A New Congestion Control Scheme: Slow Start and Search (Tri-S)

Size: px
Start display at page:

Download "A New Congestion Control Scheme: Slow Start and Search (Tri-S)"

Transcription

1 A New Congestion Control Scheme: Slow Start and Search (ri-s) Zheng Wang Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6B, United Kingdom ABSRAC Recently there have been many measures proposed to tackle the problem of congestion in computer networks. In this paper, we first analyze some of the measures and then present a new scheme in which the optimal operating point is obtained by evaluation of throughput gradient and resource sharing is adjusted only at the beginning and the end of a connection. Simulation results show that the scheme converges to an optimal operating point quickly and fairly. 1. Introduction here are two basic approaches for congestion control in computer networks: end-point control and network control. In a stateless network such as Internet, where each packet is treated as an independent entity and the communication subnet does not have any information on individual traffic flows, congestion control is mainly the responsibility of the end users. he end-point control schemes must regulate the traffic demands according to the resources available in the network. his approach is used in DECBI[3], Source Quench[5], CUE[1], CARD[] and the JK scheme[4]. In a stateful network such as Flow Network[7], where intermediate systems (gateways and switches) monitor some states of each individual flow, congestion control emphasizes network control. With the information on individual flows, the network can take control actions such as reservation, round robin scheduling, priority queuing, selective dropping to ensure fair sharing of network resources among all users. Packets from illbehaved sources can be delayed or even dropped so that well-behaved users be protected. Examples are Fair Queuing[6] and Virtual Clock[7]. he network control approach can provide protection from ill-behaved sources. However, it requires the intermediate systems to monitor individual flows and perform sophisticated operations. he end-point control approach is simple to implement and has no or little overhead on intermediate systems. But it only works in a cooperative environment. An end-point control scheme can be used in conjunction with a network control scheme to achieve maximal performance. For example, when the Fair Queuing algorithm is implemented in gateways, the fair sharing of resources among different source-destination pairs is enforced by the gateways. An endpoint scheme can be used in the end systems to determine the sharing of resources among users with same source-destination identification. In this paper, we focus our attention on end-point control schemes. We first examine some of the measures proposed recently, then present a new scheme: Slow Start and Search (ri-s) and discuss some simulation results.. Analysis of End-Point Control Schemes he ideas behind our ri-s scheme was inspired by some observations on the end-point control schemes proposed recently, and the JK scheme[4] in particular. In this section we first discuss some general issues and then analyze the behavior of the JK scheme in detail. Congestion occurs when the traffic demands exceed the available resources at some point in the network for a certain period of time. If the demands persist, the excessive packet build-up at the bottleneck will eventually lead to the overflow of the buffer and retransmission of the lost packets. A congestion control scheme is to maintain the balance of demand and supply in the network. It has two basic objectives: 1) to ensure that the bottleneck operates at an optimal point, ) to ensure that the sharing of resources among users is fair. We refer them as optimality and fairness respectively. Although these two issues are closely related to each other, they are very different in nature.

