Fair Intelligent Congestion Control Resource Discovery Protocol on TCP Based Network 1



Similar documents
PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

Network Services Definition and Deployment in a Differentiated Services Architecture

Traffic State Estimation in the Traffic Management Center of Berlin

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , info@teltonika.

Project Networks With Mixed-Time Constraints

QoS-Aware Active Queue Management for Multimedia Services over the Internet

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS


Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST)

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

QoS in the Linux Operating System. Technical Report

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE e WLANs Environments

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

iavenue iavenue i i i iavenue iavenue iavenue

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

An agent architecture for network support of distributed simulation systems

A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution

Multi-Source Video Multicast in Peer-to-Peer Networks

Cooperative Load Balancing in IEEE Networks with Cell Breathing

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

Network Aware Load-Balancing via Parallel VM Migration for Data Centers

Calculating the high frequency transmission line parameters of power cables

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

What is Candidate Sampling

An Alternative Way to Measure Private Equity Performance

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Network Security Situation Evaluation Method for Distributed Denial of Service

Traffic-light a stress test for life insurance provisions

Cloud Auto-Scaling with Deadline and Budget Constraints

A Programming Model for the Cloud Platform

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Network Design and Appraisal

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

A Distributed Algorithm for Least Constraining Slot Allocation in MPLS Optical TDM Networks

IMPACT ANALYSIS OF A CELLULAR PHONE

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network)

RequIn, a tool for fast web traffic inference

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

An Inter-Frame De-Jittering Scheme for Video Streaming over Mobile Communication Networks

Enterprise Master Patient Index

Hosting Virtual Machines on Distributed Datacenters

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Canon NTSC Help Desk Documentation

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

DEFINING %COMPLETE IN MICROSOFT PROJECT

Peer-to-Peer Networks Protocols, Cooperation and Competition

Enabling P2P One-view Multi-party Video Conferencing

An Interest-Oriented Network Evolution Mechanism for Online Communities

Self-Adaptive SLA-Driven Capacity Management for Internet Services

The OC Curve of Attribute Acceptance Plans

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

Transcription:

Far Intellgent Congeston Control esource Dscovery Protocol on TCP Based Network 1 Doan B. Hoang 2, Qng Yu, Mng L, and Davd Dagan Feng Department of Computer Systems, Faculty of Informaton Technology, Unversty of Technology, Sydney, NSW 2007, Australa e-mal: [dhoang, mngl]@t.uts.edu.au School of Informaton Technologes, Unversty of Sydney, NSW 2006, Australa e-mal: [qng, feng]@t.usyd.edu.au Abstract Today s Internet only provdes best-effort servce for all traffcs. The network s not able to guarantee the qualty of servce requred by an applcaton that demands more strngent response n terms of delay, jtters, bandwdth and etc. It s well accepted that, the deployment of QoS-aware technologes s a key factor for the contnued success of the Internet. In ths paper, we propose a Far Intellgent Congeston Control esource Dscovery (FICCD) protocol on TCP based network whereby a mechansm s employed at core routers to determne avalable network resources and convey ths nformaton to edge routers. At the edge routers, an ntellgent control algorthm s employed to assst the TCP to maxmze ts traffc over the underlyng network. The key deas are to ntegrate avalable network resources n estmatng connectons far share; to create feedback control loops between edge routers; to employ a specal esource Dscovery (D) packet to collect and convey en route router state nformaton; and to employ ntellgent algorthms to match a TCP connecton s sendng rate to the rate at whch the underlyng network can support. We demonstrate that FICCD protocol s effectve, far, flexble and can be easly extended for QoS control of the future Internet. Keywords TCP, Congeston Control, Explct Wndow Adaptaton, Acknowledgment Bucket Control, Feedback Control Loop 1. INTODUCTION Today s Internet only provdes best-effort servce for all traffc. Traffc s processed as quckly as possble but there s no guarantee as to tmelness or actual delvery. The network makes no attempt to dfferentate ts servce response between the traffc streams generated by concurrent users of the network. Ths means that the network s not able to guarantee the level of servce requred by an applcaton that demands more strngent response n terms of delay, jtters, bandwdth, etc. A smple applcaton such as vdeoconference over the Internet wll quckly demonstrate the problems wth real-tme applcatons. A person takng part n a vdeoconference wll mmedately realze that the qualty of the mages s not as good as expected, the flow of mages s not qute smooth and the synchronzaton between voce and mages s far from perfect. The evoluton of the Internet s at a turnng pont. It s well accepted that, n ts evoluton n the 21st century, the deployment of Qualty of Servce (QoS) aware technologes s a key factor for the contnued success of the Internet. Some advances n ths drecton have already been provded wth the ntroducton of the Internet augmented archtectures wth QoS supports: the Internet Protocol Verson 6 (IPV6) [2], the Integrated Servces [3-4] and Dfferentated Servces [5-6] by the IETF. Furthermore, the eservaton Protocl (SVP) [7] and the Mult Protocol Label Swtchng (MPLS) technque [8] provde addtonal support n terms of sgnalng and traffc engneerng. At the nfrastructure level, the deployment of Wavelength Dvson Multplexng (WDM) systems [9-10] creates a huge transport capacty, whch allevates the bandwdth demand of multmeda applcatons over the Internet. Despte these advances, many ssues stll reman to be solved. Among them, ssues concernng admsson control and resource allocaton polces n the network, adequate user sgnalng protocols, network management systems for large numbers of users and securty requre closer attenton. It s expected that, havng n place the adequate nfrastructure and protocols, hgh qualty real-tme applcatons can run on the Internet wthout sgnfcant nterference from conventonal data traffc. 1 Ths work was supported n part by AC Grant. 2 The correspondng author

