ConEx Concepts and Uses Toby Moncaster John Leslie (JLC) Bob Briscoe (BT) Rich Woundy (Comcast) draft-moncaster-conex-concepts-uses-01.

Slides:



Advertisements
Similar presentations
Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Advertisements

CONEX BoF. Welcome to CONEX! Chairs: –Leslie Daigle –Philip Eardley Scribe Note well MORE INFO: -ECN.
Tunnel congestion Feedback (draft-wei-tunnel-congestion-feedback-01) Xinpeng Wei Lei Zhu Lingli Deng Huawei Huawei China Mobile IETF 89 London, UK.
Florin Dinu T. S. Eugene Ng Rice University Inferring a Network Congestion Map with Traffic Overhead 0 zero.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
01. Apr INF-3190: Congestion Control Congestion Control Foreleser: Carsten Griwodz
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
A Test To Allow TCP Senders to Identify Receiver Non-Compliance Toby Moncaster †, Bob Briscoe*, Arnaud Jacquet* † University of Cambridge * BT draft-moncaster-tcpm-rcv-cheat-03.
IS333, Ch. 26: TCP Victor Norman Calvin College 1.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
ConEx Abstract Protocol What’s the Credit marking for? draft-mathis-conex-abstract-mech-00.txt draft-mathis-conex-abstract-mech-00.txt apologies from Bob.
Network Border Patrol: Preventing Congestion Collapse and Promoting Fairness in the Internet Celio Albuquerque, Brett J. Vickers, Tatsuya Suda 1.
Congestion Control An Overview -Jyothi Guntaka. Congestion  What is congestion ?  The aggregate demand for network resources exceeds the available capacity.
TFRC for Voice: the VoIP Variant Sally Floyd, Eddie Kohler. March 2005, presentation to AVT draft-ietf-dccp-tfrc-voip-01.txt.
Explicit Congestion Notification (ECN) RFC 3168 Justin Yackoski DEGAS Networking Group CISC856 – TCP/IP Thanks to Namratha Hundigopal.
School of Information Technologies TCP Congestion Control NETS3303/3603 Week 9.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
Detecting Traffic Differentiation in Backbone ISPs with NetPolice Ying Zhang Zhuoqing Morley Mao Ming Zhang.
Differentiated Services. Service Differentiation in the Internet Different applications have varying bandwidth, delay, and reliability requirements How.
1 Congestion Control. Transport Layer3-2 Principles of Congestion Control Congestion: r informally: “too many sources sending too much data too fast for.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168) Limited Transmit (RFC 3042)
Leveraging Multiple Network Interfaces for Improved TCP Throughput Sridhar Machiraju SAHARA Retreat, June 10-12, 2002.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #8 Explicit Congestion Notification (RFC 3168) Limited Transmit.
Random Early Detection Gateways for Congestion Avoidance
NET-REPLAY: A NEW NETWORK PRIMITIVE Ashok Anand Aditya Akella University of Wisconsin, Madison.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
1 Proposed Additional Use Cases for Congestion Exposure draft-mcdysan-conex-other-usecases-00.txt Dave McDysan.
Data Transfer Case Study: TCP  Go-back N ARQ  32-bit sequence # indicates byte number in stream  transfers a byte stream, not fixed size user blocks.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Security Level: Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext.
Mobile Communication Congestion Exposure Scenario
I&P: Contracts Clinic 24/02/06 1 Minutes Table Derivation & Application of Overflow The focus of the presentation is on principles: How it works how we.
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
Initial ConEx Deployment Examples draft-briscoe-conex-initial-deploy-00.txt draft-briscoe-conex-initial-deploy-00.txt apologies from Bob Briscoe, BT presented.
Viability of Congestion Exposure. Framing the Discussion This discussion is about congestion exposure – not any specific solution Viability and tractability.
1 Guidelines for Adding Congestion Notification to Protocols that Encapsulate IP draft-briscoe-tsvwg-ecn-encap-guidelines-01 Bob Briscoe IETF-85 Nov 2012.
ConEx Concepts and Uses Toby Moncaster John Leslie (JLC) Bob Briscoe (BT) Rich Woundy (ComCast) draft-moncaster-conex-concepts-uses-01.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
Re’Arch 2008 Policing Freedom… to use the Internet Resource Pool Arnaud.Jacquet, Bob.Briscoe, Toby.Moncaster December
Congestion exposure BoF candidate protocol: re-ECN Bob Briscoe Chief Researcher, BT Nov 2009 This work is partly funded by Trilogy, a research project.
Copyright © Lopamudra Roychoudhuri
DCCP: Issues From the Mailing List Sally Floyd, Eddie Kohler, Mark Handley, et al. DCCP WG March 4, 2004.
CONEX BoF. Welcome to CONEX! Chairs: –Leslie Daigle –Philip Eardley Scribe Note well.
Solving this Internet resource sharing problem... and the next, and the next Bob Briscoe Chief Researcher BT Group (& UCL) Lou Burness, Toby Moncaster,
Towards Adaptive Congestion Management for Interactive Real- Time Communications Dirk KutscherMirja KühlewindBob Briscoe IAB/IRTF Congestion Control Workshop.
Thoughts on the Evolution of TCP in the Internet (version 2) Sally Floyd ICIR Wednesday Lunch March 17,
ConEx Concepts and Abstract Mechanism draft-ietf-conex-abstract-mech-01.txt draft-ietf-conex-abstract-mech-01.txt Matt Mathis, Google Bob Briscoe, BT IETF-80.
Principles & Constraints Philip Eardley. Application-agnostic The CONEX protocol should be open about (independent of) the responses it allows to the.
Explicit Allocation of Best-Effort Service Goal: Allocate different rates to different users during congestion Can charge different prices to different.
Data Transfer Case Study: TCP  Go-back N ARQ  32-bit sequence # indicates byte number in stream  transfers a byte stream, not fixed size user blocks.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
The Benefits to Applications of using Explicit Congestion Notification (ECN) draft-welzl-ecn-benefits-00 89th IETF Meeting London, UK 4 March 2014 Michael.
CS640: Introduction to Computer Networks Aditya Akella Lecture 15 TCP Congestion Control.
1 Sheer volume and dynamic nature of video stresses network resources PIE: A lightweight latency control to address the buffer problem issue Rong Pan,
Initial ConEx Deployment Examples draft-briscoe-conex-initial-deploy-00.txt draft-briscoe-conex-initial-deploy-00.txt apologies from Bob Briscoe, BT presented.
An End-to-End Service Architecture r Provide assured service, premium service, and best effort service (RFC 2638) Assured service: provide reliable service.
Philip Eardley, Bob Briscoe, Dave Songhurst - BT Francois Le Faucheur, Anna Charny, Vassilis Liatsos – Cisco Kwok-Ho Chan, Joe Babiarz, Stephen Dudley.
U Innsbruck Informatik - 1 Specification of a Network Adaptation Layer for the Grid GGF7 presentation Michael Welzl University.
Protocols and layering Network protocols and software Layered protocol suites The OSI 7 layer model Common network design issues and solutions.
Other Methods of Dealing with Congestion
PROTEAN: A Scalable Architecture for Active Networks
Bob Briscoe, BT Murari Sridharan, Microsoft IETF-84 ConEx Jul 2012
CONEX BoF.
Michael Welzl University of Oslo
Other Methods of Dealing with Congestion
COS 461: Computer Networks
Transport Layer: Congestion Control
DCCP: Issues From the Mailing List
Presentation transcript:

ConEx Concepts and Uses Toby Moncaster John Leslie (JLC) Bob Briscoe (BT) Rich Woundy (Comcast) draft-moncaster-conex-concepts-uses-01

July 2010draft-moncaster-conex-concepts-uses-012 draft status draft-moncaster-conex-concepts-uses-01 Individual draft Intended charter milestone: use-cases Intended status: Informational Intended next step: WG item

July 2010draft-moncaster-conex-concepts-uses-013 Overview  The Problem  Congestion Marking (ECN)  Congestion Exposure  Where do we stand?  ConEx Use Cases ConEx Conmponents Traffic management Targeted control Encouraging flexible congestion control Looking to the Future  Questions  Next Steps  Summary

July 2010draft-moncaster-conex-concepts-uses-014 The Problem  The problem can be characterised in at least two ways: Capacity Sharing – sharing limited resources between concurrent flows Congestion Management – improving performance and delay for all  Understanding congestion is definitely key Too much traffic arriving too quickly = congestion  Capacity sharing currently myopic: In time (queues have no idea of past history of traffic) In space (traffic may be causing problems elsewhere)  Queues can only apply pressure by indicating congestion Best signalled in forward direction (unlike Source Quench) Requires honesty from receiver who wants the data as fast as possible Needs sender to reduce rate, but it would rather send fast too  Whole path congestion not visible at forwarding layer Can't tell whether traffic is responsive to congestion

July 2010draft-moncaster-conex-concepts-uses-015 The Problem contd.  Capacity sharing suffers from a key problem – how to measure it  Current approaches (rate and volume) are bad: They don’t reflect actual network conditions  Congestion is a good measure of impact on other users  Congestion-Volume is a better metric to measure this Congestion-Volume = Volume x Congestion (units of bytes) Congestion-Rate = Rate x Congestion (units of bps) For a 1Mbps flow, 0.1% congestion = 125 bytes congestion-volume in 1 second  Congestion-Volume is measure of how much excess traffic was in network over any sampling interval (millisec, minute, month,...)  Can be measured per-packet, per-flow, per-user, per-network,...  ConEx means congestion-volume can be measured as easily as volume

July 2010draft-moncaster-conex-concepts-uses-016 Congestion Marking (ECN)  Traditionally queues indicate congestion by dropping packets Relies on stateful transport to spot gaps in data Can lead to unwanted synchronisation effects  RED improves this by dropping packets before queue overflows Packets dropped probabilistically Drop probability increases as the queue grows  ECN builds on RED ECN marks packets instead of dropping them Sender still responds as if there were a drop But no data is lost so less re-transmission  ECN shows how much congestion traffic has already experienced  But can’t see how much congestion traffic is going to encounter AB C D Src Dest

July 2010draft-moncaster-conex-concepts-uses-017 Congestion Exposure  Whole path congestion is hidden from network Congestion is known to the end-systems (ECN marks or loss) At any point, ECN reveals congestion so far  What is needed is knowledge of congestion on rest of path  ECN gives congestion experienced on every packet  ConEx sender adds congestion expected for every packet  ConEx enables packets to carry a)Congestion experienced (e.g. ECN markings) b)Congestion expected (total congestion sender expects the packet to see)  subtracting a from b gives congestion on rest of path  ConEx mechanism to be defined in later document 0% 1% (b – a) Congestion on rest of path (a) Congestion experienced(b) Congestion expected

July 2010draft-moncaster-conex-concepts-uses-018 ConEx Design Requirements  Accuracy – ConEx info should be as accurate as possible. Congestion is measured in fractions of a percent Source must be trusted to correctly declare the expected congestion Destination must feed back accurate whole-path congestion  Timeliness – ConEx info needs to be as recent as possible design of network imposes min 1RTT delay Transport protocol should seek to minimise delays Feedback needs to be fast enough to prevent info going “stale”  Visibility – ConEx should be visible at every node on the path ConEx must be visible in IP layer ConEx markings need to survive tunneling, middleboxes, firewalls, etc

July 2010draft-moncaster-conex-concepts-uses-019 Where Do We Stand?  Long process leading up to chartering  ConEx chartered in June 2010 with limited scope  Concentrates on one usage scenario: end hosts and receiving network are ConEx enabled (other networks might not be enabled) note difference between Use Case and Usage Scenario  Can consider other use cases: "Experiments on use cases are encouraged and the WG will solicit feedback from such deployments. “  This draft covers Milestone 1 “Use Cases Description” (info)  Several use cases explored. Some go beyond charter, but demonstrate how powerful ConEx can be

July 2010draft-moncaster-conex-concepts-uses-0110 ConEx Use Cases Introduction  Lots of use cases for ConEx  Charter focuses on use cases for following scenario: Green elements ConEx-Enabled. Grey elements not Enabled  NB: the symmetry of most networks implies that ISP Z can be a ConEx- Enabled source network for any traffic that Dest sends into the network Src C Src A Dest ISP Z Core ISP X ISP Y Src B

July 2010draft-moncaster-conex-concepts-uses-0111  Two new network components defined: ConEx Monitor –uses ConEx to measure/report Congestion-volume ConEx Policer –uses ConEx to actively control traffic (delay, expedite or drop)  Policers and Monitors can be at Ingress, Egress or Border:  Border can do policer ormonitor functions policing can prevent serious congestion monitoring can identify unnecessary congestion ConEx Components Src C Src A Dest ISP Z Core ISP X ISP Y Ingress Policer Border Monitor Ingress Monitor Border Policer Egress Policer Src B

July 2010draft-moncaster-conex-concepts-uses-0112 Traffic Management  ISPs often perform traffic management: Aim is to give majority of users an adequate service at peak times Users targeted based on application, traffic rate, volume transferred, etc  ConEx policers offer an alternative: Each sender is declaring the congestion they expect to cause This can be used to control the impact they have on others  ConEx Egress policer identifies users with most congestion-volume. Prioritise traffic depending on congestion it has declared Penalise traffic that has caused excessive congestion Egress Policer Egress Policer can use ConEx info to prioritise traffic from Srcs A & C. Traffic from Src B can only be prioritised by volume/rate/app Src C Src A Dest ISP Z Core ISP X ISP Y Src B

July 2010draft-moncaster-conex-concepts-uses-0113 Targeted Control  Lots of debate about traffic management Current approaches tend to be relatively unfocused Assumptions made about when “peak time” happens Often targets specific applications - big problem for Net Neutrality camp  ConEx approach is better Only targets traffic that has caused congestion Because it monitors actual congestion will always know when peak time is Entirely application-agnostic – only cares about impact of traffic in the network  Overall this is better for ISP and its users Less damaging to customer relationships Allows some bandwidth differentiation without QoS in the net No need for expensive flow-aware kit in backhaul or access

