A TCP With Guaranteed Performance in Networks with Dynamic Congestion and Random Wireless Losses Stefan Schmid, ETH Zurich Roger Wattenhofer, ETH Zurich.

Slides:



Advertisements
Similar presentations
Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Advertisements

Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
1 School of Computing Science Simon Fraser University CMPT 771/471: Internet Architecture & Protocols TCP-Friendly Transport Protocols.
Computer Networking Lecture 20 – Queue Management and QoS.
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
CSIT560 Internet Infrastructure: Switches and Routers Active Queue Management Presented By: Gary Po, Henry Hui and Kenny Chong.
IS333, Ch. 26: TCP Victor Norman Calvin College 1.
Jaringan Komputer Lanjut Traffic Management Aurelio Rahmadian.
A Blueprint for Constructing Peer-to-Peer Systems Robust to Dynamic Worst-Case Joins and Leaves Fabian Kuhn, Microsoft Research, Silicon Valley Stefan.
TCP Congestion Control Dina Katabi & Sam Madden nms.csail.mit.edu/~dina 6.033, Spring 2014.
1 End to End Bandwidth Estimation in TCP to improve Wireless Link Utilization S. Mascolo, A.Grieco, G.Pau, M.Gerla, C.Casetti Presented by Abhijit Pandey.
Selfish Behavior and Stability of the Internet: A Game-Theoretic Analysis of TCP Presented by Shariq Rizvi CS 294-4: Peer-to-Peer Systems.
Hamilton Institute TCP over e Doug Leith & Peter Clifford Hamilton Institute, Ireland.
Congestion Control An Overview -Jyothi Guntaka. Congestion  What is congestion ?  The aggregate demand for network resources exceeds the available capacity.
Dynamic Internet Congestion with Bursts Stefan Schmid Roger Wattenhofer Distributed Computing Group, ETH Zurich 13th International Conference On High Performance.
On the Topologies Formed by Selfish Peers Thomas Moscibroda Stefan Schmid Roger Wattenhofer IPTPS 2006 Santa Barbara, California, USA.
Congestion Control Reading: Sections COS 461: Computer Networks Spring 2011 Mike Freedman
Taming Dynamic and Selfish Peers “Peer-to-Peer Systems and Applications” Dagstuhl Seminar March 26th-29th, 2006 Stefan Schmid Distributed Computing Group.
Distributed Video Streaming Over Internet Thinh PQ Nguyen and Avideh Zakhor Berkeley, CA, USA Presented By Sam.
Open Issues on TCP for Mobile Computing Ibrahim Matta Computer Science, Boston University Vassilis Tsaoussidis Computer Science, Northeastern University.
EE689 Lecture 5 Review of last lecture More on HPF RED.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Travis Grant – Mingzhe Li, Choong-Soo Lee, Emmanuel.
Performance Enhancement of TFRC in Wireless Ad Hoc Networks Mingzhe Li, Choong-Soo Lee, Emmanuel Agu, Mark Claypool and Bob Kinicki Computer Science Department.
Computer Networking Lecture 17 – Queue Management As usual: Thanks to Srini Seshan and Dave Anderson.
Medium Start in TCP-Friendly Rate Control Protocol CS 217 Class Project Spring 04 Peter Leong & Michael Welch.
TCP Congestion Control
The Effects of Systemic Packets Loss on Aggregate TCP Flows Thomas J. Hacker May 8, 2002 Internet 2 Member Meeting.
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
Characteristics of QoS-Guaranteed TCP on Real Mobile Terminal in Wireless LAN Remi Ando † Tutomu Murase ‡ Masato Oguchi † † Ochanomizu University,Japan.
1 Robust Transport Protocol for Dynamic High-Speed Networks: enhancing XCP approach Dino M. Lopez Pacheco INRIA RESO/LIP, ENS of Lyon, France Congduc Pham.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 - Queuing and Basics of QoS.
An End-to-end Approach to Increase TCP Throughput Over Ad-hoc Networks Sarah Sharafkandi and Naceur Malouch.
TFRC: TCP Friendly Rate Control using TCP Equation Based Congestion Model CS 218 W 2003 Oct 29, 2003.
Understanding the Performance of TCP Pacing Amit Aggarwal, Stefan Savage, Thomas Anderson Department of Computer Science and Engineering University of.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
1 On Class-based Isolation of UDP, Short-lived and Long-lived TCP Flows by Selma Yilmaz Ibrahim Matta Computer Science Department Boston University.
27th, Nov 2001 GLOBECOM /16 Analysis of Dynamic Behaviors of Many TCP Connections Sharing Tail-Drop / RED Routers Go Hasegawa Osaka University, Japan.
HighSpeed TCP for High Bandwidth-Delay Product Networks Raj Kettimuthu.
TCP Trunking: Design, Implementation and Performance H.T. Kung and S. Y. Wang.
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
TCP with Variance Control for Multihop IEEE Wireless Networks Jiwei Chen, Mario Gerla, Yeng-zhong Lee.
Michael Schapira Yale and UC Berkeley Joint work with P. Brighten Godfrey, Aviv Zohar and Scott Shenker.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 - Queuing and Basics of QoS.
AQM & TCP models Courtesy of Sally Floyd with ICIR Raj Jain with OSU.
Improving TCP Performance over Wireless Networks
Chapter 11.4 END-TO-END ISSUES. Optical Internet Optical technology Protocol translates availability of gigabit bandwidth in user-perceived QoS.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Network Coding and Reliable Communications Group Modeling Network Coded TCP Throughput: A Simple Model and its Validation MinJi Kim*, Muriel Médard*, João.
1 Advanced Transport Protocol Design Nguyen Multimedia Communications Laboratory March 23, 2005.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Congestion Control 0.
Transmission Control Protocol (TCP) TCP Flow Control and Congestion Control CS 60008: Internet Architecture and Protocols Department of CSE, IIT Kharagpur.
Dynamic Behavior of Slowly Responsive Congestion Control Algorithms (Bansal, Balakrishnan, Floyd & Shenker, 2001)
1 ICCCN 2003 Modelling TCP Reno with Spurious Timeouts in Wireless Mobile Environments Shaojian Fu School of Computer Science University of Oklahoma.
TCP - Part II Relates to Lab 5. This is an extended module that covers TCP flow control, congestion control, and error control in TCP.
TCP Congestion Control
Congestion Control, Internet transport protocols: udp
Congestion Control in Wireless Network Implementation
CONGESTION CONTROL.
Transport Layer Unit 5.
TCP, XCP and Fair Queueing
Lecture 19 – TCP Performance
ATP TCP Reducing the Latency-Tail of Short-Lived Flows: Adding Forward Error Correction in Data Centers Klaus-Tycho Foerster, Demian Jaeger, David Stolz,
So far, On the networking side, we looked at mechanisms to links hosts using direct linked networks and then forming a network of these networks. We introduced.
IT351: Mobile & Wireless Computing
RAP: Rate Adaptation Protocol
Javad Ghaderi, Tianxiong Ji and R. Srikant
TCP Congestion Control
CSE 4213: Computer Networks II
Congestion Michael Freedman COS 461: Computer Networks
Lecture 6, Computer Networks (198:552)
Presentation transcript:

A TCP With Guaranteed Performance in Networks with Dynamic Congestion and Random Wireless Losses Stefan Schmid, ETH Zurich Roger Wattenhofer, ETH Zurich 2nd Annual International Wireless Internet Conference (WICON) Boston, MA, USA, August 2006 Distributed Computing Group

Stefan Schmid, ETH WICON Large Data Transfers (1) CERN, Geneva ETH, Zurich

Stefan Schmid, ETH WICON Large Data Transfers (2) CERN, Geneva ETH, Zurich TCP Connection Lecture E = mc 2

Stefan Schmid, ETH WICON Large Data Transfers (3) Characteristics of transfer: - Internet can be congested - Available bandwidth changes over time - Packets may be lost, especially on wireless link Congestion Losses

Stefan Schmid, ETH WICON TCP Congestion Control (1) TCP avoids congestion - Congestion control lies at the heart of TCP - Prevents congestion collapses of Internet (e.g., 1980) How to prevent congestion? Senders reduce sending rate when Internet is congested - senders maintain congestion window - strategy: „additive-increase, multiplicative-decrease“ (AIMD)

Stefan Schmid, ETH WICON TCP Congestion Control (2) How does a sender know about congestion? When packets are lost, TCP sender assumes that routers are overloaded! For packets lost for other reasons than congestion, throughput is reduced unnecessarily!

Stefan Schmid, ETH WICON TCP Congestion Control (3) Lecture E = mc 2 Wasted throughput: student may seek to increase her download bandwidth (selfishly)!

