Congestion Control with ECN Support in Poll-based Multicast Protocols

Size: px
Start display at page:

Download "Congestion Control with ECN Support in Poll-based Multicast Protocols"

Transcription

1 Congestion Control with ECN Support in Poll-based Multicast Protocols Marinho P. Barcellos André Detsch Post-graduate Program on Applied Computing - PIPCA/UNISINOS São Leopoldo, RS - Brazil marinho@acm.org, adetsch@exatas.unisinos.br Abstract Most of the traffic in the Internet nowadays is transmitted using TCP, or Transport Control Protocol. The stability of the Internet depends on the congestion control being performed by this protocol, as well as equivalent mechanisms employed by other protocols. The ECN technique (Explicit Congestion Notification), in which packets forwarded by routers are marked whenever congestion is about to occur (or already occurring), allows a transmitter to reduce the sending rate accordingly without relying on packet drops. ECN has not been fully explored, particularly regarding multicast protocols. This paper presents models of poll-based reliable multicast protocols and extends them with a new single-rate congestion control mechanism that harnesses ECN. Simulation results show that it provides fairness between flows from multiple sources, and is TCP-friendly. Further, they demonstrate the substantial efficiency gain obtained with the use of ECN in multicast.. Introduction IP Multicast allows the efficient transmission of data to a group of receivers, avoiding the unnecessary replication of packets in the network. Reliable multicast protocols allow applications to do reliable multipoint transfers efficiently, whose uses include grid applications, web caching and site mirroring, computational steering (of large simulations), and group-based dependable middleware and applications. The use of congestion control algorithms is fundamental to allow transport protocols to coexist in a shared network like the Internet. The development of congestion control algorithms for reliable multicast protocols involves aspects that are not present in unicast. The scalability of such a protocol is given mainly by its error and congestion control mechanisms. Multicast congestion control has been addressed by recent work, such as [, ]. A multicast flow is TCP-friendly if, for each pair sender-receiver, the friendliness of TCP is verified []. In the (wired) Internet, the detection of congestion by transport protocols is, mostly, based on packet loss detection. That is, the congestion is only tackled after packets have been dropped by a router. In case of routers with droptail policy [5], these losses only occur because of queue overflow, which means protocols can only detect congestion when it the first negative consequences have been felt. Routers that employ Random Early Detection (RED) ameliorate this problem by randomly discarding packets before the queues get completely full. However, losses are still generated to tell the stations that a congestion is imminent. In this context, Explicit Congestion Notification (ECN) [4, 9] represents a potential improvement as it allows end-hosts to proactively detect an imminent congestion, before packets have to be discarded. Congestion signals are generated, explicitly, by the capable routers. Despite the advantages of this technique, its use in multicast congestion control protocols has not been well explored. This paper describes several models of polling-based reliable multicast protocols optimized for medium-scale groups (up to a few hundred receivers), using simulation to compare them and select the best one. These protocols use sliding windows and are single-rate: receivers get data in the same rate. Then they are enriched with a congestion control mechanism which takes advantage of ECN to provide significant gains in performance. The rest of this document is organized as follows. Section addresses ECN, and discusses how congestion control is applied to different categories of single-rate multicast protocols. Section 3 presents models of polling-based reliable multicast protocols, and selects the two that exhibit the best performance in simulation experiments with networks of the intended size (up to 4 receivers). Section 4 proposes a congestion control algorithm for these protocols which is built using sliding windows (similarly to TCP) but achieve the required scalability through polling. Section 5 presents, through simulation experiments, the TCPfriendliness and the gains obtained using ECN on multicast. Final remarks and future work appear in Section 6, which closes the paper.. ECN and Multicast Congestion Control With ECN, signals are explicitly generated by routers to indicate to end nodes the occurrence of congestion. The ECN signaling piggybacks the information into existing data packets. The RFC368 [9] defines the incorporation of ECN to the IP protocol, through a -bit field in the Type

2 of Service (TOS) octet. This field may assume values according to three situations: (i) not-ect: the transport protocol does not provide support for ECN; (ii) ECN-Capable Transport (ECT): the protocol supports ECN; (iii) Congestion Experienced (CE): used by routers to indicate congestion to end-nodes. The RFC defines also how ECN is to be implemented in routers and transport protocols. In ECN-enabled routers, the marking of packets must observe a simple rule: a packet must be marked, i.e. its field set to CE, only when the protocol supports ECN and under the same conditions a packet would be discarded if there was no ECN. In other words, marking only occurs to replace what would be a packet drop. In the case of transport protocols, the RFC requires that the actions taken by the algorithm in face of a marked packet are equivalent to the ones taken under loss detection. This way, two protocols with congestion control whose difference is ECN support tend to receive the same share of network resources. Single-rate reliable multicast protocols may be classified in regards to the error control scheme: NACK-based (e.g. []) or TCP-SACK based (e.g. [7]). NACK-based single-rate protocols employ NACKs as feedback, which tell the sender that a packet has been lost, or appears to be lost. This NACK packet typically has two functions: (a) for the error control mechanism, it works as an indication of loss originating from that receiver; (b) for the congestion control mechanism, as an indication that the transmission rate may have to be decreased. When there is a large number of receivers, there must be a suppression mechanism for redundant NACK packets, in order to prevent implosion. This suppression, which may be done in the hosts [3] as well as in the routers [], must take into account both error and congestion control aspects. In single-rate multicast protocols based on TCP-SACK [8], the feedback that is generated by a receiver contains a representation of the receiver window, directly referring to multiple packets. PrP - Probabilistic Polling: each data packet has also a potential poll request included, making a receiver reply to packets according to a given probability (p), whose value is informed in the packet. If the source sends a window of data containing say, ws packets, approximately ws p N responses will be sent back by receivers. PSEW - Poll Subgroups after Each Window: it operates switching between the phases of window transmission and response collection. Each response refers to a full window, reducing substantially the number of feedback packets and required processing at the source in comparison with PET. Further, receivers are divided in subgroups, allowing a poll request to be efficiently sent with multicast directly to a given subgroup (each one having a different IP multicast address). - Response-Bucket Polling: it employs a tokenbucket scheme to limit the amount of pending responses; the source keeps the bucket, and each token represents a permission to request a response from a receiver. So, when a poll is sent to a given receiver (always via unicast), a token is removed from the bucket; likewise, when a response is received, a token is returned to the bucket. PeP - Periodic Polling: the limiting factor for poll transmission is an inter-packet gap between two consecutive polls; the sender keeps track of the receivers that need to be polled, and sends requests smoothly. We have conducted extensive simulation experiments to evaluate the performance and scalability of the above protocol models in a topology with up to 4 receivers with links of equal capacity (see Fig., where source is at the lower left). We discuss briefly the results below. The effective throughput is normalized in regards to link capacity ( Mbps), and network overhead in regards to data size (6 Mbytes). The network overhead represents the sum of all polling and feedback packets, and headers of data packets as well. 3. Polling-based Reliable Multicast Protocols Polling is a concept as old as computer communication. It can be used in a reliable multicast protocol in order to limit the amount of feedback. The risk of implosion exists when the product of data transmission rate by the sender and the number of receivers results in an excess of feedback packets. As in [], polling can be used to reduce the volume of acknowledgments according to the capacity of the machine and the network. The receiver piggybacks polling requests in data packets to elicit feedback as required. Because the sender has information about the network and receivers, it can react faster to changes in network conditions, and act less conservatively when conditions improve. The ECN mechanisms proposed in this paper are applicable to polling-based reliable multicast protocols. We have identified five models of protocols of this class, which we now describe very briefly: PET - Poll Every Time: a protocol in which each data packet contains an implicit poll request that, once received, causes a response to be sent to the source. Figure. Simulated network topology. Throughput and network bandwidth were measured for each of the five protocols, and presented in Fig. (each legend roughly follows the order in which curves appear). PET overwhelmed the network even with groups as small as 5 receivers, as shown in Fig. (b), and its performance resulted very low. PSEW presented very low network overhead (. for 4 receivers) and the highest performance (around.9) for groups of up to receivers. However,

3 the throughput of PSEW drops linearly thereafter until.4, with 4 receivers. Both and PeP showed very little loss of performance as the group size increased, with being consistently better (.9 and.8, for group sizes and 4, respectively). The network overhead of grows smoothly up to.5. The costs of PeP and PrP are comparatively high. We chose to use and extend with congestion control because it combined provided the best overall results. Normalized throughput Group Size PeP PSEW PrP PET (a) Effective throughput Normalized network overhead Group Size PET PrP PeP PSEW (b) Network overhead Figure. Comparison of protocols. 4. Combining ECN Congestion Control and Polling-based Multicast Based on the protocol chosen in the previous section, we designed a window-based congestion control algorithm that takes advantage of ECN. When a receiver is delivered a packet, it updates its receive window, but does not send a response immediately; ACKs and NACKs (like TCP-SACK) are sent combined in response packets that can only be sent under request from the sender. A new multicast congestion control mechanism must obey a set of requirements: it must be TCP-friendly [3], do not suffer from the loss path multiplicity problem [] and, when window-based, it must not use a global regulation scheme for all receivers. The latter is important in order to prevent an excessive reduction in send rate when there is substantial heterogeneity among receivers [6]. Further, a congestion control mechanism with ECN support must follow the behaviour specified in RFC 368 [9]. Next, we present the phases of the proposed algorithm: congestion detection, congestion window adjustment and send rate calculation. Congestion detection is performed by receivers. Signs of congestion are the detection of packet losses or the receipt of packets that were marked by a router, as explained below. The loss of a data packet is detected through a NACK in the receive window. Whenever a packet is received, the receiver updates the window and checks if a gap was created in the packet sequence number. If so, it is likely that this packet signals a congestion. Differently, congestion detection through ECN happens by examining the reserved bits in the IP header. In both cases, each receiver R i records in lct i (last congestion time) the time of the most recent signal of congestion. The value of lct i is forwarded to the sender using a field in response packets, leading to the adjustment of the congestion window. Adjustment of the congestion window. Like TCP or any other window-based scheme, the adjustment of the send rate is achieved by varying the size of the congestion window, according to the AIMD policy: Additive Increase with Multiplicative Decrease. In the proposed scheme, the adjustment is performed independently for each R i by means of cwnd i (congestion window), which is kept in the sender. The value of cwnd i is used to limit the amount of outstanding data packets between the sender and R i. The variation of cwnd i is done similarly to TCP, by establishing two different periods, corresponding to Slow Start and Congestion Avoidance. The transition between them, as the adjustment of the threshold on which this transition is based, is performed like TCP, but with Slow Start being applied only at the beginning of the session. The increase in cwnd i happens when a packet is first acknowledged by R i. At this moment, the value of cwnd i is increased proportionally to the number of new ACKs. This adjustment can be done in two ways: when in Slow Start, each new acknowledgment leads to an increase of one slot in the congestion window, i.e. cwnd i = cwnd i + ; when in Congestion Avoidance, each new acknowledgment provokes an increase equivalent to a fraction of slot, which is inversely proportional to the current congestion window size, i.e. cwnd i = cwnd i + /cwnd i. The reduction of the congestion window is performed similarly to TCP, i.e. each congestion signal reduces in half cwnd i, but the sender considers signals only when spaced by at least one RTT. This filtering is needed to prevent a signal that has been already handled from causing a further reduction, which is implemented as follows. The sender controls the spacing maintaining, for each R i, a variable lct eff i, which contains the most recent value of lct i reported and that has led to a reduction in cwnd i. When a new value of lct i is received, the sender verifies weather lct i lct eff i + rtt i, where rtt i represents the current estimate of RTT between the sender and R i. If the condition is true, the sender decreases cwnd i and updates lct eff i with lct i. Obtaining the send rate. The send rate of a single-rate protocol must obey the requirements of TCP-friendliness considering the bottleneck receiver. However, it is not possible to employ the minimum value among the congestion window sizes and apply it over the global transmission window. This is so because it might excessively reduce the rate when the receiver with the smallest window does not match the one with highest RTT [6]. To avoid this problem without compromising friendliness to TCP, the proposed mechanism calculates, for R i, a value ht i which corresponds to the packet with largest sequence number that can be transmitted according to the state of the send window and cwnd i. Therefore, the transmission is limited by the smallest value of ht i among the receivers, instead of the minimum congestion window.