Our approach s motvated by recent technologcal changes and the need for the adequate nfrastructure and protocols towards the QoS-aware network. We beleve that for effectve QoS-aware technologes, QoS ssues have to be tackled at several levels as shown n Fgure 1.1. At the network level, relevant nformaton concernng the network operatonal condtons and avalablty of resources of the underlyng network s essental to avod network congeston. At the transport level, relevant nformaton concernng the end systems s crucal for far bandwdth sharng and end-to-end QoS per connecton. At the applcaton level, relevant nformaton concernng the end applcatons are necessary to provde approprate QoS for the applcaton. We also beleve that feedback mechansm s essental for QoS control n networkng. By couplng wth relevant protocol for transportng necessary feedback nformaton as well as control actons amongst partcpatng enttes, we can make congeston control decsons, resources allocaton decsons, QoS decsons more ntellgent. Fgure 1 Feedback Mechansm for QoS Control In ths paper we develop a feedback control loop at the network layer to provde the transport protocol wth necessary nformaton for optmsng ts operaton. Several algorthms are employed to maxmse the TCP sendng rate of a connecton over the avalable bandwdth of the underlyng network. In partcular, we propose Far Intellgent Congeston Control esource Dscovery protocol (FICCD) on TCP based network n whch a mechansm s employed at core routers to determne avalable network resources and convey ths nformaton to edge routers. At the edge routers, an ntellgent control algorthm s employed to assst the TCP to maxmze ts traffc over the underlyng network. The key deas are to ntegrate avalable network resources n estmatng connectons far share of network resource; to create feedback control loops between edge routers; to employ a specal esource Dscovery (D) packet to collect and convey en route router state nformaton; and to employ ntellgent algorthms to match a TCP connecton s sendng rate to the rate at whch the underlyng network can support. We demonstrate that the framework can sgnfcantly mprove n throughput, farness, and packet loss rate for end-to-end TCP connectons. More mportantly, our protocol s transparent to TCP, requres no modfcatons to current TCP mplementatons and can be easly extended for QoS control of the future Internet. The paper s organzed as follows. We begn n secton 2 by brefly descrbng some related work. Our proposal s presented n secton 3. Secton 4 descrbes smulaton scenaro, smulaton envronment and smulaton parameters. The smulaton results and evaluaton are presented n secton 5. Some concludng remarks and drecton of future work are gven n secton 6. 2. ELATED WOK A computer network typcally uses store-and-forward routng to transfer data packets between users at geographcally dstrbuted nodes. Packets generated by a source node are delvered to ther destnaton by routng them va a sequence of ntermedate nodes. The traffc flowng through an ntermedate node depends upon the number of source-destnaton pars that are routed through that node and the rates at whch these sources ntroduce packets nto the network. If the source rates are ncreased wthout constrant, queues of packets watng to be

