke packet
24.17
Choke Packet Technique : Choke packet technique
is applicable to both virtual networks as well as
datagram subnets. A choke packet is a packet sent by
a node to the source to inform it of congestion. Each
router monitors its resources and the utilization at
each of its output lines. Whenever the resource
utilization exceeds the threshold value which is set by
the administrator, the router directly sends a choke
packet to the source giving it a feedback to reduce the
traffic. The intermediate nodes through which the
packets has traveled are not warned about
congestion.
24.18
Implicit Signaling : In implicit signaling,
there is no communication between the
congested nodes and the source. The
source guesses that there is congestion in
a network. For example when sender
sends several packets and there is no
acknowledgment for a while, one
assumption is that there is a congestion.
24.19
Explicit Signaling :In explicit signaling, if a
node experiences congestion it can explicitly
sends a packet to the source or destination
to inform about congestion. The difference
between choke packet and explicit signaling
is that the signal is included in the packets
that carry data rather than creating a
different packet as in case of choke packet
technique. Explicit signaling can occur in
either forward or backward direction.
24.20
•Forward Signaling : In forward signaling, a
signal is sent in the direction of the congestion.
The destination is warned about congestion.
The receiver in this case adopt policies to
prevent further congestion.
•Backward Signaling : In backward signaling,
a signal is sent in the opposite direction of the
congestion. The source is warned about
congestion and it needs to slow down.
24.21
24-4 TWO EXAMPLES
To better understand the concept of congestion
control, let us give two examples: one in TCP and the
other in Frame Relay.
Congestion Control in TCP
Congestion Control in Frame Relay
Topics discussed in this section:
24.22
Congestion control in TCP
Actual window size =min (rwnd, cwnd)
Congestion Window (cwnd) is a TCP state
variable that limits the amount of data the
TCP can send into the network before
receiving an ACK.
The Receiver Window (rwnd) is a variable
that advertises the amount of data that
the destination side can receive.
24.23
Figure 24.8 Slow start, exponential increase
24.24
In the slow-start algorithm, the size of
the congestion window increases
exponentially until it reaches a
threshold.
Note
24.25
Figure 24.9 Congestion avoidance, additive increase
24.26
In the congestion avoidance algorithm,
the size of the congestion window
increases additively until
congestion is detected.
Note
24.27
An implementation reacts to congestion
detection in one of the following ways:
❏ If detection is by time-out, a new slow
start phase starts.
❏ If detection is by three ACKs, a new
congestion avoidance phase starts.
Note
24.28
Figure 24.10 TCP congestion policy summary
Max segment size
24.29
Figure 24.11 Congestion example
24.30
Congestion in Frame Relay decreases
throughput and increases delay.
A high throughput and low delay is the main
goal of Frame Relay protocol.
Frame Relay does not have flow control and it
allows user to transmit burst data.
This means that a Frame Relay network has
potential to be really congested with traffic,
requiring congestion control.
Frame Relay uses congestion avoidance by
means of two bit fields present in the Frame
Relay frame to explicitly warn source and
destination of presence of congestion:
24.31
BECN:
Backward Explicit Congestion Notification (BECN)
warns the sender of congestion present in the
network. This is achieved by resending the frame in
reverse direction with the help of switches in the
network. This warning can be responded by the
sender by reducing the transmission data rate, thus
reducing congestion effects in the network.
FECN:
Forward Explicit Congestion Notification (FECN) is
used to warn the receiver of congestion in the
network. It might appear that receiver cannot do
anything to relieve the congestion, however the
Frame Relay protocol assumes that sender and
receiver are communicating with each other and
when it receives FECN bit as 1 receiver delays the
acknowledgement. This forces sender to slow down
and reducing effects of congestion in the network.
24.32
Figure 24.12 BECN
24.33
Figure 24.13 FECN
24.34
Figure 24.14 Four cases of congestion
24.35
24-5 QUALITY OF SERVICE
Quality of service (QoS) is an internetworking issue
that has been discussed more than defined. We can
informally define quality of service as something a
