ICP: Design and Evaluation of an Interest Control Protocol for Content-Centric Networking

Size: px
Start display at page:

Download "ICP: Design and Evaluation of an Interest Control Protocol for Content-Centric Networking"

Transcription

1 ICP: Design and Evaluation of an Interest Control Protocol for Content-Centric Networking Giovanna Carofiglio, Massimo Gallo, Luca Muscariello Bell Labs, Alcatel-Lucent, Orange Labs, France Telecom, Abstract Content-centric networking (CCN) brings a paradigm shift in the present Internet communication model by addressing named-data instead of host locations. With respect to TCP/IP, the transport model is connectionless with a unique endpoint at the receiver, driving a retrieval process natively point to multi-point. Another salient feature of CCN is the possibility to embed storage capabilities into the network, adding a new dimension to the transport problem. The focus of this work is on the design of a receiver-driven Interest control protocol for CCN, whose definition, to the best of our knowledge, still lacks in literature. ICP realizes a window-based Interest flow control, achieving full efficiency and fairness under proper parameters setting. In this paper, we provide an analytical characterization of average rate, expected data transfer delay and queue dynamics in steady state on a single and multi-bottleneck network topology. Our model accounts for the impact of on-path caches. Protocol performance is also assessed via packet-level simulations and design guidelines are drawn from previous analysis. I. INTRODUCTION The move towards a future Internet is today hindered by the mismatch between the host-oriented model, at the foundation of the current network architecture, and the dominant content-oriented usage, centered on data dissemination and retrieval. With the spread of data-centric services, the need for a content-aware infrastructure has been addressed by application-layer solutions like CDNs, PP overlays and HTTP proxies, deployed on top of the current Internet infrastructure. However, such solutions suffer from a number of limitations in terms of efficient resources utilization, scalability and management cost, mainly because they are engineered as overlay service-dedicated infrastructures at application layer. Content-centric networking (CCN) proposals have then emerged to redesign the Internet architecture around named data, in order to natively realize content dissemination at networking level. Pioneered by Van Jacobson [] but also previously advocated in [], the idea of a network architecture centered on named data has recently gained momentum in the research community and originated various research efforts (see [], for a list of current projects). As a shared principle of CCN proposals, content is uniquely identified, addressed and retrieved by its name independently from its location, and storage capabilities are embedded into the network. Previous work on content-centric networks have mainly focused on the global architecture design [], [], [], [5], while less effort has been devoted to the study of the interaction between caching and transport mechanisms in such architectures and notably, on the definition of a CCN flow control protocol. CCN caching benefits have been explored independently. Somaya et al. [] recently analyze packet-level caching feasibility in routers at line-speed, while Lee et al. [7] consider the benefits of CCN in-network storage in terms of energy efficiency with respect to traditional distribution architectures. Also, Carofiglio et al. [8] show the role played by storage management in CCN by means of experimental evaluation. A first analytical characterization of transport performance and of its interaction with packet-level caching dynamics is provided in [9], with no bandwidth limitation. In [], the modeling framework is extended to the case of limited bandwidth (and storage) resources assuming perfect fair bandwidth sharing among flows. Our work aims at complementing existing CCN designs by focusing on the definition and the analysis of a suitable and reliable transport protocol. The contribution of this paper is threefold: (i) We design a window-based Interest flow control protocol driven by an AIMD (Additive Increase Multiplicative Decrease) mechanism to regulate the Interest rate at the receiver. (ii) We analyze the designed protocol on a single and multibottleneck link scenario, by accounting for the interaction with in-network caching, building upon our previous storage sharing model in [9]. Our analysis also proves that ICP guarantees optimal fair and efficient bandwidth sharing, as described in []. (iii) We carry out packet-level simulations to corroborate analytical findings and give guidelines on parameter setting. The rest of the paper is organized as follows: in Sec.II we describe the system and summarize model assumptions. Sec.III describes ICP design, while Secc.IV-VI report the analysis respectively in a single and multi-bottleneck scenario. Guidelines on ICP parameters setting are provided in Sec.VII-A, whereas numerical results are gathered in Sec.VII-B. Finally, Sec.VIII concludes the paper. II. SYSTEM DESCRIPTION AND MODEL ASSUMPTIONS In this paper we primarily focus on the content-centric networking (CCN/NDN) proposal by Parc [] (see also []), though the modeling framework has broader applicability in the context of Information Centric Networking (ICN []) and more generally receiver-based transport networks employing in-network caching (e.g. CDNs). Let us briefly describe how such systems work and summarize model assumptions and notation.

