ConEx Concepts and Uses Toby Moncaster John Leslie (JLC) Bob Briscoe (BT) Rich Woundy (ComCast) draft-moncaster-conex-concepts-uses-01.

Slides:



Advertisements
Similar presentations
Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Advertisements

CONEX BoF. Welcome to CONEX! Chairs: –Leslie Daigle –Philip Eardley Scribe Note well MORE INFO: -ECN.
A Test To Allow TCP Senders to Identify Receiver Cheating Toby Moncaster, Bob Briscoe, Arnaud Jacquet BT PLC draft-moncaster-tcpm-rcv-cheat-00.txt Intended.
Deployment Considerations for Dual-stack Lite IETF 80 Prague Yiu Lee, Roberta Magione, Carl Williams, Christian Jacquenet Mohamed Boucadair.
Florin Dinu T. S. Eugene Ng Rice University Inferring a Network Congestion Map with Traffic Overhead 0 zero.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
William Stallings Data and Computer Communications 7 th Edition Chapter 13 Congestion in Data Networks.
A Test To Allow TCP Senders to Identify Receiver Non-Compliance Toby Moncaster †, Bob Briscoe*, Arnaud Jacquet* † University of Cambridge * BT draft-moncaster-tcpm-rcv-cheat-03.
ConEx Abstract Protocol What’s the Credit marking for? draft-mathis-conex-abstract-mech-00.txt draft-mathis-conex-abstract-mech-00.txt apologies from Bob.
Network Border Patrol: Preventing Congestion Collapse and Promoting Fairness in the Internet Celio Albuquerque, Brett J. Vickers, Tatsuya Suda 1.
TFRC for Voice: the VoIP Variant Sally Floyd, Eddie Kohler. March 2005, presentation to AVT draft-ietf-dccp-tfrc-voip-01.txt.
Explicit Congestion Notification (ECN) RFC 3168 Justin Yackoski DEGAS Networking Group CISC856 – TCP/IP Thanks to Namratha Hundigopal.
COM555: Mobile Technologies Location-Identifier Separation.
Explicit Congestion Notification ECN Tilo Hamann Technical University Hamburg-Harburg, Germany.
CS 268: Active Networks Ion Stoica May 6, 2002 (* Based on David Wheterall presentation from SOSP ’99)
1 Congestion Control. Transport Layer3-2 Principles of Congestion Control Congestion: r informally: “too many sources sending too much data too fast for.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168) Limited Transmit (RFC 3042)
Leveraging Multiple Network Interfaces for Improved TCP Throughput Sridhar Machiraju SAHARA Retreat, June 10-12, 2002.
1 Internet Networking Spring 2003 Tutorial 11 Explicit Congestion Notification (RFC 3168)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #8 Explicit Congestion Notification (RFC 3168) Limited Transmit.
1 1 July 28, Absent changes to the network can we actually do something? Yes Is there work in the area of measurements that can we do to create.
Tiziana FerrariQuality of Service for Remote Control in the High Energy Physics Experiments CHEP, 07 Feb Quality of Service for Remote Control in.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
1 Proposed Additional Use Cases for Congestion Exposure draft-mcdysan-conex-other-usecases-00.txt Dave McDysan.
Data Transfer Case Study: TCP  Go-back N ARQ  32-bit sequence # indicates byte number in stream  transfers a byte stream, not fixed size user blocks.
HUAWEI TECHNOLOGIES CO., LTD. Huawei Confidential Security Level: Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext.
ConEx Concepts and Uses Toby Moncaster John Leslie (JLC) Bob Briscoe (BT) Rich Woundy (Comcast) draft-moncaster-conex-concepts-uses-01.
Mobile Communication Congestion Exposure Scenario
Initial ConEx Deployment Examples draft-briscoe-conex-initial-deploy-00.txt draft-briscoe-conex-initial-deploy-00.txt apologies from Bob Briscoe, BT presented.
Viability of Congestion Exposure. Framing the Discussion This discussion is about congestion exposure – not any specific solution Viability and tractability.