flow seeks to attain.
Flow Characteristics
Flow Classes
Topics discussed in this section:
24.36
Figure 24.15 Flow characteristics
24.37
Reliability
Lack of reliability means losing a packet or
acknowledgment(being sent on its successful reach
to destination), which entails retransmission.
However, the sensitivity of any application programs
to reliability is not the same. for e.g file transfer and
email service require reliable service unlike
telephone or audio conferencing.
Transit Delay
It is the time between a message being sent by the
transport user on the source machine and its being
received by the transport user in the destination
machine.
QOS Parameters
24.38
Jitter is the variation in delay for packets associated
with the same flow. For applications such as audio and
video applications, it does not matter if the packets arrive
with a short or long delay as long as the delay is the same
for all packets.
High jitter means the difference between delays(of packets
of data) is large, low jitter means the variation is small.
bandwidth : The effective bandwidth is the bandwidth that the network
that the network needs to allocate for the flow of traffic. The effective
bandwidth is basically a function of three values i.e average data rate,
peak data rate, and maximum burst size.
24.39
24-6 TECHNIQUES TO IMPROVE QoS
In Section 24.5 we tried to define QoS in terms of its
characteristics. In this section, we discuss some
techniques that can be used to improve the quality of
service. We briefly discuss four common methods:
scheduling, traffic shaping, admission control, and
resource reservation.
Scheduling
Traffic Shaping
Resource Reservation
Admission Control
Topics discussed in this section:
24.40
Figure 24.16 FIFO queue
Scheduling
24.41
Figure 24.17 Priority queuing
24.42
Figure 24.18 Weighted fair queuing
24.43
Figure 24.19 Leaky bucket
Traffic shaping
24.44
24.45
Figure 24.20 Leaky bucket implementation
24.46
A leaky bucket algorithm shapes bursty
traffic into fixed-rate traffic by averaging
the data rate. It may drop the packets if
the bucket is full.
Note
24.47
The token bucket allows bursty traffic at
a regulated maximum rate.
Note
24.48
Figure 24.21 Token bucket
24.49
24.50
24-9 QoS IN SWITCHED NETWORKS
Let us now discuss QoS as used in two switched
networks: Frame Relay and Asynchronous Transfer
Mode. These two networks are virtual-circuit networks
that need a signaling protocol such as Resource
reservation protocol.
QoS in Frame Relay
QoS in ATM
Topics discussed in this section:
24.51
Figure 24.28 Relationship between traffic control attributes
Committed Information rate(CIR)
Excess burst size(Be)
Committed burst size(Bc)
CIR=BC/T bps
Qos in Frame relay
24.52
Figure 24.29 User rate in relation to Bc and Bc + Be
24.53
Figure 24.30 Service classes
QOS in ATM
CBR- Constant bit rate
VBR-Variable bit rate
ABR-Available bit rate
UBR- Unspecified bit rate
24.54
QoS feature is used when there is traffic
congestion in-network, it gives priority to
certain real-time media. A high level of
QoS is used while transmitting real-time
multimedia to eliminate latency and
dropouts. Asynchronous Transfer Mode
(ATM) is a networking technology that
uses a certain level of QoS in data
transmission.
The Quality of Service in ATM is based on
following: Classes, User-related attributes,
and Network-related attributes.
24.55
Classes :
The ATM Forum defines four service classes that are explained
below –
1.Constant Bit Rate (CBR) –
CBR is mainly for users who want real-time audio or video
services. The service provided by a dedicated line. For example,
T line is similar to CBR class service.
2.Variable Bit Rate (VBR) –
VBR class is divided into two sub classes –
1.(i) Real-time (VBR-RT) :
The users who need real-time transmission services like
audio and video and they also use compression techniques
to create a variable bit rate, they use VBR-RT service class.
2.(ii) Non-real Time (VBR-NRT) :
The users who do not need real-time transmission services
but they use compression techniques to create a variable bit
rate, then they use VBR-NRT service class.
24.56
Available Bit Rate (ABR) –ABR is used to
deliver cells at a specific minimum rate and
if more network capacity is available, then
minimum rate can be exceeded. ABR is
very much suitable for applications that
have high traffic.
Unspecified Bit Rate (UBR) –UBR class
and it is a best-effort delivery service that
does not guarantee anything.
24.57
Figure 24.31 Relationship of service classes to the total capacity of the network

