Stochastic Differential Equation Modeling and Analysis of TCP- Windowsize Behavior EE228a Class Presentation Anshi Liang.

Slides:



Advertisements
Similar presentations
Michele Pagano – A Survey on TCP Performance Evaluation and Modeling 1 Department of Information Engineering University of Pisa Network Telecomunication.
Advertisements

TCP Variants.
Modeling TCP Throughput Jitendra Padhye Victor Firoiu Don Towsley Jim Kurose Presented by Jaebok Kim A Simple Model and its Empirical Validation.
TCP Vegas: New Techniques for Congestion Detection and Control.
Different TCP Flavors CSCI 780, Fall TCP Congestion Control Slow-start Congestion Avoidance Congestion Recovery Tahoe, Reno, New-Reno SACK.
Congestion Control Reasons: - too many packets in the network and not enough buffer space S = rate at which packets are generated R = rate at which receivers.
1 Transport Protocols & TCP CSE 3213 Fall April 2015.
TCP Congestion Control Dina Katabi & Sam Madden nms.csail.mit.edu/~dina 6.033, Spring 2014.
The War Between Mice and Elephants LIANG GUO, IBRAHIM MATTA Computer Science Department Boston University ICNP (International Conference on Network Protocols)
School of Information Technologies TCP Congestion Control NETS3303/3603 Week 9.
On Modeling Feedback Congestion Control Mechanism of TCP using Fluid Flow Approximation and Queuing Theory  Hisamatu Hiroyuki Department of Infomatics.
Transport Layer 3-1 Fast Retransmit r time-out period often relatively long: m long delay before resending lost packet r detect lost segments via duplicate.
Transport Layer3-1 Congestion Control. Transport Layer3-2 Principles of Congestion Control Congestion: r informally: “too many sources sending too much.
Modeling TCP Throughput Jeng Lung WebTP Meeting 11/1/99.
Computer Networks: TCP Congestion Control 1 TCP Congestion Control Lecture material taken from “Computer Networks A Systems Approach”, Third Ed.,Peterson.
Week 9 TCP9-1 Week 9 TCP 3 outline r 3.5 Connection-oriented transport: TCP m segment structure m reliable data transfer m flow control m connection management.
1 Lecture 9: TCP and Congestion Control Slides adapted from: Congestion slides for Computer Networks: A Systems Approach (Peterson and Davis) Chapter 3.
Computer Networks : TCP Congestion Control1 TCP Congestion Control.
Loss Model of TCP Presented by: Rajarshi Gupta WebTP Group.
1 Chapter 3 Transport Layer. 2 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
Networks : TCP Congestion Control1 TCP Congestion Control.
Networks : TCP Congestion Control1 TCP Congestion Control Presented by Bob Kinicki.
TCP in Heterogeneous Network Md. Ehtesamul Haque # P.
Estimating Congestion in TCP Traffic Stephan Bohacek and Boris Rozovskii University of Southern California Objective: Develop stochastic model of TCP Necessary.
TCP Congestion Control
TCP: flow and congestion control. Flow Control Flow Control is a technique for speed-matching of transmitter and receiver. Flow control ensures that a.
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
Transport Layer3-1 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles.
Modeling TCP Throughput: A Simple Model and its Empirical Validation Ross Rosemark Penn State University.
Principles of Congestion Control Congestion: informally: “too many sources sending too much data too fast for network to handle” different from flow control!
27th, Nov 2001 GLOBECOM /16 Analysis of Dynamic Behaviors of Many TCP Connections Sharing Tail-Drop / RED Routers Go Hasegawa Osaka University, Japan.
Stochastic Differential Equation Modeling and Analysis of TCP - Windowsize Behavior Presented by Sri Hari Krishna Narayanan (Some slides taken from or.
Lecture 9 – More TCP & Congestion Control
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March
1 Transport Layer Lecture 10 Imran Ahmed University of Management & Technology.
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP – III Reliability and Implementation Issues.
1 CS 4396 Computer Networks Lab TCP – Part II. 2 Flow Control Congestion Control Retransmission Timeout TCP:
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP – III Reliability and Implementation Issues.
Transport Layer 3- Midterm score distribution. Transport Layer 3- TCP congestion control: additive increase, multiplicative decrease Approach: increase.
1 Computer Networks Congestion Avoidance. 2 Recall TCP Sliding Window Operation.
TCP OVER ADHOC NETWORK. TCP Basics TCP (Transmission Control Protocol) was designed to provide reliable end-to-end delivery of data over unreliable networks.
H. OhsakiITCom A control theoretical analysis of a window-based flow control mechanism for TCP connections with different propagation delays Hiroyuki.
TCP Congestion Control 컴퓨터공학과 인공지능 연구실 서 영우. TCP congestion control2 Contents 1. Introduction 2. Slow-start 3. Congestion avoidance 4. Fast retransmit.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
1 ICCCN 2003 Modelling TCP Reno with Spurious Timeouts in Wireless Mobile Environments Shaojian Fu School of Computer Science University of Oklahoma.
Sandeep Kakumanu Smita Vemulapalli Gnan
Other Methods of Dealing with Congestion
TCP - Part II Relates to Lab 5. This is an extended module that covers TCP flow control, congestion control, and error control in TCP.
CUBIC Marcos Vieira.
Chapter 6 TCP Congestion Control
COMP 431 Internet Services & Protocols
Chapter 3 outline 3.1 Transport-layer services
A Stochastic Model of TCP Reno Congestion Avoidance and Control
TCP - Part II Relates to Lab 5. This is an extended module that covers TCP flow control, congestion control, and error control in TCP.
So far, On the networking side, we looked at mechanisms to links hosts using direct linked networks and then forming a network of these networks. We introduced.
Other Methods of Dealing with Congestion
Other Methods of Dealing with Congestion
Chapter 6 TCP Congestion Control
TCP Throughput Modeling
CS4470 Computer Networking Protocols
Congestion Control Reasons:
TCP Congestion Control
EE 122: Congestion Control The Sequel
Computer Science Division
Transport Layer: Congestion Control
Chapter 3 outline 3.1 Transport-layer services
TCP flow and congestion control
Presentation transcript:

Stochastic Differential Equation Modeling and Analysis of TCP- Windowsize Behavior EE228a Class Presentation Anshi Liang

Outline of this presentation Introduction Modeling Analysis Result Conclusion

Outline of this presentation Introduction Modeling Analysis Result Conclusion

Introduction Transmission Control Protocol (TCP) and networking: Used in many applications like HTTP, SMTP, FTP and Telnet Reliability Stability TCP friendly

Introduction Studies of TCP behavior with traditional models: Current models came from a source- centric point of view, assume that packets go out on the network with some loss probability p which may be constant or depend upon factors like current window size etc.

Introduction Study of TCP behavior with a new model: The new model considers the network as the source of losses (congestion) and sources receive these signals (loss indications) as a Possion process with some rate λ; Models the window size of TCP as a fluid, having continuous increments.

Introduction With this model: Builds a formulation of the window size behavior as a Possion Counter driven Stochastic Differential Equation (PCSDE); Analyzes the PCSDE and obtain closed form solutions for TCP throughput; Accounts for the maximum window size limitation for TCP connections.

Outline of this presentation Introduction Modeling Analysis Result Conclusion

Modeling-Loss modeling TCP implements the additive increase multiplicative decrease scheme. Window based method, at any time, window size number of data packets are allowed in the network. Detection of congestion is implicit. Source centric loss model.

Modeling-Loss modeling Network centric loss model: loss indications arrive at the source from the network at a certain rate, the arrival process is a Possion process.

Modeling-Traffic modeling Continuous increase, represented by dt/RTT. Triple duplicate ack (TD) losses and time out losses (TO). Possion process N with rate λ:

Modeling-Differential equation for the window size Let W be the window size: Slow start behavior is not included (the analysis with slow start is more complicate and does not affect the results significantly, claimed by the authors).

Outline of this presentation Introduction Modeling Analysis Result Conclusion

Analysis-maximum window size not considered Goal: the expected value of window size and throughput (R): Solve the above for E[W], we get:

Analysis-maximum window size not considered Consider the steady state solution (t  ∞): The throughput (R) of the connection is obtained by dividing the expected window size by RTT:

Analysis-maximum window size considered A new equation with maximum window size considered: Solve the equation we get:

Analysis-maximum window size considered Use the some mathematics technique we can get P[W=M], where λ TD =λ 2, λ TO =λ 1 and K is the service rate (1/RTT):

Analysis-timeout backoff The timeout backoff effect was not considered in the previous analysis; The window size does not grow for a period of T0 seconds, after which it starts growing at the normal rate. Here we use {WєTO} to represent the event of timeout

Analysis-timeout backoff We get: Where

Analysis-comparison Transform the formula to ones involving a packet loss probability: If we analyze TCP under the assumption of no timeouts (λ 1 =0):

Analysis-comparison In addition, many analyses of TCP are done with the assumption that there is no limit on window size, in this case, M  ∞:  Which is consistent with other research results derived from the source centric model.

Outline of this presentation Introduction Modeling Analysis Result Conclusion

Result Compare the throughput predicted by the formula with that of actual throughput (as well as throughput predicted by other formulas) The formula does quite well in regions of moderately low to high throughput. It does not do as well in the case of very low throughput

Result

Reasons for low performance in the very low throughput case: 1.TCP goes into multiple timeouts, contradicted with the assumption with only one timeout; 2.The estimate of λ TO is not accurate, since only very few packets get transmitted, there are only a few loss indications, thereby artificially introducing a low loss arrival rate

Conclusion A completely different loss model. Quite accurate in predicting real life measurements. Ignore some details like: fast recovery, fast retransmit, slow start; make a fluid approximation of the window size. The paper is too short, adding more details and steps inside may be helpful.

Observation The paper ignored some details like multiple timeout and slow start but still have a pretty good match in the high throughput case. These details are significant only when the network is highly congested, which translate to the low throughput case. So it is not strange to have a good match in the high throughput case.

Thank you very much! Anshi Liang