,, Congp - : Co Und A
,, Congp - : Co Und A
aoN
,, coNGP
•
••
............
, Congestion
. is an imPortunt iss
. .
························
·········-··············· . . pocket switched
............ .....
. computer
. ············ •••••
. uc that can anse 111
networks
.
m
.
which the
k .
perfo
11 ctWork ,,
t111n 11 •
·
N!iTWOftK LAYER
).
~ 9.55
3. Congestion is also caused by slow liDks. This problem will be solved when
l. high speed links arc u.,cd. But it is not always the case. Sometimes increase
bl link bandwidth can f\lrtbcr deteriorate the congestion problem as higher
I
I Padfeta 18111
lpllll links IM)' Diab Ibo netwk IDOII unbl)NM'A"Cl,
Fig. 1.25 Concapt" 4. Oliflf SM• - - - ...... .. If a roum' doel not bave me buffers, it
. traffic, J)Cffonnance . . . _ • lli#fi,.wl . . • e. • newly 111m111.--. When these packets are
fig. f.16) 'fi onK tat . . 111111 • 1t tJilla .a.1he 1imer goes off. Such
- I • '« a l>tl"t ..... . apia and epin until the some gets
Conpe~D • II► inm of
'IJ! j . 1111 11 H of'IIIII ,.._ 1'helob e multipk
in .... 11'1 : - - wlll bao tb, OQllllniOD to take place at the senclifll..,.
tJoJt conrro1 . I;\;\
9 . 5◄ 9,9.2 conl'' ,.
. trul rc,a~ 111
icchni~ucs ond 111cc ha111 s11111 11,111 .,
,., ('on~~fi11n on .
eonic~uon,
(
. t,cforc 11hupf)( '· .
.
.
l .
.11 or remove co11gcst1<111, nl er ,1 hus h1111
·hani~111s urc divided rnto two c111c~ori ,
c,111 c' I
Pc11cd
11 lcr
,
Prt
i,
NUW<HtK lA'r'rR
9.57
These 1wo categories are (see fig. 9.27): • To implement it, several approaches can be used :
I. Open loop I. A receiver may send an acknowledgement only if it has a packet to be
2. Clcsed loop sent.
2. A receiver may send an acknowledgement when a timer expires.
Open Loop Congestion Control
3. A m:eiver may also decide to ICbowleclp only N packets at a time.
• In thi, method, policies are used to
0• RetraumJqfo
nPoUq
• The aender retrarunut,
"""'IUUI used for open loop ,
consest1on control are .
· •
blppca. ,___-
«•• da •••,_.time
---
Such a clilolrdlllapoky-, . . -
- ·· .
may
nota1111....,1Nr-1R tpfdn
3 -
corrupted. t" • Jlll4d, if ufeel, that the ,Packet it has ICJU •
•&
"'""• ..._.. .
--•IIOeaa.lin
~
~
S, Admk:tfta .....
Data flow
t¢team t I
Fig. 9.29 Choke Packet Method
F',g. 928 BackpreSSure method
3. Implicit Signaling
• Th backpressure technique can be applied only to virtual circuit networks. In • In implicit signaling, there is no communication between the congested node
sue~ virtual circuit each node bows the upstream IK>"..e fiom which a dala or nodes and the source.
flow is coming. • The source guesses that there is a congestion somewhere in the network when
• In this method of congestion contro~ the ~ node stops ~ - it does not receive any acknowledgment. Therefore die delay in receiving an
from the immediate upstream node or nodet. acknowledsment is interpreted• cow.«tliub Ja the network.
• This may cause the upstream node Oil aoda to become ~lad • Onsemine du, con,eltioa.1M --••cloWII.
in tum, reject data 1i'om dieir gp.mn dot aodel. • Tbf, 1JJJe of CCQ1111ioaCIGldlOl...,itlllld'li,l'CP.
