Title: Novel Function Placement of Congestion Control Building Blocks in the Internet
1Novel Function Placement of Congestion Control
Building Blocks in the Internet
2Outline
- Review
- Randomized TCP
- Uncooperative Congestion Control
- virtual AQM
- Conclusions
3Congestion Control
- Internet Meltdown
- Need for congestion control.
- Congestion Avoidance and Control
- End system based techniques.
- TCP
- Network based solutions
- Active Queue Management (AQM) e.g. RED
4TCP
- Transmission Control Protocol
- Protocol used to transport data
- Source Send a packet, Receiver Acknowledge the
packet - Almost all applications (90) use TCP
- What rate to send ?
- No way of knowing what is the available bandwidth
- Probe for bandwidth
- In some time T send w packets
- If Acks for all w packets are rcvd then
- Send w1 packets next time
- Else
- Send w/2 packets
5End-System Based Solution
- TCP Drop-Tail Queuing.
- TCPs performance suffers on Drop-Tail queues.
- Synchronization
- Congestion window of different flows increase and
decrease simultaneously - Burst losses
- Bias against flows with large RTT
- Full Queues
- Phase Effects
- Only a section of flows get dropped all the time
- Lockout Effect
- Few flows monopolize the buffer space
6Active Queue Management
- Proactively Manage Queues
- Drop packet before queue overflows
- Small queues
- Probabilistic Dropping
- Introduces randomization in network
- Early Congestion Indication
- Protect TCP Flows
- CBR flows, selfish flows
- e.g. RED (and variants), REM, AVQ, CHOKe
7Random Early Drop (RED)
Head
Maxth
Minth
- avg average queue length (EWMA)
- if avg lt Minth then queue packet
- if avg gt Maxth then drop packet
- else, probabilistically drop/accept packet.
8AQM Continued
- Have parameters which require configuration
- e.g. Threshold to probabilistically drop packets
- Configuration Parameters are generally a function
of link capacity, number of flows etc. - Small operating region
- RED can perform worse than Drop-Tail queues
- AQMs are not deployed on the Internet
Problems with Drop-Tail Queues Persist
Internet Works with Drop-Tail Queues
9Review Possible Solutions
Routers
Users
Network
Some Buffer Mgmt. Scheme
What are the alternate architectural responses ?
10Proposed Solution
Edge Routers
Core Routers
Network
Users
Randomized TCP
De-couple congestion control tasks from their
placement
11Outline
- Review
- Randomized TCP
- Uncooperative Congestion Control
- virtual AQM
- Conclusions
12Randomized TCP
- Randomize the packet sending times
- ? (1x) RTT/W
- X Uniform(-1, 1)
- Always observe packet conservation
13Benefits of Randomized TCP
- End-System solution for introducing randomization
in the network - Emulates many beneficial properties of RED
- Breaks synchronization
- Spreads losses over time
- Independent losses
- Removes Phase Effects
- Removes Bias against large RTT flows
- Reduces burst losses
- Competes fairly with TCP Reno
14Randomized TCP Bias against large RTT flows
Single Bottleneck, Ideal Share Long (43),
Short(57)
15Randomized TCP Phase Effects
8 Mbps 5 ms
8 Mbps 5 ms
0.8 Mbps 100 ms
Randomized TCP removes phase effects
16Randomized TCP More Results
- Randomized TCP competes fairly with TCP Reno
- Removal of Phase Effects, Bias against large RTT
flows, synchronization - Other Single bottleneck setups
- Multi-bottleneck setups
- Even one Randomized TCP flow improves performance
- Randomized TCP reduces burst losses
- Randomized TCP improves performance of other
window based rate control schemes - Binomial Congestion Control
We can decouple management of synchronization,
phase effect, bias against large RTT flows,
burst losses from AQM design
Randomized TCP can emulate many beneficial
properties of RED
17Outline
- Review
- Randomized TCP
- Uncooperative Congestion Control
- virtual AQM
- Conclusions
18New Congestion Control Schemes
- Application needs have changed
- TCP not suitable
- Different congestion control protocols
- Real-Player, Windows Media, Quake, Half-Life etc.
- Linux, FreeBSD Boxes came along
- Make your own TCP.
- If receive w acks then put w5 packets in next
RTT - TCP send w1 packets in next RTT
- If congestion put 3w/4 packets in next RTT
- TCP send w/2 packets in next RTT
19Classification
- Responsive
- React to congestion indication by cutting down
its rate - e.g. TCP (and its variants)
- Selfish/Mis-Behaving
- Maybe
- Un-responsive
- Do not react to congestion indications
- e.g. UDP, CBR
- Selfish/Mis-Behaving
- Always
20Responsive vs Un-responsive
21Selfish Responsive Flows Impact
8 Mbps
5 ms
20 ms
20 ms
Drop Tail Queue
0.8 Mbps
0.8 Mbps
Traffic Volume Based Denial-of-Service Attack
22Possible Solutions
- Everyone uses TCP
- TCP Friendliness
- Any rate control scheme gets the same throughput
as TCP under same operating conditions. - x ? 1/sqrt(p) (x rate, p packet loss
probability) - Network Based Solutions
- Use Active Queue Management (AQM)
- e.g. Random Early Drop (RED)
- Minth, Maxth, p, Qavg
- FRED, CHOKe etc.
