SlideShare a Scribd company logo
1 of 5
Download to read offline
ISSN: 2277 – 9043
        International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                       Volume 1, Issue 5, July 2012


      Performance analysis of networks using RED
                for congestion control
                               Ms. Banshri Raichana and Mrs. Sangeeta Kulkarni


                                                          RED monitors the average queue size and marks
  Abstract— Congestion avoidance techniques               packets. If the buffer is almost empty, all incoming
monitor network traffic load in an effort to              packets are accepted. As the queue grows, the
anticipate and avoid congestion at common                 probability for dropping an incoming packet grows
network bottlenecks. Congestion avoidance is              too. When the buffer is full, the probability has
achieved through packet dropping. Among the               reached 1 and all incoming packets are dropped. Thus
more commonly used congestion avoidance                   RED buffer mechanism with constant bit rate traffic
mechanisms is Random Early Detection (RED),               can be used at an initial stage to understand the
which is optimum for high-speed transit networks.         effect of change of network parameters over system
Random early detection (RED) is an active queue           performance.
management algorithm. It not only detects but
                                                          RED aims to control the average queue size by
also avoids congestion by randomly dropping
                                                          indicating to the end hosts when they should
packets to notify congestion. The main objective of
                                                          temporarily slow down transmission of packets.
this paper is to comprehend the working of RED
                                                          RED takes advantage of the congestion control
algorithm and to learn the effects of variation of
                                                          mechanism of TCP by randomly dropping packets
RED parameters. To improve the performance of
                                                          prior to periods of high congestion, RED tells the
a network in terms of drop count, efficiency,
                                                          packet source to decrease its transmission rate.
throughput and delay we can optimize our choice
                                                          Assuming the packet source is using TCP, it will
of these RED parameters.
                                                          decrease its transmission rate until all the packets
  Index Term - Congestion, Delay, Drop count, RED,        reach their destination, indicating that the congestion
RED parameters, Throughput,                               is cleared.

                 I.   INTRODUCTION                        The network designing and simulation here is
                                                          accomplished using NS2 (network simulator version
Congestion occurs when the resource demands
                                                          2). NS2 is an event-driven network simulator
exceed the network capacity. At some point of time
                                                          embedded into the Tool Command Language (Tcl).
network buffers go full and packets are dropped.
                                                          An extensible simulation engine which is
During congestion, the network throughput drops
                                                          implemented in C++ and is configured and controlled
whereas end to end delay increases. In order to
                                                          via a Tcl interface. A network topology is defined,
overcome this situation a congestion avoidance
                                                          traffic sources and sinks are configured, statistics are
scheme must be employed. One such method is
                                                          collected, and then simulation is invoked using the
Random Early Detection (RED).
                                                          'ns' command.
Random early detection (RED) is an active queue
                                                          In general, C++ is used for implementing protocols
management algorithm. It is also a congestion
                                                          and extending the ns-2 library. OTcl is used to create
avoidance algorithm. In the conventional tail drop
                                                          and control the simulation environment and also for
algorithm, a router or other network component
                                                          selection of output data. Simulation is run at the
buffers as many packets as it can, and simply drops
                                                          packet level, allowing visualization of detailed
the ones it cannot buffer. If buffers are constantly
                                                          results.
full, the network is congested. Tail drop distributes
buffer space unfairly among traffic flows. Tail drop      The network can be designed to implement
can also lead to TCP global synchronization as all        bottleneck and packet drop scenario. Using the
TCP connections "hold back" simultaneously, and           available tools of NS2 we can implement the network
then "step forward" simultaneously. Networks              congestion avoidance algorithm Random Early
become under-utilized and flooded by turns. RED           Detection (RED), then by varying the RED
addresses these issues.                                   parameters discussed in section II we can observe the
                                                          effect on network performance.