routed buld up at bottleneck nodes. Eventually, the bufferng capacty of these nodes s exceeded and packets are dropped, resultng n low throughput and hgh delay. Congeston control mechansms attempt to avod such breakdown by mposng constrants on the sources. Two types of constrant are often used. In rate-based congeston control, a lmt s placed on the rate at whch a source can send packets. In wndow-based congeston control, at any nstant there s a lmt to the number of outstandng packets at the source, but there s no constrant on the rate at whch packets can be sent. In ATM network [11], the Avalable Bt ate (AB) servce s adopted for transportng best-effort data traffc wth no delay guarantees; AB rate-based congeston control attempts to mnmze the cell loss rato, and provde mnmum cell rate guarantees through the closed loop feedback control mechansm. The network provdes feedback to the sources when network load changes, and the sources adjust ther transmsson rates accordngly. AB congeston control handles congeston effectvely. Many studes have demonstrated that ATM AB servce can provde low-delay, farness, and hgh throughput, and can handle congeston effectvely nsde the ATM network. However, network congeston s not really elmnated but rather t s pushed out to the edge of the ATM network. Packets from TCP sources competng for the avalable ATM bandwdth are buffered n the routers or swtches at the network edges, causng severe congeston, degraded throughput, and unfarness. In IP networks, Floyd [12] proposed to modfy TCP slghtly to nclude an Explct Congeston Notfcaton (ECN) from routers to the sources to trgger a wndow sze reducton dentcal to that caused by the fast retransmt fast recovery mechansm of TCP-eno, yet wthout droppng packets. By combnng explct notfcaton wth ED, the performance of both delay-senstve (telnet-lke) and delay-nsenstve (ftp-lke) traffc can be mproved. However, because of ts bnary feedback, ECN cannot avod wndow and network oscllatons. These can negate the gan n network performance. Other approaches such as Tr-S [13] and TCP-Vegas [14] attempt to estmate the bandwdth-delay product for each TCP connecton and adjust the wndow sze based on ths estmate. However, these schemes ntroduce complexty n the end-system and requre extensve modfcatons to current TCP mplementatons. Gerla et al. proposed a feedback-based algorthm (BA-TCP) [15-16] at network layer to convey the roundtrp propagaton delay and avalable bandwdth nformaton for each TCP connecton. The end hosts use ths nformaton to adjust ther congeston wndow. However, knowledge of the TT s usually not avalable at current router. The scheme also needs to modfy current TCP mplementaton by addng one state varable to store the round-trp propagaton delay and advertsng the mnmum of the recever s buffer space and the avalable bandwdth-delay product. Hjalmtysson [17] descrbed a control-on-demand model for programmable networks. Ths model allows the nstalled control programs to explot lower-level facltes, n partcular hardware facltes. Through flterng and frame peekng, control programs can nspect flows or aggregate or control stream of Internet and then extract the requred nformaton for ntellgent control. Wth ths approach, one does not have to modfy exstng router n anyway snce the control servce can be downloaded or njected to the router on the fly wthout nterruptng ts operaton. Harsson and Kalyanaraman [18] proposed edge-to-edge feedback-based control algorthm at network layer to regulate the aggregate traffc between each edge-par. Each control loop creates a vrtual lnk and the exchange of control packets operates on a per-edge-to-edge vrtual lnk bass. A new set of congeston control technques s requred to construct vrtual lnks, whch break up congeston at nteror nodes and dstrbute the smaller congeston problems across the edge nodes. However, the scheme s requrement on routers s hgh. It may be unrealstc to expect routers to devote much of ther resources to exercsng the algorthm and handng the admsson control. 3. FAI INTELLIGENT CONGESTION CONTOL ESOUCE DISCOVEY POTOCOL In ths secton, we provde detals of the proposed framework and show how the network operates under the proposed framework. We consder smplfed node, local access network and wde area network archtectures for current Internet Infrastructure (fgure 2).

The am of FICCD protocol s twofold. Frstly, t ams to develop a feedback loop n WAN regon between the edge routers to convey nformaton concernng avalable network resources and network condtons from wthn the network. We have deployed a smlar scheme, the Far Intellgent Congeston Control (FICC) [19-20], successfully for ATM s AB congeston control. In ths paper the nnovatve aspect s n nvestgatng how such a feedback scheme can be useful over the Internet. Secondly, t ams to maxmze a TCP connecton throughput by matchng ts sendng rate to the rate at whch the underlyng network can support. We am to establsh a feasble framework over whch explct feedback nformaton can be conveyed. Qualty of Servce (QoS) and congeston control mechansms can then be deployed at the edge devces based on the feedback nformaton. Our ntal mplementaton s concerned wth ndvdual connectons to see how TCP operates under ths scheme. Our next step s to nvestgate the scalablty of the scheme by applyng t on a per-class bass as specfed by the dfferentated servces code pont (DSCP) n DffServ. Bascally the control loop operates as follows. A specal resource dscovery (D) packet s generated at source edge router for each flow proportonally based on the packet arrval rate. The D-packet wll carry the arrval packet rate (or ts estmate) n ts AP feld. Each core router along the path drectly updates feedback nformaton concernng the network condtons n the D packets when they pass n the forward or backward drecton. The destnaton edge router sends back the D-packets. When the source edge router receves Backward D-packet, t passes the feedback nformaton to an algorthm that s responsble for matchng the TCP sendng rate to the expected rate supported by the network. Hosts Edge outer Border outers Edge outer Hosts L- E- B- C- B- E- L- Leaf outer LAN WAN LAN Leaf outer D(Q S 1,,..) D(Q 1 1, ) D(Q k 1, ) 3.1 Edge outer behavors Fgure 2 Internet General Model and FICCD Control Loop As far as the FICCD s concerned, an edge router s responsble for estmatng packet arrval rate for ts connecton, ntatng and mantanng the D control loop, collectng the feedback nformaton, and exercsng control algorthm for coordnatng control between TCP and the underlyng network. 3.1.1 Forwardng behavors In the forward drecton, the source edge router classfes the ncomng packets nto flows and the arrval packet rate of each flow denoted as AP (t). Snce an exact computaton of the arrved rate of each flow s hardly feasble, a per-flow rate estmate s updated upon the recepton of every packet usng exponental AP (t )