2 Optimality is concerned with the overall traffic load at a bottleneck. o maintain the bottleneck operating at an optimal point requires that the end users to adjust their traffic demands according to the changing conditions in the network. It is a feedback control system by its nature. A bottleneck can gather information on its utilization such as queue length and link utilization, and feedback explicit control information to the traffic sources [3,5]. Alternatively, the end users can also determine the conditions in the network by deriving the implicit information such as timeout and delay from the acknowledgements received [1,]. Fairness is related to the sharing of resources among the individual flows. o determine fairness requires information on the composition of the flows. It is obvious that the bottleneck itself is in a better position than the end users to enforce fairness. he bottleneck can monitor the share of each flow and send explicit control information to the users [9], or it can serve the flows in a virtual ime Division Multiplexed fashion [6,7]. Based on the information feedback, an end-point control scheme can achieve optimality reasonably well by decreasing traffic demands when the bottleneck is overloaded and increasing traffic demands when the bottleneck is underloaded. However, it has been shown that only the additive increase and multiplicative decrease algorithm, under synchronous operation, converges to an fair operating point[8]. he idea is that each user gains a equal share in the increase operation and lose in proportion to the share it has in the multiplicative decrease operation. herefore the users who have larger than fair shares lose some advantage in each iteration and eventually all users oscillate in a range near the optimal point. However, many iterations of additive increase and multiplicative decrease operations may be needed in order to reach the optimal point. he time for additive operation is proportional to the round trip delay. he convergence can be very slow when the propagation delay of the links is large. here are additional difficulties in applying this algorithm into a window-based control scheme[9] and the condition of synchronous operation is hard to satisfy. In the rest of this section we examine in detail the behavior of the JK scheme. Most of the problems with the scheme have been discussed in [7]. Our attempt here is to examine the causes of the problems and discuss the directions of improvement. he JK scheme is a set of algorithms added into after the Interenet experienced a series of congestion collapses. It uses timeout as the signal of congestion and the additive increase and multiplicative decrease as the window adjustment algorithm. In addition to the congestion control measure, the JK scheme also performs a slowstart when starting a connection or restarting after a timeout. he slow-start allows the number of packets intransit to be increased gradually. On a timeout, the JK scheme resets the window size to one and then increases it exponentially to half of the window size used before the timeout. It has been observed that the JK scheme has a problem of oscillation. he window size and the queue length often exhibit clear oscillating behaviors when the traffic demands exceed the available resources. Such oscillation is inherent in the additive increase and multiplicative decrease algorithm and is used as a measure of probing resource changes[8]. o eliminate the oscillation, there has to be a better way of determining whether or not the bottleneck is operating at an optimal point. As timeout is used as the signal of congestion, the JK scheme tends to push the utilization of the bottleneck to its maximum. Apart from the slow-start period, which is very short, the JK scheme for most of the time oscillates the window size between the maximum window size (ie. the maximum size that does not cause overflow of the buffer) and half the maximum window size. his oscillation in window size leads to high queuing delay and high delay variation. It is desirable that the window should be adjusted only when there are traffic changes. In the JK scheme, the users that have smaller round trip delays tend to get larger shares of the resources. his is caused by the fact that the window size is used as the basis for traffic demand adjustment and the additive increase and multiplicative decrease algorithm will eventually force all users to have the same window size. he resources therefore are allocated in proportion with the round trip delays that the users experience. o achieve fairness, a congestion scheme has to use rate or throughput rather than window size as the basis for traffic adjustment. 3. he ri-s Scheme he ri-s scheme adopts a novel approach for congestion control in datagram networks. Instead of approaching to an optimal and fair operating point by repeating the multiplicative decrease and additive increase operation, the ri-s scheme attempts to quickly establish an optimal and fair operating point each time when there are major traffic changes. he ri-s scheme treats the network as a black box, ie. the network does not need to take any additional actions or send additional information. he traffic load is deduced from the acknowledgements by using a metric called normalized throughput gradient (NG ). We now discuss three major features of this scheme. A. Demand Adjustment

3 In contrast to most of the end-point control schemes in which traffic demands are subject to continuous adjustment based on the feedback, the ri-s scheme attempts to establish the sharing of the resources when there are significant traffic changes, eg. at the beginning and the end of a connection. Once the sharing of the resources has been settled, it will remain unchanged until the new change occurs. emporary traffic fluctuation is dealt with buffering rather than traffic adjustment at the end-points. When a new user joins in and the overall traffic demands (or window size) can no longer be accommodated with the resources and lead to overflow of the buffer, all users start a new session of demand adjustment. When a user leaves, the remaining users will detect the change in the NG metric and absorb the released resources. he ri-s scheme has three operation modes which are described as follows: 1). When a user initiates a connection, it enters the initialization mode. he window size is set to one basic adjustment unit (BAU ). Upon receiving each acknowledgement, the window size increases by one BAU until the maximum size allowed by the end user has been reached. ). When a packet is timed out and the user starts retransmission, it enters the decrease mode. he window size is set to one BAU. Upon receiving an acknowledgement, it checks the NG. he window size is increased by one BAU if the NG is over a threshold NG d. Otherwise it enters the increase mode. 3). In the increase mode, the window is increased by BAU /(current-window-size) each time when an acknowledgement is received. If the accumulated increase is larger than the packet size, the NG is checked. If the NG is less than a threshold NG i, the window size decreases by one packet size. Otherwise, do nothing. B. Operating-Point Search he operating-point searching in the ri-s scheme is based on continuous evaluation of the current throughput gradient. Consider the general characteristic of the network total throughput as a function of offered load, as illustrated in Fig.1. hroughput increases linearly with the traffic load under light traffic and levels off when the path is saturated. he traffic load at the turning point also rises when the resources at the bottleneck increases. he gradient of the throughput curve can be used as the indicator of the resource utilization on that path. We define hroughput Gradient G (W n ) = (W n ) (W n 1 ) W n W n 1 where W n and W n 1 represent the two sequential window sizes and (W n ) is the throughput at window size of W n. Although G decreases towards to zero as the traffic load increases, the actual values of the G that the users have are different as they depend on round trip delays. he actual metric used in our scheme is called normalized throughput gradient (NG), which is defined as NG (W n ) = G (W n ) G (W 1 ) hroughput Knee Cliff Offered Load Fig.1: otal Network hroughput as a Function of Offered Load As the traffic load changes, the NG varies approximately in the range [1,0]. Under light traffic, the NG is around 1 since the increase in throughput is approximately proportional to the increase in traffic load. he NG decreases gradually as the traffic load increases and reach around zero when the path is saturated. When resources are released, the NG may rise substantially since for each user it is equivalent to the resources at the bottleneck has been increased. As can be seen in Fig.1, the throughput can jump from throughput to a higher level 1 when the resources are increased.

