Maximum and Asymptotic UDP Throughput under CHOKe

Size: px
Start display at page:

Download "Maximum and Asymptotic UDP Throughput under CHOKe"

Transcription

1 Maximum and Asymptotic UDP Throughput under CHOKe Jiantao Wang Ao Tang Steven H. Low California Institute of Technology, Pasadena, USA ABSTRACT A recently proposed active queue management, CHOKe, aims to protect TCP from UDP flows. Simulations have shown that as UDP rate increases, its andwidth share initially rises ut eventually drops. We derive an approximate model of CHOKe and show that, provided the numer of TCP flows is large, the UDP andwidth share peaks at e+1) 1 =.269 when the UDP input rate is slightly larger than the link capacity, and drops to zero as UDP input rate tends to infinity, regardless of the TCP algorithm. Categories and Suject Descriptors I.6.4 [Simulation and Modelling]: Model Validation and Analysis; C.2.5 [Computer Systems Organization]: Local and Wide-Area etworks General Terms Performance,Theory Keywords CHOKe, AQM, UDP, TCP,Bandwidth Share 1. ITRODUCTIO TCP is elieved to e largely responsile for preventing congestion collapse while Internet has undergone dramatic growth in the last decade. Indeed, numerous measurements have consistently shown that more than 9% of traffic on the current Internet is still TCP packets, which, fortunately, are congestion controlled. Without a proper incentive structure, however, this state of affair is fragile and can e disrupted y the growing numer of non-rate-adaptive e.g., UDP-ased) applications that can monopolize network andwidth to the detriment of rate-adaptive applications. This has motivated We acknowledge the support of SF through grants AI and AI-23967, and ARO through grant DAAD Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distriuted for pro t or commercial advantage and that copies ear this notice and the full citation on the rst page. To copy otherwise, to repulish, to post on servers or to redistriute to lists, requires prior speci c permission and/or a fee. SIGMETRICS 3, June 1 14, 23, San Diego, California, USA. Copyright 23 ACM /3/6...$5.. several active queue management schemes, e.g., [6, 2, 3, 1, 7, 9, 1], that aim at penalizing aggressive flows and ensuring fairness. The scheme, CHOKe, of [9] is particularly interesting in that it does not require any state information and yet can provide a minimum andwidth share to TCP flows. The asic idea of CHOKe is explained in the following quote from [9]: When a packet arrives at a congested router, CHOKe draws a packet at random from the FIFO first in first out) uffer and compares it with the arriving packet. If they oth elong to the same flow, then they are oth dropped; else the randomly chosen packet is left intact and the arriving packet is admitted into the uffer with a proaility that depends on the level of congestion this proaility is computed exactly as in RED). The surprising feature of this extremely simple scheme is that it can ound the andwidth share of UDP flows regardless of their arrival rates. In fact, as the arrival rate of UDP packets increases without ound, their andwidth share approaches zero! An intuitive explanation is provided in [9]: the FIFO first-in-first-out) uffer is more likely to have packets elonging to a misehaving flow and hence these packets are more likely to e chosen for comparison. Further, packets elonging to a misehaving flow arrive more numerously and are more likely to trigger comparisons. As a result, aggressive flows are penalized. This however does not explain why a flow that maintains a much larger numer of packets in the queue does not receive a larger share of andwidth, as in the case of a regular FIFO uffer. In [11], a detailed differential equation model of CHOKe is derived that clarifies the spatial characteristics of a leaky uffer. It is shown there that UDP packets are not uniformly distriuted across the length of the queue. Instead, as UDP rate increases, even though the total numer of UDP packets in the queue increase, the spatial distriution of UDP packets ecomes more and more concentrated near the tail of the queue, and drops rapidly to zero toward the head of the queue. When a single UDP flow shares a link with TCP flows, the numer of UDP packets in the queue is almost times that of a TCP flow, in the limit as UDP input rate tends to infinity. Despite their numer, most of the UDP packets are dropped efore they advance to the head. As a result the UDP andwidth share drops to zero, in stark contrast to a non-leaky FIFO queue where UDP andwidth shares approaches 1 as its input rate increases without ound. Though the model of [11] provides detail structural properties of TCP/CHOKe, it is too 82

2 complex to solve analytically for the maximum throughput attainale y the UDP flow. In this paper, we derive an approximate model of CHOKe and use it to derive the maximum and asymptotic UDP throughput. In Section 2 we present an algeraic model that allows us to numerically compute performance metrics, such as throughput, delay and loss proailities. In Section 3, we prove analytically that, provided that the numer of TCP flows is large, the maximum andwidth share attainale y the UDP flow is e +1) 1 =.269 and that this is attained when the UDP rate is 2e 1)/e+1) = times the link capacity approximately, when the congestion ased dropping proaility is small). Moreover, it drops to zero as UDP rate increases without ound. The same results are also otained in [8], independently using a different method. These results are intrinsic to CHOKe and insensitive to the specific algorithms of TCP, the round trip delay, and congestion ased dropping such as RED. We present ns simulations to validate these conclusions in Section CHOKE MODEL The asic idea of CHOKe is summarized in Section 1. A flow chart descriing its implementation with RED is given in Figure 2 from [9]. Y Admit ew Packet End Y Drop oth packets End Arriving Packet AvgQsize<=Minth? Both packets from same flow? Y Admit packet with a proaility r End Draw a packet at random from queue AvgQsize<=Maxth? Drop the new packet Figure 1: CHOKe flow chart from [8]. In general, one can choose more than one packet from the queue, compare all of them with the incoming packet, and drop those from the same flow. This will improve CHOKe s performance, especially when there are multiple unresponsive sources. It is suggested in [9] that more drop candidate packets e used as the numer of unresponsive flows increase. Here, we focus on the modeling of a single candidate drop packet. The analysis can e extended to the case of multiple drop candidates. The general setup for our model and our simulations is shown in Figure 2. There is a single ottleneck link with capacity c packets per second. We focus on the FIFO uffer at router R1 where packets are queued. The uffer is shared End TCP sources S1 S2 S3 S UDP UDP source R1 c R2 Figure 2: etwork topology TCP destinations D1 D2 D3 D UDP UDP sink y TCP flows and a single UDP flow. The TCP flows have round trip propagation delays d 1,d 2,...,d seconds respectively. We assume the system is stale and model its equilirium ehavior. 2.1 otations Quantities rate, acklog, dropping proaility, etc) associated with the UDP flow are indexed y. Those associated with TCP flows are indexed y 1,...,. These are equilirium quantities which we assume exist. Recall the setting c,, d i,i =1,...,)wherec is the link capacity, is the numer of TCP flows, and d i,arethe round-trip propagation delays of TCP flows. We collect here the definitions of all the variales and some of their ovious properties: i: packet acklog from flow i, i =,...,. : total acklog, = i= i. τ: common queueing delay. The round-trip delay for flow i is d i + τ. r: Congestion-ased dropping proaility. Maximum and asymptotic UDP throughput are insensitive to the specific algorithm, such as RED, to compute this proaility, as long as it is the same for all flows. In general, r = g, τ) for some function g as a function of aggregate acklog and common queueing delay τ. h i: p i: The proaility of incoming packets eing dropped y CHOKe for flow i, i =,...,: h i = i overall proaility that packets of flow i, i =,...,, is dropped efore it gets through, either y CHOKe or congestion ased dropping: p i = 2h i + r 2rh i 1) The explanation of 1) is provided elow. x i: source rate of flow i, i =,...,. Maximum and asymptotic UDP throughput are insensitive to the specific TCP algorithm, such as Reno or Vegas. In general, x i = f ip i,τ) for some function f i as a function of overall loss proaility p i and queueing delay τ at equilirium, i =1,..., 83

3 We make two remarks. First, it is important to keep in mind that x is the only independent variale; all other variales listed aove are functions of x, though this is not made explicit in the notations. Second, x i is the sending rate of flow i. The rate at which flow i packets enter the tail of the queue after going through CHOKe and congestion ased dropping) is x i1 h i)1 r), and the rate at which flow i packets exit the queue throughput) is x i1 p i). Clearly, x i1 p i) x i1 h i)1 r) x i. 2.2 Model We make three key approximations in our model. The first approximation, descried next, yields an algeraic model that allows us to numerically compute performance metrics such as throughput, loss proailities, and queueing delay. The other two approximations, descried in the next section, lead to a simple method to estimate the maximum and asymptotic UDP throughput under CHOKe. A packet may e dropped, either on arrival due to congestion e.g., according to RED) or CHOKe, or after it has een admitted into the queue when a future arrival from the same flow triggers a comparison. We approximate the system y one in which the order of congestion ased dropping and CHOKe is reversed: a packet is admitted with proaility 1 r, and if it is admitted, it is then compared with a packet randomly chosen from the queue and dropped with proaility h i. With this approximation, the proaility that a packet from flow i is eventually dropped is given y 1). To see this, note that every arrival from flow i can trigger either packet loss, 1 packet loss due to congestion, or 2 packet losses due to CHOKe. These events happen with respective proailities of 1 h i)1 r), r, and1 r)h i.hence,each arrival to the uffer is accompanied y an average packet loss of 21 r)h i + r + 1 h i)1 r) and hence the overall loss proaility p i in 1). 1 This implies that the proaility that a packet of flow i goes through the queue without eing dropped is: 1 p i = 1 r)1 2h i) 2) We now derive this proaility from another perspective. Consider a packet of flow i that eventually goes through the queue without eing dropped. The proaility that it is not dropped on arrival is 1 r)1 h i). Once it enters the queue, it takes τ time to go through it. In this time period, there are on average τx i1 r) packets from flow i that survive congestion ased dropping and arrive at the queue. The proaility that this packet is not chosen for comparison is 1 1 ) τxi 1 r) 1 The overall loss proaility for the original CHOKe algorithm is see [11]): p i = 2h i + r rh i which is larger than the approximate loss proaility given y 1) ecause a packet that is first dropped due to congestion saves a potential loss of two packets due to CHOKe. The difference however is small since oth r and h i are typically small. Hence, the overall proaility that a packet of flow i survives the queue is 1 p i = 1 r)1 h i) 1 1 ) τxi 1 r) 3) We will equate p i in 2) and 3) to derive an equation which is one of the two) key equations that allow us to estimate the maximum and asymptotic UDP throughput see Section 3). A simple interpretation of a leaky uffer is as follows: x i is the source rate of flow i and x i1 r)1 h i)isthe rate at which flow i enters the queue after congestion-ased dropping and CHOKe. This flow splits into two flows: one eventually exits the queue and the other is dropped inside the queue y CHOKe. The rate of the former flow is flow i s throughput x i1 p i)=x i1 r)1 2h i)andtherateof the latter flow is its leak rate x i1 r)h i, so that they sum to the input rate x i1 r)1 h i). Since the link is fully utilized, the flow throughput sum to link capacity: x 1 p )+ x i1 p i) = c 4) This completes the description of the model. In summary, the independent variale is UDP rate x. The dependent variales of the model are: acklogs i of flow i, i =,...,; total acklog = i= i. congestion ased dropping proaility r, CHOKe dropping proailities h i, and overall dropping proailities p i, i =,...,. TCP rate x i, i =1,...,. queueing delay τ. The relations among these variales define our model. For ease of reference, we reproduce these ten equations here: 1 p i = 1 r)1 2h i), i =,..., 5) 1 p i = 1 r)1 h i) 1 1 ) τxi 1 r) 6) h i = i, i =,..., 7) c = x 1 p )+ x i1 p i) 8) = i 9) i= x i = f ip i,τ), i =1,..., TCP) 1) r = g, τ) e.g. RED) 11) We assume that this set of equations has a solution for x i,τ,r,,, i,h,h i,p,p i,i = 1,...,), once the TCP algorithm x i = f ip i,τ) and AQM algorithm r = g, τ) are specified, and that the limits of these quantities as x exist. Our goal is to compute the maximum and asymptotic values as x ) of UDP throughput x 1 p ). We now show that if is large, then only three equations are needed for this calculation the two equations 5) 6) for 84

