Explicit Allocation of Best-Effort Service Goal: Allocate different rates to different users during congestion Can charge different prices to different.

Slides:



Advertisements
Similar presentations
Martin Suchara, Ryan Witt, Bartek Wydrowski California Institute of Technology Pasadena, U.S.A. TCP MaxNet Implementation and Experiments on the WAN in.
Advertisements

Using Edge-To-Edge Feedback Control to Make Assured Service More Assured in DiffServ Networks K.R.R.Kumar, A.L.Ananda, Lillykutty Jacob Centre for Internet.
Quality of Service CS 457 Presentation Xue Gu Nov 15, 2001.
Computer Networking Lecture 20 – Queue Management and QoS.
Spring 2000CS 4611 Quality of Service Outline Realtime Applications Integrated Services Differentiated Services.
CSIT560 Internet Infrastructure: Switches and Routers Active Queue Management Presented By: Gary Po, Henry Hui and Kenny Chong.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
Congestion Control Reasons: - too many packets in the network and not enough buffer space S = rate at which packets are generated R = rate at which receivers.
CS 4700 / CS 5700 Network Fundamentals Lecture 12: Router-Aided Congestion Control (Drop it like it’s hot) Revised 3/18/13.
Router-assisted congestion control Lecture 8 CS 653, Fall 2010.
Advanced Computer Networking Congestion Control for High Bandwidth-Delay Product Environments (XCP Algorithm) 1.
The War Between Mice and Elephants LIANG GUO, IBRAHIM MATTA Computer Science Department Boston University ICNP (International Conference on Network Protocols)
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
Differentiated Services. Service Differentiation in the Internet Different applications have varying bandwidth, delay, and reliability requirements How.
1 EE 627 Lecture 11 Review of Last Lecture UDP & Multimedia TCP & UDP Interaction.
Explicit Congestion Notification ECN Tilo Hamann Technical University Hamburg-Harburg, Germany.
Networks: Congestion Control1 Congestion Control.
TCP Stability and Resource Allocation: Part I. References The Mathematics of Internet Congestion Control, Birkhauser, The web pages of –Kelly, Vinnicombe,
EE689 Lecture 7 Review of Last Lecture Differentiated Services Networks Performance results.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168) Limited Transmit (RFC 3042)
Analysis and Simulation of a Fair Queuing Algorithm
EE689 Lecture 5 Review of last lecture More on HPF RED.
1 EE 689 Lecture 3 Review of Last Lecture UDP & Multimedia TCP & UDP Interaction.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168)
A Real-Time Video Multicast Architecture for Assured Forwarding Services Ashraf Matrawy, Ioannis Lambadaris IEEE TRANSACTIONS ON MULTIMEDIA, AUGUST 2005.
Promoting the Use of End-to- End Congestion Control in the Internet Sally Floyd and Kevin Fall Presented by Scott McLaren.
1 Emulating AQM from End Hosts Presenters: Syed Zaidi Ivor Rodrigues.
ACN: Congestion Control1 Congestion Control and Resource Allocation.
Computer Networking Lecture 17 – Queue Management As usual: Thanks to Srini Seshan and Dave Anderson.
Random Early Detection Gateways for Congestion Avoidance
The War Between Mice and Elephants By Liang Guo (Graduate Student) Ibrahim Matta (Professor) Boston University ICNP’2001 Presented By Preeti Phadnis.
Promoting the Use of End-to-End Congestion Control & Random Early Detection of Network Congestion.
TCP Congestion Control
Congestion Control for High Bandwidth-Delay Product Environments Dina Katabi Mark Handley Charlie Rohrs.
Transport Layer 4 2: Transport Layer 4.
A Two-bit Differentiated Services Architecture K. Nichols, V. Jacobson, L. Zhang presented by Wendy Edwards.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 - Queuing and Basics of QoS.
1 Queue Management Hamed Khanmirza Principles of Networking University of Tehran.
1 Optical Burst Switching (OBS). 2 Optical Internet IP runs over an all-optical WDM layer –OXCs interconnected by fiber links –IP routers attached to.
Link Scheduling & Queuing COS 461: Computer Networks
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Wolfgang EffelsbergUniversity of Mannheim1 Differentiated Services for the Internet Wolfgang Effelsberg University of Mannheim September 2001.
Congestion Control - Supplementary Slides are adapted on Jean Walrand’s Slides.
Beyond Best-Effort Service Advanced Multimedia University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot November 2010 November.
Differentiated Services for the Internet Selma Yilmaz.
Queueing and Active Queue Management Aditya Akella 02/26/2007.
9.7 Other Congestion Related Issues Outline Queuing Discipline Avoiding Congestion.
Packet Scheduling and Buffer Management Switches S.Keshav: “ An Engineering Approach to Networking”
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 - Queuing and Basics of QoS.
Winter 2008CS244a Handout 81 CS244a: An Introduction to Computer Networks Handout 8: Congestion Avoidance and Active Queue Management Nick McKeown Professor.
 Last Class  This Class  Chapter 6.3. ~ 6.4.  TCP congestion control.
Random Early Detection (RED) Router notifies source before congestion happens - just drop the packet (TCP will timeout and adjust its window) - could make.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
1 Fair Queuing Hamed Khanmirza Principles of Network University of Tehran.
XCP: eXplicit Control Protocol Dina Katabi MIT Lab for Computer Science
Spring Computer Networks1 Congestion Control Sections 6.1 – 6.4 Outline Preliminaries Queuing Discipline Reacting to Congestion Avoiding Congestion.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Providing QoS in IP Networks
Real-time Transport for Assured Forwarding: An Architecture for both Unicast and Multicast Applications By Ashraf Matrawy and Ioannis Lambadaris From Carleton.
GRF Overview Simple as UBR from end system view – End system does no policing or traffic shaping – May transmit at line rate of ATM adaptor Modest requirements.
Internet Networking recitation #9
Topics discussed in this section:
Chapter 6 Congestion Avoidance
Congestion Control and Resource Allocation
TCP Congestion Control
Advanced Computer Networks
Computer Science Division
Internet Networking recitation #10
The War Between Mice & Elephants by, Matt Hartling & Sumit Kumbhar
Congestion Control Reasons:
Presentation transcript:

Explicit Allocation of Best-Effort Service Goal: Allocate different rates to different users during congestion Can charge different prices to different users Can identify non-responsive users at aggregation points Can control bandwidth allocation at sender or receiver Differential dropping algorithm at routers Tagging algorithm for profile meters at edge devices Consider TCP bulk-data transfers

Other Alternatives Priority scheduling - does not have a mechanism for weighted service Weighted Fair Queueing - may not scale at core routers with hundreds or thousands of flows Tagging packets as in or out, and treat them differently - similar to CLP bit in ATM

Allocated-Capacity Framework Define a service allocation profile for each user Routers favor traffic that is within those service profiles Tag packets as “in” or “out” A congested router preferentially drop “out” packets Packets from all users are aggregated into one FCFS queue Different users with different profiles will have different numbers of “in” packets in the queue Routers implement dropping scheme - don’t have to worry about packet re-ordering (and associated overhead or jitter) since FCFS is used Profile Meters at the edge implement tagging

Design Issues Policy meters at source side of network boundary Checking meters at receiver side of network boundary Profile meters toward the core only need to look at large aggregates Decoupling of differential dropping inside the network and service allocation profiles at the edge Only need to create a profile meter to adopt a new service Different service models: - dedicated rate for a source-destination pair - aggregated commitment to a range of destinations or anywhere (PVN). In this case, enough resources have to be provisioned to support all users sending “in” traffic simultaneously to any destination - Becomes challenging for sources that are bursty or with rate fluctuations (like TCP) to which the profile must conform

More Design Issues A range of service assurance should be provided A higher assurance service will cost more Statistically provisioned service allocation profiles do not describe a strict guarantee Different users should be allowed to have different expectations It is not necessary to separate out each individual flow, e.g., use a couple of queues for different levels of assurance. Within each queue, provide preferential treatment using “in” and “out” tags Statistical assurance is a matter of provisioning Receiver-controlled bandwidth allocation relies on TCP-ECN If receiver’s profile is exceeded, packets with ECN bit set are left unchanged or dropped to notify sender to slow down Problematic in presence of malicious users

Allocated Capacity for TCP Bulk Transfers Service allocation profile: provides a specific (target) average throughput to anywhere with a range of RTTs Provisioning: sum of all service allocation profiles sold to customers does not exceed the link speed Want TCP to oscillate between 0.66 and 1.33 of target rate, in fast recovery (not slow start) RIO: RED with in/out bit Twin RED algorithms, one for “in” and one for “out” Discriminates against “out” packets during congestion min threshold for “out” is smaller than that of “in” maxP for “out” is higher than that of “in” max threshold for “out” is smaller than that of “in” For an arriving “out” packet, use total avg queue length In a well-provisioned network, “in” packets are never dropped

Profile Meters Time-sliding window (TSW) tagger TSW provides a smooth estimate of the TCP sending rate over a period of time Tag packets as “out” once estimated average rate exceeds the target rate TSW remembers a window length worth of past history Approach 1: - If average rate exceeds target rate, tag packets as “out” with P = (avgrate - target)/target - Otherwise, tag packets as “in” Approach 2 (used later): - Window length in the order of an RTT (short history) - Start tagging packets as “out” once peak of TCP sawtooth exceeds 1.33 target rate

Difficulties If profile meter is not in host, it is difficult to set window length to an appropriate RTT Connections with longer RTTs than the presumed value will fall slightly under expectations If a burst of packets is tagged as “out”, this may force TCP into slow start Solution: space out packets tagged as “out” by using a probabilistic function To avoid these problems: - use profile meter in host - keep TCP in fast recovery using receiver-based control (where there are no drops) or using TCP-SACK

Observations TCP has a bias against long RTT connections TCP connections with same RTTs can get different throughput RIO-TSW improves performance of long RTT connections by giving them slightly lower rate than the target Receiver-based control avoids packet drops, resulting in TCP operating in fast recovery mode and hence better performance If the profile is “to anywhere”, there is a range of “anywhere” that is feasible with high assurance TCP-SACK can recover multiple losses in a window and remain in fast recovery ==> higher predictability Policy meter in host can insure differential service for a much longer range of RTTs (need “checking” meter to catch hosts that are cheating)

To Conclude Can detect non-responsive connections as having disproportional number of “out” packets being dropped “average throughput to everywhere” is harder than “average throughput for a source-destination pair” Design pushes most of the complexity to the edge of the network, making it scalable and flexible