P2P Control for ISPs Dr. Lawrence G. Roberts Anagran Oct. 2008

Size: px
Start display at page:

Download "P2P Control for ISPs Dr. Lawrence G. Roberts Anagran Oct. 2008"

Transcription

1 P2P Control for ISPs Dr. Lawrence G. Roberts Anagran Oct Executive Summary P2P applications have become a serious problem for ISPs since they generate multiple flows for long periods, consuming much of the pooled capacity intended for a large collection of subscribers. It was hoped that could detect the P2P and slow it down, but encryption has made that approach miss sufficient P2P applications that the problem remains. Also, prying into the users data is viewed by many as an invasion of privacy. Thus a new technique is required, one which does not need to recognize P2P applications, but which looks at the subscribers total activity (# of flows plus their total data rate) and then lowers the data rates of subs with excessive usage so that all subs that paid the same have equal capacity during congestion. This requires the ability to slow a data flow smoothly without modifying the packets and not stalling the flows. The Anagran FR Flow Manager is the first system that can do this. One system can manage 10 Gbps with far less size, power and cost than the systems. This paper will show why multi-flow applications must be controlled and that P2P is only the start of the problem. My contention is that networks must implement a new fairness rule equal capacity for equal pay. Currently, when congestion occurs, we live with the default rule of equal capacity per flow. This default rule is why P2P has become a problem. Other applications like FTP could easily start using multiple flows to compete with P2P and without the new fairness rule; the network quality would deteriorate rapidly. The paper will also examine the behavior of P2P and various control methods. P2P applications add more and more flows so long as they can expand total throughput. Thus, there is a complex feedback between the rate and number of flows P2P applications utilize and the control method. For example, a fixed reduction of capacity per P2P sub is generally insufficient to improve the speed and quality of the average users being affected. Also, adding capacity may harm the average user, not improve things. These issues will be explored. The Simulation Model After examining P2P activity and observing its behavior, the following model was constructed. The network is assumed to be FTTX, DSL, Cable, Satellite, or Wireless. In each case the total upstream and downstream capacity per fiber hub, DSLAM, cable channel, transponder, or base station is pooled capacity shared between some number of subs. The peak capacity per sub and the average usage per sub are other parameters. Also, the maximum number of flows and minimum rate per flow of the P2P applications are important parameters. The cases shown here have been chosen to be typical cases and ones where significant information can be learned.

2 In all cases, the % of P2P subs in a pooled capacity is a variable from 5% down to zero. Generally, it has been observed that 5% of the population tends to use P2P. If is being used to reduce P2P activity, the best current estimate of detection and control can be found in the recent French ETAC study where 7 of the P2P was controlled. This leaves 3 of the P2P using subs still operating, or out of 5%, about 1.5% P2P active and unconstrained. In all cases modeled this reduction of the P2P subs from 5% to 1.5% makes no difference in the service received by the other subs since the remaining P2P subs generate more flows and still saturate the channel. Generally, the P2P subs compete among themselves for capacity until they are reduced to 0.5% of the population, at which point things start to get better. Asymmetric Channels An example may clarify this. Figure 1 shows a DSL or Cable case with 4:1 asymmetry. 4 6 Mbps Downstream,.75 Mbps upstream Wasted Capacity % % % % % 0. % User s P2P 6 Mbps Dow nstream,.75 Mbps upstream Figure 1: 100 Mbps Pooled Capacity shared among 800 subs P2P tends to use the same capacity upstream as downstream, in this case about 23.6 Mbps in each direction. The P2P applications sense the congestion of the upstream channel and until there are less than 0.5% P2P subs active, the upstream is congested. This means the ACK s for the other 99.5% of the users who might be downloading, are greatly delayed, thereby slowing their downstream traffic to 650 Kbps per sub. The four P2P subs also use the downstream at 6 Mbps each. This leaves about 45% of the downstream capacity unused due to the congested upstream. The performance for the average user is identical for any number of P2P subs above 0.5% but the P2P subs must share the 23.5 Mbps in the upstream direction and thus as more P2P subs are active, each will receive less and less of the capacity until at 4.6% P2P subs, each P2P sub receives less downstream than the average user. Thus has no impact on the performance for the majority of the subscribers. Not only do they have poor performance, but since ACK s may be discarded in the congested upstream channel, they may have a larger instance of stalled flows; flows that never seem to complete % % % % % 0. % Use rs with P2P Symmetric Channels One might think that by using a symmetric channel design, the congestion of the upstream channel would be solved and the situation would improve. However, the reverse is true, now both the upstream and the downstream channel will be congested, and the problem is worse. Figure 2 shows the same DSL or Cable system with 100 Mbps upstream and downstream.