4 Considerations. As explained below, the proposed mechanism satisfies the requirements in the beginning of this section. The algorithm (a) is TCP-friendly, since it mimics the behaviour of TCP congestion control mechanism, adjusting the values of cwnd i for each R i according to AIMD, and taking as reference the slowest receiver before sending new data; (b) does not present the loss path multiplicity problem, as an individual cwnd i is maintained for each receiver, isolating the signs of congestion; (c) does not employ a single regulation parameter for all receivers ([6]): each R i possesses its own congestion window size, cwnd i ; (d) employs ECN as mandated by RFC 368, since the ECN information is considered as a congestion signal like in a packet loss. 5. Analysis of the Proposed Mechanism This section provides a simulation evaluation of the congestion control using the reliable multicast protocol chosen in Section 3,. We first investigate the fairness and TCPfriendliness properties of the mechanism, and then valuate the performance impact of using ECN. 5.. Assessment of Fairness and Friendliness _3 _4 (b) RED without ECN (a) Drop-tail _3 _ (c) RED with ECN Figure 4. Four competing flows. _3 _4 Experiments were used to observe the behaviour of the congestion control algorithm when there is network contention. We present first simulation results for evaluations of fairness, then of friendliness, of the mechanism proposed. The same scenario is employed in both sets of experiments: a double-bell topology whereby a common bottleneck link is shared by multiple concurrent flows. Although comparatively simple, this kind of topology is typical of congestion control studies (e.g. see [], [4]). As shown in Fig. 3, the topology differs from the large-scale network in Section 3. The idea is to create a scenario which is simple enough to capture the properties of interest. TCP Sources Sources Mb/s, ms TCP Receivers Receivers Figure 3. Topology used in fairness and friendliness experiments. Fairness. To evaluate the proposed mechanism in regards to fairness, we run experiments where four flows share the available bandwidth in the bottleneck, varying between each experiment the queueing mechanism employed by routers: drop-tail, RED without ECN support, and RED with ECN support. The simulations were configured so that flows were started at times,, 4 and 6 seconds. The ending time for each flow was set to 6, 4, and seconds, and the number of receivers for each flow was, 5, and 5 receivers, respectively. An algorithm that implements fairness among flows of the same protocol, in general, provides an equal distribution of the bandwidth in the bottleneck link. In the configuration used, the rate observed for each individual sender should be similar. The next plots present the variation of send rate in the transmitter nodes, that is, the raw throughput (including retransmissions and communication overhead) generated by each sender throughout the session. As it can be observed in Fig. 4(a), (b), and (c), the flows share equally the available bandwidth; hence, the proposed mechanism, in the conditions analysed, can maintain fairness among flows of the same protocol (intra-protocol). Notice, also, that the algorithm quickly adapts when a new flow appears or an existing flow terminates. Finally, the frequent variation in send rate seen in the plots is a characteristic of protocols that mimic the AIMD behaviour of TCP. TCP friendliness. This set of experiments aims to evaluate the behaviour of the protocol when there are three TCP (New Reno) concurrent flows, to evaluate qualitatively the TCP friendliness of the mechanism. The scenarios employ routers with different queue management policies: droptail, RED with no ECN support and RED with ECN support. In the latter case, we simulated scenarios both with and without ECN enabled in TCP. We employed three unicast TCP flows and one multicast flow with receivers. The flow was started at time and terminated at 6 seconds, whereas the TCP flows were started at times, 4 and 6 seconds, and terminated at times 4, and seconds, respectively.

