SlideShare a Scribd company logo
Session 2020-21
Choke Packet
Submitted By
Ujjwal matoliya
B.Sc 3rd sem
Content
What is congestion?
Traffic Shaping
Congestion control algorithms
Choke Packet
What is congestion?
A state occurring in network layer when the
message traffic is so heavy that it slows down
network response time.
Effects of Congestion
As delay increases, performance decreases.
If delay increases, retransmission occurs, making
situation worse.
Traffic Shaping
A network traffic management technique.
Traffic shaping is used to control bandwidth of
the network to ensure quality of service to
business-critical applications
This technique uses parameters to shape the flow of network traffic :
I. Average bandwidth
II. Peak bandwidth
Average Bandwidth :
It is configured to set permitted bits per second across a port group
level or a virtual/distributed virtual switch, over time. The rate of data
transfer is permitted over time.
Peak bandwidth :
It decides maximum number of bits per second permitted across a
port group level or a virtual/distributed virtual switch without
discarding or queuing the frames.
Time
Data
rate
Average Bandwidth
Peak bandwidth
Congestion control algorithms
1.Leaky Bucket Algorithm
2.Token bucket Algorithm
Imagine a bucket with a small hole in the bottom.No matter at
what rate water enters the bucket, the outflow is at constant
rate.When the bucket is full with water additional water entering
spills over the sides and is lost.
Leaky Bucket Algorithm
The leaky bucket algorithm enforces output pattern at the average
rate, no matter how bursty the traffic is. So in order to deal with the
bursty traffic we need a flexible algorithm so that the data is not lost.
One such algorithm is token bucket algorithm.
Token bucket Algorithm
0 2
10
mbps
0 1
5
mbps
congestion ujjwal matoliya.pptx
Formula:
M * s = C + ρ * s
where S – is time taken
M – Maximum output rate
ρ – Token arrival rate
C – Capacity of the token bucket in
byte
Choke Packet
A choke packet is used in network maintenance and quality
management to inform a specific node or transmitter that its
transmitted traffic is creating congestion over the network.
This forces the node or transmitter to reduce its output rate.
Choke packets are used for congestion and flow control over a
network. The source node is addressed directly by the router,
forcing it to decrease its sending rate .The source node
acknowledges this by reducing the sending rate by some
percentage.
congestion ujjwal matoliya.pptx
congestion ujjwal matoliya.pptx

More Related Content

PPTX
Congestion control
PPTX
Congestion control algorithms.pptx
PPTX
Congestion control
PPT
Congestion control
PPTX
Conjestion control
PDF
Congestion control 1
PDF
Congestion control
Congestion control
Congestion control algorithms.pptx
Congestion control
Congestion control
Conjestion control
Congestion control 1
Congestion control

Similar to congestion ujjwal matoliya.pptx (20)

PPT
connecting devices part-2: Router and its uses
PPTX
Congestion Control
PPTX
Congestion on computer network
PPT
congestion_control: types, uses and application
PPTX
Congestion Control in Computer networks
PPTX
Congestion control
PDF
4.4Congetion controldistancevectorroutingandalgorithmcomputernetworks
PDF
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
PPTX
Leaky Bucket & Tocken Bucket - Traffic shaping
PPTX
Leaky bucket A
PPT
Congestion Control
PPTX
Congestion Control and QoS for undergraduate.pptx
PPTX
Congestion control Assignment Help
PPT
9_Network.ppt
PPTX
Congestion control
PDF
CN Module 5 part 2 2022.pdf
PPT
Congestionin Data Networks
PDF
Token Based Packet Loss Control Mechanism for Networks
PPT
ch24-congestion-control-and-quality-of-service.ppt
PPT
ch24-congestion-control-and-quality-of-service.ppt
connecting devices part-2: Router and its uses
Congestion Control
Congestion on computer network
congestion_control: types, uses and application
Congestion Control in Computer networks
Congestion control
4.4Congetion controldistancevectorroutingandalgorithmcomputernetworks
Study on Different Mechanism for Congestion Control in Real Time Traffic for ...
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky bucket A
Congestion Control
Congestion Control and QoS for undergraduate.pptx
Congestion control Assignment Help
9_Network.ppt
Congestion control
CN Module 5 part 2 2022.pdf
Congestionin Data Networks
Token Based Packet Loss Control Mechanism for Networks
ch24-congestion-control-and-quality-of-service.ppt
ch24-congestion-control-and-quality-of-service.ppt
Ad

More from ujjwalmatoliya (19)

