Master Course Computer Networks IN2097

Similar documents
Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Chapter 3 Transport Layer

Chapter 3 Transport Layer

Chapter III: Transport Layer

CNT 6885 Network Review on Transport Layer

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Congestion Control. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Lecture 11. Transport Layer (cont d) Transport Layer 1

Chapter 3 Transport Layer

CSC 4900 Computer Networks: TCP

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 10

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

CS 43: Computer Networks. 19: TCP Flow and Congestion Control October 31, Nov 2, 2018

Congestion Control. Principles of Congestion Control. Network-assisted Congestion Control: ATM. Congestion Control. Computer Networks 10/21/2009

Computer Networking Introduction

CSCI Topics: Internet Programming Fall 2008

Lecture 8. TCP/IP Transport Layer (2)

Congestion Control. Principles of Congestion Control. Network assisted congestion. Asynchronous Transfer Mode. Computer Networks 10/23/2013

Master Course Computer Networks IN2097

Flow and Congestion Control (Hosts)

CSCD 330 Network Programming Winter 2015

Mid Term Exam Results

TCP congestion control:

CSCI Topics: Internet Programming Fall 2008

Transport Layer PREPARED BY AHMED ABDEL-RAOUF

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, Development of reliable protocol Sliding window protocols

CC451 Computer Networks

Outline. TCP: Overview RFCs: 793, 1122, 1323, 2018, steam: r Development of reliable protocol r Sliding window protocols

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

CS321: Computer Networks Congestion Control in TCP

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Chapter 3- parte B outline

TCP reliable data transfer. Chapter 3 outline. TCP sender events: TCP sender (simplified) TCP: retransmission scenarios. TCP: retransmission scenarios

Correcting mistakes. TCP: Overview RFCs: 793, 1122, 1323, 2018, TCP seq. # s and ACKs. GBN in action. TCP segment structure

CS3600 SYSTEMS AND NETWORKS

CSC 8560 Computer Networks: TCP

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Application. Transport. Network. Link. Physical

Master Course Computer Networks IN2097

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

CS4700/CS5700 Fundamentals of Computer Networks

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Recap. TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness

cs/ee 143 Communication Networks

ADVANCED COMPUTER NETWORKS

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

CSCD 330 Network Programming Spring 2018 Lecture 11a Transport Layer

Principles of congestion control

Chapter III: Transport Layer

Chapter 3 Transport Layer

Flow and Congestion Control Marcos Vieira

CSCI-1680 Transport Layer II Data over TCP Rodrigo Fonseca

TCP: Overview RFCs: 793, 1122, 1323, 2018, 2581

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri

Detecting half-open connections. Observed TCP problems

Transport Protocols and TCP

The Transport Layer Congestion control in TCP

CS 356: Introduction to Computer Networks. Lecture 16: Transmission Control Protocol (TCP) Chap. 5.2, 6.3. Xiaowei Yang

Data Center TCP(DCTCP)

COMP/ELEC 429/556 Introduction to Computer Networks

Congestion Collapse in the 1980s

image 3.8 KB Figure 1.6: Example Web Page

Lecture 15: Transport Layer Congestion Control

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

TCP so far Computer Networking Outline. How Was TCP Able to Evolve

CSE 461. TCP and network congestion

Go-Back-N. Pipelining: increased utilization. Pipelined protocols. GBN: sender extended FSM

Congestion / Flow Control in TCP

TCP: Overview RFCs: 793,1122,1323, 2018, 2581

Lecture 14: Congestion Control"

Overview. TCP congestion control Computer Networking. TCP modern loss recovery. TCP modeling. TCP Congestion Control AIMD

Lecture 4: Congestion Control

TCP Congestion Control

CSC 401 Data and Computer Communications Networks

15-744: Computer Networking TCP

Fall 2012: FCM 708 Bridge Foundation I

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data?

Advanced Computer Networks

Transport protocols. Transport Layer 3-1

CS Networks and Distributed Systems. Lecture 10: Congestion Control

Transport Layer (Congestion Control)

Fast Retransmit. Problem: coarsegrain. timeouts lead to idle periods Fast retransmit: use duplicate ACKs to trigger retransmission

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2017

Communication Networks

Congestion Control in Datacenters. Ahmed Saeed

ECE 333: Introduction to Communication Networks Fall 2001

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

Part1: Lecture 2! TCP congestion control!

Flow and Congestion Control

Wireless TCP Performance Issues

Outline. User Datagram Protocol (UDP) Transmission Control Protocol (TCP) Transport layer (cont.) Transport layer. Background UDP.

CSE 123A Computer Networks

Congestion Control in TCP

What is Congestion? Congestion: Moral of the Story. TCP Approach. Transport Layer: TCP Congestion Control & Buffer Management

8. TCP Congestion Control

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2017

Transcription:

Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and Services Department of Computer Science Technische Universität München http://www.net.in.tum.de

Outline q Transport Layer TCP congestion control TCP variants TCP throughput formula Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 2

Congestion Control Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 3

Approaches Towards Congestion Control Two broad approaches towards congestion control: End-end congestion control: q no explicit feedback from network q congestion inferred from end-system observed loss, delay q approach taken by TCP Network-assisted congestion control: q routers provide feedback to end systems single bit indicating congestion (SNA, DECbit, TCP/IP ECN, ATM) explicit rate sender should send at Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 4

Congestion Control (Van Jacobson) q Problem: the end host does not know a lot about the network. It only knows if a packet has been delivered successfully or not q Self clocking: for every segment that leaves the network we can send a new one q Assumption: packet loss only because of congestion Not true for wireless networks Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 5

TCP congestion control: additive increase, multiplicative decrease q Approach: increase transmission rate (window size), probing for usable bandwidth, until loss occurs additive increase: increase CongWin by 1 MSS every RTT until loss detected multiplicative decrease: cut CongWin in half after loss congestion window Saw tooth behavior: probing for bandwidth congestion window size 24 Kbytes 16 Kbytes 8 Kbytes time Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 6

TCP Congestion Control: Details q sender limits transmission: LastByteSent-LastByteAcked q Roughly, rate = CongWin CongWin RTT Bytes/sec q CongWin is dynamic, function of perceived network congestion How does sender perceive congestion? q loss event = timeout or 3 duplicate acks q TCP sender reduces rate (CongWin) after loss event three mechanisms: AIMD slow start conservative after timeout events Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 7

TCP Slow Start q When connection begins, CongWin = 1 MSS Example: MSS = 500 bytes & RTT = 200 msec initial rate = 20 kbps q available bandwidth may be >> MSS/RTT desirable to quickly ramp up to respectable rate q When connection begins, increase rate exponentially fast until first loss event Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 8

TCP Slow Start (more) q When connection begins, increase rate exponentially until first loss event: double CongWin every RTT done by incrementing CongWin for every ACK received q Summary: initial rate is slow but ramps up exponentially fast RTT Host A Host B one segment two segments four segments time Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 9

Refinement: Inferring Loss q After 3 dup ACKs: CongWin is cut in half window then grows linearly q But after timeout event: CongWin instead set to 1 MSS; window then grows exponentially to a threshold, then grows linearly Philosophy: q 3 dup ACKs indicates network capable of delivering some segments q timeout indicates a more alarming congestion scenario Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 10

Refinement q Q: When should the exponential increase switch to linear? q A: When CongWin gets to 1/2 of its value before timeout. Implementation: q Variable Threshold q At loss event, Threshold is set to 1/2 of CongWin just before loss event Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 11

TCP Congestion Control Without Fast Retransmit 44 Slow start algorithm of TCP 40 36 32 Threshold Timeout Congestion-Avoidance + 1 per ACK windowsize (1 per RTT) CWND size 28 24 20 16 Slow-Start + 1 per ACK Threshold SSTHRESH 12 8 4 0 2 4 6 8 10 12 14 16 18 20 22 24 Round-trips Here the window size is measured in number of packets Real TCP uses bytes. Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 12

Slow Start CWND in Segments 1. Segment 1 is sent 2. The ACK for segment 1 is received, CWND+=1 (now 2) Segments 2 and 3 are sent out 3. The ACK for segments 2+3 are received, CWND+=2 (now 4), Segments 4-7 are sent out 4. The ACK for segments 4-7 are received, CWND+=4 (now 8), Segments 8-15 are sent out 5. The ACK for segments 8 and 9 are received, Packets 10-15 got lost on their way CWND+=2 (now 10), segments 16-19 are sent and get lost No more ACKs are received è Timeout. t in RTTs q Basic idea: packet loss indicates congestion q Algorithm slowly approaches the limit Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 13

Slow Start and Congestion Avoidance Situation: CWND was 10 è set SSTHRESH = 10 / 2 = 5 last acked segment 9 è continue with 10 1. Slow Start till CWND = SSTHRESH 2. Afterwards CWND is increased by 1 per Round-Trip time. CWND in Segments t in RTTs Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 14

Fast Retransmit Situation: Segment 39 was lost. CWND is 8, segments 40-46 (7 packets) can be sent without waiting for the ACK for segment 39 CWND in Segments 1. Segment 40 arrives at the receiver and is buffered. Since it is waiting for 39, the receiver resends the ACK for packet 39 2. Segments 41 and 42 arrive. The receiver sends the ACK for 39 two times 3. Now the sender received 4 ACKs for packet 39 (1x original for packet 38, 3x duplicate). It assumes that segement 39 is missing but all other packets made their way (no complete congestion). Thus it retransmits segment 39 without waiting for a timeout t in RTTs Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 15

Fast Recovery I Situation: Segment 39 was lost and re-transmitted, it will take a whole RTT until it s ACK arrives à stall! Segments 40-46 were already sent. CWND is 8, so with the regular rules, the sender would have to wait for the right ACK before being allowed to send any more data. CWND in SMSS 3 duplicate ACKs were received so far (corresponding to packet 40, 41, 42). As the sender still receives ACKs it can tell that the congestion is not too bad at least the line is not so congested that nothing comes through. Hope: Maybe only a single segment was lost. Each arriving duplicate ACK means, that one packet has arrived at the receiver, so there is one less packet currently in transit. Idea of fast Recovery: t in RTTs - Congestion is there but not too bad à Reduce the Window by 50% - Then keep the number of segments in transit equal to the new window size even though there are no new ACKs (Compare Jacobson s Self-Clocking). Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 16

Fast Recovery II CWND in SMSS 1. The sender reduces the congestion window by 50% (window size: 4, segments: 39-42). This is the amount of data that we want to have in transit for now. 2. It adds 3 for the 3 duplicate ACKs it has received è those packets have already left the network. (window size: 7, segments: 39-45) 3. The next duplicate ACK arrives. CWND is increased by 1 (window size: 8, segments: 39-46). 4. Another duplicate ACK arrives. CWND is increased by 1 (window size: 9, segments: 39-47). The sender is allowed to send a new segment! 5. One more duplicate ACK arrives. CWND is increased by 1 (window size: 10, segments: 39-48). The sender is allowed to send a new segment! t in RTTs 7. The ACK for segment 39 arrives (actually it is a cummulative ACK for segment 46). The sender remembers the value of CWND before starting fast retransmit. CWND is set to half of the old value. 8. The sender continues with Congestion Avoidance. (window size: 4, segments 47-50) Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 17

Summary: TCP Congestion Control q q q q When CongWin is below Threshold, sender in slow-start phase, window grows exponentially. When CongWin is above Threshold, sender is in congestionavoidance phase, window grows linearly. When a triple duplicate ACK occurs, Threshold set to CongWin/2 and CongWin set to Threshold. When timeout occurs, Threshold set to CongWin/2 and CongWin is set to 1 MSS. Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 18

TCP Sender Congestion Control State Event TCP Sender Action Commentary Slow Start (SS) ACK receipt for previously unacked data CongWin := CongWin + MSS, If (CongWin > Threshold) set state to Congestion Avoidance Resulting in a doubling of CongWin every RTT Congestion Avoidance (CA) ACK receipt for previously unacked data CongWin := CongWin+MSS * (MSS/CongWin) Additive increase, resulting in increase of CongWin by 1 MSS every RTT SS or CA Loss event detected by triple duplicate ACK Threshold := CongWin/2, CongWin := Threshold, Set state to Congestion Avoidance Fast recovery, implementing multiplicative decrease. CongWin will not drop below 1 MSS. SS or CA Timeout Threshold := CongWin/2, CongWin := 1 MSS, Set state to Slow Start SS or CA Duplicate ACK Increment duplicate ACK count for segment being acked Enter slow start CongWin and Threshold not changed Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 19

TCP summary q Connection-oriented: SYN, SYNACK; FIN q Retransmit lost packets; in-order data: sequence no., ACK no. q ACKs: either piggybacked, or no-data pure ACK packets if no data travelling in other direction q Don t overload receiver: rwin rwin advertised by receiver q Don t overload network: cwin cwin affected by receiving ACKs q Sender buffer = min { rwin, cwin } q Congestion control: Slow start: exponential growth of cwin Congestion avoidance: linear groth of cwin Timeout; duplicate ACK: shrink cwin q Continuously adjust RTT estimation Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 20

TCP Fairness Fairness goal: if K TCP sessions share same bottleneck link of bandwidth R, each should have average rate of R/K TCP connection 1 TCP connection 2 bottleneck router capacity R Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 21

Why is TCP fair? Two competing sessions: q Additive increase gives slope of 1, as throughout increases q multiplicative decrease decreases throughput proportionally R equal bandwidth share Connection 2 throughput loss: decrease window by factor of 2 congestion avoidance: additive increase loss: decrease window by factor of 2 congestion avoidance: additive increase Connection 1 throughput R Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 22

Fairness (more) Fairness and UDP q Multimedia apps often do not use TCP do not want rate throttled by congestion control q Instead use UDP: pump audio/video at constant rate, tolerate packet loss q Research area: TCP friendly Fairness and parallel TCP connections q nothing prevents app from opening parallel connections between 2 hosts. q Web browsers do this q Example: link of rate R supporting 9 connections; new app asks for 1 TCP, gets rate R/10 new app asks for 11 TCPs, gets ~ R/2! Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 23

Advanced Topics q Buffer Bloat q TCP variants TCP with ECN TCP for high bandwidth long distance connections q TCP Throughput Formula Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 24

TCP and Buffer Bloat q q Capacities of router queues Large queue = good: Less packet losses at bottlenecks Do you agree? What would happen to TCP? Effects of large buffers at bottleneck on TCP connections Once queues are full: Queueing delays increase dramatically TCP congestion control gets no early warning No duplicate ACKS ð no Fast Retransmit Instead: Sudden timeouts Congestion windows way too large Many parallel TCP connections over same link get warning way too late Synchronisation: Oscillation between All send way too much and all get frightened by timeouts and send way too little Huge variations in queueing delays ð DevRTT becomes very large ð Timeout value becomes very large Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 25

Buffer bloat is a real-world problem Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 26

TCP with ECN q 2 bits can be used for congestion notification: Explicit Congestion Notification (ECN), RFC 3168 00 Non ECN-Capable Transport, Non-ECT 10 ECN Capable Transport, ECT(0) 01 ECN Capable Transport, ECT(1) 11 Congestion Encountered, CE Bit 0 3 7 15 31 Version Hdr.Len DSCP CU Total Length Identifier Flags Fragment Offset Time to Live Protocol Header Checksum 32 bit IP Source Address 32 bit IP Destination Address Options and Padding (if any) Data (variable length, e.g. TCP or UDP segment,...) IP Header Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 27

ECN Operation q q q Network layer with ECN Endpoints supporting ECN mark packets with ECT(0) or ECT(1) Routers that experience congestion rewrite ECN field to CE TCP with ECN TCP endpoints negotiate ECN at connection setup (ECN option) TCP reacts to CE as if packet is lost Three flags in the TCP header ECN-Echo (ECE): echoing back Congestion Experienced Congestion Window Reduced (CWR) OS support Linux: ECN by default is enabled when requested by incoming connections, it is not requested on outgoing connections BSD: can be activated through the sysctl interface Windows support: since Windows Server 2008, Windows Vista (disabled by default) Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 28

Data Center TCP (DCTCP) q Enhancement of TCP congestion control algorithm for data center networks q Switch marks fraction of packets corresponding to extent of congestion q DCTCP sources estimate the and react to the extent of congestion, not just the presence of congestion as in TCP q Publication Data Center TCP (DCTCP): Mohammad Alizadeh, Balaji Prabhakar (Stanford University), Albert Greenberg, David A. Maltz, Jitendra Padhye, Parveen Patel, Sudipta Sengupta, and Murari Sridharan (Microsoft Research), ACM SIGCOMM 2010 http://simula.stanford.edu/~alizade/site/dctcp.html Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 29

TCP for High Bandwidth Long Distance Connections q Several transport protocol variants for high bandwidth long distance connections (LFNs - Long Fat Networks) exist q Frequent property Effectively use available bandwidth Unfriendly doesn t play nicely with others Unfair to different RTT flows achieves better performance than standard TCP is not fair to standard TCP q General approaches for congestion control loss-based: NewReno, CUBIC delay-based: Vegas, CAIA Delay Gradiant (CDG) Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 30

TCP Reno q TCP Fast Recovery algorithm described in RFC 2581 q Implementation introduced 1990 in BSD Reno release q Behaviour sender only retransmits a packet after a retransmit timeout has occurred or after three duplicate acknowledgements have arrived triggering the Fast Retransmit algorithm. a single retransmit timeout might result in the retransmission of several data packets each invocation of the Fast Retransmit algorithm leads to retransmission of only a single data packet problems may arrive when multiple packets are dropped from a single window Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 31