More Related Content

Similar to FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1Aman Jaiswal
 
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...IRJET Journal
 
Adaptive congestion control protocol (accp) for wireless sensor networks
Adaptive congestion control protocol (accp) for wireless sensor networksAdaptive congestion control protocol (accp) for wireless sensor networks
Adaptive congestion control protocol (accp) for wireless sensor networksijwmn
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksRushin Shah
 
Congestion control
Congestion controlCongestion control
Congestion controlnandhulaks
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
 
Studying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfStudying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfIUA
 
Congestion control and quality of services
Congestion control and quality of servicesCongestion control and quality of services
Congestion control and quality of servicesJawad Ghumman
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfoptokunal1
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Transport layer TCP and UDP.ppt
Transport layer TCP and UDP.pptTransport layer TCP and UDP.ppt
Transport layer TCP and UDP.pptAlliVinay1
 
A New QoS Renegotiation Mechanism for Multimedia Applications
A New QoS Renegotiation Mechanism for Multimedia ApplicationsA New QoS Renegotiation Mechanism for Multimedia Applications
A New QoS Renegotiation Mechanism for Multimedia ApplicationsABDELAAL
 
Improvement of Congestion window and Link utilization of High Speed Protocols...
Improvement of Congestion window and Link utilization of High Speed Protocols...Improvement of Congestion window and Link utilization of High Speed Protocols...
Improvement of Congestion window and Link utilization of High Speed Protocols...IOSR Journals
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission controlsangusajjan
 
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdfDCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdfBilal Munir Mughal
 
Internet congestion
Internet congestionInternet congestion
Internet congestionVikas Gupta
 

Similar to FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx (20)

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion control 1
Congestion control 1Congestion control 1
Congestion control 1
 
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
 
Adaptive congestion control protocol (accp) for wireless sensor networks
Adaptive congestion control protocol (accp) for wireless sensor networksAdaptive congestion control protocol (accp) for wireless sensor networks
Adaptive congestion control protocol (accp) for wireless sensor networks
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
 
Congestion control
Congestion controlCongestion control
Congestion control
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
Studying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfStudying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdf
 
Congestion control and quality of services
Congestion control and quality of servicesCongestion control and quality of services
Congestion control and quality of services
 
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Transport layer TCP and UDP.ppt
Transport layer TCP and UDP.pptTransport layer TCP and UDP.ppt
Transport layer TCP and UDP.ppt
 
A New QoS Renegotiation Mechanism for Multimedia Applications
A New QoS Renegotiation Mechanism for Multimedia ApplicationsA New QoS Renegotiation Mechanism for Multimedia Applications
A New QoS Renegotiation Mechanism for Multimedia Applications
 
Improvement of Congestion window and Link utilization of High Speed Protocols...
Improvement of Congestion window and Link utilization of High Speed Protocols...Improvement of Congestion window and Link utilization of High Speed Protocols...
Improvement of Congestion window and Link utilization of High Speed Protocols...
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission control
 
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdfDCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
DCN 5th ed. slides ch23 Introduction to Transport Layer.pdf
 
Internet congestion
Internet congestionInternet congestion
Internet congestion
 
I1102014953
I1102014953I1102014953
I1102014953
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 

