Professional Documents
Culture Documents
Control
12/05/09 1
Overview
• What is Congestion
• Factors Causing Congestion
• Congestion Control Techniques
– Warning bit
– Choke packets
– Load shedding
– Random early discard
– Traffic shaping
12/05/09 2
What Is congestion?
• Congestion occurs when the number of packets being
transmitted through the network approaches the packet
handling capacity of the network.
12/05/09 3
Factors that Cause Congestion
• Packet arrival rate exceeds the outgoing link capacity. In
this case the network will start dropping the packets.
• Slow processor
12/05/09 4
Congestion Control Techniques
• Congestion Control is concerned with efficiently using a
network at high load.
12/05/09 5
Warning Bit
• A special bit in the packet header is set by the
router to warn the source when congestion is
detected.
12/05/09 6
Warning Bit
Data
1 Congestion 3
ACK
2 4
12/05/09 7
Choke Packets
• A more direct way of telling the source to slow
down.
• A choke packet is a control packet generated at
a congested node and transmitted to restrict
traffic flow
• The source, on receiving the choke packet must
reduce its transmission rate by a certain
percentage.
• An example of a choke packet is the ICMP
Source Quench Packet
12/05/09 8
Hop-by-Hop Choke Packets
• Over Long distances or at high speeds,
the choke packets are not very effective.
12/05/09 10
Load Shedding
Data
1
3 4
2
Queue
12/05/09 11
Load Shedding
Data
1
Queue
Full
3 4
12/05/09 12
Random Early Discard (RED)
• This is a proactive approach in which the router
discards one or more packets before the buffer
becomes completely full.
• Each time a packet arrives, the RED algorithm
computes the average queue length, avg.
• If avg is lower than some lower threshold, congestion
is assumed to be minimal or non-existent and the
packet is queued.
• If avg is greater than some upper threshold,
congestion is assumed to be serious and the packet is
discarded.
12/05/09 13
Traffic Shaping
• Another method of congestion control is to
“shape” the traffic before it enters the network.
• Traffic shaping controls the rate at which the
packets are sent. It is used in ATM and
Integrated Services Network.
• At connection set-up time the sender and the
carrier negotiate a traffic pattern (shape).
• There are two traffic shaping algorithms :
– Leaky Bucket
– Token Bucket
12/05/09 14
The Leaky Bucket
• The Leaky Bucket
Algorithm used to
control rate in a network.
It is implemented as a
single-server queue with
constant service time. If
the bucket (buffer)
overflows then packets
are discarded.
12/05/09 15
Leaky bucket Algorithm contd..
• The host injects one packet per clock tick onto the
network. This results in a uniform flow of packets,
smoothing out bursts and reducing congestion.
12/05/09 16
Token Bucket Algorithm
• In contrast to the LB, the Token Bucket Algorithm, allows the
output rate to vary, depending on the size of the burst.
• Idle hosts can capture and save up tokens (up to the max. size of
the bucket) in order to send larger bursts later.
12/05/09 17
Token Bucket Algorithm
12/05/09 18
Conclusion
Congestion is a major problem in the
networks. To reduce the congestion,
we have to choose appropriate
congestion control techniques based
on the situation.
12/05/09 19