5 (a) Drop-tail TCP_ TCP_ (c) RED with ECN; TCP flows with ECN TCP_ (b) RED without ECN TCP_ (d) RED with ECN; TCP flows without ECN Figure 5. competing with TCP flows. The overall rates for TCP and flows reported in Fig. 5(a) to (d) are equivalent. The results obtained show that the proposed mechanism behaved adequately with TCP in all cases evaluated, including experiments where the flow employs ECN and the TCP flows do not support/exploit it, as in Fig. 5.(d). 5.. ECN Impact The impact of ECN is to prevent packet losses, with benefits in terms of latency (it is not necessary to detect a loss, potentially through a timeout), and bandwidth (reduces the number of retransmissions). Further, by partly preventing losses, it becomes less likely that the window will block in the sender. The topology used in the previous section has a single bottleneck: packet losses observed by receivers are the same (fully correlated). However, in a real environment, losses may occur independently for each receiver. Therefore, we chose to use a more complex topology, one which contemplated this factor. The idea behind the topology, as illustrated in Fig. 6, remains simple: instead of receivers sharing the same bottleneck, each receiver has its own independent bottleneck which is shared with exclusive flows, not the ones that compete with other receivers. We performed experiments varying the number of TCP flows for each receiver (between and TCP flows), and the queue management policy in routers (again varying between drop-tail, RED without ECN support and RED with ECN support). Because it is not compatible with ECN, the experiments with drop-tail queues serve only as a reference for the remaining results. In all experiments, the flow, started on time TCP Sources Source TCP Sources Mb/s, ms N Bootlenecks TCP Receivers Receiver Receiver N TCP Receivers Figure 6. Topology for ECN experiments. seconds, performed the reliable delivery of 5 packets, with bytes of data each, to receivers. To add nondeterminism and independence between the bottlenecks, the TCP flows are started at different times, according to some random delay uniformly distributed between and 5 seconds. The TCP flows cease only after the end of the flow; the starting time for the flow was delayed (to seconds) to allow the network to reach steady state after the start of TCP flows. Next, we present the results obtained using the following metrics: the number of data packets (re)transmitted, the effective throughput (goodput) of the multicast transmission and, lastly, the average delays required to deliver data packets to all receivers. Data packets transmitted. The results below show the impact of ECN on the number of data packets that need to be (re)transmitted. This number is directly proportional to the number of losses. The results were normalized by the number of data packets to be delivered by the sender, similarly to Section 3. For example, a normalized means that no retransmission was required; a value of indicates that on average, each packet required retransmission in order to deliver the packet to all receivers. According to the results in Fig. 7(a), we observe that when RED with ECN support was used, no retransmission was required, regardless of the number of concurrent TCP flows. The absence of retransmissions occurs because the packet drops are prevented through the use of marking to indicate imminent congestion. In contrast, when no ECN was used, the number of retransmissions grew linearly with the number of concurrent TCP flows. When drop-tail was used in routers, the result was worse than pure RED (and much worse then RED with ECN), achieving an index of over for concurrent TCP flows for each receiver. Effective throughput. The effective throughput is determined by dividing the amount of data reliably transferred by the time required to do it, or transmission time. More precisely, the transmission time is given by the period between the transmission of the first data packet and the receipt of the last positive confirmation required (when the sender obtains acknowledgements for all packets from all receivers). The times required to establish and close the session are not included, which is an overhead present in any reliable protocol where the sender knows and controls the membership

6 Required transmissions for each data packet Drop-Tail RED_without_ECN RED_with_ECN TCP flows for each receiver (a) required transmissions Mean delivery delay (normalized by optimum) Effective throughput (KBits/s) Drop-Tail RED_without_ECN RED_with_ECN TCP flows for each receiver (c) mean delay Drop-Tail RED_without_ECN RED_with_ECN TCP flows for each receiver (b) effective throughput 6. Conclusions and Future Work This paper offers three important contributions: first, it presents a set of generalized poll-based reliable multicast protocols and uses simulation to compare them, chosing the one with overall best results. Second, it presents a single-rate congestion control mechanism for this protocol, showing that it provides fairness between flows and is TCP friendly. Third, it proposes and evaluates the use of ECN in these protocols. We are presently extending the simulations with more realistic scenarios, including larger network topologies and adding flows with different traffic properties. We intend to study the impact of ECN in other classes of reliable multicast protocols, and quantitatively compare the poll-based reliable multicast with ECN congestion control and other reliable multicast protocols. Acknowledgments. We d like to thank the reviewers for their comments. This work has been partly supported by CNPq, Brazil. Figure 7. Impact when the number of TCP flows per receiver is increased. of the group. Fig. 7(b) exposes the negative impact that using drop-tail has on throughput: both RED and RED with ECN allowed the reliable multicast protocol to perform substantially better. It also shows that the main profit steems from the use of RED, not from ECN. Still, there is a substantial gain in using ECN instead of RED alone; for example, in Fig. 7(b), the effective throughputs measured for drop-tail, RED, and RED with ECN, are 33, 93 and 33 Kbits/s, respectively, when there are concurrent TCP flows for each receiver. That is, using ECN allows an improvement of 43% in comparison with RED alone, and 43% in comparison with drop-tail. Delivery latency. The delivery latency refers to the time interval between the transmission of a packet and its delivery to all receivers, including factors as link propagation latencies, queueing delays and packet losses (in the protocols considered, recovered by means of retransmission). The delivery of a packet is only considered effective in a receiver when all previous packets (with smaller sequence numbers) have been received. The reduction of this time is important in interactive applications or when the transmissions occur in sporadic fashion, involving small data volumes, as in the case of group communication systems. The plot in Fig. 7(c) illustrates the average delivery delays, normalized with optimal delivery delay, that is, considering only the latencies of the paths involved. Primarily, there is great disparity between the results obtained with the use in routers of RED or drop-tail: the use of routers with RED, even without ECN support, represents a sizable reduction in delivery latency. Additionally, ECN prevents considerably the growth in latency that would be otherwise caused by the increase in the number of TCP flows. References [] M. P. Barcellos and P. Ezhilchelvan. A Reliable Multicast Protocol using Polling for Scaleability. In IEEE INFO- COM 98, pages IEEE, Apr [] S. Bhattacharyya, D. Towsley, and J. Kurose. The Loss Path Multiplicity Problem in Multicast Congestion Control. In IEEE INFOCOM 99, pages IEEE, Mar [3] D. M. Chiu, M. Kadansky, J. Provino, J. Wesley, H. Bischof, and H. Zhu. A Congestion Control Algorithm for Treebased Reliable Multicast Protocols. In IEEE INFOCOM, June. [4] S. Floyd. TCP and Explicit Congestion Notification. ACM Computer Communication Review, 4(5): 3, 994. [5] P. Gevros, J. Crowcroft, P. Kirstein, and S. Bhatti. Congestion Control Mechanisms and the Best Effort Service Model. IEEE Network, 5(3):6 5,. [6] S. J. Golestani and K. Sabnani. Fundamental Observations on Multicast Congestion Control in the Internet. In IEEE INFOCOM 99, pages 99, 999. [7] S. Liang and D. Cheriton. TCP-SMO: Extending TCP to Support Medium-Scale Multicast Applications. In IEEE IN- FOCOM,. [8] M. Mathis and el at. TCP Selective Acknowledgement Options. RFC 8, IETF, Apr [9] K. Ramakrishnan, S. Floyd, and D. Black. The Addition of Explicit Congestion Notification (ECN) to IP. RFC 368, IETF, Sept.. [] L. Rizzo. pgmcc: a TCP-friendly Single-rate Multicast. In SIGCOMM, pages 7 8,. [] J. Widmer, R. Denda, and M. Mauve. A Survey on TCP- Friendly Congestion Control. IEEE Network, 5(3):8 37,. [] J. Widmer and M. Handley. Extending Equation-based Congestion Control to Multicast Applications. In ACM SIG- COMM,. [3] J. Widmer and M. Handley. TCP-Friendly Multicast Congestion Control (TFMCC): Protocol Specification. INTER- NET DRAFT: draft-ietf-rmt-bb-tfmcc-4.txt, Oct. 4.

Fairness Evaluation Experiments for Multicast Congestion Control Protocols

Fairness Evaluation Experiments for Multicast Congestion Control Protocols Fairness Evaluation Experiments for Multicast Congestion Control Protocols Karim Seada, Ahmed Helmy Electrical Engineering-Systems Department University of Southern California, Los Angeles, CA 989 {seada,helmy}@usc.edu

More information

AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS

AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS Shaikh Shariful Habib Assistant Professor, Computer Science & Engineering department International Islamic University Chittagong Bangladesh

More information

TCP so far Computer Networking Outline. How Was TCP Able to Evolve

TCP so far Computer Networking Outline. How Was TCP Able to Evolve TCP so far 15-441 15-441 Computer Networking 15-641 Lecture 14: TCP Performance & Future Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Reliable byte stream protocol Connection establishments

More information

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate

More information

image 3.8 KB Figure 1.6: Example Web Page

image 3.8 KB Figure 1.6: Example Web Page image. KB image 1 KB Figure 1.: Example Web Page and is buffered at a router, it must wait for all previously queued packets to be transmitted first. The longer the queue (i.e., the more packets in the

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Performance Comparison of TFRC and TCP

Performance Comparison of TFRC and TCP ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS FINAL PROJECT Performance Comparison of TFRC and TCP Spring 2002 Yi Zheng and Jian Wen {zyi,jwena}@cs.sfu.ca

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Chapter III: Transport Layer

Chapter III: Transport Layer Chapter III: Transport Layer UG3 Computer Communications & Networks (COMN) Mahesh Marina mahesh@ed.ac.uk Slides thanks to Myungjin Lee and copyright of Kurose and Ross Principles of congestion control

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

The Present and Future of Congestion Control. Mark Handley

The Present and Future of Congestion Control. Mark Handley The Present and Future of Congestion Control Mark Handley Outline Purpose of congestion control The Present: TCP s congestion control algorithm (AIMD) TCP-friendly congestion control for multimedia Datagram

More information

TCP based Receiver Assistant Congestion Control

TCP based Receiver Assistant Congestion Control International Conference on Multidisciplinary Research & Practice P a g e 219 TCP based Receiver Assistant Congestion Control Hardik K. Molia Master of Computer Engineering, Department of Computer Engineering

More information

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control : Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And

More information

Congestion control in TCP

Congestion control in TCP Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

CS321: Computer Networks Congestion Control in TCP

CS321: Computer Networks Congestion Control in TCP CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 1 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Equation-based Congestion Control

Equation-based Congestion Control Equation-based Congestion Control for Unicast and Multicast Applications Jörg Widmer Praktische Informatik IV, University of Mannheim / AT&T Center for Internet Research at ICSI (ACIRI) Feb 05, 2001 Why

More information

A NEW CONGESTION MANAGEMENT MECHANISM FOR NEXT GENERATION ROUTERS

A NEW CONGESTION MANAGEMENT MECHANISM FOR NEXT GENERATION ROUTERS Journal of Engineering Science and Technology Vol. 3, No. 3 (2008) 265-271 School of Engineering, Taylor s University College A NEW CONGESTION MANAGEMENT MECHANISM FOR NEXT GENERATION ROUTERS MOHAMMED

