Overview Queueing Disciplines TCP Congestion Control Congestion Avoidance Mechanisms Quality of Service
|
|
- Emerald Burns
- 5 years ago
- Views:
Transcription
1 Cogestio Cotrol Overview Queueig Disciplies TCP Cogestio Cotrol Cogestio Avoidace Mechaisms Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1
2 Today s Topic: Vacatios Sa Fracisco Moterey Plaig a vacatio? Try a trip to sceic Moterey, Califoria! Moterey is a mere 3 hops from UIUC. What happeed? Sorry, FLIGHT OVERBOOKED. Please fly agai! Chicago UIUC Sprig 2018 CS 438 Staff - Uiversity of Illiois 2
3 Cogestio Cotrol readig: Peterso ad Davie, Ch. 6 Basics: Problem, termiology, approaches, metrics Solutios Router-based: queueig disciplies Host-based: TCP cogestio cotrol Cogestio avoidace DECbit RED gateways Quality of service Sprig 2018 CS 438 Staff - Uiversity of Illiois 3
4 Cogestio Cotrol Basics Problem Demad for etwork resources ca grow beyod the resources available Wat to provide fair amout to each user Examples Badwidth betwee Chicago ad Sa Fracisco Badwidth i a etwork lik Buffers i a queue Sprig 2018 CS 438 Staff - Uiversity of Illiois 4
5 Cogestio Collapse Defiitio Icrease i etwork load results i decrease of useful work doe May possible causes Spurious retrasmissios of packets still i flight Classical cogestio collapse Solutio: better timers ad TCP cogestio cotrol Udelivered packets Packets cosume resources ad are dropped elsewhere i etwork Solutio: cogestio cotrol for ALL traffic Sprig 2018 CS 438 Staff - Uiversity of Illiois 5
6 Dealig with Cogestio Rage of solutios Cogestio cotrol Cure cogestio whe it happes Cogestio avoidace Predict whe cogestio might occur ad avoid causig it Resource allocatio Prevet cogestio from occurrig Model of etwork Packet-switched iteretwork (or etwork) Coectioless flows (logical chaels/coectios) betwee hosts Sprig 2018 CS 438 Staff - Uiversity of Illiois 6
7 Cogestio Cotrol Goal Effective ad fair allocatio of resources amog a collectio of competig users Learig whe to say o ad to whom Resources Badwidth Buffers Problem Cotetio at routers causes packet loss Sprig 2018 CS 438 Staff - Uiversity of Illiois 7
8 Flow Cotrol vs. Cogestio Cotrol Flow cotrol Prevetig oe seder from overruig the capacity of a slow receiver Cogestio cotrol Prevetig a set of seders from overloadig the etwork! Sprig 2018 CS 438 Staff - Uiversity of Illiois 8
9 Cogestio is Natural Because Iteret traffic is bursty! If two packets arrive at the same time The ode ca oly trasmit oe ad either buffers or drops the other Sprig 2018 CS 438 Staff - Uiversity of Illiois 9
10 Cogestio is Natural Because Iteret traffic is bursty! If two packets arrive at the same time The ode ca oly trasmit oe ad either buffers or drops the other If may packets arrive i a short period of time The ode caot keep up with the arrivig traffic Causes delays, ad the buffer may evetually overflow Sprig 2018 CS 438 Staff - Uiversity of Illiois 10
11 Load ad Delay Typical behavior of queueig systems with bursty arrivals: Ideal: low delays ad high utilizatio Reality: must balace the two Maximizig power is a example Load Power = Delay Average Packet delay Power Load optimal load Load Sprig 2018 CS 438 Staff - Uiversity of Illiois 11
12 Basic Desig Choices Prevetio or Cure? Pre-allocate resources to avoid cogestio Sed data ad cotrol cogestio if ad whe it occurs Possible implemetatio poits Hosts at the edge of the etwork Trasport protocol Routers iside the etwork Queueig disciplies Uderlyig service model Best effort vs. quality of service (QoS) Sprig 2018 CS 438 Staff - Uiversity of Illiois 12
13 Flows Sequece of packets set betwee source/destiatio pair Similar to ed-to-ed abstractio of chael, but see at routers Maitai per-flow soft state at the routers Source 1 Source 2 Source 3 Router Router Router Destiatio 1 Destiatio 2 Sprig 2018 CS 438 Staff - Uiversity of Illiois 13
14 Router State Soft state: Hard state: Iformatio about flows Helps cotrol cogestio state used to support routig Not ecessary for correct routig Source 1 Router Source 2 Router Destiatio 1 Source 3 Router Destiatio 2 Sprig 2018 CS 438 Staff - Uiversity of Illiois 14
15 Cogestio Cotrol Router role Cotrols forwardig ad droppig policies Ca sed feedback to source Host role Moitors etwork coditios Adjusts accordigly Routig vs. cogestio Effective adaptive routig schemes ca sometimes help cogestio But ot always Sprig 2018 CS 438 Staff - Uiversity of Illiois 15
16 Cogestio Cotrol Taxoomy cogestio cotrol feedback-based implicit feedback, implemeted by hosts, cotrolled by widow abstractio, a.k.a. best effort reservatio-based, implemeted by routers, cotrolled by rate, a.k.a. quality of service/qos explicit feedback, implemeted by routers, but ot per flow why? Sprig 2018 CS 438 Staff - Uiversity of Illiois 16
17 Router-Cetric vs. Host- Cetric Flow Cotrol Router-cetric Host-cetric Each router takes resposibility for decidig Whe packets are forwarded Which packets are to be dropped Hosts observe etwork coditios ad adjust their behavior accordigly Iformig hosts of sedig limitatios Sprig 2018 CS 438 Staff - Uiversity of Illiois 17
