SlideShare a Scribd company logo
Congestion Avoidance
Congestion Avoidance Mechanism
• Congestion control - once congestion happens, TCP will
control the congestion.
– TCP repeatedly increases the load it imposes on the network in
an effort to find the point at which congestion occurs, and then it
backs off from this point.
• Congestion Avoidance - to predict when congestion is about
to happen and then to reduce the rate at which hosts send data
just before packets start being discarded. But it is not yet
widely used.
• Three Methods,
– DEC bit
– Random Early Detection (RED)
– Source Based Congestion Control
Congestion Avoidance Mechanism
DEC Bit
– The first mechanism was developed for use on the Digital
Network Architecture (DNA), a connectionless network with a
connection-oriented transport protocol.
– This mechanism could, therefore, also be applied to TCP and
IP.
– The idea here is to more evenly split the responsibility for
congestion control between the routers and the end nodes.
– Each router monitors the load it is experiencing and explicitly
notifies the end nodes when congestion is about to occur.
– This notification is implemented by setting a binary congestion
bit in the packets that flow through the router; hence the
name DECbit.
Congestion Avoidance Mechanism
– The destination host then copies this congestion bit into
the ACK and it sends back to the source.
– Finally, the source adjusts its sending rate so as to avoid
congestion.
– A single congestion bit is added to the packet header.
• A router sets this bit in a packet if its average queue length is
greater than or equal to 1 at the time the packet arrives.
– This average queue length is measured over a time interval
that spans the last busy + idle cycle, plus the current busy
cycle.
– Using a queue length of 1 as the trigger for setting the
congestion bit is a trade-off between significant queuing
(and hence higher throughput) and increased idle time
(and hence lower delay).

Recommended for you

distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory

Distributed shared memory (DSM) provides processes with a shared address space across distributed memory systems. DSM exists only virtually through primitives like read and write operations. It gives the illusion of physically shared memory while allowing loosely coupled distributed systems to share memory. DSM refers to applying this shared memory paradigm using distributed memory systems connected by a communication network. Each node has CPUs, memory, and blocks of shared memory can be cached locally but migrated on demand between nodes to maintain consistency.

Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction

The document discusses error detection and correction techniques used in data communication. It describes different types of errors like single bit errors and burst errors. It then explains various error detection techniques like vertical redundancy check (VRC), longitudinal redundancy check (LRC), and cyclic redundancy check (CRC). VRC adds a parity bit, LRC calculates parity bits for each column, and CRC uses a generator polynomial to calculate redundant bits. The document also discusses Hamming code, an error correcting code that uses redundant bits to detect and correct single bit errors.

error correctionerror detection
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS

The document discusses data link layer framing and protocols. It describes: 1) Two main approaches to framing - byte-oriented (using sentinel characters) and bit-oriented (using bit stuffing). Protocols discussed include BISYNC, DDCMP, and HDLC. 2) Features of PPP framing including negotiated field sizes and use of LCP control messages. 3) Functions of data link layer including framing, flow control, error control, and media access control. The relationship between the logical link control and media access control sublayers is also covered.

computer networksunit iiunit 2
Congestion Avoidance Mechanism
– In other words, a queue length of 1 seems to optimize the
power function.
– The source records how many of its packets resulted in
some router setting the congestion bit.
– In particular, the source maintains a congestion window,
just as in TCP, and watches to see what fraction of the last
window’s worth of packets resulted in the bit being set.
– If less than 50% of the packets had the bit set, then the
source increases its congestion window by one packet.
– If 50% or more of the last window’s worth of packets had
the congestion bit set, then the source decreases its
congestion window to 0.875 times the previous value.
Congestion Avoidance Mechanism
– The value 50% was chosen as the threshold based on
analysis that showed it to correspond to the peak of the
power curve. The “increase by 1, decrease by 0.875” rule
was selected because additive increase/multiplicative
decrease makes the mechanism stable.
Computing average queue length at a
router
Congestion Avoidance Mechanism
Random Early Detection (RED)
– It is similar to the DECbit scheme in that each router is
programmed to monitor its own queue length, and when it
detects that congestion is imminent, to notify the source to
adjust its congestion window.
– RED, invented by Sally Floyd and Van Jacobson in the early
1990s, differs from the DECbit scheme in two major ways:
• The first is that rather than explicitly sending a congestion
notification message to the source, RED is most commonly
implemented such that it implicitly notifies the source of
congestion by dropping one of its packets.
– The source is, therefore, effectively notified by the subsequent
timeout or duplicate ACK.
– RED is designed to be used in conjunction with TCP, which
currently detects congestion by means of timeouts (or some other
means of detecting packet loss such as duplicate ACKs).
Congestion Avoidance Mechanism
– As the “early” part of the RED acronym suggests, the gateway
drops the packet earlier than it would have to, so as to notify the
source that it should decrease its congestion window sooner than
it would normally have.
– In other words, the router drops a few packets before it has
exhausted its buffer space completely, so as to cause the source to
slow down, with the hope that this will mean it does not have to
drop lots of packets later on.