averagng formula as n CSFQ [21]. Usng an exponental weght gves more relable estmaton for bursty traffc, even when the packet nter-arrval tme has sgnfcant varance. If we ndcate the arrval tme of the k-th packet of flow as T K and ts length as, the new estmate of AP (t ) can be computed as follows: AP new ( t ) l k ( t ) k k k T / K l T / K old = (1 e ) k + e AP (1) T K Where represents the k-th sample of the nterarrval tme of flow,.e., T K k ( k 1) T = and K s a t t constant. D packets are generated at source edge router for each flow proportonally based on the packet arrval rate n Eqn. (1). D-packet wll carry the arrval packet rate n ts AP feld AP (t ) AP (t ) Edge outer Packet Buffer Packets ACKs Control ACK Buffer Explct Wndow Adaptaton Normal ACK Bucket Control 3.1.2 Backwardng behavors Fgure 3 Edge outer model In the backward drecton, two approaches (Explct Wndow Adaptaton, ACK Bucket Control) can be employed at source edge router to convey such feedback nformaton concernng the network condtons to TCP source. The Explct Wndow Adaptaton approach controls the maxmum recever wndow (WND) at edge router, whch acts as an upper bound on the TCP congeston wndow (CWND) varable at the TCP source, thus effectvely controls the TCP sender rate by matchng t wth the feedback nformaton concernng the network condtons at the network layer. The ACK Bucket Control approach ams to match the TCP sender rate wth the avalable feedback resources by wthholdng the Acknowledgments at the edge router. We have recently proposed a Far Intellgent Explct Wndow Adaptaton (FIEWA) scheme and a Far Intellgent ACK Bucket Control (FIABC) scheme for each of the two approaches [22-23]. The essental deas of these schemes are summarzed below. 3.1.2.1 Far Intellgent Explct Wndow Adaptaton The objectve of Far Intellgent Explct Wndow Adaptaton (FIEWA) s to match the sum of the wndows of all actve TCP connectons sharng the buffer at the edge router to the effectve network delay-bandwdth product, thus avodng packet losses whenever possble. Two key components are ncluded n FIEWA: () A mechansm to sgnal wndow updates from the network to the source, and () a scheme at the bottleneck pont to estmate the avalable bandwdth based on the congeston state of the network. The former can be accomplshed by allowng the network edge elements to modfy the recever s advertsed wndow feld carred by TCP acknowledgements from the destnaton to the source. The latter problem, however, s sgnfcantly more dffcult. Frst, when there are multple bottlenecks on the path of a TCP connecton, the wndow estmaton algorthms at these bottlenecks may nteract n undesrable ways. Second, estmatng the avalable bandwdth of an output lnk of a bottleneck element s rather dffcult. Fnally the advantages of the scheme must be compared aganst those of mplct (packet dscard) schemes of comparable complexty.