3 4 6 Mbps Dow nstre am, 6 Mbps Upstream % % % % % 0. % Us ers P2P 6 Mbps Downstream, 6 Mbps Upstream Figure 2: Symmetric DSL -100 Mbps Pooled Capacity shared among 800 subs Here without the 5% P2P subs consume 98.6 % of both the upstream and downstream channels! This is because the P2P subs are not competing so hard between themselves and each one can use more capacity. If can reduce the P2P subs that remain active to 1.5%, then the average subs each receive 592 Kbps, 9% less than with the asymmetric system. Thus, unless detects and controls more than 7 of the P2P applications, the service is either worse or much worse than the asymmetric case. 4 Idle Capacity % % % % % 0. Higher Capacity The next thought one might have is to raise the capacity and perhaps the P2P would not hurt. However, this is not the case again. In Figure 3 we consider a FTTX system with 1 Gbps downstream and upstream channels serving 5000 subs with each sub having 100 Mbps in each direction. The P2P applications now have 100 Mbps available and if they can find enough sources and sinks, then they would use it all. However, now with 5000 subs, there are more P2P subs and they still must share between themselves Mbps Downstream, 100 Mbps Upstream % % % % % 0. % Us ers P2P 100 Mbps Downstream, 100 Mbps Upstream Figure 3: FTTX with 100 Mbps maximum each direction per sub Here, with 5% P2P subs, they get about 4 Mbps per sub whereas the other 95% of the subs get 30 Kbps in each direction. The reason for the 30 Kbps is that is the rate the P2P subs have chosen to use and if under congestion every flow gets equal capacity, the average sub with one flow gets 30 Kbps where the P2P sub is using 131 flows at 30 Kbps. The best strategy for the P2P applications is to use more flows at lower rates, thus driving down the average rate of the other users. 30 Kbps is about as low as we see today, but even lower is quite feasible. The lower it is, the worse the performance is for the average sub. In fact here with 100 Mbps service, the average sub is getting less than dialup speeds % % % % % 0.

4 Problems As the prior cases show, fails to improve the low performance of the average user since it cannot recognize al the encrypted P2P traffic. Another option some have used is to downgrade all traffic that is not recognized as good (not P2P). This has the impact of downgrading good traffic like HTTPS and other encrypted traffic. This also is not acceptable to the average user. In a test where this was being done at a University, the Anagran system showed many false negatives produced by this approach. However, suffers from many other problems as well: Recognized P2P: Too many false positives bad user experience Recognized good: Too many false negatives bad user experience Method to slow P2P traffic: Either resets (bad press) or excessive stalls produced Privacy invasion: Negative reaction from users, press, and regulators High processing load: High cost, size, and power 10 Gbps trunks: 1 Gbps units need efficient load balancer The Anagran system is probably the best load balancer since it carefully balances 10 Gbps streams to multiple smaller systems, flow by flow. However, the same system could also be managing the P2P more effectively thus this approach is mainly valuable where is used for other issues like security. Rate Control instead of We have seen that has many problems and cannot adequately control P2P. However, other solutions exist. First one needs to watch all the traffic and discover the total capacity being used by each subscriber in all flows in each direction. Next, if there is congestion, the subs using excessive capacity can have their maximum rate reduced or their individual flow rates reduced. Now we will examine these options. Subscriber Rate Cap Most subscriber management systems are designed to provide for several levels of service based on the DSL capacity or the payment level. In cable and wireless this may be in the CMTS systems and for DSL it may be in the DSLAMs. If these rate caps can be adjusted by policy, they can be reduced when excessive use is determined. The process here is to either measure the traffic per subscriber before the management system or use the management systems own measurement to determine subscriber usage over a period. 4 Dow nstream Capacity Usage 6 Mbps Downstream, 1.5 Mbps upstream % % % % % 0. % Users P2P 6 Mbps Downstream, 1.5 Mbps upstream % % % % % 0. Figure 4: Asymmetric DSL service with excessive subs limited to 1/3 rate Then, when congestion is seen, the subscribers with the highest total usage can be downgraded temporally to a lower maximum rate cap. For example a 12 Mbps subscriber 4