Recommended for you

Mac protocols
Mac protocolsMac protocols
Mac protocols

This document discusses medium access control (MAC) protocols, which regulate access to a shared wireless medium between nodes. It covers key requirements for MAC protocols including throughput efficiency, fairness, and low overhead. It also describes challenges like the hidden terminal problem, exposed terminal problem, and sources of overhead from collisions, overhearing, and idle listening. Finally, it categorizes common MAC protocols as fixed assignment, demand assignment, and random access and notes additional energy conservation requirements for wireless sensor networks.

TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model

The document discusses the TCP/IP protocol suite and compares it to the OSI model. It describes the layers of the TCP/IP model including the physical, data link, internet, and transport layers. The transport layer uses TCP and UDP, with TCP being connection-oriented and reliable, while UDP is connectionless. The internet layer uses IP to transport datagrams independently. The OSI model has 7 layers while TCP/IP has 5 layers that do not directly correspond to the OSI layers.

networkingcomputernotes
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy

Pgp-Pretty Good Privacy is the open source freely available tool to encrypt your emails then you can very securely send mails to others over internet without fear of eavesdropping by cryptanalyst.

e-mail securitypgp
Congestion Avoidance Mechanism
• The second difference between RED and DECbit is, how RED
decides when to drop a packet and what packet it decides to
drop.
– To understand the basic idea, consider a simple FIFO queue.
Rather than wait for the queue to become completely full and
then be forced to drop each arriving packet, we could decide
to drop each arriving packet with some drop probability
whenever the queue length exceeds some drop level.
– This idea is called early random drop. The RED algorithm
defines the details of how to monitor the queue length and
when to drop a packet.
Average Queue Length Calculation:
– Average queue length is calculated using weighted running
average similar to the one used in the original TCP timeout
computation.
Congestion Avoidance Mechanism
• AvgLen = (1 − Weight) × AvgLen + Weight × SampleLen
• where 0 < Weight < 1 and SampleLen is the length of the
queue when a sample measurement is made.
– In most software implementations, the queue length is
measured every time a new packet arrives at the gateway.
– In hardware, it might be calculated at some fixed sampling
interval.
– RED has two queue length thresholds that trigger certain
activity: MinThreshold and MaxThreshold.
– When a packet arrives at the gateway, RED compares the
current AvgLen with these two thresholds, according to
the following rules:
Congestion Avoidance Mechanism
if AvgLen  MinThreshold
 queue the packet
if MinThreshold < AvgLen < MaxThreshold
 calculate probability P
 drop the arriving packet with probability P
if MaxThreshold  AvgLen
drop the arriving packet
– P is a function of both AvgLen and how long it has been
since the last packet was dropped.
– Specifically, it is computed as follows:
• TempP = MaxP × (AvgLen − MinThreshold)/(MaxThreshold −
MinThreshold)
• P = TempP/(1 − count × TempP)
Congestion Avoidance Mechanism
• Random Early Detection (RED)
RED thresholds on a FIFO queue

Recommended for you

Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization

Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. The three channelization protocols are FDMA, TDMA, and CDMA

computernetworkeducation
Cloud computing protocol
Cloud computing protocolCloud computing protocol
Cloud computing protocol

