The Network Layer Functions: Congestion Control



Similar documents
Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

ELEC3030 (EL336) Computer Networks. How Networks Differ. Differences that can occur at network layer, which makes internetworking difficult:

Computer Networks Vs. Distributed Systems

Chapter 5: Sample Questions, Problems and Solutions Bölüm 5: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions):

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

Announcements. Midterms. Mt #1 Tuesday March 6 Mt #2 Tuesday April 15 Final project design due April 11. Chapters 1 & 2 Chapter 5 (to 5.

Communication Systems Internetworking (Bridges & Co)

Congestion Control Overview

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

ASIST Administração de Sistemas

Distributed Systems 3. Network Quality of Service (QoS)

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Introduction to LAN/WAN. Network Layer

Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Internet Packets. Forwarding Datagrams

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

Chapter 6. The Network Layer

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

The OSI Model: Understanding the Seven Layers of Computer Networks

UPPER LAYER SWITCHING

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

Introduction to LAN/WAN. Network Layer (part II)

Overview of Computer Networks

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

CS335 Sample Questions for Exam #2

The IP Transmission Process. V1.4: Geoff Bennett

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Based on Computer Networking, 4 th Edition by Kurose and Ross

Internet Architecture and Philosophy

Answers to Sample Questions on Network Layer

ELEC3030 Computer Networks

Data Communication and Computer Network

Introduction to Metropolitan Area Networks and Wide Area Networks

The Internet. Internet Technologies and Applications

Transport and Network Layer

Communication Networks. MAP-TELE 2011/12 José Ruela

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

PART IV. Network Layer

Network layer: Overview. Network layer functions IP Routing and forwarding

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Quality of Service in ATM Networks

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

2. IP Networks, IP Hosts and IP Ports

Internet Protocols. Addressing & Services. Updated:

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Lecture 8. IP Fundamentals

10CS64: COMPUTER NETWORKS - II

ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

Internetworking. Problem: There is more than one network (heterogeneity & scale)

ΤΕΙ Κρήτης, Παράρτηµα Χανίων

Architecture and Performance of the Internet

Data Communication Networks and Converged Networks

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

Internetworking and IP Address

Computer Networks. Main Functions

WAN Data Link Protocols

The internetworking solution of the Internet. Single networks. The Internet approach to internetworking. Protocol stacks in the Internet

MANAGEMENT INFORMATION SYSTEMS 8/E

Network Security TCP/IP Refresher

RARP: Reverse Address Resolution Protocol

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

CSE 3461 / 5461: Computer Networking & Internet Technologies

Expert Reference Series of White Papers. Basics of IP Address Subnetting

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Chapter 5. Data Communication And Internet Technology

Requirements of Voice in an IP Internetwork

Policing and Shaping Overview

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

MPLS L2VPN (VLL) Technology White Paper

Data Communication Networks

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

QoS issues in Voice over IP

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Subnetting,Supernetting, VLSM & CIDR

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Zarządzanie sieciami telekomunikacyjnymi

DG Forwarding Algorithm

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

Access Control: Firewalls (1)

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Mixer/Translator VOIP/SIP. Translator. Mixer

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Internet Concepts. What is a Network?

PLANEAMENTO E GESTÃO DE REDES INFORMÁTICAS COMPUTER NETWORKS PLANNING AND MANAGEMENT

Multiservice Access Technologies

Overview of Routing between Virtual LANs

Lecture Computer Networks

Transcription:

The Network Layer Functions: Congestion Control Network Congestion: Characterized by presence of a large number of packets (load) being routed in all or portions of the subnet that exceeds its link and router capacities (resources) resulting in a performance slowdown. Steps of closed-loop congestion control: 1 Congestion detection: System monitoring 2 Transmit the information to parts of the network where corrective measures are possible. 3 Adjust network operation parameters (routing procedures etc.) to correct the problem. #1 lec #8 Spring2000 3-30-2000

Congestion Detection Can utilize two techniques: Notification from packet switches (routers). Infer congestion from packet loss: Packet loss can be used to detect congestion because packet loss due hardware failure is very rare. Sender can infer congestion from packet loss through missing acknowledgments. Rate or percentage of lost packets can be used to gauge degree of congestion. #2 lec #8 Spring2000 3-30-2000

