Congestion Control Algorithms
Congestion Control Algorithms
Packets Delivered
Desirable
Congested
Packets Sent
2/8/2013 Congestion Control Algorithms 1
2/8/2013
2/8/2013
Techniques
Several techniques can be employed. These include: Choke packets Load shedding Traffic shaping The first 2 deal with congestion detection and recovery. The last one deals with congestion avoidance.
2/8/2013 Congestion Control Algorithms 7
Traffic Shaping
Forcing the packets to be transmitted in a more predictable rate. Traffic policing: Monitoring the traffic flow.
2/8/2013
2/8/2013
2/8/2013
10
2/8/2013
11
Choke Packets
A more direct way of telling the source to slow down. A choke packet is a control packet generated at a congested node and transmitted to restrict traffic flow. The source, on receiving the choke packet must reduce its transmission rate by a certain percentage.
2/8/2013 Congestion Control Algorithms 12
unew = auold
( 1-a ) f
U Utilization of its output lines. A a constant, how fast the router forgets the recent history. F instantaneous line utilization
2/8/2013
13
A B C D
11
15
19
20
C 8
12
16
B 16
O
13 17
17
18
10
14
18
20
B
A E B A E B A
Choke
C D F C A
C D A
C D
Choke
E B F C
B
Choke
C
D Flow is reduced
A Reduced Flow E F
D A
F C D
E
2/8/2013
F
Congestion Control Algorithms 15
C D
A
F
Reduced Flow B C D E F
c)
B
A
C D F d)
Choke E
Choke E
e)
16
Load Shedding
Load Shedding is a way in which the routers when flooded with packets that it cannot handle, just throws them away.
2/8/2013
17
Jitter Control
In this technique, the packets which are ahead of schedule get slowed down & packets that are behind schedule get speeded up.
2/8/2013
18
Receivers 2/8/2013
19