18 Reservatio-Based vs. Feedback-Based Flow Cotrol Reservatio-based Ed host asks etwork for capacity at flow establishmet time Routers alog flow s route allocate appropriate resources If resources are ot available, flow is rejected Implies the use of router-cetric mechaisms Feedback-based Ed host begis sedig without askig for capacity Ed host adjusts sedig rate accordig to feedback Explicit vs. implicit feedback mechaisms May use router-cetric (explicit) or host-cetric (implicit) mechaisms Sprig 2018 CS 438 Staff - Uiversity of Illiois 18
19 Per-flow Cogestio Feedback Questio Why is explicit per-flow cogestio feedback from routers rarely used i practice? Sprig 2018 CS 438 Staff - Uiversity of Illiois 19
20 Per-flow Cogestio Feedback Problem Too may sources to track Millios of flows may fa i to oe router Ca t sed feedback to all of them Adds complexity to router Need to track more state Certaily ca t track state for all sources Wastes badwidth: etwork already cogested, ot the time to geerate more traffic Ca t force the sources (hosts) to use feedback Sprig 2018 CS 438 Staff - Uiversity of Illiois 20
21 Widow-based vs. Rate-based Flow Cotrol Remember Give a RTT ad widow size W, log term throughput rate is Rate = mi(lik speed, W/RTT) Sice rate ca be cotrolled by the widow size, is there really ay differece betwee cotrollig the widow size ad cotrollig the rate? Rate W Sprig 2018 CS 438 Staff - Uiversity of Illiois 21
22 Rate Cotrol Questio Why cosider rate cotrol? Problems Buffer space (widow size) is a itrisic physical quatity Ca provide rate cotrol with widow cotrol Oly eed estimate of RTT 0 1 RTT 2 RTT Aswer Wat rate cotrol whe graularity of averagig must be smaller tha RTT widow-cotrolled trasmissios time rate-cotrolled trasmissios Sprig 2018 CS 438 Staff - Uiversity of Illiois 22
23 Criticisms of Resource Allocatio Example Divide 10 Gbps badwidth out of UIUC Case 1: reserve whatever you wat Users lie of thought Result O average, I do t eed much badwidth, but whe my persoal Web crawler goes to work, I eed at least 100 Mbps, so I ll reserve that much. 100 users cosume all badwidth, all others get 0 Sprig 2018 CS 438 Staff - Uiversity of Illiois 23
24 Criticisms of Resource Allocatio Example Divide 10 Gbps badwidth out of UIUC Case 2: fair/equitable reservatios 35,000 studets + 5,000 faculty ad staff Each user gets 250 kbps, almost 5x a modem! Sprig 2018 CS 438 Staff - Uiversity of Illiois 24
25 Resource Allocatio Back to the air travel aalogy Daily Chicago to Sa Fracisco flight, 198 seats Case 1: reserve whatever you wat 198 of us get seats. I m Gold...are you? Case 2: fair/equitable reservatios 2,000,000 possible customers seats per customer per flight Disclaimer: the passeger assumes all risks ad damages related to usuccessful reassembly i Chicago Sprig 2018 CS 438 Staff - Uiversity of Illiois 25
26 Widow Size For o-radom etwork with bottleeck capacity C: Source C Destiatio Rate = Throughput Delay C W RTT/2 W Power = throughput/delay RTT*C W Sprig 2018 CS 438 Staff - Uiversity of Illiois 27
27 Fairess Goals Allocate resources fairly Isolate ill-behaved users Still achieve statistical multiplexig Oe flow ca fill etire pipe if o coteders Work coservig à scheduler ever idles lik if it has a packet At what graularity? Flows, coectios, domais? Sprig 2018 CS 438 Staff - Uiversity of Illiois 28
28 What s Fair? Flow A Flow B Flow C Flow D Which is more fair: Globally Fair: Fa = Capacity/4, Fb = Fc = Fd = 3Capacity/4 or Locally Fair: Fa = Fb = Fc = Fd = Capacity/2 This is the socalled max-mi fair rate allocatio. The miimum rate is maximized. Sprig 2018 CS 438 Staff - Uiversity of Illiois 29
29 Max-Mi Fairess Flow A Flow B Flow C Flow D 1. No user receives more tha requested badwidth 2. No other scheme with 1 has higher mi badwidth 3. 2 remais true recursively o removig miimal user µ I = MIN(µ fair, r i ) Sprig 2018 CS 438 Staff - Uiversity of Illiois 30
30 Max-Mi Fairess: Example Capacity(C) = 10 3 Flows: r1 = 8, r2 = 6, r3 = 2 C/3 = 3.33 Ca service all of r3 Remove r3 from the accoutig: C = C r3 = 8; N = 2 C/2 = 4 Ca t service all of r1 or r2 So hold them to the remaiig fair share: f = Sprig 2018 CS 438 Staff - Uiversity of Illiois 31
31 Queueig Disciplies Goal Decide how packets are buffered while waitig to be trasmitted Provide protectio from ill-behaved flows Each router MUST implemet some queuig disciplie regardless of what the resource allocatio mechaism is Impact Directly impacts buffer space usage Idirectly impacts flow cotrol Sprig 2018 CS 438 Staff - Uiversity of Illiois 32
32 Queueig Disciplies Allocate badwidth Which packets get trasmitted Allocate buffer space Which packets get discarded Affect packet latecy Whe packets get trasmitted Sprig 2018 CS 438 Staff - Uiversity of Illiois 33
33 Schedulig Policies FIFO (First I First Out) a.k.a. FCFS (First Come First Serve) Service I order of arrival to the queue Maagemet Packets that arrive to a full buffer are discarded Aother optio: discard policy determies which packet to discard (ew arrival or somethig already queued) Sprig 2018 CS 438 Staff - Uiversity of Illiois 34
34 Schedulig Policies FIFO (First I First Out) Problem 1: sed more packets, get more service Selfish seders tryig to grab as much as they ca Malicious seders tryig to dey service to others Problem 2: ot all packets should be equal Sprig 2018 CS 438 Staff - Uiversity of Illiois 35
