Professional Documents
Culture Documents
Congestion Control
Congestion Control
Taxonomy
Flow control: to keep a fast sender from overrunning a slow receiver Congestion control: to keep a set of senders from sending two much data into the network
Connectionless Flow
Datagrams
Switched independently Typically flow through same set of routers if transmitted from the same source to the same destination Connectionless Flows
No state: purely connectionless service Hard state: purely connection-oriented service Soft state: allocate resources on a per-flow basis
CSS432: Congestion Control 3
Queuing Discipline
Work conserving: link is never left idle (if data to be sent) Explicitly segregates traffic based on flows Ensures no flow captures more than its share of capacity If there are n flows sending data, each is allocated 1/n bandwidth Variation: weighted fair queuing (WFQ)
Flow 1
Problem:
H1
R1
R2
R3
H8
ETH IP (1400)
FDDI IP (1400)
Flow 4
[Section 3.2]
CSS432: Congestion Control 4
Algorithm
For each queue, compute the virtual finish time (F) upon arrival of a new packet. Choose a packet with the lowest virtual finish time. No preemption Emulates bit-by-bit fair queuing Not perfect: cant preempt a large packet currently being transmitted
Example of fair queuing in action: (a) packets with earlier finishing times are sent first; (b) sending of a packet already in progress is completed
CSS432: Congestion Control 5
Immediately preceding this time, the Internet was suffering from congestion collapse
hosts
would send their packets into the Internet as fast as the advertised window would allow, congestion would occur at some router (causing packets to be dropped), and the hosts would time out hosts retransmit their packets, resulting in even more congestion
CSS432: Congestion Control 6
Concept:
Assumes
best-effort network (FIFO or FQ routers) Determines network capacity at each source host Uses implicit feedback Uses ACKs to pace packet transmission (self-clocking)
Challenge:
Determining
the available capacity in the first place Adjusting # of in-transit packets in response to dynamic changes in the available capacity
10
16 DstPort SequenceNum
31
Checksum
New state variable per connection: CongestionWindow Limits how much data source can send: Previously:
EffectiveWindow = AdvertisedWindow (LastbyteSent - LastByteAcked)
Sending application
Now:
EffectiveWindow = Min( CongestionWindow, AdvertisedWindow ) (LastByteSent LastByteAcked)
TCP LastByteWritten
y
LastByteAcked LastByteSent
Idea: Increase CongestionWindow when congestion deceases Decrease CongestionWindow when congestion increases
AIMD (cont)
Question: how does the source determine whether or not the network is congested?
AIMD (cont)
Question: how does the source determine whether or not the network is congested?
Answer: a timeout occurs
Timeout signals that a packet was lost Packets are seldom lost due to transmission Lost packet implies congestion
error
10
AIMD (cont)
Algorithm
CongestionWindow Size
Increment CongestionWindow by 1 packet per RTT (additive increase) Divide CongestionWindow by 2 whenever a timeout occurs (multiplicative decrease)
70 60 50 40 30 20 10 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 9.0 10.0
KB
Time (seconds)
Slow Start
Source Destination
with CongestionWindow = 1 packet Double CongestionWindow each RTT (increment by 1 packet for each ACK) When timeout occurs:
Observe
Slow Start
Exponential growth, but slower than all at once Used when first starting connection When Nagles algorithm is used and packets are lost, (timeout occurs and the congestion window is already 0)
Final Algorithm:
CongestionThreshold = INF while (true) { CongestionWindow = 1 while ( CongestionWindow < CongestionThreshold ) CongestionWindow *= 2 (based on slow start, exponential growth) while ( ACK returned ) CongestionWindow++ (based on additive increase, linear growth) if timeout occurs, CongestionThreshold = CongestionWindow / 2 Continue }
CSS432: Congestion Control 13
Slow Start
Trace:
70 60 50 40 30 20 10 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 9.0
KB
Where:
Colored line = value of CongestionWindow Solid bullets at top = timeouts Hash marks = time when each packet is transmitted Vertical bars = time when a packet that was eventually retransmitted (i.e., was lost) was first transmitted
14
Slow Start
http://www.6test.edu.cn/~lujx/linux_networking/0131777203_ch24lev1sec4.html
CSS432: Congestion Control 15
Slow Start
Trace:
70 60 50 40 30 20 10 1.0 2.0 3.0 4.0 5.0 6.0 7.0 8.0 9.0
KB
Packets lost
The actual congestion threshold Congestion window
16
Receiver
ACK 1
ACK 2 ACK 2 Duplicate ACK 1 ACK 2 Duplicate ACK 2 ACK 2 Duplicate ACK 3
The receiver sends back the same ACK as the last packet received in the correct sequential order. The sender retransmits the packet whose ID is one larger than this duplicate ACK, upon receiving 3 ACKs.