More information

ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL

ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL ROBUST TCP: AN IMPROVEMENT ON TCP PROTOCOL SEIFEDDINE KADRY 1, ISSA KAMAR 1, ALI KALAKECH 2, MOHAMAD SMAILI 1 1 Lebanese University - Faculty of Science, Lebanon 1 Lebanese University - Faculty of Business,

More information

Congestion Control. Principles of Congestion Control. Network-assisted Congestion Control: ATM. Congestion Control. Computer Networks 10/21/2009

Congestion Control. Principles of Congestion Control. Network-assisted Congestion Control: ATM. Congestion Control. Computer Networks 10/21/2009 Congestion Control Kai Shen Principles of Congestion Control Congestion: informally: too many sources sending too much data too fast for the network to handle results of congestion: long delays (e.g. queueing

More information

Performance Evaluation of TCP Westwood. Summary

Performance Evaluation of TCP Westwood. Summary Summary This project looks at a fairly new Transmission Control Protocol flavour, TCP Westwood and aims to investigate how this flavour of TCP differs from other flavours of the protocol, especially TCP

More information

Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren

Lecture 21: Congestion Control CSE 123: Computer Networks Alex C. Snoeren Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren Lecture 21 Overview" How fast should a sending host transmit data? Not to fast, not to slow, just right Should not be faster than

More information

Performance Consequences of Partial RED Deployment

Performance Consequences of Partial RED Deployment Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Research Article ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3 Address for Correspondence 1 Asst. Professor, Department of Electronics

More information

CS268: Beyond TCP Congestion Control

CS268: Beyond TCP Congestion Control TCP Problems CS68: Beyond TCP Congestion Control Ion Stoica February 9, 004 When TCP congestion control was originally designed in 1988: - Key applications: FTP, E-mail - Maximum link bandwidth: 10Mb/s

More information

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A SURVEY ON EXPLICIT FEEDBACK BASED CONGESTION CONTROL PROTOCOLS Nasim Ghasemi 1, Shahram Jamali 2 1 Department of

More information

Performance Analysis of TCP Variants

Performance Analysis of TCP Variants 102 Performance Analysis of TCP Variants Abhishek Sawarkar Northeastern University, MA 02115 Himanshu Saraswat PES MCOE,Pune-411005 Abstract The widely used TCP protocol was developed to provide reliable

More information

Computer Networking

Computer Networking 15-441 Computer Networking Lecture 17 TCP Performance & Future Eric Anderson Fall 2013 www.cs.cmu.edu/~prs/15-441-f13 Outline TCP modeling TCP details 2 TCP Performance Can TCP saturate a link? Congestion

More information

An Empirical Study of Reliable Multicast Protocols over Ethernet Connected Networks

An Empirical Study of Reliable Multicast Protocols over Ethernet Connected Networks An Empirical Study of Reliable Multicast Protocols over Ethernet Connected Networks Ryan G. Lane Daniels Scott Xin Yuan Department of Computer Science Florida State University Tallahassee, FL 32306 {ryanlane,sdaniels,xyuan}@cs.fsu.edu

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 15: Congestion Control Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

The Variation in RTT of Smooth TCP

The Variation in RTT of Smooth TCP The Variation in RTT of Smooth TCP Elvis Vieira and Michael Bauer University of Western Ontario {elvis,bauer}@csd.uwo.ca Abstract Due to the way of Standard TCP is defined, it inherently provokes variation

More information

RD-TCP: Reorder Detecting TCP

RD-TCP: Reorder Detecting TCP RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies

More information

Congestion Control. Principles of Congestion Control. Network assisted congestion. Asynchronous Transfer Mode. Computer Networks 10/23/2013

Congestion Control. Principles of Congestion Control. Network assisted congestion. Asynchronous Transfer Mode. Computer Networks 10/23/2013 Congestion Control Kai Shen Principles of Congestion Control Congestion: Informally: too many sources sending too much data too fast for the network to handle Results of congestion: long delays (e.g. queueing

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Congestion Control. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Congestion Control. Daniel Zappala. CS 460 Computer Networking Brigham Young University Congestion Control Daniel Zappala CS 460 Computer Networking Brigham Young University 2/25 Congestion Control how do you send as fast as possible, without overwhelming the network? challenges the fastest

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP) TETCOS Transmission Control Protocol (TCP) Comparison of TCP Congestion Control Algorithms using NetSim @2017 Tetcos. This document is protected by copyright, all rights reserved Table of Contents 1. Abstract....

More information

IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Performance Evaluation of TCP in the Presence of in Heterogeneous Networks by using Network

More information

TCP in Asymmetric Environments

TCP in Asymmetric Environments TCP in Asymmetric Environments KReSIT, IIT Bombay Vijay T. Raisinghani TCP in Asymmetric Environments 1 TCP Overview Four congestion control algorithms Slow start Congestion avoidance Fast retransmit Fast

More information

Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification. Chunlei Liu Raj Jain

Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification. Chunlei Liu Raj Jain Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification Chunlei Liu Raj Jain Department of Computer and Information Science The Ohio State University, Columbus, OH 432-277

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 257 Spring'15 1 Student Presentations Schedule May 21: Sam and Anuj May 26: Larissa

More information

A Report on Some Recent Developments in TCP Congestion Control

A Report on Some Recent Developments in TCP Congestion Control A Report on Some Recent Developments in TCP Congestion Control Sally Floyd June 5, 2000 Abstract This paper discusses several changes either proposed or in progress for TCP congestion control. The changes