4 i = and a new equation 13) elow that replaces 5) 7) for i =1,...,). It suggests that these are intrinsic properties of CHOKe and are insensitive to TCP/AQM algorithms f i,g). 3. THROUGHPUT AALYSIS The second key assumption we make is that is large. Since i h i = + j=1 j we assume for TCP sources that h i is on the order of 1/, so that h i when is large, for i = 1,...,. Then a comparison triggered y a TCP packet arrival seldom yields a match. This means that, once in the queue after congestion ased dropping), a TCP packet will never e dropped. The overall dropping proaility p i then reduces to sustitute h i = into 1)): p i = r, i =1,..., More importantly, this provides a simple relation etween queueing delay, throughput and acklog. Since there is no leaking for TCP packets in the uffer, the throughput rate for TCP flow i is x i1 p i),i =1,...,. There are i packets in the uffer from this TCP flow i. Then Little s Theorem implies: i τ = for i =1,..., 12) x i1 p i) From the condition 8) of full link utilization, the aggregate TCP throughput is xi1 pi) =c x1 p). The aggregate numer of TCP packets in the uffer is i = = 1 h ). Summing the numerators and denominators on the right side of 12) over i =1,...,,weget: τ = i xi1 pi) = 1 h ) 13) c x 1 p ) This assumption makes the estimate of UDP throughput insensitive to TCP algorithms. ote that with this assumption, the model 5) 11) is simplified to dependent variales x i,τ,r,,, i,h,p, i = 1,...,), with h i =andp i = r, i =1,...,, and equations with the three equations 5) 7) for i =1,..., replaced y the single equation 13). The third key approximation we make is that the total acklog is large so that 1 1 ) e 1 Equating 1 p i in 5) and 6) for i =,wehave 1 1 ) τx 1 r) = 1 2h 14) 1 h Sustituting 13) into 14) to eliminate τ, and apply the third approximation, we have ) 1 h x1 r)1 h ) = exp 15) 1 2h c x 1 r)1 2h ) where we have used 5). This equation yields the maximum and asymptotic UDP throughput. Theorem The maximum UDP andwidth share is µ =e +1) 1 = It is attained when the UDP input rate after congestion ased dropping is x 1 r ) = c2e 1)/e +1) = 1.193c. 3. In this case, the CHOKe dropping rate for UDP is h =e 1)/2e 1) =.387. Proof. Denote UDP andwidth share y using 5)) µ := 1 p ) x c Then rewrite 15) as Let γh ) denote 1 h 1 2h = exp = 1 r)1 2h ) x c 1 h 1 2h µ 1 µ ) 16) γh ) := 1 h 1 2h 17) Then 16) ecomes: or γh ) = e γh ) µ 1 µ ln γh ) µ = 18) γh )+lnγh ) It is easy to check that the right-hand side has a unique maximum at γh )=e with maximum andwidth share µ given y µ max γ ln γ γ +lnγ = 1 1+e =: µ 19) Sustituting γh )=e into the definition 17) of γh ), the maximum UDP andwidth share is attained when the CHOKe dropping proaility h for UDP is h = e 1 2) 2e 1 Since h = /, this implies that 39% of the queue are UDP packets when UDP attains the highest throughput. Since µ = x 1 r )1 2h )/c, the UDP rate after congestion ased dropping, x 1 r ), that attains the maximum throughput is x 1 r ) = µ c 1 2h Sustituting 19) and 2), we have x 1 r ) = 2e 1 e +1 c The next result says that the UDP throughput x 1 p ) drops to zero as UDP rate x grows without ound, under the assumption that rates x i under TCP algorithm remains finite when loss proaility p i ecomes large, i.e., lim pi 1 f ip i,τ) <, i = 1,...,. This assumption is always satisfied when TCP flows are controlled not to send packets infinitely fast when the capacity is fixed. 85

5 Theorem 2. Suppose lim pi 1 f ip i,τ) <,,...,. As x, /2 ut µ. Proof. ote that from 5), h = 1 2 p r 1 r 1 2 since p 1. We argue that / = h 1/2 asx. From 8), we have x 1 p ) c for all x. Hence p 1 as x. Hence from 5), we have 1 r ))1 2h )) = where all limits exist y assumption) r ) := lim r x and h ) := lim x h Hence either r ) = 1 or h ) = 1/2. If r ) = 1, then lim x p i = r ) =1, i =1,...,. This implies that x i = f ip i,τ) < as x. The condition of full link utilization 8) then implies that UDP throughput x 1 p )=c. This violates Theorem 1. Hence r ) < 1 and h ) =1/2. Then γ from 17), and hence, using 18), µ. We visualize equation 15) in Figure 3. It illustrates oth theorems aove. µ UDP andwidth share Peak Value β=x 1 r)/c Figure 3: µ v.s. x 1 r)/c We close this section y presenting another way to derive the key equation 14). The rate of flow i is x i1 r)1 h i) when it first enters the tail of the queue after congestionased dropping and CHOKe, and it takes τ seconds for packets to reach the head of the queue. After traveling down the queue for t seconds, t τ, the packets arrive at a certain point yt) [,], where it has een thinned y a factor 1 1/) xi1 r)t following the same argument that leads to 3)) and the rate of the flow at yt) is x it) := x i1 r)1 h i) 1 1 ) xi 1 r)t Hence x it)dt is the infinitesimal volume of the fluid at the point yt) in the queue, and the acklog from flow i is thus τ i = x i1 r)1 h i) 1 1 ) xi 1 r)t dt If we approximate 1 1/) y e,whenis large, then the aove integral reduces to i = 1 h i) 1 ) e x i1 r)τ/ In particular, since h = /, this implies 1 2h = e x 1 r)τ/ 1 h This is equivalent to 14) when we approximate 1 1/) y e SIMULATIOS In this section, we present simulation results to validate our model 5) 11) and throughput analysis. We implemented a CHOKe module with RED in ns-2 version TCP/AQM algorithms The model for RED dropping proaility is r = k ) where k := p max/ ) is the slope of the RED drop profile. We chose parameters of our simulations so that the equilirium queue length always lied etween the minimum queue threshold and the maximum queue threshold. We have conducted simulations with TCP ewreno,tcp Vegas and a modified Vegas to verify that the UDP throughput is insensitive to TCP algorithms. TCP Reno or its variants such as ewreno or SACK) is modeled y the following relation etween the equilirium source rate x i, the overall dropping proaility p i, and the round trip time d i + τ see e.g., [4]): p i = 2 2+x 2 i di + τ)2 This is equivalent to the well-known square-root-p formula when the loss proaility is small. For TCP Vegas, the source rate x i is related to the round trip propagation delay d i and queueing delay τ in equilirium according to see [5]): x i = αdi 21) τ where α is a protocol parameter. In equilirium, the ith Vegas source puts αd i numer of packets in the queue and hence the total numer of TCP packets in the queue is αdi. Under the large- assumption where TCP packets are not leaked from the queue, the queueing delay, given y 13), is then τ = αdi 22) c x 1 p ) Since x 1 p ) = oth when x =orwhenx = Theorem 2), queueing delay under TCP Vegas is small oth whenudprateissmallandwhenitislarge. Thisinteresting prediction is verified y the simulation elow. ote that the model 21) 22) of Vegas assumes a Droptail router that has a large enough uffer capacity to accommodate the αdi packets that Vegas sources attempt to keep in the network, so that there are no packet loss in equilirium; see [5]. RED and CHOKe dropping violates this assumption. As a result, Vegas reacts more or less like 86

