Bandwidth Estimation TexPoint fonts used in EMF.

Slides:



Advertisements
Similar presentations
Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Advertisements

Available Bandwidth Estimation Manish Jain Networking and Telecom Group CoC, Georgia Tech.
pathChirp Efficient Available Bandwidth Estimation
Min-Plus Linear Systems Theory and Bandwidth Estimation Min-Plus Linear Systems Theory and Bandwidth Estimation TexPoint fonts used in EMF. Read the TexPoint.
ECE358: Computer Networks Fall 2014
1 CNPA B Nasser S. Abouzakhar Queuing Disciplines Week 8 – Lecture 2 16 th November, 2009.
1 CONGESTION CONTROL. 2 Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because.
1 Locating Internet Bottlenecks: Algorithms, Measurement, and Implications Ningning Hu (CMU) Li Erran Li (Bell Lab) Zhuoqing Morley Mao (U. Mich) Peter.
24-1 Chapter 24. Congestion Control and Quality of Service (part 1) 23.1 Data Traffic 23.2 Congestion 23.3 Congestion Control 23.4 Two Examples.
Transport Layer – TCP (Part2) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Resource Allocation: Deterministic Analysis. Traffic Model Stochastic Different sample paths with different properties Expected case analysis Deterministic.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli University of Calif, Berkeley and Lawrence Berkeley National Laboratory SIGCOMM.
Congestion Control Created by M Bateman, A Ruddle & C Allison As part of the TCP View project.
0 A Short Course on Network Calculus CH-1015 Ecublens Jean-Yves Le Boudec Patrick Thiran ICA, EPFL.
Real-Time Protocol (RTP) r Provides standard packet format for real-time application r Typically runs over UDP r Specifies header fields below r Payload.
CS 4700 / CS 5700 Network Fundamentals Lecture 12: Router-Aided Congestion Control (Drop it like it’s hot) Revised 3/18/13.
Path Optimization in Computer Networks Roman Ciloci.
Ion Stoica, Scott Shenker, and Hui Zhang SIGCOMM’98, Vancouver, August 1998 subsequently IEEE/ACM Transactions on Networking 11(1), 2003, pp Presented.
Receiver-driven Layered Multicast S. McCanne, V. Jacobsen and M. Vetterli SIGCOMM 1996.
1 Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High Speed Networks Core-Stateless Fair Queueing:
Dynamic Internet Congestion with Bursts Stefan Schmid Roger Wattenhofer Distributed Computing Group, ETH Zurich 13th International Conference On High Performance.
Worst-case Fair Weighted Fair Queueing (WF²Q) by Jon C.R. Bennett & Hui Zhang Presented by Vitali Greenberg.
Bandwidth Measurement of Pakistan’s Internet Topology.
CS 268: Lecture 15/16 (Packet Scheduling) Ion Stoica April 8/10, 2002.
Multiple constraints QoS Routing Given: - a (real time) connection request with specified QoS requirements (e.g., Bdw, Delay, Jitter, packet loss, path.
Network Calculus: Reference Material: J.-Y. LeBoudec and Patrick Thiran: “Network Calculus: A Theory of Deterministic Queuing Systems for the Internet”,
Katz, Stoica F04 EECS 122: Introduction to Computer Networks Packet Scheduling and QoS Computer Science Division Department of Electrical Engineering and.
Computer Networks: Performance Measures1 Computer Network Performance Measures.
Available bandwidth measurement as simple as running wget D. Antoniades, M. Athanatos, A. Papadogiannakis, P. Markatos Institute of Computer Science (ICS),
