1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.



Similar documents
Congestion Control Overview

Announcements. Midterms. Mt #1 Tuesday March 6 Mt #2 Tuesday April 15 Final project design due April 11. Chapters 1 & 2 Chapter 5 (to 5.

The Network Layer Functions: Congestion Control

Congestion Control Review Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?

Quality of Service (QoS)) in IP networks

Routing in packet-switching networks

Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage

Computer Networks. Chapter 5 Transport Protocols

TCP for Wireless Networks

Per-Flow Queuing Allot's Approach to Bandwidth Management

Internet Quality of Service

Introduction to LAN/WAN. Network Layer

Distributed Systems 3. Network Quality of Service (QoS)

CS640: Introduction to Computer Networks. Why a New Service Model? Utility curve Elastic traffic. Aditya Akella. Lecture 20 QoS

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

Analysis of Internet Transport Service Performance with Active Queue Management in a QoS-enabled Network

CHAPTER 1 ATM TRAFFIC MANAGEMENT

CS268 Exam Solutions. 1) End-to-End (20 pts)

QoS issues in Voice over IP

17: Queue Management. Queuing. Mark Handley

TCP in Wireless Mobile Networks

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN Vol 2 No 3 (May-2015) Active Queue Management

Access Control: Firewalls (1)

Transport Layer Protocols

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

Mobile Communications Chapter 9: Mobile Transport Layer

18: Enhanced Quality of Service

CS 78 Computer Networks. Internet Protocol (IP) our focus. The Network Layer. Interplay between routing and forwarding

How To Provide Qos Based Routing In The Internet

Motivation. QoS Guarantees. Internet service classes. Certain applications require minimum level of network performance:

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Quality of Service (QoS) on Netgear switches

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP in Wireless Networks

Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross

CS335 Sample Questions for Exam #2

Active Queue Management (AQM) based Internet Congestion Control

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Stop And Wait. ACK received; transmit frame 2 CS 455 3

Solving complex performance problems in TCP/IP and SNA environments.

6.6 Scheduling and Policing Mechanisms

Network management and QoS provisioning - QoS in the Internet

Active Queue Management

Introduction to LAN/WAN. Network Layer (part II)

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

College 5, Routing, Internet. Host A. Host B. The Network Layer: functions

Chapter 6 Congestion Control and Resource Allocation

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Referring to the above question, the end-to-end delay (transmission delay plus propagation delay) is

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

Passive Queue Management

Introduction to Quality of Service. Andrea Bianco Telecommunication Network Group

Final for ECE374 05/06/13 Solution!!

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

[Prof. Rupesh G Vaishnav] Page 1

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Computer Networks Homework 1

CSE 123: Computer Networks

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Transport and Network Layer

Congestions and Control Mechanisms n Wired and Wireless Networks

28 Networks and Communication Protocols

Analysis of IP Network for different Quality of Service

Comparative Analysis of Congestion Control Algorithms Using ns-2

Communications and Computer Networks

How To Solve A Network Communication Problem

TCP over Wireless Networks

10CS64: COMPUTER NETWORKS - II

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

Multimedia Requirements. Multimedia and Networks. Quality of Service

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:

Introduction to Metropolitan Area Networks and Wide Area Networks

ΤΕΙ Κρήτης, Παράρτηµα Χανίων

Smart Queue Scheduling for QoS Spring 2001 Final Report

Chapter 7 outline. 7.5 providing multiple classes of service 7.6 providing QoS guarantees RTP, RTCP, SIP. 7: Multimedia Networking 7-71

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

The network we see so far. Internet Best Effort Service. Is best-effort good enough? An Audio Example. Network Support for Playback

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Optimizing Converged Cisco Networks (ONT)

Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements

Analog vs. Digital Transmission

Network Management Quality of Service I

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Active Queue Management and Wireless Networks

Improving Quality of Service

ICOM : Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

1 Introduction to mobile telecommunications

Random Access Protocols

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and

How To Write A Transport Layer Protocol For Wireless Networks

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

Transcription:

Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one of two things must happen: 1. The subnet must prevent additional packets from entering the congested region until those already present can be processed. 2. The congested routers can discard queued packets to make room for those that are arriving. See Fig. 5-26 for possible sources. We now consider the problem of congestion and some possible solutions. Three general approaches: 1. prevent it altogether 2. congestion avoidance 3. deal with it if it occurs CS 513 1 week8-nlcong.tex

Preallocation of Resources Preallocation schemes aim to prevent congestion from happening in the first place. For example, we can require that resources be preallocated before any packets can be sent, guaranteeing that resources will be available to process each packet. In virtual circuit networks, for example, the sender opens a connection before sending data. The circuit setup operation selects a path through the subnet, and each router on the path dedicates buffer space and bandwidth to the new circuit. What happens when a user attempts to open a virtual circuit and the subnet is congested? The subnet can refuse to open the connection, forcing the user to wait until sufficient resources become available. Note: The ability of the subnet to reject requests to open connections is an important property of connection oriented networks. CS 513 2 week8-nlcong.tex