5 might be reduced to 4 Mbps, a 3:1 reduction. The result is to limit the P2P users ability to use as much capacity and thus, hopefully to relieve congestion for the average subs. However, this does not succeed that well. Going back to the first example, asymmetric DSL, figure 4 shows the result of capping the excessive subs to 1/3 their maximum rate. As figure 4 shows, the 1/3 rate reduction moves the breakpoint for improvement of the average subs performance from 0.5% to 1.5% P2P active. However, even if is still deployed, there is no improvement with a 3:1 reduction. If does not lose ground as encryption is more widely deployed, a larger rate reduction would improve the situation, but congestion has not been avoided, s privacy invasion is still required, and s use of crude methods to kill or slow P2P are still necessary. Looking at the FTTX example, an even worse situation occurs. Figure 5 shows the FTTX system with 100 Mbps to the sub when a 3:1 rate reduction is imposed on the maximum rate. 4 Average Traffic % % % % % 0. % Users P2P Figure 5: FTTX with a 3:1 cap rate reduction % % % % % 0. In figure 5 there is no improvement although improvement now starts if P2P subs can be reduced below 1%, not 0.1%. In fact no matter what the rate reduction, would still be required, and anything more than zero P2P subs is less than perfect. Thus, the impact of rate cap reduction would only help if is continued to be used and major rate cap reductions like 20:1 were available and used. Such large rate cap settings are not likely to be available, and if they were, a light P2P user or subs with many videos, would be subjected to excessive rate reduction which is likely to cause serious complaints. 4 Variable Rate Reduction What the examples above have shown is that fixed rate reductions are unfair, insufficient, and still require. However, if the rate reduction can be applied on a basis proportional to the rate each sub is using then, to first order the could be eliminated and the correction made fair. It still requires that this only be done when there is congestion and then only to the extent needed to bring each channel to just under congestion. This cannot be pre-computed easily since the P2P applications will respond to congestion by dropping the rate of the flows or the number of flows, or both. Thus, the situation is dynamic and must be dealt with dynamically. It also must use a method of rate control that can smoothly reduce the rate of each flow without discarding more than one packet per RTT so that the flow does not stall or return to slow start. This is exactly the unique sort of flow rate control that Anagran has built into its flow manager. The flow manager can set a priority for each flow and when congestion is foreseen, it can

6 dynamically adjust the rate of each flow proportional to the priority. That is, if the priority is 1/27 the flow will be controlled to 1/27 the rate of other flows in the same congestion group (cable channel, DSLAM, base station, etc.). Thus, by observing the number of flows and the traffic over some period of each sub, a priority can be applied to all the flows of that sub which will reduce its total rate to be equal with all other fully active subs when there is congestion. This is all done at very high speed since the flow manager is streaming packets through, and only managing the higher level, flows. Thus, one small 1RU system can manage 10 Gbps of traffic for many congestion groups in both directions. The cost size and power is far less than and there is no dependence on some built-in rate caps in the subscriber management systems. Thus, multi-flow control (including P2P) is possible with no unfairness, no privacy invasion, and no confusion with encrypted traffic. This is Anagran Equalize. The result can be seen in figure % % % % % 0. % Users P2P Figure 6: FTTX with Anagran Equalize This FTTX case was the most difficult, but all cases now look the same. The P2P subs get the same capacity as any average sub. There is no congestion, the maximum traffic level allowed in any congestion group is 99%, thus not requiring any packet discards at the subscriber management systems. Also, video and voice flows are protected from packet discard or delay. Priorities can be applied for subscribers who pay more and when this is applied the result is FTP, HTTP, and other applications are allowed to run at higher per flow rates, not just less delay or more flows. But most of all, the result is easy to describe to all subs; all subs the paid the same will get the same capacity if congestion does or would occur. 4 Idle Capacity % % % % % 0. The Importance of a New Fairness Rule As we have seen, P2P can cause severe disruption of IP service, largely due to the default fairness rule that results from TCP operation and network equipments output queues; equal capacity per flow. If this continues, more and more applications will use multiple flows and IP service will deteriorate. However, by introducing flow managers which change this rule at each congestion point to a new and much fairer rule; equal capacity for equal pay.

Changing the IP Fairness Rule With Flow Management

Changing the IP Fairness Rule With Flow Management Changing the IP Fairness Rule With Flow Management Dr. Lawrence Roberts Founder, Chairman, Anagran 1 The Beginning of the Internet ARPANET became the Internet 1965 MIT- 1 st Packet Experiment -Roberts

More information

MAJOR IMPROVEMENTS IN TCP PERFORMANCE OVER SATELLITE AND RADIO

MAJOR IMPROVEMENTS IN TCP PERFORMANCE OVER SATELLITE AND RADIO MAJOR IMPROVEMENTS IN TCP PERFORMANCE OVER SATELLITE AND RADIO Dr. Lawrence G. Roberts CEO, Anagran Inc. This research is funded in part by DARPA contract # N66001-5-9-8904 ABSTRACT TCP performance deteriorates

More information

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links Network Working Group Request for Comments: 1046 W. Prue J. Postel ISI February 1988 A Queuing Algorithm to Provide Type-of-Service for IP Links Status of this Memo This memo is intended to explore how

More information

Wide Area Networks (WANs) Slide Set 6

Wide Area Networks (WANs) Slide Set 6 Wide Area Networks (WANs) Slide Set 6 Wide Area Networks (WANs) WAN Purposes Link sites (usually) within the same corporation Remote access for individuals who are off-site Internet access for individuals

More information

Flow Routing to Power NGN IP Services. Dr. Lawrence G. Roberts CEO, Anagran

Flow Routing to Power NGN IP Services. Dr. Lawrence G. Roberts CEO, Anagran Flow Routing to Power NGN IP Services Dr. Lawrence G. Roberts CEO, Anagran lroberts@anagran.com The Beginning of the Internet - ARPANET 1965 MIT Two Computer Experiment Proved Circuit Switching too slow,

