0% found this document useful (0 votes)
5 views3 pages

Congestion Control QA

Advance network for congestion control Questions and answers

Uploaded by

jacbuub
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views3 pages

Congestion Control QA

Advance network for congestion control Questions and answers

Uploaded by

jacbuub
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Q&A on Congestion Control and Resource Allocation

Prepared by: Maaka

Q1. What is the primary problem addressed in congestion control and resource allocation?

A: The main problem is how to effectively and fairly allocate resources (such as bandwidth and

router buffers) among competing users in a network to prevent congestion.

Q2. What resources do packets contend for in a network?

A: Packets contend for:

- Bandwidth of the links.

- Buffer space at routers and switches.

Q3. What happens when too many packets contend for the same link?

A: When too many packets contend for a link:

1. The queue overflows.

2. Packets get dropped.

3. The network becomes congested.

Q4. How are congestion control and resource allocation related?

A: They are two sides of the same coin:

- Resource allocation aims to proactively avoid congestion by limiting how much data sources send.

- Congestion control reacts to congestion by managing and reducing the load.

Q5. What are the approaches to resource allocation?

A: 1. Router-Centric vs. Host-Centric:

- Router-centric: Routers decide packet forwarding, dropping, and feedback.

- Host-centric: End hosts adjust their behavior based on network conditions.


2. Reservation-Based vs. Feedback-Based:

- Reservation-based: Hosts request network capacity in advance.

- Feedback-based: Hosts adjust based on explicit or implicit feedback.

3. Window-Based vs. Rate-Based:

- Window-based: Limits how much data is in transit by reserving buffer space.

- Rate-based: Controls sending speed in bits per second.

Q6. What are the common queuing disciplines used in routers?

A: 1. FIFO (First In, First Out): Packets are processed in arrival order. Excess packets are dropped

(tail drop).

2. Priority Queuing: Packets are categorized into priority levels and transmitted accordingly.

3. Fair Queuing: Maintains separate queues for flows and serves them in a round-robin manner.

Q7. What is TCP Congestion Control, and why is it important?

A: TCP Congestion Control determines the available capacity in the network, ensuring that sources

send data at safe rates to avoid congestion. It is critical for maintaining stability and preventing

congestion collapse.

Q8. What are the mechanisms of TCP congestion control?

A: 1. Additive Increase Multiplicative Decrease (AIMD):

- Increases the congestion window additively when the network is underutilized.

- Decreases it multiplicatively when congestion is detected.

2. Slow Start:

- Quickly ramps up the congestion window from a cold start using exponential growth.
3. Fast Retransmit and Fast Recovery:

- Reduces the waiting time for packet retransmission and eliminates the need for slow start after

packet loss.

Q9. How do congestion avoidance mechanisms work?

A: Congestion avoidance mechanisms predict and mitigate congestion before it occurs. Techniques

include:

1. DEC Bit: Routers notify end hosts of impending congestion via a congestion bit.

2. Random Early Detection (RED): Routers drop packets probabilistically when queue lengths

indicate congestion is imminent.

Q10. What metrics are used to evaluate resource allocation schemes?

A: 1. Throughput vs. Delay: Maximizing throughput while minimizing delay.

2. Fairness: Ensuring flows share bandwidth equitably.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy