WPI - Advanced Computer Network 1 Promoting the Use of End-to-End Congestion Control in the Internet IEEE/ACM Transactions on Networking, May 3 1999 Sally.

Slides:



Advertisements
Similar presentations
Martin Suchara, Ryan Witt, Bartek Wydrowski California Institute of Technology Pasadena, U.S.A. TCP MaxNet Implementation and Experiments on the WAN in.
Advertisements

Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Internet Measurement Conference 2003 Source-Level IP Packet Bursts: Causes and Effects Hao Jiang Constantinos Dovrolis (hjiang,
CSIT560 Internet Infrastructure: Switches and Routers Active Queue Management Presented By: Gary Po, Henry Hui and Kenny Chong.
Transport Layer3-1 TCP AIMD multiplicative decrease: cut CongWin in half after loss event additive increase: increase CongWin by 1 MSS every RTT in the.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Congestion Control Created by M Bateman, A Ruddle & C Allison As part of the TCP View project.
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
CS 4700 / CS 5700 Network Fundamentals Lecture 12: Router-Aided Congestion Control (Drop it like it’s hot) Revised 3/18/13.
Advanced Computer Networking Congestion Control for High Bandwidth-Delay Product Environments (XCP Algorithm) 1.
Congestion Control An Overview -Jyothi Guntaka. Congestion  What is congestion ?  The aggregate demand for network resources exceeds the available capacity.
TFRC for Voice: the VoIP Variant Sally Floyd, Eddie Kohler. March 2005, presentation to AVT draft-ietf-dccp-tfrc-voip-01.txt.
Congestion control principles Presentation by: Farhad Rad (Advanced computer Networks Lesson in
Ion Stoica, Scott Shenker, and Hui Zhang SIGCOMM’98, Vancouver, August 1998 subsequently IEEE/ACM Transactions on Networking 11(1), 2003, pp Presented.
XCP: Congestion Control for High Bandwidth-Delay Product Network Dina Katabi, Mark Handley and Charlie Rohrs Presented by Ao-Jan Su.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #07 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
Controlling High- Bandwidth Flows at the Congested Router Ratul Mahajan, Sally Floyd, David Wetherall AT&T Center for Internet Research at ICSI (ACIRI)
Jinho Promoting the Use of End-To-End Congestion Control in the Internet IEEE/ACM Transaction on Networking Vol.7 No.4 August 1999 Sally Floyd and Kevin.
15-744: Computer Networking L-10 Congestion Control.
1 Traffic Sensitive Quality of Service Controller Masters Thesis Submitted by :Abhishek Kumar Advisors: Prof Mark Claypool Prof Robert Kinicki Reader:
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug 1993), pp
1 Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks Ion Stoica,Scott Shenker, and Hui Zhang SIGCOMM’99,
Promoting the Use of End-to- End Congestion Control in the Internet Sally Floyd and Kevin Fall Presented by Scott McLaren.
ACN: TCP Friendly1 Promoting the Use of End-to-End Congestion Control in the Internet Sally Floyd and Kevin Fall IEEE/ACM Transactions on Networking May.
1 Emulating AQM from End Hosts Presenters: Syed Zaidi Ivor Rodrigues.
Medium Start in TCP-Friendly Rate Control Protocol CS 217 Class Project Spring 04 Peter Leong & Michael Welch.
Random Early Detection Gateways for Congestion Avoidance
