chi-cheng lin, winona state university cs 313 introduction to computer networking &...
TRANSCRIPT
![Page 1: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/1.jpg)
Chi-Cheng Lin, Winona State University
CS 313 Introduction to Computer Networking &
Telecommunication
Chapter 5 Network Layer
![Page 2: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/2.jpg)
2
Topics
Design Issues Routing Algorithms Congestion Control Internetworking
![Page 3: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/3.jpg)
3
Congestion Control
CongestionToo many packets present in the
subnet Effects
Performance degradedPacket lost
![Page 4: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/4.jpg)
Congestion Control Algorithms (2)
When too much traffic is offered, congestion sets in and performance degrades sharply.
(Could be achieved bycongestion control)
(Without congestion control)
![Page 5: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/5.jpg)
5
Causes of Congestion Causes
Too many packets need an output line queuingProblem: not enough memory packets droppedSolution(?): adding more memoryNew problem: timeout and retransmit worse
Slow processorsLow bandwidth lines
Congestion tends to feed upon itself and become worse
![Page 6: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/6.jpg)
6
Congestion Control
Congestion = (Load > Resources) Solutions
Increase resourcesDecrease load
![Page 7: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/7.jpg)
Approaches to Congestion Control
Timescales of approaches to congestion control
![Page 8: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/8.jpg)
Traffic-Aware Routing
A network in which the East and West parts are connected by two links.
![Page 9: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/9.jpg)
Admission Control
(a) A congested network. (b) The portion of the network that is not congested. A virtual circuit from A to B is also shown.
![Page 10: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/10.jpg)
Traffic Throttling
Explicit congestion notification
![Page 11: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/11.jpg)
11
Choke Packets
ApproachEach router monitors output line utilizationThreshold for "warning state"A receiving router
Checks packet to see if output line in warning state
If yes thensend a "choke packet" back to
source hostoriginal packet tagged and
forwarded
![Page 12: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/12.jpg)
12
Choke Packet
Source, upon receiving a choke packetReduces traffic by a percentage after
receiving choke packetChoke packet referred to same destination
is ignored for a fixed time intervalAfter time interval expired, listens
If choke packet received then goto the step of reducing traffic
else increase traffic
![Page 13: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/13.jpg)
13
Choke Packet
TypicallyFirst choke packet causes data rate
reduced to 50%, then 25%, … Traffic is increased in smaller
increments Why?
![Page 14: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/14.jpg)
14
Hop-by-Hop Choke Packets
Problem in high speed and long distance slow reaction
SolutionHop-by-hop choke packets
Buffers needed in routers Effects:
Quick relief at the price of more buffers
![Page 15: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/15.jpg)
15
Load Shedding
Discard whatever cannot be handled
Which packets to drop?Application-dependentPriorities
![Page 16: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/16.jpg)
16
Load Shedding
StrategiesWine or milkPriority
Priority classesCoupled with traffic shaping token bucket
Packet without token sent with lowest priority
Allowing VC set up with exceeding specification Contingent on low priority
Header field needed Example: ATM CLP field (1-bit, 0 means high priority)
Rule of thumbDiscard as early as possible!
![Page 17: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/17.jpg)
Choke Packets
A choke packet that affects only the source.
![Page 18: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/18.jpg)
Choke Packets
A choke packet that affects each hop it passes through.
![Page 19: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/19.jpg)
19
Internetworking
A collection of interconnected networks.
![Page 20: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/20.jpg)
How Networks Differ
Some of the many ways networks can differ
![Page 21: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/21.jpg)
How Networks Can Be Connected
(a)A packet crossing different networks. (b)Network and link layer protocol processing.
![Page 22: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/22.jpg)
22
Tunneling
Encapsulating packets of a protocol in the payload of packets of another protocol
Useful inInternetworkingVPNIPv4 to IPv6 transition…
![Page 23: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/23.jpg)
Tunneling
Tunneling a packet from Paris to London.
![Page 24: Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer](https://reader036.vdocuments.us/reader036/viewer/2022062515/56649c905503460f9494a55d/html5/thumbnails/24.jpg)
Tunneling
Tunneling a car from France to England