                                                                                                             109
                                     All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
        International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                       Volume 1, Issue 5, July 2012


           II. DESIGNING THE NETWORK                       wq the queue weight factor which is used in
                                                           computing the average queue size. maxp the
There are four basic steps to design and simulate any      maximum dropping probability.
network. First step is to develop a model
(implementation of a protocol); second step is to            The RED parameters set in our simulation were
create a simulation scenario (designing a network          minimum threshold to5 maximum threshold to 15
topology and traffic scenario); third step is to choose    maxp to 0.02 wq to 0.001 and queue size of 35.
and collect statistics through simulation, and finally
fourth step is to visualize simulation and analyze            III. RANDOM EARLY DETECTION ALGORITHM
simulation results using awk scripting language.
                                                              The most distinct factor of RED is that it does not
   As shown in Fig.1, a network with four nodes
                                                           operate on instantaneous queue size its functioning is
(Node0, Node1, Node2, Node3) has been designed.
                                                           based on average queue size. When a packet arrives
Node 0 and Node1 are sources with FTP aggents
                                                           at the RED gateway it calculates the average queue
attached over TCP. Node 3 is the sink for both the
                                                           size, using a low-pass filter with an exponential
source nodes. A link with appropriate link type, link
                                                           weighted moving average which is given by:
capcity, buffer mechanism is to be defined between
these nodes. In this network, a bottleneck between
                                                                            avg = avg + wq(q-avg)
node2 and node3 is defined with RED as the buffer
mangement scheme so that we can simulate packet
                                                               The average queue size is compared to two
loss and measure overall network perfomance, while
                                                           thresholds, a minimum threshold and a maximum
link between node0 and node2 and between node1
                                                           threshold. When the average queue size is less than
and node2 would have be droptail mechnaism. The
                                                           the minimum threshold, no packets are marked they
simulation time is kept large enough to demonstrate
                                                           are enqued into the buffer. When the average queue
congestion behaviour.
                                                           size is greater than the maximum threshold, every
                                                           arriving packet is marked and discarded. If marked
                                                           packets are in fact dropped, or if all source nodes are
                                                           cooperative, this ensures that ensures that the average
                                                           queue size does not significantly exceed the
                                                           maximum threshold.
                                                              When the average queue size is between minimum
                                                           threshold and maximum threshold, each arriving
                                                           packet is marked with the probability which is a
                                                           function of average queue size avg. The initial
                                                           packet-marking probability pb is given as:

                                                                                pb = C1avg - C2

                                                                                  C1 = maxp
                                                                                     maxth-minth

                                                                              C1 = maxp* minth
                                                                                   maxth-minth

                                                              The parameters like minth and maxth are user
       Fig1. Network simulation window in NS2              defined in the tcl file. While maxp and wq are
                                                           constants which can be defined in tcl or their default
  In order to perfectly understand the RED algorithm       values are taken from ns-default.tcl. After calculating
we must be introduced to the basic RED parameters          the packet drop probability, the RED gateways use
 The minimum queue threshold minth below which no          randomization in choosing which arriving packets to
packets are dropped, maximum queue threshold               mark with this method, the probability of marking a
maxth above which all incoming packets are dropped,,       packet from a particular connection is roughly
                                                           proportional to that connection’s share of the


                                                                                                             110
                                      All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
        International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                       Volume 1, Issue 5, July 2012


bandwidth through the gateway. In order to do             A low minimum threshold achieves high efficiency.
analysis awk files for delay and efficiency have been     But a very low minimum threshold would result in
designed to calculate the same and verify the drop        under utilization of link and buffer so one must
count to measure the performance of the network.          appropriately choose minth

       IV. RED PARAMETER ANALYSIS                         Analysis by varying Maximum Threshold
Signficance of maxp and wq
                                                          If we vary the maximum threshold of the bottleneck
Packet marking probability is a linear function of the    link buffer from 16 to 30 we see that the efficiency
average queue size. RED gateways perform best when        increases in steps, while doing so the other
the packet marking probability changes fairly slowly
                                                          parameters of RED are kept constant.
as the average queue size changes. If maxp is set to
1/50 then when average queue size is halfway
between minth and maxth the gateway drops on an
average one out of fifty arriving packets.