This document discusses cloud computing protocols. It begins by defining cloud computing as using remote servers over the internet to store and access data and applications. The cloud is broken into three categories: applications, storage, and connectivity. Protocols are then defined as sets of rules that allow electronic devices to connect and exchange information. Ten specific protocols are described: Gossip protocol for failure detection and messaging; Connectionless network protocol for fragmentation; State routing protocol for path selection; Internet group management protocol for multicasting; Secure shell protocol for secure remote login; Coverage enhanced ethernet protocol for network traffic handling; Extensible messaging and presence protocol for publish/subscribe systems; Advanced message queuing protocol for point-to-point messaging; Enhanced interior

Osi model
Osi modelOsi model
Osi model

The document discusses network models including the OSI model and TCP/IP model. It describes the seven layers of the OSI model and the functions of each layer. It also discusses the four layers of the TCP/IP model and compares the two models, noting they are similar in concept but differ in number of layers and how protocols fit within each model.

Congestion Avoidance Mechanism
Source-based Congestion Avoidance
– The general idea of these techniques is to watch for some
sign from the network that some router’s queue is building
up and that congestion will happen soon if nothing is done
about it.
– For example, the source might notice that as packet queues
build up in the network’s routers, there is a measurable
increase in the RTT for each successive packet it sends.
– One particular algorithm exploits this observation as follows:
• The congestion window normally increases as in TCP, but every
two round-trip delays the algorithm checks to see if the
current RTT is greater than the average of the minimum and
maximum RTTs seen so far.
• If it is, then the algorithm decreases the congestion window
by one-eighth.
Congestion Avoidance Mechanism
• Source-based Congestion Avoidance
– A second algorithm does something similar. The decision as to
whether or not to change the current window size is based on
changes to both the RTT and the window size.
– The window is adjusted once every two round-trip delays
based on the product
• (CurrentWindow − OldWindow)×(CurrentRTT − OldRTT)
• If the result is positive, the source decreases the window size by
one-eighth;
• if the result is negative or 0, the source increases the window by
one maximum packet size.

More Related Content

What's hot

ELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOL
Shashank Rustagi
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
extraganesh
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
G Prachi
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
Ashish Kumar
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
Renu Kewalramani
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Dr. SELVAGANESAN S
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
Mukesh Tekwani
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
Elambaruthi Elambaruthi
 
Cloud computing protocol
Cloud computing protocolCloud computing protocol
Cloud computing protocol
Kartik Kalpande Patil
 
Osi model
Osi modelOsi model
Osi model
Priyanka Sharma
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
Tushar Ranjan
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
Alagappa Govt Arts College, Karaikudi
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
Shehara Abeythunga
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
Riya Choudhary
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
JUW Jinnah University for Women
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
Mshari Alabdulkarim
 

What's hot (20)

ELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOLELEMENTS OF TRANSPORT PROTOCOL
ELEMENTS OF TRANSPORT PROTOCOL
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Computer networks - Channelization
Computer networks - ChannelizationComputer networks - Channelization
Computer networks - Channelization
 
Cloud computing protocol
Cloud computing protocolCloud computing protocol
Cloud computing protocol
 
Osi model
Osi modelOsi model
Osi model
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
Message passing in Distributed Computing Systems
Message passing in Distributed Computing SystemsMessage passing in Distributed Computing Systems
Message passing in Distributed Computing Systems
 
Sliding window protocol
Sliding window protocolSliding window protocol
Sliding window protocol
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 

Viewers also liked

Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
Ram Dutt Shukla
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcp
samarai_apoc
 
TCP congestion control
TCP congestion controlTCP congestion control
TCP congestion control
Shubham Jain
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
Ram Dutt Shukla
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
Naveen Dubey
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
Vimal Dewangan
 
Congestion control
Congestion controlCongestion control
Congestion control
Krishna Ranjan
 
Tcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identificationTcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identification
Bala Lavanya
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networks
rapatil
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
Umesh Gupta
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
Disi Dc
 
Lecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceLecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and Avoidance
Wei Tsang Ooi
 
Congestion control
Congestion controlCongestion control
Congestion control
Abhay Pai
 
