TCP-Load Balancing: The Aequitas Equilibrium

Size: px
Start display at page:

Download "TCP-Load Balancing: The Aequitas Equilibrium"

Transcription

1 1 TCP-Load Balancing: The Aequitas Equilibrium Mahmoud Elhaddad University of Pittsburgh Pittsburgh, Pennsylvania Injong Rhee and Munindar Singh North Carolina State University Raleigh, North Carolina {rhee, Abstract We consider the problem of traffic allocation in multipath IP networks. We postulate that the desired equilibrium distribution of network bandwidth is one where every flow acquires a TCP-fair share along each of the routes connecting its ingress and egress. This characterization calls for connection striping at the ingress to balance the load among the available routes. Still, the desired equilibrium is not reachable when flows are allowed to compete freely for bandwidth, in which case, striping is known to reduce the throughput of TCP below the fair share on the least-congested path. Using the fairness properties of TCP congestion control, we prove that under connectionload balancing and ingress egress traffic isolation, multipath networks tend to reach the desired equilibrium at steady-state despite the interaction among flows within traffic aggregates. The practical value of this result stems from the accuracy with which ingress egress bandwidth allocations can be approximated using token buckets as rate limiters at the ingress routers and the availability of an efficient method for the accurate estimation of the TCP-fair shares. Index Terms TCP, multipath, traffic engineering, striping, load balancing, fairness, equilibrium, axiomatic solution. I. INTRODUCTION Packet-switched networks are invariably designed with multiple paths connecting router pairs to ensure survivability in the face of node and link failures. The availability of unused capacity on the alternate paths and the ever increasing demand for higher flow throughput and lower latency led researchers away from traditional shortestpath routing to consider sharing the traffic load among the multiple ingress egress paths. Multipath traffic engineering presents two challenging problems routing, and ingress egress traffic allocation. Whereas multipath routing involves constructing multiple QoS-constrained loopfree paths between the ingress and egress nodes, traffic allocation is concerned with computing the proportion of ingress egress traffic to forward along each of the candidate paths. Traffic allocation may be performed at different levels of granularity for example, flow (connection) allocation, where packets belonging to the same connection are forwarded along the same path, and connection striping, where the load of individual connections is shared among the ingress egress routes. We postulate that the desirable equilibrium-bandwidth distribution in multipath IP networks is the one in which every flow acquires a TCP-fair share of bandwidth along each of its ingress egress paths. We refer to this equilibrium as the Aequitas (perfect fairness) equilibrium. By definition, Aequitas requires connection striping at the ingress to balance the load w.r.t. the fair shares along the candidate paths. An accurate and efficient method for the estimation of the fair shares was recently introduced in [1]; however, load balancing is not sufficient for a multipath network to reach the Aequitas equilibrium at steady state. Connection striping causes packet reordering and risks increasing the loss-event rate, both of which may lead to significant reduction in throughput. Because packet reordering is common place in the Internet [2], TCP enhancements to ensure its robustness to persistent packet reordering have been introduced [3], [4]. Another solution to the reordering problem is the deployment of an ingress egress striping protocol [5] to ensure that packets leave the network in the same order they arrive. In this paper, we analyze the effects of striping on the throughput of NewReno TCP (simply, TCP) [6], assuming no throughput reduction due to packet reordering. Striping increases the loss-event rate beyond that on the least-congested path when flows are allowed to compete for bandwidth. This problem is akin to the loss-path multiplicity problem in multicast congestion control [7]: the probability that an in-flight transmission window faces congestion increases when it is spread across multiple paths. Our analysis indicates that under coarse-grain traffic isolation at the level of ingress egress traffic aggregates, connections tend to achieve the maximal throughput afforded by their respective allocations; that is, despite the competition among flows within the same ingress egress traffic aggregate. In case load balancing is applied to all connections, this result implies that given ingress