1 Guidelines for Adding Congestion Notification to Protocols that Encapsulate IP draft-briscoe-tsvwg-ecn-encap-guidelines-01 Bob Briscoe IETF-85 Nov 2012.
ConEx Concepts and Abstract Mechanism draft-mathis-conex-abstract-mech-00.txt draft-mathis-conex-abstract-mech-00.txt Matt Mathis, Google Bob Briscoe,
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
1 Lecture 14 High-speed TCP connections Wraparound Keeping the pipeline full Estimating RTT Fairness of TCP congestion control Internet resource allocation.
Re’Arch 2008 Policing Freedom… to use the Internet Resource Pool Arnaud.Jacquet, Bob.Briscoe, Toby.Moncaster December
TCP Trunking: Design, Implementation and Performance H.T. Kung and S. Y. Wang.
1 Congestion Control Computer Networks. 2 Where are we?
Congestion exposure BoF candidate protocol: re-ECN Bob Briscoe Chief Researcher, BT Nov 2009 This work is partly funded by Trilogy, a research project.
DCCP: Issues From the Mailing List Sally Floyd, Eddie Kohler, Mark Handley, et al. DCCP WG March 4, 2004.
TFRC for Voice: the VoIP Variant Sally Floyd, Eddie Kohler. March draft-ietf-dccp-tfrc-voip-01.txt
CONEX BoF. Welcome to CONEX! Chairs: –Leslie Daigle –Philip Eardley Scribe Note well.
Solving this Internet resource sharing problem... and the next, and the next Bob Briscoe Chief Researcher BT Group (& UCL) Lou Burness, Toby Moncaster,
Towards Adaptive Congestion Management for Interactive Real- Time Communications Dirk KutscherMirja KühlewindBob Briscoe IAB/IRTF Congestion Control Workshop.
Thoughts on the Evolution of TCP in the Internet (version 2) Sally Floyd ICIR Wednesday Lunch March 17,
Principles & Constraints Philip Eardley. Application-agnostic The CONEX protocol should be open about (independent of) the responses it allows to the.
Data Transfer Case Study: TCP  Go-back N ARQ  32-bit sequence # indicates byte number in stream  transfers a byte stream, not fixed size user blocks.
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Queue Management Mike Freedman COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
The Benefits to Applications of using Explicit Congestion Notification (ECN) draft-welzl-ecn-benefits-00 89th IETF Meeting London, UK 4 March 2014 Michael.
9/29/04 GGF Random Thoughts on Application Performance and Network Characteristics Distributed Systems Department Lawrence Berkeley National Laboratory.
Initial ConEx Deployment Examples draft-briscoe-conex-initial-deploy-00.txt draft-briscoe-conex-initial-deploy-00.txt apologies from Bob Briscoe, BT presented.
Providing QoS in IP Networks
Philip Eardley, Bob Briscoe, Dave Songhurst - BT Francois Le Faucheur, Anna Charny, Vassilis Liatsos – Cisco Kwok-Ho Chan, Joe Babiarz, Stephen Dudley.
1 Lecture 15 Internet resource allocation and QoS Resource Reservation Protocol Integrated Services Differentiated Services.
Aditya Akella The Impact of False Sharing on Shared Congestion Management Aditya Akella with Srinivasan Seshan and Hari Balakrishnan.
Chapter 10 Congestion Control in Data Networks and Internets 1 Chapter 10 Congestion Control in Data Networks and Internets.
1 Congestion and Congestion Control in Packet- Switched Networks.
U Innsbruck Informatik - 1 Specification of a Network Adaptation Layer for the Grid GGF7 presentation Michael Welzl University.
Other Methods of Dealing with Congestion
Internet Networking recitation #9
Queue Management Jennifer Rexford COS 461: Computer Networks
Bob Briscoe, BT Murari Sridharan, Microsoft IETF-84 ConEx Jul 2012
CONEX BoF.
Michael Welzl University of Oslo
Congestion Control in Data Networks and Internets
Other Methods of Dealing with Congestion
COS 461: Computer Networks
Internet Networking recitation #10
Chapter 11. Frame Relay Background Frame Relay Protocol Architecture
TCP Congestion Control
Presentation transcript:

ConEx Concepts and Uses Toby Moncaster John Leslie (JLC) Bob Briscoe (BT) Rich Woundy (ComCast) draft-moncaster-conex-concepts-uses-01

Overview  The Problem  Congestion Marking (ECN)  Congestion Exposure  Where do we stand?  Use Cases Traffic management Incentivising better congestion control DDoS protection Other use cases  Tools (Monitoring, Policing)  Questions  Next Steps 2Draft-moncaster-conex-concepts-uses-01July 2010

The Problem  The problem can be characterised in at least two ways: Capacity Sharing – sharing limited resources between concurrent flows Congestion Management – improving performance and delay for all  Understanding congestion is definitely key Too much traffic arriving too quickly = congestion  Capacity sharing currently myopic: In time (queues have no idea of past history of flow) In space (traffic may be causing problems elsewhere)  Queues can only apply pressure by indicating congestion Has to be signalled in forward direction (cf Source Quench) Requires honesty from receiver who wants the data as fast as possible Needs sender to respond but this slows down xfer and may cost (reputation & $)  Congestion not visible at forwarding layer Can't tell whether flows are responsive July 2010Draft-moncaster-conex-concepts-uses-013

The Problem contd.  Capacity sharing suffers from a key problem – how to measure it  Current approaches (rate and volume) are bad: They need to be measured over time They don’t reflect actual network conditions  Congestion is a good measure of impact on other users  Congestion Volume is a better metric to measure this Congestion Volume = Volume x Congestion (units of bytes) Congestion Rate = Rate x Congestion (units of bps) For a 1Mbps flow, 0.1% congestion ≈ 100 bytes congestion volume in 1 second  Congestion Volume is measure of how much excess traffic was in network over that sampling interval  Can be measured per-packet, per-flow, per-user, per-network,...  ConEx provides the solution July 2010Draft-moncaster-conex-concepts-uses-014

Congestion Marking (ECN)  Traditionally queues indicate congestion by dropping packets Relies on stateful transport to spot gaps in data Can lead to unwanted synchronisation effects  RED improves this by dropping packets before queue overflows Packets dropped probabilistically Drop probability increases as the queue grows  ECN builds on RED ECN marks packets instead of dropping them Sender still responds as if there were a drop But no data is lost so less re-transmission  ECN shows how much congestion a flow has already experienced  But can’t see how much congestion the flow is going to encounter July 2010Draft-moncaster-conex-concepts-uses-015 AB C D Src Dest

Congestion Exposure  Congestion is hidden from network Congestion is known to the end-systems (ECN marks or loss) At any point, ECN reveals congestion so far  What is needed is knowledge of congestion on rest of path  ECN gives congestion experienced on every packet  ConEx adds congestion expected for every packet  ConEx requires packets to carry Congestion experienced (e.g. ECN markings) Congestion expected (total congestion sender expects the packet to see)  From these we can derive congestion on rest of path  ConEx mechanism to be defined in later document July 2010Draft-moncaster-conex-concepts-uses-016 0% 1% Congestion on rest of path Congestion experiencedCongestion expected

ConEx Design Requirements  Accuracy – ConEx info should be as accurate as possible. Congestion is measured in fractions of a percent Source must be trusted to correctly declare the expected congestion Destination must feedback accurate whole-path congestion  Timeliness – ConEx info needs to be as recent as possible design of network imposes min 1RTT delay Transport protocol should seek to minimise delays Feedback needs to be fast enough to prevent info going “stale”  Visibility – ConEx must be visible throughout network. ConEx must be visible in IP layer ConEx markings need to survive tunneling, middleboxes, firewalls, etc July 2010Draft-moncaster-conex-concepts-uses-017

Where do we stand?  Long process leading up to chartering  ConEx chartered in June 2010 with limited scope  Limited to one usage scenario: end hosts and receiving network are ConEx enabled (other networks might not be enabled) note difference between Use Case and Usage Scenario  This draft covers Milestone 1 “Use Cases Description” (info)  Several use cases explored. Some go beyond charter, but demonstrate how powerful ConEx can be  This presentation concentrates on 3 cases Draft-moncaster-conex-concepts-uses-018July 2010

Use Cases (Intro)  Lots of use cases for ConEx, but some go beyond charter.  This presentation looks at use cases for following scenario: Green elements ConEx-Enabled. Grey elements not Enabled  Two terms to understand: ConEx Monitor – a node that uses ConEx markings to measure/report the Congestion Volume that it forwards ConEx Policer – A node that uses ConEx markings to actively control the Congestion Volume it forwards or to change the queuing priority it gives that flow July 2010Draft-moncaster-conex-concepts-uses-019 Src A Src B Dest ISP Z Core ISP X ISP Y

Use Cases – Traffic Management  ISPs often perform traffic management: Aim is to give majority of users an adequate service at peak times Users targeted based on application, traffic rate, volume transferred, etc  ConEx policers offer an alternative: Each sender is declaring the congestion they expect to cause This can be used to control the impact they have on others  A ConEx policer at the egress can: Identify the heaviest users Prioritise traffic depending on congestion it has declared Penalise traffic that has caused excessive congestion July 2010Draft-moncaster-conex-concepts-uses-0110 Src A Src B Dest ISP Z Core ISP X ISP Y Egress Policer Egress Policer can use ConEx info to prioritise traffic from Src A. Traffic from Src B has to be prioritised by volume/rate/app

