Promoting the Use of End-to-End Congestion Control in the Internet Sally Floyd and Kevin Fall IEEE-ACAM Transactions on Networking,1999 101062804 馬儀蔓.

Slides:



Advertisements
Similar presentations
Congestion Control and Fairness Models Nick Feamster CS 4251 Computer Networking II Spring 2008.
Advertisements

CSIT560 Internet Infrastructure: Switches and Routers Active Queue Management Presented By: Gary Po, Henry Hui and Kenny Chong.
Transport Layer3-1 TCP AIMD multiplicative decrease: cut CongWin in half after loss event additive increase: increase CongWin by 1 MSS every RTT in the.
Congestion Control Created by M Bateman, A Ruddle & C Allison As part of the TCP View project.
CS 4700 / CS 5700 Network Fundamentals Lecture 12: Router-Aided Congestion Control (Drop it like it’s hot) Revised 3/18/13.
Network Border Patrol Celio Albuquerque, Brett J. Vickers and Tatsuya Suda Jaideep Vaidya CS590F Fall 2000.
The War Between Mice and Elephants LIANG GUO, IBRAHIM MATTA Computer Science Department Boston University ICNP (International Conference on Network Protocols)
Network Congestion Gabriel Nell UC Berkeley. Outline Background: what is congestion? Congestion control – End-to-end – Router-based Economic insights.
The War Between Mice and Elephants Presented By Eric Wang Liang Guo and Ibrahim Matta Boston University ICNP
Dynamic Internet Congestion with Bursts Stefan Schmid Roger Wattenhofer Distributed Computing Group, ETH Zurich 13th International Conference On High Performance.
1 EE 627 Lecture 11 Review of Last Lecture UDP & Multimedia TCP & UDP Interaction.
Controlling High- Bandwidth Flows at the Congested Router Ratul Mahajan, Sally Floyd, David Wetherall AT&T Center for Internet Research at ICSI (ACIRI)
Networks: Congestion Control1 Congestion Control.
Jinho Promoting the Use of End-To-End Congestion Control in the Internet IEEE/ACM Transaction on Networking Vol.7 No.4 August 1999 Sally Floyd and Kevin.
Computer Networks: TCP Congestion Control 1 TCP Congestion Control Lecture material taken from “Computer Networks A Systems Approach”, Third Ed.,Peterson.
WPI - Advanced Computer Network 1 Promoting the Use of End-to-End Congestion Control in the Internet IEEE/ACM Transactions on Networking, May Sally.
1 EE 689 Lecture 3 Review of Last Lecture UDP & Multimedia TCP & UDP Interaction.
Congestion Control and Resource Allocation
1 Traffic Sensitive Quality of Service Controller Masters Thesis Submitted by :Abhishek Kumar Advisors: Prof Mark Claypool Prof Robert Kinicki Reader:
1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug 1993), pp
Traffic Sensitive Active Queue Management - Mark Claypool, Robert Kinicki, Abhishek Kumar Dept. of Computer Science Worcester Polytechnic Institute Presenter.
Promoting the Use of End-to- End Congestion Control in the Internet Sally Floyd and Kevin Fall Presented by Scott McLaren.
ACN: TCP Friendly1 Promoting the Use of End-to-End Congestion Control in the Internet Sally Floyd and Kevin Fall IEEE/ACM Transactions on Networking May.
TCP Friendliness CMPT771 Spring 2008 Michael Jia.
1 Chapter 3 Transport Layer. 2 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4.
Data Communication and Networks
ACN: Congestion Control1 Congestion Control and Resource Allocation.
Medium Start in TCP-Friendly Rate Control Protocol CS 217 Class Project Spring 04 Peter Leong & Michael Welch.
Random Early Detection Gateways for Congestion Avoidance
Promoting the Use of End-to-End Congestion Control & Random Early Detection of Network Congestion.
Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs.
February 7, 2003BU Computer Science Colloquium Crimson - Traffic Aware Active Queue Management Mark Claypool CS Department Worcester Polytechnic Institute.
Advanced Computer Networks : RED 1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking,
Lect3..ppt - 09/12/04 CIS 4100 Systems Performance and Evaluation Lecture 3 by Zornitza Genova Prodanoff.
Transport Layer3-1 Chapter 3 outline r 3.1 Transport-layer services r 3.2 Multiplexing and demultiplexing r 3.3 Connectionless transport: UDP r 3.4 Principles.
CS540/TE630 Computer Network Architecture Spring 2009 Tu/Th 10:30am-Noon Sue Moon.
Link Scheduling & Queuing COS 461: Computer Networks
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
1 Lecture 14 High-speed TCP connections Wraparound Keeping the pipeline full Estimating RTT Fairness of TCP congestion control Internet resource allocation.
1 On Class-based Isolation of UDP, Short-lived and Long-lived TCP Flows by Selma Yilmaz Ibrahim Matta Computer Science Department Boston University.
Logical Topology Design and Interface Assignment for Multi- Channel Wireless Mesh Networks A. Hamed Mohsenian Rad Vincent W.S. Wong The University of British.
HighSpeed TCP for High Bandwidth-Delay Product Networks Raj Kettimuthu.
Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005.
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 - Queuing and Basics of QoS.
Network Protocols: Design and Analysis Polly Huang EE NTU
Deadline-based Resource Management for Information- Centric Networks Somaya Arianfar, Pasi Sarolahti, Jörg Ott Aalto University, Department of Communications.
Thoughts on the Evolution of TCP in the Internet (version 2) Sally Floyd ICIR Wednesday Lunch March 17,
We used ns-2 network simulator [5] to evaluate RED-DT and compare its performance to RED [1], FRED [2], LQD [3], and CHOKe [4]. All simulation scenarios.
Explicit Allocation of Best-Effort Service Goal: Allocate different rates to different users during congestion Can charge different prices to different.
Random Early Detection (RED) Router notifies source before congestion happens - just drop the packet (TCP will timeout and adjust its window) - could make.
Queue Scheduling Disciplines
Rate/Congestion Control for Multimedia Streaming
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Congestion Control 0.
Peer-to-Peer Networks 13 Internet – The Underlay Network
Thoughts on the Evolution of TCP in the Internet Sally Floyd PFLDnet 2004 February 16, 2004.
ECEN 619, Internet Protocols and Modeling Prof. Xi Zhang Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions.
Providing QoS in IP Networks
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Topics discussed in this section:
Chapter 3 outline 3.1 transport-layer services
COMP 431 Internet Services & Protocols
Chapter 3 outline 3.1 Transport-layer services
Congestion Control and Resource Allocation
Misbehaving flows can be classified
Flow and Congestion Control
Random Early Detection Gateways for Congestion Avoidance
“Promoting the Use of End-to-End Congestion Control in the Internet”
COMP/ELEC 429/556 Fall 2017 Homework #2
Chapter 3 outline 3.1 Transport-layer services
Congestion Control and Resource Allocation
Presentation transcript:

Promoting the Use of End-to-End Congestion Control in the Internet Sally Floyd and Kevin Fall IEEE-ACAM Transactions on Networking, 馬儀蔓

Outline Introduction The Problem of Unresponsive Flows Identifying Flows to Regulate Alternate Approach Conclusion 1 /30

Outline Introduction The Problem of Unresponsive Flows Identifying Flows to Regulate Alternate Approach Conclusion 2 /30

Introduction The Internet is more and more bigger. No longer rely on All end-nodes to use end-to-end congestion control for best-effort traffic. All developers to incorporate end-to-end congestion control in their Internet applications. The network itself must participate in controlling its own resource utilization. 3 /30

Controlling Best-Effort Traffic Assume the Internet will continue to become congested due to a scarcity of bandwidth, three approaches Per-flow scheduling Separately regulate the bandwidth used by each best-effort flow. Incentives for end-to-end congestions control Restrict the bandwidth of unresponsive best-effort flows. Pricing mechanisms 4 /30

Purpose As the Internet expands to an even larger community Recognize the essential role of end-to-end congestion control. Strengthening incentives for using end-to-end congestion control is critical issues. 5 /30

Outline Introduction The Problem of Unresponsive Flows Identifying Flows to Regulate Alternate Approach Conclusion 6 /30

Unresponsive Flows Unresponsive flows are high bandwidth flows that Do not use end-to-end congestion control Do not reduce their load on the network when subjected to packet drops. Two problems Unfairness Congestion collapse 7 /30

Problem of Unfairness When TCP flows competing with unresponsive UDP flows for scare bandwidth TCP flows reduce their sending rates. The uncoorperate UDP flows use the available bandwidth. 3 TCP flows 1 UDP flow 8 /30

Problem of Unfairness Unfairness with FCFS scheduling in routers. Goodput: a goodput of a flow is as the bandwidth delivered to the receiver, excluding duplicate packets. Aggregate goodput UDP goodput UDP arrival rate TCP goodput 9 /30