More information

Optimizing the Internet Quality of Service and Economics for the Digital Generation. Dr. Lawrence Roberts President and CEO,

Optimizing the Internet Quality of Service and Economics for the Digital Generation. Dr. Lawrence Roberts President and CEO, Optimizing the Internet Quality of Service and Economics for the Digital Generation Dr. Lawrence Roberts President and CEO, lroberts@anagran.com Original Internet Design File Transfer and Remote Computing

More information

TCP and BBR. Geoff Huston APNIC

TCP and BBR. Geoff Huston APNIC TCP and BBR Geoff Huston APNIC Computer Networking is all about moving data The way in which data movement is controlled is a key characteristic of the network architecture The Internet protocol passed

More information

10 Reasons your WAN is Broken

10 Reasons your WAN is Broken Lack of Visibility Most WAN performance problems are driven by underperforming connections or applications. It isn t uncommon to be paying for a 20 Mbps WAN link that performs at 10 Mbps. The root cause

More information

The Effects of Asymmetry on TCP Performance

The Effects of Asymmetry on TCP Performance The Effects of Asymmetry on TCP Performance Hari Balakrishnan Venkata N. Padmanabhan Randy H. Katz University of California at Berkeley Daedalus/BARWAN Retreat June 1997 Outline Overview Bandwidth asymmetry

More information

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for

More information

TCP and BBR. Geoff Huston APNIC

TCP and BBR. Geoff Huston APNIC TCP and BBR Geoff Huston APNIC Computer Networking is all about moving data The way in which data movement is controlled is a key characteristic of the network architecture The Internet protocol passed

More information

Modems, DSL, and Multiplexing. CS158a Chris Pollett Feb 19, 2007.

Modems, DSL, and Multiplexing. CS158a Chris Pollett Feb 19, 2007. Modems, DSL, and Multiplexing CS158a Chris Pollett Feb 19, 2007. Outline Finish up Modems DSL Multiplexing The fastest modems Last day, we say the combinations and phases used to code symbols on a 2400

More information

end systems, access networks, links 1.3 network core

end systems, access networks, links 1.3 network core Chapter 1: roadmap 1.1 what is the Inter? 1.2 work edge end systems, works, links 1.3 work core packet switching, circuit switching, work structure 1.4 delay, loss, throughput in works 1.5 protocol layers,

More information

Congestion Management

Congestion Management WHITEPAPER Congestion Management Fair Split Shaping Fair Split can also be used as a more generic Congestion Management solution in the case where regulations require all traffic to be treated equal regardless

More information

Load Balance Mechanism

Load Balance Mechanism Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router

More information

Since enrollment is very small this semester, we have flexibilty. Traditional lecture Assigned reading, and then student(s) present during class time

Since enrollment is very small this semester, we have flexibilty. Traditional lecture Assigned reading, and then student(s) present during class time Syllabus You can go to cs.rpi.edu and then Faculty and my website from my profile Or you can go to www.cs.rpi.edu/~holzbh Or to be very direct, you can go to www.cs.rpi.edu/~holzbh/ccn18/index.php 1 Textbook

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback ECS 15; Lectures 17 and 18 The Internet What is the internet, and how does it work? TA feedback Python -- Run your code!! Term paper: Start a paragraph with the point of the paragraph, not in modern times

More information

CS Transport. Outline. Window Flow Control. Window Flow Control

CS Transport. Outline. Window Flow Control. Window Flow Control CS 54 Outline indow Flow Control (Very brief) Review of TCP TCP throughput modeling TCP variants/enhancements Transport Dr. Chan Mun Choon School of Computing, National University of Singapore Oct 6, 005

More information

Multipath TCP. Prof. Mark Handley Dr. Damon Wischik Costin Raiciu University College London

Multipath TCP. Prof. Mark Handley Dr. Damon Wischik Costin Raiciu University College London Multipath TCP How one little change can make: YouTube more robust your iphone service cheaper your home broadband quicker prevent the Internet from melting down enable remote brain surgery cure hyperbole

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Chapter 1: introduction

Chapter 1: introduction Chapter 1: introduction our goal: v get feel and terminology v more depth, detail later in course v approach: use Internet as example overview: v what s the Internet? v what s a protocol? v edge; hosts,

More information

Lecture 9 Congestion Control: Part II. EECS 122 University of California Berkeley

Lecture 9 Congestion Control: Part II. EECS 122 University of California Berkeley Lecture 9 Congestion Control: Part II EECS 122 University of California Berkeley TOC: Congestion Control 2 Quick Review of TCP s CC Cheating TCP ECN Noisy Links Virtual Queues RED How Big are Router Buffers?