Icfcc conference real
Icfcc conference realIcfcc conference real
Icfcc conference real
UM
 
CS5229 Lecture 3: Congestion Avoidance and Control
CS5229 Lecture 3: Congestion Avoidance and ControlCS5229 Lecture 3: Congestion Avoidance and Control
CS5229 Lecture 3: Congestion Avoidance and Control
Wei Tsang Ooi
 
Adoptive retransmission in TCP
Adoptive retransmission in TCPAdoptive retransmission in TCP
Adoptive retransmission in TCP
selvakumar_b1985
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
Syed Shaheer Gilani
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
anuragjagetiya
 
Retransmission Tcp
Retransmission TcpRetransmission Tcp
Retransmission Tcp
Ram Dutt Shukla
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
sanjoysanyal
 

Viewers also liked (20)

Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcp
 
TCP congestion control
TCP congestion controlTCP congestion control
TCP congestion control
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
Leaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shapingLeaky Bucket & Tocken Bucket - Traffic shaping
Leaky Bucket & Tocken Bucket - Traffic shaping
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Tcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identificationTcp congestion avoidance algorithm identification
Tcp congestion avoidance algorithm identification
 
Congestion Control in Networks
Congestion Control in NetworksCongestion Control in Networks
Congestion Control in Networks
 
Leaky bucket algorithm
Leaky bucket algorithmLeaky bucket algorithm
Leaky bucket algorithm
 
Congestion on computer network
Congestion on computer networkCongestion on computer network
Congestion on computer network
 
Lecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceLecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and Avoidance
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Icfcc conference real
Icfcc conference realIcfcc conference real
Icfcc conference real
 
CS5229 Lecture 3: Congestion Avoidance and Control
CS5229 Lecture 3: Congestion Avoidance and ControlCS5229 Lecture 3: Congestion Avoidance and Control
CS5229 Lecture 3: Congestion Avoidance and Control
 
Adoptive retransmission in TCP
Adoptive retransmission in TCPAdoptive retransmission in TCP
Adoptive retransmission in TCP
 
Leaky bucket A
Leaky bucket ALeaky bucket A
Leaky bucket A
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
 
Retransmission Tcp
Retransmission TcpRetransmission Tcp
Retransmission Tcp
 
TCP/IP Basics
TCP/IP BasicsTCP/IP Basics
TCP/IP Basics
 

Similar to Congestion avoidance in TCP

NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
optokunal1
 
TCP Theory
TCP TheoryTCP Theory
TCP Theory
soohyunc
 
Conjestion control
Conjestion controlConjestion control
Conjestion control
Barani Tharan
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
selvakumar_b1985
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 
Tcp(no ip) review part2
Tcp(no ip) review part2Tcp(no ip) review part2
Tcp(no ip) review part2
Diptanshu singh
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
IJLT EMAS
 
Computer network (18)
Computer network (18)Computer network (18)
Computer network (18)
NYversity
 
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
IEEEFINALSEMSTUDENTSPROJECTS
 
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHMRED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
Editor IJCATR
 
Congestion control
Congestion controlCongestion control
Congestion control
Madhusudhan G
 
Mcseminar
McseminarMcseminar
Mcseminar
Ankit Anand
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET Journal
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
ijcseit
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...
ijcseit
 
Tcp congestion avoidance
Tcp congestion avoidanceTcp congestion avoidance
Tcp congestion avoidance
Ahmed Kamel Taha
 
Tieu luan qo s
Tieu luan qo sTieu luan qo s
Tieu luan qo s
Trường Sơn Trần
 
tcp congestion .pptx
tcp congestion .pptxtcp congestion .pptx
tcp congestion .pptx
ECE01AJAYS
 
Congestion Control: A Dynamic Approach
Congestion Control: A Dynamic ApproachCongestion Control: A Dynamic Approach
Congestion Control: A Dynamic Approach
IOSR Journals
 

Similar to Congestion avoidance in TCP (20)

NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdfNetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
NetWork Design Question2.) How does TCP prevent Congestion Dicuss.pdf
 
TCP Theory
TCP TheoryTCP Theory
TCP Theory
 
Conjestion control
Conjestion controlConjestion control
Conjestion control
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Tcp(no ip) review part2
Tcp(no ip) review part2Tcp(no ip) review part2
Tcp(no ip) review part2
 
Analytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum ThroughputAnalytical Research of TCP Variants in Terms of Maximum Throughput
Analytical Research of TCP Variants in Terms of Maximum Throughput
 
Computer network (18)
Computer network (18)Computer network (18)
Computer network (18)
 
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
 
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
 
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHMRED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Mcseminar
McseminarMcseminar
Mcseminar
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...
 