35 Schedulig Policies FIFO Does ot discrimiate betwee traffic sources Cogestio cotrol left to the sources Tail drop droppig policy Fairess for latecy Miimizes per-packet delay Badwidth ot cosidered (ot good for cogestio) Sprig 2018 CS 438 Staff - Uiversity of Illiois 36
36 Schedulig Policies Priority Queuig Classes have differet priorities May deped o explicit markig or other header ifo e.g., IP source or destiatio, TCP Port umbers, etc. Service Trasmit packet from highest priority class with a o-empty queue Sprig 2018 CS 438 Staff - Uiversity of Illiois 37
37 Schedulig Policies Priority Queuig Isolatio for the high-priority traffic Almost like it has a dedicated lik Except for the (small) delay for packet trasmissio High-priority packet arrives durig trasmissio of low-priority Router completes sedig the low-priority traffic first Sprig 2018 CS 438 Staff - Uiversity of Illiois 38
38 Schedulig Policies Priority Queueig Versios Preemptive Postpoe low-priority processig if high-priority packet arrives No-preemptive Limitatio Ay packet that starts gettig processed fiishes before movig o May starve lower priority flows Sprig 2018 CS 438 Staff - Uiversity of Illiois 39
39 Schedulig Policies Roud Robi Each flow gets its ow queue Circulate through queues, process oe packet (if queue o-empty), the move to ext queue Sprig 2018 CS 438 Staff - Uiversity of Illiois 40
40 Schedulig Policies Fair Queueig (FQ) Explicitly segregates traffic based o flows Esures o flow captures more tha its share of the capacity Fairess for badwidth Delay ot cosidered Flow 1 Flow 2 Flow 3 Flow 4 Roud- Robi service Each flow is guarateed ¼ of capacity Sprig 2018 CS 438 Staff - Uiversity of Illiois 41
41 Fair Queueig with Variable Packet Legth How should we implemet FQ if packets are ot all the same legth? Bit-by-bit roud-robi Not feasible to implemet, must use packet schedulig Solutio: approximate 4 8? Sprig 2018 CS 438 Staff - Uiversity of Illiois 42
42 Fair Queueig with Variable Packet Legth Idea Let S i = amout of service flow i has received so far Always serve a flow with miimum value of S i Ca also use miimum (S i + ext packet legth) Upo servig a packet of legth P from flow i, update: S i = S i + P Never leave the lik idle if there is a packet to sed Work coservig A source will gets its fair share of the badwidth Uused badwidth will be evely divided betwee other sources Sprig 2018 CS 438 Staff - Uiversity of Illiois 43
43 Fair Queueig with Variable Packet Legth Problem A flow resumes sedig packets after beig quiet for a log time Effect Such a flow could be cosidered to have saved up credit Ca lock out all other flows util credits are level agai Solutio Eforce use it or lose it policy Compute S mi = mi(s i such that queue i is ot empty) If queue j is empty, set S j = S mi Sprig 2018 CS 438 Staff - Uiversity of Illiois 44
44 Fair Queueig with Variable Packet Legth Problem A flow resumes sedig packets after beig quite for a log time Effect Note: The text book computes Such a flow could be cosidered F = MAX(F i-1 to, have A i ) = P saved i up credit Ad the for multiple flows Ca lock out all other flows Calculate util credits F i for are each level packet agai Solutio that arrives o each flow Eforce use it or lose it policy Treat all F i as timestamps Next packet to trasmit is oe Compute S mi = mi(s i such that queue i is ot empty) If queue j is empty, set S with j = S lowest timestamp mi Sprig 2018 CS 438 Staff - Uiversity of Illiois 45
45 Extesio: Weighted Fair Queueig Exted fair queueig Notio of importace for each flow Suppose flow i has weight w i Example: w i could be the fractio of total service that flow i is targeted for Need oly chage basic update to S i = S i + P/w i Sprig 2018 CS 438 Staff - Uiversity of Illiois 46
46 Fair Queuig Tradeoffs FQ ca cotrol cogestio by moitorig flows No-adaptive flows ca still be a problem why? Complex state Must keep queue per flow Hard i routers with may flows (e.g., backboe routers) Flow aggregatio is a possibility (e.g. do fairess per domai) Complex computatio Classificatio ito flows may be hard Must keep queues sorted by fiish times Chages wheever the flow cout chages Sprig 2018 CS 438 Staff - Uiversity of Illiois 47
47 Fair Queueig Questio What makes up a flow for fair queueig i the Iteret? Cosideratios Too may resources to have separate queues/variables for host-to-host flows Scale dow umber of flows Typically just based o iputs e.g., share outgoig STS-12 betwee icomig ISP s Sprig 2018 CS 438 Staff - Uiversity of Illiois 48
48 TCP Cogestio Cotrol Sprig 2018 CS 438 Staff - Uiversity of Illiois 49
49 Host Solutios Host has very little iformatio Assumes best-effort etwork Acts idepedetly of other hosts Host actios Reduce trasmissio rate below cogestio threshold Cotiuously moitor etwork for sigs of cogestio Sprig 2018 CS 438 Staff - Uiversity of Illiois 50
50 Detectig Cogestio How ca a TCP seder determie that the etwork is uder stress? Network could tell it (ICMP Source Quech) Risky, because durig times of overload the sigal itself could be dropped (ad add to cogestio)! Packet delays go up (kee of load-delay curve) Tricky: oisy sigal (delay ofte varies cosiderably) Packet loss Fail-safe sigal that TCP already has to detect Complicatio: o-cogestive loss (checksum errors) Sprig 2018 CS 438 Staff - Uiversity of Illiois 51