2 Content items (data) are split into packets, uniquely identified by a name, and permanently stored in one (or more) repository(ies). We consider a set of M different content items, of average size σ packets, grouped in K classes with the same popularity, i.e. content items of class k are requested with probability q k, k K. In the rest of the paper, we assume a Zipf popularity distribution, q k = c/k α, α >. Users retrieve a content item using a receiver-driven flow control protocol based on subsequent packet queries (denoted as Interests), triggering data packets delivery (see Fig.). Content requests for items in class k are assumed to arrive according to a Poisson process of intensity λ k = λq k (cfr. [9]). Considerations about ICP sensitivity to the Poisson assumption are reported in []. A name-based routing protocol guarantees that queries are properly routed towards a data repository, following one or multiple paths. Every intermediate node keeps track of outstanding queries in data structures called PITs (Pending Interest Tables), to deliver the requested data back to the receiver on the reverse path. In addition, nodes temporarily cache data packets in a LRU managed cache of size x packets (content store). Data may come from the repository, or from any intermediate cache along the path with a temporary copy of the data packet. Packets of the same content can therefore be retrieved in a multi-path fashion, i.e. from multiple locations with different round trip times, affecting the overall delivery performance. Independent of the considered topology, and for a given user, we denote P the set of paths relaying the user to content repository(ies). Each path is composed by intermediate hops i =,,... numbered starting from the user. Indeed, when an Interest is emitted and forwarded through a path, a copy of the requested packet can be found and retrieved at intermediate hops caches. We denote such sub-paths as routes and R φ identifies the set of routes of a given path φ. E.g. r φ i refers to the sub-path from the user to the i th hop on the path φ to the repository. The resulting rate and content delivery time are strongly affected by the notion of average distance between the user and the location of the requested content, which we will explicitly define through the virtual round trip time (VRTT), in analogy with the RTT of connection-based transmission protocols like TCP in Sec.V. A. Protocol Objectives III. ICP DESIGN A robust receiver-driven flow control protocol is responsible for realizing efficient data retrieval by controlling the receiver request rate and adapting it according to available network resources. In CCN, a transport session is realized by Interest queries progressively sent out by the receiver, routed by name towards a content store. Reliability: the first goal of ICP is to guarantee reliable data transfers by re-expressing Interests in case of Data packet losses. ICP schedules Interest retransmissions at the expiration of a timer τ, maintained at the receiver. In this way, the flow control protocol does not rely on losses as congestion notifications, but on delay measurements and timer expirations. Efficiency: the second objective of ICP is to minimize the completion time of data transfers. To this aim, ICP employs an AIMD (Additive Increase Multiplicative Decrease) mechanism for adapting the Interest window size as a mean to attain the maximum available rate allowed on the network path. Fairness: the third goal of ICP is to achieve fair bandwidth allocation among flows (namely, content retrievals), sharing the same route and, thus, the same limited down-link bandwidth. Let us specify the details of ICP design, driven by the objective to attain a globally efficient and fair equilibrium. B. Protocol description Data packets are identified by a unique name (the content name plus a segment identifier) and are requested via Interests in the order decided by the application. The receiver window, W, defines the maximum number of outstanding Interests a receiver is allowed to send. ) Interest Window Increase: W is increased by η/w at Data packet reception. This operation is implemented using integer arithmetic so that W is incremented by η (set to as default value) when a complete window of Interest is acknowledged by data reception. ) Interest Window Decrease: A congestion detection coincides with a timer expiration. The protocol reacts by multiplying W by a decrease factor β <, no more than once for a duration equal to the timer as in Fig.(b). Note that re-expression of an interest, after a time-out, is necessary to recover losses, even though data may just be delayed at the bottleneck. At the same time, retransmitted Interests sent just after a time-out can be filtered, if the PIT timer at the first node is not yet expired (see Fig. on the right). Fig.. Trellis diagram for window evolution: increase (left), decrease (right). ) Timers: Properly setting the Interest timer value τ and the PIT timer (which allows to remove a pending Interest at each node) is crucial in CCN. In general, τ must be trivially set larger than the minimum network delay, otherwise every sent Interest would trigger a timer expiration. In addition, a minimum τ value is necessary to guarantee high utilization of the available bandwidth, as precised by the analysis in Sec.IV- VI-A. A trade-off between a large τ value for efficiency reasons and a small τ value for faster window adaptation, is given by an adaptive timer based on the estimation of the minimum round trip delay, as common in TCP literature. Therefore, in the case of variable τ, ICP maintains round trip delay estimates at every data packet reception, by updating

3 RTT min and RTT max averaged over a history of samples ( Data packets in our implementation), excluding retransmitted packets. Each flow adapts its timer τ according to the rule: τ = RTT min + (RTT max RTT min )δ () with δ =.5 (as in [], where stability of the RTT estimation is also proven). Also, in our setting, we use an initial value of τ = ms and RTT max = RTT min initially after the first measured roud-trip delay. The PIT timer is fundamental in CCN to limit the number of pending Interests, hence the table size. The larger this value the higher the number of filtered Interests, not forwarded upstream towards content repository. On the other hand, a small PIT timer implies a large number of unnecessary retransmissions, since delayed packets arriving after PIT time-outs are discarded. Throughout the paper, we set the PIT timer never smaller than τ. IV. SINGLE BOTTLENECK ANALYSIS Consider the case of a single bottleneck link of finite downlink capacity C pkt/s relaying a user to a content repository. We assume for the analysis constant round-trip propagation delay R and Interest retransmission timer τ > R. We focus on a single content retrieval before extending the analysis to the case of n parallel content transfers. Interests are sent using the protocol described in Sec.III, with no maximum window limitations. We analyze the system evolution via a deterministic fluid model of the instantaneous rate at the receiver X(t) and the instantaneous queue occupancy Q(t) at the repository, both modeled as continuous time variables (see [] for an overview). Data packets are queued at repository output interface, as a result of down-link bandwidth limitations. The queuing delay is Q(t)/C, where Q(t) is the instantaneous queue occupancy in number of packets at time t. System dynamics are described by the following ODEs: dx(t) η = dt (R + Q(t)/C) βx(t) {R+Q(t)/C=τ}, dq(t) = X(t) C {Q(t)>} () dt The Interest rate is assumed to be linearly proportional to the Interest window W (t), that is X(t) = W (t)/(r + Q(t)/C) and hence it linearly grows proportional to the inverse of the square of the round trip time. A time-out triggers a window (hence, a rate) drop proportional to the decrease factor β <. We remark that the model defines a time-out at the instant when the round trip time is equal to τ to avoid unrealistic repeated window decreases. This models the fact that the protocol triggers no more than one window decrease over a time window of τ, after a timer expiration. Note that this fluid representation via ODEs has been extensively adopted in TCP modeling literature (e.g. []). Proposition.: The steady state solution of eqq.() is a periodical limit cycle of duration T, with < T < Cβτ ( β)η, and time average X = C, Q L Q C(τ R) where Q L = C(τ R) η ( C(τ R)β β ) and assuming that τ > τ min, with τ min = R + η T C ( β β ). The time average is defined as f = T f(t)dt. Proof: reported in [] due to lack of space. Observation.: From the steady state analysis we can draw the following conclusions: ) The value of τ must be chosen larger than the network delay R, otherwise every Interest request expires and the window decreases to the minimum value. ) At the same time, τ should be chosen large enough to accommodate more than the bandwidth delay product in order to fully utilize the link capacity. Here we focus on a large buffer regime allowing full bandwidth utilization. In case of small buffers, the queue may become empty, and the protocol would not assure full utilization. We neglect this second regime that can be avoided by correct parameter setting of the protocol. Window size [pkts] Queuing delay [ms] Time [s] Number of flows w (t) w (t) w (t) Q (t)/c Fig.. Interest window and queuing delay evolution for three data transfers, with R= µs, C= Mbps, τ = ms. Prop.. can be generalized to the case of multiple flows sharing the same link. Proposition.: Given a variable number of flows sharing the same link, generated according to a Poisson process N of rate λ, each one composed of σ packets on average, the expected flow rate in steady state is E[ X] = C( ρ), where ρ = λσ/c. Proof: reported in [] due to lack of space. To support analytical findings and to assess model accuracy, we developed a CCN packet-level simulator whose details are reported in []. In Fig. we show the simulated Interest window size evolution of three content retrievals starting at different instants, with the first transfer ending at t = 9 s. The queuing delay is also reported. Let us first observe the periodical behavior of window size and queue occupancy, whose limit cycle satisfies analytical prediction. Moreover, as expected, the frequency of queue occupancy oscillations is proportional to the number of parallel transfers n, since the queue input rate linearly increases with slope nη. Let us extend this analysis to the network case where multiple bottlenecks can exist and the distance between the user and the closest content replica is impacted by the caches along the route. To this aim, the next section introduces the CCN storage sharing model we introduced in [9]- []. Number of flows

4 V. DATA STORAGE SHARING MODEL As previously observed, each path is associated a metric that we denote as virtual round trip time that accounts for the average distance (in time) at which a Data packet is retrieved. Definition 5.: VRTT k represents the average time interval between the dispatch of an Interest and the Data packet reception for packets of content items in class k. This variable plays a similar role to round trip time for TCP connections in IP networks. When the time variable is not specified, VRTT k denotes the stationary value. VRTT φ k is defined for a given path φ from the user to a repository as a weighted sum of the round trip delays R(r φ i ) associated to the sub-paths r φ i, i.e. to the route between the user and the i th hop, with i =...N, where the weights correspond to the stationary hit probabilities, p k (r φ i ), to find a chunk of class k at hop i on the considered path, given that a miss was originated by all previous hops. For k =,..., K, VRTT φ k = i R(r φ i )( p k(r φ i )) p k (r φ j ) () i:r φ i Rφ j= To ease the notation in the case of a single path, we will replace r φ i by i, and VRTT φ k by VRTT k, whenever a single path is considered. Under these assumptions, in [9], we derived the miss probabilities in steady state for the a linear and a tree topology with no uplink bandwidth limitation. Note that a single path relies the user to the repository in these topologies, though the same analytical arguments allow to extend the hit probability computation to more complex topologies with multiple paths. We report here the main results of [9], generalized in [] to the case of possibly different cache sizes. Recall that for a given path φ, hop index i also identifies the route r φ i. Proposition 5.: Under previous assumptions, for a given path relaying a user to content repository, the stationary miss probability for packets of class k requested at the first hop, p k (), is given by p k () e λ m q kgx α () for large x, where /g = λcσ α m α Γ ( α) α, qk = c/k α, and x denotes the cache size at the first hop. As shown in [9], the miss process at node, and more generally i, can be well approximated with a Markov Modulated Rate process (MMRP) (i.e. a Poisson process at content level) of intensity µ(i) = K k= p k(i)λ k (i). For a linear topology the miss rate at node i also coincides with the input rate at node i+, i, i.e. µ(i) = K k= p k(i)λ k (i) λ(i + ), whilst for the symmetric binary tree topology λ(i + ) = µ(i), for i. The content popularity distribution also changes at hops i > because only missing packet requests are forwarded upstream, then for k =,..., K, and using q k q k (), i j= p l(j)q l. q k (i) = i j= p k(j)q k / K l= For a linear topology, the stationary miss probability values at hops i > are consequently derived. Proposition 5.: Given a linear topology with N hops between a user and the content repository a MMRP content request process with intensity λ and a popularity distribution q k, k =,..., K, < i N it holds i ( ) α xj+ log p k (i) = p k (j) log p k () (5) j= x j Notice that the same results hold for a hierarchical tree-like network topology. Proof: reported in [9]- []. VI. MULTI-BOTTLENECK ANALYSIS The virtual round trip time weights the delivery time associated to each route by the probability to retrieve a data packet from the given route. As a result of the interaction among flows, and of the transport protocol reaction triggered by time-outs, route delivery time varies over time on a short timescale. On the contrary, the probability to retrieve a Data packet from a given route, changes on a longer timescale. In fact, it depends on cache dynamics at different network levels, less sensitive to traffic variations. Such timescale separation is confirmed by our simulations and motivated by the stationarity of the global request process which impacts the hit/miss probabilities at different caches. Therefore, we can refer to the storage sharing analysis in Sec.V as a macroscopic model of storage sharing of CCN network dynamics, which gives us the hit/miss probabilities based on a stationary request process. On top of it, we provide, in this section, a microscopic study of the packet-level dynamics of content retrieval (flows), subject to the AIMD Interest rate control described in Sec.III. The analysis proves that ICP realizes the efficient and fair bandwidth sharing equilibrium described in [9]- []. Let us state the main results about rate and queue occupancies evolution (Sec.VI-A) for a route composed of N caches towards the repository. A. Main results Let us focus on the case of a single path between the user and the content repository, hence we omit the path index φ. We denote by n i,k the number of ongoing flows of class k over route r i and by n i K k= n i,k the flows sharing route r i. We generalize the single bottleneck analysis in Sec.II to the case of a path composed of N links, fed by content requests at the leaf node. We assume a negligible propagation delay with respect to the queuing delay at each link. The instantaneous rate X k (t) is modeled by a weighted sum of the rates achieved on different routes, X(i, t), corresponding to the retrieval of packets from different hops. We write the following set of state equations: dx(i, t) η = dt VRTT(i, t) βx(i, t) {VRTT(i,t)=τ}, dq i (t) = n i X(i, t) C i {Qi(t)>} dt N ( l ) + {Qj(t)=}n j X(j, t) + {Ql (t)>}c l l=i+ j=i+ where VRTT(i, t) = i j= Q j(t) C j, i =,..., N denotes the round trip time, given by the aggregated queuing delay associated to route r i, i.e. all links from the receiver to ()

5 the i th node. The average rate per class is then X k (t) = N i= X(i, t)( p k(i)) i j= p k(j). Note that the ODEs for X(i, t) are the same as in the single link case, with X k (t) = X(, t). Observation.: It is worth observing that content popularity affects the offered traffic on each link, as a consequence of request rate and hit/miss probabilities at different hops. This leads to a different rate X k (t). However, the rate that each flow gets on a given route, X(i), is the same for all popularity classes given that the delay associated to a route r i, VRTT(i, t), is the same for all k =,...K. Therefore, flows fairly compete on a given route for sharing bandwidth. The link load makes the number of flow in progress increasing and the fair share decreasing. Proposition.: The steady state solution of eqq.() is periodical with limit cycle of length T and it satisfies X k = N i ( p k (i)) p k (j) X(i), X(i) = γ(i) (7) i= j= where γ(i) is the max-min fair rate at the route r i. Proof: reported in [] due to lack of space. In contrast to TCP, ICP faces typically multiple bottlenecks for the majority of file transfers. We make this clearer through the following example. Example.: Consider the case of a single path composed by three caches relaying the user to the repository. Given that the number of ongoing flows on route i is n i, i =,,, it holds (7) where γ(i) vary according to C i /n i values. Four cases can be distinguished: - Case I: C /n < C /n, C /n γ(i) = C /(n + n + n ), i. - Case II: C /n < C /n, C /n, γ() = (C C )/n, γ(i) = C /(n + n ), i =,. - Case III: C /n < C /n < C /n, γ(i) = (C i C i+ )/n i, i =,, γ() = C /n. - Case IV: C /n < C /n < C /n, γ(i) = (C C )/(n + n ), i =,, γ() = C /n. Notice that, we solved eqq. to compute the fair rates on each route along the path, that depend on link capacities and the number of flows in progress on every route. VII. DESIGN GUIDELINES AND PROTOCOL ASSESSMENT In Sec.VI we have shown that, under proper parameter setting, the equilibrium achieved by the system, in terms of average rates and queue occupancies, is fully efficient and max-min fair as described in []. The choice of the parameters can be critical and can potentially lead the system to an inefficient regime, as already observed in Sec.IV. The present section provides guidelines for tuning protocol parameters, i.e. η, β and τ, and compare the protocol performance analysis of previous Sec. IV and VI to simulations on some simple scenarios. To this aim, we developed an event driven CCN packet simulator implementing: name-based (multi-path) routing, forwarding with output link queuing, in-network storage as well as ICP at the receivers. A. Parameters setting The additive increase parameter η, is set by default to, corresponding to an interest window increase of one packet per round-trip time. By increasing the window size more aggressively (η > ), a flow can achieve higher throughput, if and only if bandwidth resources are not fully utilized, as observed in [5]. However when bandwidth is efficiently utilized, we show in Sec.VI, that η affects only the limit cycle duration and not the average rate. Similar considerations hold for the multiplicative decrease parameter β, set by default to.5, such that the Interest window is halved upon the expiration of the timer. As for η, a smoother window decrease, setting β.5, results in higher flow throughput as long as bandwidth is not fully utilized. As reported in Sec.VI, in case of efficient bandwidth sharing, β affects the limit cycle duration and not the time average. The most critical parameter is the Interest retransmission timer τ, that must be chosen not smaller than the minimum network delay to have non zero throughput, and large enough to queue at least the bandwidth delay product along the path, to have % utilization. Moreover, an arbitrarily large τ would let ICP converge very slowly, which motivates the choice to adaptively set τ according to eq.(). B. Numerical results In this section we asses protocol performance in some simple scenarios, comparing simulations to the optimal working point calculated in Sec.VI. Constant τ: We consider a linear network with tree links in a multi-bottleneck configuration, assuming negligible propagation delays; σ = 5, packets (packet = kb ) and cache sizes of 5, packets. Content items of class k are requested according to a Poisson process of intensity λ k = q k content/s, with q k = c m k, where m = M/K = 5 is the α number of content items in the same class, and α =.7 the Zipf parameter. Fig.(a) reports the average delivery time (top) and virtual round trip time, VRTT k (bottom), measured for content retrievals in the ten most popular classes, k =,...,, for different values of τ. As predicted by the model, VRTT k is shown to be proportional to τ in Fig.(a) (bottom). The measured delivery time is compared to the optimal reference curve, indicating full utilization and fair allocation of resources; moreover it is shown to be negatively affected by a too small τ value, especially for classes k >, since longer routes r, r (of two/three hops) does not fully utilize the bottleneck capacity C. Conversely, most popular data transfers (k = ) get slightly better performance than what predicted, as the τ value is well set for the shorter route r they mainly utilize. We argue that each data transfer would benefit from adapting τ to the measured delay from used routes. Variable τ: In Fig.(b) we present a set of simulations, where each receiver estimates the value of τ, by implementing the algorithm described in Sec.III-B. Globally, the queuing delay converges to a much smaller value than that obtained using a constant τ, as a consequence of the fact that τ k, converges to value that is slightly larger than VRTT k, function of the popularity class and, hence, of the data distribution along the path.

6 VRTT k [ms] τ = ms τ = ms τ = 8 ms τ = ms Model Class k (a) VRTT k [ms] Case I Case II Case III Simulation Model Class k (b) φ users (case II) φ users (case III) Multi-homed users Class k Simulation Model Buffer size [pkts] (c) Fig.. (a) Delivery time and VRTT k in case II with C = C = Mbps, C = Mbps with fixed τ, (b) with adaptive τ case I: C = 5Mbps, C = C = Mbps; case II: C = C = Mbps, C = Mbps; case III: C = C = Mbps, C = 5Mbps (c) Multi-Homed network scenario. ρ =.8 ρ =.9 Multi-homed scenario: As already described in Sec.II, routes are built following the reverse path of the Interests, routed by the name to the closest hitting content store. Every receiver can easily exploit multiple forwarding faces by load balancing Interests on the different faces. Let us consider a network topology with multiple repositories, where one group of users is multi-homed, namely it uses two disjoint paths, φ and φ, with C φ = C φ = Mbps, C φ = Mbps and C φ = C φ = Mbps, C φ = M bps. Multi-homed users share bandwidth resources with other single path users exploiting φ or φ only. Results are reported in Fig.(c) (top). A good agreement can be observed between simulation results and analytical predictions both in the single and multi-path case. Moreover, as expected, VRTT k and delivery time experienced by multi-homed users, are significantly reduced w.r.t. those perceived by φ /φ single path users as a consequence of the higher throughput achieved by using both path in parallel. Buffer Sizing: Throughout the paper we have considered networks with unlimited buffer capacity. System dynamics in a small buffer regime have not been analyzed due to lack of space, for completeness, we report in Fig.(c) (bottom) the average delivery time measured in a single bottleneck scenario at two loads,.8,.9, under different buffer sizes. The loss of performance due to little buffering can be significant. However, we believe that there is no clear advantage in saving output buffer memory in CCN, where technological limitations are mainly faced in the content store []. VIII. CONCLUSIONS AND OPEN ISSUES In this paper we have designed ICP, an interest control protocol for content-centric networks driven by a windowbased AIMD controller of the Interest rate expressed at the receiver. ICP is conceived to control Data packet retrieval from the different routes (subpaths) that constitute each path from a user to a content repository. An analytical characterization of user s stationary rate and queues dynamics is provided, under general traffic demand, allowing to understand the impact of CCN transport and caching dynamics on user performance. The key takeaway of our analysis is that the present ICP design realizes optimal statistical bandwidth sharing guaranteeing efficient and fair bandwidth utilization ( []). Guidelines are also provided to optimally set protocol parameters. Protocol performance are evaluated by packet-level simulations, corroborating analytical results on a hierarchical network topology. We expect future experimentation at a larger scale to confirm such good premises. Finally, we plan to extend multi-path analysis beyond the case of independently controlled paths to better exploit the intrinsic potential of multi-path communication in CCN. ACKNOWLEDGEMENTS This work has been partially funded by the French national research agency (ANR), CONNECT project, under grant number ANR--VERS- ṘEFERENCES [] V. Jacobson, D. Smetters, J. Thornton, M. Plass, N. Briggs, and R. Braynard, Networking named content, in Proc. of ACM CoNEXT, 9. [] T. Koponen, M. Chawla, B. Chun, A. Ermolinskiy, K. Kim, S. Shenker, and I. Stoica, A data-oriented (and beyond) network architecture, in Proc. of ACM SIGCOMM, 7. [] Information centric network projects, 5 Related-Projects. [] B. Ahlgren and al., Design considerations for a network of information, in Proc. of ACM CoNEXT, 8. [5] P. Jokela, A. Zahemszky, S. Arianfar, P. Nikander, and C. Esteve, LIPSIN: Line speed Publish/Subscribe Inter-Networking, in Proc. of ACM SIGCOMM, 9. [] S. Arianfar, P. Nikander, and J. Ott, On content-centric router design and implications, in Proc. of ACM ReArch,. [7] U. Lee, I. Rimac, and V. Hilt, Greening the internet with content-centric networking, in Proc. of ACM E-Energy,. [8] G. Carofiglio, V. Gehlen, and D. Perino, Experimental evaluation of storage management in content-centric networking, in Proc. of IEEE ICC,. [9] G. Carofiglio, M. Gallo, L. Muscariello, and D. Perino, Modeling data transfer in content-centric networking, in Proc. of ITC,. [] G. Carofiglio, M. Gallo, and L. Muscariello, Bandwidth and storage sharing performance in information centric networking, in Proc. of ACM SIGCOMM Workshop on ICN,. [] L. Zhang and al., Named data networking (ndn) project,., http: //named-data.net/ndn-proj.pdf. [] G. Carofiglio, M. Gallo, and L. Muscariello, Icp technical report. [] A. Kuzmanovic and E. Knightly, Tcp-lp: low-priority service via endpoint congestion control, IEEE/ACM Trans. on Networking,. [] M. Ajmone Marsan, M. Garetto, P. Giaccone, E. Leonardi, E. Schiattarella, and A. Tarello, Using partial differential equations to model tcp mice and elephants in large ip networks, in IEEE INFOCOM,. [5] A. Kuzmanovic and E. W. Knightly, Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions, Elsevier Computer Networks, 7.

Bandwidth and Storage Sharing Performance in Information Centric Networking

Bandwidth and Storage Sharing Performance in Information Centric Networking Bandwidth and Storage Sharing Performance in Information Centric Networking Giovanna Carofiglio Bell Labs, Alcatel-Lucent giovanna.carofiglio@alcatel-lucent.com Massimo Gallo Orange Labs, France Telecom

More information

Modeling Data Transfer in Content-Centric Networking

Modeling Data Transfer in Content-Centric Networking ing Data Transfer in Content-Centric Networking Giovanna Carofiglio, Massimo Gallo, Luca Muscariello and Diego Perino. Bell Labs, Alcatel-Lucent, France, Orange Labs, France Telecom, France first.last@alcatel-lucent.com,

More information

CCTCP: A Scalable Receiver-driven Congestion Control Protocol for Content Centric Networking

CCTCP: A Scalable Receiver-driven Congestion Control Protocol for Content Centric Networking CCTCP: A Scalable Receiver-driven Congestion Control Protocol for Content Centric Networking Lorenzo Saino, Cosmin Cocora and George Pavlou Communications and Information Systems Group Department of Electrical

More information

Experimental Evaluation of Memory Management in Content-Centric Networking

Experimental Evaluation of Memory Management in Content-Centric Networking Experimental Evaluation of Memory Management in Content-Centric Networking Giovanna Carofiglio, Vinicius Gehlen, and Diego Perino Bell Labs, Alcatel-Lucent, France, first.last@alcatel-lucent.com Abstract

More information

Research Progress for the Interest Control Protocol of Content-centric Networking

Research Progress for the Interest Control Protocol of Content-centric Networking Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com Research Progress or the Interest Control Protocol o Content-centric Networing GAO QIANG, WANG WEIMING, ZHOU JINGJING Zhejiang Gongshang

More information

Consumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN

Consumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN Consumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN Takahiro YONEDA, Ryota OHNISHI, Eiichi MURAMOTO(Presenter),, Panasonic Corporation Jeff Burke, UCLA Contact: muramoto.eiichi@jp.panasonic.com

More information

A Markov Model of CCN Pending Interest Table Occupancy with Interest Timeout and Retries

A Markov Model of CCN Pending Interest Table Occupancy with Interest Timeout and Retries A Markov Model of CCN Pending Interest Table Occupancy with Interest Timeout and Retries Amuda James Abu, Brahim Bensaou and Ahmed M. Abdelmoniem The Department of Computer Science and Engineering The

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays

Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays Keiichi Takagaki Hiroyuki Ohsaki Masayuki Murata Graduate School of Engineering Science,

More information

Named Data Networking for 5G Wireless

Named Data Networking for 5G Wireless Named Data Networking for 5G Wireless Edmund Yeh Electrical and Computer Engineering Northeastern University New York University January 27, 2017 Overview NDN: a major information-centric networking architecture

More information

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Sergey Gorinsky Harrick Vin Technical Report TR2000-32 Department of Computer Sciences, University of Texas at Austin Taylor Hall

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Amin Vahdat, Dina Katabi Lecture 14 Overview" TCP congestion control review XCP Overview 2 Congestion Control

More information

Increase-Decrease Congestion Control for Real-time Streaming: Scalability

Increase-Decrease Congestion Control for Real-time Streaming: Scalability Increase-Decrease Congestion Control for Real-time Streaming: Scalability Dmitri Loguinov City University of New York Hayder Radha Michigan State University 1 Motivation Current Internet video streaming