6 Reno: halving its window on each drop and increases it y one packet per round trip time. We present simulation results with three TCP implementations, ewreno, Vegas, and modified Vegas. In modified Vegas, the source does not halve its sending window when there is a loss. In all our simulations large uffer capacity is used so that all packet drops are due to RED or CHOKe. Since modified Vegas uses only queueing delay as congestion feedack, the equilirium ehavior of modified Vegas matches well the model 21) 22). We will see that the throughput share µ as a function of UDP rate x 1 r)/c is insensitive to these TCP implementations. Our simulations focus on TCP Vegas oth to show that UDP throughput is insensitive to TCP algorithm and ecause TCP Vegas scales etter than TCP Reno with respect to link capacity, especially under CHOKe. This is ecause CHOKe increases the overall loss proaility, limiting the achievale rate of TCP Reno. Since TCP Vegas sets its rate ased on queueing delay, it does not have this limitation. 4.2 Simulation setup We simulated the network in Figure 2 to study the equilirium ehavior of CHOKe. There is a single ottleneck linkfromrouterr1torouterr2sharedy = 1 TCP sources and one UDP source. The UDP source sends data at a constant rate. The link capacity is fixed at c = 15Mps for all simulations. We use RED+CHOKe as the queue management with RED parameters: min th = 2pack- ets, max th = 12 packets, p max =.1). Packet size is 1KBytes. The simulation time is 2 seconds. The original Vegas implementation in ns-2 works poorly in a lossy environment, for two reasons. First the implementation estimates RTT naively y setting it to the difference etween sending time of a packet and receiving time of its ACK. When packets are lost, the ACK may e a duplicate ACK or it may e triggered y the retransmitted packet. A more sophisticated estimation is required when losses are frequent. Second, when there are multiple losses in the same round trip time, which is not infrequent since CHOKe drops two packets every time a comparison yields a match, the Vegas implementation often incurs timeout and slow-start. As a consequence, we implemented a modified Vegas module in ns-2 ased on the ewreno code which etter handles losses. There are three major changes. First, we do not estimate RTT with duplicate ACKs, especially with the first and second duplicate ACKs when fast retransmit/fast recover phase is not yet entered. Second we use the ewreno s fast retransmit and fast recovery code to deal with multiple losses. Third, we change the Vegas code such that it only response to queueing delay not loss. These changes should not affect the equilirium ehavior of the TCP algorithms. In our simulations, we vary UDP sending rate x from.1c =1.5Mps to 1c = 15Mps. We measure the following quantities, and compare with the numerical solutions of 5) 11): 1. ormalized UDP andwidth share µ = x 1 p )/c. 2. aggregate queue size 3. round-trip time d i + τ The results illustrate oth the equilirium ehavior of CHOKe and the accuracy of our analytical model. They show the aility of CHOKe to protect TCP flows and agree with those aggregate measurements of [9]. We next discuss these results in detail. 4.3 Simulation results We show two sets of results. The first set presents measurements of uffer size, queueing delay and throughput share using the modified Vegas with identical flows. It validates our model. The second set validates Theorems 1 and 2, and confirms that UDP share µ is insensitive to TCP algorithms, RED parameters, and round trip delay Equilirium properties Since extensive simulation results have een previously reported in [9] and [11] with TCP Reno, we focus here on modified Vegas which matches model 21) 22) well. In the simulations of modified Vegas in this susection, a common round trip delay d =1ms is used. We set α such that each source tries to put αd = 2 packets in the uffer. The system is stale and converges to a steady state modulo random fluctuations) very quickly. A sample queue size and congestion window are given in Figure 4, for UDP rate x = 15Mps, one of the data points in Figure 5. Queue size pkts) Congestion window pkts) Simulation time sec) a) Queue size v.s. time Simulation time sec) ) Congestion window v.s. time Figure 4: Example queue size and congestion window under modified Vegas 87

7 Figure 5 illustrates the effect of UDP rate x on queue size and queueing delay under modified Vegas. Each of the Similarly there are three curves from ns-simulation, complete model, and simplified model. The curve corresponding to the simplified model is marked as Intrinsic UDP andwidth share, and is the same curve in Figure 3, ecause its calculation does not depend on specific TCP algorithm f i,or AQM algorithm g, or delay values. It is calculated using equation 15). The complete model matches the simulation etter, ut the prediction from the intrinsic curve is also acceptale. Queue size pkts) Simulation Complete model Simplified model UDP sending rate/link capacity x /c a) Queue size µ UDP andwidth share Simulation andwidth share Complete Model andwith share Intrinsic UDP andwidth share β=x 1 r)/c Round trip delay sec) Complete Model Simulation Simpplified model UDP sending rate/link capacity x /c ) Round trip time τ + d Figure 5: Effect of UDP rate x on queue size and queuing delay under modified Vegas. = 1, d = 1ms, c =15Mps, x =.1c to 1c, simulation duration = 2sec. figures shows three curves: measurements from ns-2 simulations, numerical solution of the complete model 5) 11), and that ased on the simplified model descried at the eginning of Section 3. The difference etween the numerical solutions of the complete model and that of the simplified model is negligile. The error etween simulation results and the numerical solutions is always less than 5 percent. When UDP rate x is small, the queue size is close to αd = 2pkts. The aggregate queue length steadily increases as UDP rate x rises. It will approach 4pkts if there were no RED dropping ecause when UDP rate is very large, UDP packets take up half of the queue see proof of Theorem 2) and there are aout αd = 2 Vegas packets in the uffer = 1 is large). With RED dropping, the value is slightly less than 4pkts. As discussed in Section 4.1, the queueing delay is small oth when x =.1c and when x =1c. The UDP andwidth share is shown in Figure 6. Figure 6: UDP andwidth share µ v.s. UDP rate after RED dropping x 1 r)/c Throughput share The second set of results, shown in Figure 7, illustrates the UDP andwidth share for three TCP implementations: ewreno, modified Vegas, and original Vegas. Each sufigure has two curves: from simulation, and from the simplified model. The curves from the model are the same curve in Figure 3, and hence different TCP implementations yield similar simulation curves. The 1 sources have various propagation delays with 1 sources at each of the 5, 6,...,14ms delay values. Figure 8 shows the corresponding curves for theoriginalvegaswhenallsourceshavethesamedelayof 1ms. Comparing Figures 6, 7, and 8, we see that the throughput share is sensitive neither to TCP implementation nor propagation delay. Theorems 1 and 2 predict that the UDP andwidth share peaks at around.269 and tends to zero as x increases. Simulation shows a slightly smaller peak UDP share. The discrepancy is proaly due to the approximations we made in our model. Finally, the UDP andwidth share with a different slope of RED s drop profile is shown in Figure 9. The RED parameters are : min th = 2 packets, max th = 42 packets, p max =.1). Herewehavemodified from 12 to 42 to get a steeper slope of the drop profile than used in earlier simulations. The sources are ewreno with the same delay values as the previous set of simulations. It shows that the andwidth share is almost independent of RED parameters. 5. COCLUSIO We have developed an analytical model of CHOKe which is not only much simpler to solve numerically than the previous model of [11], ut also allows us to compute analytically 88

8 Sharing Curve of Heterogeneous Reno Sources.25 Share Curve of Original Vegas µ UDP andwidth share Intrinsic UDP andwidth share Simulation andwidth share β=x 1 r)/c a) ewreno: d i =5, 6,...,14ms Sharing Curve of Heterogeneous Vegas Sources µ UDP andwidth share Intrinsic UDP andwidth share Simulation andwidth share β=x 1 r)/c a) Original Vegas: d i = 1ms µ UDP andwidth share Figure 8: UDP andwidth share µ : Original Vegas, d i =1ms for all sources, =1, c =15Mps..5 Intrinsic UDP andwidth share Simulation andwidth share β=x 1 r)/c ) Modified Vegas: d i =5, 6,...,14ms Share curve with different RED parameter Sharing Curve of Original Vegas with Heterogeneous Sources µ UDP andwidth share µ UDP andwidth share Intrinsic UDP andwidth share Simulation andwidth share β=x 1 r)/c c) Original Vegas: d i =5, 6,...,14ms Figure 7: UDP andwidth share µ as a function of UDP rate after RED dropping x 1 r)/c. = 1, c =15Mps. Intrinsic UDP andwidth share Simulation andwidth share β=x 1 r)/c Figure 9: UDP andwidth share µ : different RED configuration, ewreno. 89

9 the maximum and asymptotic throughput. In particular, we prove that UDP andwidth share peaks at e+1) 1 =.269 when UDP rate is slightly larger than link capacity, and drops to zero when UDP rate approaches infinity. The models and results here and in [11] complement each other. Here, we compute the macroscopic properties of CHOKe. The differential equation model of [11] provides detail spatial characters of a leaky uffer that explain the mechanism through which these properties are produced. 6. REFERECES [1] W. Feng, K G. Shin, D. Kandlur, and D. Saha. Stochastic Fair Blue: A queue management algorithm for enforcing fairness. In Proceedings of IFOCOM, April 21. [2] S. Floyd and V. Jacoson. Random early detection gateways for congestion avoidance. IEEE/ACM Trans. on etworking, 14): , August ftp://ftp.ee.ll.gov/papers/early.ps.gz. [3] Dong Lin and Roert Morris. Dynamics of random early detection. In Proceedings of SIGCOMM 97, pages , Septemer http: // [4] Steven H. Low. A duality model of TCP and queue management algorithms. IEEE/ACM Trans. on etworking, to appear, Octoer [5] Steven H. Low, Larry Peterson, and Limin Wang. Understanding Vegas: a duality model. J. of ACM, 492):27 235, March [6] P. McKenny. Stochastic fairness queueing. In Proceedings of Infocom, pages , 199. [7] T. J. Ott, T. V. Lakshman, and L. Wong. SRED: Stailized RED. In Proceedings of IEEE Infocom 99, March ftp://ftp.ellcore.com/pu/tjo/sred.ps. [8] Rong Pan, Chandra air, Brian Yang, and Balaji Prahakar. Packet dropping mechanisms: some examples and analysis. In Proc. of 38th Annual Allerton Conference on Communication, Control, and Computing, Octoer 21. [9] Rong Pan, Balaji Prahakar, and Konstantinos Psounis. CHOKe: a stateless AQM scheme for approximating fair andwidth allocation. In Proceedings of IEEE Infocom, March 2. [1] I. Stoica, S. Shenker, and H. Zhang. Core-stateless fair queueing: achieving approximately fair andwidth allocations in high speed networks. In Proceedings of ACM Sigcomm, [11] Ao Tang, Jiantao Wang, and Steven H. Low. Understanding CHOKe. In Proc. of IEEE Infocom, April

Maximum and Asymptotic UDP Throughput under CHOKe

Maximum and Asymptotic UDP Throughput under CHOKe Maximum and Asymptotic UDP Throughput under CHOKe Jiantao Wang Ao Tang Steven H. Low California Institute of Technology, Pasadena, USA {jiantao@cds., aotang@, slow@}caltech.edu ABSTRACT A recently proposed

More information

Understanding CHOKe. Ao Tang Jiantao Wang Steven H. Low California Institute of Technology, Pasadena, USA

Understanding CHOKe. Ao Tang Jiantao Wang Steven H. Low California Institute of Technology, Pasadena, USA Understanding CHOKe Ao Tang Jiantao Wang Steven H. Low California Institute of Technology, Pasadena, USA {aotang@, jiantao@cds., slow@}caltech.edu Astract A recently proposed active queue management, CHOKe,

More information

TCP IS BELIEVED to be largely responsible for preventing

TCP IS BELIEVED to be largely responsible for preventing 694 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 4, AUGUST 2004 Understanding CHOKe: Throughput and Spatial Characteristics Ao Tang, Student Member, IEEE, Jiantao Wang, and Steven H. Low, Senior Member,

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Protection from Unresponsive Flows with Geometric CHOKe

Protection from Unresponsive Flows with Geometric CHOKe Protection from Unresponsive Flows with Geometric CHOKe Addisu Eshete and Yuming Jiang Centre for Quantifiable Quality of Service in Communication Systems Norwegian University of Science and Technology,

More information

CHOKe - A simple approach for providing Quality of Service through stateless approximation of fair queueing. Technical Report No.

CHOKe - A simple approach for providing Quality of Service through stateless approximation of fair queueing. Technical Report No. CHOKe - A simple approach for providing Quality of Service through stateless approximation of fair queueing Rong Pan Balaji Prabhakar Technical Report No.: CSL-TR-99-779 March 1999 CHOKe - A simple approach

More information

Performance Consequences of Partial RED Deployment

Performance Consequences of Partial RED Deployment Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing

More information

On the Transition to a Low Latency TCP/IP Internet

On the Transition to a Low Latency TCP/IP Internet On the Transition to a Low Latency TCP/IP Internet Bartek Wydrowski and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks, EEE Department, The University of Melbourne,

More information

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate

More information

A Flow Table-Based Design to Approximate Fairness

A Flow Table-Based Design to Approximate Fairness A Flow Table-Based Design to Approximate Fairness Rong Pan Lee Breslau Balaji Prabhakar Scott Shenker Stanford University AT&T Labs-Research Stanford University ICIR rong@stanford.edu breslau@research.att.com

More information

15-744: Computer Networking. Overview. Queuing Disciplines. TCP & Routers. L-6 TCP & Routers

15-744: Computer Networking. Overview. Queuing Disciplines. TCP & Routers. L-6 TCP & Routers TCP & Routers 15-744: Computer Networking RED XCP Assigned reading [FJ93] Random Early Detection Gateways for Congestion Avoidance [KHR02] Congestion Control for High Bandwidth-Delay Product Networks L-6

More information

CS 268: Computer Networking

CS 268: Computer Networking CS 268: Computer Networking L-6 Router Congestion Control TCP & Routers RED XCP Assigned reading [FJ93] Random Early Detection Gateways for Congestion Avoidance [KHR02] Congestion Control for High Bandwidth-Delay

More information

Performance Analysis of TCP Variants

Performance Analysis of TCP Variants 102 Performance Analysis of TCP Variants Abhishek Sawarkar Northeastern University, MA 02115 Himanshu Saraswat PES MCOE,Pune-411005 Abstract The widely used TCP protocol was developed to provide reliable

More information

Performance Evaluation of Controlling High Bandwidth Flows by RED-PD

Performance Evaluation of Controlling High Bandwidth Flows by RED-PD Performance Evaluation of Controlling High Bandwidth Flows by RED-PD Osama Ahmed Bashir Md Asri Ngadi Universiti Teknology Malaysia (UTM) Yahia Abdalla Mohamed Mohamed Awad ABSTRACT This paper proposed

More information

Markov Model Based Congestion Control for TCP

Markov Model Based Congestion Control for TCP Markov Model Based Congestion Control for TCP Shan Suthaharan University of North Carolina at Greensboro, Greensboro, NC 27402, USA ssuthaharan@uncg.edu Abstract The Random Early Detection (RED) scheme

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Research Letter A Simple Mechanism for Throttling High-Bandwidth Flows

Research Letter A Simple Mechanism for Throttling High-Bandwidth Flows Hindawi Publishing Corporation Research Letters in Communications Volume 28, Article ID 74878, 5 pages doi:11155/28/74878 Research Letter A Simple Mechanism for Throttling High-Bandwidth Flows Chia-Wei

More information

! Network bandwidth shared by all users! Given routing, how to allocate bandwidth. " efficiency " fairness " stability. !

! Network bandwidth shared by all users! Given routing, how to allocate bandwidth.  efficiency  fairness  stability. ! Motivation Network Congestion Control EL 933, Class10 Yong Liu 11/22/2005! Network bandwidth shared by all users! Given routing, how to allocate bandwidth efficiency fairness stability! Challenges distributed/selfish/uncooperative

More information

A Framework For Managing Emergent Transmissions In IP Networks

A Framework For Managing Emergent Transmissions In IP Networks A Framework For Managing Emergent Transmissions In IP Networks Yen-Hung Hu Department of Computer Science Hampton University Hampton, Virginia 23668 Email: yenhung.hu@hamptonu.edu Robert Willis Department

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

ECE 610: Homework 4 Problems are taken from Kurose and Ross. ECE 610: Homework 4 Problems are taken from Kurose and Ross. Problem 1: Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 248. Suppose

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE 333: Introduction to Communication Networks Fall 2001 Lecture 28: Transport Layer III Congestion control (TCP) 1 In the last lecture we introduced the topics of flow control and congestion control.

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < : A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks Visvasuresh Victor Govindaswamy,

More information

CHOKe A stateless mechanism for providing Quality of Service in the Internet

CHOKe A stateless mechanism for providing Quality of Service in the Internet CHOKe A stateless mechanism for providing Quality of Service in the Internet Balaji Prabhakar, Rong Pan Department of Electrical Engineering Stanford University Stanford, CA 9435 fbalaji,rongg@leland.stanford.edu

More information

Recap. TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness

Recap. TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness Recap TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness 81 Feedback Signals Several possible signals, with different

More information

Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP) TETCOS Transmission Control Protocol (TCP) Comparison of TCP Congestion Control Algorithms using NetSim @2017 Tetcos. This document is protected by copyright, all rights reserved Table of Contents 1. Abstract....

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

Misbehavior and MAC Friendliness in CSMA Networks

Misbehavior and MAC Friendliness in CSMA Networks Misehavior and MAC Friendliness in CSMA Networks Zhefu Shi, Cory Beard, Ken Mitchell, University of Missouri-Kansas City Contact: eardc@umkcedu Astract Nodes using standardized, contention-ased CSMA protocols

More information

Stateless Proportional Bandwidth Allocation

Stateless Proportional Bandwidth Allocation Stateless Proportional Bandwidth Allocation Prasanna K. Jagannathan *a, Arjan Durresi *a, Raj Jain **b a Computer and Information Science Department, The Ohio State University b Nayna Networks, Inc. ABSTRACT

More information

A Note on the Stability Requirements of Adaptive Virtual Queue

A Note on the Stability Requirements of Adaptive Virtual Queue A ote on the Stability Requirements of Adaptive Virtual Queue Dina Katabi MIT-LCS dk@mit.edu Charles Blake MIT-LCS cb@mit.edu Abstract Choosing the correct values for the parameters of an Active Queue

More information

CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF

CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF Your Name: Answers SUNet ID: root @stanford.edu In accordance with both the letter and the

More information

/06/$20.00 c 2006 IEEE I. INTRODUCTION

/06/$20.00 c 2006 IEEE I. INTRODUCTION Scalale Router Memory Architecture Based on Interleaved DRAM Feng Wang and Mounir Hamdi Computer Science Department of The Hong Kong University of Science and Technology {fwang, hamdi}@cs.ust.hk Astract

More information

Congestion control in TCP

Congestion control in TCP Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed

More information

Recent Results from Analyzing the Performance of Heuristic Search

Recent Results from Analyzing the Performance of Heuristic Search Recent Results from Analyzing the Performance of Heuristic Search Teresa M. Breyer and Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 {treyer,korf}@cs.ucla.edu

More information

Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification. Chunlei Liu Raj Jain

Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification. Chunlei Liu Raj Jain Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification Chunlei Liu Raj Jain Department of Computer and Information Science The Ohio State University, Columbus, OH 432-277

More information

A New Fair Window Algorithm for ECN Capable TCP (New-ECN)

A New Fair Window Algorithm for ECN Capable TCP (New-ECN) A New Fair Window Algorithm for ECN Capable TCP (New-ECN) Tilo Hamann Department of Digital Communication Systems Technical University of Hamburg-Harburg Hamburg, Germany t.hamann@tu-harburg.de Jean Walrand

More information

G Force Tolerance Sample Solution

G Force Tolerance Sample Solution G Force Tolerance Sample Solution Introduction When different forces are applied to an oject, G-Force is a term used to descrie the resulting acceleration, and is in relation to acceleration due to gravity(g).

More information

Steady State Analysis of the RED Gateway: Stability, Transient Behavior, and Parameter Setting

Steady State Analysis of the RED Gateway: Stability, Transient Behavior, and Parameter Setting Steady State Analysis of the RED Gateway: Stability, Transient Behavior, and Parameter Setting Hiroyuki Ohsaki, Masayuki Murata, and Hideo Miyahara Graduate School of Engineering Science, Osaka University

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 14 Congestion Control Some images courtesy David Wetherall Animations by Nick McKeown and Guido Appenzeller The bad news and the good news The bad news: new

More information

AN EMPIRICAL VALIDATION OF A DUALITY MODEL OF TCP AND QUEUE MANAGEMENT ALGORITHMS

AN EMPIRICAL VALIDATION OF A DUALITY MODEL OF TCP AND QUEUE MANAGEMENT ALGORITHMS Proceedings of the 1 Winter Simulation Conference B.A.Peters,J.S.Smith,D.J.Medeiros,andM.W.Rohrer,eds. AN EMPIRICAL VALIDATION OF A DUALITY MODEL OF TCP AND QUEUE MANAGEMENT ALGORITHMS Sanjeewa Athuraliya

More information

Studying Fairness of TCP Variants and UDP Traffic

Studying Fairness of TCP Variants and UDP Traffic Studying Fairness of TCP Variants and UDP Traffic Election Reddy B.Krishna Chaitanya Problem Definition: To study the fairness of TCP variants and UDP, when sharing a common link. To do so we conduct various

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

TCP Congestion Control

TCP Congestion Control TCP Congestion Control What is Congestion The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting

More information

TCP Congestion Control

TCP Congestion Control What is Congestion TCP Congestion Control The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting

More information

Congestion Control. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Congestion Control. Daniel Zappala. CS 460 Computer Networking Brigham Young University Congestion Control Daniel Zappala CS 460 Computer Networking Brigham Young University 2/25 Congestion Control how do you send as fast as possible, without overwhelming the network? challenges the fastest

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet

More information

Utility-Based Rate Control in the Internet for Elastic Traffic

Utility-Based Rate Control in the Internet for Elastic Traffic 272 IEEE TRANSACTIONS ON NETWORKING, VOL. 10, NO. 2, APRIL 2002 Utility-Based Rate Control in the Internet for Elastic Traffic Richard J. La and Venkat Anantharam, Fellow, IEEE Abstract In a communication

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

An Enhanced Slow-Start Mechanism for TCP Vegas

An Enhanced Slow-Start Mechanism for TCP Vegas An Enhanced Slow-Start Mechanism for TCP Vegas Cheng-Yuan Ho a, Yi-Cheng Chan b, and Yaw-Chung Chen a a Department of Computer Science and Information Engineering National Chiao Tung University b Department

More information

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015

Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 Assignment 7: TCP and Congestion Control Due the week of October 29/30, 2015 I d like to complete our exploration of TCP by taking a close look at the topic of congestion control in TCP. To prepare for

More information

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources

Congestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets

More information

CS321: Computer Networks Congestion Control in TCP

CS321: Computer Networks Congestion Control in TCP CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 15: Congestion Control Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

TCP-Peach and FACK/SACK Options: Putting The Pieces Together

TCP-Peach and FACK/SACK Options: Putting The Pieces Together TCP-Peach and FACK/SACK Options: Putting The Pieces Together Giacomo Morabito, Renato Narcisi, Sergio Palazzo, Antonio Pantò Dipartimento di Ingegneria Informatica e delle Telecomunicazioni University

More information

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Outline Introduction What s wrong with TCP? Idea of Efficiency vs. Fairness XCP, what is it? Is it

More information

A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows

A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows Yen-Hung Hu, Debra Tang, Hyeong-Ah Choi 3 Abstract Researches have unveiled that about % of current Internet traffic is contributed

More information

ISSN: International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 4, April 2013

ISSN: International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 4, April 2013 Balanced window size Allocation Mechanism for Congestion control of Transmission Control Protocol based on improved bandwidth Estimation. Dusmant Kumar Sahu 1, S.LaKshmiNarasimman2, G.Michale 3 1 P.G Scholar,

More information

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Zhili Zhao Dept. of Elec. Engg., 214 Zachry College Station, TX 77843-3128 A. L. Narasimha Reddy

More information

Variable Step Fluid Simulation for Communication Network

Variable Step Fluid Simulation for Communication Network Variable Step Fluid Simulation for Communication Network Hongjoong Kim 1 and Junsoo Lee 2 1 Korea University, Seoul, Korea, hongjoong@korea.ac.kr 2 Sookmyung Women s University, Seoul, Korea, jslee@sookmyung.ac.kr

More information

Answers to Sample Questions on Transport Layer

Answers to Sample Questions on Transport Layer Answers to Sample Questions on Transport Layer 1) Which protocol Go-Back-N or Selective-Repeat - makes more efficient use of network bandwidth? Why? Answer: Selective repeat makes more efficient use of

More information

TCP Congestion Control. Lecture 16. Outline. TCP Congestion Control. Additive Increase / Multiplicative Decrease (AIMD)

TCP Congestion Control. Lecture 16. Outline. TCP Congestion Control. Additive Increase / Multiplicative Decrease (AIMD) Lecture 16 TCP Congestion Control Homework 6 Due Today TCP uses ACK arrival as a signal to transmit a new packet. Since connections come-and-go TCP congestion control must be adaptive. TCP congestion control

More information

CS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers. Xiaowei Yang

CS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers. Xiaowei Yang CS 356: Computer Network Architectures Lecture 19: Congestion Avoidance Chap. 6.4 and related papers Xiaowei Yang xwy@cs.duke.edu Overview More on TCP congestion control Theory Macroscopic behavior TCP

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 1 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays

Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays Keiichi Takagaki Hiroyuki Ohsaki Masayuki Murata Graduate School of Engineering Science,

More information

Congestion Control & Transport protocols

Congestion Control & Transport protocols Congestion Control & Transport protocols from New Internet and Networking Technologies for Grids and High-Performance Computing, tutorial given at HiPC 04, Bangalore, India December 22nd, 2004 C. Pham

More information

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course: CS 349/449 Internet Protocols Final Exam Winter 2003 12/15/2003 Name: Course: Instructions: 1. You have 2 hours to finish 2. Question 9 is only for 449 students 3. Closed books, closed notes. Write all

More information

A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ

A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ A Probabilistic Approach for Achieving Fair Bandwidth Allocations in Peng Wang David L. Mills Department of Electrical & Computer Engineering University of Delaware Newark, DE 976 pwangee@udel.edu; mills@eecis.udel.edu

More information

Three-section Random Early Detection (TRED)

Three-section Random Early Detection (TRED) Three-section Random Early Detection (TRED) Keerthi M PG Student Federal Institute of Science and Technology, Angamaly, Kerala Abstract There are many Active Queue Management (AQM) mechanisms for Congestion

More information

Reasons not to Parallelize TCP Connections for Fast Long-Distance Networks

Reasons not to Parallelize TCP Connections for Fast Long-Distance Networks Reasons not to Parallelize TCP Connections for Fast Long-Distance Networks Zongsheng Zhang Go Hasegawa Masayuki Murata Osaka University Contents Introduction Analysis of parallel TCP mechanism Numerical

More information

Fair Adaptive Bandwidth Allocation: A Rate Control Based Active Queue Management Discipline

Fair Adaptive Bandwidth Allocation: A Rate Control Based Active Queue Management Discipline Fair Adaptive Bandwidth Allocation: A Rate Control Based Active Queue Management Discipline Abhinav Kamra, Huzur Saran, Sandeep Sen, and Rajeev Shorey Department of Computer Science and Engineering, Indian

More information

Improved Model for a Non-Standard TCP Behavior

Improved Model for a Non-Standard TCP Behavior IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10, October 2011 45 Improved Model for a Non-Standard TCP Behavior Mohammed Abdullah Alnuem, King Saud University, Riyadh,

More information

Improving the Ramping Up Behavior of TCP Slow Start

Improving the Ramping Up Behavior of TCP Slow Start Improving the Ramping Up Behavior of TCP Slow Start Rung-Shiang Cheng, Hui-Tang Lin, Wen-Shyang Hwang, Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University, Taiwan chengrs@hpds.ee.ncku.edu.tw

More information

CS Transport. Outline. Window Flow Control. Window Flow Control

CS Transport. Outline. Window Flow Control. Window Flow Control CS 54 Outline indow Flow Control (Very brief) Review of TCP TCP throughput modeling TCP variants/enhancements Transport Dr. Chan Mun Choon School of Computing, National University of Singapore Oct 6, 005

