Promoting the Use of End-to- End Congestion Control in the Internet Sally Floyd and Kevin Fall Presented by Scott McLaren.

Slides:



Advertisements
Similar presentations
Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Advertisements

IPv4 - The Internet Protocol Version 4
CSIT560 Internet Infrastructure: Switches and Routers Active Queue Management Presented By: Gary Po, Henry Hui and Kenny Chong.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Transport Layer3-1 TCP AIMD multiplicative decrease: cut CongWin in half after loss event additive increase: increase CongWin by 1 MSS every RTT in the.
Prentice HallHigh Performance TCP/IP Networking, Hassan-Jain Chapter 2 TCP/IP Fundamentals.
Congestion Control Created by M Bateman, A Ruddle & C Allison As part of the TCP View project.
CS 408 Computer Networks Congestion Control (from Chapter 05)
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
CS 4700 / CS 5700 Network Fundamentals Lecture 12: Router-Aided Congestion Control (Drop it like it’s hot) Revised 3/18/13.
Congestion Control An Overview -Jyothi Guntaka. Congestion  What is congestion ?  The aggregate demand for network resources exceeds the available capacity.
Network Congestion Gabriel Nell UC Berkeley. Outline Background: what is congestion? Congestion control – End-to-end – Router-based Economic insights.
Jinho Promoting the Use of End-To-End Congestion Control in the Internet IEEE/ACM Transaction on Networking Vol.7 No.4 August 1999 Sally Floyd and Kevin.
WPI - Advanced Computer Network 1 Promoting the Use of End-to-End Congestion Control in the Internet IEEE/ACM Transactions on Networking, May Sally.
ACN: TCP Friendly1 Promoting the Use of End-to-End Congestion Control in the Internet Sally Floyd and Kevin Fall IEEE/ACM Transactions on Networking May.
TCP Friendliness CMPT771 Spring 2008 Michael Jia.
Data Communication and Networks
Random Early Detection Gateways for Congestion Avoidance
Promoting the Use of End-to-End Congestion Control & Random Early Detection of Network Congestion.
Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs.
PCP: Efficient Endpoint Congestion Control To appear in NSDI, 2006 Thomas Anderson, Andrew Collins, Arvind Krishnamurthy and John Zahorjan University of.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Advanced Computer Networks : RED 1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking,
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Top-Down Network Design Chapter Thirteen Optimizing Your Network Design Oppenheimer.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Quick-Start for TCP and IP A.Jain, S. Floyd, M. Allman, and P. Sarolahti ICSI, April 2006 This and earlier presentations::
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
University of the Western Cape Chapter 12: The Transport Layer.
Link Scheduling & Queuing COS 461: Computer Networks
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Wolfgang EffelsbergUniversity of Mannheim1 Differentiated Services for the Internet Wolfgang Effelsberg University of Mannheim September 2001.
HighSpeed TCP for High Bandwidth-Delay Product Networks Raj Kettimuthu.
Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005.
TCP Trunking: Design, Implementation and Performance H.T. Kung and S. Y. Wang.
1 Congestion Control Computer Networks. 2 Where are we?
CS 4396 Computer Networks Lab
Promoting the Use of End-to-End Congestion Control in the Internet Sally Floyd and Kevin Fall IEEE-ACAM Transactions on Networking, 馬儀蔓.
EE 122: Lecture 15 (Quality of Service) Ion Stoica October 25, 2001.
PCP: Efficient Endpoint Congestion Control NSDI, 2006 Thomas Anderson, Andrew Collins, Arvind Krishnamurthy and John Zahorjan University of Washington.
We used ns-2 network simulator [5] to evaluate RED-DT and compare its performance to RED [1], FRED [2], LQD [3], and CHOKe [4]. All simulation scenarios.
Explicit Allocation of Best-Effort Service Goal: Allocate different rates to different users during congestion Can charge different prices to different.
1 Transport Layer: Basics Outline Intro to transport UDP Congestion control basics.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Principles of reliable data transfer 0.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Congestion Control 0.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
UDP : User Datagram Protocol 백 일 우
Instructor Materials Chapter 6: Quality of Service
Topics discussed in this section:
IP - The Internet Protocol
IP - The Internet Protocol
Misbehaving flows can be classified
Congestion Control, Internet transport protocols: udp
IP - The Internet Protocol
Congestion Control (from Chapter 05)
“Promoting the Use of End-to-End Congestion Control in the Internet”
Congestion Control (from Chapter 05)
Congestion Control, Internet Transport Protocols: UDP
IP - The Internet Protocol
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
IP - The Internet Protocol
Error Checking continued
Presentation transcript:

Promoting the Use of End-to- End Congestion Control in the Internet Sally Floyd and Kevin Fall Presented by Scott McLaren

Overview Introduction The problem of unresponsive flows Identifying flows to regulate Alternate approaches Conclusions and future work

Introduction End-to-end congestion control mechanisms of TCP are critical to the robustness of the Internet We can no longer rely on all end-nodes to use congestion control for best-effort traffic We also cannot rely on all developers to use congestion control The network must participate in resource utilization (congestion control)

Approach 1 – Packet scheduling in routers to isolate flows Per-flow scheduling to regulate bandwidth Attempt max-min fairness

Approach 2 – Incentives for use of congestion control Restrict bandwidth of best-effort flows using a large share of the bandwidth Incentive for users, developers, and protocol designers  Restrict bandwidth of flows without congestion control

Approach 3 – financial incentives or pricing mechanisms Can network providers deploy effective pricing structures fast enough to keep up with growth of best-effort traffic?