The War Between Mice and Elephants By Liang Guo (Graduate Student) Ibrahim Matta (Professor) Boston University ICNP’2001 Presented By Preeti Phadnis.
Promoting the Use of End-to-End Congestion Control & Random Early Detection of Network Congestion.
Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs.
Congestion Control for High Bandwidth-Delay Product Environments Dina Katabi Mark Handley Charlie Rohrs.
Diffusion Early Marking Department of Electrical and Computer Engineering University of Delaware May / 2004 Rafael Nunez Gonzalo Arce.
Advanced Computer Networks : RED 1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking,
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
Transport Layer1 Flow and Congestion Control Ram Dantu (compiled from various text books)
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Korea Advanced Institute of Science and Technology Network Systems Lab. 1 Dual-resource TCP/AQM for processing-constrained networks INFOCOM 2006, Barcelona,
HighSpeed TCP for High Bandwidth-Delay Product Networks Raj Kettimuthu.
Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005.
1 Congestion Control Computer Networks. 2 Where are we?
Packet Scheduling and Buffer Management Switches S.Keshav: “ An Engineering Approach to Networking”
TCP with Variance Control for Multihop IEEE Wireless Networks Jiwei Chen, Mario Gerla, Yeng-zhong Lee.
1 1 July 28, Goal of this session is too have a discussion where we learn about the relevant data to help us understand the problem and design.
Promoting the Use of End-to-End Congestion Control in the Internet Sally Floyd and Kevin Fall IEEE-ACAM Transactions on Networking, 馬儀蔓.
Network Protocols: Design and Analysis Polly Huang EE NTU
Deadline-based Resource Management for Information- Centric Networks Somaya Arianfar, Pasi Sarolahti, Jörg Ott Aalto University, Department of Communications.
Measuring the Capacity of a Web Server USENIX Sympo. on Internet Tech. and Sys. ‘ Koo-Min Ahn.
We used ns-2 network simulator [5] to evaluate RED-DT and compare its performance to RED [1], FRED [2], LQD [3], and CHOKe [4]. All simulation scenarios.
Explicit Allocation of Best-Effort Service Goal: Allocate different rates to different users during congestion Can charge different prices to different.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
1 Fair Queuing Hamed Khanmirza Principles of Network University of Tehran.
Queue Scheduling Disciplines
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Congestion Control 0.
Peer-to-Peer Networks 13 Internet – The Underlay Network
Thoughts on the Evolution of TCP in the Internet Sally Floyd PFLDnet 2004 February 16, 2004.
ECEN 619, Internet Protocols and Modeling Prof. Xi Zhang Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Dynamic Behavior of Slowly Responsive Congestion Control Algorithms (Bansal, Balakrishnan, Floyd & Shenker, 2001)
Analysis and Comparison of TCP Reno and TCP Vegas Review
Internet Networking recitation #9
Topics discussed in this section:
Congestion control principles
Misbehaving flows can be classified
Flow and Congestion Control
“Promoting the Use of End-to-End Congestion Control in the Internet”
Congestion Control, Internet Transport Protocols: UDP
Presentation transcript:

WPI - Advanced Computer Network 1 Promoting the Use of End-to-End Congestion Control in the Internet IEEE/ACM Transactions on Networking, May Sally Floyd, Kevin Fall Presenter: Yixin Hua

WPI - Advanced Computer Network 2 About Winner of the Communications Society William R. Bennett Prize Paper Award, Revision of [FF98] Floyd, S., and Fall, K., Promoting the Use of End-to-End Congestion Control in the Internet February 1998, which is a revision of [FF97] Floyd, S., and Fall, K., Router Mechanisms to Support End-to-End Congestion Control. Technical report, February 1997.

WPI - Advanced Computer Network 3 Overview Introduction Existing problems – Unfairness – Congestion collapse Our approach Alternative approaches Conclusions and future work

WPI - Advanced Computer Network 4 Introduction “To promote the inclusion of end-to-end congestion in the design of future protocols using best-effort traffic,…” Why? Non-congestion-controlled best-effort traffic’s impacts range from extreme unfairness against competing TCP traffic to potential for congestion collapse. And routers need to identify and restrict those best-effort flows in times of congestion.

WPI - Advanced Computer Network 5 Not “TCP-friendly” flow: Flow whose long-term arrival rate exceeds that of any conformant TCP in the same circumstances. Unresponsive flow: Flow that fails to reduce its offered load at a router in response to an increased packet drop rate. Disproportionate-bandwidth: Flow that uses considerably more bandwidth than other flows in a time of congestion. Bad guys

WPI - Advanced Computer Network 6 Different approaches Per-flow packet scheduling S upply fairness with a cost of increased state, but provide no inherent incentive structure for best-effort flows to use end-to-end congestion control. Incentives for end-to-end congestion control G ive a concrete incentive to end-users, developers, and protocol designers to use end-to-end congestion control for best-effort traffic. RLM? (This is the paper about.) Pricing mechanism R esult in a risky gamble that network providers will provide additional bandwidth and deploy effective pricing structures fast enough to keep up the growth in unresponsive best-effort traffic in the Internet.

WPI - Advanced Computer Network 7 Existing problems Unfairness Unfairness is from bandwidth starvation that unresponsive flows can inflict on well-behaved responsive traffic. Danger of congestion collapse It stems from a network busy transmitting packets that will simply be discarded before reaching their final destinations.

WPI - Advanced Computer Network 8 Samples – unfairness TCP (Good citizen) vs. UDP (Bad guy) Setup: R2-S4 : 10 Mbps TCP : S1 to S3 UDP : S2 to S4 ranges up to 2Mbps

WPI - Advanced Computer Network 9 Samples – FCFS

WPI - Advanced Computer Network 10 Samples – WRR

WPI - Advanced Computer Network 11 Congestion collapse Classic congestion collapse Congestion collapse from undelivered packets Fragmentation-based congestion collapse Congestion collapse from increased control traffic Congestion collapse from stale packets

WPI - Advanced Computer Network 12 Congestion collapse 1 Classic congestion collapse. A stable condition that can result in throughput that is a small fraction of normal[Nag 84]. And it has been corrected by the timer improvements and congestion control mechanisms in modern implementations of TCP [Jac88]. Congestion collapse from undelivered packets. It arises when bandwidth is wasted by delivering packets through the network that are dropped before reaching their ultimate destination. And the danger is due to the deployment of open-look application not using end-to-end congestion control. It is not stable, and returns to normal once the load is reduced.

WPI - Advanced Computer Network 13 Congestion collapse 2 Fragmentation-based congestion collapse. It consists of the network transmitting fragments or cells of packets that will be discarded at receiver because they cannot be reassembled into a valid packet. Early Packet Discard [RF95] and Path MTU discovery [KMMP88] address to this problem. Congestion collapse from increased control traffic. Due to increasing load and increasing congestion, an increasing-large fraction of the bytes transmitted on congested links belong to control traffic, and an increasingly-small fraction of bytes transmitted correspond to data actually delivered to network application. Congestion collapse from stale and unwanted packets. It happens when congested link carrying packets user no longer wanted.

WPI - Advanced Computer Network 14 Samples – Congestion Collapse TCP (Good citizen) vs. UDP (Bad guy) ns-2 setup: R2-S4 : 128Kbps TCP : S1 to S3 UDP : S2 to S4 ranges up to 2Mbps

WPI - Advanced Computer Network 15 Samples – FCFS 1

WPI - Advanced Computer Network 16 Samples – WRR 2

WPI - Advanced Computer Network 17 Samples – FCFS 2

WPI - Advanced Computer Network 18 Samples – WRR 2

WPI - Advanced Computer Network 19 Samples – WRR 3

WPI - Advanced Computer Network 20 Our approach? Identify not TCP-friendly flows Identify unresponsive flows Identify flows with disproportional bandwidth usage And Restrict them…

WPI - Advanced Computer Network 21 TCP

WPI - Advanced Computer Network 22 Identify not TCP-friendly flows Rationale: TCP-friendly flow’s response to congestions Maximum sending rate T Bps P acket drop rate of p Packets size of B bytes Fair constant roundtrip time R second, including queueing delays

WPI - Advanced Computer Network 23 Identify not TCP-friendly flows 1 Limitation: – Per flow basis. – Also detects flow with larger packet size or smaller round trip time. Router need to detect packet size, R can be set as twice the propagation delay from attached link. – It can be only applied for non-bursty packet drop behavior. Response: – Restrict not TCP-friendly flow in congestion. – Remove restriction when there is no longer any significant link congestion, or flow has reduced its arrival rate appropriately in response to congestion.