More information

XCP: explicit Control Protocol

XCP: explicit Control Protocol XCP: explicit Control Protocol Dina Katabi MIT Lab for Computer Science dk@mit.edu www.ana.lcs.mit.edu/dina Sharing the Internet Infrastructure Is fundamental Much research in Congestion Control, QoS,

More information

CS644 Advanced Networks

CS644 Advanced Networks What we know so far CS644 Advanced Networks Lecture 6 Beyond TCP Congestion Control Andreas Terzis TCP Congestion control based on AIMD window adjustment [Jac88] Saved Internet from congestion collapse

More information

Publisher Mobility Support in Content Centric Networks

Publisher Mobility Support in Content Centric Networks Publisher Mobility Support in Content Centric Networks Dookyoon Han, Munyoung Lee, Kideok Cho, Ted Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

CS268: Beyond TCP Congestion Control

CS268: Beyond TCP Congestion Control TCP Problems CS68: Beyond TCP Congestion Control Ion Stoica February 9, 004 When TCP congestion control was originally designed in 1988: - Key applications: FTP, E-mail - Maximum link bandwidth: 10Mb/s

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

On Network Dimensioning Approach for the Internet

On Network Dimensioning Approach for the Internet On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/

More information

Applying TCP Congestion Control Schemes on NDN and their Implications for NDN Congestion Control. Shuo Yang

Applying TCP Congestion Control Schemes on NDN and their Implications for NDN Congestion Control. Shuo Yang Applying TCP Congestion Control Schemes on NDN and their Implications for NDN Congestion Control Shuo Yang Abstract While congestion control in TCP has been well studied, the future Internet architecture

More information

Scheduling Algorithms to Minimize Session Delays

Scheduling Algorithms to Minimize Session Delays Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of

More information

Utility-Based Rate Control in the Internet for Elastic Traffic

Utility-Based Rate Control in the Internet for Elastic Traffic 272 IEEE TRANSACTIONS ON NETWORKING, VOL. 10, NO. 2, APRIL 2002 Utility-Based Rate Control in the Internet for Elastic Traffic Richard J. La and Venkat Anantharam, Fellow, IEEE Abstract In a communication

More information

Reliable Transport II: TCP and Congestion Control

Reliable Transport II: TCP and Congestion Control Reliable Transport II: TCP and Congestion Control Stefano Vissicchio UCL Computer Science COMP0023 Recap: Last Lecture Transport Concepts Layering context Transport goals Transport mechanisms and design

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem

Congestion Control. Andreas Pitsillides University of Cyprus. Congestion control problem Congestion Control Andreas Pitsillides 1 Congestion control problem growing demand of computer usage requires: efficient ways of managing network traffic to avoid or limit congestion in cases where increases

More information

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY J. H. CHOI,J.G.CHOI, AND C. YOO Department of Computer Science and Engineering Korea University Seoul, Korea E-mail: {jhchoi, hxy}@os.korea.ac.kr

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long 6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long Please read Chapter 19 of the 6.02 book for background, especially on acknowledgments (ACKs), timers,

More information

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets

More information

Towards a CDN over ICN

Towards a CDN over ICN Towards a CDN over ICN Byungjoon Lee, Hongseok Jeon, Seunghyun Yoon, and Hoyoung Song SmartNode Research Team, ETRI, Daejeon, Republic of Korea {bjlee, jeonhs, shpyoon, hsong}@etri.re.kr Keywords: Abstract:

More information

Variable Step Fluid Simulation for Communication Network

Variable Step Fluid Simulation for Communication Network Variable Step Fluid Simulation for Communication Network Hongjoong Kim 1 and Junsoo Lee 2 1 Korea University, Seoul, Korea, hongjoong@korea.ac.kr 2 Sookmyung Women s University, Seoul, Korea, jslee@sookmyung.ac.kr

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at The 13th Swedish National Computer Networking Workshop (SNCNW 2017), Halmstad University, May 29-30. Citation for

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Improving XCP to Achieve Max-Min Fair Bandwidth Allocation

Improving XCP to Achieve Max-Min Fair Bandwidth Allocation 1 Improving to Achieve Max-Min Fair Bandwidth Allocation Xiaowei Yang, Yanbin Lu, and Lei Zan University of California, Irvine {xwy, yanbinl, lzan}@ics.uci.edu Abstract TCP is prone to be inefficient and

More information

Modeling multipath forwarding strategies in Information Centric Networks

Modeling multipath forwarding strategies in Information Centric Networks Modeling multipath forwarding strategies in Information Centric Networks Andrea Detti, Claudio Pisa, Nicola Blefari Melazzi CNIT, University of Rome Tor Vergata, Italy. andrea.detti@uniroma2.it, claudio.pisa@uniroma2.it,

More information

Equation-Based Congestion Control for Unicast Applications. Outline. Introduction. But don t we need TCP? TFRC Goals

Equation-Based Congestion Control for Unicast Applications. Outline. Introduction. But don t we need TCP? TFRC Goals Equation-Based Congestion Control for Unicast Applications Sally Floyd, Mark Handley AT&T Center for Internet Research (ACIRI) Jitendra Padhye Umass Amherst Jorg Widmer International Computer Science Institute

More information

Performance Enhancement Of TCP For Wireless Network

Performance Enhancement Of TCP For Wireless Network P a g e 32 Vol. 10 Issue 12 (Ver. 1.0) October 2010 Global Journal of Computer Science and Technology Performance Enhancement Of TCP For Wireless Network 1 Pranab Kumar Dhar, 2 Mohammad Ibrahim Khan, 3

More information

Loopback: Exploiting Collaborative Caches for Large-Scale Streaming

Loopback: Exploiting Collaborative Caches for Large-Scale Streaming Loopback: Exploiting Collaborative Caches for Large-Scale Streaming Ewa Kusmierek Yingfei Dong David Du Poznan Supercomputing and Dept. of Electrical Engineering Dept. of Computer Science Networking Center

More information

Enhancing TCP Throughput over Lossy Links Using ECN-capable RED Gateways

Enhancing TCP Throughput over Lossy Links Using ECN-capable RED Gateways Enhancing TCP Throughput over Lossy Links Using ECN-capable RED Gateways Haowei Bai AES Technology Centers of Excellence Honeywell Aerospace 3660 Technology Drive, Minneapolis, MN 5548 E-mail: haowei.bai@honeywell.com

More information

Chapter II. Protocols for High Speed Networks. 2.1 Need for alternative Protocols

