All Rights Reserved © Alcatel-Lucent 2006, ##### Volker Hilt Bell-Labs/Alcatel-Lucent SIP Overload Control Report from the IETF Design.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Congestion Control Algorithms
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
Optimizing Buffer Management for Reliable Multicast Zhen Xiao AT&T Labs – Research Joint work with Ken Birman and Robbert van Renesse.
Congestion Control Created by M Bateman, A Ruddle & C Allison As part of the TCP View project.
CS 408 Computer Networks Congestion Control (from Chapter 05)
Source-Adaptive Multilayered Multicast Algorithms for Real- Time Video Distribution Brett J. Vickers, Celio Albuquerque, and Tatsuya Suda IEEE/ACM Transactions.
AQM for Congestion Control1 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
ACN: IntServ and DiffServ1 Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook “ Computer.
Computer Networks: Performance Measures1 Computer Network Performance Measures.
Building a Controlled Delay Assured Forwarding Class in DiffServ Networks Parag Kulkarni Nazeeruddin Mohammad Sally McClean Gerard Parr Michaela Black.
Promoting the Use of End-to- End Congestion Control in the Internet Sally Floyd and Kevin Fall Presented by Scott McLaren.
Trade-offs and open issues with path discovery and transport or not all requirements are orthogonal… Henning Schulzrinne Columbia University
Multipath Protocol for Delay-Sensitive Traffic Jennifer Rexford Princeton University Joint work with Umar Javed, Martin Suchara, and Jiayue He
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
1 Scheduling calls with known holding times Reinette Grobler * Prof. M. Veeraraghavan University of Pretoria Polytechnic University
Overload in SIP Jonathan Rosenberg Cisco Systems.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
September 27, Instabilities and Oscillations in Networks of Queues Matthew Andrews Bell Labs Joint work with Alex Slivkins (Cornell)
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
Volker Hilt Bell Labs/Alcatel-Lucent SIP Overload Control IETF Design Team Status.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
This document is for informational purposes only, and Tekelec reserves the right to change any aspect of the products, features or functionality described.
QoS Support in High-Speed, Wormhole Routing Networks Mario Gerla, B. Kannan, Bruce Kwan, Prasasth Palanti,Simon Walton.
MIT Fun queues for MIT The importance of queues When do queues appear? –Systems in which some serving entities provide some service in a shared.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
Sami Al-wakeel 1 Data Transmission and Computer Networks The Switching Networks.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Copyright 2008 Kenneth M. Chipps Ph.D. Controlling Flow Last Update
TCP with Variance Control for Multihop IEEE Wireless Networks Jiwei Chen, Mario Gerla, Yeng-zhong Lee.
SIP working group IETF#70 Essential corrections Keith Drage.
Lecture # 03 Switching Course Instructor: Engr. Sana Ziafat.
RNAP: A Resource Negotiation and Pricing Protocol Xin Wang, Henning Schulzrinne Columbia University
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
SIP Overload Design Team Status Jonathan Rosenberg Cisco.
SIP Performance Benchmarking draft-ietf-bmwg-sip-bench-term-01 draft-ietf-bmwg-sip-bench-meth-01 March 22, 2010 Prof. Carol Davids, Illinois Inst. of Tech.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
Cooperation between stations in wireless networks Andrea G. Forte, Henning Schulzrinne Department of Computer Science, Columbia University Presented by:
Overload Design Team Status Jonathan Rosenberg Cisco.
Diameter Overload DIME WG IETF 87 July, Starting Point DIAMETER_TOO_BUSY provides little guidance on what a Diameter client should do when it receives.
MATE: MPLS Adaptive Traffic Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs Michigan altech Fujitsu 2006.
Key insight.  With drop-when-decoded, the busy period of the virtual queue contributes to the physical queue size calculation  Responding to ACK of the.
Mitigating Congestion in Wireless Sensor Networks Bret Hull, Kyle Jamieson, Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laborartory.
Spring Computer Networks1 Congestion Control Sections 6.1 – 6.4 Outline Preliminaries Queuing Discipline Reacting to Congestion Avoiding Congestion.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Congestion Control 0.
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
SIP Overload Control draft-hilt-sipping-overload-00 Volker Hilt Daryl Malas Indra Widjaja
Computer Communication & Networks Lecture # 03 Circuit Switching, Packet Switching Nadeem Majeed Choudhary
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Volker Hilt Bell Labs/Alcatel-Lucent SIP Overload Control IETF Design Team Status.
Chapter 10 Congestion Control in Data Networks and Internets 1 Chapter 10 Congestion Control in Data Networks and Internets.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Muhammad Waseem Iqbal Lecture # 20 Data Communication.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
William Stallings Data and Computer Communications
Congestion Control in Data Networks and Internets
Jonathan Rosenberg Volker Hilt Daryl Malas
TCP Congestion Control
William Stallings Data and Computer Communications
Congestion Control (from Chapter 05)
SIP Server Overload Control: Design and Evaluation
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Congestion Control (from Chapter 05)
Presentation transcript:

