Kent State University

Similar documents
Chapter 24 Congestion Control and Quality of Service 24.1

ADVANCED COMPUTER NETWORKS

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

Unit 2 Packet Switching Networks - II

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Quality of Service (QoS)

CS557: Queue Management

Traffic Access Control. Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011

Congestion in Data Networks. Congestion in Data Networks

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

Lecture 4 Wide Area Networks - Congestion in Data Networks

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues

Outline EEC-682/782 Computer Networks I. Midterm 1 Statistics. Midterm 1 Statistics. High 99, Low 34, Average 66

Lecture Outline. Bag of Tricks

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

CS321: Computer Networks Congestion Control in TCP

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

QUALITY of SERVICE. Introduction

CS551 Router Queue Management

Real-Time Protocol (RTP)

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

Advanced Computer Networks

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP

CS CS COMPUTER NETWORKS CS CS CHAPTER 6. CHAPTER 6 Congestion Control

Congestion Control Open Loop

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION

UNIT IV TRANSPORT LAYER

IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET

EEC-484/584 Computer Networks

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

Chapter 6 Congestion Control and Resource Allocation

Chapter 24 Congestion Control and Quality of Service Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Congestion Control and Resource Allocation

Quality of Service. Traffic Descriptor Traffic Profiles. Figure 24.1 Traffic descriptors. Figure Three traffic profiles

Episode 5. Scheduling and Traffic Management

Jaringan Komputer. Network Layer. Network Layer. Network Layer. Network Layer Design Issues. Store-and-Forward Packet Switching

CSCI Spring Final Exam Solution

Lecture 17 Multimedia Transport Subsystem (Part 3)

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control

Congestion Control in Communication Networks

Network Support for Multimedia

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:

Improving QOS in IP Networks. Principles for QOS Guarantees

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

Lecture 22: Buffering & Scheduling. CSE 123: Computer Networks Alex C. Snoeren

Network Model for Delay-Sensitive Traffic

"Filling up an old bath with holes in it, indeed. Who would be such a fool?" "A sum it is, girl," my father said. "A sum. A problem for the mind.

CS519: Computer Networks. Lecture 5, Part 5: Mar 31, 2004 Queuing and QoS

CSE 123: Computer Networks

FACULTY OF COMPUTING AND INFORMATICS

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler

Flow Control. Flow control problem. Other considerations. Where?

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

UNIT 2 TRANSPORT LAYER

Quality of Service in the Internet

Computer Networking. Queue Management and Quality of Service (QOS)

Code No: RR Set No. 1

Network Management & Monitoring

Network Layer Enhancements

II. Principles of Computer Communications Network and Transport Layer

Quality of Service (QoS)

The Network Layer. Network Layer Design Objectives

CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL

Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) Fair Queueing

RSVP 1. Resource Control and Reservation

Resource Control and Reservation

Congestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues

Integrated and Differentiated Services. Christos Papadopoulos. CSU CS557, Fall 2017

Introduction to IP QoS

Overview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose

Chapter 5. The Network Layer

Quality of Service in the Internet

CSE 473 Introduction to Computer Networks. Final Exam. Your name here: 12/17/2012

Congestion control in TCP

Internet Services & Protocols. Quality of Service Architecture

The Network Layer and Routers

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

Kommunikationssysteme [KS]

Chapter 6. The Network Layer

Congestion Control & Resource Allocation. Issues in Resource Allocation Queuing Discipline TCP Congestion Control

Lecture 14: Congestion Control"

EE 122: Differentiated Services

Congestion Control 3/16/09

ATM Quality of Service (QoS)

Computer Networks. Course Reference Model. Topic. Congestion What s the hold up? Nature of Congestion. Nature of Congestion 1/5/2015.

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput

Intermediate Traffic Management

Congestion Control and Resource Allocation

Lecture 14: Congestion Control"

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

CSE 123b Communications Software

Computer Networking Introduction

Implementation of a leaky bucket module for simulations in NS-3

Chapter 6: Congestion Control and Resource Allocation

Transcription:

CS 4/54201 Computer Communication Network Kent State University Dept. of Computer Science www.mcs.kent.edu/~javed/class-net06f/ 1 A Course on Networking and Computer Communication LECT-11, S-2

Congestion Control 3 Congestion Control 4

Quiz QUIZ 701: What is the main advantage of token bucket over leaky bucket? QUIZ 702: What additional router capability is needed to implement hop-by-hop instead of the choke packet algorithm? QUIZ 704: Why in the world a router may want to drop packets intentionally even when its queue is still 20% empty? QUIZ 705: What is the objective of fair queuing? LECT-11, S-5 Congestion Control LECT-11, S-6

Taxonomy of Congestion Control Algorithms Router Centric vs. Host Centric RC can address congestion inside network. Most mechanisms need help from both. The question is therefore, who has the major share of burden. Reservation-Based vs. Feedback Based Reservation based is also a congestion avoidance scheme. Reservation protocols works better with virtual circuits. Feedback can be implicit or explicit. Window-Based vs. Rate-Based window-based works better for relative adjustment. Rate-based works better for fast adjustment in high-speed networks. LECT-11, S-7 Policies Affecting CC LECT-11, S-8

