Aditya Akella A Game-Theoretic Analysis of TCP Aditya Akella, Srinivasan Seshan (CMU) Richard Karp, Christos Papadimitriou, Scott Shenker.

Slides:



Advertisements
Similar presentations
Balaji Prabhakar Active queue management and bandwidth partitioning algorithms Balaji Prabhakar Departments of EE and CS Stanford University
Advertisements

Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
CSIT560 Internet Infrastructure: Switches and Routers Active Queue Management Presented By: Gary Po, Henry Hui and Kenny Chong.
Congestion Control Reasons: - too many packets in the network and not enough buffer space S = rate at which packets are generated R = rate at which receivers.
Congestion Control Algorithms: Open Questions Benno Overeinder NLnet Labs.
Game Theory and Computer Networks: a useful combination? Christos Samaras, COMNET Group, DUTH.
Congestion Control Created by M Bateman, A Ruddle & C Allison As part of the TCP View project.
TCP Congestion Control Dina Katabi & Sam Madden nms.csail.mit.edu/~dina 6.033, Spring 2014.
CS 268: Lecture 8 Router Support for Congestion Control Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
CS 4700 / CS 5700 Network Fundamentals Lecture 12: Router-Aided Congestion Control (Drop it like it’s hot) Revised 3/18/13.
Network and Protocol Mechanisms: How well do they collaborate? Ageliki Tsioliaridou.
Selfish Behavior and Stability of the Internet: A Game-Theoretic Analysis of TCP Presented by Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
PERSISTENT DROPPING: An Efficient Control of Traffic Aggregates Hani JamjoomKang G. Shin Electrical Engineering & Computer Science UNIVERSITY OF MICHIGAN,
Advanced Computer Networking Congestion Control for High Bandwidth-Delay Product Environments (XCP Algorithm) 1.
The War Between Mice and Elephants LIANG GUO, IBRAHIM MATTA Computer Science Department Boston University ICNP (International Conference on Network Protocols)
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #05: SOLUTIONS Shivkumar Kalyanaraman: GOOGLE: “Shiv.
Network Congestion Gabriel Nell UC Berkeley. Outline Background: what is congestion? Congestion control – End-to-end – Router-based Economic insights.
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
1 EE 627 Lecture 11 Review of Last Lecture UDP & Multimedia TCP & UDP Interaction.
Networks: Congestion Control1 Congestion Control.
Aditya Akella Exploring Congestion Control Aditya Akella With Srini Seshan, Scott Shenker and Ion Stoica.
EE689 Lecture 5 Review of last lecture More on HPF RED.
1 EE 689 Lecture 3 Review of Last Lecture UDP & Multimedia TCP & UDP Interaction.
TCP Congestion Control TCP sources change the sending rate by modifying the window size: Window = min {Advertised window, Congestion Window} In other words,
A TCP With Guaranteed Performance in Networks with Dynamic Congestion and Random Wireless Losses Stefan Schmid, ETH Zurich Roger Wattenhofer, ETH Zurich.
1 Emulating AQM from End Hosts Presenters: Syed Zaidi Ivor Rodrigues.
Active Queue Management Rong Pan Cisco System EE384y Spring Quarter 2006.
Computer Networking Lecture 17 – Queue Management As usual: Thanks to Srini Seshan and Dave Anderson.
On Multi-Path Routing Aditya Akella 03/25/02. What is Multi-Path Routing?  Dynamically route traffic Multiple paths to a destination Path taken dependant.
The War Between Mice and Elephants By Liang Guo (Graduate Student) Ibrahim Matta (Professor) Boston University ICNP’2001 Presented By Preeti Phadnis.
TCP Congestion Control
Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs.
UCB Improvements in Core-Stateless Fair Queueing (CSFQ) Ling Huang U.C. Berkeley cml.me.berkeley.edu/~hlion.
Diffusion Early Marking Department of Electrical and Computer Engineering University of Delaware May / 2004 Rafael Nunez Gonzalo Arce.
Link Scheduling & Queuing COS 461: Computer Networks
CA-RTO: A Contention- Adaptive Retransmission Timeout I. Psaras, V. Tsaoussidis, L. Mamatas Demokritos University of Thrace, Xanthi, Greece This study.
Advanced Computer Networking
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 A TCP Friendly Traffic Marker for IP Differentiated Services Feroz Azeem, Shiv Kalyanaraman,
27th, Nov 2001 GLOBECOM /16 Analysis of Dynamic Behaviors of Many TCP Connections Sharing Tail-Drop / RED Routers Go Hasegawa Osaka University, Japan.
High-speed TCP  FAST TCP: motivation, architecture, algorithms, performance (by Cheng Jin, David X. Wei and Steven H. Low)  Modifying TCP's Congestion.
Queueing and Active Queue Management Aditya Akella 02/26/2007.
Michael Schapira Yale and UC Berkeley Joint work with P. Brighten Godfrey, Aviv Zohar and Scott Shenker.
Lecture 9 – More TCP & Congestion Control
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP – III Reliability and Implementation Issues.
WB-RTO: A Window-Based Retransmission Timeout Ioannis Psaras Demokritos University of Thrace, Xanthi, Greece.
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP – III Reliability and Implementation Issues.
David Wetherall Professor of Computer Science & Engineering Introduction to Computer Networks Fairness of Bandwidth Allocation (§6.3.1)
We used ns-2 network simulator [5] to evaluate RED-DT and compare its performance to RED [1], FRED [2], LQD [3], and CHOKe [4]. All simulation scenarios.
H. OhsakiITCom A control theoretical analysis of a window-based flow control mechanism for TCP connections with different propagation delays Hiroyuki.
XCP: eXplicit Control Protocol Dina Katabi MIT Lab for Computer Science
Spring Computer Networks1 Congestion Control Sections 6.1 – 6.4 Outline Preliminaries Queuing Discipline Reacting to Congestion Avoiding Congestion.
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP Congestion Control.
Univ. of TehranIntroduction to Computer Network1 An Introduction Computer Networks An Introduction to Computer Networks University of Tehran Dept. of EE.
1 Transport Bandwidth Allocation 3/29/2012. Admin. r Exam 1 m Max: 65 m Avg: 52 r Any questions on programming assignment 2 2.
1 Network Transport Layer: TCP Analysis and BW Allocation Framework Y. Richard Yang 3/30/2016.
Dynamic Behavior of Slowly Responsive Congestion Control Algorithms (Bansal, Balakrishnan, Floyd & Shenker, 2001)
Other Methods of Dealing with Congestion
Introduction to Congestion Control
Congestion Control: The Role of the Routers
TCP Congestion Control
TCP Congestion Control
Lecture 19 – TCP Performance
So far, On the networking side, we looked at mechanisms to links hosts using direct linked networks and then forming a network of these networks. We introduced.
Other Methods of Dealing with Congestion
Other Methods of Dealing with Congestion
RAP: Rate Adaptation Protocol
Advanced Computer Networks
TCP Congestion Control
Congestion Control Reasons:
TCP Congestion Control
Presentation transcript:

Aditya Akella A Game-Theoretic Analysis of TCP Aditya Akella, Srinivasan Seshan (CMU) Richard Karp, Christos Papadimitriou, Scott Shenker (ICSI/UC Berkeley)

Aditya Akella 1980s: Network Collapse In the 80s’s, naïve behavior caused the network to collapse Internet ? ?

Aditya Akella Salvation! Socially responsible congestion control implemented at end-points was given credit for saving the Internet Internet

Aditya Akella Salvation? Can the network survive with greedy (but intelligent) behavior? Internet

Aditya Akella Why Bother?  If greed is bad, today’s Internet is stable because –  End-points are consciously social and/or  It is hard to modify end-hosts to be greedy  If not, we need no such mechanism  Can rely on end-point behavior for efficient operation We may need mechanisms to monitor, dissuade aggressive behavior

Aditya Akella Outline  The TCP Game  Results for the TCP Game  Mechanisms for Nash Equilibrium

Aditya Akella The TCP Game  TCP Game  Flows attempt to maximize application throughput  Flows modify their AIMD parameters   Must still provide reliability  What happens at Nash Equilibrium?  No flow can gain in throughput by unilaterally changing its parameter choice

Aditya Akella The TCP Game  Analyze a simplified version of this Game for…  Parameters at the Nash Equilibrium  Efficiency at the Nash Equilibrium  Link Goodput and per-flow Loss rate  Study symmetric Nash Equilibria only

Aditya Akella Factors Affecting the Nash Equilibrium End-points show greed by adjusting factor (3) alone. Factors (1), (2) are part of the environment. (1) End-point’s loss recovery mechanism  Reno vs. SACK (primitive vs. modern)  Depends on TCP implementation (2) Loss assignment at routers  Bursty loss assignment vs. randomized uniform losses (3) Congestion control parameters of the flows  How flows are allowed to vary their parameters  Under complete control of end-point

Aditya Akella Outline  The TCP Game  Results for the TCP Game  Mechanisms for Nash Equilibrium

Aditya Akella Results – Road-map  First, consider FIFO droptail buffers  Most wide-spread in today’s Internet  Efficiency at Nash Equilibrium for Tahoe, Reno, SACK-style loss recovery  Then, discuss RED buffers briefly  As above  Put the results together

Aditya Akella FIFO Droptail Buffering  Droptail buffers punish bursty behavior  Unintentionally so  Observed by designers of RED AQM  Flows with bursty transmission incur losses proportional to their burstiness  AIMD flows incur losses in bursts of size ~  (AI parameter)