• As shown in fig. 9.28 node 3 is eoll,ated and it stops receiving ~ 4,5 .,. . . . .,,,.
infonns its ups:ream node 2 to slow down. Node 2 in turns, may be • fa tlaftmediad. tbf TT ••tel. . NIii ltj t;ftt .......... lOl!nle or
and infonns node I to slow down. Now aode 1 may create a conge,don ad
.imm.s die --.e 111111, ro n down. In thi, way the conpsti911 it
dlltfnadoa.10 IDfoa uouttbo oona•••
• • Bxplldt_,,. . . . . . . . . . . . :1.11111' idt- pmd
on node 3 i, moved backward to the source to ; ~~ •..,...,._._,.., ....... A 17'aplicit
-ma IMlbod.thesianaJ111nc1uc1oc11n tbt ,_.. a.t • •
s ..
-1\1(
ur in either the forward direction ~~,.
60 ~
9.
~~.
• • sirma
I 1
dif\'(tion.
· can occ
11ng
~,, "'"""'"
Ill • S~
remore the congestion. • . d . d•fli
. trol policies use in 1 erent la" .., er,
C gest1on con
I use different policies or techniques to
9.9.3 on od 111 (variable rale)
I . rs of OSI m e . control
Different a) e Th ious policies used by data lmk layer, network I Ilic
~ongestion in subnet. e. var e table below : ayer~
transport layer are sho\\n mth Interface
containing
leaky Bucket
Policies bucket
Layer holds pad<elS
.
Network
cotllltcr is 600. which is less th an the size of the next packet. The next three packets
camwt he sent. Thl'Y need to wnil for the next tick of the clock.
• packets cannot be
s~nt; must wait for the next tick
Countor
ooo
Counter
3400
Counter
6800
Counter
10,000
~
-----~
le.• .... tllis ~ , _ tokonJ,ucket algorithm is used. A token bucket
••••• ""••
.
• cation of leaky bucket in which leaky
~.~.~~~-~ ............. .. .,
i.ttntitkd hy sequence nmnhcrs.
10.s. TUl{SPO RT............
...................... ..... This tirdlit)' is bcncliciol fo r the applications (processes) lx."Cause the
:-:::,:\!
-'· - ·
cr.!.'t. t.'ie ttr~'f'-'111 IJycr pn.11i..k'$
,~:,.~ ~ ,\.Yl."l(\.1 i._~~
t \\\) t)JX'S ,,f s,•ni1:cs :··~:···•····,
. c,,~ .
~...
•
P").:<'S$eS 11<"-'J not to chop d.11u into blocks before pa.ssing it to TC'P. Instead
TCP groups bytes into segments (a unit of d;ita at trJnsport la) cr is callc-d
s,·gm,·nt) nnd pass them to IP for ddi \'cty.
f..T t.:s. tr.ii\'111 ~tt J..·t:~ ti\\) Jit"tt-n:-nt 1'fl'tt~'1)ls Trm1sniission
!>-..~,, \''. t: f P' nl r~ Ds:::\f::i:n Pfl'll'-"-~ tU)P) CoQ~
3• If offers reliabilit
y
• TCP offers reliability by providing conn<-ction oric:mc:d, end to end rcliJbk
10.S.l Tn.nsmission Control Protocol
Jdivcl)' of P3rkets.
• lt is o~h: to ud1ien: this by S<.'\1u.:n.:ing bytes v.ith a forn1Ul:I
ud:m",·ledi;,·mcnt numhc:r tlmt indicates to destination the next b}1e of data
th<.' s,,ur,:c ,:x~-cts to n:cci,·e.
• B)1CS thnt are not neknowkdged \\ithin a sped tit.-d ti me ~ riod
are
rctr.msmitted.
• The reliability mcchanism of TCP allows J,:\'k,:s IL' Jcal 1\i th lost, dd a~'--d,
duplicate or misread p:ickets.
• A time-out mechanism allows de\iccs to detect lost plcl;.ets IDd rcqutSt
~.
4. It pro.we. etllcleat flow coatral
• TCP uses slidq window ~ 1D illfl1• r 11ow COIIIIQI.
• W'121l diis tbl 19CC1M1111aa Jll'OOIII . . . . . . . . . . . . . . . aumbcr
• kcareceiw...._4Ml.._lla..._..._
............. ...............
• '1111 . . f.lfCGNI . . . . . . . . . . . . . . . . tllt#t
• •-flll1 0a-a11111•" 6_,_.. _..._ ......
......., ...... ...Is:. . .
• TCP lllows .._his II I• lf#ill .... WWW
over a ainck ~
i I ••--Ir oit
-.-vll.'t
10.16 . . ·cd indicate that TCP segment c ~'rtq
n set rt JS us 10 ontni11
LIRG, \\ en ' Jlllinter field is valid. s llrg
~er data and the urgen 1
oRf LAYER 10.17
~~, rRANSP
w . . set 10 I it means that the acknowledge
'I\ If ACK btl JS ' lllcnt 1 The various features of UDP are :
Al · . d ntains the sequence number of next byte lti111bc
lidd is ,·al1d an co exPccted r provides connectionless transport service to the applications.
I. 11
the~~ . ~ 2.
l)eing connectionless, its service is unreliable.
. b. . used to indicate to the receiver that the appli . • ~ J. It does no! offer flow control. It meartS receiver may overflow with
p1;ff This 11 1s . ca1r 011 t
• • d. nd has requested that tl11s segment of data entih. messages.
at the sen ing e rnay n .,
the receiving end and handed to the user entity 01 be
4. There is no error control mechanism in UDP except for the checksum.
_.J
bufferni aI as soon
possible. as This means that the sender does not known if message has been lost or
This bit is used for resetting the cormection. When this b.. duplicated.
RST. . d. I it is se1
I. the connection has to be cleared 1mme rnte y. to s. UDP is less complex and simple than TCP and easy to implement.
S\"N This bit is used for synchror,jzing the sequence numbers d . Because of its simplicity, UDP header contains fewer bytes and consumes
,. . uring th Jess network overhead than TCP.
connect10n. e
6. Being connectionless user datagrams (A unit of data handled by UDP) are
FIN This bit is set to I for closing a TCP connection in one dire 1.
· c ton. sent independently. There is no relationship between different user
8. Window size. This 2 byte field specifies the size of sender' . datagrams even if they are coming from same source process and going to
• ·1 bl c . . s receive
window (that IS the buffer space ava1 a e 1or mcommg data). A . the same destination process.
field is of 16 bits, maximum window size is 65,535 bytes. s this 7. User datagrams are not numbered.
9. TCP checksum. This 16 bit field contains the checksum. 8. UDP is useful in situations where reliability mechanism of TCP are not
IO. Urgent pointer. This 16 bit field is valid only if urgent pointer is set f necessary. The various situations where UDP can be used are:
The \'alue contained in this field is added to the value containe~o ~ , (i) UDP is used for transmission of digital voice over IP.
seq~nce number field to obtain the number of last urgent byte in the da · (ii) UDP is suitable for a process that requires simple request response
sectJon of the segment. . ta communication with little concern for flow control & error control.
IL Options. There can be 40 bytes of optional information in the TCP (iii) UDP is suitable transport protocol far muhicasling.
header. • (iv) UDP is used for ........... pn,ces.,es such as SNMP.
12. Data. This field contains the upper layer information. (v) UDP is med for .... mwe ....., paelOCOls u:h • Routing
10.5.2 User Datagram Protocol Infonnatiooh>tGcol (RIP).
• User D,.,,..,,.,...,
.._ ...., protocol {UDP) is a ~
protocol.
■-1:..1.,_
~
(vi) UDP can bo UNCl wilb DNS ia GIW to alt
lll)IOifio,IP......
Ille..._ - for a