Viability of Congestion Exposure. Framing the Discussion This discussion is about congestion exposure – not any specific solution Viability and tractability.

Slides:



Advertisements
Similar presentations
Quality of Service in IN-home digital networks An Architecture for QoS guarantees and Routing in Wireless/Mobile Networks Indu Mahadevany and Krishna M.
Advertisements

Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Congestion Control Algorithms
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
COM555: Mobile Technologies Location-Identifier Separation.
IPv6: The Next Generation Internet Dipen Chauhan.
The Power of Explicit Congestion Notification Aleksandar Kuzmanovic Northwestern University
Oct 26, 2004CS573: Network Protocols and Standards1 IP: Routing and Subnetting Network Protocols and Standards Autumn
Network Layer: IPv6 IS250 Spring 2010
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168) Limited Transmit (RFC 3042)
IPv6 and Overlays EE122 Introduction to Communication Networks Discussion Section.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168)
Chapter 4 Network Layer slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks Lecture 13.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #8 Explicit Congestion Notification (RFC 3168) Limited Transmit.
CS 6401 IPv6 Outline Background Structure Deployment.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Host Mobility for IP Networks CSCI 6704 Group Presentation presented by Ye Liang, ChongZhi Wang, XueHai Wang March 13, 2004.
What does it take to define an architecture? (Part 2) David D. Clark July, 2012.
Midterm Review - Network Layers. Computer 1Computer 2 2.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Security Level: Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext.
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
NSIS Mobility Reality Check Drafts talk about moving extensive state in the network between old and new routing path.  Excuse me but what state are we.
ConEx Concepts and Uses Toby Moncaster John Leslie (JLC) Bob Briscoe (BT) Rich Woundy (ComCast) draft-moncaster-conex-concepts-uses-01.
ECEN “Internet Protocols and Modeling” Course Materials: Papers, Reference Texts: Bertsekas/Gallager, Stuber, Stallings, etc Grading (Tentative):
1 CSCI 233 Internet Protocols Class 2 Dave Roberts.
ConEx Concepts and Abstract Mechanism draft-mathis-conex-abstract-mech-00.txt draft-mathis-conex-abstract-mech-00.txt Matt Mathis, Google Bob Briscoe,
Wolfgang EffelsbergUniversity of Mannheim1 Differentiated Services for the Internet Wolfgang Effelsberg University of Mannheim September 2001.
Congestion exposure BoF candidate protocol: re-ECN Bob Briscoe Chief Researcher, BT Nov 2009 This work is partly funded by Trilogy, a research project.
Quick-Start for TCP and IP Draft-amit-quick-start-03.txt A.Jain, S. Floyd, M. Allman, and P. Sarolahti ICIR, December
CONEX BoF. Welcome to CONEX! Chairs: –Leslie Daigle –Philip Eardley Scribe Note well.
An end-to-end usage of the IPv6 flow label
Making stuff real re-feedback Bob Briscoe, BT Research Nov 2005 CRN DoS resistant Internet w-g.
Towards Adaptive Congestion Management for Interactive Real- Time Communications Dirk KutscherMirja KühlewindBob Briscoe IAB/IRTF Congestion Control Workshop.
IPv 邱文揚 Joseph 李家福 Frank. Introduction The scale of IPv4 Internet has become far larger than one could ever imagine when designing.
Principles & Constraints Philip Eardley. Application-agnostic The CONEX protocol should be open about (independent of) the responses it allows to the.
Chapter 11.4 END-TO-END ISSUES. Optical Internet Optical technology Protocol translates availability of gigabit bandwidth in user-perceived QoS.
Incentives Alignment Whitepaper Progress since Athens.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Networks, Part 2 March 7, Networks End to End Layer  Build upon unreliable Network Layer  As needed, compensate for latency, ordering, data.
Company LOGO Network Architecture By Dr. Shadi Masadeh 1.
CSE5803 Advanced Internet Protocols and Applications (13) Introduction Existing IP (v4) was developed in late 1970’s, when computer memory was about.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Chapter 3 TCP and IP 1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Internet.
Congestion Notification Process for Real-Time Traffic draft-babiarz-tsvwg-rtecn-04.txt Jozef Babiarz Kwok Ho Chan
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
IP: Addressing, ARP, Routing
Internet Networking recitation #9
Mobile IP.
IP - The Internet Protocol
IEEE 802 OmniRAN Study Group: SDN Use Case
Click to edit Master subtitle style
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
Internet technologies
IP - The Internet Protocol
CONEX BoF.
Net431:advanced net services
Cisco Real Exam Dumps IT-Dumps
Data and Computer Communications by William Stallings Eighth Edition
IP - The Internet Protocol
Internet Networking recitation #10
IETF-100, MPTCP WG, November 2017
IP - The Internet Protocol
Anup K.Talukdar B.R.Badrinath Arup Acharya
IPv4 Addressing By, Ishivinder Singh( ) Sharan Patil ( )
IP - The Internet Protocol
DetNet Data Plane Solutions draft-ietf-detnet-dp-sol-ip-02  draft-ietf-detnet-dp-sol-mpls-02  Bala’zs Varga, Jouni Korhonen, Janos Farkas, Lou Berger,
Requirements for IPv6 Routers draft-ali-ipv6rtr-reqs-02
Presentation transcript:

Viability of Congestion Exposure

Framing the Discussion This discussion is about congestion exposure – not any specific solution Viability and tractability – capturing the answers to some of the larger questions en route to nailing up a chartered activity These are a work in progress – intentionally

Viability Issue #1 What are the points in favour of/against congestion exposure as an architecturally sound technique to specify for the Internet? (NB -- this is about congestion exposure, as constrained in the agreed principles, not any particular proposal)? Suggested: – This is about network flows or packets, not applications or services, so future applications and services are served, as well it makes networks work better for real-time applications, now – Congestion exposure provides mechanisms to declare awareness of congestion elsewhere on the path WITHOUT prescribing behaviours. many different behaviours are possible – This is also network agnostic in the sense that no pre-existing agreements or interpretations need be in place to make the congestion exposure work. (*Accounting* for it is a separate matter, but that's okay)

Viability Issue #2 The expectation is that congestion exposure information will be carried in IP packet headers. Is there really enough room to do that effectively? For discussion: – In IPv4? Bits – In IPv6? extension header has space, but practical limits – This assumes tight timing -- that feedback is received and acted upon such that subsequent packets will experience the same or similar network state. What are the implications (or likelihood) of different paths? Or, are there other network state changes that will (could) change in that timeframe (now or in future developments). But, would anything else be better?

Viability Issue #3 Does this scale -- to the whole Internet? is it deployable? Suggested – Discussions of working with ECN-enabled and non-ECN enabled routers begins to address this. – There should not be issues with scale (processing, state) in core routers In general it is only border devices that are expected to change in response to this (aside from any issues of ECN-capability).

Illustration: feasible unilateral re-ECN deployment scenarios with incentives 1.senders saying “It’s not me” unilaterally deploy re-ECN – no need for ECN in Net – e.g. LEDBAT, or Windows/Linux for majority of users 2.receivers deploy re-ECN (mostly because they are also senders) 3.nets deploy ECN to reduce queues and check metrics another: mobile operators mandate for network & handsets via 3GPP there will be broken middleboxes – will require re-ECN black hole detection & fall-back senderforwardingreceivernetwork anti-cheating integrity re-ECNECN re-ECNideal ECNok but misses some feedback 3. re-ECN some ECN (re-)ECN ok (ideal) 2.some droppartial? 1.re-ECNdrop partial; but detail design TBA

Viability Issue #4 What *does* this close off? I.e., apart from the "last bit" issue, with IPv4, does this cause networks to react badly to new types of flows? Stifle innovation? Or...?