FALLSEM2023-24_BCSE308L_TH_VL2023240100828_2023-07-03_Reference-Material-II.pptx

  • 1. 24.1 Chapter 24 Congestion Control and Quality of Service Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 24.2 24-1 DATA TRAFFIC The main focus of congestion control and quality of service is data traffic. In congestion control we try to avoid traffic congestion. In quality of service, we try to create an appropriate environment for the traffic. So, before talking about congestion control and quality of service, we discuss the data traffic itself. Traffic Descriptor Traffic Profiles Topics discussed in this section:
  • 4. 24.4 Average date rate The average data rate is the number of bits sent during a period of time, divided by the number of seconds in that period. Average data rate= amount of data/time
  • 5. 24.5 Figure 24.2 Three traffic profiles
  • 6. 24.6 24-2 CONGESTION Congestion in a network may occur if the load on the network—the number of packets sent to the network— is greater than the capacity of the network—the number of packets a network can handle. Congestion control refers to the mechanisms and techniques to control the congestion and keep the load below the capacity. Network Performance Topics discussed in this section:
  • 8. 24.8 Figure Packet delay and throughput as functions of load Network Performance
  • 9. 24.9 24-3 CONGESTION CONTROL Congestion control refers to techniques and mechanisms that can either prevent congestion, before it happens, or remove congestion, after it has happened. In general, we can divide congestion control mechanisms into two broad categories: open- loop congestion control (prevention) and closed-loop congestion control (removal). Open-Loop Congestion Control Closed-Loop Congestion Control Topics discussed in this section:
  • 10. 24.10 Figure 24.5 Congestion control categories
  • 11. 24.11 Open Loop Congestion Control Open loop congestion control policies are applied to prevent congestion before it happens. The congestion control is handled either by the source or the destination. Retransmission Policy : It is the policy in which retransmission of the packets are taken care of. If the sender feels that a sent packet is lost or corrupted, the packet needs to be retransmitted. This transmission may increase the congestion in the network. To prevent congestion, retransmission timers must be designed to prevent congestion and also able to optimize efficiency. Window Policy : The type of window at the sender’s side may also affect the congestion. Several packets in the Go-back-n window are re-sent, although some packets may be received successfully at the receiver side. This duplication may increase the congestion in the network and make it worse. Therefore, Selective repeat window should be adopted as it sends the specific packet that may have been lost.
  • 12. 24.12 Discarding Policy : A good discarding policy adopted by the routers is that the routers may prevent congestion and at the same time partially discard the corrupted or less sensitive packages and also be able to maintain the quality of a message. Acknowledgment Policy : Since acknowledgements are also the part of the load in the network, the acknowledgment policy imposed by the receiver may also affect congestion. Several approaches can be used to prevent congestion related to acknowledgment. The receiver should send acknowledgement for N packets rather than sending acknowledgement for a single packet. The receiver should send an acknowledgment only if it has to send a packet or a timer expires.
  • 13. 24.13 Admission Policy : In admission policy a mechanism should be used to prevent congestion. Switches in a flow should first check the resource requirement of a network flow before transmitting it further. If there is a chance of a congestion or there is a congestion in the network, router should deny establishing a virtual network connection to prevent further congestion.
  • 14. 24.14 Closed Loop Congestion Control Closed loop congestion control techniques are used to treat or alleviate congestion after it happens. Several techniques are used by different protocols; some of them are: Backpressure : Backpressure is a technique in which a congested node stops receiving packets from upstream node. This may cause the upstream node or nodes to become congested and reject receiving data from above nodes. Backpressure is a node-to-node congestion control technique that propagate in the opposite direction of data flow. The backpressure technique can be applied only to virtual circuit where each node has information of its above upstream