More information

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP segment

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

Congestion / Flow Control in TCP

Congestion / Flow Control in TCP Congestion and Flow Control in 1 Flow Control and Congestion Control Flow control Sender avoids overflow of receiver buffer Congestion control All senders avoid overflow of intermediate network buffers

More information

15-744: Computer Networking TCP

15-744: Computer Networking TCP 15-744: Computer Networking TCP Congestion Control Congestion Control Assigned Reading [Jacobson and Karels] Congestion Avoidance and Control [TFRC] Equation-Based Congestion Control for Unicast Applications

More information

Equation-Based Congestion Control for Unicast Applications. Outline. Introduction. But don t we need TCP? TFRC Goals

Equation-Based Congestion Control for Unicast Applications. Outline. Introduction. But don t we need TCP? TFRC Goals Equation-Based Congestion Control for Unicast Applications Sally Floyd, Mark Handley AT&T Center for Internet Research (ACIRI) Jitendra Padhye Umass Amherst Jorg Widmer International Computer Science Institute

More information

Answers to Sample Questions on Transport Layer

Answers to Sample Questions on Transport Layer Answers to Sample Questions on Transport Layer 1) Which protocol Go-Back-N or Selective-Repeat - makes more efficient use of network bandwidth? Why? Answer: Selective repeat makes more efficient use of

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 24: Congestion Control Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica,

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Transport Layer TCP / UDP

Transport Layer TCP / UDP Transport Layer TCP / UDP Chapter 6 section 6.5 is TCP 12 Mar 2012 Layers Application Transport Why do we need the Transport Layer? Network Host-to-Network/Physical/DataLink High Level Overview TCP (RFC

More information

Congestion Collapse in the 1980s

Congestion Collapse in the 1980s Congestion Collapse Congestion Collapse in the 1980s Early TCP used fixed size window (e.g., 8 packets) Initially fine for reliability But something happened as the ARPANET grew Links stayed busy but transfer

More information

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented transport: TCP segment

More information

Chapter 3 Transport Layer

Chapter 3 Transport Layer Chapter 3 Transport Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Chapter 3 Transport Layer

Chapter 3 Transport Layer Chapter 3 Transport Layer Part c Congestion Control Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Transport Layer 3-1 Chapter 3 outline 3.1 transport-layer

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

CS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers. Xiaowei Yang

CS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers. Xiaowei Yang CS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers Xiaowei Yang xwy@cs.duke.edu Overview More on TCP congestion control Theory Macroscopic behavior TCP

More information

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data?

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data? Congestion Control End Hosts CSE 51 Lecture 7, Spring. David Wetherall Today s question How fast should the sender transmit data? Not tooslow Not toofast Just right Should not be faster than the receiver

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle Dissertation Defense May 14, 2003 Advisor: Kevin Jeffay Research Question Can the use of exact timing information improve

More information

Lecture 11. Transport Layer (cont d) Transport Layer 1

Lecture 11. Transport Layer (cont d) Transport Layer 1 Lecture 11 Transport Layer (cont d) Transport Layer 1 Agenda The Transport Layer (continue) Connection-oriented Transport (TCP) Flow Control Connection Management Congestion Control Introduction to the

More information

Chapter II. Protocols for High Speed Networks. 2.1 Need for alternative Protocols

Chapter II. Protocols for High Speed Networks. 2.1 Need for alternative Protocols Chapter II Protocols for High Speed Networks 2.1 Need for alternative Protocols As the conventional TCP suffers from poor performance on high bandwidth delay product links [47] meant for supporting transmission

More information

Multiple unconnected networks

Multiple unconnected networks TCP/IP Life in the Early 1970s Multiple unconnected networks ARPAnet Data-over-cable Packet satellite (Aloha) Packet radio ARPAnet satellite net Differences Across Packet-Switched Networks Addressing Maximum

More information

IFTP-W: A TCP-Friendly Protocol for Multimedia Applications over Wireless Networks

IFTP-W: A TCP-Friendly Protocol for Multimedia Applications over Wireless Networks -W: A -Friendly Protocol for Multimedia Applications over Wireless Networks Hala ElAarag Andrew Moedinger Department of Mathematics and Computer Science Stetson University DeLand, Florida, U.S.A. Email:

More information

Increase-Decrease Congestion Control for Real-time Streaming: Scalability

Increase-Decrease Congestion Control for Real-time Streaming: Scalability Increase-Decrease Congestion Control for Real-time Streaming: Scalability Dmitri Loguinov City University of New York Hayder Radha Michigan State University 1 Motivation Current Internet video streaming

More information

Router participation in Congestion Control. Techniques Random Early Detection Explicit Congestion Notification

Router participation in Congestion Control. Techniques Random Early Detection Explicit Congestion Notification Router participation in Congestion Control 1 Techniques Random Early Detection Explicit Congestion Notification 68 2 Early congestion notifications Early notifications inform end-systems that the network

More information

Reasons not to Parallelize TCP Connections for Fast Long-Distance Networks

Reasons not to Parallelize TCP Connections for Fast Long-Distance Networks Reasons not to Parallelize TCP Connections for Fast Long-Distance Networks Zongsheng Zhang Go Hasegawa Masayuki Murata Osaka University Contents Introduction Analysis of parallel TCP mechanism Numerical

More information

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved.

CS 138: Communication I. CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. CS 138: Communication I CS 138 V 1 Copyright 2012 Thomas W. Doeppner. All rights reserved. Topics Network Metrics Layering Reliability Congestion Control Routing CS 138 V 2 Copyright 2012 Thomas W. Doeppner.