Tcp congestion avoidance
Tcp congestion avoidanceTcp congestion avoidance
Tcp congestion avoidance
 
Tieu luan qo s
Tieu luan qo sTieu luan qo s
Tieu luan qo s
 
tcp congestion .pptx
tcp congestion .pptxtcp congestion .pptx
tcp congestion .pptx
 
Congestion Control: A Dynamic Approach
Congestion Control: A Dynamic ApproachCongestion Control: A Dynamic Approach
Congestion Control: A Dynamic Approach
 

More from selvakumar_b1985

Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
selvakumar_b1985
 
Token ring
Token ringToken ring
Token ring
selvakumar_b1985
 
Subnetting
SubnettingSubnetting
Subnetting
selvakumar_b1985
 
Email Security
Email SecurityEmail Security
Email Security
selvakumar_b1985
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
selvakumar_b1985
 
Physical Mediums
Physical MediumsPhysical Mediums
Physical Mediums
selvakumar_b1985
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
selvakumar_b1985
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
selvakumar_b1985
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
selvakumar_b1985
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
selvakumar_b1985
 
ICMP
ICMPICMP
Hybrid Channel Access Link
Hybrid Channel Access LinkHybrid Channel Access Link
Hybrid Channel Access Link
selvakumar_b1985
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
selvakumar_b1985
 
Addressing Scheme IPv4
Addressing Scheme IPv4Addressing Scheme IPv4
Addressing Scheme IPv4
selvakumar_b1985
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
selvakumar_b1985
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
selvakumar_b1985
 
Flow Control
Flow ControlFlow Control
Flow Control
selvakumar_b1985
 
FDDI
FDDIFDDI
Ethernet
EthernetEthernet
Error control
Error controlError control
Error control
selvakumar_b1985
 

More from selvakumar_b1985 (20)

Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
Token ring
Token ringToken ring
Token ring
 
Subnetting
SubnettingSubnetting
Subnetting
 
Email Security
Email SecurityEmail Security
Email Security
 
RIP - Routing Information Protocol
RIP - Routing Information ProtocolRIP - Routing Information Protocol
RIP - Routing Information Protocol
 
Physical Mediums
Physical MediumsPhysical Mediums
Physical Mediums
 
OSPF - Routing Protocol
OSPF - Routing ProtocolOSPF - Routing Protocol
OSPF - Routing Protocol
 
Layering and Architecture
Layering and ArchitectureLayering and Architecture
Layering and Architecture
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
Internetworking - IP
Internetworking - IPInternetworking - IP
Internetworking - IP
 
ICMP
ICMPICMP
ICMP
 
Hybrid Channel Access Link
Hybrid Channel Access LinkHybrid Channel Access Link
Hybrid Channel Access Link
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Addressing Scheme IPv4
Addressing Scheme IPv4Addressing Scheme IPv4
Addressing Scheme IPv4
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Framing Protocols
Framing ProtocolsFraming Protocols
Framing Protocols
 
Flow Control
Flow ControlFlow Control
Flow Control
 
FDDI
FDDIFDDI
FDDI
 
Ethernet
EthernetEthernet
Ethernet
 
Error control
Error controlError control
Error control
 

Recently uploaded

Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf
Kamal Acharya
 
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-IDUNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
GOWSIKRAJA PALANISAMY
 
Rotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptxRotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptx
surekha1287
 
Vernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsxVernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsx
Tool and Die Tech
 
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeRohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
binna singh$A17
 
Press Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdfPress Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdf
Tool and Die Tech
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
Global Network for Zero
 
L-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptxL-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptx
naseki5964
 
Evento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recapEvento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recap
Rafael Santos
 
Unit 1 Information Storage and Retrieval
Unit 1 Information Storage and RetrievalUnit 1 Information Storage and Retrieval
Unit 1 Information Storage and Retrieval
KishorMahale5
 
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
Jim Mimlitz, P.E.
 