4 W he average throughput during the round trip time of the nth packet can be expressed by: n = n, where Dn W n is the number of bytes outstanding in the network (including the packet is being transmitted) at the time of transmission of the nth packet and D n is the round trip delay measured when the acknowledgement of the nth packet is received. he window size is adjusted each time by the amount of one BAU, so we have W n W n 1 = W 1 W 0 and NG (W n ) = (W n ) (W n 1 ) (W 1 ) Let W now and D now represent the current window size and the current round trip delay respectively at the time when an acknowledgement is received and window size and delay have been updated. If all users have the same packet size and BAU equals to the packet size, W n can be derived directly from W now. he relationship between W n and W now in the increase mode is illustrated as (W now, W n ) in Fig.. he number of packets outstanding in the network changes only when the window size is increased, ie. when an acknowledgement is received. When the acknowledgement of the nth packet is received, there are n packets outstanding in the network, the window size increases from n to n+1 and the (n)th and (n+1)th packet are sent out. So we have W n = W now and n = W now (if n is an odd number ) Dnow W n = W now 1 and n = W now 1 (if n is an even number ) Dnow In the increase mode, the window opens linearly and the NG is evaluated only when the window size is increased by one. We get W n = W now 1 and n = W now 1 D now 0R 1 (1,1) Round rip ime 1R R (,1) (,) (3,) (3,3) n he (n)th packet being transmitted 3 n he ack of the (n)th packet received 6 (4,3) 7 (4,4) 3R (5,4) (5,5) (6,5) 1 (7,6) (6,6) 13 (7,7) 15 (8,7) (8,8) Fig.: he Relationship Between the (n)th packet and its acknowledgement If the users have different packet sizes or BAU does not equal to the packet size, the relationship is not so straightforward. In this case, the packet sequence number and W n can be recorded at the time when the nth packet is transmitted for later computation of NG when its acknowledgement is received. Similar measures have been proposed in []. Since BAU is the minimum size that the window can be increased or decreased, it should remain reasonable small if the packet size is very large, so that the adjustment of the window can be fine and gradual. C. Statistical Fairness Fairness is the most challenging issue for the end-point control schemes. In the absence of the information on individual flows, neither the network nor the users can figure out exactly which users should change their traffic demands and to what extend. In the ri-s scheme, a new approach called statistical fairness is adopted. he idea is to ensure that during the demand adjustment all users start increase their traffic demands at the same time from the same level and with a same algorithm until the path is saturated. he final share that each user has may not be

5 absolutely equal due to the statistical nature of traffic and network. But all users have the equal opportunity. In other words, such approach is statistically fair, ie. over many runs of operation, each user on the average has an equal share. (a) (b) (c) Fig.3: Simulation Configurations his statistical fairness approach implies the need of synchronization at the beginning of an adjustment session. In the ri-s scheme, the adjustment session starts only when a connection starts to retransmit lost packets. It has been observed in simulation that the losses of packets are synchronized by the overflow of the bottleneck buffer and the retransmissions of individual flows are highly synchronized (also see Chapter 3 of [7]). 4. Simulation Results One of the difficulties in performance study of congestion control schemes is that a scheme performs well in one setting may not do so well in another one. It is important that many different settings are tested and the worst cases are exploited. Very complicated settings may represent more accurately the real world. On the other hand, they make it more difficult to pinpoint the problems and visualize the operation of the scheme. In our simulation experiments, there are five carefully selected simple scenarios: 1). one user using one path, ). two users sharing one path, 3). two users sharing one path partially, 4). one user joining in a steady flow, 5). one user leaving a steady flow.