More information

TCP and BBR. Geoff Huston APNIC. #apricot

TCP and BBR. Geoff Huston APNIC. #apricot TCP and BBR Geoff Huston APNIC The IP Architecture At its heart IP is a datagram network architecture Individual IP packets may be lost, re-ordered, re-timed and even fragmented The IP Architecture At

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions

Performance Analysis of the Intertwined Effects between Network Layers for g Transmissions Performance Analysis of the Intertwined Effects between Network Layers for 802.11g Transmissions Jon Gretarsson, Feng Li, Mingzhe Li, Ashish Samant, Huahui Wu, Mark Claypool and Robert Kinicki WPI Computer

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

Integrated t Services Digital it Network (ISDN) Digital Subscriber Line (DSL) Cable modems Hybrid Fiber Coax (HFC)

Integrated t Services Digital it Network (ISDN) Digital Subscriber Line (DSL) Cable modems Hybrid Fiber Coax (HFC) Digital Local Loop Technologies Integrated t Services Digital it Network (ISDN) Handles voice and data Relatively l high h cost for low bandwidth (Skip) Digital Subscriber Line (DSL) Cable modems Hybrid

More information

Product Demonstration Guide

Product Demonstration Guide Product Demonstration Guide Table of Contents Introduction... 2 Overview of Equalizing... 2 Equalizing Scenario... 2 Key Features of the NetEqualizer... 4 NetEqualizer Dashboard... 4 Reducing Network Congestion...

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

Load Balancing Technology White Paper

Load Balancing Technology White Paper Load Balancing Technology White Paper Keywords: Server, gateway, link, load balancing, SLB, LLB Abstract: This document describes the background, implementation, and operating mechanism of the load balancing

More information

Addressing the Challenges of Web Data Transport

Addressing the Challenges of Web Data Transport Addressing the Challenges of Web Data Transport Venkata N. Padmanabhan Microsoft Research UW Whistler Retreat December 1998 Outline Challenges Solutions TCP Session Fast Start Ongoing and Future Work The

More information

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate

More information

Lecture 22 Overview. Last Lecture. This Lecture. Next Lecture. Internet Applications. ADSL, ATM Source: chapter 14

Lecture 22 Overview. Last Lecture. This Lecture. Next Lecture. Internet Applications. ADSL, ATM Source: chapter 14 Last Lecture Lecture 22 Overview Internet Applications This Lecture ADSL, ATM Source: chapter 14 Next Lecture Wireless Networking Source: chapter 15 COSC244 & TELE202 Lecture 22 - ADSL, ATM 1 Modem Enable

More information

QoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm

QoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm QoS on Low Bandwidth High Delay Links Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm Agenda QoS Some Basics What are the characteristics of High Delay Low Bandwidth link What factors

More information

THE IMPACT OF GOING FIBER SPEEDS OVER COAX FEEDS Alon Bernstein, Cisco Systems, Inc. Joe Godas, Cablevision

THE IMPACT OF GOING FIBER SPEEDS OVER COAX FEEDS Alon Bernstein, Cisco Systems, Inc. Joe Godas, Cablevision THE IMPACT OF GOING FIBER SPEEDS OVER COAX FEEDS Alon Bernstein, Cisco Systems, Inc. Joe Godas, Cablevision Abstract Data rates over cable networks are constantly increasing due to higher bandwidth demands

More information

CNT 4007 Computer Networks - Chapter 1 : Overview

CNT 4007 Computer Networks - Chapter 1 : Overview CNT 4007 Computer Networks - Chapter 1 : Overview Jonathan Kavalan, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida 1 Chapter 1: Introduction Our goal: get

More information

Latency in DOCSIS Networks

Latency in DOCSIS Networks Latency in DOCSIS Networks Greg White Sept. 26, 2013 The various DOCSIS versions From a latency perspective DOCSIS 1.0 ca. 1996, deployments ~1998 Fundamental request-grant upstream MAC layer definition

More information

15-744: Computer Networking TCP

15-744: Computer Networking TCP 15-744: Computer Networking TCP Congestion Control Congestion Control Assigned Reading [Jacobson and Karels] Congestion Avoidance and Control [TFRC] Equation-Based Congestion Control for Unicast Applications

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

Chapter 6 The Internet

Chapter 6 The Internet Chapter The Internet Computer Concepts 2014 Chapter Contents Section A: Internet Technology Section B: Fixed Internet Access Section C: Portable and Mobile Internet Access Section D: Internet Services

More information

Network Management Policy ( Policy ) 1

Network Management Policy ( Policy ) 1 Network Management Policy ( Policy ) 1 I. OVERVIEW Viasat s Network is a shared network; at any given time, subscribers within a given geographic area must share available network capacity. Viasat aims

More information

The Controlled Delay (CoDel) AQM Approach to fighting bufferbloat

The Controlled Delay (CoDel) AQM Approach to fighting bufferbloat The Controlled Delay (CoDel) AQM Approach to fighting bufferbloat BITAG TWG Boulder, CO February 27, 2013 Kathleen Nichols Van Jacobson Background The persistently full buffer problem, now called bufferbloat,

More information

Truffle Broadband Bonding Network Appliance

Truffle Broadband Bonding Network Appliance Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