For the specfc network envronment under consderaton, the stuaton s much smpler. Frst, we assume that the congeston between source edge router to destnaton edge router s well control; the only bottleneck n the path of the TCP connectons occurs at the source edger router. Second, both the bandwdth avalable n the edge router, and the delay through t, reman relatvely steady over short tmescales, ndependent of the number of TCP connectons transported over t. Ths makes t easer for the edge router to estmate the avalable bandwdthdelay product for each TCP connecton. Bascally, the FIEWA works as follows. FIEWA sends explct feedback nformaton n the form the recever s advertsed wndow feld of the returnng TCP acknowledgments to TCP sources to adjust ther wndow szes. If the current value n the recever s advertsed wndow, whch s set by the destnaton system, exceeds the feedback value computed n the edge router, the recever s advertsed wndow s marked down to the feedback value. The computed feedback value s a functon of the free buffer space at the edge router. Let Q denote the empty buffer space at tme t when a returnng ACK arrves at an edge e ( t) = BufferSze Q( t) devce, where BufferSze s the total buffer space and Q (t) the total buffer occupancy at tme t. Let W denote the r (t) value n the recever s advertsed wndow feld seen n the ACK. The FIEWA algorthm computes a target wndow sze for the TCP connecton as a functon of the avalable buffer, that s f ( Q. Ths computed value e ( t )) s then used to mark down the recever s advertsed wndow feld n the acknowledgement. Snce settng the wndow sze smaller than the maxmum segment sze (MSS) negotated durng connecton establshment can lead ' to starvaton and deadlocks, a mnmum wndow sze of MSS s enforced. Thus, the feedback value, W, used r ( t ) to set the recever s advertsed wndow feld, s computed at the edge devce as ' W r ( t ) = MAX ( MIN ( W r ( t ), f ( Q e ( t ))), MSS ) (1) The dffcult task n such an algorthm s to desgn the feedback functon f ( Q. The dynamcs of the e ( t )) system depend heavly on ths feedback functon. The goal of the functon s to provde all TCP connectons wth smlar feedback, and as a result they all operate wth equal wndows. Snce a lnear functon s smple and stll effectve, t s employed n our feedback functon. Explctly, the wndow for each connecton s set to the avalable buffer space multpled by a fracton whch determnes the buffer occupancy n steady state. That s f ( Q ( t )) = DPF ( t ) * Q ( t ) = DPF ( t ) * ( BufferSze Q ( t )) (2) 3.1.2.2 Far Intellgent ACK Bucket Control e e The objectve of Far Intellgent ACK Bucket Control scheme (FIABC) s to match the TCP sender rate wth the avalable bandwdth n underlyng network by wthholdng the acknowledgment packets at edge router, so that TCP source cannot send packets more than that can be handled by the underlyng network. We choose to wthhold ACK packets at edge router based on the followng consderatons. Snce the essental nformaton contaned n an acknowledgment s only a sequence number, ths acknowledgment buffer s really only a lst of numbers. To dfferentate ths type of bufferng from the tradtonal packet buffer, we wll call t acknowledgment bucket. By controllng the flow of acknowledgments from the destnaton to the source, we can practcally elmnate the large packet buffer and stll acheve the same output rate as f we have unlmted packet buffer at the network edges. The acknowledgment bucket s analogous to the storage of permts n the well-known leaky bucket scheme. TCP acknowledgments serve as permts that allow the edge devce to request packets from the source. When the acknowledgment bucket s empty, the edge cannot request any more packets. The acknowledgment bucket gets flled up accordng to TCP dynamcs and s draned out accordng to the avalable bandwdth n the underlyng network. The acknowledgment bucket serves as a translator, whch transforms the avalable bandwdth command nto a sequence of TCP acknowledgments whose effect s to have the TCP source sent data no faster than the avalable bandwdth. The dffcult task n such an algorthm s to determne the forwardng rate for the acknowledgments. Snce the edge devce serves as a vrtual source for the underlyng network, our approach determnes the acknowledgment packet releasng by comparng the request from underlyng network wth current edge devce buffer length. In detal, our approach s to estmate the amount of data requested by underlyng network from last ACK release at edge devce correspondng the avalable bandwdth denoted as AB. That s, the amount of data

for each connecton requred by underlyng network at tme t, denoted as AB t )*( t t n steady state. ( lastackrelease Underlyng ( t ), s set to ) multpled by a queue control functon DPF that determnes edge router buffer occupancy Underlyng ( t lastackrel ease ) = DPF ( t ) * AB( t ) * ( t t ) (1) Note that the amount of data requested by the underlyng network Underlyng ( t ) from last ACK release must be smaller than the advertsement wndow sze n the latest ACK packet receved by edge router. t ) = Mn ( Underlyng t ), WND) (2) Underlyng ( We denote Q t ) the packet queue length at tme t at edge devce. Snce the packet queue at edge devce ( servces as a vrtual source for the underlyng network, FIABC schedule the ACK releasng from the ACK Bucket by comparng currently what the underlyng network request the packets from the edge devce Underlyng t ) wth currently what edge devce can provde n ts packet queue Q t ). Whenever Underlyng t ) > Q t ), the edge devce wll release an acknowledgment from the ACK Bucket. 3.2 Core outer behavors We employed the Far Intellgent Congeston Control (FICC) scheme [18] at each core router to estmate a far share of bandwdth for competng TCP connectons, calculate avalable network capacty and feedback relevant nformaton to the edge router. It has been demonstrated that FICC s smple, robust, and effectve congeston control algorthm. Importantly, FICC s also able to allocate bandwdth farly among ts connectons. Essentally, n order to estmate the current traffc generaton rate of the network and allocate t among connectons farly, a Mean Allowed Packet ate (MAP) s kept at each core router. MAP = MAP + β * (AP MAP) Where AP s the value of the current arrval packet rate carred n the AP feld of the arrvng forward D-packet. MAP represents an estmate of the average load passng through the router at the current tme. When the network operates at the acceptable level, the correspondent MAC s regarded as the optmal packet rate for each flow. In Far Intellgent Congeston Control mechansm, the network s expected to work at the target operatng pont. The target operatng pont adopted n ths scheme s a pre-set Buffer Utlzaton ato (BU), whch means that the optmal control s to keep the buffer utlzaton at an optmal level. The motvaton behnd ths dea s to make effcent use of the buffer capacty. D (AP, E, CI) D (AP, E, CI) D (AP, E, CI) D (AP, E, CI) ( ( ( ( ( D Data Control Element (CE) FE Q6/w 6 : Premum Q5/w 5 : Platnum(AF4) Q4/w 4 : Gold (AF3) Q1/w 1 : Best Effort(DE) C n Fgure 4 Core outer model

