Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures

Similar documents
UNIT IV -- TRANSPORT LAYER

Computer Networking Introduction

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

An Efficient Rerouting Scheme for MPLS-Based Recovery and Its Performance Evaluation

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

User Datagram Protocol (UDP):

Lecture 4: Congestion Control

Data Transport over IP Networks

Comparative Analysis of Signaling Protocols in Mpls- Traffic Engineering

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54

Chapter III: Transport Layer

Programming Assignment 3: Transmission Control Protocol

Introduction to Protocols

ECE697AA Lecture 3. Today s lecture

Improving the usage of Network Resources using MPLS Traffic Engineering (TE)

Transport Layer PREPARED BY AHMED ABDEL-RAOUF

TCP/IP-2. Transmission control protocol:

TCP/IP. Chapter 5: Transport Layer TCP/IP Protocols

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

PERFORMANCE COMPARISON OF THE DIFFERENT STREAMS IN A TCP BOTTLENECK LINK IN THE PRESENCE OF BACKGROUND TRAFFIC IN A DATA CENTER

SYSC 5801 Protection and Restoration

CS 640 Introduction to Computer Networks Spring 2009

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service

05 Transmission Control Protocol (TCP)

TCP Congestion Control

TCP Congestion Control

Multi Protocol Label Switching (an introduction) Karst Koymans. Thursday, March 12, 2015

A Comparison Of MPLS Traffic Engineering Initiatives. Robert Pulley & Peter Christensen

User Datagram Protocol

LDP Fast Reroute using LDP Downstream On Demand. 1. Problem: 2. Summary: 3. Description:

BrainDumps.4A0-103,230.Questions

Applied Networks & Security

Connectionless and Connection-Oriented Protocols OSI Layer 4 Common feature: Multiplexing Using. The Transmission Control Protocol (TCP)

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

LARGE SCALE IP ROUTING LECTURE BY SEBASTIAN GRAF

UNIT IV TRANSPORT LAYER

6 MPLS Model User Guide

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

Different Layers Lecture 20

8. TCP Congestion Control

Managing Caching Performance and Differentiated Services

MMPLS: Modified Multi Protocol Label Switching

Protection Switching and Rerouting in MPLS

Lecture (11) OSI layer 4 protocols TCP/UDP protocols

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

Chapter 3 Review Questions

Problem 7. Problem 8. Problem 9

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP

MPLS Intro. Cosmin Dumitru March 14, University of Amsterdam System and Network Engineering Research Group ...

CSCI Topics: Internet Programming Fall 2008

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Wireless TCP Performance Issues

Internet Networking recitation #10 TCP New Reno Vs. Reno

Table of Contents. Cisco MPLS FAQ For Beginners

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP

Transport Layer Protocols TCP

PLEASE READ CAREFULLY BEFORE YOU START

TCP Congestion Control

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Chapter 3 Transport Layer

Vendor: Alcatel-Lucent. Exam Code: 4A Exam Name: Alcatel-Lucent Multiprotocol Label Switching. Version: Demo

TSIN02 - Internetworking

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

The Transport Layer Congestion control in TCP

ETSF05/ETSF10 Internet Protocols Transport Layer Protocols

ENRICHMENT OF SACK TCP PERFORMANCE BY DELAYING FAST RECOVERY Mr. R. D. Mehta 1, Dr. C. H. Vithalani 2, Dr. N. N. Jani 3

TCP Congestion Control in Wired and Wireless networks

image 3.8 KB Figure 1.6: Example Web Page

Transport layer issues

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

CS321: Computer Networks Congestion Control in TCP

UDP, TCP, IP multicast

Multiprotocol Label Switching (MPLS) on Cisco Routers

Operation Manual MPLS. Table of Contents

Alcatel-Lucent 4A Alcatel-Lucent Scalable IP Networks. Download Full Version :

Sequence Number. Acknowledgment Number. Data

Network Protocols. Transmission Control Protocol (TCP) TDC375 Autumn 2009/10 John Kristoff DePaul University 1

Performance Analysis of TCP Variants

4.0.1 CHAPTER INTRODUCTION

TCP over wireless links

II. Principles of Computer Communications Network and Transport Layer

August AppleTalk tunneling, which allows AppleTalk data to pass through foreign networks and over point-to-point links

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Syed Mehar Ali Shah 1 and Bhaskar Reddy Muvva Vijay 2* 1-

CS High Speed Networks. Dr.G.A.Sathish Kumar Professor EC

Lecture 3: The Transport Layer: UDP and TCP

Chapter 3 outline. 3.5 Connection-oriented transport: TCP. 3.6 Principles of congestion control 3.7 TCP congestion control

Lecture - 14 Transport Layer IV (Reliability)

23-3 TCP. Topics discussed in this section: TCP Services TCP Features Segment A TCP Connection Flow Control Error Control 23.22

TSIN02 - Internetworking

Performance Analysis of TCP LBA and TCP TAHOE Approaches in g Standard Savreet KaurBrar 1, Sandeep Singh Kang 2

Announcements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

Chapter 24. Transport-Layer Protocols

MPLS OAM Technology White Paper

Transcription:

Journal of Computer Science 5 (12): 1042-1047, 2009 ISSN 1549-3636 2009 Science Publications Comparison Study of Transmission Control Protocol and User Datagram Protocol Behavior over Multi-Protocol Label Switching Networks in Case of Failures Taha Ahmed Al-Radaei and Zuriati Ahmad Zukarnain Department of Communication Technology and Network, University Putra Malaysia, 43300 Serdang Selangor, Malaysia Abstract: Problem statement: In only a few years, Multi-Protocol Label Switching (MPLS) has evolved from an exotic technology to a mainstream tool used by service providers to create revenuegenerating services. MPLS provides a high reliable Label Switched Path (LSP). MPLS failures may degrade the reliability of the MPLS networks. Approach: For that reason, many studies have been conducted to keep the high reliability and survivability of the MPLS networks. Unlike User Datagram Protocol (UDP), Transmission Control Protocol does not perform well in case of like-failure of MPLS networks because of its inability to distinguish packet loss due to link-failure. After the recovery time, TCP takes longer time than UDP to continue as it was before the failure. Results: In terms of packet loss, TCP performs better than UDP. However, the receiving rate of the TCP traffic is much worse than UDP traffic. A need for a mechanism to improve the behavior of TCP after a link failure is needed. This study focused on comparing the behavior of different types TCP as well as UDP traffic over MPLS networks in case of link, node or congestion failures. Conclusion: Although extensions of RSVP-TE protocol support fast recovery mechanism of MPLS networks, the behavior of TCP will be affected during recovery time much more than with UDP. Key words: MPLS, TCP, UDP, failures INTRODUCTION As needs for the speed and quality of service grow to carry more traffic, it is essential to maintain a high level of performance and efficiency. Traffic engineering is the process of optimization of the network to maximize performance and efficiency. MPLS is a tool for network traffic engineering and hence becoming the technology of choice for internet backbone. An MPLS network consists of two domains known as a Label Edge Routers (LERs) domain and Label Switching Routers (LSRs). A mish unidirectional tunnels, known as Label Switched Paths (LSPs) is built between the LERs and LSRs in order that a packet entering the network at the ingress LER can be transported to appropriate egress LER. Forwarding mechanism of the packets in the MPLS is carried based on fixed size labels, the path that packets traverse is pre-established according to required constraints. The path the packet traverses is called Label Switch Path (LSP). Regarding to the label distribution there are two protocols used for this propose called Label Distribution Path (LDP) and Resource Reservation Protocol (RSVP). RSVP was invented before MPLS came into being and was originally devised as a scheme to create bandwidth reservations for individual traffic flows in networks. RSVP includes mechanisms for reserving bandwidth along each hop of a network for an end-toend session. In context of MPLS, RSVP has been extended to allow it to be used for creation and maintenance of LSPs [RFC3209]. However, links failure or LSR failure always incurs performance degradation and packet loss in connection passing through the link or LSR to. A fast recovery mechanism is needed to support a high quality of service and to keep the reliability of the MPLS networks which is considered as one of the most important features of the MPLS [1]. Based on the recovery location, there two types of recovery, global and local protection. Global protection is accomplished by setting up an alternate path that can be used in case of failure of the working path or any LSR in the working path. Local protection is accomplished by setting up protection path around the failed link or node. In general, on Wide Area Networks (WANs), UDP has likely been used for real-time applications, such as video and audio. UDP supplies minimized transmission Corresponding Author: Taha Ahmed Al-Radaei, Department of Computer Science and Information Technology, University Putra Malaysia, 43300 Serdang Selangor, Malaysia 1042

delay by omitting the connection setup process, flow control and retransmission. Meanwhile, more than 80 percent of the WAN resources are occupied by Transmission Control Protocol (TCP) traffic. As opposed to UDP's simplicity, TCP adopts a unique flow control mechanism with sliding windows. Hence, the Quality of Service (QoS) of real-time applications using UDP is affected by TCP traffic and its flow control mechanism whenever TCP and UDP share the same network resources [2]. Many researches have been conducted for improve the protection mechanisms of MPLS networks using a UDP traffic [3,4]. However, study the behavior of TCP and UDP traffic over MPLS networks in case of failure is an essential issue for fast failure detection and recovery. In this study we focused on comparing the behavior of TCP and UDP traffic over MPLS in case of any failure and what are the parameters that effect the recovery time. The label distribution path used in this study is RSVP that is defined in [6]. RSVP-TE extensions are used to establish the backup label switch path LSP tunnels for local repair of LSP tunnels. These mechanisms enable the re-direction of traffic onto backup LSP tunnels in 10 sec of milliseconds, in the event of a failure [6]. Two methods are defined in these extensions one-to-one and facility backup. We adopted the facility backup in this paper. MPLS supports label stacking which is the encapsulation of an MPLS packet inside another MPLS packet that is, adding an MPLS header on top of an existing MPLS header as in Fig. 1. The result of stacking is the ability to tunnel one MPLS LSP inside another LSP. Instead of creating a separate LSP for every backed-up LSP, a single LSP is created that serves to back up a set of LSPs (LSP tunnel a bypass tunnel). The bypass tunnel must intersect the path of the working LSP(s) somewhere downstream of the point of local repair PLR. The two paths are composed of the transmitting path that carries TCP packets and the receiving path that carries the ACK packets. The transmitting path also carries the UDP packets in case of UDP traffic. We assumed that when a failure occurred in any working path, both the transmitting and receiving paths are switched to the backup path. Path switching for both the working and the backup paths is the responsibility of the path label-switching router PSL. Each label-switching router LSR monitors the link state upstream, when an LSR detects a failure; it sends a notification message to the PSL. When the PSL receives the notification message, it switches the traffic from the working path to the backup path. The recovery time is effected by the detection time, notification time and the switching (failover) time. J. Computer Sci., 5 (12): 1042-1047, 2009 1043 Fig. 1: MPLS label stacking Fig. 2: TCP slow-start 1 Segment 2 Segments 4 Segments Even though TCP and UDP use the same network layer (IP), TCP provides a totally different service to the application layer than UDP does. TCP provides a connection-oriented, reliable, byte stream service. TCP relies on acknowledgments from the receiver to confirm correct delivery of data. The flow control implemented in TCP prevents an overflow at the receiver by adapting the advertised window dynamically to the receiver buffer space. However, this flow control does not cope with the buffer overflows in the intermediate network nodes. To deal with network congestion, congestion control mechanisms have been implemented in TCP. In TCP, the sender starts the transmission with an initial congestion window of one segment, the congestion window can be initialized to two or four segments. Once the sender receives the acknowledgement of the transmitted segment, it increases the congestion window by one segment. As the sender receives acknowledgments of the transmitted segments, it increases the congestion window by one segment for each acknowledgement received. This procedure continues until a loss is detected, either by triple duplicate or a retransmission timeout, or until the window size reaches a threshold called slow-start threshold (Fig. 2). When a link fails and path protection is executed, there are four possibilities that the TCP packet or ACK packet can pass or drop based on the failure timing. As shown in Fig. 3 and Fig. 4, the failure occurred when the packet has been left the sender and it is on the path to the receiver. In Fig. 3 the packet will pass and reach the destination successfully.