PPTX
kisan bill ujjwal matoliya.pptx
PPTX
Data Frames and Scatterplots in R language ujjwal matoliya.pptx
PPTX
Floyd’s and Warshal’s Algorithm ujjwal matoliya.pptx
PPTX
Global Attributes Window Event Attributes Form Events Ujjwal matoliya.pptx
PPTX
Instruction format UJJWAL MATOLIYA.pptx
PPTX
javascript function ujjwal matoliya.pptx
PPTX
string functions in SQL ujjwal matoliya.pptx
PPTX
jdbc Java Database Connectivity ujjwal matoliya jdbc.pptx
PPTX
compiler design ujjwal matoliya 2nd sem MCA.pptx
PPTX
3 address code ujjwal matoliya.pptx
PPTX
2-3 tree ujjwal matoliya .pptx
PPTX
Graph in Discrete mathemaetics.pptx
PPTX
Quick Sort in data structure.pptx
PPTX
Hadoop With R language.pptx
PPTX
LOGIC FAMILY.pptx
PPTX
Transaction.pptx
PPTX
cyclomatic complecity.pptx
PPTX
computer graphic.pptx
PPTX
Game playing With AI.pptx
kisan bill ujjwal matoliya.pptx
Data Frames and Scatterplots in R language ujjwal matoliya.pptx
Floyd’s and Warshal’s Algorithm ujjwal matoliya.pptx
Global Attributes Window Event Attributes Form Events Ujjwal matoliya.pptx
Instruction format UJJWAL MATOLIYA.pptx
javascript function ujjwal matoliya.pptx
string functions in SQL ujjwal matoliya.pptx
jdbc Java Database Connectivity ujjwal matoliya jdbc.pptx
compiler design ujjwal matoliya 2nd sem MCA.pptx
3 address code ujjwal matoliya.pptx
2-3 tree ujjwal matoliya .pptx
Graph in Discrete mathemaetics.pptx
Quick Sort in data structure.pptx
Hadoop With R language.pptx
LOGIC FAMILY.pptx
Transaction.pptx
cyclomatic complecity.pptx
computer graphic.pptx
Game playing With AI.pptx
Ad

Recently uploaded (20)

PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Institutional Correction lecture only . . .
PDF
Insiders guide to clinical Medicine.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Lesson notes of climatology university.
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Classroom Observation Tools for Teachers
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
01-Introduction-to-Information-Management.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Institutional Correction lecture only . . .
Insiders guide to clinical Medicine.pdf
TR - Agricultural Crops Production NC III.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Lesson notes of climatology university.
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
102 student loan defaulters named and shamed – Is someone you know on the list?
2.FourierTransform-ShortQuestionswithAnswers.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Renaissance Architecture: A Journey from Faith to Humanism
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Anesthesia in Laparoscopic Surgery in India
Classroom Observation Tools for Teachers
FourierSeries-QuestionsWithAnswers(Part-A).pdf
O5-L3 Freight Transport Ops (International) V1.pdf
01-Introduction-to-Information-Management.pdf

congestion ujjwal matoliya.pptx

  • 1. Session 2020-21 Choke Packet Submitted By Ujjwal matoliya B.Sc 3rd sem
  • 2. Content What is congestion? Traffic Shaping Congestion control algorithms Choke Packet
  • 3. What is congestion? A state occurring in network layer when the message traffic is so heavy that it slows down network response time. Effects of Congestion As delay increases, performance decreases. If delay increases, retransmission occurs, making situation worse.
  • 4. Traffic Shaping A network traffic management technique. Traffic shaping is used to control bandwidth of the network to ensure quality of service to business-critical applications This technique uses parameters to shape the flow of network traffic : I. Average bandwidth II. Peak bandwidth
  • 5. Average Bandwidth : It is configured to set permitted bits per second across a port group level or a virtual/distributed virtual switch, over time. The rate of data transfer is permitted over time. Peak bandwidth : It decides maximum number of bits per second permitted across a port group level or a virtual/distributed virtual switch without discarding or queuing the frames.
  • 7. Congestion control algorithms 1.Leaky Bucket Algorithm 2.Token bucket Algorithm
  • 8. Imagine a bucket with a small hole in the bottom.No matter at what rate water enters the bucket, the outflow is at constant rate.When the bucket is full with water additional water entering spills over the sides and is lost. Leaky Bucket Algorithm
  • 9. The leaky bucket algorithm enforces output pattern at the average rate, no matter how bursty the traffic is. So in order to deal with the bursty traffic we need a flexible algorithm so that the data is not lost. One such algorithm is token bucket algorithm. Token bucket Algorithm
  • 12. Formula: M * s = C + ρ * s where S – is time taken M – Maximum output rate ρ – Token arrival rate C – Capacity of the token bucket in byte
  • 13. Choke Packet A choke packet is used in network maintenance and quality management to inform a specific node or transmitter that its transmitted traffic is creating congestion over the network. This forces the node or transmitter to reduce its output rate. Choke packets are used for congestion and flow control over a network. The source node is addressed directly by the router, forcing it to decrease its sending rate .The source node acknowledges this by reducing the sending rate by some percentage.