Chapter II. Protocols for High Speed Networks. 2.1 Need for alternative Protocols Chapter II Protocols for High Speed Networks 2.1 Need for alternative Protocols As the conventional TCP suffers from poor performance on high bandwidth delay product links [47] meant for supporting transmission

More information

A Framework For Managing Emergent Transmissions In IP Networks

A Framework For Managing Emergent Transmissions In IP Networks A Framework For Managing Emergent Transmissions In IP Networks Yen-Hung Hu Department of Computer Science Hampton University Hampton, Virginia 23668 Email: yenhung.hu@hamptonu.edu Robert Willis Department

More information

One More Bit Is Enough

One More Bit Is Enough One More Bit Is Enough Yong Xia, RPI Lakshmi Subramanian, UCB Ion Stoica, UCB Shiv Kalyanaraman, RPI SIGCOMM 05, Philadelphia, PA 08 / 23 / 2005 Motivation #1: TCP doesn t work well in high b/w or delay

More information

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri Department of Computer and IT Engineering University of Kurdistan Transport Layer By: Dr. Alireza Abdollahpouri TCP/IP protocol suite 2 Transport Layer The transport layer is responsible for process-to-process

More information

Content Searching Scheme with Distributed Data Processing Service in Content Centric Networking

Content Searching Scheme with Distributed Data Processing Service in Content Centric Networking J. Basic. Appl. Sci. Res., 4(1)160-165, 2014 2014, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Content Searching Scheme with Distributed Data Processing

More information

Mean Waiting Delay for Web Object Transfer in Wireless SCTP Environment

Mean Waiting Delay for Web Object Transfer in Wireless SCTP Environment This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 009 proceedings Mean aiting Delay for eb Object Transfer in

More information

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Outline Introduction What s wrong with TCP? Idea of Efficiency vs. Fairness XCP, what is it? Is it

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Oscillations and Buffer Overflows in Video Streaming under Non- Negligible Queuing Delay

Oscillations and Buffer Overflows in Video Streaming under Non- Negligible Queuing Delay Oscillations and Buffer Overflows in Video Streaming under Non- Negligible Queuing Delay Presented by Seong-Ryong Kang Yueping Zhang and Dmitri Loguinov Department of Computer Science Texas A&M University

More information

Markov Model Based Congestion Control for TCP

Markov Model Based Congestion Control for TCP Markov Model Based Congestion Control for TCP Shan Suthaharan University of North Carolina at Greensboro, Greensboro, NC 27402, USA ssuthaharan@uncg.edu Abstract The Random Early Detection (RED) scheme

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information

image 3.8 KB Figure 1.6: Example Web Page

image 3.8 KB Figure 1.6: Example Web Page image. KB image 1 KB Figure 1.: Example Web Page and is buffered at a router, it must wait for all previously queued packets to be transmitted first. The longer the queue (i.e., the more packets in the

More information

On the Design of Load Factor based Congestion Control Protocols for Next-Generation Networks

On the Design of Load Factor based Congestion Control Protocols for Next-Generation Networks 1 On the Design of Load Factor based Congestion Control Protocols for Next-Generation Networks Ihsan Ayyub Qazi Taieb Znati Student Member, IEEE Senior Member, IEEE Abstract Load factor based congestion

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati

More information

Congestion Control In the Network

Congestion Control In the Network Congestion Control In the Network Brighten Godfrey cs598pbg September 9 2010 Slides courtesy Ion Stoica with adaptation by Brighten Today Fair queueing XCP Announcements Problem: no isolation between flows

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 30 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks We started

More information

CS 268: Lecture 7 (Beyond TCP Congestion Control)

CS 268: Lecture 7 (Beyond TCP Congestion Control) Outline CS 68: Lecture 7 (Beyond TCP Congestion Control) TCP-Friendly Rate Control (TFRC) explicit Control Protocol Ion Stoica Computer Science Division Department of Electrical Engineering and Computer

More information

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for

More information

Lecture 8. TCP/IP Transport Layer (2)

Lecture 8. TCP/IP Transport Layer (2) Lecture 8 TCP/IP Transport Layer (2) Outline (Transport Layer) Principles behind transport layer services: multiplexing/demultiplexing principles of reliable data transfer learn about transport layer protocols

More information

Congestion Avoidance

Congestion Avoidance Congestion Avoidance Richard T. B. Ma School of Computing National University of Singapore CS 5229: Advanced Compute Networks References K. K. Ramakrishnan, Raj Jain, A Binary Feedback Scheme for Congestion

More information

A Generalization of a TCP Model: Multiple Source-Destination Case. with Arbitrary LAN as the Access Network

A Generalization of a TCP Model: Multiple Source-Destination Case. with Arbitrary LAN as the Access Network A Generalization of a TCP Model: Multiple Source-Destination Case with Arbitrary LAN as the Access Network Oleg Gusak and Tu rul Dayar Department of Computer Engineering and Information Science Bilkent

More information

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 14 Congestion Control Some images courtesy David Wetherall Animations by Nick McKeown and Guido Appenzeller The bad news and the good news The bad news: new

More information

On TCP friendliness of VOIP traffic

On TCP friendliness of VOIP traffic On TCP friendliness of VOIP traffic By Rashmi Parthasarathy WSU ID # 10975537 A report submitted in partial fulfillment of the requirements of CptS 555 Electrical Engineering and Computer Science Department

More information

A Relative Bandwidth Allocation Method Enabling Fast Convergence in XCP

A Relative Bandwidth Allocation Method Enabling Fast Convergence in XCP A Relative Bandwidth Allocation Method Enabling Fast Convergence in XCP Hanh Le Hieu,KenjiMasui 2, and Katsuyoshi Iida 2 Graduate School of Science and Engineering, Tokyo Institute of Technology 2 Global

More information

There are 10 questions in total. Please write your SID on each page.