TCP and BBR. Geoff Huston APNIC

TCP and BBR. Geoff Huston APNIC TCP and BBR Geoff Huston APNIC The IP Architecture At its heart IP is a datagram network architecture Individual IP packets may be lost, re-ordered, re-timed and even fragmented The IP Architecture At

More information

Network Programming I Computer Network Design

Network Programming I Computer Network Design Network Programming I Computer Network Design Flavio Esposito http://cs.slu.edu/~esposito/teaching/3650/ Lecture 2 Lecture Goals Get feel and terminology of some components of real nets More depth & details

More information

5 Ways That Your Perfect Network Fails

5 Ways That Your Perfect Network Fails 5 Ways That Your Perfect Network Fails Users of strategic applications are often assured that their network will be perfect. As users continue to discover, even perfect networks can still fail critical

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.1 Chapter 1 Introduction Text Book for this course Computer Networking:

More information

Measuring VDI Fitness and User Experience Technical White Paper

Measuring VDI Fitness and User Experience Technical White Paper Measuring VDI Fitness and User Experience Technical White Paper 3600 Mansell Road Suite 200 Alpharetta, GA 30022 866.914.9665 main 678.397.0339 fax info@liquidwarelabs.com www.liquidwarelabs.com Table

More information

Clear Creek Communications. Open Internet Policy

Clear Creek Communications. Open Internet Policy Clear Creek Communications Open Internet Policy Clear Creek Communications ( the Company ) has adopted the following Open Internet Policy for its broadband Internet access services. These practices, characteristics,

More information

Chapter II. Protocols for High Speed Networks. 2.1 Need for alternative Protocols

Chapter II. Protocols for High Speed Networks. 2.1 Need for alternative Protocols Chapter II Protocols for High Speed Networks 2.1 Need for alternative Protocols As the conventional TCP suffers from poor performance on high bandwidth delay product links [47] meant for supporting transmission

More information

Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard

Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard Five students from Stanford Published in 2012 ACM s Internet Measurement Conference (IMC) 23 citations Ahmad Tahir 1/26 o Problem o

More information

Network Management Policy ( Policy ) 1

Network Management Policy ( Policy ) 1 Network Management Policy ( Policy ) 1 I. OVERVIEW Viasat s Network is a shared network; at any given time, subscribers within a given geographic area must share available network capacity. Viasat aims

More information

CS 471G Friday, 11 January Introduction 2-1

CS 471G Friday, 11 January Introduction 2-1 CS 471G Friday, 11 January 2013 Introduction 2-1 Chapter 1 Introduction A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in

More information

Farmers Mutual Telephone Company. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and

Farmers Mutual Telephone Company. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and Farmers Mutual Telephone Company Broadband Internet Access Services Network Management Practices, Performance Characteristics, and Commercial Terms and Conditions for Fixed Services Farmers Mutual Telephone

More information

Assignment 10: TCP and Congestion Control Due the week of November 14/15, 2012

Assignment 10: TCP and Congestion Control Due the week of November 14/15, 2012 Assignment 10: TCP and Congestion Control Due the week of November 14/15, 2012 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for

More information

Multipath TCP. Prof. Mark Handley Dr. Damon Wischik Costin Raiciu University College London

Multipath TCP. Prof. Mark Handley Dr. Damon Wischik Costin Raiciu University College London Multipath TCP How one little change can make: Google more robust your iphone service cheaper your home broadband quicker prevent the Internet from melting down enable remote brain surgery cure hyperbole

More information

Satellite-Based Cellular Backhaul in the Era of LTE

Satellite-Based Cellular Backhaul in the Era of LTE Satellite-Based Cellular Backhaul in the Era of LTE Introduction 3 Essential Technologies for 3G/LTE Backhauling over Satellite 6 Gilat s Solution SkyEdge II-c Capricorn 7 Why Ultra-fast TDMA is the Only

More information

DDoS Defense by Offense

DDoS Defense by Offense DDoS Defense by Offense Michael Walfish, Mythili Vutukuru, Hari Balakrishnan, David Karger, and Scott Shenker, SIGCOMM 06 Presented by Nikki Benecke, Nov. 7 th, 2006, for CS577 DDoS: Defense by Offense

More information

AT&T Collaborate TM. Network Assessment Tool

AT&T Collaborate TM. Network Assessment Tool AT&T Collaborate TM Network Assessment Tool 2016 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and DIRECTV are registered trademarks and service marks of AT&T

More information

CS268: Beyond TCP Congestion Control

CS268: Beyond TCP Congestion Control TCP Problems CS68: Beyond TCP Congestion Control Ion Stoica February 9, 004 When TCP congestion control was originally designed in 1988: - Key applications: FTP, E-mail - Maximum link bandwidth: 10Mb/s

More information

Issues related to TCP performance in heterogeneous networks

Issues related to TCP performance in heterogeneous networks Issues related to TCP performance in heterogeneous networks Chadi BARAKAT INRIA Sophia Antipolis, France PLANETE group EPFL Summer Research Institute July 16, 2002 Heterogeneity of networks The Internet