Fig. 3: The packet will pass Fig. 5: The ACK pass ACK ACK Fig. 4: The packet will drop In Fig. 4 the packet will be dropped on the working path because the protection has not been completed. However, in some recovery mechanisms like Haskin s model, this packet will be reversed back to ingress router and forward it to the backup path. The sender will not receive the related ACK for this packet and will retransmit the packet again after the timeout timer finish. The other two possibilities are when the receiver send ACK packet to the sender. If the ACK pass the failure location, it will reach to the sender as illustrated in Fig. 5. Otherwise the ACK will drop as in Fig. 6. Once a segment loss occurs, the behavior of TCP depends on how this loss is detected by a triple duplicate or a timeout. When the timer expires before receiving an acknowledgment, TCP interprets this phenomenon as a severe congestion in the network. The network is overloaded and the transmitted segments are lost, which implies retransmission of the segments and a brutal reduction of the congestion window. The earliest unacknowledged segment is then retransmitted. In addition, the congestion window CWND is set to the value of the so-called Loss Window (LW), which in general equals to its initial value. When a loss is detected by triple duplicate ACK, TCP interprets this phenomenon as congestion in the Fig. 6: The ACK drop network and the lost segment is retransmitted. Because of the TCP flow control and congestion control, TCP needs some time to reach the steady-state in case of failure although the recovery time in MPLS is very short. And this degrades the receiving rate in the receiver side. Unlike TCP, UDP is a connectionless, unreliable. All UDP provides is a mechanism for the application to send a short message to a given destination. However, in case of UDP, the sender will not stop sending the packets in case of failure. And it will continue sending the packet causing a packet loss much more than in case of TCP. MATERIALS AND METHODS NS2 [7] was employed as the experimental platform in our simulation. The RSVP-TE was used as label distribution. The topology used in our simulation (Fig. 7) is a typical one for MPLS networks and has been used in a number of studies. All the nodes in the topology are LSR. The thick lines are 20 Mbps and the thin lines are 10 Mbps. The source node is node 0 and the destination node is node 12. The working path is 0-2-5-10-12. A link failure has been assumed between node 2 and node 5 at time t = 10. Traffic flows begin to transmit at time t = 2 and stop at t = 20. 1044

1 4 11 0 2 5 10 12 6 9 13 3 8 14 7 Fig. 7: Network topology To compare and study the performance of the TCP and UDP traffic over MPLS networks in case of failure, we run the simulation once with TCP traffic and the other time with UDP traffic. For each traffic, we run the simulation with different transmission rate. At time t = 0 node 0 sent an RSVP path message downstream along the working path 0-2-5-10-12. Path messages follow the exact paths of application data, creating path states in the routers along the way, thus enabling routers to learn the previous hop and next-hop node for the session. After the failure occurred at time 10, a Path error messages was sent to the sender that issued the Path message node 0. As a result, the traffic rerouted to backup path. RESULTS Fig. 8: Packet Losses in different transmission rate Fig. 9: UDP receiving rate UDP traffic has been used in the first scenario of the simulation. The source node 0 started sending the packets at time 2. At time 10 a failure occurred and the source node did not stop sending the packets after detecting the failure. This is because the UDP is not reliable so it will not wait for the acknowledgments of the packets that have been received. Whereas in TCP, when the failure, the source node will stop sending the packets to wait for the received packets acknowledgments. Figure 8 shows the number of lost packets in case of TCP and UDP traffics with different transmission rate. Fig. 10: TCP receiving rate The number of packet losses is increase with the increasing of the transmission rate of the UDP traffic. reroute, number UDP packets were lost. There is no change in the receiving rate performance before the However, the number of packet losses in TCP is failure and after the recovery. This is because of the constant although the transmission rate increases. continuity of sending packets during the transmission Figure 9 shows the receiving rate at node 12 for time and need lack of the acknowledgment. UDP traffic. At time 10 sec, we can note the drop of the Figure 10 shows the receiving rate at the receiver receiving rate due to the link failure. During the period side (node 12). The failure has a noticeably effect of the of the failure detection, failure notification and traffic TCP receiving rate during the recovery time and after 1045