The weight wq determines the time constant of low
pass filter The calculation of the average queue size
can be implemented particularly efficiently when wq
is a negative power of two.

Analysis by varying Minimum Threshold

In the network link between the nodes 2 and 3 is
designed with bottleneck and the queuing mechanism
is RED and when minimum threshold of this buffer is
changed from 1 to 14 keeping other parameters
mentioned in section II constant we observe that
efficiency goes on reducing as the number of dropped
packets goes on increasing.




                                                                   Fig 3 Maximum threshold v/s Efficiecny

                                                          Thus we observe from the graph above that higher
                                                          the maximum threshold better is the efficiency so we
                                                          must choose a very high maximum threshold. But
                                                          while doing so if we choose a value that approaches
                                                          instantaneous queue size RED gets much shorter
                                                          period to notify congestion to sources and congestion
                                                          can still occur.

                                                          Thus Minimum threshold should be low but should
                                                          also maintain link utilization. Max threshold should
                                                          be sufficiently high but should allow early detection
                                                          and congestion notification. The optimal values for
                                                          minth and maxth depend on the desired average
                                                          queue size. If the typical traffic is fairly bursty, then
                                                          minth must be correspondingly large to allow the link
        Fig 2 Minimum threshold v/s Efficiecny            utilization to be maintained at an acceptably high


                                                                                                              111
                                     All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
        International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                       Volume 1, Issue 5, July 2012


level. The optimal value for maxth depends on the
maximum average delay that can be accepted by the
network. Maximum threshold should be at least twice
the minimum threshold. For a queue size of upto 50
min and max threshold values opted are 5 and 15.

Queue Size Variation

For this set of analysis all the RED parameters were
kept constant and queue size was varied. When the
queue size grows it was observed as shown in Fig. 4
that the efficiency too grows but at the same time it
was observed as shown in Fig. 5 that the end to end
delay also increases. This increase in average delay is
an undesired phenomena thus there should be a
tradeoff between maximizing throughput and
minimizing delay.



                                                                        Fig 5 Queue Size v/s Delay

                                                                             V. CONCLUSION
                                                              The greatest advantage of RED is instead of using
                                                           instantaneous queue length RED gateway uses
                                                           average queue size short term increase in the queue
                                                           size that result from bursty traffic or from transient
                                                           congestion do not result in a significant increase in
                                                           the average queue size. The only maybe drawback of
                                                           RED would be it completely relies upon a TCP based
                                                           networks since it expects co-operation from the
                                                           sources to reduce their transmission rate when
                                                           congestion occurs which would be possible only
                                                           through TCP's window mechanism.
                                                              For RED to function efficiently it is very essential
                                                           to choose optimum values for maximum threshold
                                                           and minimum threshold although these depend on
                                                           average queue size and the accepted level of delay.
                                                              The gateway marks the packets at fairly evenly
                                                           spaced intervals, in order to avoid biases and avoid
                                                           global synchronization, and to mark packets
           Fig 4 Queue Size v/s Efficiecny                 sufficiently frequently to control the average queue
                                                           size.
RED gateways can control the average queue size
while accommodating transient congestion, RED                               VI. REFERNCES
gateways are well suited to provide high throughput
and low average delay in high speed networks with              [1] Introduction to Network Simulator NS2,
TCP connection that have large window sizes.                       Springer Science + Business Media, LLC,
                                                                   2009
                                                               [2] The ns Manual (formerly ns Notes and
                                                                   Documentation), The VINIT project, May
                                                                   2010.