More information

Flow and Congestion Control

Flow and Congestion Control CE443 Computer Networks Flow and Congestion Control Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought

More information

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Outline Introduction What s wrong with TCP? Idea of Efficiency vs. Fairness XCP, what is it? Is it

More information

White Paper Broadband Multimedia Servers for IPTV Design options with ATCA

White Paper Broadband Multimedia Servers for IPTV Design options with ATCA Internet channels provide individual audiovisual content on demand. Such applications are frequently summarized as IPTV. Applications include the traditional programmed Video on Demand from a library of

More information

Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard

Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard Confused, Timid, and Unstable: Picking a Video Streaming Rate is Hard Araz Jangiaghdam Seminar Networks and Distributed Systems School of Engineering and Sciences Jacobs University Bremen Campus Ring 1,

More information

Grades of Service at a glance

Grades of Service at a glance 1st August 2013 Grades of Service at a glance The following table (Figure 1) highlights the various Grades of Service that are available on the Bentley X3 Evolution Service. It enables people to easily

More information

SERVICE PROVIDER HANDBOOK BT PERFORMANCE TESTER

SERVICE PROVIDER HANDBOOK BT PERFORMANCE TESTER SERVICE PROVIDER HANDBOOK BT PERFORMANCE TESTER BT Performance Tester Service Provider Handbook AUTHOR: BT WHOLESALE DATE: 28/11/2006 Page 1 of 29 CONTENTS Page 1 INTRODUCTION 3 2 THROUGHPUT MEASUREMENT

More information

Good Ideas So Far Computer Networking. Outline. Sequence Numbers (reminder) TCP flow control. Congestion sources and collapse

Good Ideas So Far Computer Networking. Outline. Sequence Numbers (reminder) TCP flow control. Congestion sources and collapse Good Ideas So Far 15-441 Computer Networking Lecture 17 TCP & Congestion Control Flow control Stop & wait Parallel stop & wait Sliding window Loss recovery Timeouts Acknowledgement-driven recovery (selective

More information

Computer Networks and the Internet. CMPS 4750/6750: Computer Networks

Computer Networks and the Internet. CMPS 4750/6750: Computer Networks Computer Networks and the Inter CMPS 4750/6750: Computer Networks Outline What Is the Inter? Access Networks Packet Switching and Circuit Switching A closer look at delay, loss, and throughput Interconnection

More information

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Semra.gulder@crc.ca, mathieu.deziel@crc.ca Abstract: This paper describes a QoS mechanism suitable for Mobile Ad Hoc Networks

More information

Understanding UC, Adaptive Video, and Data Traffic Interaction

Understanding UC, Adaptive Video, and Data Traffic Interaction Understanding UC, Adaptive Video, and Data Traffic Interaction Different types of network traffic can make dramatically different demands on the network. Unified communications (UC), which can include

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs

PeerApp Case Study. November University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs PeerApp Case Study University of California, Santa Barbara, Boosts Internet Video Quality and Reduces Bandwidth Costs November 2010 Copyright 2010-2011 PeerApp Ltd. All rights reserved 1 Executive Summary

More information

CSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing.

CSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing. Multiplexing: combining information streams from multiple sources for transmission over a shared medium Demultiplexing: separating a combination back into individual information streams CSIS 4222 Ch 11:

More information

HOSTED PBX WITHOUT THE HEADACHES: QUALITY OF SERVICE

HOSTED PBX WITHOUT THE HEADACHES: QUALITY OF SERVICE HOSTED PBX WITHOUT THE HEADACHES: QUALITY OF SERVICE Introduction Expanding numbers of SMBs are now relying on the cloud for communication and other mission-critical services. In the case of Hosted PBX

More information

Oscillations and Buffer Overflows in Video Streaming under Non- Negligible Queuing Delay

Oscillations and Buffer Overflows in Video Streaming under Non- Negligible Queuing Delay Oscillations and Buffer Overflows in Video Streaming under Non- Negligible Queuing Delay Presented by Seong-Ryong Kang Yueping Zhang and Dmitri Loguinov Department of Computer Science Texas A&M University

More information

Tuning RED for Web Traffic

Tuning RED for Web Traffic Tuning RED for Web Traffic Mikkel Christiansen, Kevin Jeffay, David Ott, Donelson Smith UNC, Chapel Hill SIGCOMM 2000, Stockholm subsequently IEEE/ACM Transactions on Networking Vol. 9, No. 3 (June 2001)

More information

Ultra high-speed transmission technology for wide area data movement

Ultra high-speed transmission technology for wide area data movement Ultra high-speed transmission technology for wide area data movement Michelle Munson, president & co-founder Aspera Outline Business motivation Moving ever larger file sets over commodity IP networks (public,

More information

COMP 431 Internet Services & Protocols. A Whirlwind Introduction to the Internet ( Networking Nouns and Verbs ) Jasleen Kaur

