CH 5 Network Layer Congestion
CH 5 Network Layer Congestion
General Principles of Congestion Control Internetwork Routing Congestion Control in Virtual-Circuit Subnets Congestion Control in Datagram Subnets Load Shedding Jitter Control
Congestion
When too much traffic is offered, congestion sets in and performance degrades sharply.
5-26
(a) A congested subnet. (b) A redrawn subnet, eliminates congestion and a virtual circuit from A to B.
unew auold (1 a ) f
Each router monitors its utilization u based on its temporary utilization f (either 0 or 1). a is a forgetness rate. If u is above a threshold, a warning state is reached.
Dropping packets
Load shedding: Wine Vs. Milk
Wine: drop new packets (keep old); good for file transfer Milk: drop old packets (keep new); good for mulitmedia Random Early Detection When the average queue length exceeds a threshold, packets are picked at random from the queue and discarded.
Jitter Control
Quality of Service
Requirements Techniques for Achieving Good Quality of Service Integrated Services Differentiated Services Label Switching and MPLS
Requirements
5-30
ATM networks classify flows in four broad categories wrt their QoS demand: 1. 2. 3. 4. Constant bit rate (e.g., telephony) Real-time variable bit rate (e.g., video conferencing) Non-real-time variable bit rate (e.g., video streaming) Available bit rate (e.g., file transfer)
Buffering
Traffic Shaping
The Leaky Bucket Algorithm
(a) A leaky bucket with water. (b) a leaky bucket with packets.
5-34
(a) Before.
(b) After.
Token bucket allows some burstiness (up to the number of token the bucket can hold)
Resource Reservation
Traffic shaping is more effective when all packets follow the same route. We can, similar to virtual circuits, assign a specific route to a flow and then reserve resources along that route. Three kinds of resources can be reserved: Bitrate Buffer space CPU cycles
Admission Control
We saw, resource reservation but how can the sender specify required resources ? Also, some applications are tolerant of occasional lapses is QoS. Also, apps might not know what its CPU requirements are. Hence routers must convert a set of specifications to resource requirements and then decide whether to accept or reject the flow.
Proportional Routing
The idea here very different from what we have seen earlier. Here multiple paths are assigned to each flow and a appropriate fraction of the flow is sent simultaneously over each path. This technique is also called Multipath routing.
Packet Scheduling
If a router handling multiple flows uses first-come first-served method to process packets, there is possibility of some flows being starved. Fair queuing Weighted fair queuing
(a) A router with five packets queued for line O. (b) Finishing times for the five packets.
(a) A network, (b) The multicast spanning tree for host 1. (c) The multicast spanning tree for host 2.
(a) Host 3 requests a channel to host 1. (b) Host 3 then requests a second channel, to host 2. (c) Host 5 requests a channel to host 1.
Network operator can sell services. Every incoming packet carries a Type of Service field. Depending on the service class of a packet, it may receive preferential treatment. The number of classes are decided by the network operator.
Idea similar to overnight, two-day and surface delivery in courier services. Two simple classes are: Regular and expedited.
Expedited Forwarding
Expedited packets experience a traffic-free network, e.g., if 10% of the traffic is expedited and 90% regular, 20% bandwidth is dedicated to expedited traffic.
Assured Forwarding
A possible implementation of the data flow for assured forwarding. There are 4 priority classes and 3 discard probabilities: low, medium, high.
Internetworking
How Networks Differ How Networks Can Be Connected Concatenated Virtual Circuits Connectionless Internetworking Tunneling Internetwork Routing Fragmentation
Connecting Networks
5-43
(a) Two Ethernets connected by a switch (data link layer). (b) Two Ethernets connected by routers (network layer).
Connectionless Internetworking
A connectionless internet.
Tunneling (packets)
Internetwork Routing
(a) An internetwork. (b) A graph of the internetwork. Two-level routing: Interior gateway protocol is used within each network Exterior gateway protocol is used between networks Gateway is a multiprotocol router.
Fragmentation
(a) Transparent fragmentation (ATM, reassembly at the exit gateway). (b) Nontransparent fragmentation (IP, reassembly at the receiver host).
Fragmentation (2)
Fragmentation when the elementary data size is 1 byte. (a) Original packet, containing 10 data bytes. (b) Fragments after passing through a network with maximum packet size of 8 payload bytes plus header. (c) Fragments after passing through a size 5 gateway.