Definitions Best-effort – UDP, etc. Unresponsive flows – flows that do not use end-to- end congestion control and that do not reduce their load on the network when subjected to packet drops TCP-friendly – a flow whose arrival rate does not exceed the arrival of a conformant TCP connection in the same circumstances Goodput – the bandwidth delivered to the receiver, excluding duplicate packets Congestion collapse – when an increase in the network load results in a decrease in the useful work done by the network

Unfairness TCP flows competing with unresponsive UDP flows for scarce bandwidth TCP flow reduces load, UDP uses the extra bandwidth Due to TCP’s congestion control algorithms, throughput = 1/(roundtrip time) With multiple congested gateways, throughput = 1/sqrt(# congested gateways)

Simulations 3 TCP flows,1 UDP flow, FCFS Scheduling 3 TCP flows,1 UDP flow, WRR Scheduling

Congestion Collapse Classical – results from unnecessary retransmissions of packets  First reported in mid 1980s, due to retransmission of packets that were in transit or already received  Corrected by timer improvements and congestion control in modern TCP implementations From undeliverable packets – bandwidth wasted by delivering packets that will eventually be dropped  Largest unresolved danger  Condition is not stable, it returns to normal once load is reduced  Not an issue in a circuit-switched network – a sender can only send when a path exists with the necessary bandwidth

Congestion Collapse Simulations (top line = Bold line: Aggregate Goodput)

Congestion Collapse Simulations

Other forms of congestion collapse Fragmentation-based – network transmits fragments or cells that are discarded because they can’t be reassembled into a valid packet  ATM uses Early Packet Discard – when a cell is dropped, a complete frame is dropped  Variant is packets received by transport-level, then later discarded before used by user Occurs when web users abort transfers due to delays, then re- request the same data Increased control traffic – an increasing fraction of the bytes transmitted belong to control traffic, and a decreasing fraction of the bytes are data for applications  Control packets – packet headers for small data packets, routing updates, multicast join an prune messages, session messages, DNS messages, etc

Incentives to use Congestion Control The current Internet “rewards” users that do not use congestion control, they might get a larger fraction of the bandwidth Incentives cannot come from other users, they need to come from the network Two ways to prevent congestion collapse from undeliverable packets  End-to-end congestion control, possibly by using incentives at routers  Use of virtual-circuits, where packets only enter the network if they can reach their final destination

Identifying flows to regulate Designed to detect a small number of misbehaving flows An incentive to limit the benefits of not using congestion control Issues not addressed  encryption and fragmentation make it more difficult to classify packets into flows  IPsec could prevent routers from using source IP addresses and port numbers

Identifying flows that are not TCP-friendly T = maximum sending rate (Bps) B = size of packets (bytes) R = roundtrip time (s)  No simple test for this p = packet drop rate Use this equation to calculate the maximum arrival rate from a conformant TCP connection in similar circumstances

Identifying unresponsive flows TCP-friendly test is based on TCP, routers may want to consider other protocols  One approach is to verify that a high-bandwidth flow was responsive (its arrival rate drops when its packet drop rate increases) If drop rate increases by x, and the load does not decrease by a factor close to √x or more, the flow is unresponsive  Requires estimates of a flow’s arrival rate and packet drop rate over several long time intervals Arrival rate estimated from packet drops from active queue management Drop rate estimate using aggregate drop rate of the queue  Only applied to high bandwidth flows Incentive to start with an overly-high initial bandwidth, so it would get larger share of bandwidth even after it is reduced Example test: if drop rate increases by a factor of four, but arrival rate has not decreased to below 90% of its previous value

Identifying unresponsive flows Other tests  Flows with an increasing or constant average arrival rate, while the router drop rate is increasing  Flows whose average arrival rate tracks changes in the router drop rate  Flows whose average arrival rate changes independently of the router drop rate

Identifying flows using disproportionate bandwidth Router might restrict bandwidth of flows even if they are using congestion control  If it is the only TCP with sustained demand using large windows with significantly smaller roundtrip time with larger packet sizes

Identifying flows using disproportionate bandwidth A flow uses disproportionate share if  Arrival rate > log(3n)/n  log(3n)/n is close to one (0.9) for n=2  Grows slowly as a multiple of 1/n A flow has a high arrival rate relative to the level of congestion if  Arrival rate > c/√p Bps

Alternate Approaches Deploy per-flow scheduling mechanisms such as RR or FQS at all congested routers Problem with per-flow scheduling  Encourages flows to make sure their queue never get empty – so they lose their turn at scheduling FCFS advantages  More efficient to implement – link speeds and active flows are increasing  Allows packets arriving in a small burst to be transmitted in a burst, in stead of spread out by the scheduler

Alternate Approaches FCFS with per-flow scheduling  FCFS with differential dropping for flows using large fraction of bandwidth  Scheduling mechanisms such as Class-Based Queuing or Stochastic Fair Queuing that can operate on levels other that a single flow or all of the traffic Min-max fairness restricts attention to each component  It would be better to consider the number of congested links on each flow’s path

Alternate Approaches Pricing structures  State required for this would be complex

Conclusions and future work Arguments for  The need for end-to-end congestion control  The need for mechanisms in the network to detect and restrict unresponsive or high-bandwidth best- effort flows Future Work  A specific proposal for mechanisms to identify and control unresponsive flows  The specifics are not as important as deployment of a mechanism