All Rights Reserved © Alcatel-Lucent 2006, ##### Volker Hilt Bell-Labs/Alcatel-Lucent SIP Overload Control Report from the IETF Design Team

Slide 2 | Volker Hilt | March 2008 Overview IETF SIP Overload Control Design Team Simulation Results for SIP SIP Overload Control Conclusion

Slide 3 | Volker Hilt | March 2008 IETF SIP Overload Control Design Team Team was founded beginning of 2007 by SIPPING WG Members  Eric Noel, Carolyn Johnson (AT&T Labs)  Volker Hilt, Indra Widjaja (Bell-Labs/Alcatel Lucent)  Charles Shen, Henning Schulzrinne (Columbia University)  Ping Wu*, Tadeusz Drwiega*, Mary Barnes (Nortel)  Jonathan Rosenberg (Cisco)  Nick Stewart (British Telecom) Developed four independent simulation tools  AT&T, Bell-Labs, Columbia, Nortel*  Simulation results for SIP  Proposals and initial results for overload controlled SIP. * Left design team in fall 2007

Slide 4 | Volker Hilt | March 2008 Simulation Results Setup and Assumptions SIP server topology consisting of UAs, edge proxies and core proxies. UAs are connected to edge proxies.  Each UA creates a single call (INVITE followed by BYE transaction).  Poisson arrival rate.  Load is equally distributed across edge proxies. Edge proxies forward requests to a core proxies.  Edge proxies reject a request if one/both core proxies are overloaded.  To break up the problem domain we assume edge proxies have infinite capacity. Core proxies forward call to the edge proxy of the destination.  Capacity: 500 messages per second at a constant rate. All proxies are modeled as queuing system.  Queue size: 500 messages Media path congestion is not considered. Proxy Model Server Topology

Slide 5 | Volker Hilt | March 2008 Simulation Results Client-to-Server vs. Server-to-Server Communication Server-to-Server Communication D UA-to-Server Communication a b c z … Server-to-Server Communication A server sends a stream of SIP requests to other servers. SIP request streams between servers are dynamic.  Load between servers can be reduced gradually by rejecting/retrying some of the requests. Overload control can use feedback to request that an upstream server reduces traffic to a desired amount. Client-to-Server Communication UAs typically only initiate a single request at a time.  A UA can be told to wait a certain time before re- sending the request. Problem: a large number of UAs can cause overload even if all UAs are told to back-up. Feedback-based overload control does not prevent overload in the server. D B A C

Slide 6 | Volker Hilt | March 2008 Simulation Results Scenario 1: No Overload Control Assumptions Proxies do not use any overload control. When the input buffer of a proxy is filled up, messages are dropped. Requests that failed at one of the core proxies are not retried. Results The number of INVITE transactions completed (i.e., calls set up) drops to zero. Congestion collapse!

Slide 7 | Volker Hilt | March 2008 Simulation Results Scenario 2: 503 (Service Unavailable) – Reject Requests Assumptions Proxies use 503 (Service Unavailable) responses to reject requests during overload. Watermark-based (Bang-Bang) overload control algorithm:  Enter overload state when queue length reaches high watermark (400 messages)  Enter normal state when queue length drops below low watermark (300 messages)  When in overload state a proxy rejects all incoming requests with 503 responses. Edge proxies do not retry requests that are rejected. Results Provides little or no improvement compared to no overload control.  Note: Performance can be improved by using other control algorithms. Congestion collapse!