2 egress traffic isolation, multipath networks tend to reach the Aequitas equilibrium at steady-state. The practical value of this result stems from the accuracy with which the aggregate bandwidth allocations under ingress egress traffic isolation can be approximated using token buckets as rate limiters at the ingress nodes without requiring any special capabilities at the internal routers. The multipath traffic allocation problem has been studied in the context of minimum-delay routing [8], [9], [10], [11], and traffic dispersion [12], [13]. The resulting techniques are based on methods of incremental optimization that trade off convergence speed to stability, and require the frequent exchange of load information. We attribute this deficiency to the lack of a constructive characterization of the desired equilibrium. The paper is organized as follows: In section II, we present the merits of Aequitas as the desirable equilibrium, and briefly describe the concepts of TCP fairness and TCP throughput convergence. In section III, we prove that traffic isolation and load balancing are sufficient for achieving the Aequitas equilibrium. In Section IV, we provide a simulation-based illustrative example of convergence to the Aequitas equilibrium. And finally, in section V, we present our concluding remarks and outline the direction for future research. II. THE AEQUITAS EQUILIBRIUM Most of the traffic on the Internet is throughput sensitive. Delay and jitter requirements are handled through routing, bandwidth reservation, and packet-scheduling schemes. Therefore, the objective of multipath forwarding should be to maximize the throughput of the network through the efficient utilization of its links, while maintaining fairness among flows. A network is said to be in Aequitas equilibrium when, at steady-state, every flow acquires a TCP-fair share on each of the routes between its ingress and egress. Aequitas is defined in terms of the TCP-fair share along network paths because of the greedy nature of TCP which ensures good utilization of the links, and because the TCP-fair share also called the Bulk Transfer Capacity (BTC) [14], [15] has become the standard fairness metric for the Internet. Beside the dominance of TCP traffic, the latter is evident in the emergence of UDP-based congestion-control algorithms and protocols that emulate TCP fairness in a manner suitable for multimedia applications [16], [17], and in the availability of mechanisms for enforcing TCPfriendliness on congestion-insensitive flows [18]. The TCP-fair share along a path is the mean steadystate throughput of TCP connection forwarded entirely over that path. A TCP sender in the congestion avoidance phase estimates its fair share of network capacity using an additive rate increase and multiplicative decrease (AIMD) strategy. Every round-trip time the sender transmits an amount of data equal to the transmission window size w. For every acknowledgment packet it receives, the sender increments the window size by 1/w. Upon detecting a loss-event one or more packet loss within a transmission window the sender reduces the window size to w/2. In a moderately-loaded network, the throughput of individual TCP connections sharing the same path converges in probability to some limiting probability distribution [19]. The mean of the limiting distribution is thus the TCP-fair share along the path. Accurate estimation of the TCP-fair shares is critical to achieving the Aequitas equilibrium. The TCP-fair shares along network paths change relatively slowly. This can be deduced from the observation reported in [20] that the number of flows concurrently crossing an Internet link typically remains within 15% of the mean over 5-min intervals. Even though the majority of flows may be shortlived, their number and hence the fair shares exhibit little variability. Direct use of the measured BTC as estimates of the fair shares in computing the traffic allocations may lead to oscillations as flows would simultaneously shift the load toward the less congested paths. In [1], we show that TCP-fairness in sharing bottleneck capacity can be approximated as weighted max-min, when the weights correspond to the measured BTC along the paths of the competing flows. The estimates for the fair shares can thus be computed by periodically feeding the BTC measurements and the number of flows in each ingress egress traffic aggregate to a central server running the (weighted) max-min allocation algorithm [8]. Observe that our definition of the equilibrium assumes that flows originate and terminate at the network boundaries (i.e., flows sharing the same ingress egress pair have identical round-trip times), and that the throughput of a connection is not constrained by the maximum window size at the receiver. Flows with with limited throughput demands can be handled by having the ingress nodes report the effective number of ingress egress flows to the central server. The effective number is the total ingress egress throughput demand as a multiple of the sum of the fair shares along the paths during a given interval [1]. To achieve the desired equilibrium, ingress nodes must balance the load of individual connections among the candidate paths transparently from the connections endpoints (Figure 1). Load balancing is performed w.r.t. the TCP-fair shares along the candidate paths. Traffic allocation at the ingress is implemented by means of a weighted round robin mechanism (Deficit or Surplus Round Robin 2

3 [21], [5]), and requires support for path selection at the ingress. An MPLS-based implementation of this traffic allocation strategy is presented in [1]. network, flow isolation is achieved by allocating a channel along each of the flow s ingress egress paths. 1 window size W ingress/ striping point egress W/2 time Fig. 2. Congestion window behavior over a fixed-bandwidth channel. W corresponds to the channel capacity. Fig. 1. TCP striping at the ingress to achieve the Aequitas equilibrium. Striping is transparent to the connections endpoints. A weighted round-robin mechanism is used to balance the load among the candidate paths. Flows sharing the same ingress and egress have equal fair shares on the candidate paths. Simulation indicates that connection-load balancing can be approximated by balancing the load of the ingress egress traffic aggregates, thus eliminating the need for per-flow state at the ingress routers. III. TCP-LOAD BALANCING The mean steady-state throughput S of a TCP connection can be approximated using the throughput-loss formula [22] S = B 3 (1) RT T 2bl where B is the connection packet size, RT T is the roundtrip time, l is the loss-event rate observed by the sender, and b is the number of packets acknowledged by each ACK packet. Note that in the absence of large variation in RT T due to changing queuing delays, the mean throughput is dominated by the loss-event rate. It follows that connection striping is justified if it results in reducing the loss-event rate below that over the least-congested path. If flows forwarded along common links are allowed to compete for bandwidth, then, at any window size, there is a nonzero probability that a connection incurs packet loss on each link it traverses. Load sharing increases the number of such links hence resulting in lower mean throughput than that achievable by transmitting the entire flow load over the least-congested path. Competition among flows introduces noise-corrupted observations in the AIMD estimation of the fair capacity share. These observations are in the form of loss events incurred below the fair transmission rate. This is in contrast with the ideal model of TCP congestion window behavior where packet loss occurs on a given path only when the connection throughput reaches a certain rate. The ideal model is valid only if the network supports flow isolation using bandwidth reservations (Figure2). In a multipath A. Load Balancing under Flow Isolation Consider a TCP connection split among a set of ingress egress paths P, we define the flow s unit share along a path p i P as the ratio c i /φ i, where 0 < φ i 1 is the fraction of the flow assigned to p i, and c i is the capacity of the flow s channel along p i. The TCP-fair share along channel p i is σ i = ρc i where ρ = 3 4 is the utilization of any channel due to the saw-tooth behavior of TCP congestion window under flow isolation. 2 Observe that in the absence of false-congestion indication due to reordering or transmission errors, the flow incurs a loss-event only whenever the flow load reaches the capacity limit on the channels with minimum unit capacity share. We refer to such channels as bottlenecked. Since in reaction to every loss event, the TCP sender cuts the transmission rate by half, the rate limit on nonbottlenecked channels is never reached. Let R be the peak transmission rate of the connection, then R = min p i P c i φ i (2) The capacity limit is reached on all bottlenecked channels in the same transmission window, hence the resulting losses are perceived by the TCP sender as a single loss event. This means that load sharing has the potential to decrease the loss-event rate below than that on the highestcapacity channel. The mean transmission rate is r = ρr. The multiple channels are thus perceived by the sender as a single channel with capacity C = R. Equation (2) states that the quality of flow allocations determines the amount of wasted capacity on nonbottlnecked channels. Under load balancing all channels are bottlenecked: The flow allocations are computed as φ i = c i p j P c j 1 We assume that bandwidth reservation is implemented using perflow FIFO queuing at the core routers, and TDM link sharing. 2 The ideal model as described makes the stolen-lag assumption [19], actual channel utilization may be less than 3/4. (3) 3