Evaluation Criteria Power Throughput Delay Fairness Index: f = ( n n i= 1 n i= 1 x i x ) 2 i 2 F=1 if all loads are equal. F=k/n if (n-k) users get 0 service. LECT-11, S-9 Traffic Shaping One of the main reason for congestion is burst traffic. One of the open loop method is to shape the traffic. Traffic shaping means smooth the output flow. It works well if there is a traffic police. Monitoring and policing is easier with virtual circuits. A mechanism for traffic shaping even with datagrams is Leaky Bucket Algorithm. LECT-11, S-10

Leaky Bucket Algorithm (Turner 69) The host is allowed to output one packet per time tick. Excess packets are dropped. Enforced at NIC. For variable sized packets, it is better to count bytes rather than packets. Leaky Bucket makes output flat irrespective of the burstiness of input. Some time, it is prudent to send fast when lot of data arrives. LECT-11, S-11 Token Bucket Algorithm The leaky bucket hold token generated at fixed rate. With 3 tokens it can send 3 out of 5 packets immediately. It allows idle hosts to save permissions to send (up to maximum of n). Here, tokens are discarded, when overflow occurs not the packets. A variation of the algorithm can count bytes, rather than packets. LECT-11, S-12

Maximum Burst Length in Token Bucket C+ r.s= M.S C=Token bucket capacity in bytes. S=Burst length is seconds. r=rate of token arrival in bytes/sec. M=maximum output rate in bytes/sec. S S = C M r QUIZ 703: A Token bucket has a capacity (C) of 250 KB. It has a maximum outputting capacity (M) of 25 MB/sec. Token is released at a rate ( r) of 2 MB/sec. What is the maximum duration of time (S) we can see a burst to sustain? LECT-11, S-13 Traffic Shaping Description of Input Maximum packet size (S bytes) Token arrival rate (r bytes/second) Token bucket capacity (C bytes) Maximum transmission rate (S bytes/sec) Description of Desired Service Loss sensitivity (bytes) Loss interval (sec) Minimum delay noticed (sec) Maximum delay variation (sec) Quality of guarantee LECT-11, S-14

Congestion Control in Virtual Circuit Subnet Admission Control: once congestion has been signaled, do not take in any more connection. Easy to implement and enforce. Avoidance of Congested Subnet: New connections are accepted but they are routed avoiding traffic jams. LECT-11, S-15 Congestion Control in VC Subnets LECT-11, S-16

Congestion Control in VC Subnets Cannot be used in TCP/IP network as there is no concept of circuit! LECT-11, S-17 Choke Packets This approach can be used both for VC s and datagrams! Each router monitors the utilization u of its output line. Let it takes a sample f in a regular interval: U = α U + ( 1 α) f When u exceeds some threshold, it sends warning. If the destination of a packet is in a jammed line, it send a warning message back to the originator of the packets. The host is required to reduce sending rate upon receiving the warning. It sets up a timer, and ignores other choke packets within that specified time to avoid the series of choke packets. If new choke packets comes after the timer interval, it again reduces the rate. What if the router is a host is SF is sending to a router in NY at 155 MB/sec? It will take 30ms. By that time the host will send another 4.6 Mbits of data in the pipe. LECT-11, S-18

Choke Packet D is congested A is sending 6 steps before D will get any relief LECT-11, S-19 Hop-by-Hop Choke Packet Each upstream router responds immediately. All routers shares the pain by spending buffer. LECT-11, S-20

Other Variations Drop packets instead as warning to sender! Routers can maintain several thresholds. mild warning, stern warning, ultimatum. Instead of line utilization other triggers can be used: queue length. Buffer utilization. Growth of queue length. There are many ways how senders can cut back. 4 Hosts are swamping the same output line. Router sends choke packet to all of them. Only one reduces the rate, 3 others keeps on blasting away. What happens to the honest host? LECT-11, S-21 Fair Queuing (Nagle 1987, Demers 1990) Routers maintain separate queue for each hosts. It scans byte-by-byte each queue. A modified scheme weights the queues based on number of VC from each hosts. LECT-11, S-22

A Fair Queuing Logic for Time Stamping For a Single Flow Clock ticks each time a bit is transmitted. P(i) = length of the packet i. S(i) = clock time when we start transmitting packet i. F(i) = finish time to transmit packet i. F(i)=S(i)+P(i) When does router start transmitting packet i? If router has not finished packet i-1, then immediate after sending packet i-1. Otherwise, right after its arrival time A(i) Thus F(i)=MAX[F(i-1), A(i)] + P(i) Multiple Flow Calculate F(i) for each packet in each flow. Transmit the one with lowest F(i) LECT-11, S-23 Characteristics of Fair Queuing Work Conserving: Router never idle: If one flow is empty then it immediately transmits from other. Fair: If one flow is sending too much of large packets its packets gets large time stamps. Weighted fair Queuing: A modified scheme weights the queues based on number of VC from each hosts. Based on flow one bit might be counted as 2 or 3. LECT-11, S-24

TCP Congestion Control 25