6 he analysis of simulation data has to be done with great care. In some cases, particularly in those cases where there are threshold behaviors in the scheme, measurement data can be highly correlated. herefore independent replications may be necessary to achieve sufficient statistical accuracy. he transit behavior is also important to understand and visualize the operation of the scheme. In our experiments, we plot the data of a particular run and also present the average results of 0 independent runs. Fig.3 shows the basic topologies used in the simulation. All packets are of the same size 51 bytes and the BAU equals to the packet size. Links between a host and a switch have a capacity of 1000 kbps with zero propagation delay. Links between two switches have a capacity of 500 kbps with 50 ms propagation delay. Each switch has a buffer of 30 packets. he maximum window size allowed by end systems is 85 packets. he thresholds NG i and NG d are 0.5. We assume that the data transmission is error-free. For each scenarios, both the ri-s scheme and the JK scheme are tested. he average results of 0 independent runs are shown in Fig.4 (the first 10 seconds of data is excluded). For each scenario, samples of the results in the first 40 seconds of one particular run are also plotted (see Fig.5 - Fig.14). In the first two scenarios, the window size is plotted instead of the throughput as they are equivalent and the window size can show more clearly the operation of the scheme. he throughput is measured every time when an acknowledgement is received. he queue length refers to the outgoing queue of the first switch. ri-s Slow-Start average variance average variance Scenario One hroughput (kbytes/s) Queue Length (pks) Scenario wo hroughput () (kbytes/s) hroughput () (kbytes/s) Queue Length (pks) Scenario hree hroughput () (kbytes/s) hroughput () (kbytes/s) Queue Length (pks) Scenario Four hroughput () (kbytes/s) hroughput () (kbytes/s) Queue Length (pks) Scenario Five hroughput () (kbytes/s) Queue Length (pks) Fig.4 Average Results A. Scenario One In the simplest configuration, ie. a link with one flow (see Fig.3(a)), the ri-s scheme demonstrates some of the most desired features of traffic control (see Fig.5). After initial negotiation period, the window size stablizes. It can be seen from the queue length graph that the bottleneck operates in its full capacity while the queuing delay remains very low. A closer look at both the window size graph and the queue length graph reveals some interesting details: from 10 seconds onwards, each time when the queue length drops from two to one, the window size increases one to bring the queue length back to two. Fig.6 shows that apart from the slow-start period the JK scheme oscillates the window size between the maximum and half the maximum. B. Scenario wo In this scenario, two users share the same link (see Fig.3(b)). his scenario is to test the behavior of the schemes in the presence of competition of resources. Although the average results of the two schemes are relatively close, the samples of data plotted in Fig.7 and Fig.8 show significant difference between two schemes. Many of the problems with the JK scheme discussed previously is illustrated here clearly. he ri-s scheme shows its stable and optimal behaviors. he window sizes of two users are extremely close and the variations are

7 small. C. Scenario hree When two users only partially share one path (see Fig.3(c)), he ri-s scheme can no longer achieve exact equal sharing of the resource between the two users. he reasons are discussed in the next section. Nevertheless, the queue length is still stable and short and the sharing of resources is relatively fair as compared with the JK scheme. he oscillating behavior of the JK scheme is aggravated in this scenario as the user with shorter delay changes the window size more rapidly. here are some black areas in the throughput graphs instead of curves. his is caused by the high density of the data. D. Scenario Four In the previous scenarios, the two users starts their connections at a same time. In this scenario, one of the two users that share one link partially (see Fig.3(c)) starts its connection first and the other user joins in 9 seconds later. It is shown that the final results are similar to those in the scenario three. E. Scenario Five In the final scenario, one of the two users that share one link partially terminates it connection. he ri-s scheme detects the change in traffic quickly and moves to another optimal operating point. the JK scheme can also absorb the released resources but the window size will be increased until a timeout and start the oscillation again. his can be been seen in Fig.14 as it will take long time for the queue to build up. 5. Discussions he ri-s scheme presented here is still very primitive and needs to be further improved. In this section, we discuss some important issues and areas for future research. he thresholds NG i and NG d are important parameters. NG d determines the operating point at which the flows will settle during the demand adjustment session. Experiments show that when NG d is smaller than 0.3 or larger than 0.8, the average queue length at the bottleneck is often above 0 or below 0.5. he value we use in the simulation (0.5) maintains the queue length between to 10. NG i affects the sensitivity of detecting the released resources. It should be large enough to allow some fluctuation of traffic flows. he precise relationship between the thresholds and operating point is yet to be studied. he round trip delay of the first packet in the slow-start (D 1 ) plays an important role in operating-point search. It eliminates the effects of different round trip delays therefore normalizes the NG. It is, in fact, approximately equal to the propagation delay as it is the round trip delay with smallest window size (1). It is highly desirable that the first packet of a connection (the segment with SYN bit set) has a higher priority, so that the effects of queuing delay can be minimized and propagation delay can be measured accurately. In our simulation, however, the effects of queuing delay are surprisingly small. It is due to the fact that D 1 is the round trip delay of the first packet measured after a timeout when the path is nearly empty. Nevertheless, it is still desirable to measure the propagation delay with a higher priority packet. In a complex traffic condition, it may not be possible to ensure that there are no traffic after the timeout period. Propagation delay is an important parameter that can be of great use in routing and traffic control yet it is not available in most of the transport protocols. he synchronization of the traffic demand adjustment is the key issue that affects fairness. he synchronization of retransmissions used in the ri-s scheme weakens when the users have different round trip delays. he unfairness when two users share partially is caused by the fact that two users have different timeout periods. he user that has shorter delay tends to retransmit first and therefore has a larger share. he degree of synchronization also deteriorates when the number of flows increases. We are looking at ways of enhancing the synchronization by using more explicit measures. ACKNOWLEDGEMEN We would like to thank Lixia Zhang, Van Jacobson, Allison Mankin and Gregory Finn for their comments and suggestions. REFERENCES [1] R. Jain, "A imeout-based Congestion Control Scheme for Window Flow-Controlled Networks," IEEE Jour. on Selected Areas of Communications, Vol. SAC-4, No. 7, pp , Oct [] R. Jain, "A Delay-Based Approach for Congestion Avoidance in Interconnected Heterogeneous Computer Networks," Comp. Commun. Rev., Vol. 19, no. 5, pp , Oct