Aditya Akella Results for FIFO Droptail Buffers – A Sample  Greedy flows don’t gain by using large  ’s  Flows observe burst losses  Reno’s severe reaction (time-outs) kicks in Reno-style loss recovery (flows vary , keeping  ) EE Link Goodput Per-flow Loss rate 1100%0.15% Thruput of flow n (Mbps)  n of flow n    n  

Aditya Akella Results for FIFO Droptail Buffers – A Sample  Greedy flows gain by using     No burst losses since  EE Link Goodput Per-flow Loss rate %1.5% Reno-style loss recovery (flows vary , keeping  ) Thruput of flow n (Mbps)    n      n    n of flow n

Aditya Akella Results for FIFO Droptail Buffers – A Sample  Nash Equilibrium is efficient!  Goodput is high and loss rate is low  Greedy behavior might work out  But unfair  Since    (AIAD)  E  E  Link Goodput Per-flow Loss rate (1, 0.98)100%1.5% Reno-style loss recovery (flows vary  together)

Aditya Akella RED Buffering  RED buffers “spread” losses uniformly across flows  Identical loss %-age across flows irrespective of parameters used  Greater greed of a few flows causes a small increase in overall loss rate  Bursty flows do not experience burst losses, unlike droptail buffers

Aditya Akella Results for RED Buffers – A Sample  Aggression is always good  TCP SACK  high loss rate doesn’t affect goodput  RED  greater aggression will cause minor increase in overall loss rate  Link Goodput Per-flow Loss rate 4896%5% SACK-style loss recovery (flows vary  alone;  )  n of flow n Thruput of flow n (Mbps)    n      n      n   A B c

Aditya Akella Results for RED Buffers – A Sample  Nash Equilibrium is inefficient  Parameter setting is very aggressive  Loss rate is high  Potential congestion collapse! SACK-style loss recovery Flows vary  together      Link Goodput Per-flow Loss rate (23, 0.98)96%5.70%

Aditya Akella Results for the TCP Game – A Summary DroptailRED Tahoe    high,    , Inefficient     high,     , Inefficient Reno       , Efficient, Unfair     high,     , Inefficient SACK     high,     , Inefficient    high,     , Inefficient

Aditya Akella Discussion Question: Does selfish congestion control endanger network efficiency? Common Intuition: Yes, since flows would always gain from being more aggressive. Our Answer: Not necessarily true!  In the traditional setting (Reno end-points and droptail routers), network operates fine despite selfish behavior  Selfish behavior very detrimental with modern loss recovery and queue management schemes

Aditya Akella Outline  The TCP Game  Results for the TCP Game  Mechanisms for Nash Equilibrium

Aditya Akella Mechanisms for Nash Equilibrium  We need mechanisms to explicitly counter aggressive behavior  Has been a hot topic in the past  Fair Queuing discourages aggressive behavior  But needs per-flow state  RED-PD, AFD etc. explored lighter mechanisms  Aim to ensure fair bandwidth allocation Our requirement is less stringent: How much preferential dropping is needed to ensure a reasonable Nash Equilibrium?

Aditya Akella CHOKe+ -- A Simple, Stateless Scheme  A small modification to RED is enough  GoodputLoss rate 397%2.74%    n     n   Thruput of flow n (Mbps)  n of flow n  CHOKe+  Simple, stateless  Provides just the right amount of punishment to aggressive flows  Makes marginal advantage from greed insignificant  E.g. SACK flows varying 

Aditya Akella CHOKe+ (Cont.)  GoodputLoss rate %2.42%    n     n   Thruput of flow n (Mbps)  n of flow n    1 at Nash Equilibrium in all cases   impossible to ensure without Fair Queuing  But, CHOKe+ encourages   Makes aggressive  a risky choice  With SACK flows  at Nash Equilibrium

Aditya Akella Summary  Greedy congestion control may not always lead to inefficient operation  Traditional Reno host-droptail router setting  Unfortunately, greedy behavior is bad in most other situations  Fortunately, it is possible to ensure a desirable Nash Equilibrium via simple, stateless mechanisms

Aditya Akella Back-up  Back-up

Aditya Akella CHOKe+  CHOKe would have worked  But, enforces too high a drop rate  Underutilization at low levels of multi- plexing  CHOKe+ fixes this problem

Aditya Akella The CHOKe+ Algorithm  For each incoming packet P  Pick k packets at random from queue  Let m be #packets from the same flow as P  Let      be constants  If m   k, P and the m packets are dropped  Else if   k  m   k, drop P and the m packets only if RED were to drop P  Else just drop P according to RED

Aditya Akella Motivation  TCP’s congestion control successful at avoiding congestion collapse  For more than a decade now…  “Social” or “Co-operative” congestion control  End-points use conservative parameter settings  Assumed crucial for Internet’s stability

Aditya Akella Motivation  But, is social behavior necessary for efficiency?  Naïve congestion behavior lead to congestion collapses  What if end-points were greedy and smart?  Would the outcome be different than what happened in the 80s?  Would this endanger stability of the Internet?