                                                                                                             112
                                      All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
   International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                  Volume 1, Issue 5, July 2012


[3] NS Simulators for beginners, Lecture notes
    2003-2004, Etian Altaman.
[4] Floyd, S., and Jacobson, V., Random Early
    Detection     gateways     for   Congestion
    Avoidance V.1 N.4, August 1993.
[5] A study of TCP RED congestion control
    using RED, Arjit Ganguly, Pasi Lassila, July
    2001.
[6] Throughput
    http://en.wikipedia.org/wiki/Throughput
[7] Packet        and       network       delay
    http://en.wikipedia.org/wiki/Network_delay
[8] AWK
    http://en.wikipedia.org/wiki/AWK




                                                                                          113
                                All Rights Reserved © 2012 IJARCSEE

More Related Content

What's hot

Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...ambitlick
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksChuka Okoye
 
TCP Performance Optimizations for Wireless Sensor Networks
TCP Performance Optimizations forWireless Sensor NetworksTCP Performance Optimizations forWireless Sensor Networks
TCP Performance Optimizations for Wireless Sensor NetworksTorsten Braun, Universität Bern
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd Iaetsd
 
Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano GiordanoGoWireless
 
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...IDES Editor
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
 
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...ijwmn
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...IJTET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETijfcstjournal
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
 
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...EvaObinna
 

What's hot (18)

Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
 
Multihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor NetworksMultihop Routing In Camera Sensor Networks
Multihop Routing In Camera Sensor Networks
 
TCP Performance Optimizations for Wireless Sensor Networks
TCP Performance Optimizations forWireless Sensor NetworksTCP Performance Optimizations forWireless Sensor Networks
TCP Performance Optimizations for Wireless Sensor Networks
 
Tmac
TmacTmac
Tmac
 
Iaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incastIaetsd an effective approach to eliminate tcp incast
Iaetsd an effective approach to eliminate tcp incast
 
Stefano Giordano
Stefano GiordanoStefano Giordano
Stefano Giordano
 
Aa04404164169
Aa04404164169Aa04404164169
Aa04404164169
 
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
 
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
 
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
Energy Saving DSR and Probabilistic Rebroadcast Mechanism are used to Increas...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IJET-V2I6P7
IJET-V2I6P7IJET-V2I6P7
IJET-V2I6P7
 
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
 
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...
 

Viewers also liked (19)

99 103
99 10399 103
99 103
 
100 103
100 103100 103
100 103
 
114 120
114 120114 120
114 120
 
12 15
12 1512 15
12 15
 
36 40
36 4036 40
36 40
 
46 51
46 5146 51
46 51
 
24 27
24 2724 27
24 27
 
31 34
31 3431 34
31 34
 
122 129
122 129122 129
122 129
 
7 13
7 137 13
7 13
 
ภารกิจระดับครูผู้ช่วย
ภารกิจระดับครูผู้ช่วยภารกิจระดับครูผู้ช่วย
ภารกิจระดับครูผู้ช่วย
 
ภารกิจครูมือใหม่
ภารกิจครูมือใหม่ภารกิจครูมือใหม่
ภารกิจครูมือใหม่
 
Abrod studies
Abrod studiesAbrod studies
Abrod studies
 
89 93
89 9389 93
89 93
 
66 71
66 7166 71
66 71
 
1 9
1 91 9
1 9
 
Evidencia de incidencias
Evidencia de incidenciasEvidencia de incidencias
Evidencia de incidencias
 
Colesterol
ColesterolColesterol
Colesterol
 
Colesterol
ColesterolColesterol
Colesterol
 

Similar to 109 113

Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network partha pratim deb
 
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHMRED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHMEditor IJCATR
 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksEditor IJCATR
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
TCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANsTCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANsambitlick
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET IJCSEA Journal
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismPredictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismIDES Editor
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET Journal
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...Alexander Decker
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Ambreen Zafar
 
The blue active queue management algorithms
The blue active queue management algorithmsThe blue active queue management algorithms
The blue active queue management algorithmsambitlick
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Similar to 109 113 (20)

Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
 
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHMRED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
 
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless NetworksBallpark Figure Algorithms for Data Broadcast in Wireless Networks
Ballpark Figure Algorithms for Data Broadcast in Wireless Networks
 
Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
Congestion control mechanism using network border protocol
Congestion control mechanism using network border protocolCongestion control mechanism using network border protocol
Congestion control mechanism using network border protocol
 
TCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANsTCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANs
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET
 
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling MechanismPredictable Packet Lossand Proportional Buffer Scaling Mechanism
Predictable Packet Lossand Proportional Buffer Scaling Mechanism
 
47 50
47 5047 50
47 50
 
47 50
47 5047 50
47 50
 
Gokul
GokulGokul
Gokul
 
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless NetworkIRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
IRJET-A Survey on Red Queue Mechanism for Reduce Congestion in Wireless Network
 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)Final Report(Routing_Misbehavior)
Final Report(Routing_Misbehavior)
 
The blue active queue management algorithms
The blue active queue management algorithmsThe blue active queue management algorithms
The blue active queue management algorithms
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

More from Ijarcsee Journal (20)

130 133
130 133130 133
130 133
 
116 121
116 121116 121
116 121
 
109 115
109 115109 115
109 115
 
104 108
104 108104 108
104 108
 
93 98
93 9893 98
93 98
 
88 92
88 9288 92
88 92
 
82 87
82 8782 87
82 87
 
78 81
78 8178 81
78 81
 
73 77
73 7773 77
73 77
 
65 72
65 7265 72
65 72
 
58 64
58 6458 64
58 64
 
52 57
52 5752 57
52 57
 
41 45
41 4541 45
41 45
 
28 35
28 3528 35
28 35
 
19 23
19 2319 23
19 23
 
16 18
16 1816 18
16 18
 
6 11
6 116 11
6 11
 
1 5
1 51 5
1 5
 
134 138
134 138134 138
134 138
 
125 131
125 131125 131
125 131
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

