Escolar Documentos
Profissional Documentos
Cultura Documentos
Control
1
Congestion
• Congestion : two or more nodes would
simultaneously try to transmit packets
to one node, there is a high probability
that the number of packets would
exceed the packet handling Capacity of
network
3
Causes of Congestion
• Finite queue Length.
• Slow processor speed.
• Limited bandwidth.
• Limitation of Link capability.
• Non-uniformity of arrival of packets.
4
Principles of Congestion Control
• Open Loop
• Attempt to solve the problem by good
design but does not works at run time.
• Closed Loop
• Based on the principle of feedback loop.
Monitor the system to detect when and
where the congestion occurs, adjust the
system operation to correct the
problem.
5
Congestion Control Methods
1. Warning Bit
2. Choke packets
3. Load Shedding
4. Jitter control
5. Overprovision
6. Buffering
7. Traffic Shaping
8. Resource Allocation
9. Packet Scheduling
6
1. Warning Bit
• Special bit in the packet header is set by
the router to warn the source when the
congestion is detected.
8
2. Choke Packets
9
3. Load Shedding
• Random Early Detection (RED) is a
proactive approach in which router
discards packets before the buffer
becomes completely full.
11
4. Jitter Control
• Jitter is a variation in delay for packets
belonging to the same flow.
13
Methods
• Overprovision
• Buffering
• Traffic Shaping
• Leaky Bucket Algorithm
• Token Bucket Algorithm
• Resource Reservation
• Packet Scheduling
14
5. Overprovision
• Over provisioning of
• Router capacity
• Buffer space
• Bandwidth.
• Very Expensive
15
6. Buffering
• Two algorithms
• Leaky Bucket Algorithm
• Token Bucket Algorithm
17
7A. Leaky Bucket Algorithm
18
7B. Token Bucket Algorithm
19
Difference
• LB discards packets while TB discards
tokens.
21
9. Packet Scheduling
22
Firewall
23
Firewall
• Packet Filter
• Application Level Firewalls
• Circuit Level Firewalls
24
Firewall
• A firewall examines all traffic routed
between the two networks to see if it
meets certain criteria (as defined by local
security policy). If it does, it is routed
between the networks otherwise it is
blocked.
27
1. Packet Filters
• Each packet is compared to a set of
criteria before it if forwarded. Criteria
includes Source and destination IP
address, port numbers and protocol used
and TCP ACK flag.
28
1. Packet Filters
• Router with packet filtering capability is
called as Screening Router.
29
1. Packet Filters
• Advantages
• Low cost
• Low impact on network performance.
• Disadvantages
• They cannot hide the network topology.
• Can not support all Internet applications.
• Vulnerable to attacks at protocol higher
than the network layer protocol.
30
2. Application level Firewalls
• These are also known as proxies and they
are application specific. They can filter the
packets at the application layer.
31
2. Application level firewalls
• When the user responds and provides a valid
user ID and authentication information, the
gateways contacts the application on the
remote host and relays TCP segments
containing the application data between two
endpoints.
32
3. Circuit level firewalls
• They works at the session layer.
Information passed to the remote
computer through a circuit level gateway
appears to have originated from the
gateway.
33