4 that is, c i φ i = c j p i P (4) p j P or, all channels are bottlenecked. From (2), R = c j (5) p j P The mean transmission rate over the channel along any path p i P is rφ i = ρc i, which is equal to σ i the TCPfair share along the channel. Thus, under load balancing and per-flow bandwidth reservations, network flows achieve the Aequitas equilibrium at steady-state if the TCP-fair share along a channel is the same as the TCPfair share along the underlying path. Under flow isolation only a fraction ρ of the bottleneck link capacities are utilized, whereas TCP flows competing for bandwidth at a bottleneck may fully utilize its capacity. Thus, the equilibrium rate along a path is at most a factor ρ below that under Aequitas. In addition to the limited utilization under flow isolation, per-flow treatment at the internal routers introduces a scalability problem. From a practical point of view, it is desirable for a traffic allocation strategy not to require special capabilities at the network s core. In networks with single FIFO queues at the output router links, the capacity reservations for different traffic trunks can be approximated using token buckets as rate limiters at the ingress. For instance, in [23], such a scheme was proposed in the context of differentiated services to approximate guaranteed bandwidth allocations to flows in the expedited-forwarding class. Each token bucket is supplemented with a packet buffer, and, to prevent bursts, the bucket depth must be equivalent to only one packet. The packet-loss probability facing a set of regulated streams, multiplexed at the output link of a core router, depends on their number. Losses occur due to synchronized arrivals from the multiplexed streams that cause the link buffer to overflow. Therefore, rate limiters can be used effectively to approximate bandwidth reservations at the aggregate ingress egress traffic level, but not at the connection level. Compared to flow isolation, bandwidth reservations at the aggregate level results in better utilization of the bottleneck links due to allowing competition among flows within the same aggregate, but also at the cost of introducing noise in the AIMD estimation of the fair rate. In the next section, we show that despite the random loss events, load balancing together with ingress-egress traffic isolation are sufficient conditions for weak convergence to the Aequitas equilibrium. B. Load Balancing under Ingress-Egress Traffic Isolation For convenience we henceforth use the MPLS terminology [24] to describe traffic aggregates. Since flows with common ingress-egress pair share the same set of candidate paths and have identical traffic allocation parameters, we refer to the ingress egress traffic as a Forwarding Equivalence Class (FEC). We also refer to a FEC s stream along a particular path as a traffic trunk. Consider a FEC represented by a set of flows F and forwarded over a set of paths P F. Along each path p i P F, F is allocated a channel of capacity C i. By balancing the load of component flows, together, the individual channels form a single virtual channel of aggregate capacity C = p i P F C i. This result follows from TCP fairness: Individual FEC flows have equal fair shares along each of the channels and hence identical load balancing parameters; since the instantaneous FEC throughput r = f F r f, we have rφ i = C i rφ j = C j p i, p j P F (6) Equation (6) states that all the FEC channels are bottlenecked the FEC reaches the rate limit on all channels simultaneously; at which point, a subset of the FEC flows incurs packet loss. Thus, from the viewpoint of FEC traffic, the multiple channels appear as a single bottlenecked channel of capacity C. A packet loss incurred by a particular connection results in the creation of slack capacity proportional to the load balancing allocations on each of the channels. The FEC flows increase their transmission rate and eventually fill the slack. The utilization of a channel is determined by the slack size and the number of round-trips required to fill it. The smaller the number of flows incurring losses the smaller is the slack, therefore, to reduce loss synchronization among flows in case FEC isolation is approximated using ingress rate limiters, the associated packet buffers should use the RED packet dropping policy rather than drop-tail [25]. The number of round-trips required to recover the slack is determined by the number of flows in the FEC, thus creating a tradeoff between the channel utilization and the capacity shares of individual flows. Note that by the definition of load balancing, all channels have equal utilization, which is also the utilization of the aggregate channel ρ. Let r be the mean FEC throughput, we have 3 r = ρ C (7) TCP fairness in sharing the aggregate FEC channel implies that the mean rate of the individual FEC flows con- 3 Generally, for any traffic allocation of F, we have r = ρ min pi P F C i φ i 4

5 verges in probability to the TCP fair share σ along the channel. It follows that at steady-state, r σ F (8) From (7) and (8) we gather that at steady-state, σ C ρ F Given load balancing, the network flows converge in probability to the Aequitas equilibrium iff for every FEC F σ = σ = σi (10) p i P F where σ i is the fair share along the path p i P F. In other words, when each FEC F is allocated a channel of capacity C i = σ i /ρ (11) along every path p i P F. Note that this condition is feasible (i.e., for every link, the sum of the capacities of FEC channels crossing the link does not exceed its capacity) if the utilization of the bottleneck link under FEC isolation is equal to that under unrestricted competition for bandwidth a valid approximation since individual FECs are typically composed of a large number of competing flows. IV. AN ILLUSTRATIVE EXAMPLE In this section, we present ns [26] simulation experiments to demonstrate the convergence of network flows to the Aequitas equilibrium under load balancing. The experiments also demonstrate that static traffic allocation may lead to an arbitrarily-inefficient equilibrium. Fig ms 7 trunk 1 trunk 2 2ms trunk Simulated topology. Figure 3 shows the topology used to conduct the experiments. All links are 20 Mb/s with 1ms propagation delay, except as noted in figure. FEC 1 is composed of 20 FTP flows that originate at node 0 and terminate at 5. Its packets are forwarded along trunks 1 and 2. FEC 2 flows are forwarded along trunk 3. Each FTP flow is controlled by TCP NewReno with a receiver window large enough to 5 (9) saturate the ingress egress paths. Connections transmit 1000 byte packets. Links are full-duplex and have RED output queues with default parameter values. To eliminate the effects of false congestion indication due to reordering, at the egress of each FEC, the FEC packets are sorted back into the same order in which they entered the network before being delivered to the receiving applications. In the first set of experiments we compare the Aequitas equilibrium to that achieved through load balancing (denoted with LB). The topology is designed so that the TCPfair share along each trunk is easily calculated and hence the bandwidth allocations under Aequitas. We assume that TCP flows sharing a bottleneck link utilize its bandwidth in full(i.e., the sum of the TCP-fair shares across a bottleneck is equal to its capacity). Measurements across the experiments set indicated that trunks 2 and 3 always saturate link 2 3, thus validating the assumption. Let n 1 = 20 and n 2 denote the number of flows in FEC 1 and FEC 2 respectively. We varied n 2 from 0 to 80 with an increment of 20 flows. For each value of n 2, we repeatedly ran the simulation for a duration of 120 seconds of simulated time until the 95th. percentileconfidence interval of the aggregate throughput of FEC 1 became no greater than 0.5 Mbps. Also for each value of n 2, the TCP-fair share along the traffic trunks and the load-balancing parameters were calculated. Trunks 2 and 3 share the same path, thus the fair capacity share 20 along each is n 1 +n 2 Mb/s. The fair share along trunk 1 is 20 n 1 Mb/s. In figure 4, the ensemble average of throughput of flows in FEC 1 is plotted against the volume of FEC 2 and compared to the theoretical curve (Aequitas) representing the throughput of a FEC 1 flow under the Aequitas equilibrium. The theoretical and experimental curve nearly coincide, indicating that (by TCP fairness among same-fec flows) the throughput of individual flows in FEC 1 converges to their fair shares under Aequitas. Because the bottleneck link (2 3) is always saturated, we can deduce from the above result that FEC 2 flows converge to their bandwidth allocations under Aequitas. Since all network flows converge to their desired bandwidth allocations, we have demonstrated convergence to the Aequitas equilibrium. In this particular example, link 2 3 emulates the effect of FEC isolation. Specifically, each FEC acquires a share of the slack on the only bottleneck (link 2 3) equal to its share under FEC isolation. This is due to two factors: First, the RED buffer at the bottleneck distributes losses between the two FECs in proportion to their throughput; second, since link 2 3 is the only bottleneck in the net- 5

6 work, both FECs are able to acquire their share of the slack generated by either of them. An example where rate limiters are needed can be created by letting FEC 1 share the path along trunk 1 with another FEC. The random losses on trunk 1 would prevent the FEC from acquiring its share of the slack on trunk 2 and vice-versa, unless FEC isolation is enforced so as to allow each FEC to regain the slack it creates in full. The second set of experiments aims at comparing the Aequitas equilibrium to that achieved using static traffic allocation (denoted with STATIC) such as Equal-Cost MultiPath routing (ECMP) or load balancing based on the nominal capacity along ingress egress paths. This set of experiments is a repetition of the above except for splitting the load of FEC 1 equally between trunks 1 and 2 independently from n 2. In Figure 4, the ensemble-average throughput of FEC 1 flows under STATIC at different values of n 2 is compared to the theoretical curve for the corresponding equilibrium. The equilibrium under STATIC can be made arbitrarily inefficient by increasing the volume of FEC 2. The throughput of a FEC 1 flow is at most twice its share on trunk 2, leaving trunk 1 underutilized, and approaching zero as the congestion on link 2 3 increases. Note that under STATIC no traffic isolation is possible since we assume the traffic allocation strategy to be oblivious of the TCP fair-share along the network paths. It is worth noting that in the experiments above, load balancing was implemented using Deficit Round Robin (DRR) [21] at the FEC-level rather than at the TCPconnection level. We conjecture that due to the large number of flows in a FEC, balancing the load of the traffic aggregate approximates connection-load balancing. The convergence under LB in the above example, as well as the experiments in [1], are in support of this conjecture. FEC 1: Flow Throughput (Mb/s) FEC 2 Volume (#flows) Aequitas LB STATIC: Theoretical STATIC: Measured Fig. 4. Convergence to Aequitas. Average FEC 1 flow throughput obtained through simulation for LB and STATIC compared to that obtained analytically from the corresponding equilibria. V. CONCLUSIONS AND FUTURE WORK A multipath network is in the Aequitas equilibrium if every flow acquires a TCP fair share along each of its ingress egress paths. Using the convergence properties of TCP congestion control, we proved that connectionload balancing based on the TCP-fair shares along the candidate paths, together with ingress-egress traffic isolation are sufficient conditions for the network flows to converge to the Aequitas equilibrium. We also showed that TCP-striping based on static traffic allocation may lead significant reduction in throughput. In [1], we reduce the problem of estimating the fair shares to one of computing the weighted max-min allocations, and describe a scalable traffic allocation solution to approximate the Aequitas equilibrium while taking into consideration flows with limited throughput demands (e.g., due to congestion in other domains the flows traverse), and sudden traffic swings. Aequitas can be extended to the case where flows of service differentiation using prioritized packet dropping. This extension requires a model for the fairness among flows of different service classes sharing the same path. REFERENCES [1] Mahmoud Elhaddad, Adaptive traffic allocation in multipath IP/MPLS networks, M.S. thesis, North Carolina State University, [2] J. C. Bennett, C. Partridge, and N. Shectman, Packet reordering is not pathological network behavior, IEEE/ACM Transactions on Networking, vol. 7, no. 6, pp , [3] Ethan Blanton and Mark Allman, On making TCP robust to reordering, Computer Communication Review, vol. 32, no. 1, January [4] S. Floyd, A report on recent developments in TCP, IEEE Communications Magazine, vol. 39, no. 4, pp , [5] H. Adiseshu, G. Parulkar, and G. Varghese, A reliable and scalable striping protocol, in Proc. of the ACM SIGCOMM, 1996, pp [6] S. Floyd and T. Hendersen, The NewReno modification to TCP s Fast Recovery algorithm, Internet RFC 2582, IETF, April [7] Supratik Bhattacharyya, Donald F. Towsley, and James F. Kurose, The loss path multiplicity problem in multicast congestion control, in INFOCOM, 1999, pp [8] D. Bertsekas and R. Gallager, Data Networks, Prentice Hall Inc., 2nd edition, [9] S. Vutukury and J.J. Garcia-Luna-Aceves, A simple approximation to minimum-delay routing, in ACM SIGCOMM, Cambridge, Massachusetts, September 1999, pp [10] S. Vutukury and J.J Garcia-Luna-Aceves, A traffic engineering approach based on minimum-delay routing, in Proceedings of the Ninth International Conference on Computer Communications and Networks, Las Vegas, Nevada, October 2000, pp [11] A. Elwalid, C. Jin, and I. Widjaja, MATE: MPLS Adaptive Traffic Engineering, in Proceedings of IEEE INFOCOM, Anchorage, Alaska, April 6