  • 15. 24.15 Figure 24.6 Backpressure method for alleviating congestion In above diagram the 3rd node is congested and stops receiving packets as a result 2nd node may be get congested due to slowing down of the output data flow. Similarly 1st node may get congested and inform the source to slow down.
  • 17. 24.17 Choke Packet Technique : Choke packet technique is applicable to both virtual networks as well as datagram subnets. A choke packet is a packet sent by a node to the source to inform it of congestion. Each router monitors its resources and the utilization at each of its output lines. Whenever the resource utilization exceeds the threshold value which is set by the administrator, the router directly sends a choke packet to the source giving it a feedback to reduce the traffic. The intermediate nodes through which the packets has traveled are not warned about congestion.
  • 18. 24.18 Implicit Signaling : In implicit signaling, there is no communication between the congested nodes and the source. The source guesses that there is congestion in a network. For example when sender sends several packets and there is no acknowledgment for a while, one assumption is that there is a congestion.
  • 19. 24.19 Explicit Signaling :In explicit signaling, if a node experiences congestion it can explicitly sends a packet to the source or destination to inform about congestion. The difference between choke packet and explicit signaling is that the signal is included in the packets that carry data rather than creating a different packet as in case of choke packet technique. Explicit signaling can occur in either forward or backward direction.
  • 20. 24.20 •Forward Signaling : In forward signaling, a signal is sent in the direction of the congestion. The destination is warned about congestion. The receiver in this case adopt policies to prevent further congestion. •Backward Signaling : In backward signaling, a signal is sent in the opposite direction of the congestion. The source is warned about congestion and it needs to slow down.
  • 21. 24.21 24-4 TWO EXAMPLES To better understand the concept of congestion control, let us give two examples: one in TCP and the other in Frame Relay. Congestion Control in TCP Congestion Control in Frame Relay Topics discussed in this section:
  • 22. 24.22 Congestion control in TCP Actual window size =min (rwnd, cwnd) Congestion Window (cwnd) is a TCP state variable that limits the amount of data the TCP can send into the network before receiving an ACK. The Receiver Window (rwnd) is a variable that advertises the amount of data that the destination side can receive.
  • 23. 24.23 Figure 24.8 Slow start, exponential increase
  • 24. 24.24 In the slow-start algorithm, the size of the congestion window increases exponentially until it reaches a threshold. Note
  • 25. 24.25 Figure 24.9 Congestion avoidance, additive increase
  • 26. 24.26 In the congestion avoidance algorithm, the size of the congestion window increases additively until congestion is detected. Note
  • 27. 24.27 An implementation reacts to congestion detection in one of the following ways: ❏ If detection is by time-out, a new slow start phase starts. ❏ If detection is by three ACKs, a new congestion avoidance phase starts. Note
  • 28. 24.28 Figure 24.10 TCP congestion policy summary Max segment size
  • 30. 24.30 Congestion in Frame Relay decreases throughput and increases delay. A high throughput and low delay is the main goal of Frame Relay protocol. Frame Relay does not have flow control and it allows user to transmit burst data. This means that a Frame Relay network has potential to be really congested with traffic, requiring congestion control. Frame Relay uses congestion avoidance by means of two bit fields present in the Frame Relay frame to explicitly warn source and destination of presence of congestion:
  • 31. 24.31 BECN: Backward Explicit Congestion Notification (BECN) warns the sender of congestion present in the network. This is achieved by resending the frame in reverse direction with the help of switches in the network. This warning can be responded by the sender by reducing the transmission data rate, thus reducing congestion effects in the network. FECN: Forward Explicit Congestion Notification (FECN) is used to warn the receiver of congestion in the network. It might appear that receiver cannot do anything to relieve the congestion, however the Frame Relay protocol assumes that sender and receiver are communicating with each other and when it receives FECN bit as 1 receiver delays the acknowledgement. This forces sender to slow down and reducing effects of congestion in the network.
  • 34. 24.34 Figure 24.14 Four cases of congestion