To calculate the expected rate (E) based on the queue length at core router, a lnear queue control functon DPF s employed n our scheme. The basc characterstcs of the functon are that t has a value equal to 1 when the queue length s target queue length Q0, and a value less/larger than 1 when the queue length s larger/less than Q0. The larger/smaller the queue length, the smaller/larger the factor to push forward the network to the target operatng pont. Snce queue s bult up and draned out contnuously, queue control functon s desred to perform contnuous control to produce proper effect on the queue fluctuaton and smooth the computed E values. The pseudocode of FICCD s shown n table 1. efer to [1, 19] for further descrpton of the algorthm. Forward Table 1. Descrpton of the Core outer s Algorthm D (AP, E, CI) If Queue > Q0 True If AP < MAP True MAP=MAP+b*(AC-MAP) D(AC,E,CI) C O E O U T E D(AC,E,CI) False MAP=MAP+b*(AP-MAC) If E > DPF*MAP DPF=(a-1)*(Q0-QueueLength)/Q0+1 False If Queue > Q0 D(AP,E,CI) C O E O U T E True True E=DPF*MAP DPF=(Buffersze- ueuelength)/(buffersze-q0) 4 SIMULATION SETUP Backward We use ns (verson 2) [24] network smulator to evaluate the proposed FICCD protocol. Ns s a dscrete event smulator for network research. It provdes substantal support for TCP, router queung mechansms, and varous topologes. New components edge router, core router and new protocol FICCD were added and compled nto ns. The smulaton performs wth TCP applcatons runnng over an IP network. Peer-to-Peer confguraton [Fgure 4] s employed n the smulaton. There are 10 sources sendng data to 10 dstnct destnatons through a sngle bottleneck lnk between 11 and 12 wth buffersze of 200pkts, propagaton delay of 20 ms and bandwdth of 10 Mbts/s. Source 0 sends data to the destnaton 14 (on path 10, 11, 12, 13) has propagaton delay of 10 ms and bandwdth of 10 Mbts/s. All the other lnks are wred wth propagaton delay of 2 ms and bandwdth of 10Mbts/s. The pont we want to look at s the far share of bandwdth among multple connectons wth dfferent TT sharng a bottleneck lnk. Each source has an nfnte data to send. The sze of data packets s 4Kbyte. The smulaton s run for 200 seconds. TCP clock granularty s set to 0.3 seconds and the recever s wndow sze s set to128 Kbytes. The TCP verson used n our smulatons was TCP eno, whch ncludes fast retransmsson and fast recovery.

10Mbt/s, 10ms 100Mbt/s, 10ms 1.5Mbt/s, 20ms 100Mbt/s, 10ms 10Mbts,2ms Fgure 4 Peer to peer confguraton 5. SIMULATION ESULTS AND ANALYSIS 10Mbts,2ms In ths secton we present the smulaton results for FICCD (denoted as FICCD (FIEWA) and FICCD (FIABC) ), smple Droptal (denoted as Droptal ), ED (denoted as ED ) and ECN wth ED (denoted as ED+ECN ) for the purpose of comparson and dscusson. We evaluate the smulaton results n terms of the goodput, the sender sequence number at TCP source, the packet queue length, and the droppng total at the bottleneck core router. 5.1 Packet Queue Length The man reason for TCP performance degradaton s due to the overflow of buffers at bottleneck router. An mportant attrbute of the TCP congeston control mechansm s that t does not assume any explct sgnalng of congeston state from the underlyng network for. It nfers the congeston state of the network mplctly: the arrval of acknowledgements (ACKs), tmeouts, and recept of the duplcate ACKs. As a result, the wndow-based congeston control mechansms of TCP may nteract wth the underlyng network n undesrable ways, causng severe congeston, degraded throughput, and unfarness. Queue Length QueueLength 800000 600000 Dropt al FICCD+FIABC ED+ECN FICCD+FIEWA ED 900000 800000 700000 600000 Max. Avg. Mn. 400000 500000 200000 400000 300000 0 0 10 20 30 40 50 Tme(M llseconds) 200000 100000 0 Dr opta l FICCD(FIEWA) FICCD(FIABC) ED+ECN ED Fgure 5 Bottleneck Queue Length As shown n Fgure 5, wth Droptal, the packet queue length grows beyond the maxmum packet buffersze of the bottleneck router, and packets have to be dropped, packet retransmsson occurs when the TCP source becomes aware of the loss of packet. Wth ED, two fxed thresholds (hgh threshold and low threshold) are used to detect congeston, dfferent droppng polces are employed for the congeston perod when