COMP 431 Internet Services & Protocols. A Whirlwind Introduction to the Internet ( Networking Nouns and Verbs ) Jasleen Kaur There is a poll posted on piazza. Please take a minute to fill it out. COMP 431 Internet Services & Protocols A Whirlwind Introduction to the Internet ( Networking Nouns and Verbs ) Jasleen Kaur January

More information

Performance Consequences of Partial RED Deployment

Performance Consequences of Partial RED Deployment Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

Fundamentals of Information Systems

Fundamentals of Information Systems Fundamentals of Information Systems Computer Networking Module Year 2017/2018 Master Degree in Data Science Armir Bujari abujari@math.unipd.it About the module Requirements No strict requirement, however,

More information

HST-3000 Class of Service (CoS) Test Suite

HST-3000 Class of Service (CoS) Test Suite Application Note HST-3000 Class of Service (CoS) Test Suite By John Williams The development of new Internet Protocol (IP)-packet based, so called Triple-Play, services (voice, video, data) delivered over

More information

Question. Reliable Transport: The Prequel. Don t parse my words too carefully. Don t be intimidated. Decisions and Their Principles.

Question. Reliable Transport: The Prequel. Don t parse my words too carefully. Don t be intimidated. Decisions and Their Principles. Question How many people have not yet participated? Reliable Transport: The Prequel EE122 Fall 2012 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica,

More information

Congestion control in TCP

Congestion control in TCP Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed

More information

Computer Networks and the internet. Daniel Graham Ph.D

Computer Networks and the internet. Daniel Graham Ph.D Computer Networks and the internet Daniel Graham Ph.D 1.1 What Is the Internet? The Internet is a computer network that interconnects hundreds of millions of computing devices throughout the world. As

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Principles of Congestion Control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng

More information

Computer Network Fundamentals Spring Week 10 Congestion Control Andreas Terzis

Computer Network Fundamentals Spring Week 10 Congestion Control Andreas Terzis Computer Network Fundamentals Spring 2008 Week 10 Congestion Control Andreas Terzis Outline Congestion Control TCP Congestion Control CS 344/Spring08 2 What We Know We know: How to process packets in a

More information

Frontier Telephone Companies TARIFF FCC NO. 3 Original Page 16-1 ACCESS SERVICE

Frontier Telephone Companies TARIFF FCC NO. 3 Original Page 16-1 ACCESS SERVICE Original Page 16-1 16. Grandfathered Services Grandfathered services are tariff offerings which are limited to existing customers and are not available to new customers. The services listed in this section

More information

Computer Communication Networks

Computer Communication Networks Contents ELL 785 Computer Communication Networks Introduction Lecture 1 Taxonomy of communication works Computer Communication Networks Building a work ed work architecture 1-1 Introduction PC server wireless

More information

(RCom) Reliable Communications for Teleoperated Rescue Robots

(RCom) Reliable Communications for Teleoperated Rescue Robots (RCom) Reliable Communications for Teleoperated Rescue Robots Ben Axelrod (baxelrod@cc.gatech.edu) John Envarli (envarli@cc.gatech.edu) Abstract We have created a reliable wireless communication framework

More information

WATCH COMMUNICATIONS Open Internet Policy (Effective as of June 11, 2018)

WATCH COMMUNICATIONS Open Internet Policy (Effective as of June 11, 2018) WATCH COMMUNICATIONS Open Internet Policy (Effective as of June 11, 2018) ( WATCH, we, our, or us ) is committed to an open Internet and supports the following Net Neutrality principles: Transparency NO

More information

SaaS Providers. ThousandEyes for. Summary

SaaS Providers. ThousandEyes for. Summary USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications

More information

A limited survey of residential broadband service models. Steven Bauer Advanced Network Architecture MIT

A limited survey of residential broadband service models. Steven Bauer Advanced Network Architecture MIT A limited survey of residential broadband service models Steven Bauer Advanced Network Architecture MIT Service models for general Internet traffic Survey focus Survey purpose Identify trends in residential

More information

QoE Congestion Management With Allot QualityProtector

QoE Congestion Management With Allot QualityProtector Solution Brief QoE Congestion Management With Allot QualityProtector 2017 Allot Communications Ltd. All rights reserved. Allot Communications, Sigma, NetEnforcer and the Allot logo are trademarks of Allot

More information

end systems, access networks, links circuit switching, packet switching, network structure

end systems, access networks, links circuit switching, packet switching, network structure Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput

More information

Congestion Control for High Bandwidth-delay Product Networks

Congestion Control for High Bandwidth-delay Product Networks Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Presented by Chi-Yao Hong Adapted from slides by Dina Katabi CS598pbg Sep. 10, 2009 Trends in the Future

More information

Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network

Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network Xiuchao Wu, Mun Choon Chan, and A. L. Ananda School of Computing, National University of Singapore Computing 1, Law Link,

More information