7 [12] E. Gustafsson and G. Karlsson, A literature survey on traffic dispersion, IEEE Network, vol. 11, no. 2, pp , March/April [13] C. Villamizar, OSPF optimized multipath, Internet Draft, IETF, June 1999, Work in progress. [14] Mark Allman, Measuring end-to-end bulk transfer capacity, in ACM SIGCOMM Internet Measurement Workshop, February [15] M. Mathis and M. Allman, A framework for defining empirical bulk transfer capacity metrics, Internet RFC 3148, IETF, July [16] Sally Floyd, Mark Handley, Jitendra Padhye, and Jorg Widmer, Equation-based congestion control for unicast applications, in ACM SIGCOMM, 2000, pp [17] Sally Floyd, Mark Handley, and Eddir Kohler, Problem statement for DCP, Internet draft, IETF, [18] R. Mahajan and S. Floyd, Controlling high-bandwidth flows at the congested router, Technical report tr , ICSI, April [19] M. Vojnović, J. Le Boudec, and C. Boutremans, Global fairness of additive increase and multiplicative decrease with heterogeneous round-trip times, in IEEE INFOCOM, March [20] K. Thompson, G. Miller, and R. Wilder, Wide-area Internet traffic patterns and characteristics, IEEE Network, vol. 11, no. 6, pp , [21] M. Shreedhar and George Varghese, Efficient fair queueing using deficit round robin, in Proceedings of ACM SIGCOMM, 1995, pp [22] J. Padhye, V. Firoiu, D. Towsley, and J. Kurose, Modeling TCP throughput: A simple model and its empirical validation, in Proceedings of ACM SIGCOMM, Vancouver, B.C., September 1998, pp [23] V. Jacobson, K. Nichols, and K. Poduri, An Expedited Forwarding PHB, RFC 2598, IETF, June 1999, Standards Track. [24] E. Rosen, A. Viswanathan, and R. Callon, Multiprotocol Label Switching Architecture, RFC 3031, Internet Society, January 2001, Standards track. [25] Sally Floyd and Van Jacobson, Random early detection gateways for congestion avoidance, IEEE/ACM Transactions on Networking, vol. 1, no. 4, pp , August [26] The network simulator ns, 7

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS? 18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Enhanced Variable Splitting Ratio Algorithm for Effective Load Balancing in MPLS Networks

Enhanced Variable Splitting Ratio Algorithm for Effective Load Balancing in MPLS Networks Journal of Computer Science 4 (3): 232-238, 2008 ISSN 1549-3636 2008 Science Publications Enhanced Variable Splitting Ratio Algorithm for Effective Load Balancing in MPLS Networks 1 G. Murugesan, 2 A.M.

More information

TCP, Active Queue Management and QoS

TCP, Active Queue Management and QoS TCP, Active Queue Management and QoS Don Towsley UMass Amherst towsley@cs.umass.edu Collaborators: W. Gong, C. Hollot, V. Misra Outline motivation TCP friendliness/fairness bottleneck invariant principle

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks

Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed shf_ibrahim@yahoo.com Khaled M. F. Elsayed, senior member IEEE khaled@ieee.org Department

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

Improving our Evaluation of Transport Protocols. Sally Floyd Hamilton Institute July 29, 2005

Improving our Evaluation of Transport Protocols. Sally Floyd Hamilton Institute July 29, 2005 Improving our Evaluation of Transport Protocols Sally Floyd Hamilton Institute July 29, 2005 Computer System Performance Modeling and Durable Nonsense A disconcertingly large portion of the literature

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

IP Traffic Engineering over OMP technique

IP Traffic Engineering over OMP technique IP Traffic Engineering over OMP technique 1 Károly Farkas, 1 Zoltán Balogh, 2 Henrik Villför 1 High Speed Networks Laboratory Department of Telecommunications and Telematics Technical University of Budapest,

More information

Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005

Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005 Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005 Outline for talk: Requested topic: the requirements for simulation and modeling tools that allow one to study, design,

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student

More information

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort

More information

Internet Quality of Service

Internet Quality of Service Internet Quality of Service Weibin Zhao zwb@cs.columbia.edu 1 Outline 1. Background 2. Basic concepts 3. Supporting mechanisms 4. Frameworks 5. Policy & resource management 6. Conclusion 2 Background:

More information

Recovery Modeling in MPLS Networks

Recovery Modeling in MPLS Networks Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim

More information

Figure 1: Network Topology

Figure 1: Network Topology Improving NGN with QoS Strategies Marcel C. Castro, Tatiana B. Pereira, Thiago L. Resende CPqD Telecom & IT Solutions Campinas, S.P., Brazil E-mail: {mcastro; tatibp; tresende}@cpqd.com.br Abstract Voice,

More information

Oscillations of the Sending Window in Compound TCP

Oscillations of the Sending Window in Compound TCP Oscillations of the Sending Window in Compound TCP Alberto Blanc 1, Denis Collange 1, and Konstantin Avrachenkov 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France 2 I.N.R.I.A. 2004

More information

Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage

Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage Lecture 16: Quality of Service CSE 123: Computer Networks Stefan Savage Final Next week (trust Blink wrt time/location) Will cover entire class Style similar to midterm I ll post a sample (i.e. old) final

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Balancing by MPLS in Differentiated Services Networks Riikka Susitaival, Jorma Virtamo, and Samuli Aalto Networking Laboratory, Helsinki University of Technology P.O.Box 3000, FIN-02015 HUT, Finland

More information

Network management and QoS provisioning - QoS in the Internet

Network management and QoS provisioning - QoS in the Internet QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets

More information

#43 D A N T E I N P R I N T. A First Step in the World of IP QoS. Nicolas Simar

#43 D A N T E I N P R I N T. A First Step in the World of IP QoS. Nicolas Simar D A N T E I N P R I N T A First Step in the World of IP QoS #43 Nicolas Simar DANTE IN PRINT is a track record of papers and articles published by, or on behalf of DANTE. HTML and Postscript versions are

More information

The Interaction of Forward Error Correction and Active Queue Management

The Interaction of Forward Error Correction and Active Queue Management The Interaction of Forward Error Correction and Active Queue Management Tigist Alemu, Yvan Calas, and Alain Jean-Marie LIRMM UMR 5506 CNRS and University of Montpellier II 161, Rue Ada, 34392 Montpellier

More information

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Robust Router Congestion Control Using Acceptance and Departure Rate Measures Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {ganeshg@microsoft.com}, Microsoft Corporation,

More information

17: Queue Management. Queuing. Mark Handley

17: Queue Management. Queuing. Mark Handley 17: Queue Management Mark Handley Queuing The primary purpose of a queue in an IP router is to smooth out bursty arrivals, so that the network utilization can be high. But queues add delay and cause jitter.

More information

Analyzing Marking Mod RED Active Queue Management Scheme on TCP Applications

Analyzing Marking Mod RED Active Queue Management Scheme on TCP Applications 212 International Conference on Information and Network Technology (ICINT 212) IPCSIT vol. 7 (212) (212) IACSIT Press, Singapore Analyzing Marking Active Queue Management Scheme on TCP Applications G.A.

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows

Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows C. Mahlo, C. Hoene, A. Rostami, A. Wolisz Technical University of Berlin, TKN, Sekr. FT 5-2 Einsteinufer 25, 10587 Berlin, Germany. Emails:

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

TCP Trunking for Bandwidth Management of Aggregate Traffic

TCP Trunking for Bandwidth Management of Aggregate Traffic TCP Trunking for Bandwidth Management of Aggregate Traffic H.T. Kung kung@eecs.harvard.edu Division of Engineering and Applied Sciences Harvard University Cambridge, MA 02138, USA S.Y. Wang shieyuan@csie.nctu.edu.tw

More information

Robustness to Packet Reordering in High-speed Networks

Robustness to Packet Reordering in High-speed Networks 13 Robustness to Packet Reordering in High-speed Networks Sumitha Bhandarkar and A. L. Narasimha Reddy Dept. of Electrical and Computer Engineering Texas A & M University sumitha,reddy @ee.tamu.edu Abstract

More information

Proposing a Load Balancing Algorithm with the Help of an Endpoint Admission Control Algorithm to Improve Traffic Engineering

Proposing a Load Balancing Algorithm with the Help of an Endpoint Admission Control Algorithm to Improve Traffic Engineering Proposing a Load Balancing Algorithm with the Help of an Endpoint Admission Control Algorithm to Improve Traffic Engineering * 1 Zahra Vali, 2 Massoud Reza Hashemi, + 3 Neda Moghim 1, Isfahan University

More information

GREEN: Proactive Queue Management over a Best-Effort Network

GREEN: Proactive Queue Management over a Best-Effort Network IEEE GlobeCom (GLOBECOM ), Taipei, Taiwan, November. LA-UR -4 : Proactive Queue Management over a Best-Effort Network Wu-chun Feng, Apu Kapadia, Sunil Thulasidasan feng@lanl.gov, akapadia@uiuc.edu, sunil@lanl.gov

More information

How To Share Bandwidth On A Diffserv Network

How To Share Bandwidth On A Diffserv Network Proceedings of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, 14-17 May 2007, Penang, Malaysia Bandwidth Sharing Scheme in DiffServ-aware

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex?

On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex? On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex? Hiroyuki Ohsaki and Masayuki Murata Graduate School of Information Science and Technology Osaka

More information

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control? Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management

More information

Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network

Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network Analysis and Detection of a Denial-of-Service Attack Scenario generated by TCP Receivers to Edge Network V. Anil Kumar 1 and Dorgham Sisalem 2 (anil@cmmacs.ernet.in, sisalem@fokus.fhg.de) 1 CSIR Centre

More information

2. TCP and the Bandwidth Sharing System

2. TCP and the Bandwidth Sharing System Modeling the Transient Rate Behavior of Bandwidth Sharing as a Hybrid Control System Abstract: Kang Li, Molly H. Shor, Jonathan Walpole, and Calton Pu *, This paper uses hybrid control to model a problem

More information

H.323 Traffic Characterization Test Plan Draft Paul Schopis, pschopis@itecohio.org

H.323 Traffic Characterization Test Plan Draft Paul Schopis, pschopis@itecohio.org H.323 Traffic Characterization Test Plan Draft Paul Schopis, pschopis@itecohio.org I. Introduction Recent attempts at providing Quality of Service in the Internet2 community have focused primarily on Expedited