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

Reliable Transport II: TCP and Congestion Control

Reliable Transport II: TCP and Congestion Control Reliable Transport II: TCP and Congestion Control Stefano Vissicchio UCL Computer Science COMP0023 Recap: Last Lecture Transport Concepts Layering context Transport goals Transport mechanisms and design

More information

Flow and Congestion Control Marcos Vieira

Flow and Congestion Control Marcos Vieira Flow and Congestion Control 2014 Marcos Vieira Flow Control Part of TCP specification (even before 1988) Goal: not send more data than the receiver can handle Sliding window protocol Receiver uses window

More information

ISSN: Index Terms Wireless networks, non - congestion events, packet reordering, spurious timeouts, reduce retransmissions.

ISSN: Index Terms Wireless networks, non - congestion events, packet reordering, spurious timeouts, reduce retransmissions. ISSN:2320-0790 A New TCP Algorithm to reduce the number of retransmissions in Wireless Networks A Beulah, R Nita Marie Ann Assistant Professsor, SSN College of Engineering, Chennai PG Scholar, SSN College

More information

100 Mbps. 100 Mbps S1 G1 G2. 5 ms 40 ms. 5 ms

100 Mbps. 100 Mbps S1 G1 G2. 5 ms 40 ms. 5 ms The Influence of the Large Bandwidth-Delay Product on TCP Reno, NewReno, and SACK Haewon Lee Λ, Soo-hyeoung Lee, and Yanghee Choi School of Computer Science and Engineering Seoul National University San

More information

CSC 4900 Computer Networks: TCP

CSC 4900 Computer Networks: TCP CSC 4900 Computer Networks: TCP Professor Henry Carter Fall 2017 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

TCP OVER AD HOC NETWORK

TCP OVER AD HOC NETWORK TCP OVER AD HOC NETWORK Special course on data communications and networks Zahed Iqbal (ziqbal@cc.hut.fi) Agenda Introduction Versions of TCP TCP in wireless network TCP in Ad Hoc network Conclusion References

More information

The Transport Layer Congestion control in TCP

The Transport Layer Congestion control in TCP CPSC 360 Network Programming The Transport Layer Congestion control in TCP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

Experimental Study of TCP Congestion Control Algorithms

Experimental Study of TCP Congestion Control Algorithms www..org 161 Experimental Study of TCP Congestion Control Algorithms Kulvinder Singh Asst. Professor, Department of Computer Science & Engineering, Vaish College of Engineering, Rohtak, Haryana, India

More information

Transport Layer PREPARED BY AHMED ABDEL-RAOUF

Transport Layer PREPARED BY AHMED ABDEL-RAOUF Transport Layer PREPARED BY AHMED ABDEL-RAOUF TCP Flow Control TCP Flow Control 32 bits source port # dest port # head len sequence number acknowledgement number not used U A P R S F checksum Receive window

More information

Scaleable Round Trip Time Estimation for Layered Multicast Protocol

Scaleable Round Trip Time Estimation for Layered Multicast Protocol Scaleable Round Trip Time Estimation for Layered Multicast Protocol Osman Ghazali and Suhaidi Hassan Department of Computer Sciences, Faculty of Information Technology Universiti Utara Malaysia, 06010

More information

Synopsis on. Thesis submitted to Dravidian University for the award of the degree of

Synopsis on. Thesis submitted to Dravidian University for the award of the degree of Synopsis on AN EFFICIENT EXPLICIT CONGESTION REDUCTION IN HIGH TRAFFIC HIGH SPEED NETWORKS THROUGH AUTOMATED RATE CONTROLLING Thesis submitted to Dravidian University for the award of the degree of DOCTOR

More information

A Survey of Recent Developments of TCP. Sally Floyd ACIRI (AT&T Center for Internet Research at ICSI) October 17, 2001

A Survey of Recent Developments of TCP. Sally Floyd ACIRI (AT&T Center for Internet Research at ICSI) October 17, 2001 A Survey of Recent Developments of TCP Sally Floyd ACIRI (AT&T Center for Internet Research at ICSI) October 17, 2001 IEEE Annual Computer Communications Workshop 1 An overview of this session: This talk:

More information

Overview. TCP & router queuing Computer Networking. TCP details. Workloads. TCP Performance. TCP Performance. Lecture 10 TCP & Routers

Overview. TCP & router queuing Computer Networking. TCP details. Workloads. TCP Performance. TCP Performance. Lecture 10 TCP & Routers Overview 15-441 Computer Networking TCP & router queuing Lecture 10 TCP & Routers TCP details Workloads Lecture 10: 09-30-2002 2 TCP Performance TCP Performance Can TCP saturate a link? Congestion control

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet

More information

Transport Layer (Congestion Control)

Transport Layer (Congestion Control) Transport Layer (Congestion Control) Where we are in the Course Moving on up to the Transport Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Congestion Collapse Congestion

More information

Bandwidth Allocation & TCP

Bandwidth Allocation & TCP Bandwidth Allocation & TCP The Transport Layer Focus Application Presentation How do we share bandwidth? Session Topics Transport Network Congestion control & fairness Data Link TCP Additive Increase/Multiplicative

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

TCP Congestion Control in Wired and Wireless networks

TCP Congestion Control in Wired and Wireless networks TCP Congestion Control in Wired and Wireless networks Mohamadreza Najiminaini (mna28@cs.sfu.ca) Term Project ENSC 835 Spring 2008 Supervised by Dr. Ljiljana Trajkovic School of Engineering and Science

More information