51 TCP Cogestio Cotrol Idea Assumes best-effort etwork FIFO or FQ Each source determies etwork capacity for itself Implicit feedback ACKs pace trasmissio (self-clockig) Challege Determiig iitial available capacity Adjustig to chages i capacity i a timely maer Sprig 2018 CS 438 Staff - Uiversity of Illiois 52
52 TCP Cogestio Cotrol Basic idea Add otio of cogestio widow Effective widow is smaller of Advertised widow (flow cotrol) Cogestio widow (cogestio cotrol) Chages i cogestio widow size Slow icreases to absorb ew badwidth Quick decreases to elimiate cogestio Sprig 2018 CS 438 Staff - Uiversity of Illiois 53
53 TCP Cogestio Cotrol Specific strategy Self-clockig Sed data oly whe outstadig data ACK d Equivalet to sed widow limitatio metioed seder receiver Sprig 2018 CS 438 Staff - Uiversity of Illiois 54
54 TCP Cogestio Cotrol Specific strategy Self-clockig Growth Sed data oly whe outstadig data ACK d Equivalet to sed widow limitatio metioed Add oe maximum segmet size (MSS) per cogestio widow of data ACK d It s really doe this way, at least i Liux: see tcp_cog_avoid i tcp_iput.c. Actually, every ack for ew data is treated as a MSS ACK d Kow as additive icrease Sprig 2018 CS 438 Staff - Uiversity of Illiois 55
55 TCP Cogestio Cotrol Specific strategy (cotiued) Decrease Cut widow i half whe timeout occurs I practice, set widow = widow /2 Kow as multiplicative decrease Additive icrease, multiplicative decrease (AIMD) Sprig 2018 CS 438 Staff - Uiversity of Illiois 56
56 Additive Icrease/ Multiplicative Decrease Objective Adjust to chages i available capacity Basic idea Cosequeces of over-sized widow much worse tha havig a uder-sized widow Over-sized widow: packets dropped ad retrasmitted Uder-sized widow: somewhat lower throughput Sprig 2018 CS 438 Staff - Uiversity of Illiois 57
57 Additive Icrease/ Multiplicative Decrease Tools React to observace of cogestio Probe chael to detect more resources Observatio O otice of cogestio Decreasig too slowly will ot be reactive eough O probe of etwork Icreasig too quickly will overshoot limits Sprig 2018 CS 438 Staff - Uiversity of Illiois 58
58 Additive Icrease/ Multiplicative Decrease New TCP state variable CogestioWidow Similar to AdvertisedWidow for flow cotrol Limits how much data source ca have i trasit MaxWi = MIN(CogestioWidow, AdvertisedWidow) EffWi = MaxWi - (LastByteSet - LastByteAcked) TCP ca sed o faster the the slowest compoet, etwork or destiatio Idea Icrease CogestioWidow whe cogestio goes dow Decrease CogestioWidow whe cogestio goes up Sprig 2018 CS 438 Staff - Uiversity of Illiois 59
59 Additive Icrease/ Multiplicative Decrease Questio How does the source determie whether or ot the etwork is cogested? Aswer Timeout sigals packet loss Packet loss is rarely due to trasmissio error (o wired lies) Lost packet implies cogestio! Sprig 2018 CS 438 Staff - Uiversity of Illiois 60
60 Additive Icrease/ Multiplicative Decrease Algorithm Icremet CogestioWidow by oe packet per RTT Liear icrease Divide CogestioWidow by two wheever a timeout occurs I practice Multiplicative decrease icremet a little for each ACK Ic = MSS * MSS/CogestioWidow CogestioWidow += Ic Source Destiatio Sprig 2018 CS 438 Staff - Uiversity of Illiois 61
61 AIMD Sawtooth Trace KB Packet loss is see as sig of cogestio ad results i a multiplicative rate decrease Factor of 2 TCP periodically probes for available badwidth by icreasig its rate Loss halved Time (secods) 10.0 Sprig 2018 CS 438 Staff - Uiversity of Illiois 62
62 Additive Icrease/Decrease Both icrease/ decrease by the same amout User 2 s Allocatio T 0 T 1 Overload Additive icrease improves fairess Uderutilizatio Additive decrease reduces fairess User 1 s Allocatio Sprig 2018 CS 438 Staff - Uiversity of Illiois 64
63 Muliplicative Icrease/Decrease Both icrease/ decrease by the same amout User 2 s Allocatio T 0 T 1 Uderutilizatio Overload Additive icrease improves fairess Additive decrease reduces fairess User 1 s Allocatio Sprig 2018 CS 438 Staff - Uiversity of Illiois 65
64 Why is AIMD Fair? Additive icrease gives slope of 1, as throughout icreases Multiplicative decrease decreases throughput proportioally User 2 s Allocatio R equal badwidth share User 1 s Allocatio loss: decrease widow by factor of 2 cogestio avoidace: additive icrease loss: decrease widow by factor of 2 cogestio avoidace: additive icrease R Sprig 2018 CS 438 Staff - Uiversity of Illiois 66
65 AIMD Sharig Dyamics A D x 1 x 2 No cogestio à rate icreases by oe packet/rtt every RTT Cogestio à decrease rate by factor 2 B E Sprig 2018 CS 438 Staff - Uiversity of Illiois 67
66 AIMD Sharig Dyamics A D x 1 x 2 B E Rates equalize à fair share Sprig 2018 CS 438 Staff - Uiversity of Illiois 68
67 TCP Start Up Behavior KB How should TCP start sedig data? AIMD is good for chaels operatig at capacity AIMD ca take a log time to ramp up to full capacity from scratch It could take a log time to get started! Time (secods) 10.0 Sprig 2018 CS 438 Staff - Uiversity of Illiois 69
68 TCP Start Up Behavior How should TCP start sedig data? AIMD is good for chaels operatig at capacity AIMD ca take a log time to ramp up to full capacity from scratch Use Slow Start to icrease widow rapidly from a cold start Sprig 2018 CS 438 Staff - Uiversity of Illiois 70