July 2010draft-moncaster-conex-concepts-uses-0114 Encouraging Flexible CC  Lots of current work looking at better congestion control  LEDBAT introduced idea of highly reactive congestion control Designed for bulk data transfers which don’t care about instantaneous rate Backs off as soon as it detects queue building - reacts to congestion before other transports need to  MulTCP and related work introduced flexible congestion control Application chooses how much to react to congestion High priority apps don’t back off much, low priority back off more Logical extension is fully flexible congestion control “Old” TCP Background Interactive “Flexible” TCP Background Interactive

July 2010draft-moncaster-conex-concepts-uses-0115 Encouraging Flexible CC contd.  Current traffic management disincentivises use of LEDBAT LEDBAT still transfers high volumes, so is still targeted LEDBAT used for applications like P2P, so is still targeted LEDBAT can still reach high data rates, so is still targeted  ConEx encourages LEDBAT-like transports ConEx based traffic management brings correct incentives Traffic is controlled based on congestion it causes LEDBAT causes less congestion so gets less control  ConEx encourages use of flexible congestion controls Applications choose how reactive they want to be Interactive applications can react less to maintain their quality Background applications can back off more and recover at quieter times All that matters is overall Congestion-volume...

July 2010draft-moncaster-conex-concepts-uses-0116 Targeted Capacity Provision  Better traffic management means: Users stop causing unnecessary congestion Protocol designers avoid unnecessary congestion  So any congestion remaining reflects real demand  Congestion-volume can be used to measure this demand Can measure at each physical interface Can measure over investment timescales Can identify precise capacity demand  Without ConEx you can’t tell if demand is real Investments may be “wasted” Users may not see real benefit  More on this in next revision...

July 2010draft-moncaster-conex-concepts-uses-0117 Use Cases – Looking to the Future  Charter focused on ConEx-enabled destination network CDN distributing e.g. Movies; User watching VoD;  Can add ingress policing for traffic heading in other direction End user transferring P2P; Live video chat with remote user via relay server;  Other use cases possible: ConEx for DDoS mitigation – network can identify and track excess congestion and block it before it causes problems ConEx “QoS” (builds on weighted CC) –user can prioritise traffic with no network involvement. Makes sense with ingress policing Congestion accounting: works best with full deployment. But simple deployment at sender allows operators to monitor congestion-causing traffic Usage monitoring (needs ingress and egress monitoring). Ideal in mobile scenarios (e.g. 3G) where usage is tightly controlled....

July 2010draft-moncaster-conex-concepts-uses-0118 Questions ? Did we pick a reasonable set of use cases? Should we add a non-commercial use case like campus, corporate, etc?

July 2010draft-moncaster-conex-concepts-uses-0119 Next Steps  Believe this is ready for adoption as first WG draft  Lots of work already done  Discussions on and off list Need to tweak layout Might add more use cases from those suggested on mailing list Expand “Other Issues” section  Big question: How can we summarise ConEx? A way to reduce overall congestion? A metric to improve capacity sharing? A metric to allow better traffic management? All the above and more?

July 2010draft-moncaster-conex-concepts-uses-0120 Conclusions  This draft describes some of the use cases for ConEx  By no means exhaustive – this is a radical idea that will generate some truly innovative uses  Included a brief description of a possible mechanism as readers need that to understand the use cases  Congestion-volume is the key metric for controlling capacity sharing  Introduced the ConEx Monitor and the ConEx Policer  Highlighted several use cases, concentrated on one in particular

ConEx Concepts and Uses spare slides

July 2010draft-moncaster-conex-concepts-uses-0122 ConEx verifier  So far have presented ConEx in “naive” manner Assumes sender is reasonably honest Assumes no-one wants to subvert ConEx info  ConEx verifier can check this Uses moving average to ensure Congestion-experienced ≈ Congestion- expected for given flow Can penalise flows that have marked imbalance over time

July 2010draft-moncaster-conex-concepts-uses-0123 mediating between modern cc’s  The world used to be a simpler place: Traffic was TCP or UDP End-systems followed same basic rules Most traffic simple bulk data  Things are much more complicated now: Lots of different congestion controllers (CUBIC, Compound, etc) Traffic mix much more complex now (streaming video, interactive chat, etc)  ConEx allows for any congestion controller imaginable Only thing that matters is overall contribution to congestion-volume User (or their apps) free to make their own choices

Src C Src A Dest ISP Z Core ISP X ISP Y Src B July 2010draft-moncaster-conex-concepts-uses-0124 Raising the DDoS Bar  DDoS is a serious problem – currently no robust solution ConEx Border Policers can help raise the bar ConEx Policers limit traffic rate towards congestion hot-spots Policers can rate-limit non-ConEx traffic routing towards same hot-spot  ConEx Border Monitors can help raise the bar too DDoS traffic shows ultra-high congestion, so shows up at border ConEx info near attack origin opens up other solutions Border Policer Border Monitor