Use Cases – Encouraging Better CC  LEDBAT introduced idea of highly sensitive congestion control Designed for bulk data transfers which don’t care about instantaneous rate As soon as queues start to build it backs off In effect reacts to congestion before other transports need to  MulTCP and related work introduced “tunable” congestion control Application chooses how much to react to congestion High priority apps don’t back off much, low priority back off more Logical extension is fully weighted congestion control July 2010Draft-moncaster-conex-concepts-uses-0111 TCP controls sharing Background Interactive Weighted TCP controls sharing Background Interactive

Use Cases – Encouraging Better CC  Current traffic management disincentivises use of LEDBAT LEDBAT still transfers high volumes, so is still targeted LEDBAT used for applications like P2P, so is still targeted LEDBAT can still reach high data rates, so is still targeted  ConEx encourages LEDBAT-like transports ConEx based traffic management brings correct incentives Traffic is controlled based on congestion it causes LEDBAT causes less congestion so gets less control  ConEx encourages use of weighted congestion controls Applications can choose their priority Interactive applications can afford to cause more congestion Background applications can back off more What matters is overall Congestion Volume... July 2010Draft-moncaster-conex-concepts-uses-0112

Use Cases – Raising the DDoS Bar  DDoS is a serious problem to which there is no current solution Blacklist infected hosts and ISPs...  Best hope to deal with DDoS is to raise the bar  ConEx Monitors at the border of a network could help Assumes infected hosts are ConEx enabled DDoS traffic will have higher congestion so can be identified at border Once identified, network can take steps to target that traffic  Some ISPs might use a ConEx Monitor for this July 2010Draft-moncaster-conex-concepts-uses-0113 Src A Src B Dest ISP Z Core ISP X ISP Y Border Policer can identify and block DDoS traffic from Src A. Traffic from Src B gets through, but more traffic needed for same impact Egress Policer can protect Dest from being overwhelmed Border Policer Egress Policer

Use Cases – Looking to the Future  Current charter only allows for destination network to be ConEx enabled: seems to assume destination is commercial ISP or corporate. In such cases it is easy to add ingress policing for traffic heading other way (from this network) Obvious ConEx Usage scenarios: ‐CDN distributing e.g. Movies; ‐User watching VoD; ‐End user transferring P2P; ‐User doing live video chat with remote user via “exchange” server;  ConEx for QoS (builds on weighted CC) – allows user to prioritise their traffic with no network involvement. Makes sense with ingress policing  Congestion accounting. Works best with full deployment OR tunnels to bypass sections that are not capable. But even limited deployment allows operator to monitor “flow” of congestion  Usage monitoring Needs ingress and egress monitoring. Ideal in Mobile (e.g. 3G).  Others listed on mailing list July 2010Draft-moncaster-conex-concepts-uses-0114

 Policers and Monitors can be at Ingress, Egress or Border  Border Policers carry a health-warning – they allow an operator to choose to drop/delay traffic forwarded to it...  In this particular set-up only the Border Monitor and Egress Policer are within scope for current charter Src A Src B Dest ISP Z Core ISP X ISP Y ConEx Tools July 2010Draft-moncaster-conex-concepts-uses-0115 Ingress Policer Border Monitor Ingress Monitor Border Policer Egress Policer

Questions ? July 2010Draft-moncaster-conex-concepts-uses-0116

Next Steps  Believe this is ready for adoption as first WG draft  Lots of work already done  Lots of discussion already on ML Need to tweak layout Might add more use cases from those suggested on mailing list Expand “Other Issues” section  Some questions remain – is ConEx: A way to reduce overall congestion? A metric to improve capacity sharing? A metric to allow better traffic management? A metric to allow users to avoid unexpectedly high mobile bills? All the above and more? July 2010Draft-moncaster-conex-concepts-uses-0117

Conclusions  This draft describes some of the use cases for ConEx  By no means exhaustive – this is a radical idea that will generate some truly innovative uses  Included a brief description of a possible mechanism as readers need that to understand the use cases  Congestion Volume is the key metric for controlling capacity sharing  Introduced the ConEx Monitor and the ConEx Policer July 2010Draft-moncaster-conex-concepts-uses-0118