- Require Deployment at ALL routers
23AQM Effect of Misbehavior
8 Mbps
5 ms
20 ms
20 ms
RED Queue
0.8 Mbps
0.8 Mbps
RED Helps Though unfair sharing persists
24Other TCP Like Schemes
- TCP - Every RTT
- W(t1) W(t) ? (? 1) if no
loss - W(t1) (1-?)W(t) (? 0.5) otherwise
- Time-Invariant Schemes
- Control parameters do not change with time
- Utility function does not change with time
- Increase ?/f(W) f(W) gt 0
- Decrease (1-?)g(W) 0 lt g(W) lt 1
- TCP Friendly Schemes
- f(W)g(W) W
- Binomial Congestion Control Schemes
- Increase ?/Wk(t) , Decrease (1-?)Wl(t)
- TCP Friendly Schemes given by kl 1
25Other TCP Like Schemes
- Time Invariant Schemes
- Aggressive Selfish schemes
- ? gt 1
- ? gt 0.5
- f(W)g(W) lt W
- e.g Increase ?, Decrease ?W0.5(t)
- Time Variant Schemes
- Control Parameters change with time
- ?(t) gt 0
- ?(t) gt 0
- Increase 1/Wk(t) , Decrease Wl(t)
- k(t) l(t) 0
26Consequences..
- Users can choose their rate control scheme
- Rate Control Scheme ? rate allocation.
- Aggressive Rate Control ? More Rate
- Incentive for users to misbehave.
- But majority of users are responsible.
- Traffic-Volume based denial-of-service attack
Assume (for now) the networks standard CC
scheme is TCP Any scheme which gets more rate
than TCP is uncooperative
27Detour Congestion Control-Optimization Frameworks
- Utility Functions
- Economics
- One function can capture a group of rate control
schemes. - TCP-Friendly schemes imply
- U(x) ? -1/x
U(x)
x (Rate)
28Detour Congestion Control-Optimization Frameworks
- Users choose congestion control algorithm
- Choose a Utility Function
- TCP U(x) ? -1/x
- CC Scheme ? Utility function
- Every user maximizes his own utility function
- Distributed optimization.
- Network imposes capacity constraints
- Total input rate cannot exceed capacity
- Communicates to users the price of using link
- Price loss rate, mark (ECN), delay
- Users use this price to update their rate
29Optimization Framework TCP
Max -1/xs s.t. (?xs Cl) ? 0, for all l
- TCP tries to minimize delay
- Equilibrium allocation (fairness)
- Minimum Potential Delay Fairness
- Max-Min Fairness
- U(x) 1/xN (N?? )
- Proportional Fairness (TCP Vegas)
- U(x) log(x)
30Work in the Utility Function Space
- Key Design Objectives
- Deployment Ease
- Retain existing link price update rules.
- ? No changes in the core.
- Retain existing users rate updation rules.
- ? Allows users to chose rate control protocol.
- Should work with either drop or marking based
network. - Should work on a network of Drop Tail queues.
Map users Utility Function to Conformant Space
31How? By Penalty Function Transformation
Map users utility function to some (or range of)
objective utility function Us ? Uobj , Uobj ?
U1 , U2
- User s is described by
- xs Rate, Us Utility function, q end-to-end
price - xs Us'-1(q)
- If source was using Uobj then rate would be xs
Uobj'-1(q) - Communicate to user the price qnew qnew Us'
(Uobj'-1(q)) - Now users update algorithm looks like
- xs Us'-1(qnew)
- ? xs Uobj'-1(q)
- ? Appears as if user is maximizing Uobj !
-
32Idea Remap _at_Edge, Not in every Router
Edge Routers
Core Routers
Core Network
(No Changes)
Users
Decouple Management of Selfish Flows from AQM
Design
33What do we need to make it work ?
- Estimate utility function
- Currently using Least Squares, Recursive LS
- Needs only estimates of sending and loss rates
- Estimate loss/mark rate
- Currently using EWMA, WALI methods of TFRC
- Need to identify misbehaving flows.
- Smart Sampling in Netflow, Sample Hold etc
34Utility Function Estimation
- Increase ?/xk(t) , Decrease ?xl(t)
- Utility function (n kl)
- U - ? /(R?n (xR)n)
- U ? -1/xn
- U(x) p
- log(p) log(nK) (n1)log(x)
- Use linear least squares to estimate n
35Results Single Bottleneck
TCP Reno, U-1/x
4x Mbps
5 ms
x Mbps
20 ms
Mis-Behaving (U-1/x0.5)
RED/ ECN Enabled
Drop Tail
36Results Multi-Bottleneck (Drop Tail)
8 Mbps
TCP Reno, U-1/x
5 ms
20 ms
20 ms
Drop-Tail Queue
0.8 Mbps
0.8 Mbps
Selfish (U-1/x0.5)
Selfish (U-1/x0.5)
Without Re-Mapping
With Re-Mapping
TCP Flows shut out
Framework prevents volume based denial of service
attack.