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 30 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks We started

More information

Congestion control in TCP

Congestion control in TCP Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

15-744: Computer Networking TCP

15-744: Computer Networking TCP 15-744: Computer Networking TCP Congestion Control Congestion Control Assigned Reading [Jacobson and Karels] Congestion Avoidance and Control [TFRC] Equation-Based Congestion Control for Unicast Applications

More information

Reliable Transport II: TCP and Congestion Control

Reliable Transport II: TCP and Congestion Control Reliable Transport II: TCP and Congestion Control Stefano Vissicchio UCL Computer Science COMP0023 Recap: Last Lecture Transport Concepts Layering context Transport goals Transport mechanisms and design

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Chapter III. congestion situation in Highspeed Networks

Chapter III. congestion situation in Highspeed Networks Chapter III Proposed model for improving the congestion situation in Highspeed Networks TCP has been the most used transport protocol for the Internet for over two decades. The scale of the Internet and

More information

Analysis of Shortest-Path Routing Algorithms in a Dynamic Network Environment

Analysis of Shortest-Path Routing Algorithms in a Dynamic Network Environment Analysis of Shortest-Path Routing Algorithms in a Dynamic Network Environment Zheng Wang Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6BT zwang@ukacuclcs,

More information

Reliable Transport II: TCP and Congestion Control

Reliable Transport II: TCP and Congestion Control Reliable Transport II: TCP and Congestion Control Brad Karp UCL Computer Science CS 3035/GZ01 31 st October 2013 Outline Slow Start AIMD Congestion control Throughput, loss, and RTT equation Connection

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

CS321: Computer Networks Congestion Control in TCP

CS321: Computer Networks Congestion Control in TCP CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more

In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more detail in CS 168, and many slides are taken from there.

More information

Episode 4. Flow and Congestion Control. Baochun Li Department of Electrical and Computer Engineering University of Toronto

Episode 4. Flow and Congestion Control. Baochun Li Department of Electrical and Computer Engineering University of Toronto Episode 4. Flow and Congestion Control Baochun Li Department of Electrical and Computer Engineering University of Toronto Recall the previous episode Detailed design principles in: The link layer The network

More information

Congestion Control in TCP

Congestion Control in TCP Congestion Control in CP Antonio Carzaniga Faculty of Informatics University of Lugano Apr 7, 2008 2005 2007 Antonio Carzaniga 1 Intro to congestion control Outline Input rate vs. output throughput Congestion

More information

TCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli)

TCP. CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) TCP CSU CS557, Spring 2018 Instructor: Lorenzo De Carli (Slides by Christos Papadopoulos, remixed by Lorenzo De Carli) 1 Sources Fall and Stevens, TCP/IP Illustrated Vol. 1, 2nd edition Congestion Avoidance