Problem of Unfairness No unfairness with weighted round-robin (WRR) scheduling in routers Aggregate goodput UDP goodput UDP arrival rate TCP goodput 10 /30

Congestion collapse Congestion collapse occurs when an increase in the network load results in a decrease in the useful work done by the network. Classical congestion collapse Fragment-based congestion collapse Congestion collapse from Undelivered packets Bandwidth is wasted by delivering packets through the network that are dropped before reaching their ultimate destination Increased control traffic Stale packets 11 /30

Congestion collapse Simulations with one TCP flow and three UDP flows, showing congestion collapse with FIFO scheduling. 12 /30

Congestion collapse Simulations with one TCP flow and three UDP flows, showing congestion collapse with WRR scheduling. 13 /30

Congestion collapse Congestion collapse as the number of UDP flows increases. 14 /30

Outline Introduction The Problem of Unresponsive Flows Identifying Flows to Regulate Alternate Approach Conclusion 15 /30

Flows to be Detected Identify a high bandwidth flow in times of congestion as Not TCP-friendly flow Applied to a single flow. Unresponsive flow Applied to a single flow. Disproportionate-bandwidth flow Applied to both a single flow and aggregates of flows. Based on IP and port number to distinguish different flows. 16 /30

Identify Not TCP-friendly flow Definition: TCP-friendly flows Reducing its congestion window at least by half upon indications of congestion. Increasing its congestion window by a constant rate of at most one packet per roundtrip time. Sending rate for a TCP connection— 17 /30

Identify Not TCP-friendly flow Limitation Only can test a flow of a single TCP connection. Difficult to determine the maximum packet size B in bytes or the minimum RTT. Measurements should be taken over a sufficiently large time interval. Only applies for non-bursty packet drop behavior. 18 /30

Identify Not TCP-friendly flow Response by the router: Restrict the bandwidth of best-effort flows determined not to be TCP-friendly in times of congestion. Remove restriction when There is no longer any significant link congestion. It has been shown to reduce its arrival rate appropriately in response to congestion. 19 /30

Identify Unresponsive Flows The TCP-friendly test is Based on the specific congestion control responses of TCP. Not very useful for routers unable to assume strong bounds on TCP packet sizes and round- trip times. So, verify that a high-bandwidth flow was responsive. 20 /30

Identify Unresponsive Flows 21 /30

Identify Unresponsive Flows Limitation: less straightforward for a flow with a variable demand. Possible end-to-end congestion mechanisms. The original data source itself could be ON/OFF or have strong rate variations over time. Response by the router: Restrict the bandwidth of best-effort flows determined to be unresponsive in times of congestion. Can apply test actively. 22 /30

Identify Disproportionate- bandwidth flow Identify flows that use a disproportionate share of the bandwidth in times of high congestion. A disproportionate share is defined as a significantly larger share than other flows. TCP flow could use a “disproportionate share” of bandwidth, if TCP With persistent demand Using large windows With a significantly smaller roundtrip time or larger packet sizes 23 /30

Identify Disproportionate- bandwidth flow 24 /30

Identify Disproportionate- bandwidth flow Limitation: gauging the level of unsatisfied demand is problematic. A large RRT TCP flow A short busty web transfer Response by the router: Limit the restriction of a high-bandwidth responsive flow. So, over the long run, each such flow receives as much bandwidth as the highest-bandwidth unrestricted flow. 25 /30

Outline Introduction The Problem of Unresponsive Flows Identifying Flows to Regulate Alternate Approach Conclusion 26 /30

Per-flow scheduling Per-flow scheduling separately regulate the bandwidth used by each best-effort flow. Indeed care of many of the fairness issues concerning competing best-effort flows. However, It can not prevent congestion collapse from undelivered packets. May encourage flows make sure that “their” queue in congested router never goes empty. 27 /30

Pricing mechanisms Pricing mechanisms use pricing as a way to Share transmission resources. Control and prevent the network congestion. However, the deployment of pricing structures is sensitive to the behavior of each flow in the global Internet. 28 /30

Outline Introduction The Problem of Unresponsive Flows Identifying Flows to Regulate Alternate Approach Conclusion 29 /30

Conclusion In the Internet, Need for end-to-end congestion control. Need mechanisms to detect and restrict unresponsive or high-bandwidth best-effort flows in times of congestion control. Not yet outlined a specific proposal for mechanisms for identifying and controlling unresponsive flows. 30 /30