Policies Affecting Network Congestion #3 lec #8 Spring2000 3-30-2000

Congestion Control Methods Congestion Control Methods Traffic Shaping: Heavily used in VC subnets including ATM networks. Avoid bursty traffic by producing more uniform output at the hosts. Representative examples: Leaky Bucket, Token Bucket. Admission Control: Used in VC subnets. Once congestion has been detected in part of the subnet, no additional VCs are created until the congestion level is reduced. Choke Packets: Used in both datagram and VC subnets. When a high level of line traffic is detected, a choke packet is sent to source host to reduce traffic. Variation Hop-by-Hop choke packets. Load Shedding: Used only when other congestion control methods in place fail. When capacity is reached, routers or switches may discard a number of incoming packets to reduce their load. #4 lec #8 Spring2000 3-30-2000

Congestion Control Algorithms: The Leaky Bucket A traffic shaping method that aims at creating a uniform transmission rate at the hosts. Used in ATM networks. An output queue of finite length is connected between the sending host and the network. Either built into the network hardware interface or implemented by the operating system. One packet (for fixed-size packets) or a number of bytes (for variable-size packets) are allowed into the queue per clock cycle. Congestion control is accomplished by discarding packets arriving from the host when the queue is full. #5 lec #8 Spring2000 3-30-2000

Leaky Bucket Traffic Rate Example (a) (b) (a) Input to a leaky bucket from host (b) Output from a leaky bucket. #6 lec #8 Spring2000 3-30-2000

Congestion Control Algorithms: The Token Bucket An output queue is connected to the host where tokens are generated and a finite number is stored at the rate of T Packets from the host can be transmitted only if enough tokens exist. When the queue is full tokens are discarded not packets. Implemented using a variable that counts tokens. #7 lec #8 Spring2000 3-30-2000

Congestion Control Algorithms: Choke Packets Used in both VC and datagram subnets. A variable u is associated by the router to reflect the recent utilization of an output line: u = au old + (1 - a) f When u goes above a given threshold, the corresponding line enters a warning state. Each new packet is checked if its output line is in warning state if so: The router sends a choke packet to the source host with the packet destination. The original packet is tagged (no new choke packets are generated). A host receiving a choke packet should reduce the traffic to the specified destination. A variation (Hop-by-Hop Choke Packets) operate similarly but take effect at each hop while choke packets travel back to the source. #8 lec #8 Spring2000 3-30-2000

INTERNETWORKING When several network types with different media, topology and protocols, are connected to form a larger network: UNIX: TCP/IP Mainframe networks: IBM s SNA, DEC s DECnet PC LANs: Novell: NCP/IPX, AppleTalk ATM, wireless networks etc. The black box converter unit used to connect two different networks depend on the layer of connection: Layer 1 (physical): Repeaters, bit level Layer 2 (data link): Bridges, data link frames Layer 3 (network): Multiprotocol routers, packets Layer 4 (transport): Transport gateways Above 4 (application): Application gateways. #9 lec #8 Spring2000 3-30-2000

Network Interconnection A full gateway two WANs A full gateway LAN-WAN Two half-gateways #10 lec #8 Spring2000 3-30-2000

Types of Network Differences #11 lec #8 Spring2000 3-30-2000

Concatenated Virtual Circuits Internetworking Connection-oriented concatenation of virtual circuit subnets. A virtual circuit is established across several VC subnets. As packets cross from one subnet to the next: Packets formats and virtual circuit numbers are changed. #12 lec #8 Spring2000 3-30-2000

Connectionless Internetworking Internetworked datagram subnets Multiprotocol router used to: Translate between two or more network layer protocols of various subnets. Packet format conversion: fields, address, etc. Possible incompatibilities: Addressing. #13 lec #8 Spring2000 3-30-2000

Internetworking Issues: Tunneling Used when the source and destination hosts are on the same type of network with a different type of network in between. Using multiprotocol routers, packets of the common network type are inserted into the WAN network layer packets. #14 lec #8 Spring2000 3-30-2000

Internetworking Issues: Fragmentation When packets from a subnet travel to another subnet with a smaller maximum packet size, packets have to be broken down into fragments and send them as internet packets. Transparent fragmentation Host Non-transparent fragmentation #15 lec #8 Spring2000 3-30-2000

Packet Fragmentation Example Original Packet Fragments after passing through a network with max. packet size = 8 Fragments after passing through a network with max. packet size = 5 #16 lec #8 Spring2000 3-30-2000