SlideShare a Scribd company logo
3
Most read
8
Most read
9
Most read
Submitted By
Ujjwal matoliya
Assignment
computer network
What is congestion?
Traffic Shaping
Congestion control algorithms
Choke Packet
Content
What is congestion?
Traffic Shaping
Congestion control algorithms
Choke Packet
What is congestion?
A state occurring in network layer when the
message traffic is so heavy that it slows down
network response time.
Effects of Congestion
As delay increases, performance decreases.
If delay increases, retransmission occurs, making
situation worse.
Traffic Shaping
A network traffic management technique.
Traffic shaping is used to control bandwidth of
the network to ensure quality of service to
business-critical applications
This technique uses parameters to shape the flow of network traffic :
I. Average bandwidth
II. Peak bandwidth
Average Bandwidth :
It is configured to set permitted bits per second across a port group
level or a virtual/distributed virtual switch, over time. The rate of data
transfer is permitted over time.
Peak bandwidth :
It decides maximum number of bits per second permitted across a
port group level or a virtual/distributed virtual switch without
discarding or queuing the frames.
Time
Data
rate
Average Bandwidth
Peak bandwidth
Congestion control algorithms
1.Leaky Bucket Algorithm
2.Token bucket Algorithm
Imagine a bucket with a small hole in the bottom.No matter at
what rate water enters the bucket, the outflow is at constant
rate.When the bucket is full with water additional water entering
spills over the sides and is lost.
Leaky Bucket Algorithm
The leaky bucket algorithm enforces output pattern at the average
rate, no matter how bursty the traffic is. So in order to deal with the
bursty traffic we need a flexible algorithm so that the data is not lost.
One such algorithm is token bucket algorithm.
Token bucket Algorithm
0 2
10
mbps
0 1
5
mbps
Congestion control algorithms.pptx
Formula:
M * s = C + ρ * s
where S – is time taken
M – Maximum output rate
ρ – Token arrival rate
C – Capacity of the token bucket in
byte
Choke Packet
A choke packet is used in network maintenance and quality
management to inform a specific node or transmitter that its
transmitted traffic is creating congestion over the network.
This forces the node or transmitter to reduce its output rate.
Choke packets are used for congestion and flow control over a
network. The source node is addressed directly by the router,
forcing it to decrease its sending rate .The source node
acknowledges this by reducing the sending rate by some
percentage.
Congestion control algorithms.pptx
Congestion control algorithms.pptx

More Related Content

PPT
Fingerprint attendance system
PPT
OSI Model
PPTX
The-Evolving-Cybersecurity-Landscape.pptx
PPT
Pattern Recognition
PPTX
Network topology
PPTX
Language design and translation issues
PDF
Clustering
PDF
Principles of data visualisation 2021
Fingerprint attendance system
OSI Model
The-Evolving-Cybersecurity-Landscape.pptx
Pattern Recognition
Network topology
Language design and translation issues
Clustering
Principles of data visualisation 2021

What's hot (20)

PPTX
Presentation Routing algorithm
PPTX
Data link layer
PPTX
HDLC(High level Data Link Control)
PPTX
MEDIUM ACCESS CONTROL
PPTX
Flow control in Computer Network
PPTX
Ethernet Computer network
PPSX
Flow Control
PPTX
Routing algorithm
PPTX
Error detection and correction
PPTX
Multiple Access Protocal
PPTX
Point to-point protocol (ppp)
PPTX
Synchronous and Asynchronous Transmission
PPTX
Computer networks - Channelization
PPTX
Link state routing protocol
PPTX
Computer network switches & their structures
PPT
Chapter 4 data link layer
PPT
PPTX
HTTP & WWW
PPT
Transport services
PPTX
Ethernet - LAN
Presentation Routing algorithm
Data link layer
HDLC(High level Data Link Control)
MEDIUM ACCESS CONTROL
Flow control in Computer Network
Ethernet Computer network
Flow Control
Routing algorithm
Error detection and correction
Multiple Access Protocal
Point to-point protocol (ppp)
Synchronous and Asynchronous Transmission
Computer networks - Channelization
Link state routing protocol
Computer network switches & their structures
Chapter 4 data link layer
HTTP & WWW
Transport services
Ethernet - LAN
Ad

Similar to Congestion control algorithms.pptx (20)

PPTX
congestion ujjwal matoliya.pptx
PPTX
Conjestion control
PDF
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
PDF
Nigga.pdf
PDF
Congestion control mechanism using network border protocol
PPTX
Congestion control Assignment Help
PDF
Iaetsd an effective approach to eliminate tcp incast
PPT
congestion_control: types, uses and application
PPTX
Congestion Control
PPTX
Congestion control
PDF
Bg4101335337
PPTX
Leaky bucket A
PPTX
Quality of service
PDF
Congestion control 1
PPT
UNIT II tramission control
PDF
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
PDF
A packet drop guesser module for congestion Control protocols for high speed ...
PDF
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
PPT
Tcp Congestion Avoidance
PPT
Congetion Control.pptx
congestion ujjwal matoliya.pptx
Conjestion control
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
Nigga.pdf
Congestion control mechanism using network border protocol
Congestion control Assignment Help
Iaetsd an effective approach to eliminate tcp incast
congestion_control: types, uses and application
Congestion Control
Congestion control
Bg4101335337
Leaky bucket A
Quality of service
Congestion control 1
UNIT II tramission control
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless Networks
A packet drop guesser module for congestion Control protocols for high speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
Tcp Congestion Avoidance
Congetion Control.pptx
Ad