17
KB
18
Coarse-grained timeouts
70 60 50 40 30 20 10 1.0 2.0 3.0 4.0
KB
5.0
6.0
7.0
19
Fast recovery
skip
20
Congestion
21
Congestion Avoidance
control congestion after it happens repeatedly increase load in an effort to find the point at which congestion occurs, and then back off predict when congestion is about to happen reduce rate before packets start being discarded
Two possibilities
router-centric: RED Gateways Explanation in the following slides host-centric: TCP Vegas Compare measured and expected throughput rate, and shrink congestion window if the measured rate is smaller.
CSS432: Congestion Control 22
RTT Estimation
Karns Algorithm
Slow Start
AIMD
Fast Retransmit
Fast Recovery
23
Notification is implicit
just
drop the packet (TCP will timeout) could make explicit by marking the packet
than wait for queue to become full, drop each arriving packet with some drop probability whenever the queue length exceeds some drop level
Congestion avoidance Global synchronization avoidance
RED Details
Low-pass filter
25
26
Computing probability P
TempP = MaxP * (AvgLen - MinThreshold) / (MaxThreshold - MinThreshold) P = TempP / (1 - count * TempP)
Typically 0.02
27
Reviews
Queuing
disciplines: FIFO FQ TCP congestion control: AIMD, cold/slow start, and fast retransmit/fast recovery Congestion avoidance: RED and TCP vegas
Exercises in Chapter 6
Ex.
2 (Avoidance) Ex. 6 (Router congestions) Ex. 25(Slow start) Ex. 27 (AIMD, slow start) Ex. 34 (RED)
28
Exercise 2
TCP uses a host-centric, feedback-based, window-based resource allocation model. How might TCP have been designed to use instead the following models:
(a)
29
Exercise 6
Consider the arrangement of hosts H and routers R and R1 in Figure 6.27. All links are full-duplex, and all routers are faster than their links. Show that R1 cannot become congested and for any other router R, we can find a traffic pattern that congests that router alone.
30
Exercise 25
You are an Internet Service Provider; your client hosts connect directly to your routers. You know some hosts are using experimental TCPs and suspect some may be using a greedy TCP with no congestion control.
What measurements might you make at your router to establish that a client was not using a slow start at all? If a client used slow start on startup but not after a timeout, could you detect that?
31
27. Consider the TCP trace in Figure 6.28. Identify time intervals representing slow start on startup, slow start after timeout, and linear-increase congestion avoidance. Explain what is going on from T=0.5 to T=1.9. The TCP version that generated this trace includes a feature absent from the TCP that generated Figure 6.11. What is this feature? This trace and the one in Figure 6.13 both lack a feature. What is it?
Figure 6.28
Figure 6.11
Figure 6.13
32
Exercise 34
Consider a RED gateway with MaxP = 0.01 and with an average queue length halfway between the two thresholds
Find
the drop probability Pcount for count = 1 and count = 100 Calculate the probability that none of the first 50 packets is dropped. Note that this is (1 P1) * * (1 P50)
CSS432: Congestion Control 33