Stefan Schmid, ETH WICON In this paper… A model is presented which comprises both dynamic changes of the available bandwidth (dynamic congestion) and random packet losses (e.g., wireless links) Model allows for formal analysis of transfer protocol‘s performance! Thereby, a selfish perspective is assumed - We look at protocols which aim at maximizing their throughput, regardless of consequences for other participants (no fairness).

Stefan Schmid, ETH WICON Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion

Stefan Schmid, ETH WICON Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion

Stefan Schmid, ETH WICON Basic Model (1) Time is divided into synchronous rounds Framework of online algorithms: - Adversary chooses available bandwidth u t - Protocol chooses sending rate x t In addition, all packets are lost in a given round with probability p

Stefan Schmid, ETH WICON Basic Model (2) Gain of transfer protocol ALG at time t: Gain of optimal (offline) transfer strategy OPT: We are interested in minimizing the (strict) competitive ratio, i.e., the gain of OPT divided by the gain of ALG.

Stefan Schmid, ETH WICON Basic Model (3) Takes into account an opportunity cost Assumption: No packets are transmitted at all if rate too large - Pessimistic, but losses engender overhead (e.g., time-outs) Goal of ALG is to always send at (or slightly lower) rate of currently available bandwidth. Thereby, ALG does not know whether losses are due to congestion or wireless links!

Stefan Schmid, ETH WICON In practice, it can be assumed that congestion does not change too abruptly over time. Therefore, we bound the adversary ADV which chooses the available bandwidth as follows (multiplicative changes): u t has to be chosen from [u t-1 /μ, u t-1 μ ] Basic Model (4) A similar model but without random losses has been studied by Karp, Koutsoupias, Papadimitriou and Shenker (FOCS 2000)!

Stefan Schmid, ETH WICON Transfer protocol achieving a provable performance: Provable Performance in Basic Model In order to compensate wireless losses, TCPW increases the bandwidth by a factor larger than μ after successful rounds (aggressive MIMD strategy). Strict competitive ratio: at most 4(μ 2 + μ)

Stefan Schmid, ETH WICON Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion

Stefan Schmid, ETH WICON Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion

Stefan Schmid, ETH WICON Network traffic is often bursty. Network calculus has introduced the notion of leaky-bucket arrival curves to study queuing theory from a worst-case perspective. Also a reasonable model for dynamics on transport layer! Extending the Model with Bursts leaky bucket arrival curve

Stefan Schmid, ETH WICON Dynamics of ADV has to correspond to leaky-bucket constraints New Dynamic Adversary where Adversary can accumulate power in some rounds to change available bandwidth more abruptly later!

Stefan Schmid, ETH WICON Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion

Stefan Schmid, ETH WICON Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion

Stefan Schmid, ETH WICON The TCP Wichita Transfer Protocol for Bursty Environment After successful transmissions, rate is increased by a factor of 2 μ 2. x t >u t : Transmission rate compared to OPT can be described by Markov chain. - Only in case of random errors, TCPW loses ground / reduces too much! Analysis: Look at cases x>u (fail) and x<u (pot. success) individually.

Stefan Schmid, ETH WICON Analysis In rounds where x t >u t, TCPW has gain = 0! - But: TCPW does not miss much gain! - TCPW reduces its rate gemoetrically - TCPW never overshoots much TCP Wichita is 4(μ+Bμ 2 )-competitive against a bursty adversary if μ<(1-p)/4Bp. The following result can be shown:

Stefan Schmid, ETH WICON Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion

Stefan Schmid, ETH WICON Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion

Stefan Schmid, ETH WICON Simulation Random bandwidth changes with bursts - Random changes smaller than μ, until enough is accumulated for burst

Stefan Schmid, ETH WICON Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion

Stefan Schmid, ETH WICON Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion

Stefan Schmid, ETH WICON Conclusion (1) A framework which allows for formal protocol analysis and incorporates dynamic congestion and random losses We believe that there is still little algorithmic research on the transport layer! Network calculus may be a good model for dynamics in various settings! Selfish throughput maximization - Really a threat? Experiences? - Security: Routers often drop UDP packets first in case of congestion! Cheating possible?

Stefan Schmid, ETH WICON Conclusion (2) Open research questions: - Better / tight bound for competitive ratio? - Randomized online algorithms? - Impact on stability in case of multiple flows? - Model extensions: buffers, varying round trip times, etc.? - Model verification & real implementation?

Stefan Schmid, ETH WICON Questions and Comments? Stefan Schmid Distributed Computing Group ETH Zurich, Switzerland Thank you for your attention!