69 TCP Start Up Behavior: Slow Start Iitializatio of the cogestio widow Cogestio widow should start small Avoid cogestio due to ew coectios Start at 1 MSS, Iitially, CWND is 1 MSS Iitial sedig rate is MSS/RTT Reset to 1 MSS with each timeout timeouts are coarse-graied, ~1/2 sec Sprig 2018 CS 438 Staff - Uiversity of Illiois 71
70 TCP Start Up Behavior: Slow Start Growth of the cogestio widow Liear growth could be pretty wasteful Might be much less tha the actual badwidth Liear icrease takes a log time to accelerate Start slow but the grow fast Seder starts at a slow rate Icrease the rate expoetially Util the first loss evet Sprig 2018 CS 438 Staff - Uiversity of Illiois 72
71 Slow Start Objective Determie iitial available capacity Idea Begi with CogestioWidow = 1 packet Double CogestioWidow each RTT Icremet by 1 packet for each ACK Cotiue icreasig util loss Source Destiatio Sprig 2018 CS 438 Staff - Uiversity of Illiois 73
72 Slow Start Example 0R 1R 2R 3R 1 oe pkt time Sprig 2018 CS 438 Staff - Uiversity of Illiois 74
73 Aother Slow Start Example CWD size: Src D A D D A A D D D D A A A A Dest Sprig 2018 CS 438 Staff - Uiversity of Illiois 75
74 Slow Start Used Whe first startig coectio Whe coectio times out Why is it called slow-start? Because TCP origially had o cogestio cotrol mechaism The source would just start by sedig a whole widow s worth of data Sprig 2018 CS 438 Staff - Uiversity of Illiois 76
75 TCP Cogestio Cotrol Maitai threshold widow size Threshold value Iitially set to maximum widow size Set to 1/2 of curret widow o timeout Use multiplicative icrease I practice Whe cogestio widow smaller tha threshold Double widow for each widow ACK d Icrease cogestio widow by oe MSS for each ACK of ew data (or N bytes for N bytes) Sprig 2018 CS 438 Staff - Uiversity of Illiois 77
76 Slow Start How log should the expoetial icrease from slow start cotiue? Use CogestioThreshold as target widow size Estimates etwork capacity Whe CogestioWidow reaches CogestioThreshold switch to additive icrease Liear probig Expoetial slow start Sprig 2018 CS 438 Staff - Uiversity of Illiois 78
77 Slow Start Iitial values CogestioThreshold = 8 CogestioWidow = 1 Loss after trasmissio 7 CogestioWidow curretly 12 Set Cogestiothreshold = CogestioWidow/2 Set CogestioWidow = 1 Sprig 2018 CS 438 Staff - Uiversity of Illiois 79
78 Slow Start Example trace of CogestioWidow KB Problem Have to wait for timeout CW flattes out due to loss Liear icrease Slow start util CW = CT Timeout: CT = CT/2 = 11 CW = 1 Ca lose half CogestioWidow of data Sprig 2018 CS 438 Staff - Uiversity of Illiois 80
79 Fast Retrasmit ad Fast Recovery Problem Coarse-grai TCP timeouts lead to idle periods Solutio Fast retrasmit: use duplicate ACKs to trigger retrasmissio Packet 1 Packet 2 Packet 3 Packet 4 Packet 5 Packet 6 Retrasmit packet 3 Seder Receiver Sprig 2018 CS 438 Staff - Uiversity of Illiois 81 ACK 1 ACK 2 ACK 2 ACK 2 ACK 2 ACK 6
80 Fast Retrasmit ad Fast Recovery Sed ACK for each segmet received Whe duplicate ACK s received Resed lost segmet immediately Do ot wait for timeout I practice, retrasmit o 3rd duplicate Fast recovery Whe fast retrasmissio occurs, skip slow start Cogestio widow becomes 1/2 previous Start additive icrease immediately Sprig 2018 CS 438 Staff - Uiversity of Illiois 82
81 Fast Retrasmit ad Fast Recovery KB Results Fast Recovery Bypass slow start phase Icrease immediately to oe half last successful CogestioWidow (ssthresh) Sprig 2018 CS 438 Staff - Uiversity of Illiois 83
82 TCP Cogestio Widow Trace Cogestio Widow timeouts fast retrasmissio slow start period additive icrease Time threshold cogestio widow Sprig 2018 CS 438 Staff - Uiversity of Illiois 84
Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2]
Traditioal queuig behaviour i routers Schedulig ad queue maagemet Data trasfer: datagrams: idividual packets o recogitio of flows coectioless: o sigallig Forwardig: based o per-datagram, forwardig table
More informationQuality of Service. Spring 2018 CS 438 Staff - University of Illinois 1
Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2
More informationAnnouncements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components
Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,
More informationSwitching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1
Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationReliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1
Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable
More informationIntroduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.
Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple
More informationTCP Internals. Spring 2018 CS 438 Staff, University of Illinois 1
TCP Iterals Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 TCP Usage Model Coectio setup 3-way hadshake Data trasport Seder writes data TCP Breaks data ito segmets Seds each segmet over IP Retrasmits,
More informationMedia Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1
Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access
More informationBasic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.