More information

Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren

Lecture 21: Congestion Control CSE 123: Computer Networks Alex C. Snoeren Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren Lecture 21 Overview" How fast should a sending host transmit data? Not to fast, not to slow, just right Should not be faster than

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 14 Congestion Control Some images courtesy David Wetherall Animations by Nick McKeown and Guido Appenzeller The bad news and the good news The bad news: new

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Amin Vahdat, Dina Katabi Lecture 14 Overview" TCP congestion control review XCP Overview 2 Congestion Control

More information

TCP Congestion Control : Computer Networking. Introduction to TCP. Key Things You Should Know Already. Congestion Control RED

TCP Congestion Control : Computer Networking. Introduction to TCP. Key Things You Should Know Already. Congestion Control RED TCP Congestion Control 15-744: Computer Networking L-4 TCP Congestion Control RED Assigned Reading [FJ93] Random Early Detection Gateways for Congestion Avoidance [TFRC] Equation-Based Congestion Control

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

Congestion Control and Resource Allocation

Congestion Control and Resource Allocation Congestion Control and Resource Allocation Lecture material taken from Computer Networks A Systems Approach, Third Edition,Peterson and Davie, Morgan Kaufmann, 2007. Advanced Computer Networks Congestion

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question

More information

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines Resource allocation Drop disciplines Queuing disciplines Queuing 1 Congestion Control and Resource Allocation Handle congestion if and when it happens TCP Congestion Control Allocate resources to avoid

More information

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate

More information

Flow Control. Flow control problem. Other considerations. Where?

Flow Control. Flow control problem. Other considerations. Where? Flow control problem Flow Control An Engineering Approach to Computer Networking Consider file transfer Sender sends a stream of packets representing fragments of a file Sender should try to match rate

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE 333: Introduction to Communication Networks Fall 2001 Lecture 28: Transport Layer III Congestion control (TCP) 1 In the last lecture we introduced the topics of flow control and congestion control.

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have

More information

TCP Congestion Control

TCP Congestion Control 1 TCP Congestion Control Onwutalobi, Anthony Claret Department of Computer Science University of Helsinki, Helsinki Finland onwutalo@cs.helsinki.fi Abstract This paper is aimed to discuss congestion control

More information

William Stallings Data and Computer Communications. Chapter 10 Packet Switching

William Stallings Data and Computer Communications. Chapter 10 Packet Switching William Stallings Data and Computer Communications Chapter 10 Packet Switching Principles Circuit switching designed for voice Resources dedicated to a particular call Much of the time a data connection

More information

Multiple unconnected networks

Multiple unconnected networks TCP/IP Life in the Early 1970s Multiple unconnected networks ARPAnet Data-over-cable Packet satellite (Aloha) Packet radio ARPAnet satellite net Differences Across Packet-Switched Networks Addressing Maximum

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Congestion / Flow Control in TCP

Congestion / Flow Control in TCP Congestion and Flow Control in 1 Flow Control and Congestion Control Flow control Sender avoids overflow of receiver buffer Congestion control All senders avoid overflow of intermediate network buffers

More information

The Transport Layer Congestion control in TCP

The Transport Layer Congestion control in TCP CPSC 360 Network Programming The Transport Layer Congestion control in TCP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

Transport Protocols and TCP

Transport Protocols and TCP Transport Protocols and TCP Functions Connection establishment and termination Breaking message into packets Error recovery ARQ Flow control Multiplexing, de-multiplexing Transport service is end to end

More information

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data?

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data? Congestion Control End Hosts CSE 51 Lecture 7, Spring. David Wetherall Today s question How fast should the sender transmit data? Not tooslow Not toofast Just right Should not be faster than the receiver

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for

More information

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control : Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And

More information

Flow and Congestion Control Marcos Vieira

Flow and Congestion Control Marcos Vieira Flow and Congestion Control 2014 Marcos Vieira Flow Control Part of TCP specification (even before 1988) Goal: not send more data than the receiver can handle Sliding window protocol Receiver uses window

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets

More information

Congestion Avoidance

Congestion Avoidance Congestion Avoidance Richard T. B. Ma School of Computing National University of Singapore CS 5229: Advanced Compute Networks References K. K. Ramakrishnan, Raj Jain, A Binary Feedback Scheme for Congestion

More information

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links Network Working Group Request for Comments: 1046 W. Prue J. Postel ISI February 1988 A Queuing Algorithm to Provide Type-of-Service for IP Links Status of this Memo This memo is intended to explore how

More information

Lecture 4: Congestion Control

Lecture 4: Congestion Control Lecture 4: Congestion Control Overview Internet is a network of networks Narrow waist of IP: unreliable, best-effort datagram delivery Packet forwarding: input port to output port Routing protocols: computing

More information

Chapter II. Protocols for High Speed Networks. 2.1 Need for alternative Protocols

Chapter II. Protocols for High Speed Networks. 2.1 Need for alternative Protocols Chapter II Protocols for High Speed Networks 2.1 Need for alternative Protocols As the conventional TCP suffers from poor performance on high bandwidth delay product links [47] meant for supporting transmission

More information

8. TCP Congestion Control

8. TCP Congestion Control 8. TCP Congestion Control 1 TCP Congestion Control Slow-start increase Multiplicative decrease Congestion avoidance Measurement of variation Exponential timer backoff 2002 Yanghee Choi 2 Congestion Control

More information

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols ETSF05/ETSF10 Internet Protocols Transport Layer Protocols 2016 Jens Andersson Transport Layer Communication between applications Process-to-process delivery Client/server concept Local host Normally initialiser

More information

CSE 461. TCP and network congestion

CSE 461. TCP and network congestion CSE 461 TCP and network congestion This Lecture Focus How should senders pace themselves to avoid stressing the network? Topics Application Presentation Session Transport Network congestion collapse Data

More information

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues 168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Congestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues

Congestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues Congestion Control Outline Queuing Discipline Reacting to Congestion Avoiding Congestion Issues Two sides of the same coin pre-allocate resources to avoid congestion (e.g. telephone networks) control congestion

More information

Flow and Congestion Control

Flow and Congestion Control CE443 Computer Networks Flow and Congestion Control Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information

TCP and BBR. Geoff Huston APNIC

TCP and BBR. Geoff Huston APNIC TCP and BBR Geoff Huston APNIC Computer Networking is all about moving data The way in which data movement is controlled is a key characteristic of the network architecture The Internet protocol passed

More information

Principles of congestion control

Principles of congestion control Principles of congestion control Congestion: Informally: too many sources sending too much data too fast for network to handle Different from flow control! Manifestations: Lost packets (buffer overflow

More information

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long 6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long Please read Chapter 19 of the 6.02 book for background, especially on acknowledgments (ACKs), timers,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,

More information

Random Early Detection Gateways for Congestion Avoidance

Random Early Detection Gateways for Congestion Avoidance Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson Lawrence Berkeley Laboratory University of California floyd@eelblgov van@eelblgov To appear in the August 1993 IEEE/ACM

More information

TCP and BBR. Geoff Huston APNIC

TCP and BBR. Geoff Huston APNIC TCP and BBR Geoff Huston APNIC Computer Networking is all about moving data The way in which data movement is controlled is a key characteristic of the network architecture The Internet protocol passed

More information

Chapter 6 Congestion Control and Resource Allocation

Chapter 6 Congestion Control and Resource Allocation Chapter 6 Congestion Control and Resource Allocation Overview of Congestion Control and Resource Allocation Problem: How to effectively and fairly allocate resources among a collection of competing users?

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

A NEW CONGESTION MANAGEMENT MECHANISM FOR NEXT GENERATION ROUTERS

A NEW CONGESTION MANAGEMENT MECHANISM FOR NEXT GENERATION ROUTERS Journal of Engineering Science and Technology Vol. 3, No. 3 (2008) 265-271 School of Engineering, Taylor s University College A NEW CONGESTION MANAGEMENT MECHANISM FOR NEXT GENERATION ROUTERS MOHAMMED

More information

05 Transmission Control Protocol (TCP)

05 Transmission Control Protocol (TCP) SE 4C03 Winter 2003 05 Transmission Control Protocol (TCP) Instructor: W. M. Farmer Revised: 06 February 2003 1 Interprocess Communication Problem: How can a process on one host access a service provided

More information

Goals of Today s Lecture! Congestion Control! Course So Far.! Congestion Control Overview! It s Not Just The Sender & Receiver! Congestion is Natural!