109 113

  • 1. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 Performance analysis of networks using RED for congestion control Ms. Banshri Raichana and Mrs. Sangeeta Kulkarni RED monitors the average queue size and marks Abstract— Congestion avoidance techniques packets. If the buffer is almost empty, all incoming monitor network traffic load in an effort to packets are accepted. As the queue grows, the anticipate and avoid congestion at common probability for dropping an incoming packet grows network bottlenecks. Congestion avoidance is too. When the buffer is full, the probability has achieved through packet dropping. Among the reached 1 and all incoming packets are dropped. Thus more commonly used congestion avoidance RED buffer mechanism with constant bit rate traffic mechanisms is Random Early Detection (RED), can be used at an initial stage to understand the which is optimum for high-speed transit networks. effect of change of network parameters over system Random early detection (RED) is an active queue performance. management algorithm. It not only detects but RED aims to control the average queue size by also avoids congestion by randomly dropping indicating to the end hosts when they should packets to notify congestion. The main objective of temporarily slow down transmission of packets. this paper is to comprehend the working of RED RED takes advantage of the congestion control algorithm and to learn the effects of variation of mechanism of TCP by randomly dropping packets RED parameters. To improve the performance of prior to periods of high congestion, RED tells the a network in terms of drop count, efficiency, packet source to decrease its transmission rate. throughput and delay we can optimize our choice Assuming the packet source is using TCP, it will of these RED parameters. decrease its transmission rate until all the packets Index Term - Congestion, Delay, Drop count, RED, reach their destination, indicating that the congestion RED parameters, Throughput, is cleared. I. INTRODUCTION The network designing and simulation here is accomplished using NS2 (network simulator version Congestion occurs when the resource demands 2). NS2 is an event-driven network simulator exceed the network capacity. At some point of time embedded into the Tool Command Language (Tcl). network buffers go full and packets are dropped. An extensible simulation engine which is During congestion, the network throughput drops implemented in C++ and is configured and controlled whereas end to end delay increases. In order to via a Tcl interface. A network topology is defined, overcome this situation a congestion avoidance traffic sources and sinks are configured, statistics are scheme must be employed. One such method is collected, and then simulation is invoked using the Random Early Detection (RED). 'ns' command. Random early detection (RED) is an active queue In general, C++ is used for implementing protocols management algorithm. It is also a congestion and extending the ns-2 library. OTcl is used to create avoidance algorithm. In the conventional tail drop and control the simulation environment and also for algorithm, a router or other network component selection of output data. Simulation is run at the buffers as many packets as it can, and simply drops packet level, allowing visualization of detailed the ones it cannot buffer. If buffers are constantly results. full, the network is congested. Tail drop distributes buffer space unfairly among traffic flows. Tail drop The network can be designed to implement can also lead to TCP global synchronization as all bottleneck and packet drop scenario. Using the TCP connections "hold back" simultaneously, and available tools of NS2 we can implement the network then "step forward" simultaneously. Networks congestion avoidance algorithm Random Early become under-utilized and flooded by turns. RED Detection (RED), then by varying the RED addresses these issues. parameters discussed in section II we can observe the effect on network performance. 109 All Rights Reserved © 2012 IJARCSEE
  • 2. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 II. DESIGNING THE NETWORK wq the queue weight factor which is used in computing the average queue size. maxp the There are four basic steps to design and simulate any maximum dropping probability. network. First step is to develop a model (implementation of a protocol); second step is to The RED parameters set in our simulation were create a simulation scenario (designing a network minimum threshold to5 maximum threshold to 15 topology and traffic scenario); third step is to choose maxp to 0.02 wq to 0.001 and queue size of 35. and collect statistics through simulation, and finally fourth step is to visualize simulation and analyze III. RANDOM EARLY DETECTION ALGORITHM simulation results using awk scripting language. The most distinct factor of RED is that it does not As shown in Fig.1, a network with four nodes operate on instantaneous queue size its functioning is (Node0, Node1, Node2, Node3) has been designed. based on average queue size. When a packet arrives Node 0 and Node1 are sources with FTP aggents at the RED gateway it calculates the average queue attached over TCP. Node 3 is the sink for both the size, using a low-pass filter with an exponential source nodes. A link with appropriate link type, link weighted moving average which is given by: capcity, buffer mechanism is to be defined between these nodes. In this network, a bottleneck between avg = avg + wq(q-avg) node2 and node3 is defined with RED as the buffer mangement scheme so that we can simulate packet The average queue size is compared to two loss and measure overall network perfomance, while thresholds, a minimum threshold and a maximum link between node0 and node2 and between node1 threshold. When the average queue size is less than and node2 would have be droptail mechnaism. The the minimum threshold, no packets are marked they simulation time is kept large enough to demonstrate are enqued into the buffer. When the average queue congestion behaviour. size is greater than the maximum threshold, every arriving packet is marked and discarded. If marked packets are in fact dropped, or if all source nodes are cooperative, this ensures that ensures that the average queue size does not significantly