Fig. 11: Receiving Rate for both UDP and TCP the recovery time. During the period needed to detect, notify and recover the failure, the receiving rate degraded to 0 Mbps. This is because the TCP source has stopped sending the packets waiting for the acknowledgments coming from the receiver while the ACKs packets also affected by the failure. After the recovery time, TCP multiplicatively decreased its congestion window size and needed sometime to return back to the previous congestion window size. As the traffic reroute to the backup path, TCP receiving rate suddenly has been affected by the parameters of the backup path. Figure 11 shows the differences between TCP and UDP traffic performance before, during and after the recovery time. Also we compare the number of packets sent with and without failure for both TCP and UDP during the same simulation time. Simulation results show that the number of TCP packet sent without failure were 4162. This number increased to 4404 in case of failure. The percentage of the retransmitted packets is 5.81%. Unlike TCP, UDP traffic source is remained with the same number of sent packets (21429) in case of failure as well as without the failure during the same simulation time. DISCUSSION From the results above, we can see that TCP performs better than UDP in terms of the number of packet losses when the transmission rate increases. However, TCP does not perform well in terms of receiving rate because of its inability to distinguish packet loss due to link-failure or congestion. This leads TCP to start send the data packet with a small window size not resume sending the packet with same window size as it was before the failure although, the failure restoration take few milliseconds. The increment percentage of transmitted packet with failure in TCP comparing with when no failure is caused by the TCP retransmission mechanism. MPLS network may carry a huge number of LSPs and a single failure in the network may cause all the TCP traffic sources to retransmit a huge number of packets causing a congestion and consumption of network resources.a need for a mechanism for the TCP to distinguish the packet loss due to the link failure and resume sending the data packets with same parameters of the window size and start slow threshold is needed to avoid the degradation of the performance of TCP after the failure restoration stage. CONCLUSION Simulation results show that the high reliability of MPLS networks can survivability may degrade because of only one link or node failure in the network. In addition, after repairing the failure, more network resources are consume because of the retransmission mechanism of the TCP which is represent more than 80% of the internet traffic. A good MPLS network design may avoid the sudden changes of the traffic after the process of recovery. UDP traffic has not affected much by the failure but, the number of lost packets increased by the increasing the transmission rate. However, TCP traffic has a constant packet loss in any value of the transmission rate. TCP performs better than UDP in terms of the number of packet loss. UDP performs better than TCP in terms of consumption of network resources. Our future research is to study the behavior of different TCP traffic in MPLS networks. REFERENCES 1. Minei, I. and J. Lucek, 2008. MPLS-Enabled Application Emerging Developments and New Technologies. 2nd Edn., John Wiley and Sons Ltd., England, ISBN: 978-0-470-98644-8, pp: 526. 2. Tsuboi, T., H. Ueda and H. Kasai, 2005. Designing MPLS path protection networks for reduced TCP goodput degradation. http://sciencelinks.jp/jeast/article/200514/000020051405a0415504.php 3. Lai, W.K., Z.C. Zheng and C.D. Tsai, 2008. Fast reroute with pre-established bypass tunnel in MPLS. Comput. Commun., 31: 1660-1671. DOI: 10.1016/j.comcom.2007.11.008 1046

4. Ahn, G. and W. Chun, 2001. Simulation for MPLS path restoration and performance evaluation. Proceeding of the Joint 4th IEEE International Conference on ATM (ICATM 2001) and High Speed Intelligent Internet Symposium, Apr. 22-25, IEEE Xplore Press, Seoul, South Korea, pp: 32-36. DOI: 10.1109/ICATM.2001.932052 5. Pan, P., G. Swallow and A. Atlas, 2005. RFC4090- fast reroute extensions to RSVP-TE for LSP tunnels. http://www.faqs.org/rfcs/rfc4090.html 6. Adami, D., C. Callegari, D. Ceccarelli, S. Giordano and M. Pagano, 2006. Design and development of MPLS-based recovery strategies in NS2. Proceeding of the IEEE Global Telecommunications Conference, Nov. 27-Dec. 1, IEEE Xplore Press, San Francisco, CA., USA., pp: 1-5. DOI: 10.1109/GLOCOM.2006.425 7. Hassan, M. and R. Jain, 2004. High performance tcp/ip networking concepts, issues and solutions. http://www.cs.wustl.edu/~jain/books/ftp/tcp_fm.pdf 1047