ch 5 network layer congestion

Upload: daryl-shaver

Post on 05-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 Ch 5 Network Layer Congestion

    1/42

    Congestion Control Algorithms

    General Principles of Congestion Control

    Internetwork Routing Congestion Control inVirtual-Circuit Subnets

    Congestion Control in Datagram Subnets Load Shedding

    Jitter Control

  • 7/31/2019 Ch 5 Network Layer Congestion

    2/42

    Congestion

    When too much traffic is offered, congestion sets in and

    performance degrades sharply.

  • 7/31/2019 Ch 5 Network Layer Congestion

    3/42

    General Principles of Congestion Control

    A. Monitor the system .

    detect when and where congestion occurs.

    B. Pass information to where action can be taken.C. Adjust system operation to correct the problem.

  • 7/31/2019 Ch 5 Network Layer Congestion

    4/42

    Congestion Prevention Policies

    Policies that affect congestion.

    5-26

  • 7/31/2019 Ch 5 Network Layer Congestion

    5/42

    Congestion Control in Virtual-CircuitSubnets: Admission control

    (a) A congested subnet. (b) A redrawn subnet, eliminatescongestion and a virtual circuit from A to B.

  • 7/31/2019 Ch 5 Network Layer Congestion

    6/42

    Congestion Control in Datagram Subnets:Warning Bit

    The old DECNET and frame relay networks:

    A warning bit is sent back in the ack to the source in the case

    congestion. Every router on the path can set the warning bit.

    faauu oldnew )1(

    Each router monitors its utilization u based on its temporary

    utilization f (either 0 or 1). a is a forgetness rate.

    Ifu is above a threshold, a warning state is reached.

  • 7/31/2019 Ch 5 Network Layer Congestion

    7/42

    Hop-by-HopChoke Packets

    (in high speed nets)

    (a) A choke packet that affects only

    the source.

    (b) A choke packet that affectseach hop it passes through.

    It takes 30 ms for a choke packet to

    get from NY to SF. For a 155 Mbps,4.6 Mbps gets in the pipe.

  • 7/31/2019 Ch 5 Network Layer Congestion

    8/42

    Dropping packets

    Load shedding: Wine Vs. Milk

    Wine: drop new packets (keep old); good for file transferMilk: drop old packets (keep new); good for mulitmedia

    Random Early DetectionWhen the average queue length exceeds a threshold,packets are picked at random from the queue and discarded.

  • 7/31/2019 Ch 5 Network Layer Congestion

    9/42

    Jitter Control

    (a) High jitter. (b) Low jitter.

  • 7/31/2019 Ch 5 Network Layer Congestion

    10/42

    Quality of Service

    Requirements

    Techniques for Achieving Good Quality of Service

    Integrated Services

    Differentiated Services

    Label Switching and MPLS

  • 7/31/2019 Ch 5 Network Layer Congestion

    11/42

    Requirements

    How stringent the quality-of-service requirements are.

    5-30

  • 7/31/2019 Ch 5 Network Layer Congestion

    12/42

    ATM networks classify flows in four broad categories wrt

    their QoS demand:

    1. Constant bit rate (e.g., telephony)

    2. Real-time variable bit rate (e.g., video conferencing)

    3. Non-real-time variable bit rate (e.g., video streaming)

    4. Available bit rate (e.g., file transfer)

  • 7/31/2019 Ch 5 Network Layer Congestion

    13/42

    Buffering

    Smoothing the output stream by buffering packets.

  • 7/31/2019 Ch 5 Network Layer Congestion

    14/42

    Traffic ShapingThe Leaky Bucket Algorithm

    (a) A leaky bucket with water. (b) a leaky bucket with packets.

  • 7/31/2019 Ch 5 Network Layer Congestion

    15/42

    The Token Bucket Algorithm

    (a) Before. (b) After.

    5-34

    Token bucket allows some burstiness (up to the number of token thebucket can hold)

  • 7/31/2019 Ch 5 Network Layer Congestion

    16/42

    The Leaky andToken Bucket

    Example

    (a) Input to a bucket.

    (b) Output from a leaky

    bucket.Output from a token bucket

    with capacities of

    (c) 250 KB,

    (d) 500 KB,(e) 750 KB,

    (f) Output from a 500KB

    token bucket feeding a 10-

    MB/sec leaky bucket.

