Download presentation
Presentation is loading. Please wait.
1
A TCP With Guaranteed Performance in Networks with Dynamic Congestion and Random Wireless Losses Stefan Schmid, ETH Zurich Roger Wattenhofer, ETH Zurich 2nd Annual International Wireless Internet Conference (WICON) Boston, MA, USA, August 2006 Distributed Computing Group
2
Stefan Schmid, ETH Zurich @ WICON 20062 Large Data Transfers (1) CERN, Geneva ETH, Zurich
3
Stefan Schmid, ETH Zurich @ WICON 20063 Large Data Transfers (2) CERN, Geneva ETH, Zurich TCP Connection Lecture E = mc 2
4
Stefan Schmid, ETH Zurich @ WICON 20064 Large Data Transfers (3) Characteristics of transfer: - Internet can be congested - Available bandwidth changes over time - Packets may be lost, especially on wireless link Congestion Losses
5
Stefan Schmid, ETH Zurich @ WICON 20065 TCP Congestion Control (1) TCP avoids congestion - Congestion control lies at the heart of TCP - Prevents congestion collapses of Internet (e.g., 1980) How to prevent congestion? Senders reduce sending rate when Internet is congested - senders maintain congestion window - strategy: „additive-increase, multiplicative-decrease“ (AIMD)
6
Stefan Schmid, ETH Zurich @ WICON 20066 TCP Congestion Control (2) How does a sender know about congestion? When packets are lost, TCP sender assumes that routers are overloaded! For packets lost for other reasons than congestion, throughput is reduced unnecessarily!
7
Stefan Schmid, ETH Zurich @ WICON 20067 TCP Congestion Control (3) Lecture E = mc 2 Wasted throughput: student may seek to increase her download bandwidth (selfishly)!
8
Stefan Schmid, ETH Zurich @ WICON 20068 In this paper… A model is presented which comprises both dynamic changes of the available bandwidth (dynamic congestion) and random packet losses (e.g., wireless links) Model allows for formal analysis of transfer protocol‘s performance! Thereby, a selfish perspective is assumed - We look at protocols which aim at maximizing their throughput, regardless of consequences for other participants (no fairness).
9
Stefan Schmid, ETH Zurich @ WICON 20069 Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion
10
Stefan Schmid, ETH Zurich @ WICON 200610 Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion
11
Stefan Schmid, ETH Zurich @ WICON 200611 Basic Model (1) Time is divided into synchronous rounds Framework of online algorithms: - Adversary chooses available bandwidth u t - Protocol chooses sending rate x t In addition, all packets are lost in a given round with probability p
12
Stefan Schmid, ETH Zurich @ WICON 200612 Basic Model (2) Gain of transfer protocol ALG at time t: Gain of optimal (offline) transfer strategy OPT: We are interested in minimizing the (strict) competitive ratio, i.e., the gain of OPT divided by the gain of ALG.
13
Stefan Schmid, ETH Zurich @ WICON 200613 Basic Model (3) Takes into account an opportunity cost Assumption: No packets are transmitted at all if rate too large - Pessimistic, but losses engender overhead (e.g., time-outs) Goal of ALG is to always send at (or slightly lower) rate of currently available bandwidth. Thereby, ALG does not know whether losses are due to congestion or wireless links!
14
Stefan Schmid, ETH Zurich @ WICON 200614 In practice, it can be assumed that congestion does not change too abruptly over time. Therefore, we bound the adversary ADV which chooses the available bandwidth as follows (multiplicative changes): u t has to be chosen from [u t-1 /μ, u t-1 μ ] Basic Model (4) A similar model but without random losses has been studied by Karp, Koutsoupias, Papadimitriou and Shenker (FOCS 2000)!
15
Stefan Schmid, ETH Zurich @ WICON 200615 Transfer protocol achieving a provable performance: Provable Performance in Basic Model In order to compensate wireless losses, TCPW increases the bandwidth by a factor larger than μ after successful rounds (aggressive MIMD strategy). Strict competitive ratio: at most 4(μ 2 + μ)
16
Stefan Schmid, ETH Zurich @ WICON 200616 Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion
17
Stefan Schmid, ETH Zurich @ WICON 200617 Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion
18
Stefan Schmid, ETH Zurich @ WICON 200618 Network traffic is often bursty. Network calculus has introduced the notion of leaky-bucket arrival curves to study queuing theory from a worst-case perspective. Also a reasonable model for dynamics on transport layer! Extending the Model with Bursts leaky bucket arrival curve
19
Stefan Schmid, ETH Zurich @ WICON 200619 Dynamics of ADV has to correspond to leaky-bucket constraints New Dynamic Adversary where Adversary can accumulate power in some rounds to change available bandwidth more abruptly later!
20
Stefan Schmid, ETH Zurich @ WICON 200620 Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion
21
Stefan Schmid, ETH Zurich @ WICON 200621 Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion
22
Stefan Schmid, ETH Zurich @ WICON 200622 The TCP Wichita Transfer Protocol for Bursty Environment After successful transmissions, rate is increased by a factor of 2 μ 2. x t >u t : Transmission rate compared to OPT can be described by Markov chain. - Only in case of random errors, TCPW loses ground / reduces too much! Analysis: Look at cases x>u (fail) and x<u (pot. success) individually.
23
Stefan Schmid, ETH Zurich @ WICON 200623 Analysis In rounds where x t >u t, TCPW has gain = 0! - But: TCPW does not miss much gain! - TCPW reduces its rate gemoetrically - TCPW never overshoots much TCP Wichita is 4(μ+Bμ 2 )-competitive against a bursty adversary if μ<(1-p)/4Bp. The following result can be shown:
24
Stefan Schmid, ETH Zurich @ WICON 200624 Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion
25
Stefan Schmid, ETH Zurich @ WICON 200625 Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion
26
Stefan Schmid, ETH Zurich @ WICON 200626 Simulation Random bandwidth changes with bursts - Random changes smaller than μ, until enough is accumulated for burst
27
Stefan Schmid, ETH Zurich @ WICON 200627 Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion
28
Stefan Schmid, ETH Zurich @ WICON 200628 Talk Overview Basic Model Extending the Model to Incorporate Bursts TCP Wichita and Analysis Simulation Conclusion
29
Stefan Schmid, ETH Zurich @ WICON 200629 Conclusion (1) A framework which allows for formal protocol analysis and incorporates dynamic congestion and random losses We believe that there is still little algorithmic research on the transport layer! Network calculus may be a good model for dynamics in various settings! Selfish throughput maximization - Really a threat? Experiences? - Security: Routers often drop UDP packets first in case of congestion! Cheating possible?
30
Stefan Schmid, ETH Zurich @ WICON 200630 Conclusion (2) Open research questions: - Better / tight bound for competitive ratio? - Randomized online algorithms? - Impact on stability in case of multiple flows? - Model extensions: buffers, varying round trip times, etc.? - Model verification & real implementation?
31
Stefan Schmid, ETH Zurich @ WICON 200631 Questions and Comments? Stefan Schmid Distributed Computing Group ETH Zurich, Switzerland schmiste@ethz.ch http://dcg.ethz.ch/members/stefan.html Thank you for your attention!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.