Traffic Shaping Control the rate at which packets are sent (not just how many). A congestion avoidance method. Relates to Quality of Service (QoS) as means to provide more reliable service despite variable transmission patterns. At set up, the sender and carrier negotiate a traffic pattern (shape). Leaky Bucket Algorithm used to control rate in a datagram network. See Fig. 5-24. A single-server queue with constant service time. If bucket (buffer) overflows then packets are discarded. Enforces a constant output rate regardless of burstiness of input. Does nothing when input is idle. In contrast the Token Bucket Algorithm causes a token to be generated periodically, which during idle periods can be saved up. Related to traffic shaping is flow specification, where a particular quality of service is agreed upon between sender, receiver and carrier. CS 513 3 week8-nlcong.tex

Isarithmic Congestion Control Another approach to congestion avoidance is to limit the total number flow of packets in the subnet at any one time. The idea is similar to the token ring: 1. When an router accepts a packet from a host, it must obtain a permit before sending the packet into the subnet. 2. Obtaining a permit is analogous to seizing the token, but there can be many permits in the subnet. When an router obtains a permit, it destroys it. 3. The destination router regenerates the permit when it passes the packet to the destination host. Issues: 1. Although we have limited the total number of packets in the subnet, we have no control over where in the subnet those packets will be. Thus, an router in one part of the subnet might be congested, while an router in another part remains idle, but unable to process packets for lack of permits. 2. Regenerating lost permits is difficult, because no single node knows how many permits are currently in the subnet. 3. How to distribute permits? Distribute among the routers or centralize for a known access point. Virtual Circuits Admission Control Refuse to set up new connections if congestion is present. Also helps with congestion avoidance. CS 513 4 week8-nlcong.tex

Flow Control Flow control is aimed at preventing a fast sender from overwhelming a slow receiver. Flow control can be helpful at reducing congestion, but it can t really solve the congestion problem. For example, suppose we connect a fast sender and fast receiver using a 9.6 kbps line: 1. If the two machines use a sliding window protocol, and the window is large, the link will become congested in a hurry. 2. If the window size is small (e.g., 2 packets), the link won t become congested. Note how the window size limits the total number of packets that can be in transmission at one time. Flow control can take place at many levels: User process to user process (end-to-end). Later, we ll see how TCP uses flow control at the end-to-end level. Host to host. For example, if multiple application connections share a single virtual circuit between two hosts. router to router. For example, in virtual circuits. CS 513 5 week8-nlcong.tex

Load Shedding/Discarding Packets (No Preallocation) At the other end of the spectrum, we could preallocate no resources in advance, and take our chances that resources will be available when we need them. When insufficient resources are present to process existing packets, discard queued packets to make room for newly arriving ones. Who retransmits the discarded packets? Two cases: connection oriented and connectionless. In datagram (connectionless) networks, the sending host (transport layer) retransmits discarded packets (if appropriate). In virtual circuit networks, the previous-hop router retransmits the packet when it fails to receive an acknowledgment. Failure to preallocate resources leads to two problems: potential deadlock and unfairness. First, let us consider deadlock. Suppose that all of an router s buffers hold packets. Because the router has no free buffers, it cannot accept additional frames. Unfortunately, it also ignores frames containing ACKs that would free up some of those buffers! Suppose further, that two adjacent routers, A and B, are sending packets to each other. Since both are waiting for the other to accept a packet, neither can proceed. This condition is known as a deadlock. Solution: Reserve at least one buffer for each input line and use it to hold incoming packets. Note that we can extract the ACK field and still discard the packet, if we don t have buffers to hold it. Advantage of discarding packets when congested: Easy to implement. Disadvantages: 1. Wastes resources. The network may have expended considerable resources processing a packet that is eventually discarded. 2. Non-deterministic. There is less guarantee than with virtual circuits that packets will ever reach their destination. 3. Requires that sending hosts pay attention to congestion. If the network can t prevent a host from sending data, a host can overload the network. In particular, a broken host may cause the network to become overly congested. 4. In the extreme case, congestion collapse occurs. The network becomes so overloaded, that few packets reach their destination. Meanwhile, the sending hosts continue to generate more data (both retransmissions and new packets). This condition occurred several times back in 1987, and the Internet/Arpanet became unusable for a period of hours to days. CS 513 6 week8-nlcong.tex

Random Early Detection (RED) Start dropping packets before a router runs out of buffer space. Basic idea: ^ 1.0 -------- maxp / drop / prob. / ----- --- --------------------------> min max queue size CS 513 7 week8-nlcong.tex

Choke Packets ECN (Explicit Congestion Notification) is an example where instead of dropping packets, routers mark packets indicating that router is congested. routers can monitor the level of congestion around them, and when congestion is present, they can send choke packets to the sender that say slow down. How can an router measure congestion? An router might estimate the level of congestion by measuring the percentage of buffers in use, line utilization, or average queue lengths. Advantage: Dynamic. Host sends as much data as it wants, the network informs it when it is sending too much. Disadvantage: 1. Difficult to tune. By how much should a host slow down? The answer depends on how much traffic the host is sending, how much of the congestion it is responsible for, and the total capacity of the congested region. Such information is not readily available in practice. 2. After receiving a choke packet, the sending host should ignore additional choke packets for a short while because packets currently in transmission may generate additional choke packets. How long? Depends on such dynamic network conditions as delay. Variations exist. Congestion Summary Overall: Varying methods for congestion control with different levels of effectiveness. More attention being paid to reserving resources so that chances of congestion are reduced and the quality of service is more reliable. Will also look at congestion control again when we examine TCP as it has its own congestion control mechanism. CS 513 8 week8-nlcong.tex