There are 10 questions in total. Please write your SID on each page. Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 to the Final: 5/20/2005 There are 10 questions in total. Please write

More information

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for

More information

Doctoral Written Exam in Networking, Fall 2008

Doctoral Written Exam in Networking, Fall 2008 Doctoral Written Exam in Networking, Fall 2008 December 5, 2008 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, December

More information

CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF

CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF Your Name: Answers SUNet ID: root @stanford.edu In accordance with both the letter and the

More information

Optical Packet Switching

Optical Packet Switching Optical Packet Switching DEISNet Gruppo Reti di Telecomunicazioni http://deisnet.deis.unibo.it WDM Optical Network Legacy Networks Edge Systems WDM Links λ 1 λ 2 λ 3 λ 4 Core Nodes 2 1 Wavelength Routing

More information

On the Transition to a Low Latency TCP/IP Internet

On the Transition to a Low Latency TCP/IP Internet On the Transition to a Low Latency TCP/IP Internet Bartek Wydrowski and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks, EEE Department, The University of Melbourne,

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information

Congestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues

Congestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues Congestion Control Outline Queuing Discipline Reacting to Congestion Avoiding Congestion Issues Two sides of the same coin pre-allocate resources to avoid congestion (e.g. telephone networks) control congestion

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

STUDIES ON THE PERFORMANCE IMPROVEMENT OF WINDOW ADJUSTMENT PROCEDURE IN HIGH BANDWIDTH DELAY PRODUCT NETWORK

STUDIES ON THE PERFORMANCE IMPROVEMENT OF WINDOW ADJUSTMENT PROCEDURE IN HIGH BANDWIDTH DELAY PRODUCT NETWORK STUDIES ON THE PERFORMANCE IMPROVEMENT OF WINDOW ADJUSTMENT PROCEDURE IN HIGH BANDWIDTH DELAY PRODUCT NETWORK Ms.T.Sheela* and Dr.J.Raja** *Research Scholar, Satyabama University, Chennai, sheela_saiit@yahoo.com

More information

The Variation in RTT of Smooth TCP

The Variation in RTT of Smooth TCP The Variation in RTT of Smooth TCP Elvis Vieira and Michael Bauer University of Western Ontario {elvis,bauer}@csd.uwo.ca Abstract Due to the way of Standard TCP is defined, it inherently provokes variation

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks *

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks * Dynamic Control and Optimization of for Short Message Transfer in GPRS/UMTS Networks * Michael M. Markou and Christos G. Panayiotou Dept. of Electrical and Computer Engineering, University of Cyprus Email:

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 15: Congestion Control Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

CCTCP: A Scalable Receiver-driven Congestion Control Protocol for Content Centric Networking

CCTCP: A Scalable Receiver-driven Congestion Control Protocol for Content Centric Networking IEEE ICC 2013 - Next-Generation Networking Symposium CCTCP: A Scalable Receiver-driven Congestion Control Protocol for Content Centric Networking Lorenzo Saino, Cosmin Cocora and George Pavlou Department

More information

Chapter III. congestion situation in Highspeed Networks

Chapter III. congestion situation in Highspeed Networks Chapter III Proposed model for improving the congestion situation in Highspeed Networks TCP has been the most used transport protocol for the Internet for over two decades. The scale of the Internet and

More information

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data?

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data? Congestion Control End Hosts CSE 51 Lecture 7, Spring. David Wetherall Today s question How fast should the sender transmit data? Not tooslow Not toofast Just right Should not be faster than the receiver

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

Congestion Control for High Bandwidth-Delay Product Networks

Congestion Control for High Bandwidth-Delay Product Networks Congestion Control for High Bandwidth-Delay Product Networks Presented by: Emad Shihab Overview Introduce the problem of XCP (what the protocol achieves) (how the protocol achieves this) The problem! TCP

More information

Predicting connection quality in peer-to-peer real-time video streaming systems

Predicting connection quality in peer-to-peer real-time video streaming systems Predicting connection quality in peer-to-peer real-time video streaming systems Alex Giladi Jeonghun Noh Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,

More information

Computer Networking

Computer Networking 15-441 Computer Networking Lecture 17 TCP Performance & Future Eric Anderson Fall 2013 www.cs.cmu.edu/~prs/15-441-f13 Outline TCP modeling TCP details 2 TCP Performance Can TCP saturate a link? Congestion

More information

Impact of Source Counter on Routing Performance in Resource Constrained DTNs

Impact of Source Counter on Routing Performance in Resource Constrained DTNs Impact of Source Counter on Routing Performance in Resource Constrained DTNs Xiaolan Zhang a,, Honggang Zhang b, Yu Gu c a Dept. of Computer and Information Sciences, Fordham University b Dept. of Mathematics

More information

Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing

Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing , pp.80-84 http://dx.doi.org/10.14257/astl.2014.64.20 Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing ByungKwan Lee 1, EunHee Jeong 2 1 Department of Computer,

More information

CSE 461. TCP and network congestion

CSE 461. TCP and network congestion CSE 461 TCP and network congestion This Lecture Focus How should senders pace themselves to avoid stressing the network? Topics Application Presentation Session Transport Network congestion collapse Data

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

Impact of Short-lived TCP Flows on TCP Link Utilization over 10Gbps High-speed Networks

Impact of Short-lived TCP Flows on TCP Link Utilization over 10Gbps High-speed Networks Impact of Short-lived TCP Flows on TCP Link Utilization over Gbps High-speed Networks Lin Xue, Chui-hui Chiu, and Seung-Jong Park Department of Computer Science, Center for Computation & Technology, Louisiana

More information

Performance Study of CCNx

Performance Study of CCNx Performance Study of CCNx Haowei Yuan Networking Research Seminar 3/18/2013 My Topic for Today Industry participation in content centric networking Emerging networks consortium Our performance study of

More information

Fair and Efficient TCP Access in the IEEE Infrastructure Basic Service Set

Fair and Efficient TCP Access in the IEEE Infrastructure Basic Service Set Fair and Efficient TCP Access in the IEEE 802.11 Infrastructure Basic Service Set 1 arxiv:0806.1089v1 [cs.ni] 6 Jun 2008 Feyza Keceli, Inanc Inan, and Ender Ayanoglu Center for Pervasive Communications

More information

The Scaling Hypothesis: Simplifying the Prediction of Network Performance using Scaled-down Simulations

The Scaling Hypothesis: Simplifying the Prediction of Network Performance using Scaled-down Simulations The Scaling Hypothesis: Simplifying the Prediction of Network Performance using Scaled-down Simulations Konstantinos Psounis, Rong Pan, Balaji Prabhakar, Damon Wischik Stanford Univerity, Cambridge University

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

! Network bandwidth shared by all users! Given routing, how to allocate bandwidth. " efficiency " fairness " stability. !

! Network bandwidth shared by all users! Given routing, how to allocate bandwidth.  efficiency  fairness  stability. ! Motivation Network Congestion Control EL 933, Class10 Yong Liu 11/22/2005! Network bandwidth shared by all users! Given routing, how to allocate bandwidth efficiency fairness stability! Challenges distributed/selfish/uncooperative

More information