Slide 8 | Volker Hilt | March 2008 Simulation Results Scenario 3: 503 (Service Unavailable) - Retry Requests Assumptions Same assumptions as in Scenario 2. But: edge proxies retry all requests that have been rejected by one core proxy at the second core proxy.  Requests are rejected only if they fail at both core proxies. Results Retrying requests decreases goodput.  Increased load caused by retries. Congestion collapse!

Slide 9 | Volker Hilt | March 2008 SIP Overload Control Mechanisms and Algorithms The IETF SIP overload design team has started to investigate solutions for more effective SIP overload control mechanisms. Current simulations of SIP overload control mechanisms are focusing on:  Server-to-server communication.  Feedback channel between core and edge proxy (hop-by-hop).  Four different overload control mechanisms:  on/off control,  rate-based control,  loss-based control,  window-based control. Simulation results available for these four mechanisms and different control algorithm proposals.  Contributed by AT&T Labs, Bell-Labs/Alcatel-Lucent, Columbia University  Initial simulation results.

Slide 10 | Volker Hilt | March 2008 AB C D AB C D Hop-by-hop End-to-end SIP Overload Control Hop-by-hop vs. end-to-end SIP requests for the same source/destination pair can travel along different paths, depending on  provider policies, services invoked, forwarding rules, request forking, load balancing, etc. A SIP proxy cannot make assumptions about which downstream proxies will be on the path of a SIP request. Hop-by-hop overload control  Server provides overload control feedback to its direct upstream neighbor.  No knowledge about routing policies of neighbors needed.  Neighbor processes feedback and rejects/retries excess requests if needed. End-to-end overload control  Feedback from all servers on all paths between a source and a destination needs to be considered.  A server needs to track the load of all servers a request may traverse on its way to the target.  Complex and challenging since requests for the same destination may travel along very different paths.  May be applicable in limited, tightly controlled environments. x x

Slide 11 | Volker Hilt | March 2008 SIP Overload Control AT&T Labs Simulation Results  Every sampling interval, Core Proxies estimate optimal control parameters such that queueing delay is within a pre-defined target delay. Core Proxies solely rely on measured offered load and measured internal queueing delay (no Edge Proxies to Core Proxies signaling).  On/off control builds upon existing SIP 503 Retry-After capability. Each control interval, Core Proxies estimate optimal retry after timer value and share with Edge Proxies within the 503 messages.  In rate-based control, each control interval, Core Proxies estimate optimal controlled load and active sources, then share with Edge Proxies either with dedicated signaling or as overhead in response messages. Edge Proxies execute percent blocking throttling algorithm.

Slide 12 | Volker Hilt | March 2008 SIP Overload Control Bell-Labs/Alcatel-Lucent Simulation Results Loss-based overload control. Feedback-loop between receiver (core proxy) and sender (edge proxy).  Feedback in SIP responses. Receiver driven control algorithm.  Estimates current processor utilization.  Compares to target processor utilization.  Multiplicative increase and decrease of loss-rate to reach target utilization. Sender adjusts the load it sends to receiver based on the feedback received using percent-blocking. Overload control algorithms:  Occupancy algorithm (OCC), Acceptance Rate/Occupancy algorithm (ARO)

Slide 13 | Volker Hilt | March 2008 SIP Overload Control Columbia University Simulation Results  Window-based overload control  SIP session as control unit, dynamically estimated from processed SIP messages  Receiver (Core Proxy in the scenario)  decreases window on session arrival  dynamically computes available window  splits and feedbacks to active Senders  Feedback piggybacked in responses/requests  Sender (Edge Proxy in the scenario)  forwards a session only if window slot available  Three different window adaptation algorithms work equally well in steady state  CU-WIN-I: keep current estimated sessions below total allowed sessions given target delay  CU-WIN-II: open up the window after a new session is processed  CU-WIN-III: discrete version of CU-WIN-I, divided into control intervals

Slide 14 | Volker Hilt | March 2008 Conclusion Current Status The SIP protocol is vulnerable to congestion collapse under overload.  The 503 response mechanism is insufficient to avoid congestion collapse.  Simulation results confirm problems. The IETF design team is investigating different mechanisms and algorithms for SIP overload control.  Initial simulation results are available.  Results show stable server-to-server goodput under overload. Open Issues  Overload control with uneven distribution of load and fluctuating load conditions.  Dynamic arrival and departure of servers.  Fairness between upstream neighbors. Comments and suggestions are very welcome!