More information

An Analytical RED Function Design Guaranteeing Stable System Behavior

An Analytical RED Function Design Guaranteeing Stable System Behavior An Analytical RED Function Design Guaranteeing Stable System Behavior Erich Plasser, Thomas Ziegler Telecommunications Research Center Vienna {plasser, ziegler}@ftw.at Abstract This paper introduces the

More information

ACTIVE QUEUE MANAGEMENT ALGORITHM WITH A RATE REGULATOR. Hyuk Lim, Kyung-Joon Park, Eun-Chan Park and Chong-Ho Choi

ACTIVE QUEUE MANAGEMENT ALGORITHM WITH A RATE REGULATOR. Hyuk Lim, Kyung-Joon Park, Eun-Chan Park and Chong-Ho Choi Copyright 22 IFAC 15th Triennial World Congress, Barcelona, Spain ACTIVE QUEUE MANAGEMENT ALGORITHM WITH A RATE REGULATOR Hyuk Lim, Kyung-Joon Park, Eun-Chan Park and Chong-Ho Choi School of Electrical

More information

******************************************************************* *******************************************************************

******************************************************************* ******************************************************************* ATM Forum Document Number: ATM_Forum/96-0518 Title: Performance of TCP over UBR and buffer requirements Abstract: We study TCP throughput and fairness over UBR for several buffer and maximum window sizes.

More information

CS644 Advanced Networks

CS644 Advanced Networks What we know so far CS644 Advanced Networks Lecture 6 Beyond TCP Congestion Control Andreas Terzis TCP Congestion control based on AIMD window adjustment [Jac88] Saved Internet from congestion collapse

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

PERFORMANCE OF DIFFERENT CALL ADMISSION SCHEMES IN A QOS DIFFSERV DOMAIN

PERFORMANCE OF DIFFERENT CALL ADMISSION SCHEMES IN A QOS DIFFSERV DOMAIN 1 PERFORMANCE OF DIFFERENT CALL ADMISSION SCHEMES IN A QOS DIFFSERV DOMAIN M. Gerla, S. S. Lee y G. Reali, D. D. Sorte z y Computer Science Dept., UCLA Los Angeles, CA, U.S.A. z Dipartimento di Ingegneria

More information

On TCP friendliness of VOIP traffic

On TCP friendliness of VOIP traffic On TCP friendliness of VOIP traffic By Rashmi Parthasarathy WSU ID # 10975537 A report submitted in partial fulfillment of the requirements of CptS 555 Electrical Engineering and Computer Science Department

More information

A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks. Motivation

A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks. Motivation A Hybrid Systems Modeling Framework for Fast and Accurate Simulation of Data Communication Networks Stephan Bohacek João P. Hespanha Junsoo Lee Katia Obraczka University of Delaware University of Calif.

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 30 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks We started

More information

cs/ee 143 Communication Networks

cs/ee 143 Communication Networks cs/ee 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Recap: Internet overview Some basic mechanisms n Packet switching n Addressing n Routing o

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

Analysis and Improvement of Fairness between TCP Reno and Vegas for Deployment of TCP Vegas to the Internet

Analysis and Improvement of Fairness between TCP Reno and Vegas for Deployment of TCP Vegas to the Internet Analysis and Improvement of Fairness between TCP Reno and Vegas for Deployment of TCP Vegas to the Internet Go Hasegawa, Kenji Kurata and Masayuki Murata Graduate School of Engineering Science, Osaka University

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

100 Mbps. 100 Mbps S1 G1 G2. 5 ms 40 ms. 5 ms

100 Mbps. 100 Mbps S1 G1 G2. 5 ms 40 ms. 5 ms The Influence of the Large Bandwidth-Delay Product on TCP Reno, NewReno, and SACK Haewon Lee Λ, Soo-hyeoung Lee, and Yanghee Choi School of Computer Science and Engineering Seoul National University San

More information

The Scaling Hypothesis: Simplifying the Prediction of Network Performance using Scaled-down Simulations

The Scaling Hypothesis: Simplifying the Prediction of Network Performance using Scaled-down Simulations The Scaling Hypothesis: Simplifying the Prediction of Network Performance using Scaled-down Simulations Konstantinos Psounis, Rong Pan, Balaji Prabhakar, Damon Wischik Stanford Univerity, Cambridge University

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle Dissertation Defense May 14, 2003 Advisor: Kevin Jeffay Research Question Can the use of exact timing information improve

More information

bitcoin allnet exam review: transport layer TCP basics congestion control project 2 Computer Networks ICS 651

bitcoin allnet exam review: transport layer TCP basics congestion control project 2 Computer Networks ICS 651 bitcoin allnet exam review: transport layer TCP basics congestion control project 2 Computer Networks ICS 651 Bitcoin distributed, reliable ("hard to falsify") time-stamping network each time-stamp record

More information

On the Burstiness of the TCP Congestion-Control Mechanism in a Distributed Computing System

On the Burstiness of the TCP Congestion-Control Mechanism in a Distributed Computing System Proceedings of the 2th International Conference on Distributed Computing Systems (ICDCS 2). On the Burstiness of the TCP Congestion-Control Mechanism in a Distributed Computing System Peerapol Tinnakornsrisuphap,

More information

Improving Internet Congestion Control and Queue Management Algorithms. Wu-chang Feng March 17, 1999 Final Oral Examination

Improving Internet Congestion Control and Queue Management Algorithms. Wu-chang Feng March 17, 1999 Final Oral Examination Improving Internet Congestion Control and Queue Management Algorithms Wu-chang Feng March 17, 1999 Final Oral Examination Outline Motivation Congestion control and queue management today (TCP, Drop-tail,

More information

A COMPARATIVE STUDY OF TCP RENO AND TCP VEGAS IN A DIFFERENTIATED SERVICES NETWORK

A COMPARATIVE STUDY OF TCP RENO AND TCP VEGAS IN A DIFFERENTIATED SERVICES NETWORK A COMPARATIVE STUDY OF TCP RENO AND TCP VEGAS IN A DIFFERENTIATED SERVICES NETWORK Ruy de Oliveira Federal Technical School of Mato Grosso Brazil Gerência de Eletroeletrônica E-mail: ruy@lrc.feelt.ufu.br

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks Random Early Detection (RED) gateways Sally Floyd CS 268: Computer Networks floyd@eelblgov March 20, 1995 1 The Environment Feedback-based transport protocols (eg, TCP) Problems with current Drop-Tail

More information

One More Bit Is Enough

One More Bit Is Enough One More Bit Is Enough Yong Xia, RPI Lakshmi Subramanian, UCB Ion Stoica, UCB Shiv Kalyanaraman, RPI SIGCOMM 05, Philadelphia, PA 08 / 23 / 2005 Motivation #1: TCP doesn t work well in high b/w or delay

More information