exceed the maximum threshold. When the average queue size is between minimum threshold and maximum threshold, each arriving packet is marked with the probability which is a function of average queue size avg. The initial packet-marking probability pb is given as: pb = C1avg - C2 C1 = maxp maxth-minth C1 = maxp* minth maxth-minth The parameters like minth and maxth are user Fig1. Network simulation window in NS2 defined in the tcl file. While maxp and wq are constants which can be defined in tcl or their default In order to perfectly understand the RED algorithm values are taken from ns-default.tcl. After calculating we must be introduced to the basic RED parameters the packet drop probability, the RED gateways use The minimum queue threshold minth below which no randomization in choosing which arriving packets to packets are dropped, maximum queue threshold mark with this method, the probability of marking a maxth above which all incoming packets are dropped,, packet from a particular connection is roughly proportional to that connection’s share of the 110 All Rights Reserved © 2012 IJARCSEE
  • 3. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 bandwidth through the gateway. In order to do A low minimum threshold achieves high efficiency. analysis awk files for delay and efficiency have been But a very low minimum threshold would result in designed to calculate the same and verify the drop under utilization of link and buffer so one must count to measure the performance of the network. appropriately choose minth IV. RED PARAMETER ANALYSIS Analysis by varying Maximum Threshold Signficance of maxp and wq If we vary the maximum threshold of the bottleneck Packet marking probability is a linear function of the link buffer from 16 to 30 we see that the efficiency average queue size. RED gateways perform best when increases in steps, while doing so the other the packet marking probability changes fairly slowly parameters of RED are kept constant. as the average queue size changes. If maxp is set to 1/50 then when average queue size is halfway between minth and maxth the gateway drops on an average one out of fifty arriving packets. The weight wq determines the time constant of low pass filter The calculation of the average queue size can be implemented particularly efficiently when wq is a negative power of two. Analysis by varying Minimum Threshold In the network link between the nodes 2 and 3 is designed with bottleneck and the queuing mechanism is RED and when minimum threshold of this buffer is changed from 1 to 14 keeping other parameters mentioned in section II constant we observe that efficiency goes on reducing as the number of dropped packets goes on increasing. Fig 3 Maximum threshold v/s Efficiecny Thus we observe from the graph above that higher the maximum threshold better is the efficiency so we must choose a very high maximum threshold. But while doing so if we choose a value that approaches instantaneous queue size RED gets much shorter period to notify congestion to sources and congestion can still occur. Thus Minimum threshold should be low but should also maintain link utilization. Max threshold should be sufficiently high but should allow early detection and congestion notification. The optimal values for minth and maxth depend on the desired average queue size. If the typical traffic is fairly bursty, then minth must be correspondingly large to allow the link Fig 2 Minimum threshold v/s Efficiecny utilization to be maintained at an acceptably high 111 All Rights Reserved © 2012 IJARCSEE
  • 4. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 level. The optimal value for maxth depends on the maximum average delay that can be accepted by the network. Maximum threshold should be at least twice the minimum threshold. For a queue size of upto 50 min and max threshold values opted are 5 and 15. Queue Size Variation For this set of analysis all the RED parameters were kept constant and queue size was varied. When the queue size grows it was observed as shown in Fig. 4 that the efficiency too grows but at the same time it was observed as shown in Fig. 5 that the end to end delay also increases. This increase in average delay is an undesired phenomena thus there should be a tradeoff between maximizing throughput and minimizing delay. Fig 5 Queue Size v/s Delay V. CONCLUSION The greatest advantage of RED is instead of using instantaneous queue length RED gateway uses average queue size short term increase in the queue size that result from bursty traffic or from transient congestion do not result in a significant increase in the average queue size. The only maybe drawback of RED would be it completely relies upon a TCP based networks since it expects co-operation from the sources to reduce their transmission rate when congestion occurs which would be possible only through TCP's window mechanism. For RED to function efficiently it is very essential to choose optimum values for maximum threshold and minimum threshold although these depend on average queue size and the accepted level of delay. The gateway marks the packets at fairly evenly spaced intervals, in order to avoid biases and avoid global synchronization, and to mark packets Fig 4 Queue Size v/s Efficiecny sufficiently frequently to control the average queue size. RED gateways can control the average queue size while accommodating transient congestion, RED VI. REFERNCES gateways are well suited to provide high throughput and low average delay in high speed networks with [1] Introduction to Network Simulator NS2, TCP connection that have large window sizes. Springer Science + Business Media, LLC, 2009 [2] The ns Manual (formerly ns Notes and Documentation), The VINIT project, May 2010. 112 All Rights Reserved © 2012 IJARCSEE
  • 5. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 [3] NS Simulators for beginners, Lecture notes 2003-2004, Etian Altaman. [4] Floyd, S., and Jacobson, V., Random Early Detection gateways for Congestion Avoidance V.1 N.4, August 1993. [5] A study of TCP RED congestion control using RED, Arjit Ganguly, Pasi Lassila, July 2001. [6] Throughput http://en.wikipedia.org/wiki/Throughput [7] Packet and network delay http://en.wikipedia.org/wiki/Network_delay [8] AWK http://en.wikipedia.org/wiki/AWK 113 All Rights Reserved © 2012 IJARCSEE