1 Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks Ion Stoica,Scott Shenker, and Hui Zhang SIGCOMM’99,
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley Asynchronous Distributed Algorithm Proof.
1 Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks Ion Stoica,Scott Shenker, and Hui Zhang SIGCOMM’99,
1 A State Feedback Control Approach to Stabilizing Queues for ECN- Enabled TCP Connections Yuan Gao and Jennifer Hou IEEE INFOCOM 2003, San Francisco,
Packet Scheduling From Ion Stoica. 2 Packet Scheduling  Decide when and what packet to send on output link -Usually implemented at output interface 1.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Alok Shriram and Jasleen Kaur Presented by Moonyoung Chung Empirical Evaluation of Techniques for Measuring Available Bandwidth.
1 Network Calculus Jean-Yves Le Boudec, lecturer Patrick Thiran Pisa 2003.
Data Comm. & Networks Instructor: Ibrahim Tariq Lecture 3.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
Fair Queueing. 2 First-Come-First Served (FIFO) Packets are transmitted in the order of their arrival Advantage: –Very simple to implement Disadvantage:
CS244A Midterm Review Ben Nham Some slides derived from: David Erickson (2007) Paul Tarjan (2007)
TCP Trunking: Design, Implementation and Performance H.T. Kung and S. Y. Wang.
9.7 Other Congestion Related Issues Outline Queuing Discipline Avoiding Congestion.
TCP with Variance Control for Multihop IEEE Wireless Networks Jiwei Chen, Mario Gerla, Yeng-zhong Lee.
Multiplicative Wavelet Traffic Model and pathChirp: Efficient Available Bandwidth Estimation Vinay Ribeiro.
EE 685 presentation Optimization Flow Control, I: Basic Algorithm and Convergence By Steven Low and David Lapsley.
PathChirp Spatio-Temporal Available Bandwidth Estimation Vinay Ribeiro Rolf Riedi, Richard Baraniuk Rice University.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 18: Quality of Service Slides used with.
1 Core-Stateless Fair Queueing: A Scalable Architecture to Approximate Fair Bandwidth Allocations in High Speed Networks Core-Stateless Fair Queueing:
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429/556 Introduction to Computer Networks Weighted Fair Queuing Some slides used with.
Grid Computing slide to be used anywhere Harness global resources to improve performance.
1 Fair Queuing Hamed Khanmirza Principles of Network University of Tehran.
Indian Institute of Technology Bombay 1 Communication Networks Prof. D. Manjunath
Spring Computer Networks1 Congestion Control Sections 6.1 – 6.4 Outline Preliminaries Queuing Discipline Reacting to Congestion Avoiding Congestion.
PathChirp Efficient Available Bandwidth Estimation Vinay Ribeiro Rice University Rolf Riedi Rich Baraniuk.
Min-Plus Linear Systems Theory Min-Plus Linear Systems Theory.
Providing QoS in IP Networks
Topics discussed in this section:
Intro to Deterministic Analysis
Intro to Deterministic Analysis
CONGESTION CONTROL.
Intro to Deterministic Analysis
Intro to Deterministic Analysis
Congestion Control, Quality of Service, & Internetworking
© J. Liebeherr, All rights reserved, 2018
ECE 1545 Service Curve Earliest Deadline Due (SCED) or How to construct a scheduler from a service curve.
pathChirp Efficient Available Bandwidth Estimation
Intro to Deterministic Analysis
pathChirp Efficient Available Bandwidth Estimation
کنترل جریان امیدرضا معروضی.
Presentation transcript:

Bandwidth Estimation TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:

System Theory for Networks Networks can be viewed as linear systems in a different algebra: Addition (+)  Minimum (inf) Multiplication (·)  Addition (+) Network service is described by a service curve Min-Plus Algebra

Back to (Classical) Systems Time Shift System eigenfunction eigenvalue eigenfunction Now: Eigenfunctions of time-shift systems are also eigenfunctions of any linear time-invariant system

Min-Plus Linear Systems Departures can be calculated from arrivals and service curve: “min-plus convolution”

Characterizing non-linear systems Many networks are not min-plus linear i.e., for some t: … but can be described by a lower service curve such that for all t: Having a lower service curve is often enough, since it provides a lower bound on the service !!

Available Bandwidth Available bandwidth is the unused capacity along a path Available bandwidth of a link: Available bandwidth of a path: Goal: Use end-to-end probing to estimate available bandwidth Edited slide from: V. Ribeiro, Rice. U, 2003

Probing a network with packet trains A network probe consists of a sequence of packets (packet train) The packet train is from a source to a sink For each packet, a measurement is taken when the packet is sent by the source (arrival time), and when the packet arrives at the sink (departure time) So: rate at which the packet trains are sent is crucial: Rate too high  probes preempt existing traffic Rate too low  probes only measure the input rate source sink Edited slide from: V. Ribeiro, Rice. U, 2003

Rate Scanning Probing Method Each packet trains is sent at a fixed rate r (in bits per second). This is done by: All packets in the train have the same size Packets of packet train are sent with same distance If size of packets is L, transmission time of a packet is T, and distance between packets is D, the rate is: r = L/(T+D) Rate Scanning: Source sends multiple packet trains, each with a different rate r Packet train: D D D

Bandwidth estimation in the network calculus View the network as a min-plus system that is either linear or nonlinear Bandwidth estimation scheme: 1. Timestamp packets of packet train: Ap(t) - Send probes Dp(t) - Receive probes 2. Use probes to find a that satisfies for all (A,D). 3. is the estimate of the available bandwidth. The goal is to select as large as possible.

Bandwidth estimation in a min-plus linear network If network is min-plus linear, we get If we set , then So: We get an exact solution when the probe consist of a burst (of infinite size and sent with an infinite rate) However: An infinite-sized instantaneous burst cannot be realized in practice (It also creates congestion in the network)

Rate Scanning (1): Theory Backlog: Max. backlog: If , we can write this as: Inverse transform: If S is convex we have

Rate Scanning (2): Algorithm Step 1: Transmit a packet train at rate , compute compute Step 2: If estimate of has improved, increase and go to Step 1. This method is very close to Pathload !

Non-Linear Systems When we exploit we assume a min-plus linear system In non-linear networks, we can only find a lower service curve that satisfies We view networks as system that are always linear when the network load is low, and that become non-linear when the network load exceeds a threshold. Note: In rate scanning, by increasing the probing rate, we eventually exceed the threshold at which the network becomes non-linear

Example of a non-linear system: FIFO link Rate of packet train is determined by gap between packets How does this show that FIFO is not a min-plus linear system.

Non-Linear Systems (or: How about FIFO ?) When we exploit we assume a min-plus linear system In a linear system, the system response S does not change with the input. But in FIFO, the system response changes with the input rate. So, FIFO is not min-plus linear. In a FIFO system with … … we get (see Problem Set)

Non-Linear Systems (or: How about FIFO ?) If we set … we can describe a FIFO system as This means: FIFO is a linear system if total traffic is below capacity, and non-linear otherwise. So, we should not increase rate of probe traffic beyond not linear linear Probing rate

Detecting Non-linearity How to determine the critical rate at which network becomes non-linear? Backlog convexity criterion Suppose that we probe at constant rates Legendre transform is always convex In a linear system, the max. backlog is the Legendre transform of the service curve: If we find that for some rate r we know that system is not linear

EmuLab Measurements Emulab is a network testbed at U. Utah can allocate PCs and build a network controlled rates and latencies Some Questions: How well does theory translate to real networks? What can we learn from the computed service curve How robust are the methods to changes of the traffic?

Dumbbell Network UDP packets with 1480 bytes (probes) and 800 bytes (cross) Cross traffic: 25 Mbps

Constant Bit Rate (CBR) Cross Traffic Cross traffic is sent at a constant rate (=CBR) The “reference service curve” (red) shows the ideal results. The “service curve estimates” shows the results of the rate scanning method Figure shows 100 repeated estimates of the service curve Rate Scanning

Rate Scanning: Different Cross Traffic Exponential: random interarrivals, low variance Pareto: random interarrivals, very high variance Exponential Pareto