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
sanabts249
 
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
sharvaridhokte
 
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
Mani Krishna Sarkar
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
yadavsuyash008
 
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...
YanKing2
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
Muanisa Waras
 
IWISS Catalog 2024
IWISS Catalog 2024IWISS Catalog 2024
IWISS Catalog 2024
Iwiss Tools Co.,Ltd
 
Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
Kamal Acharya
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
Anwar Patel
 

Recently uploaded (20)

Online music portal management system project report.pdf
Online music portal management system project report.pdfOnline music portal management system project report.pdf
Online music portal management system project report.pdf
 
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-IDUNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
UNIT I INCEPTION OF INFORMATION DESIGN 20CDE09-ID
 
Rotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptxRotary Intersection in traffic engineering.pptx
Rotary Intersection in traffic engineering.pptx
 
Vernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsxVernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsx
 
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeRohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Rohini @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
 
Press Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdfPress Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdf
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
 
L-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptxL-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptx
 
Evento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recapEvento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recap
 
Unit 1 Information Storage and Retrieval
Unit 1 Information Storage and RetrievalUnit 1 Information Storage and Retrieval
Unit 1 Information Storage and Retrieval
 
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
SCADAmetrics Instrumentation for Sensus Water Meters - Core and Main Training...
 
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
21CV61- Module 3 (CONSTRUCTION MANAGEMENT AND ENTREPRENEURSHIP.pptx
 
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
 
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
1239_2.pdf IS CODE FOR GI PIPE FOR PROCUREMENT
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
 
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
 
IWISS Catalog 2024
IWISS Catalog 2024IWISS Catalog 2024
IWISS Catalog 2024
 
Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
 
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K SchemeMSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme MSBTE K Scheme
 