  • 7/31/2019 Ch 5 Network Layer Congestion

    17/42

    Resource Reservation

    Traffic shaping is more effective when all packets follow thesame route.

    We can, similar to virtual circuits, assign a specific route to aflow and thenreserve resources along that route.

    Three kinds of resources can be reserved:

    Bitrate Buffer space

    CPU cycles

  • 7/31/2019 Ch 5 Network Layer Congestion

    18/42

    Admission Control

    An example of flow specification.

    We saw, resource reservation but how can the sender specify

    required resources ? Also, some applications are tolerant ofoccasional lapses is QoS. Also, apps might not know what itsCPU requirements are.Hence routers must convert a set of specifications to resourcerequirements and then decide whether to accept or reject the

    flow.

  • 7/31/2019 Ch 5 Network Layer Congestion

    19/42

    Proportional Routing

    The idea here very different from what we have seen earlier.Here multiple paths are assigned to each flow and aappropriate fraction of the flow is sent simultaneously overeach path.

    This technique is also called Multipath routing.

  • 7/31/2019 Ch 5 Network Layer Congestion

    20/42

    Packet Scheduling

    (a) A router with five packets queued for line O.

    (b) Finishing times for the five packets.

    If a router handling multiple flows uses first-come first-served method

    to process packets, there is possibility of some flows being starved.

    Fair queuing Weighted fair queuing

  • 7/31/2019 Ch 5 Network Layer Congestion

    21/42

    Integrated Services (IntServ)

    Aflow-basedapproach to QoS using resource reservation.

    Set of protocols aimed atstreaming multimedia and standardized bythe IETF.

    Allows both unicast and multicast transmissions.

    Resource reSerVation Protocol (RSVP) is used to reserve theresources at intermediate routers between sender and receivers.

    RSVP allows: Multiple senders to transmit to multiple groups of receivers Permits individual users to switch channels freely Optimises bandwidth utilization while simultaneously eliminatingcongestion.

  • 7/31/2019 Ch 5 Network Layer Congestion

    22/42

    RSVP-The ReSerVation Protocol

    (a) A network, (b) The multicast spanning tree for host 1.

    (c) The multicast spanning tree for host 2.

    Bandwidth reservation is done with reverse path forwarding alongthe spanning tree.

  • 7/31/2019 Ch 5 Network Layer Congestion

    23/42

    RSVP-The ReSerVation Protocol (2)

    (a) Host 3 requests a channel to host 1. (b) Host 3 then requests a

    second channel, to host 2. (c) Host 5 requests a channel to host 1.

  • 7/31/2019 Ch 5 Network Layer Congestion

    24/42

    A lighter approach to QoS

    IntServ is very powerful but has some severe drawbacks:

    - There is a setup phase, this cases delay in starting data flow.- Routers need to maintainper-flow state. This approach isflow-basedand not very scalable.

    - Complex router-to-router exchange of flow information.

    A simpler and approach was then designed by the IETF called,Differentiated Services (DiffServ).

    DiffServ takes aclass-based(as opposed to IntSev flow-based)approach to QoS

  • 7/31/2019 Ch 5 Network Layer Congestion

    25/42

    Differentiated Services (DiffServ)

    Introducesservices classes with correspondingforwarding rules.

    Network operator can sell services. Every incoming packetcarries a Type of Service field. Depending on the service class of apacket, it may receive preferential treatment. The number of classes

    are decided by the network operator.

    Idea similar to overnight, two-day and surface delivery in courierservices.

    Two simple classes are: Regular and expedited.

  • 7/31/2019 Ch 5 Network Layer Congestion

    26/42

    Expedited Forwarding

    Expedited packets experience a traffic-free network,

    e.g., if 10% of the traffic is expedited and 90% regular,

    20% bandwidth is dedicated to expedited traffic.

  • 7/31/2019 Ch 5 Network Layer Congestion

    27/42

    Assured Forwarding

    A possible implementation of the data flow for assured forwarding.

    There are 4 priority classes and 3 discard probabilities:

    low, medium, high.

  • 7/31/2019 Ch 5 Network Layer Congestion

    28/42

    Label Switching and MPLS

    Transmitting a TCP segment using IP, MPLS,

    and PPP (router-to-router).