More from ujjwalmatoliya (19)

PPTX
kisan bill ujjwal matoliya.pptx
PPTX
Data Frames and Scatterplots in R language ujjwal matoliya.pptx
PPTX
Floyd’s and Warshal’s Algorithm ujjwal matoliya.pptx
PPTX
Global Attributes Window Event Attributes Form Events Ujjwal matoliya.pptx
PPTX
Instruction format UJJWAL MATOLIYA.pptx
PPTX
javascript function ujjwal matoliya.pptx
PPTX
string functions in SQL ujjwal matoliya.pptx
PPTX
jdbc Java Database Connectivity ujjwal matoliya jdbc.pptx
PPTX
compiler design ujjwal matoliya 2nd sem MCA.pptx
PPTX
3 address code ujjwal matoliya.pptx
PPTX
2-3 tree ujjwal matoliya .pptx
PPTX
Graph in Discrete mathemaetics.pptx
PPTX
Quick Sort in data structure.pptx
PPTX
Hadoop With R language.pptx
PPTX
LOGIC FAMILY.pptx
PPTX
Transaction.pptx
PPTX
cyclomatic complecity.pptx
PPTX
computer graphic.pptx
PPTX
Game playing With AI.pptx
kisan bill ujjwal matoliya.pptx
Data Frames and Scatterplots in R language ujjwal matoliya.pptx
Floyd’s and Warshal’s Algorithm ujjwal matoliya.pptx
Global Attributes Window Event Attributes Form Events Ujjwal matoliya.pptx
Instruction format UJJWAL MATOLIYA.pptx
javascript function ujjwal matoliya.pptx
string functions in SQL ujjwal matoliya.pptx
jdbc Java Database Connectivity ujjwal matoliya jdbc.pptx
compiler design ujjwal matoliya 2nd sem MCA.pptx
3 address code ujjwal matoliya.pptx
2-3 tree ujjwal matoliya .pptx
Graph in Discrete mathemaetics.pptx
Quick Sort in data structure.pptx
Hadoop With R language.pptx
LOGIC FAMILY.pptx
Transaction.pptx
cyclomatic complecity.pptx
computer graphic.pptx
Game playing With AI.pptx

Recently uploaded (20)

PPTX
Cell Types and Its function , kingdom of life
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Pharma ospi slides which help in ospi learning
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Lesson notes of climatology university.
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Basic Mud Logging Guide for educational purpose
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Classroom Observation Tools for Teachers
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Cell Types and Its function , kingdom of life
VCE English Exam - Section C Student Revision Booklet
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Final Presentation General Medicine 03-08-2024.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
Pharma ospi slides which help in ospi learning
Complications of Minimal Access Surgery at WLH
Lesson notes of climatology university.
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Computing-Curriculum for Schools in Ghana
2.FourierTransform-ShortQuestionswithAnswers.pdf
TR - Agricultural Crops Production NC III.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Basic Mud Logging Guide for educational purpose
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Classroom Observation Tools for Teachers
102 student loan defaulters named and shamed – Is someone you know on the list?
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx

Congestion control algorithms.pptx

  • 1. Submitted By Ujjwal matoliya Assignment computer network What is congestion? Traffic Shaping Congestion control algorithms Choke Packet
  • 2. Content What is congestion? Traffic Shaping Congestion control algorithms Choke Packet
  • 3. What is congestion? A state occurring in network layer when the message traffic is so heavy that it slows down network response time. Effects of Congestion As delay increases, performance decreases. If delay increases, retransmission occurs, making situation worse.
  • 4. Traffic Shaping A network traffic management technique. Traffic shaping is used to control bandwidth of the network to ensure quality of service to business-critical applications This technique uses parameters to shape the flow of network traffic : I. Average bandwidth II. Peak bandwidth
  • 5. Average Bandwidth : It is configured to set permitted bits per second across a port group level or a virtual/distributed virtual switch, over time. The rate of data transfer is permitted over time. Peak bandwidth : It decides maximum number of bits per second permitted across a port group level or a virtual/distributed virtual switch without discarding or queuing the frames.
  • 7. Congestion control algorithms 1.Leaky Bucket Algorithm 2.Token bucket Algorithm
  • 8. Imagine a bucket with a small hole in the bottom.No matter at what rate water enters the bucket, the outflow is at constant rate.When the bucket is full with water additional water entering spills over the sides and is lost. Leaky Bucket Algorithm
  • 9. The leaky bucket algorithm enforces output pattern at the average rate, no matter how bursty the traffic is. So in order to deal with the bursty traffic we need a flexible algorithm so that the data is not lost. One such algorithm is token bucket algorithm. Token bucket Algorithm
  • 12. Formula: M * s = C + ρ * s where S – is time taken M – Maximum output rate ρ – Token arrival rate C – Capacity of the token bucket in byte
  • 13. Choke Packet A choke packet is used in network maintenance and quality management to inform a specific node or transmitter that its transmitted traffic is creating congestion over the network. This forces the node or transmitter to reduce its output rate. Choke packets are used for congestion and flow control over a network. The source node is addressed directly by the router, forcing it to decrease its sending rate .The source node acknowledges this by reducing the sending rate by some percentage.