Professional Documents
Culture Documents
Congestion Control
Congestion Control
Presented by:-
Under Guidence of:- Arpit Yadav
Dr S.K.Mishra Sir B4- 56/1811030903
Outline
1. Introduction
2. Effect of Congestion
3. Type
4. Congestion Control Algorithms
5. Internetworking TCP/IP
6. TCP/IP Layer
Introduction
A state occurring in network layer when the message
traffic is so heavy that it slows down network response
time.
Congestion control modulates traffic entry into a
telecommunications network in order to avoid
congestive collapse resulting from oversubscription.
This is typically accomplished by reducing the rate of
packets. Whereas congestion control prevents senders
from overwhelming the network,flowcontrol ,prevents
the sender from overwhelming the receiver.
Effects of Congestion
As delay increases, performance decreases.
If delay increases, retransmission occurs, making
situation worse
Congestion Control Techniques
Open Loop Congestion Closed Loop Congestion
Control Control
1. LEAKY BUCKET
2. TOKEN BUCKET
Leaky Bucket Algorithm
The leaky bucket is an algorithm based on an analogy of how a
bucket with a constant leak will overflow if either the average
rate at which water is poured in exceeds the rate at which the
bucket leaks or if more water than the capacity of the bucket is
poured in all at once.
Let us consider an example to understand Imagine a bucket with a small hole in
the bottom. No matter at what rate water enters the bucket, the outflow is at
constant rate. When the bucket is full with water additional water entering
spills over the sides and is lost.
Similarly, each network interface contains a leaky bucket
and the following steps are involved in leaky bucket
algorithm:
1. When host wants to send packet, packet is thrown
into the bucket.
2. The bucket leaks at a constant rate, meaning the
network interface transmits packets at a constant
rate.
3. Burstyn traffic is converted to a uniform traffic by
the leaky bucket.
4. In practice the bucket is a finite queue that outputs
at a finite rate.
Token bucket Algorithm
The token bucket is an algorithm used in packet switched computer
networks and telecommunications networks. It can be used to check that
data transmissions in the form of packets, conform to defined limits on
bandwidth and burstiness (a measure of the variations in the traffic flow).