Congestion avoidance in TCP

  • 2. Congestion Avoidance Mechanism • Congestion control - once congestion happens, TCP will control the congestion. – TCP repeatedly increases the load it imposes on the network in an effort to find the point at which congestion occurs, and then it backs off from this point. • Congestion Avoidance - to predict when congestion is about to happen and then to reduce the rate at which hosts send data just before packets start being discarded. But it is not yet widely used. • Three Methods, – DEC bit – Random Early Detection (RED) – Source Based Congestion Control
  • 3. Congestion Avoidance Mechanism DEC Bit – The first mechanism was developed for use on the Digital Network Architecture (DNA), a connectionless network with a connection-oriented transport protocol. – This mechanism could, therefore, also be applied to TCP and IP. – The idea here is to more evenly split the responsibility for congestion control between the routers and the end nodes. – Each router monitors the load it is experiencing and explicitly notifies the end nodes when congestion is about to occur. – This notification is implemented by setting a binary congestion bit in the packets that flow through the router; hence the name DECbit.
  • 4. Congestion Avoidance Mechanism – The destination host then copies this congestion bit into the ACK and it sends back to the source. – Finally, the source adjusts its sending rate so as to avoid congestion. – A single congestion bit is added to the packet header. • A router sets this bit in a packet if its average queue length is greater than or equal to 1 at the time the packet arrives. – This average queue length is measured over a time interval that spans the last busy + idle cycle, plus the current busy cycle. – Using a queue length of 1 as the trigger for setting the congestion bit is a trade-off between significant queuing (and hence higher throughput) and increased idle time (and hence lower delay).
  • 5. Congestion Avoidance Mechanism – In other words, a queue length of 1 seems to optimize the power function. – The source records how many of its packets resulted in some router setting the congestion bit. – In particular, the source maintains a congestion window, just as in TCP, and watches to see what fraction of the last window’s worth of packets resulted in the bit being set. – If less than 50% of the packets had the bit set, then the source increases its congestion window by one packet. – If 50% or more of the last window’s worth of packets had the congestion bit set, then the source decreases its congestion window to 0.875 times the previous value.
  • 6. Congestion Avoidance Mechanism – The value 50% was chosen as the threshold based on analysis that showed it to correspond to the peak of the power curve. The “increase by 1, decrease by 0.875” rule was selected because additive increase/multiplicative decrease makes the mechanism stable. Computing average queue length at a router
  • 7. Congestion Avoidance Mechanism Random Early Detection (RED) – It is similar to the DECbit scheme in that each router is programmed to monitor its own queue length, and when it detects that congestion is imminent, to notify the source to adjust its congestion window. – RED, invented by Sally Floyd and Van Jacobson in the early 1990s, differs from the DECbit scheme in two major ways: • The first is that rather than explicitly sending a congestion notification message to the source, RED is most commonly implemented such that it implicitly notifies the source of congestion by dropping one of its packets. – The source is, therefore, effectively notified by the subsequent timeout or duplicate ACK. – RED is designed to be used in conjunction with TCP, which currently detects congestion by means of timeouts (or some other means of detecting packet loss such as duplicate ACKs).
  • 8. Congestion Avoidance Mechanism – As the “early” part of the RED acronym suggests, the gateway drops the packet earlier than it would have to, so as to notify the source that it should decrease its congestion window sooner than it would normally have. – In other words, the router drops a few packets before it has exhausted its buffer space completely, so as to cause the source to slow down, with the hope that this will mean it does not have to drop lots of packets later on.
  • 9. Congestion Avoidance Mechanism • The second difference between RED and DECbit is, how RED decides when to drop a packet and what packet it decides to drop. – To understand the basic idea, consider a simple FIFO queue. Rather than wait for the queue to become completely full and then be forced to drop each arriving packet, we could decide to drop each arriving packet with some drop probability whenever the queue length exceeds some drop level. – This idea is called early random drop. The RED algorithm defines the details of how to monitor the queue length and when to drop a packet. Average Queue Length Calculation: – Average queue length is calculated using weighted running average similar to the one used in the original TCP timeout computation.
  • 10. Congestion Avoidance Mechanism • AvgLen = (1 − Weight) × AvgLen + Weight × SampleLen • where 0 < Weight < 1 and SampleLen is the length of the queue when a sample measurement is made. – In most software implementations, the queue length is measured every time a new packet arrives at the gateway. – In hardware, it might be calculated at some fixed sampling interval. – RED has two queue length thresholds that trigger certain activity: MinThreshold and MaxThreshold. – When a packet arrives at the gateway, RED compares the current AvgLen with these two thresholds, according to the following rules:
  • 11. Congestion Avoidance Mechanism if AvgLen  MinThreshold  queue the packet if MinThreshold < AvgLen < MaxThreshold  calculate probability P  drop the arriving packet with probability P if MaxThreshold  AvgLen drop the arriving packet – P is a function of both AvgLen and how long it has been since the last packet was dropped. – Specifically, it is computed as follows: • TempP = MaxP × (AvgLen − MinThreshold)/(MaxThreshold − MinThreshold) • P = TempP/(1 − count × TempP)
  • 12. Congestion Avoidance Mechanism • Random Early Detection (RED) RED thresholds on a FIFO queue
  • 13. Congestion Avoidance Mechanism Source-based Congestion Avoidance – The general idea of these techniques is to watch for some sign from the network that some router’s queue is building up and that congestion will happen soon if nothing is done about it. – For example, the source might notice that as packet queues build up in the network’s routers, there is a measurable increase in the RTT for each successive packet it sends. – One particular algorithm exploits this observation as follows: • The congestion window normally increases as in TCP, but every two round-trip delays the algorithm checks to see if the current RTT is greater than the average of the minimum and maximum RTTs seen so far. • If it is, then the algorithm decreases the congestion window by one-eighth.
  • 14. Congestion Avoidance Mechanism • Source-based Congestion Avoidance – A second algorithm does something similar. The decision as to whether or not to change the current window size is based on changes to both the RTT and the window size. – The window is adjusted once every two round-trip delays based on the product • (CurrentWindow − OldWindow)×(CurrentRTT − OldRTT) • If the result is positive, the source decreases the window size by one-eighth; • if the result is negative or 0, the source increases the window by one maximum packet size.