Network Management has always been and always will be essential to the Internet Testimony of George Ou Former Network Engineer www.LANArchitect.net FCC.

Slides:



Advertisements
Similar presentations
Internet Hardware Connected ‘Servers’ Servers provide: – Web pages – – File downloads.
Advertisements

IPv4 to IPv6 Migration strategies. What is IPv4  Second revision in development of internet protocol  First version to be widely implied.  Connection.
1 CNPA B Nasser S. Abouzakhar Queuing Disciplines Week 8 – Lecture 2 16 th November, 2009.
TELE202 Lecture 8 Congestion control 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »X.25 »Source: chapter 10 ¥This Lecture »Congestion control »Source:
Incentives Build Robustness in BitTorrent Bram Cohen.
Packet Video TCP Video Streaming to Bandwidth-Limited Access Links Puneet Mehra and Avideh Zakhor Video and Image Processing Lab University of California,
Fundamentals of Multimedia Part III: Multimedia Communications and Networking Chapter 15 : Network Services and Protocols for Multimedia Communications.
Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard Published in 2012 ACM’s Internet Measurement Conference (IMC) Five students from.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Network Border Patrol: Preventing Congestion Collapse and Promoting Fairness in the Internet Celio Albuquerque, Brett J. Vickers, Tatsuya Suda 1.
Network Resource Management Jason Gaedtke Chief Scientist W3C Video on the Web Workshop December 2007.
Comparison and Analysis of FIFO, PQ, and WFQ Disciplines on multimedia
Source-adaptive multilayered multicast algorithms for real_time video distribution Brett J. Vickers, Celio Albuquerque, Tatsuya Suda IEEE/ACM TRANSACTIONS.
1 Solutions to Performance Problems in VOIP over Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi.
High speed TCP’s. Why high-speed TCP? Suppose that the bottleneck bandwidth is 10Gbps and RTT = 200ms. Bandwidth delay product is packets (1500.
Network Traffic Measurement and Modeling CSCI 780, Fall 2005.
Aleksandar Kuzmanovic & Edward W. Knightly A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols.
1 TCP-LP: A Distributed Algorithm for Low Priority Data Transfer Aleksandar Kuzmanovic, Edward W. Knightly Department of Electrical and Computer Engineering.
A Real-Time Video Multicast Architecture for Assured Forwarding Services Ashraf Matrawy, Ioannis Lambadaris IEEE TRANSACTIONS ON MULTIMEDIA, AUGUST 2005.
Efficient Internet Traffic Delivery over Wireless Networks Sandhya Sumathy.
Network Neutrality 4/21/20111Harvard Bits. 4/21/2011Harvard Bits2.
Lecture 5: Congestion Control l Challenge: how do we efficiently share network resources among billions of hosts? n Last time: TCP n This time: Alternative.
1 K. Salah Module 6.1: TCP Flow and Congestion Control Connection establishment & Termination Flow Control Congestion Control QoS.
Treatment-Based Traffic Signatures Mark Claypool Robert Kinicki Craig Wills Computer Science Department Worcester Polytechnic Institute
1 Automated Copyright Notice System (ACNS) September 2003 UNIVERSAL MUSIC GROUP UNIVERSAL STUDIOS.
03/12/08Nuova Systems Inc. Page 1 TCP Issues in the Data Center Tom Lyon The Future of TCP: Train-wreck or Evolution? Stanford University
1 Dr. Lawrence Roberts CEO, Founder, Anagran Internet Evolution into the Future.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
APPA Community Broadband Conference ISP Network Challenges Peer-to-Peer Controls Mark Bailey, Channel Manager.
11 September 2015 RE Meyers, Ms.Ed. CCENT ICND1 Exam Topics Review Describe the Operation of Data Networks: Network Diagrams and Data Paths.
1 Raiders of the lost Arp Customer A Broadband 1.5 Mbps aDSL ISP Network Edge ISP Network Edge Set-top device converts IP into Video Signal for TV Every.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Voice over IP in the Enterprise. What is VOIP? The use of data networks to carry voice without a loss of sound quality The use of data networks to carry.
INFOCOM A Receiver-Driven Bandwidth Sharing System (BWSS) for TCP Puneet Mehra, Avideh Zakhor UC Berkeley, USA Christophe De Vleeschouwer Université.
Network Instruments VoIP Analysis. VoIP Basics  What is VoIP?  Packetized voice traffic sent over an IP network  Competes with other traffic on the.
Ch 1. Computer Networks and the Internet Myungchul Kim
2000 년 11 월 20 일 전북대학교 분산처리실험실 TCP Flow Control (nagle’s algorithm) 오 남 호 분산 처리 실험실
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 3: Introduction to IP QoS.
1 Congestion Control Computer Networks. 2 Where are we?
Broadband Access Solutions via Satellite Sergey Eleferov Russian Satellite Communications Company Satellite Communications Centre “DUBNA”
Copyright 2008 Kenneth M. Chipps Ph.D. Controlling Flow Last Update
CS640: Introduction to Computer Networks Aditya Akella Lecture 20 - Queuing and Basics of QoS.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
Transport Layer3-1 TCP throughput r What’s the average throughout of TCP as a function of window size and RTT? m Ignore slow start r Let W be the window.
DCCP: Issues From the Mailing List Sally Floyd, Eddie Kohler, Mark Handley, et al. DCCP WG March 4, 2004.
Solving this Internet resource sharing problem... and the next, and the next Bob Briscoe Chief Researcher BT Group (& UCL) Lou Burness, Toby Moncaster,
TCP continued. Discussion – TCP Throughput TCP will most likely generate the saw tooth type of traffic. – A rough estimate is that the congestion window.
Tutorial 11 Solutions. Question 1 Q1. What is meant by interactivity for streaming stored audio/video? What is meant by interactivity for real-time interactive.
Optimization Problems in Wireless Coding Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
1 Three ways to (ab)use Multipath Congestion Control Costin Raiciu University Politehnica of Bucharest.
Dynamic Behavior of Slowly Responsive Congestion Control Algorithms (Bansal, Balakrishnan, Floyd & Shenker, 2001)
Scheduling Mechanisms Applied to Packets in a Network Flow CSC /15/03 By Chris Hare, Ricky Johnson, and Fulviu Borcan.
Different Traffic Management Techniques for Mobile Broadband Networks
Congestion Control and
Chapter 6 Queuing Disciplines
TCP-LP Distributed Algorithm for Low-Priority Data Transfer
A Selective Retransmission Protocol for Multimedia on the Internet
IT351: Mobile & Wireless Computing
Congestion Control, Quality of Service, & Internetworking
Flow Rate Fairness Many slides are borrowed from Bob Briscoe
TCP Congestion Control
DCCP: Issues From the Mailing List
Network Basics and Architectures Neil Tang 09/05/2008
Chapter 8 – Data switching and routing
Presentation transcript:

Network Management has always been and always will be essential to the Internet Testimony of George Ou Former Network Engineer FCC Broadband Industry Practices Hearing WC Docket No Stanford University April 17, 2008

Internet meltdown in 1980s Lack of adequate congestion control in TCP allowed too many FTP users to overload Internet around 1986 Van Jacobson created congestion control algorithm for TCP in 1987 ◦ Congested routers randomly dropped packets to force every TCP end-point (client) to cut flow rate in half ◦ TCP clients then slowly increased flow rate with every successful transmission until next packet drop ◦ Caused all TCP streams to home in towards equal flow rate ◦ Fair bandwidth sharing, but only for applications of its time Jacobson’s algorithm saved the Internet in 1987 and remains dominant standard after 20 years Early example of managing network congestion 2

World Wide Wait in 1990s First generation of web browsers were not optimized for Internet World Wide Web turned in to the World Wide Wait Version 1.1 of HTTP revamped to efficiently use resources over 1.0 3

Today’s crisis on the Internet Video-induced congestion collapse ◦ Efficient existing broadcast model migrating to bandwidth-intensive Video on Demand model over IP ◦ Full migration of video could require 100- to 1000-fold increase in Internet capacity ◦ Exponentially more bandwidth required as video bit- rate and resolution increase to improve quality P2P is the dominant distribution model because most of its content is “free” (read pirated) Video can fill any amount of bandwidth 4

More bandwidth doesn’t help Bandwidth hogs According to the Japanese Government 1% of users account for ~47% of traffic 10% of users account for ~75% of traffic 90% of users get leftover 25% The few throttling the many 5

Exploiting Jacobson’s algorithm 50/50 Fair 80/20 Unfair 92/8 Unfair 6

Persistence advantage in P2P apps *Corporate VPN telecommuter worker using G kbps payload and 33.8 kbps packetization overhead **Vonage or Lingo SIP-based VoIP service with G kbps payload and 18.8 kbps packetization overhead ***I calculated that I sent kilobytes of mail over the last 56 days averaging kbps 7

Weighted TCP: Per-user fairness 92/8 Unfair 50/50 Fair BT chief researcher Bob Briscoe proposes TCP fix before the IETF to neutralize multi-stream loophole Changing TCP takes many years, but it’s even harder to get over a billion devices to switch to new TCP client Newer network-based solutions being implemented 8

Present solutions use protocol throttling ◦ P2P applications use disproportionately large amounts of bandwidth so they’re throttled to balance them out ◦ Use conventional router de-prioritization techniques on P2P ◦ Use TCP resets to occasionally stop P2P seeders ◦ Potentially affect an extremely rare low-bandwidth P2P user ◦ Can be fooled by protocol obfuscation techniques Future solutions are protocol-agnostic ◦ Weighted packet dropping at router and/or fair upstream scheduling on CMTS accomplishes per-user fairness ◦ Only targets bandwidth hogs and forces them to back off ◦ Cannot be fooled by protocol obfuscation 9 Present and future solutions

No network management Metered Internet ISP throttles BW hogging protocols Protocol-agnostic per-user fairness Pros Cons Cost free deployment10% of users throttles 90% of users down to 25% of resources Pros Cons Solves congestion because users self-throttle for fear of massive ISP bill. Danger of massive ISP bills for consumer. Makes P2P usage cost- prohibitive. By definition a “Toll road”. Pros Cons Out-of-band deployment with TCP resets or use of common de- prioritization techniques. Results in fairer distribution of bandwidth. Can be fooled by protocol obfuscation. Possibility of affecting non bandwidth hogs. Pros Cons Equal sharing of resources between users of same tier. Can’t be fooled by protocol obfuscation. Requires more drastic in-line changes to network. Requires real-time tracking of per-user bandwidth consumption and enforcement of per-user fairness. Fair Unfair Intelligent Dumb Reasonable Unreasonable Future Past What is reasonable network management? 10

Network management ensures harmonious coexistence P2P applications need volume, not priority Interactive applications (Web) and real-time applications (VoIP) want priority and not volume P2P, Interactive, and real-time applications each get what they want under a managed network Interactive and real-time apps have small/fixed volume so no matter how much they’re prioritized, they cannot slow down a P2P download. Unmanaged networks regardless of capacity will always be unfair and hostile to interactive and real-time applications 11