37Results Multi-Bottleneck (RED)
8 Mbps
TCP Reno, U-1/x
5 ms
20 ms
20 ms
RED Queue
0.8 Mbps
0.8 Mbps
Selfish (U-1/x0.5)
Selfish (U-1/x0.5)
Without Re-Mapping
With Re-Mapping
Framework improves fair sharing of network
38Results Multi-Bottleneck in an ECN Enabled
Network
8 Mbps
TCP Reno, U-1/x
5 ms
20 ms
20 ms
RED Queue
0.8 Mbps
0.8 Mbps
Selfish (U-1/x0.5)
Selfish (U-1/x0.5)
With Re-Mapping
Ideal Case
No Re-Mapping
Congestion Response Conformance
39Utility Function Estimation Results
TCP Reno, U-1/x
4x Mbps
5 ms
x Mbps
20 ms
Mis-Behaving (U-1/x0.5)
N 0.6, (Ideal N0.5)
N 0.8, (Ideal N1.0)
Can estimate the exponent with a very small
sample set
40More Results
- Background Traffic
- Web (http) Traffic
- Single/Multi Bottleneck scenarios
- Cross Traffic
- Reverse path congestion
- Especially important with RED
- Multi-Bottleneck scenarios
- Comparison with other AQM schemes
- Differentiated Services
41Outline
- Review
- Randomized TCP
- Uncooperative Congestion Control
- virtual AQM
- Conclusions
42virtual AQM Definitions
R2
R3
R1
E1
I1
R4
I1- R1 - R2 - R3 - E1 Path
43virtual AQM Definitions
- Path Capacity Minimum Link Capacity on a Path
- Send a pair of back-to-back packets through
Priority Queues
- Path Demand Demand on a Path
- Send a packet train through data queue
44virtual AQM Algorithm
- ? network utilization (? lt 1)
- Calculate virtual path capacity as
- Cv ? path Capacity
- Idea Match Demand to Virtual path capacity at
the network edge - For every path
- For every packet
- Drain virtual buffer as (tn-tn-1) Cv
- Increase count of virtual buffer
- If virtual buffer overflows Drop(Mark) packets
? lt 1 gt At Steady State total input rate is
less than the network capacity gt smaller steady
state queue
45virtual AQM Results
Demand Estimation
vAVQ
We can decouple management of bottleneck queue
from AQM design
46virtual AQM Results
8 Mbps
5 ms
20 ms
20 ms
Drop Tail Queue
0.8 Mbps
0.8 Mbps
47Conclusions
- Network based congestion avoidance and control
solutions are not deployed - De-couple congestion control task from its
placement - Deployable architectures
- Can get many beneficial properties of network
based solutions - Randomized TCP
- End-System based solution
- Can reduce synchronization, phase effects, bias
against large RTT flows, burst losses - Emulate many beneficial properties of RED (AQM).
48Conclusions
- Un-Cooperative Congestion Control
- Edge Based Solution
- De-couple management of selfish flows from AQM
design - Edge-based transformation of price can handle
misbehaving flows - No changes in the core
- Works with packet drop or packet marking (ECN)
- Independent of buffer management algorithm
- virtual AQM
- Edge-based proposal for managing bottleneck
queues - For any path using packet probes find capacity
and demand - Mark (drop) packets to match demand to path
capacity - Results depend on estimation, length of virtual
buffer - Initial Conceptual Prototype Presented
49References
- Kartikeya Chandrayana, Sthanunathan Ramakrishnan,
Biplab Sikdar and Shivkumar Kalyanaraman, On
Randomizing the Sending Times in TCP and other
Window Based Algorithms, Conditional Accept for
Journal of Computer Networks - Kartikeya Chandrayana and Shivkumar Kalyanaraman,
Uncooperative Congestion Control, ACM
SIGMETRICS 2004, Also under submission to IEEE
Transactions on Networking. - Kartikeya Chandrayana and Shivkumar Kalyanaraman,
On Impact of Non-Conformant Flows on a Network
of DropTail Gateways, IEEE GLOBECOM 2003 - K. Chandrayana, Y. Xia, B. Sikdar and S.
Kalyanaraman, A Unified Approach to Network
Design and Control with Non-Cooperative Users,
RPI Networks Lab Tech Reoprt, ECSE-NET-2002-1,
March 2002
50Randomized TCP Synchronization
4x Mbps
5 ms
x Mbps
20 ms
Randomized TCP reduces/removes synchronization
51virtual AQM Improvements
52Simple Differentiated Services
Multi-Bottleneck Setup All flows are TCP Flows
Objective Increase the share of long flow by 10
Edge Based
Differentiated Services Map users to different
utility functions
53Placement
Routers
Users
Network
Destination
54Re-Marker Design
- Implemented it in Network Simulator
- Estimation of loss rate
- Estimation of throughput
- Get utility function estimate
- Compute the Re-Marking function
- Appropriately Mark/Drop packets.
- Can also Mark Acks
- Different Algorithm for CBR flows.