5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator
More informationCS644 Advanced Networks
Limitatios of IP CS644 Advaced Networks Lecture 7 QoS Adreas Terzis IP provides oly best effort service IP does ot participate i resource maagemet Caot provide service guaratees o a per flow basis Caot
More informationCongestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources
Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets
More informationCMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems
More informationSwitch Construction CS
Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus
More informationCongestion Control 3/16/09
Congestion Control Outline Resource Allocation Queuing TCP Congestion Control Spring 009 CSE3064 Issues Two sides of the same coin pre-allocate resources so at to avoid congestion control congestion if
More informationCOMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad
More informationBGP Attributes and Path Selection. ISP Training Workshops
BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics
More informationGoals of Today s Lecture! Congestion Control! Course So Far.! Congestion Control Overview! It s Not Just The Sender & Receiver! Congestion is Natural!
Goals of Today s Lecture! Congestion Control! EE 22: Intro to Communication Networks Fall 200 (MW 4-5:30 in 0 Barker) Scott Shenker TAs: Sameer Agarwal, Sara Alspaugh, Igor Ganichev, Prayag Narula http://inst.eecs.berkeley.edu/~ee22/
More informationTraffic Models and QoS
Traffic Models ad QoS TELE4642: Week9 Ackowledgemet: Some slides are adapted from Computer Networkig: A Top Dow Approach Featurig the Iteret, 2 d editio, J.F Kurose ad K.W. Ross All Rights Reserved, copyright
More informationIS-IS in Detail. ISP Workshops
IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November
More informationn Based on unrealistic growth forecast n Overcapacity: Fiber 5x100 in three years n Wireless: Expensive spectrum licenses n Fibers
EECS228a Research Topics Jea Walrad www.eecs.berkeley.edu/~wlr of Networks Walrad 52 of Networks Pricig of Services Competitio of Users Competitio of Providers Suggested Readigs: http://www.bgsu.edu/departmets/tcom/aota.htm
More informationOutline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste
Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,
More informationCongestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues
Congestion Control Outline Queuing Discipline Reacting to Congestion Avoiding Congestion Issues Two sides of the same coin pre-allocate resources to avoid congestion (e.g. telephone networks) control congestion
More informationCS CS COMPUTER NETWORKS CS CS CHAPTER 6. CHAPTER 6 Congestion Control
COMPUTER NETWORKS CS 45201 CS 55201 CHAPTER 6 Congestion Control COMPUTER NETWORKS CS 45201 CS 55201 CHAPTER 6 Congestion Control P. Farrell and H. Peyravi Department of Computer Science Kent State University
More informationADVANCED COMPUTER NETWORKS
ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,
More informationUsing VTR Emulation on Avid Systems
Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit
More informationA New per-class Flow Fixed Proportional Differentiated Service for Multi-service Wireless LAN*
A New per-class Flow Fixed Proportioal Differetiated Service for Multi-service Wireless LAN* Meg Chag Che, Li-Pig Tug 2, Yeali S. Su 3, ad Wei-Kua Shih 2 Istitute of Iformatio Sciece, Academia Siica, Taipei,
More informationCS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control
: Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And
More information15-744: Computer Networking TCP
15-744: Computer Networking TCP Congestion Control Congestion Control Assigned Reading [Jacobson and Karels] Congestion Avoidance and Control [TFRC] Equation-Based Congestion Control for Unicast Applications
More informationCS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1
CS200: Hash Tables Prichard Ch. 13.2 CS200 - Hash Tables 1 Table Implemetatios: average cases Search Add Remove Sorted array-based Usorted array-based Balaced Search Trees O(log ) O() O() O() O(1) O()
More informationLecture 10 Collision resolution. Collision resolution
Lecture 10 Collisio resolutio Collisio resolutio May applicatios ivolve a iquiry over a shared chael, which ca be ivoked for: discovery of eighborig devices i ad hoc etworks, coutig the umber of RFID tags
More informationCOMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Single-Cycle Disadvantages & Advantages
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 4 The Processor Pipeliig Sigle-Cycle Disadvatages & Advatages Clk Uses the clock cycle iefficietly the clock cycle must
More informationBandwidth Allocation & TCP
Bandwidth Allocation & TCP The Transport Layer Focus Application Presentation How do we share bandwidth? Session Topics Transport Network Congestion control & fairness Data Link TCP Additive Increase/Multiplicative
More informationCongestion Control. Resource allocation and congestion control problem
Congestion Control 188lecture8.ppt Pirkko Kuusela 1 Resource allocation and congestion control problem Problem 1: Resource allocation How to effectively and fairly allocate resources among competing users?
