AIMD fallacies and shortcomings Prasad. 1 AIMD claims: Guess What !? “Proposition 3. For both feasibility and optimal convergence to fairness, the increase.

Slides:



Advertisements
Similar presentations
Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Advertisements

Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Fast Convergence of Selfish Re-Routing Eyal Even-Dar, Tel-Aviv University Yishay Mansour, Tel-Aviv University.
What’s Your Guess? Chapter 9: Review of Convergent or Divergent Series.
CS640: Introduction to Computer Networks Mozafar Bag-Mohammadi Lecture 3 TCP Congestion Control.
Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks Dah-Ming Chiu and Raj Jain Presented by Yao Zhao.
“ Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks ”
Congestion Control An Overview -Jyothi Guntaka. Congestion  What is congestion ?  The aggregate demand for network resources exceeds the available capacity.
Congestion control principles Presentation by: Farhad Rad (Advanced computer Networks Lesson in
Lecture 5: Learning models using EM
1 Systems of Linear Equations Iterative Methods. 2 B. Iterative Methods 1.Jacobi method and Gauss Seidel 2.Relaxation method for iterative methods.
1 Systems of Linear Equations Iterative Methods. 2 B. Direct Methods 1.Jacobi method and Gauss Seidel 2.Relaxation method for iterative methods.
Base Station Association Game in Multi-cell Wireless Network Libin Jiang, Shyam Parekh, Jean Walrand.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
K-means Clustering. What is clustering? Why would we want to cluster? How would you determine clusters? How can you do this efficiently?
Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks Dah-Ming Chiu and Raj Jain Presented by Aaron Ballew (slides.
Adaptive Control for TCP Flow Control Thesis Presentation Amir Maor.
Index FAQ Limits of Sequences of Real Numbers Sequences of Real Numbers Limits through Rigorous Definitions The Squeeze Theorem Using the Squeeze Theorem.
Monotone Sequences Objective: To define a Monotone Sequence and determine whether it converges or not.
Distributed Asynchronous Bellman-Ford Algorithm
A Framework for Distributed Model Predictive Control
1 Macroeconomics LECTURE SLIDES SET 5 Professor Antonio Ciccone Macroeconomics Set 5.
Non-Linear Models. Non-Linear Growth models many models cannot be transformed into a linear model The Mechanistic Growth Model Equation: or (ignoring.
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
Non-Linear Models. Non-Linear Growth models many models cannot be transformed into a linear model The Mechanistic Growth Model Equation: or (ignoring.
Implementing High Speed TCP (aka Sally Floyd’s) Yee-Ting Li & Gareth Fairey 1 st October 2002 DataTAG CERN (Kinda!)
1 [3] Jorge Martinez-Bauset, David Garcia-Roger, M a Jose Domenech- Benlloch and Vicent Pla, “ Maximizing the capacity of mobile cellular networks with.
EE 685 presentation Utility-Optimal Random-Access Control By Jang-Won Lee, Mung Chiang and A. Robert Calderbank.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
Numerical Methods Solution of Equation.
Inverse Kinematics for Robotics using Neural Networks. Authors: Sreenivas Tejomurtula., Subhash Kak
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
Non-Linear Models. Non-Linear Growth models many models cannot be transformed into a linear model The Mechanistic Growth Model Equation: or (ignoring.
Smart Sleeping Policies for Wireless Sensor Networks Venu Veeravalli ECE Department & Coordinated Science Lab University of Illinois at Urbana-Champaign.
$100 $200 $300 $400 $100 $200 $300 $400 $300 $200 $100 Adding multiples of 10 Add 1 to 2 digit numbers with regrouping Add 3 two digit numbers Ways.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Congestion Control 0.
Congestion Control: UDP. What is Congestion Control? Refers to the management of packet loss and signal degradation Handled by both Network and Transport.
Analysis of the increase and Decrease Algorithms for Congestion in Computer Networks Portions of the slide/figures were adapted from :
CS 268: Lecture 5 (TCP Congestion Control) Ion Stoica February 4, 2004.
Jan 27, Digital Preservation Seminar1 Effective Page Refresh Policies for Web Crawlers Written By: Junghoo Cho & Hector Garcia-Molina Presenter:
7/11/ Bisection Method Major: All Engineering Majors Authors: Autar Kaw, Jai Paul
CPU Scheduling Scheduling processes (or kernel-level threads) onto the cpu is one of the most important OS functions. The cpu is an expensive resource.
ベーテ自由エネルギーに対するCCCPアルゴリズムの拡張
Finding the square root of a complex number
Introduction to Congestion Control
Traffic Engineering with AIMD in MPLS Networks
“Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks” Lecture Note 7.
Congestion control principles
ECEN “Mobile Wireless Networking”
TCP Congestion Control
Ex. Factor a) x2 + 5x + 6 b) x2 + 3x – 40 c) 5x2 – 17x + 6 d) 9x2 – 25.
TCP Congestion Control
“Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks”
Bisection Method.
Elastic Task Model For Adaptive Rate Control
Equation Review Given in class 10/4/13.
CS 268: Lecture 4 (TCP Congestion Control)
Richard Anderson Autumn 2006 Lecture 1
TCP Congestion Control
3.8 Newton’s Method How do you find a root of the following function without a graphing calculator? This is what Newton did.
연구 목표 Idle Sense: An Optimal Access Method for High Throughput and Fairness in Rate Diverse Wireless LANs. M. Heusse, F. Rousseau, R. Guillier, and A.
Algorithms and Networks
Objective: To know the equations of simple straight lines.
Equation Review.
Totally Asynchronous Iterative Algorithms
ADMM and DSO.
Array Fundamentals A simple example program will serve to introduce arrays. This program, REPLAY, creates an array of four integers representing the ages.
Lecture 6, Computer Networks (198:552)
Objective: To know the equations of simple straight lines.
Major: All Engineering Majors Authors: Autar Kaw, Jai Paul
Presentation transcript:

AIMD fallacies and shortcomings Prasad

1

AIMD claims: Guess What !? “Proposition 3. For both feasibility and optimal convergence to fairness, the increase policy should be additive and the decrease policy should be multiplicative.”

AIMD claim is untrue ! Consider the following simple example: No. of users = 2 Init loads of users X 1 = 17 and X 2 = 0 Load goal, X goal = 20 Fairness goal, F goal = 99%

AIMD equations Let a I = 1,a D = 0, b D = 0.01 and as per AIMD claim, b I should be 1 Fairness index is given by:

After plugging in all the values… Result is (after 3 iterations): Now, change bI to 1.1. In other words, introduce a multiplicative-component during increase. Result then is (after 3 iterations):

2

With AIMD, there is a possibility of unlimited overload after convergence

AIMD equations After summing the values for n users we get,

Defining overload to be: We get Overload = The problem is, as n becomes large, overload becomes large as well !

3

AIMD is rather slow w.r.t convergence of efficiency

4

All issues mentioned till now have one thing in common – they are all related to the synchronous communication system

This model is too simple and unrealistic and hence, inferences made based on it may not hold at all in a real system And Guess what !?

5 This is the best part !

AIMD does not guarantee fairness ! (in a more realistic asynchronous communication system like the Internet)

A better model