Whither Congestion Control? Sally Floyd E2ERG, July 2006 www.icir.org/floyd/talks.

Slides:



Advertisements
Similar presentations
ELECTRONICS RESEARCH GROUP DEPARTMENT OF ENGINEERING IETF-68, March 19-23, 2007 Quick-Start for DCCP draft-fairhurst-tsvwg-dccp-qs-00 (Individual Submission)
Advertisements

1 Specifying New Congestion Control Algorithms Sally Floyd and Mark Allman draft-floyd-cc-alt-00.txt November 2006 TSVWG Slides:
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
IPv4 - The Internet Protocol Version 4
Introduction1-1 message segment datagram frame source application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M destination application.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
IP Protocol - Introduction Dr. Farid Farahmand. Introduction TDM transport networks are not sufficient for data communications Low utilization TDM networks.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Congestion Control An Overview -Jyothi Guntaka. Congestion  What is congestion ?  The aggregate demand for network resources exceeds the available capacity.
XCP: Congestion Control for High Bandwidth-Delay Product Network Dina Katabi, Mark Handley and Charlie Rohrs Presented by Ao-Jan Su.
The Power of Explicit Congestion Notification Aleksandar Kuzmanovic Northwestern University
Application layer (continued) Week 4 – Lecture 2.
1 Congestion Control. Transport Layer3-2 Principles of Congestion Control Congestion: r informally: “too many sources sending too much data too fast for.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168) Limited Transmit (RFC 3042)
Aleksandar Kuzmanovic & Edward W. Knightly A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168)
A Real-Time Video Multicast Architecture for Assured Forwarding Services Ashraf Matrawy, Ioannis Lambadaris IEEE TRANSACTIONS ON MULTIMEDIA, AUGUST 2005.
Promoting the Use of End-to- End Congestion Control in the Internet Sally Floyd and Kevin Fall Presented by Scott McLaren.
ACN: Congestion Control1 Congestion Control and Resource Allocation.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #8 Explicit Congestion Notification (RFC 3168) Limited Transmit.
Reliable Transport Layers in Wireless Networks Mark Perillo Electrical and Computer Engineering.
Gursharan Singh Tatla Transport Layer 16-May
CSE679: Multicast and Multimedia r Basics r Addressing r Routing r Hierarchical multicast r QoS multicast.
Network Simulation Internet Technologies and Applications.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
3: Transport Layer3b-1 Principles of Congestion Control Congestion: r informally: “too many sources sending too much data too fast for network to handle”
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Changes in CCID 2 and CCID 3 Sally Floyd August 2004 IETF.
Quick-Start for TCP and IP A.Jain, S. Floyd, M. Allman, and P. Sarolahti ICSI, April 2006 This and earlier presentations::
Quick-Start for TCP and IP draft-ietf-tsvwg-quickstart-02.txt A.Jain, S. Floyd, M. Allman, and P. Sarolahti TSVWG, March 2006 This and earlier presentations::
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Adding Explicit Congestion Notification (ECN) Capability to TCP's SYN/ACK Packets A. Kuzmanovic, A. Mondal, S. Floyd, and K.K. Ramakrishnan draft-ietf-tcpm-ecnsyn-03.txt.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
Datagram Congestion Control Protocol
IT 347 Final Review Winter 2011 J.J. Ekstrom. IT 347 Course Topics Network Models Protocols and Encapsulation Reliable Delivery / Sliding Window Clients,
1 Lecture 14 High-speed TCP connections Wraparound Keeping the pipeline full Estimating RTT Fairness of TCP congestion control Internet resource allocation.
1 Standardizing New Congestion Control Algorithms Sally Floyd Workshop on High-speed TCP Microsoft February 5-6, 2007 Slides:
Quick-Start for TCP and IP draft-ietf-tsvwg-quickstart-01.txt A.Jain, S. Floyd, M. Allman, and P. Sarolahti TSVWG, November 2005 This and earlier presentations::
Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005.
Quick-Start for TCP and IP Draft-amit-quick-start-04.txt A.Jain, S. Floyd, M. Allman, and P. Sarolahti TSVWG, March 2005 Presentation last IETF:
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Quick-Start for TCP and IP Draft-amit-quick-start-03.txt A.Jain, S. Floyd, M. Allman, and P. Sarolahti ICIR, December
DCCP: Issues From the Mailing List Sally Floyd, Eddie Kohler, Mark Handley, et al. DCCP WG March 4, 2004.
Improving our Evaluation of Transport Protocols Sally Floyd Hamilton Institute July 29, 2005.
Thoughts on the Evolution of TCP in the Internet (version 2) Sally Floyd ICIR Wednesday Lunch March 17,
1 Figure 3-5: IP Packet Total Length (16 bits) Identification (16 bits) Header Checksum (16 bits) Time to Live (8 bits) Flags Protocol (8 bits) 1=ICMP,
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Thoughts on the Evolution of TCP in the Internet Sally Floyd PFLDnet 2004 February 16, 2004.
Uni Innsbruck Informatik th IETF, PMTUD WG: Path MTU Discovery Using Options draft-welzl-pmtud-options-01.txt Michael Welzl
© 2002, Cisco Systems, Inc. All rights reserved..
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 3: Transport.
1 Three ways to (ab)use Multipath Congestion Control Costin Raiciu University Politehnica of Bucharest.
Adding Explicit Congestion Notification (ECN) Capability to TCP's SYN/ACK Packets A. Kuzmanovic, A. Mondal, S. Floyd, and K.K. Ramakrishnan draft-ietf-tcpm-ecnsyn-02.txt.
Network Layer. application transport network link physical message segment packet frame signal Network Architecture.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Internet Networking recitation #9
The Transport Layer (TCP)
IP - The Internet Protocol
TCP Transport layer Er. Vikram Dhiman LPU.
IP - The Internet Protocol
HighSpeed TCP for Large Congestion Windows
IP - The Internet Protocol
Quick-Start for TCP and IP
Quick-Start for TCP and IP
Internet Networking recitation #10
IP - The Internet Protocol
Process-to-Process Delivery: UDP, TCP
IP - The Internet Protocol
Presentation transcript:

Whither Congestion Control? Sally Floyd E2ERG, July

Topics: Congestion control: –Router algorithms for detecting congestion; –Transport protocol responses to congestion: Unicast and multicast. –Detecting misbehaving nodes or aggregates; –Difficult issues for unreliable transport. Explicit communications with routers: –For congestion control (e.g., XCP)? –For anti-congestion control (e.g., Quick-Start)? –For communicating with layer two (e.g., corruption)? The role of the IETF? Models for evaluating congestion control.

Issues I am not talking about: Transport: –E.g., HighSpeed TCP, BIC/CUBIC, HTCP, STCP, FAST TCP, etc. Router Mechanisms: –For congestion notification using packet drops or ECN. –E.g., RED, REM, Blue, etc. Misbehaving nodes or aggregates: –E.g., RED-PD, ACC, etc.

Difficult Issues for Unreliable Transport (e.g., DCCP): Applications that send frequent small packets: –Network bottleneck in bytes per second or packets per second? –Routers treat small and large packets the same, or not? –Would recommendations to router designers be useful? Applications that want to more than double their sending rate from one RTT to the next (video). Applications that want to start up fast after an idle period (audio).

Forms of Explicit Communication: QoS-related. New congestion control mechanisms based on explicit feedback from routers (e.g., XCP). “Anti-congestion control” mechanisms based on explicit feedback from routers (e.g., Quick-Start). Explicit communication including layer two: –Packet corruption; –Path changes; –Link changes; –Interactions with layer-two congestion control? –Etc.

Forms of Explicit Communication: How to proceed? –Top-down, exploring the space, and also bottom-up, exploring specific mechanisms. –Keeping the long time horizon in mind, and also exploring real-world obstacles. –Exploring positives and negatives. E.g., for communication involving layer two: –Whole space, and scecific mechanisms both. –Thinking about both future and current layer-two mechanisms. –Communication to and from layer two. –Communication involving the whole path, or a single link.

Problems with explicit communication with routers (from Quick-Start): Attacks from others (e.g., SYN floods). Misbehaving senders or receivers. Real-world problems: –Problems with middleboxes: Packets with IP options dropped. Packets dropped or “normalized”, etc. –IP tunnels, MPLS, etc. –Switches in layer-two networks. –Router incentives to play. –And more…

The Future of the IETF and Congestion Control? Or instead, let a hundred flowers bloom? –Linux. –Microsoft. –Etc.

Research Internet Needs Better Models. We need better models to use in simulations, experiments, and in analysis for evaluating congestion control mechanisms. Typical scenarios should include: –two-way traffic, and –a range of round-trip times, and –a range of connection sizes, and –a range of receive windows, and –a range of access link bandwidths. –And maybe a range of applications, including audio and video with variable bandwidth demands.

Extra viewgraphs:

Attacks on Quick-Start: Attacks to increase router’s processing load: –Easy to protect against - routers ignore Quick-Start when overloaded. Attacks with bogus Quick-Start requests: –Similar to Quick-Start requests denied downstream. –Harder to protect against. –It doesn’t cost a sender anything to send a bogus Quick-Start request.

The Problem of Cheating Receivers: the QS Nonce. Initialized by sender to a random value. If router reduces Rate Request from K to K-1, router resets related bits in QS Nonce to a new random value. Receiver reports QS Nonce back to sender. If Rate Request was not reduced in the network below K, then the lower 2K bits should have their original random value. Do receivers have an incentive to cheat?

Protection against Cheating Senders: The sender sends a “Report of Approved Rate” after receiving a Quick-Start Response. The Report might report an Approved Rate of zero. Routers may: – Ignore the Report of Approved Rate; –Use Report to check for misbehaving senders; –Use Report to keep track of committed Quick- Start bandwidth. Do senders have an incentive to cheat?

Real World Problems: Misbehaving Middleboxes: There are many paths where TCP packets with known or unknown IP options are dropped. –Measuring Interactions Between Transport Protocols and Middleboxes, Alberto Medina, Mark Allman, and Sally Floyd. Internet Measurement Conference 2004, August –For roughly one-third of the web servers, no connection is established when the TCP client includes an IP Record Route or Timestamp option in the TCP SYN packet. –For most web servers, no connection is established when the TCP client includes an unknown IP Option.

Real-World Problems: IP Tunnels. IP Tunnels (e.g., IPsec) are used to give a virtual point-to-point connection for two routers. There are some IP tunnels that are not compatible with Quick-Start: –This refers to tunnels where the IP TTL is not decremented before encapsulation; –Therefore, the TTL Diff is not changed; –The sender can falsely believe that the routers in the tunnel approved the Quick-Start request. –This will limit the possible deployment scenarios for Quick-Start.

Real-World Problems: Layer-2 Networks Multi-access links, layer-2 switches: –E.g., switched Ethernet. –Are the segments underutilized? –Are other nodes on the layer-2 network also granting Quick-Start requests?