More informationTCP Congestion Control : Computer Networking. Introduction to TCP. Key Things You Should Know Already. Congestion Control RED
TCP Congestion Control 15-744: Computer Networking L-4 TCP Congestion Control RED Assigned Reading [FJ93] Random Early Detection Gateways for Congestion Avoidance [TFRC] Equation-Based Congestion Control
More informationGreedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling
Greedy Algorithms Greedy Algorithms Witer Paul Beame Hard to defie exactly but ca give geeral properties Solutio is built i small steps Decisios o how to build the solutio are made to maximize some criterio
More informationCS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python
CS 111: Program Desig I Lecture 19: Networks, the Web, ad gettig text from the Web i Pytho Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 3, 2018 Goals Lear about Iteret Lear about
More informationMessage Integrity and Hash Functions. TELE3119: Week4
Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig
More informationPrevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting
Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,
More informationCongestion Control in TCP
Congestion Control in TCP Outline Overview of RENO TCP Reacting to Congestion SS/AIMD example CS 640 1 TCP Congestion Control The idea of TCP congestion control is for each source to determine how much
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationTRANSACTION MANAGEMENT [CH 16]
Sprig 2017 TRANSACTION MANAGEMENT [CH 16] 4/25/17 CS 564: Database Maagemet Systems; (c) Jigesh M. Patel, 2013 1 Trasactio Maagemet Read (A); Check (A > $25); Pay ($25); A = A 25; Write (A); Yes You Read
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5
Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:
More informationCopyright 2010, Elsevier Inc. All rights Reserved
Computer Networks: A Systems Approach, 5e Larry L. Peterso ad Bruce S. Davie (Subset of topics) Gettig Coected Framig Error Detectio. Reliable Trasmissio Sharig: Etheret ad Multiple Access Networks, Wireless
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.
Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple
More informationComputer Networking. Queue Management and Quality of Service (QOS)
Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you
More informationIntroduction to OSPF. ISP Training Workshops
Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged
More informationIntroduction to Network Technologies & Layered Architecture BUPT/QMUL
Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 14 Congestion Control Some images courtesy David Wetherall Animations by Nick McKeown and Guido Appenzeller The bad news and the good news The bad news: new
More informationLecture 14: Congestion Control"
Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms
More informationCOSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1
COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,
More informationInformation Network 1 Transport layer: TCP. Youki Kadobayashi Doudou Fall NAIST
Iformatio Network 1 Trasport layer: TCP Youki Kadobayashi Doudou Fall NAIST Trasport layer: a birds-eye view Hosts maitai state for each trasport-layer edpoit Routers do t maitai per-host state H R R R
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 21 Cocurrecy Cotrol Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Cocurrecy cotrol protocols Set of rules to guaratee
More informationThe Magma Database file formats
The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,
More informationFirewall and IDS. TELE3119: Week8
Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad
More informationCourse Information. Details. Topics. Network Examples. Overview. Walrand Lecture 1. EECS 228a. EECS 228a Lecture 1 Overview: Networks
Walrad Lecture 1 Course Iformatio Lecture 1 Overview: Networks Jea Walrad www.eecs.berkeley.edu/~wlr Istructor: Jea Walrad Office Hours: M-Tu 1:00-2:00 Time/Place: MW 2:00-3:30 i 285 Cory Home Page: http://wwwist.eecs.berkeley.edu/~ee228a
More informationHistory Based Probabilistic Backoff Algorithm
America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese
More informationFlow and Congestion Control
CE443 Computer Networks Flow and Congestion Control Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought
More information1. SWITCHING FUNDAMENTALS
. SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig
More informationCS551 Router Queue Management
CS551 Router Queue Management Bill Cheng http://merlot.usc.edu/cs551-f12 1 Congestion Control vs. Resource Allocation Network s key role is to allocate its transmission resources to users or applications
More informationMulti-Threading. Hyper-, Multi-, and Simultaneous Thread Execution
Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19
CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More informationLecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren
Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren Lecture 21 Overview" How fast should a sending host transmit data? Not to fast, not to slow, just right Should not be faster than
More informationRecursive Procedures. How can you model the relationship between consecutive terms of a sequence?