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

Supporting End-to-End QoS in DiffServ/MPLS Networks

Supporting End-to-End QoS in DiffServ/MPLS Networks Supporting End-to-End QoS in DiffServ/MPLS Networks Ji-Feng Chiu, *Zuo-Po Huang, *Chi-Wen Lo, *Wen-Shyang Hwang and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University, Taiwan

More information

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Professor M. Chiang Electrical Engineering Department, Princeton University ELE539A February 21, 2007 Lecture Outline TCP

More information

THE end-to-end congestion control mechanisms of TCP

THE end-to-end congestion control mechanisms of TCP 458 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 7, NO. 4, AUGUST 1999 Promoting the Use of End-to-End Congestion Control in the Internet Sally Floyd, Senior Member, IEEE, and Kevin Fall Abstract This paper

More information

Experiences with Class of Service (CoS) Translations in IP/MPLS Networks

Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Rameshbabu Prabagaran & Joseph B. Evans Information and Telecommunications Technology Center Department of Electrical Engineering

More information

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used

More information

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,

More information

Supporting Differentiated Services with Per-Class Traffic Engineering in MPLS

Supporting Differentiated Services with Per-Class Traffic Engineering in MPLS Supporting Differentiated Services with Per-Class Traffic Engineering in MPLS Melody Moh moh @IX. sjsu. edu Dept of Math. & Computer Science Belle Wei bwei@email.sjsu.edu Dept of Electrical Engineering

More information

ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK

ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK ABSTRACT Hatim Hussein Department of Electrical and Computer Engineering, George Mason University, Fairfax, Virginia, USA hhussei1@gmu.edu

More information

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Real-time apps and Quality of Service

Real-time apps and Quality of Service Real-time apps and Quality of Service Focus What transports do applications need? What network mechanisms provide which kinds of quality assurances? Topics Real-time versus Elastic applications Adapting

More information

The network we see so far. Internet Best Effort Service. Is best-effort good enough? An Audio Example. Network Support for Playback

The network we see so far. Internet Best Effort Service. Is best-effort good enough? An Audio Example. Network Support for Playback The network we see so far CSE56 - Lecture 08 QoS Network Xiaowei Yang TCP saw-tooth FIFO w/ droptail or red Best-effort service Web-surfing, email, ftp, file-sharing Internet Best Effort Service Our network

More information

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Jian Chen and Victor C.M. Leung Department of Electrical and Computer Engineering The

More information

Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross

Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross M ultimedia Communication Multimedia Systems(Module 5 Lesson 3) Summary: Beyond Best-Effort Motivating QoS Q uality of Service (QoS) Scheduling and Policing Sources: Chapter 6 from Computer Networking:

More information

Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and.

Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and. Master s Thesis Title A Study on Active Queue Management Mechanisms for Internet Routers: Design, Performance Analysis, and Parameter Tuning Supervisor Prof. Masayuki Murata Author Tomoya Eguchi February

More information

PACE Your Network: Fair and Controllable Multi- Tenant Data Center Networks

PACE Your Network: Fair and Controllable Multi- Tenant Data Center Networks PACE Your Network: Fair and Controllable Multi- Tenant Data Center Networks Tiago Carvalho Carnegie Mellon University and Universidade de Lisboa Hyong S. Kim Carnegie Mellon University Pittsburgh, PA,

More information

WEB APPLICATION PERFORMANCE PREDICTION

WEB APPLICATION PERFORMANCE PREDICTION WEB APPLICATION PERFORMANCE PREDICTION H. Karlapudi and J. Martin Department of Computer Science Clemson University Clemson, SC 9-9 Email: hkarlap, jim.martin@cs.clemson.edu ABSTRACT In this paper, we

More information

6.6 Scheduling and Policing Mechanisms

6.6 Scheduling and Policing Mechanisms 02-068 C06 pp4 6/14/02 3:11 PM Page 572 572 CHAPTER 6 Multimedia Networking 6.6 Scheduling and Policing Mechanisms In the previous section, we identified the important underlying principles in providing

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July-2015 1169 Comparison of TCP I-Vegas with TCP Vegas in Wired-cum-Wireless Network Nitin Jain & Dr. Neelam Srivastava Abstract

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

Disjoint Path Algorithm for Load Balancing in MPLS network

Disjoint Path Algorithm for Load Balancing in MPLS network International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 13 No. 1 Jan. 2015, pp. 193-199 2015 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

Internet Flow Control - Improving on TCP

Internet Flow Control - Improving on TCP Internet Flow Control - Improving on TCP Glynn Rogers The Team - Jonathan Chan, Fariza Sabrina, and Darwin Agahari CSIRO ICT Centre Why Bother? - Isn t TCP About as Good as It Gets?! Well, TCP is a very

More information

Sync & Sense Enabled Adaptive Packetization VoIP

Sync & Sense Enabled Adaptive Packetization VoIP Sync & Sense Enabled Adaptive Packetization VoIP by Boonchai Ngamwongwattana B.Eng., King Mongkut s Institute of Technology, Ladkrabang, Thailand, 1994 M.S., Telecommunications, University of Pittsburgh,

More information

4 High-speed Transmission and Interoperability

4 High-speed Transmission and Interoperability 4 High-speed Transmission and Interoperability Technology 4-1 Transport Protocols for Fast Long-Distance Networks: Comparison of Their Performances in JGN KUMAZOE Kazumi, KOUYAMA Katsushi, HORI Yoshiaki,

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Multimedia Requirements. Multimedia and Networks. Quality of Service

Multimedia Requirements. Multimedia and Networks. Quality of Service Multimedia Requirements Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Transfer/Control Protocols Quality of Service

More information

Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis

Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis Basic Multiplexing models? Supermarket?? Computer Networks - Vassilis Tsaoussidis Schedule Where does statistical multiplexing differ from TDM and FDM Why are buffers necessary - what is their tradeoff,

