Preview

Tcp Congestion Control

Better Essays
Open Document
Open Document
4150 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Tcp Congestion Control
TCP Congestion Control
Taoufik#1, Kamrul#2, Rifat#3
#EECS Department North South University
1taoufikul_islam@yahoo.com
2khshouharda@yahoo.com
3adnan_fazal18@yahoo.com

Abstract
Considerable interest has arisen in congestion control through traffic engineering. The goal of congestion control is to avoid congestion in network elements. A network element is congested if it is being offered more traffic than it can process. To detect such situations and to neutralize them we should monitor traffic in the network. This report focuses on the congestion control in the network. It explains congestion control in TCP. How congestion occurs and different measures adopted to remove congestion are highlighted here.

Keywords
Data, Data Traffic, Network Congestion, Congestion control, Congestion control categories and Mechanism, Congestion control in TCP. * * * 1. INTRODUCTION * As the days are going forward, the necessity and involvement to network are increasing at an exponential rate. With the increment of user, development in this field is necessary. Communication over internet is nothing but transferring of data from one user to other user or we can say from one end system to other end system. There are two basic types of methodology used for data transferring, circuit switching and packet switching. Modern networks are basically a hybrid of both of them. In the packet switched network the original data is divided into small packets and sent over the net to ensure the maximum use of the network resources. These packets travel the whole network with the help of the intermediate routers that is the network switches and reaches the destination end system by a complex procedure. In the intermediate routers all the packets are first stored, queued and then forwarded to the outgoing link. Here very often it happens that due to various causes all the packets arriving at the router cannot be stored and forwarded to the client. As a result congestion



References: 1. Wikipedia, www.wikipedia.com 2. Behrouz A Forouzan; Data communication and Networking, 4th. 3. Maxim A. Kolosovskiy, Elena N. Kryuchkova; Network congestion control using Net Flow. 4. Liu Pingping, Zhou Lianying; The Research Of Adaptive Network Congestion Control Algorithm Based On AQM. 5. Felicia M Holnes; Congestion Control Mechanism within MPLS networks. 6. James F Kurose, Keith W Ross; Computer Networking A top down approach 4th.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    2) The 2 methods of packet switching are firstly Datagram approach and secondly Virtual circuit approach…

    • 573 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Singh, R. K. & Ramajujam, T. (2009). “New Model of Network-A-Future Aspect of the Computer Networks: Journal of Computing, Vol. 1, Issue 1, ISSN: 2151-9617.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 5 Algorithm

    • 454 Words
    • 2 Pages

    The need for computers of networks with guaranteed quality of service is widely recognized today. Unlike todays best effort networks like the Internet, where the user has no guarantee on the performing it may expect from the network, Quality of service networks guarantee the end user application a certain level of performance. Jitter measures the fluctuating of delay of packets in the given stream for packets, which is an important property for much application. Ideally, packets should be delivered in a completely periodic fashion; however, even if the source establish an evenly spaced stream, unavoidable jitter is displayed by the network due to the different queuing and propagation delays, and packets reach the destination with a wide range of inter-arrival times[36]. We need to achievement the QoS with the best performance thus the suggestion to combine two algorithms, the first algorithm simple switching spanning tree, and second algorithm multipath and must be using the Queue to set in switching. The first method design to learning the all switches about the location of the host in switch and then avoid any loop by using some codes, and second method design to send the packets to all path to decrease the…

    • 454 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The 5-layer model serves essentially the protocols regarded as Transmission Control Protocol (TCP) as well as Internet Protocol (IP), or mutually, TCP/IP. The User Datagram Protocol (UDP) is likewise served by this particular model. The 5-layer model was produced alongside with these protocols, anteceding the 7-layer model, and is from time to time known as the TCP Model.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1210 Lab 3.1 Review

    • 505 Words
    • 3 Pages

    What is the history of the TCP/IP model? Why was it created? Use your textbook and Internet research to support your answer.…

    • 505 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 5 Lab 1 Answers

    • 4778 Words
    • 20 Pages

    Internetworking Basics Internetworking Models The OSI Reference Model Summary Exam Essentials Written Labs Review Questions Answers to Review Questions Answers to Written Lab 1.1 Answers to Written Lab 1.2 Answers to Written Lab 1.3…

    • 4778 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Essay

    • 443 Words
    • 2 Pages

    TCP – TCP stands for “transmission control protocol” and it is the pieces that manages all movement of each data packet between computers. It establishes a connection between the computers. It also acknowledges that each packet have been…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Message timing involves several rules of engagement. Access Method determines when two hosts can know when to begin sending messages and how to respond when errors occur. Flow control is used to manage how much data and the speed at which the data is transferred, allowing source and destination hosts to negotiate correct timing for successful communication. Hosts on the network also have defined Response Timeout rules specifying how long to wait for responses and what action to take if a response timeout occurs.…

    • 538 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computers use network protocols to communicate with computer network there are many network protocols as Hallberg (2005, p92) said “for example, transmission control protocols/internet protocols (TCP/IP) defines a set of rules used to send data from one node on a network to another node”.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Better Essays

    References: Comer, D. E. (2009, 2009,2004,2001,1999,1997). Computer Networks And Internets (5th ed.). Upper Saddle River, New Jersey: Pearson Education, Inc.…

    • 1195 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Stallings, W. (1998). High speed networks. TCP/IP and ATM Design Principles, Upper SaddleRiver, NJ, PrenticeHall, Inc.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Final Paper Introduction

    • 578 Words
    • 2 Pages

    First invented in the 1950s by the United State Military during the Cold War, the dynamics of the Internet have gone through a complete transformation. The World Wide Web combined with modern day technology including smart phones, tablet, and laptops, every corner in the globe is open for instant communication. Moreover, combine the ease of use with the…

    • 578 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Hacking2E Lab07 AW

    • 330 Words
    • 2 Pages

    1. Both Wireshark and NetWitness Investigator can be used for packet capture and analysis. Which…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    notNow

    • 6442 Words
    • 26 Pages

    Understanding Congestion and SCTP Multihoming with Cisco ITP and Mobile Vendor MSC Troubleshooting Guide July 20, 2009 Troubleshooting Guide Contents 1. Congestion Problem Analysis ................................................................................................................................ 3 1.1 Congestion Problem ........................................................................................................................................... 3 1.2 Congestion Analysis ........................................................................................................................................... 5 2. Congestion Action Plan .......................................................................................................................................... 8 Step 1. Understanding the Congestion Reaction in MSC..............................................................................…

    • 6442 Words
    • 26 Pages
    Powerful Essays