WPI - Advanced Computer Network 24 Identify not TCP-friendly flows 2 Example test: Test flow with, B is the maximum packet size, R twice the T prop, and p is the aggregate packet drop rate for that queue. A flow restriction is removed if the arrival rate return less than to, for the new packet drop rate p.

WPI - Advanced Computer Network 25 Identify unresponsive flows Rationale: Arrival rate decreases appropriately in response to increased packet drop. If the steady state drop rate increases by a factor of x, and the presented load for a high-bandwidth flow does not decrease by a factor reasonably close to sqrt(x) or more, then the flow can be deemed no to be using congestion control.

WPI - Advanced Computer Network 26 Identify unresponsive flows 1 Limitation: – Per flow basis – Only apply to high-bandwidth flows. – When the packet drop rate remains relatively constant, no flow will be identified as unresponsive. – Less straightforward for a flow with a variable demand. Response: – Restrict unresponsive in congestion. – Remove restriction when there is no longer any significant link congestion, or flow has reduced its arrival rate appropriately in response to congestion.

WPI - Advanced Computer Network 27 Identify unresponsive flows 2 Example test: If drop rate increases by more than a factor of 4, but flow’s arrival rate has not decreased to below 90% of its previous value. Restriction will be removed from an unresponsive flow only if, after an increased packet drop rate, its arrival rate returns to at most half of its arrival rate when it was restricted.

WPI - Advanced Computer Network 28 Identify flows using disproportionate bandwidth Rationale: How many bandwidth share is used in congestion First, check if the arrival rate is greater than ln(3n)/n. (It is close to 1 for n = 2, and grows slowly as a multiple of 1/n.) Second, check if the arrival rate is greater than c/sqrt(p) Bps for some constant c. c is close to.

WPI - Advanced Computer Network 29 Identify flows using disproportionate bandwidth 1 Limitation: – Gauging the level of unsatisfied demand is problematic. – For long RTT TCP flow with persistent demand, a single packet drop represents a significant suppressed demand. But to a short bursty web traffic, it doesn’t mean much in term of unsatisfied demand. Response: – A conservative approach would be to limit the restriction of a high- bandwidth responsive flow so that over the long run, each such flow receives as much bandwidth as the highest-bandwidth unrestricted flow. – Restriction is removed when any one of test conditions is no longer true.

WPI - Advanced Computer Network 30 Identify flows using disproportionate bandwidth 2 Example test: Check if estimated arrival rate is greater than, and the arrival rate is also greater than a fraction of ln(3n)/n of the best-effort bandwidth.

WPI - Advanced Computer Network 31 Alternative approaches Per-flow scheduling P rovide fairness at router point. Encourage flows to make sure their queue in the congested router never goes empty. FCFS scheduling More efficient to implement. Reduces the tail of delay distribution. Allows bursty transmitted in a bursty way instead of having packets “spread out” and be delayed by scheduler.

WPI - Advanced Computer Network 32 Alternative approaches 1 Other scheduling algorithms Such as differential treatment or preferential dropping of unresponsive flows, relaxed variants of per-flow scheduling, differential dropping for flows using disproportionate bandwidth, Class Based Queueing, stochastic Fair Queueing, min-max fairness restriction. Pricing mechanism State required for this would be too complex.

WPI - Advanced Computer Network 33 Conclusion and future work Need specific proposal for identifying and controlling unresponsive flows. Deployment of these mechanism is more meaningful than the accuracy.

WPI - Advanced Computer Network 34 Appendix One TCP connection or many? Break one TCP connection into multiple connections to increase throughput. Every single packet drop cause one of N connection window cut in half, that’s 1/(2N) of aggregate arrival rate. By identifying “flow” as source and destination IP addresses ONLY, multiple connections combine into one flow, and defeat the abuse. Characterizing TCP-friendly flows. Simulations verifying the “TCP-friendly” characterization.