More information

Traffic protection in MPLS networks using an off-line flow optimization model

Traffic protection in MPLS networks using an off-line flow optimization model Traffic protection in MPLS networks using an off-line flow optimization model A.E. Krzesinski and K.E. Müller Department of Computer Science University of Stellenbosch, 76 Stellenbosch, South Africa Phone:

More information

Performance improvement of active queue management with per-flow scheduling

Performance improvement of active queue management with per-flow scheduling Performance improvement of active queue management with per-flow scheduling Masayoshi Nabeshima, Kouji Yata NTT Cyber Solutions Laboratories, NTT Corporation 1-1 Hikari-no-oka Yokosuka-shi Kanagawa 239

More information

Using median filtering in active queue management for telecommunication networks

Using median filtering in active queue management for telecommunication networks Using median filtering in active queue management for telecommunication networks Sorin ZOICAN *, Ph.D. Cuvinte cheie. Managementul cozilor de aşteptare, filtru median, probabilitate de rejectare, întârziere.

More information

Modeling and Performance Analysis of Telephony Gateway REgistration Protocol

Modeling and Performance Analysis of Telephony Gateway REgistration Protocol Modeling and Performance Analysis of Telephony Gateway REgistration Protocol Kushal Kumaran and Anirudha Sahoo Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay, Powai,

More information

Estimation of available bandwidth and measurement infrastructure for. Russian segment of Internet

Estimation of available bandwidth and measurement infrastructure for. Russian segment of Internet 1 Estimation of available bandwidth and measurement infrastructure for Abstracts Russian segment of Internet Platonov A.P. 1), Sidelnikov D.I. 2), Strizhov M.V. 3), Sukhov A.M. 4) 1) Russian Institute

More information

Chapter 7 outline. 7.5 providing multiple classes of service 7.6 providing QoS guarantees RTP, RTCP, SIP. 7: Multimedia Networking 7-71

Chapter 7 outline. 7.5 providing multiple classes of service 7.6 providing QoS guarantees RTP, RTCP, SIP. 7: Multimedia Networking 7-71 Chapter 7 outline 7.1 multimedia networking applications 7.2 streaming stored audio and video 7.3 making the best out of best effort service 7.4 protocols for real-time interactive applications RTP, RTCP,

More information

Factors to Consider When Designing a Network

Factors to Consider When Designing a Network Quality of Service Routing for Supporting Multimedia Applications Zheng Wang and Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom ABSTRACT

More information

Scheduling for QoS Management

Scheduling for QoS Management Scheduling for QoS Management Domenico Massimo Parrucci Condello isti information science Facoltà and di Scienze technology e Tecnologie institute 1/number 1 Outline What is Queue Management and Scheduling?

More information

Designing a Smart Market Pricing Scheme

Designing a Smart Market Pricing Scheme A Strategy for Implementing Smart Market Pricing Scheme on Diff-Serv Murat Yuksel, Shivkumar Kalyanaraman CS Department, ECSE Department Rensselaer Polytechnic Institute, 11 8th Street, Troy, NY, USA.

More information

SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 3, June 2015 (ISSN 2278 5973)

SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 3, June 2015 (ISSN 2278 5973) SHIV SHAKTI International Journal of in Multidisciplinary and Academic Research (SSIJMAR) Vol. 4, No. 3, June 2015 (ISSN 2278 5973) RED Routing Algorithm in Active Queue Management for Transmission Congesstion

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

PAPER Flow-level multipath load balancing in MPLS network

PAPER Flow-level multipath load balancing in MPLS network IEICE TRANS.?? VOL.Exx?? NO.xx XXXX 2x PAPER Flow-level multipath load balancing in MPLS network Zenghua ZHAO a) Yantai SHU Lianfang ZHANG and Oliver YANG b) Nonmembers SUMMARY Multi-Protocol Label Switching

More information

RBA-RIO Rate Based Adaptive Red With In and Out. Algorithm for DiffServ AF PHB

RBA-RIO Rate Based Adaptive Red With In and Out. Algorithm for DiffServ AF PHB RBA-RIO Rate Based Adaptive Red With In and Out Algorithm for DiffServ AF PHB Zhang Mgjie Zhu Peidong Su Jshu Lu Xicheng School of Computer, National University of Defense Technology, Changsha 410073,

More information

Adaptive Sampling for Network Performance Measurement Under Voice Traffic

Adaptive Sampling for Network Performance Measurement Under Voice Traffic Sampling for Network Performance Measurement Under Voice Traffic Wenhong Ma and Changcheng Huang Optical Networks Laboratory Department of Systems and Computer Engineering, Carleton University 1125 Colonel

More information

CUBIC: A New TCP-Friendly High-Speed TCP Variant

CUBIC: A New TCP-Friendly High-Speed TCP Variant : A New TCP-Friendly High-Speed TCP Variant Injong Rhee, and Lisong Xu Abstract This paper presents a new TCP variant, called, for high-speed network environments. is an enhanced version of : it simplifies

More information

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science

More information

XCP-i : explicit Control Protocol for heterogeneous inter-networking of high-speed networks

XCP-i : explicit Control Protocol for heterogeneous inter-networking of high-speed networks : explicit Control Protocol for heterogeneous inter-networking of high-speed networks D. M. Lopez-Pacheco INRIA RESO/LIP, France Email: dmlopezp@ens-lyon.fr C. Pham, Member, IEEE LIUPPA, University of

More information

An Adaptive Load Balancing to Provide Quality of Service

An Adaptive Load Balancing to Provide Quality of Service An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)

More information

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

Traffic Engineering with AIMD in MPLS Networks?

Traffic Engineering with AIMD in MPLS Networks? Traffic Engineering with AIMD in MPLS Networks? Jianping Wang 1, Stephen Patek 2, Haiyong Wang 1, and Jörg Liebeherr 1 1 Department of Computer Science 2 Department of Systems and Information Engineering,

More information