Presenter: Anika Aziz National Institute of Informatics (NII), The Graduate University for Advanced Studies, Tokyo, Japan.

Slides:



Advertisements
Similar presentations
The Transmission Control Protocol (TCP) carries most Internet traffic, so performance of the Internet depends to a great extent on how well TCP works.
Advertisements

Policy-based Congestion Management for an SMS Gateway Alberto Gonzalez (KTH) Roberto Cosenza (Infoflex) Rolf Stadler (KTH) June 8, 2004, Policy Workshop.
A Novel Framework of Message Scheduling in Delay Tolerant Networks (DTNs) with Buffer Limitation Dr. Pin-Han Ho Associate Professor University of Waterloo,
Shi Bai, Weiyi Zhang, Guoliang Xue, Jian Tang, and Chonggang Wang University of Minnesota, AT&T Lab, Arizona State University, Syracuse University, NEC.
Network layer -- May Network layer Computer Networks.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
Congestion Control Reasons: - too many packets in the network and not enough buffer space S = rate at which packets are generated R = rate at which receivers.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
Transport Layer – TCP (Part2) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
CS 408 Computer Networks Congestion Control (from Chapter 05)
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #11 Shivkumar Kalyanaraman: GOOGLE: “Shiv RPI”
DTNs Delay Tolerant Networks. Fall, Kevin. Intel Research, Berkeley. SIGCOMM 2003 Aug25, A Delay- Tolerant Network Architecture for Challenged Internets.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
EEC-484/584 Computer Networks Lecture 12 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
DTNLite: Reliable Data Delivery in Sensornets Rabin Patra and Sergiu Nedevschi UCB Nest Retreat 2004.
Analysis and Simulation of a Fair Queuing Algorithm
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao (Part of the slides are based on Drs. Kurose & Ross ’ s slides for their Computer.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
1 TCP Transport Control Protocol Reliable In-order delivery Flow control Responds to congestion “Nice” Protocol.
Delay Tolerant Networking Gareth Ferneyhough UNR CSE Department
1 K. Salah Module 6.1: TCP Flow and Congestion Control Connection establishment & Termination Flow Control Congestion Control QoS.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Buffer Management for Shared- Memory ATM Switches Written By: Mutlu Apraci John A.Copelan Georgia Institute of Technology Presented By: Yan Huang.
Switching Techniques Student: Blidaru Catalina Elena.
Computer Measurement Group, India Reliable and Scalable Data Streaming in Multi-Hop Architecture Sudhir Sangra, BMC Software Lalit.
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
QoS Support in High-Speed, Wormhole Routing Networks Mario Gerla, B. Kannan, Bruce Kwan, Prasasth Palanti,Simon Walton.
Paper Group: 12 Data Transport in Challenged Networks Above papers are original works of respective authors, referenced here for academic purposes only.
A Delay-Tolerant Network Architecture for Challenged Internets Author: Kevin Fall Paper Presentation: Vinay Goel.
UNIT IP Datagram Fragmentation Figure 20.7 IP datagram.
2000 년 11 월 20 일 전북대학교 분산처리실험실 TCP Flow Control (nagle’s algorithm) 오 남 호 분산 처리 실험실
HighSpeed TCP for High Bandwidth-Delay Product Networks Raj Kettimuthu.
Copyright 2008 Kenneth M. Chipps Ph.D. Controlling Flow Last Update
Data Link Layer - 2 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Deadline-based Resource Management for Information- Centric Networks Somaya Arianfar, Pasi Sarolahti, Jörg Ott Aalto University, Department of Communications.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Lecture Network layer -- May Congestion control Algorithms.
ECE 4110 – Internetwork Programming
Random Early Detection (RED) Router notifies source before congestion happens - just drop the packet (TCP will timeout and adjust its window) - could make.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Queue Scheduling Disciplines
Or Sheffet Nov. 5 th, 2010 A Delay-Tolerant Network Architecture for Challenged Internets Kevin Falls A Data-Oriented (and beyond) Network Architecture.
Spring Computer Networks1 Congestion Control Sections 6.1 – 6.4 Outline Preliminaries Queuing Discipline Reacting to Congestion Avoiding Congestion.
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
24.1 Chapter 24 Congestion Control and Quality of Service ICE302 Term # 2 Lecture # 3 Md. Asif Hossain.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Real-time Transport for Assured Forwarding: An Architecture for both Unicast and Multicast Applications By Ashraf Matrawy and Ioannis Lambadaris From Carleton.
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
Transmission Control Protocol (TCP) TCP Flow Control and Congestion Control CS 60008: Internet Architecture and Protocols Department of CSE, IIT Kharagpur.
1 TCP ProtocolsLayer name DNSApplication TCP, UDPTransport IPInternet (Network ) WiFi, Ethernet Link (Physical)
Chapter 10 Congestion Control in Data Networks and Internets 1 Chapter 10 Congestion Control in Data Networks and Internets.
On-time Network On-Chip: Analysis and Architecture CS252 Project Presentation Dai Bui.
Other Methods of Dealing with Congestion
Confluent vs. Splittable Flows
Topics discussed in this section:
A Delay-Tolerant Network Architecture for Challenged Internets
IT351: Mobile & Wireless Computing
Other Methods of Dealing with Congestion
On-time Network On-chip
Switching Techniques.
Figure Areas in an autonomous system
Congestion Control Reasons:
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Presentation transcript:

Presenter: Anika Aziz National Institute of Informatics (NII), The Graduate University for Advanced Studies, Tokyo, Japan

In a Delay Tolerant Network (DTN), a custodian node which is storage constrained, can mitigate the congestion by reserving buffer space and applying queuing algorithm as a function of priority classes that is Class Of Services(COS). These COS can be mapped to a shared Priority Queuing (PQ) approach or to the separate PQs with different thresholds of the buffer.

The DTN architecture, the Bundle protocol Custody transfer in DTN Congestion in DTN The Storage Routing (SR) Proposed algorithms Analysis & comparison of the algorithms Conclusion Q & A

An acknowledged transfer of data to persistent, reliable storage A msg B ack (store the msg) (delete the msg) custody transfer complete (assumes custody transfer complete) - To use hop-by-hop reliability to improve end-to-end reliability - To free retransmission buffers at a sender as soon as possible - When faced with persistent demand…….congestion occurs

Rate based or window based congestion control techniques-nearly ineffective A region under the administrative control of a single entity can apply some form of admission control as a proactive means If its insufficient or unavailable, reactive means ( involving direct flow control) must be used Different solutions…cease accepting bundles with custody transfer & move bundles somewhere else

int -Message selection -Node selection push -Retrieval selectionpull alternate custody transfer source custody transferint dest -No custody refusal - Messages are dropped under the worst case situation Networks containing traffic sources which continuously generate application data (e.g. sensor networks) can not be flow controlled instead Storage routing

Apply some standard queue management or scheduling algorithm Priority classes that is Classes Of Service (COS), bulk, normal and expediated priorities, Applications specify the COS & data lifetime (TTL) for each message they send, based upon its desire to affect the delivery urgency for messages Push Lowest Priority mechanism as the push policy Expanding Ring Search (ERS) method

Enqueue ׀m׀ at n Priority0 ? ? Find alternative custodian x such that a x (t)>׀m׀ Is x Found? (ERS) Drop ׀m׀ Push ׀m׀ to x F n (t) is increased Y N Y N Compare with others in the queue Is it the lowest one? Y N Push the lowest one in the queue If all are of equal priority, push the message with the highest TTL Does ׀m׀ has the highest TTL? Y N Is still | m | > F n (t)? N Y Message ׀m׀ arrives at node n ׀m׀>F n (t) ? Y N Figure 4. The SR algorithm: COS mapped to the shared PQ

׀m׀> F n (t)? Priority0 ? Priority1 ? N Y YY N N Priority 2 ABM2 ABM1 Compute avg queue length of F n (t) avg<minth0 ? ׀m׀ is selected for push policy Y avg>max0 ? Drop Y Look into residual TTL value N High residual TTL? Y N Active Buffer Management (ABM0) technique Enqueue ׀m׀ At node n Message ׀m׀ arrives at node n N Figure 5. SR algorithm: COS mapped to PQ and thresholds of Active Buffer Management

Both the algorithm ensures to push the lowest priority message Messages are dropped in the worst case situation the 2 nd approach works more dynamically and precisely No Priority Inversion & Head-Of-Line blocking

The value of Custody Transfer and DTN congestion remains to be fully understood… until the DTN architecture is widely deployed and carries significant traffic loads Similar story as TCP protocol specification included no management of congestion… more than 10 years after the 1 st experiments with Internet technology were performed.