You are on page 1of 18

DATA COMMUNICATION NETWORK

Congestion Control in Computer


Networks
Dept. Of Electronics Engg.
IERT- Prayagraj

Presented by:-
Under Guidence of:- Arpit Yadav
Dr S.K.Mishra Sir B4- 56/1811030903
Outline
1. Introduction
2. Effect of Congestion
3. Type
4. Congestion Control Algorithms
5. Internetworking TCP/IP
6. TCP/IP Layer
Introduction
 A state occurring in network layer when the message
traffic is so heavy that it slows down network response
time.
 Congestion control modulates traffic entry into a
telecommunications network in order to avoid
congestive collapse resulting from oversubscription.
This is typically accomplished by reducing the rate of
packets. Whereas congestion control prevents senders
from overwhelming the network,flowcontrol ,prevents
the sender from overwhelming the receiver.
Effects of Congestion
As delay increases, performance decreases.
If delay increases, retransmission occurs, making
situation worse
Congestion Control Techniques
Open Loop Congestion Closed Loop Congestion
Control Control

Retransmission Policy Retransmission Policy


Window Policy Backpressure
Discarding Policy Choke Packet Technique
Acknowledgment Policy Implicit Signaling
Admission Policy Explicit Signaling
1. Forward Signaling
2. Backward Signaling 
Congestion Control Algorithms

1. LEAKY BUCKET

2. TOKEN BUCKET
Leaky Bucket Algorithm
The leaky bucket is an algorithm based on an analogy of how a
bucket with a constant leak will overflow if either the average
rate at which water is poured in exceeds the rate at which the
bucket leaks or if more water than the capacity of the bucket is
poured in all at once.
Let us consider an example to understand Imagine a bucket with a small hole in
the bottom. No matter at what rate water enters the bucket, the outflow is at
constant rate. When the bucket is full with water additional water entering
spills over the sides and is lost.
Similarly, each network interface contains a leaky bucket
and the following steps are involved in leaky bucket
algorithm:
1.  When host wants to send packet, packet is thrown
into the bucket.
2.  The bucket leaks at a constant rate, meaning the
network interface transmits packets at a constant
rate.
3.  Burstyn traffic is converted to a uniform traffic by
the leaky bucket.
4. In practice the bucket is a finite queue that outputs
at a finite rate.
Token bucket Algorithm
The token bucket is an algorithm used in packet switched computer
networks and telecommunications networks. It can be used to check that
data transmissions in the form of packets, conform to defined limits on
bandwidth and burstiness (a measure of the variations in the traffic flow).

Steps of this algorithm can be described as follows:


1) In regular intervals tokens are thrown into the
bucket. ƒ
2) The bucket has a maximum capacity. ƒ
3) If there is a ready packet, a token is removed from
the bucket, and the packet is sent.
4) If there is no token in the bucket, the packet cannot
be sent.
Let’s understand with an example,
In figure (A) we see a bucket holding three tokens,
with five packets waiting to be transmitted. For a
packet to be transmitted, it must capture and destroy
one token. In figure (B) We see that three of the five
packets have gotten through, but the other two are
stuck waiting for more tokens to be generated.
Internetworking - Transmission Control
Protocol/Internet Protocol (TCP/IP)
TCP/IP stands for Transmission Control Protocol/Internet
Protocol. 
TCP/IP is a set of standardized rules that allow computers
to communicate on a network such as the internet.
The entire Internet Protocol suite - a set of rules and
procedures -- is commonly referred to as TCP/IP.
TCP and IP are the two main protocols, through other are
included in the suits.
 The TCP/IP protocol suite functions as an abstraction layer
between internet applications and the routing/switching
fabric.
TCP/IP Layer
The two main protocols in the Internet Protocol
suite serve specific functions.
 TCP defines how applications can create channels of
communication across a network. It also manages how
a message is assembled into smaller packets before
they are then transmitted over the internet and
reassembled in the right order at the destination
address.
IP defines how to address and route each packet to
make sure it reaches the right destination.
Each gateway computer on the network checks this IP
address to determine where to forward the message.
Common protocols of TCP/IP include

1. HTTP (Hyper Text Transfer Protocol) handles the


communication between a web server and a web
browser.
2. HTTPS (Secure HTTP) handles secure
communication between a web server and a web
browser.
3. FTP (File Transfer Protocol) handles transmission of
files between computers.
TCP/IP model layers
TCP/IP functionality is divided into four layers, each of which
include specific protocols:
 The application layer provides applications with standardized
data exchange. Its protocols include the HTTP, FTP, Post Office
Protocol 3 (POP3), Simple Mail Transfer Protocol (SMTP) and
Simple Network Management Protocol (SNMP). At the
application layer, the payload is the actual application data.
 The transport layer is responsible for maintaining end-to-end
communications across the network. TCP handles
communications between hosts and provides flow control,
multiplexing and reliability. The transport protocols include TCP
and User Datagram Protocol (UDP), which is sometimes used
instead of TCP for special purposes.
TCP/IP model layers….
 The network layer, also called the internet layer, deals
with packets and connects independent networks to
transport the packets across network boundaries. The
network layer protocols are the IP and the Internet Control
Message Protocol (ICMP), which is used for error reporting.
 The physical layer, also known as the network interface
layer or data link layer, consists of protocols that operate
only on a link -- the network component that interconnects
nodes or hosts in the network. The protocols in this lowest
layer include Ethernet for local area networks (LANs) and
the Address Resolution Protocol (ARP).
Thank You

You might also like