the queue length s greater than the hgh threshold and the congeston perod when the queue length s between the two thresholds. Both Droptal and ED use droppng mechansm at router to ndcate the congeston and control TCP sendng rate mplctly. The queue length varaton s between 300000 bytes to 800000 bytes for Droptal and between 400000 bytes t0 600000 bytes for ED. By combnng ECN wth ED, the bottleneck router can set the congeston bt n the ACK return back to TCP, thus provdng TCP an explctly nformaton to controllng ts sendng rate. ather than usng a fxed queue threshold to arbtrarly dvde a network nto congeston and noncongeston states, our FICC algorthm ams for a target operatng pont where the router queue length s at an optmal level for good throughput and low delay, and where the allocaton s optmal for each connecton. The queue control functon encourages traffc sources f the target operatng pont s not reached, and dscourages the sources f the swtch operates beyond ts target operatng pont. As shown n Fgure 5, FICCD mantans the queue level at the target level around 400000 bytes wth narrow range ([390000 bytes, 410000 bytes]). 5.2 Goodput We use the current acknowledged bytes dvded by the smulaton duraton tme to calculate the goodput. Fgure 6 shows the goodput for each flow durng ntervals 50 200 seconds. The goodput shown n ths fgure has been normalzed by the bottleneck far share (.e., by 0.15 Mbts/s). Therefore, a goodput of 0.15 represents a data throughput of 0.15 Mbts/s. The fgure shows an unfar allocaton of bandwdth when other schemes are used. In contrast, the throughput obtaned by FICCD s far n that all TCP connectons are allocated roughly the same amount of bandwdth. We notce the average effectve throughput shows a slghtly lower than the estmated value of 0.15Mbts/s. Ths manly comes from the neffcency of the TCP slow-start, the overhead costs concernng packet headers, the paddngs, and the bandwdth requred for D packets. The farness property of FICCD comes from three man factors: Frstly, at each core router, FICCD estmates accurately the far share of ts connectons. Secondly, FICCD bulds n an oversell feature that allows unconstraned connectons to take up the leftover bandwdth that cannot be taken up by constraned connectons. Ths allows the bandwdth to be shared among unconstraned connectons farly. Thrdly, FICCD does not allow the operatng pont to dverge far wary from ts stable pont. Ths results n far share and small devatons n the router queue length, n packet delay and packet delay varaton. Goodput Sender sequence number 1.6 1.4 1.2 1 0.8 0.6 1.16 1 2 3 4 5 6 7 8 9 10 Total 1.44 1.37 1.21 1.23 Sequence number 1400 1300 1200 1100 1000 900 800 Dropt al FICCD(FIABC) ED+ECN FICCD(FIEWA) ED 0.4 700 0.2 0 18 20 22 24 26 28 Tme(M Illseconds) Dr opta l FICCD(FIEWA) FICCD(FIABC) ED ED+ECN Fgure 6. Goodput Fgure 7. Sender Sequence Number 5.3 TCP Sender Sequence Number We use TCP sender sequence number versus tme to pant a pcture of TCP sendng rate as shown n Fgure 7. Comparatvely, t s clear that the TCP sendng rate n FICCD mechansms s less than other cases before the packet droppng, whch means that the burstness of traffc s reduced based on explct feedback rate n D packet n FICCD. The feedback loop n our schemes s explct and effectve n that the TCP source rate s drectly controlled to adapt to the avalable bandwdth, rather than progressvely adjusted through TCP wndow flow control, whch reles on packet drop as ndcaton of network congeston.

Dropng Total 1 2 3 4 5 6 7 8 9 10 ED+ECN ED FICCD(FIABC) FICCD(FIEWA) Dr op Ta l 0 10000 20000 30000 40000 50000 60000 70000 Fgure 8 Droppng Total 5.4 Dropng Total We also show the droppng total for each flow n Fgure 8. It shows clearly that wth our scheme there are no packets droppng at bottleneck router. Wth Droptal, the packet queue length frequently grows above the buffer lmt and hence packets are dscarded; the droppng total (50000 bytes) s largest compared wth other schemes. ED and ED+ECN use dfferent droppng polces dependng on the congeston states. Overall, ED+ECN performs slghtly better than ED wth a droppng total of 20000 bytes, comparng wth 30000 bytes n ED. 6. CONCLUSION AND FUTUE WOK Ths paper proposes the Far Intellgent Congeston Control esource Dscovery (FICCD) protocol for the purpose of mprovng end-to-end TCP performance by controllng the congeston and allocatng far share of bandwdth to competng TCP traffcs. The essental dea of the Far Intellgent Congeston Control esource Dscovery protocol s the ntroducton of a feedback loop and ts assocated protocol to collect relevant nformaton about the underlyng network between a source and a destnaton edge routers par; and the use of the nformaton to regulate the TCP congeston control and maxmze ts performance. The sgnfcant contrbutons of FICCD protocol nclude: Integratng of network resources, such as avalable bandwdth, avalable buffer, queung delay and jtter to estmate far share of network resources among competng traffc, Allowng possble ntegraton of LAN and WAN together to provde end-to-end QoS for applcaton by allowng the mappng of LAN request to approprate QoS of WAN supported by feedback control mechansm, Permttng an admsson control mechansm to make use of the feedback nformaton to provde adequate level of control. The performance evaluaton s based on the goodput, farness, buffer requrement, etc. The smulaton results show that our scheme s effectve n mprovng goodput, achevng farness, and mnmzng packet loss rate for end-to-end TCP connectons. Importantly, our framework s transparent to TCP, requres no modfcatons to the current TCP mplementaton and can be easly extended for QoS control of the future Internet. Currently, we are evaluatng the overheads ncurred by the feedback loop and D packets. We are also nvestgatng the use of FICCD for congeston and QoS control n the Dfferentated Servces archtecture. The goal s to apply FICCD not on a per flow bass but on a per DSCP or class bass so as to preserve the scalablty of Dffserv.

EFEENCES 1) Q. Yu, Mng L, Hoang, D. B. and Davd Dagan Feng, "Far Intellgent Feedback Mechansm on TCP Based Network", to appear n the proceedngs of the 2002 Internatonal Conference on Internet Computng (IC 2002), Las Vegas, Calforna, USA, June 2002. 2) Internet Protocol Verson 6 (IPV6). http://www.pv6.org 3). Braden, D. Clark, and S. Shenker, Integrated Servces n the Internet Archtecture: an overvew, IETF FC 1633, June 1994. 4) D. Clark, S. Shenker, and L. Zhang, Supportng real-tme applcatons n an ntegrated servces packet networks: Archtecture and mechansm, ACM SIGCOMM, Baltmore, 1992. 5) I., Stoca, L. Zhang, A model for servce dfferentaton n the Internet, NOSSDAV 98, 1998. 6) D. Clark, W. Fang, Explct allocaton of best effort packet delvery servce, IEEE/ACM Transactons on Networkng, Vol. 6, Issue 4, 1998. 7) L. Zhang, et al., SVP: A new resource reservaton protocol, IEEE Network, Vol. 7, Issue 5, pp. 8-18, 1992. 8) E. osen, A. Vswanathan, and. Callon, Multprotocol Label Swtchng Archtecture, IETF FC 3031, January 2001. 9) A.S. Acampora, M.J. Karol, An overvew of lghtwave packet networks, IEEE Network pp. 29-41, Jan, 1989. 10) E. Modano, WDM-based packet networks, Magazne of IEEE Communcaton, pp. 130-135, Mar, 1999. 11) W. Stallngs, Hgh-Speed Networks: TCP/IP and ATM Desgn Prncples, Prentce-Hall, 1998. 12) S. Floyd, TCP and explct congeston notfcaton, Computer Communcaton evew, vol. 24, no. 5, pp. 8-23, October 1994. 13) Z. Wang and J. Crowcroft, A new congeston control scheme: slow start and search (Tr-S), Computer Communcaton evew, vol. 21, no. 1, pp. 32-43, January 1991. 14) L. S. Brakmo, L. L. Peterson, TCP Vegas: End to end congeston avodance on a global Internet, IEEE Journal on Selected Areas n Communcatons, vol. 13, no. 8, pp. 1465-1480. 15) M. Gerla, W. Weng,. Lo Cgno, BA-TCP: A bandwdth aware TCP for satellte networks, Proceedngs of IEEE ICCCN 99, Boston, Massachusetts, October 1999. 16) M. Gerla, W. Weng;.Lo Cgno,, Bandwdth feedback control of TCP and real tme sources n the Internet, Global Telecommuncatons Conference, 2000 (GLOBECOM '00). IEEE, Volume: 1, pp: 561 565, 2000. 17) G. Hjalmtysson, Control on-demand: An Effcent Approach to outer Programmablty, IEEE Journal on Selected Areas n Communcatons, Vol. 17, No. 9, pp. 1549-1562, Sept. 1999. 18) Davd Harrson, Shvkumar Kalyanaraman, "Edge-to-Edge Traffc Control for the Internet: Concepts and Archtecture," PI ECSE Networks Laboratory Techncal eport, ECSE-NET-2000-1. January 2000. 19) D. B. Hoang, and Z. Wang, A Far Intellgent Congeston Control for ATM, Techncal eport 224, ISBN 1 864873264, School of Informaton Technologes, Sydney Unversty, Australa, December 1999. 20) Hoang, D. B., and Yu, Q., "Performance of the Far Intellgent Congeston Control for TCP Applcatons over ATM Networks", Proceedngs of the Second Internatonal Conference on ATM (ICATM'99), Colmar, France, June 1999, pp. 390-395. 21) I. Stoca, S. Shenker, and H. Zhang, Core-Stateless Far Queueng: Achevng Approxmately Far Bandwdth Allocatons n Hgh Speed Networks, In Proceedngs of the ACM SIGCOMM 98, Vancouver, Canada, September 1998. 22) Yu, Q., and Hoang, D. B., "A Coherent Approach to Cooperaton between TCP and ATM Congeston Control," submtted to specal ssue of the Transactons of the Socety for Computer Smulaton -Part B on Performance Modelng and Smulaton of ATM Systems and Networks. Y 23) Yu, Q., and Hoang, D.B., "Far Intellgent Explct Wndow Adaptaton," IC'2001, Las Vegas, Calforna, USA, pp. 486-492. 24) ns-2, Network Smulator(verson.2). LBL, UL: http://www.s.edu.au/nsnam