6. Recursive Procedures I Sectio 6.1, you used fuctio otatio to write a explicit formula to determie the value of ay term i a Sometimes it is easier to calculate oe term i a sequece usig the previous terms.
More informationLecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.
Lecture 21 Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. 7 http://money.cnn.com/2011/11/07/technology/juniper_internet_outage/
More informationOur Learning Problem, Again
Noparametric Desity Estimatio Matthew Stoe CS 520, Sprig 2000 Lecture 6 Our Learig Problem, Agai Use traiig data to estimate ukow probabilities ad probability desity fuctios So far, we have depeded o describig
More informationElementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationThreads and Concurrency in Java: Part 1
Cocurrecy Threads ad Cocurrecy i Java: Part 1 What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.
More informationInvestigation Monitoring Inventory
Ivestigatio Moitorig Ivetory Name Period Date Art Smith has bee providig the prits of a egravig to FieArt Gallery. He plas to make just 2000 more prits. FieArt has already received 70 of Art s prits. The
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More informationThroughput-Delay Scaling in Wireless Networks with Constant-Size Packets
Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,
More informationThreads and Concurrency in Java: Part 1
Threads ad Cocurrecy i Java: Part 1 1 Cocurrecy What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.
More information15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015
15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:
More informationTCP Congestion Control
TCP Congestion Control Lecture material taken from Computer Networks A Systems Approach, Third Ed.,Peterson and Davie, Morgan Kaufmann, 2003. Computer Networks: TCP Congestion Control 1 TCP Congestion
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead
More informationCMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access
More information27 Refraction, Dispersion, Internal Reflection
Chapter 7 Refractio, Dispersio, Iteral Reflectio 7 Refractio, Dispersio, Iteral Reflectio Whe we talked about thi film iterferece, we said that whe light ecouters a smooth iterface betwee two trasparet
More informationChapter III: Transport Layer
Chapter III: Transport Layer UG3 Computer Communications & Networks (COMN) Mahesh Marina mahesh@ed.ac.uk Slides thanks to Myungjin Lee and copyright of Kurose and Ross Principles of congestion control
More informationThe isoperimetric problem on the hypercube
The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose
More informationComputer Networking Introduction
Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.11 Chapter 3 outline 3.1 transport-layer services 3.2 multiplexing and
More informationTCP Congestion Control. Housekeeping. Additive Increase/Multiplicative Decrease. AIMD (cont) Pick up folders for exam study Exam next Friday, Nov.
Fall 01 CptS/EE 555 3 Fall 01 CptS/EE 555 4 TCP Congestion Control Idea assumes best-effort network (FIFO or FQ routers)each source determines network capacity for itself uses implicit feedback ACKs pace
More informationTerm Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.
CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig
More informationAnalyzing the Impact of Queue Management Policies on the Self-Similarity of Aggregate Network Traffic
Aalyzig the Impact of Queue Maagemet Policies o the Self-Similarity of Aggregate Network Traffic MELİKE EROL 1, SEMA OKTUĞ 1, TAYFUN AKGÜL 2 Dept. of Computer Egieerig 1, Dept. of Electroics ad Commuicatios
More informationPrinciples of congestion control
Principles of congestion control Congestion: Informally: too many sources sending too much data too fast for network to handle Different from flow control! Manifestations: Lost packets (buffer overflow
More informationCS 683: Advanced Design and Analysis of Algorithms
CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,
More informationTransitioning to BGP
Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April
More informationCS 111: Program Design I Lecture 21: Network Analysis. Robert H. Sloan & Richard Warner University of Illinois at Chicago April 10, 2018
CS 111: Program Desig I Lecture 21: Network Aalysis Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 10, 2018 NETWORK ANALYSIS Which displays a graph i the sese of graph/etwork aalysis?
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationChapter 3 Transport Layer
Chapter 3 Transport Layer 1 Chapter 3 outline 3.1 Transport-layer services 3.2 Multiplexing and demultiplexing 3.3 Connectionless transport: UDP 3.4 Principles of reliable data transfer 3.5 Connection-oriented
More informationThe Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana
The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:
More informationSolution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions:
CS 604 Data Structures Midterm Sprig, 00 VIRG INIA POLYTECHNIC INSTITUTE AND STATE U T PROSI M UNI VERSI TY Istructios: Prit your ame i the space provided below. This examiatio is closed book ad closed
More informationGuaranteeing Hard Real Time End-to-End Communications Deadlines
Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk
More informationThreads and Concurrency in Java: Part 2
Threads ad Cocurrecy i Java: Part 2 1 Waitig Sychroized methods itroduce oe kid of coordiatio betwee threads. Sometimes we eed a thread to wait util a specific coditio has arise. 2003--09 T. S. Norvell
More informationOptimization of Priority based CPU Scheduling Algorithms to Minimize Starvation of Processes using an Efficiency Factor
Iteratioal Joural of Computer Applicatios (97 8887) Volume 132 No.11, December21 Optimizatio of based CPU Schedulig Algorithms to Miimize Starvatio of Processes usig a Efficiecy Factor Muhammad A. Mustapha
More informationData diverse software fault tolerance techniques
Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the
More informationOperating System Concepts. Operating System Concepts
Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13
CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis
More informationOutline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers
Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate
More information