Goals of Today s Lecture! Congestion Control! Course So Far.! Congestion Control Overview! It s Not Just The Sender & Receiver! Congestion is Natural! Goals of Today s Lecture! Congestion Control! EE 22: Intro to Communication Networks Fall 200 (MW 4-5:30 in 0 Barker) Scott Shenker TAs: Sameer Agarwal, Sara Alspaugh, Igor Ganichev, Prayag Narula http://inst.eecs.berkeley.edu/~ee22/

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks The TCP Protocol Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu

More information

Lecture (08, 09) Routing in Switched Networks

Lecture (08, 09) Routing in Switched Networks Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks Congestion control in TCP Contents Principles TCP congestion control states Congestion Fast Recovery TCP friendly applications Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr

More information

Overview. TCP & router queuing Computer Networking. TCP details. Workloads. TCP Performance. TCP Performance. Lecture 10 TCP & Routers

Overview. TCP & router queuing Computer Networking. TCP details. Workloads. TCP Performance. TCP Performance. Lecture 10 TCP & Routers Overview 15-441 Computer Networking TCP & router queuing Lecture 10 TCP & Routers TCP details Workloads Lecture 10: 09-30-2002 2 TCP Performance TCP Performance Can TCP saturate a link? Congestion control

More information

CS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers. Xiaowei Yang

CS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers. Xiaowei Yang CS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers Xiaowei Yang xwy@cs.duke.edu Overview More on TCP congestion control Theory Macroscopic behavior TCP

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Answers to Sample Questions on Transport Layer

Answers to Sample Questions on Transport Layer Answers to Sample Questions on Transport Layer 1) Which protocol Go-Back-N or Selective-Repeat - makes more efficient use of network bandwidth? Why? Answer: Selective repeat makes more efficient use of

More information

Chapter 3 Review Questions

Chapter 3 Review Questions Chapter 3 Review Questions. 2. 3. Source port number 6 and destination port number 37. 4. TCP s congestion control can throttle an application s sending rate at times of congestion. Designers of applications

More information

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. Lecture 21 Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. 7 http://money.cnn.com/2011/11/07/technology/juniper_internet_outage/

More information

Routing. Information Networks p.1/35

Routing. Information Networks p.1/35 Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks Random Early Detection (RED) gateways Sally Floyd CS 268: Computer Networks floyd@eelblgov March 20, 1995 1 The Environment Feedback-based transport protocols (eg, TCP) Problems with current Drop-Tail

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

ECE 610: Homework 4 Problems are taken from Kurose and Ross. ECE 610: Homework 4 Problems are taken from Kurose and Ross. Problem 1: Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 248. Suppose

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes

CS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes CS 421: COMPUTR NTWORKS SPRIN 2016 INL May 8, 2016 150 minutes Name: Student No: Q1 Q2 Q3 TOT 1) a) (6 pts) iven the following parameters for a datagram packet switching network: N: number of hops between

More information

CS 557 Congestion and Complexity

CS 557 Congestion and Complexity CS 557 Congestion and Complexity Observations on the Dynamics of a Congestion Control Algorithm: The Effects of Two-Way Traffic Zhang, Shenker, and Clark, 1991 Spring 2013 The Story So Far. Transport layer:

More information

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY J. H. CHOI,J.G.CHOI, AND C. YOO Department of Computer Science and Engineering Korea University Seoul, Korea E-mail: {jhchoi, hxy}@os.korea.ac.kr

More information

TCP Congestion Control

TCP Congestion Control 6.033, Spring 2014 TCP Congestion Control Dina Katabi & Sam Madden nms.csail.mit.edu/~dina Sharing the Internet How do you manage resources in a huge system like the Internet, where users with different

More information

Transport Protocols. ISO Defined Types of Network Service: rate and acceptable rate of signaled failures.

Transport Protocols. ISO Defined Types of Network Service: rate and acceptable rate of signaled failures. Transport Protocols! Type A: ISO Defined Types of Network Service: Network connection with acceptable residual error rate and acceptable rate of signaled failures. - Reliable, sequencing network service

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Outline. Internet. Router. Network Model. Internet Protocol (IP) Design Principles

Outline. Internet. Router. Network Model. Internet Protocol (IP) Design Principles Outline Internet model Design principles Internet Protocol (IP) Transmission Control Protocol (TCP) Tze Sing Eugene Ng Department of Computer Science Carnegie Mellon University Tze Sing Eugene Ng eugeneng@cs.cmu.edu

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 1 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Congestion Avoidance Overview

Congestion Avoidance Overview Congestion avoidance techniques monitor network traffic loads in an effort to anticipate and avoid congestion at common network bottlenecks. Congestion avoidance is achieved through packet dropping. Among

More information

CSCD 330 Network Programming Winter 2015

CSCD 330 Network Programming Winter 2015 CSCD 330 Network Programming Winter 2015 Lecture 11a Transport Layer Reading: Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Chapter 3 Sections

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 24: Congestion Control Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica,

More information