TCP NewReno q c.f. RFC 3782 - April 2004, Proposed Standard q careful variant of Experimental RFC 2582 NewReno as default q Properties addresses problems that may arrive when multiple packets are dropped from a single window with multiple packet drops, acknowledgement for retransmitted packet acks some but not all packets transmitted before the Fast Retransmit ð partial acknowledgment Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 32

TCP Vegas q TCP Vegas by Lawrence Brakmo, Sean W. O'Malley, Larry L. Peterson at University of Arizona published at SIGCOMM 1994 q Properties delay-based congestion control uses i th RTT > min RTT + delay threshold, delay measured every RTT Additive Increase Additive Decrease (AIAD) to adjust cwnd q Properties implementations available for Linux and BSD Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 33

TCP CUBIC q CUBIC Loss-based congestion control optimised for high bandwidth, high latency q Properties modified window-growth-control algorithm window grows slowly around W max fast probing growth away from W max Standard TCP outperforms CUBIC s window growth function in short RTT networks. CUBIC emulates standard (time-independent) TCP window adjustment algorithm, select the greater of the two windows (emulated versus cubic) q Implemenation: in Linux since kernel 2.6.19, in FreeBSD 8-STABLE Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 34

Delay Gradient TCP q D. Hayes, G. Armitage, "Revisiting TCP Congestion Control using Delay Gradients," IFIP/TC6 NETWORKING 2011, Valencia, Spain, 9-13 May 2011 http://caia.swin.edu.au/cv/dahayes/content/networking2011-cdgpreprint.pdf q CDG ( CAIA Delay-Gradient ) modified TCP sender behaviour: uses delay gradient as a congestion indicator has average probability of back off independent of RTT works with loss-based congestion control flows, eg NewReno tolerates non-congestion packet loss, and backoff for congestion related packet loss Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 35

Multipath TCP q q q q q IETF Working Group Multipath TCP (mptcp) Key goals deployable and usable without significant changes to existing Internet infrastructure usable by unmodified applications stable and congestion-safe, including NAT interactions Objectives a. An architectural framework for congestion-dependent multipath transport protocols b. A security threat analysis for multipath TCP c. A coupled multipath-aware congestion control algorithm d. Multi-addressed multipath extensions to current TCP e. Application interface considerations TCP Extensions for Multipath Operation with Multiple Addresses, RFC6824 MPTCP Application Interface, RFC6897 Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 36

Advanced Topics q Buffer Bloat q TCP variants TCP with ECN TCP for high bandwidth long distance connections q TCP throughput formula possible usages include: TCP-friendly application with UDP Detection of TCP-unfriendly Flows Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 37

TCP throughput q What s the average throughout of TCP as a function of window size and rtt? Ignore slow start q Let W be the window size when loss occurs. q When window is W, throughput is W/rtt q Just after loss, window drops to W/2, throughput to W/2rtt. ð Average throughout: 0.75 W/rtt W TCP window size W/2 loss occurs time (rtt) Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 38

TCP throughput/loss relationship W TCP window size W/2 loss occurs q Idealized model: W is maximum supportable window size (then loss occurs) TCP window starts at W/2 grows to W, then halves, then grows to W, then halves one window worth of packets each RTT to find: throughput as function of loss, RTT time (rtt) Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 39

Network Security, WS 2008/09, Chapter 9 40 IN2097 - Master Course Computer Networks, WS 2013/2014 40 TCP throughput/loss relationship TCP window size time (rtt) W/2 W period = + = + + + + 2 / 0 ) 2 (... 1 2 2 W n n W W W W = + + = 2 / 0 2 1 2 W n n W W 2 1) 2 / 2( / 2 1 2 + + + = W W W W W 4 3 W 8 3 2 + = # packets sent per period = 2 8 3 W

TCP throughput/loss relationship W TCP window size W/2 period time (rtt) 3 # packets sent per period W 8 1 packet lost per period implies: 8 3W p loss 2 or: W B = avg._thrup ut = B = avg._thruput = = 3 8 p loss 3 packets W 4 rtt 1.22 packets rtt p loss B throughput formula can be extended to model timeouts and slow start 2 Network IN2097 - Master Security, Course WS 2008/09, Computer Chapter Networks, 9 WS 2013/2014 41