    Vendors, developed label switching/tag switching now called

    MPLS (MulitProtocol Label Switching) by the IETF.Idea is to apply labels to every packet and route using these labels.

  • 7/31/2019 Ch 5 Network Layer Congestion

    29/42

    Label Switching and MPLS

    Comparison with virtual circuit techniques:

    Similarities:- Both used tags/circuit ids.- Both lookup routing tables based on these tags.

    - Tags have link local significance only.

    Difference:- There is no setup phase in MPLS.- MPLS tags routes and not end-point processes (no transport

    id), so greater aggregation is possible. All MPLS circuits to ahostcan use the same tags. In ATM, only cells to the sameapplication can use the same tag.

  • 7/31/2019 Ch 5 Network Layer Congestion

    30/42

    Internetworking

    How Networks Differ How Networks Can Be Connected

    Concatenated Virtual Circuits

    Connectionless Internetworking Tunneling

    Internetwork Routing

    Fragmentation

  • 7/31/2019 Ch 5 Network Layer Congestion

    31/42

    Connecting Networks

    A collection of interconnected networks.

  • 7/31/2019 Ch 5 Network Layer Congestion

    32/42

    How Networks Differ

    Some of the many ways networks can differ.

    5-43

  • 7/31/2019 Ch 5 Network Layer Congestion

    33/42

    How Networks Can Be Connected

    (a) Two Ethernets connected by a switch (data link layer).

    (b) Two Ethernets connected by routers (network layer).

  • 7/31/2019 Ch 5 Network Layer Congestion

    34/42

    Concatenated Virtual Circuits

    Internetworking using concatenated virtual circuits

    with gateways (multiprotocol routers).

    Networks can be connected using connection-oriented

    techniques. This allows easier QoS between disparate networks.Only subnets internally using VCs can be connected this way.

  • 7/31/2019 Ch 5 Network Layer Congestion

    35/42

    Connectionless Internetworking

    A connectionless internet.

  • 7/31/2019 Ch 5 Network Layer Congestion

    36/42

    Comparing internetworking approachesConnection oriented:Advantages:

    - Buffers can be reserved in advanced- Sequencing can be guaranteed- Short headers

    Disadvantages:- No alternate routing around congestion.- vulnerability to router failures- tables space at routers

    Connectionless oriented:Advantages:

    - Can be used to connected subnets without VCs inside.- Robust to router failures

    Disadvantage:- No sequencing- Longer headers

  • 7/31/2019 Ch 5 Network Layer Congestion

    37/42

    Internet Protocol (IP)

    The idea is to design another protocol, independent of datalinklayer protocols, so that its packets can be encapsulated over manydatalink layer protocols.

    Then when you want to transfer data between different subnets, a

    multiprotocol router:(1) extracts the IP packet from datalink layer frame on one subnet,(2) encapsulates into datalink layer frame of another subnet(3) send the new frame

    IP allows diverse datalink layer subnets to exchange data. It isconnectionless.

    Interworking of two different networks

  • 7/31/2019 Ch 5 Network Layer Congestion

    38/42

    Interworking of two different networksis difficult. A solution to a special case

    is tunneling.

    Tunneling a car from France to England.

  • 7/31/2019 Ch 5 Network Layer Congestion

    39/42

    Tunneling (packets)

    Tunneling a packet from Paris to London.

  • 7/31/2019 Ch 5 Network Layer Congestion

    40/42

    Internetwork Routing

    (a) An internetwork. (b) A graph of the internetwork.

    Two-level routing:Interior gateway protocol is used within each network

    Exterior gateway protocol is used between networks

    Gateway is a multiprotocol router.

  • 7/31/2019 Ch 5 Network Layer Congestion

    41/42

    Fragmentation

    (a) Transparent fragmentation (ATM, reassembly at the exit gateway).

    (b) Nontransparent fragmentation (IP, reassembly at the receiver host).

  • 7/31/2019 Ch 5 Network Layer Congestion

    42/42

    Fragmentation (2)

    Fragmentation when the elementary data size is 1 byte.(a) Original packet, containing 10 data bytes.

    (b) Fragments after passing through a network with maximumpacket size of 8 payload bytes plus header.

    (c) Fragments after passing through a size 5 gateway.