  • 35. 24.35 24-5 QUALITY OF SERVICE Quality of service (QoS) is an internetworking issue that has been discussed more than defined. We can informally define quality of service as something a flow seeks to attain. Flow Characteristics Flow Classes Topics discussed in this section:
  • 36. 24.36 Figure 24.15 Flow characteristics
  • 37. 24.37 Reliability Lack of reliability means losing a packet or acknowledgment(being sent on its successful reach to destination), which entails retransmission. However, the sensitivity of any application programs to reliability is not the same. for e.g file transfer and email service require reliable service unlike telephone or audio conferencing. Transit Delay It is the time between a message being sent by the transport user on the source machine and its being received by the transport user in the destination machine. QOS Parameters
  • 38. 24.38 Jitter is the variation in delay for packets associated with the same flow. For applications such as audio and video applications, it does not matter if the packets arrive with a short or long delay as long as the delay is the same for all packets. High jitter means the difference between delays(of packets of data) is large, low jitter means the variation is small. bandwidth : The effective bandwidth is the bandwidth that the network that the network needs to allocate for the flow of traffic. The effective bandwidth is basically a function of three values i.e average data rate, peak data rate, and maximum burst size.
  • 39. 24.39 24-6 TECHNIQUES TO IMPROVE QoS In Section 24.5 we tried to define QoS in terms of its characteristics. In this section, we discuss some techniques that can be used to improve the quality of service. We briefly discuss four common methods: scheduling, traffic shaping, admission control, and resource reservation. Scheduling Traffic Shaping Resource Reservation Admission Control Topics discussed in this section:
  • 40. 24.40 Figure 24.16 FIFO queue Scheduling
  • 43. 24.43 Figure 24.19 Leaky bucket Traffic shaping
  • 44. 24.44
  • 45. 24.45 Figure 24.20 Leaky bucket implementation
  • 46. 24.46 A leaky bucket algorithm shapes bursty traffic into fixed-rate traffic by averaging the data rate. It may drop the packets if the bucket is full. Note
  • 47. 24.47 The token bucket allows bursty traffic at a regulated maximum rate. Note
  • 49. 24.49
  • 50. 24.50 24-9 QoS IN SWITCHED NETWORKS Let us now discuss QoS as used in two switched networks: Frame Relay and Asynchronous Transfer Mode. These two networks are virtual-circuit networks that need a signaling protocol such as Resource reservation protocol. QoS in Frame Relay QoS in ATM Topics discussed in this section:
  • 51. 24.51 Figure 24.28 Relationship between traffic control attributes Committed Information rate(CIR) Excess burst size(Be) Committed burst size(Bc) CIR=BC/T bps Qos in Frame relay
  • 52. 24.52 Figure 24.29 User rate in relation to Bc and Bc + Be
  • 53. 24.53 Figure 24.30 Service classes QOS in ATM CBR- Constant bit rate VBR-Variable bit rate ABR-Available bit rate UBR- Unspecified bit rate
  • 54. 24.54 QoS feature is used when there is traffic congestion in-network, it gives priority to certain real-time media. A high level of QoS is used while transmitting real-time multimedia to eliminate latency and dropouts. Asynchronous Transfer Mode (ATM) is a networking technology that uses a certain level of QoS in data transmission. The Quality of Service in ATM is based on following: Classes, User-related attributes, and Network-related attributes.
  • 55. 24.55 Classes : The ATM Forum defines four service classes that are explained below – 1.Constant Bit Rate (CBR) – CBR is mainly for users who want real-time audio or video services. The service provided by a dedicated line. For example, T line is similar to CBR class service. 2.Variable Bit Rate (VBR) – VBR class is divided into two sub classes – 1.(i) Real-time (VBR-RT) : The users who need real-time transmission services like audio and video and they also use compression techniques to create a variable bit rate, they use VBR-RT service class. 2.(ii) Non-real Time (VBR-NRT) : The users who do not need real-time transmission services but they use compression techniques to create a variable bit rate, then they use VBR-NRT service class.
  • 56. 24.56 Available Bit Rate (ABR) –ABR is used to deliver cells at a specific minimum rate and if more network capacity is available, then minimum rate can be exceeded. ABR is very much suitable for applications that have high traffic. Unspecified Bit Rate (UBR) –UBR class and it is a best-effort delivery service that does not guarantee anything.
  • 57. 24.57 Figure 24.31 Relationship of service classes to the total capacity of the network