2 Department of ECE, Jayaram College of Engineering and Technology, Pagalavadi, Trichy,

Size: px
Start display at page:

Download "2 Department of ECE, Jayaram College of Engineering and Technology, Pagalavadi, Trichy,"

Transcription

1 End-to-End Congestion Control using Polynomial Algorithms in Wired TCP Networs M.Chandrasearan, M.Kalpana, 2 and Dr.R.S.D.Wahida Banu 3 Assistant Professor, Department of ECE, Government College of Engineering, Salem 636 0, India.mcs23@rediffmail.com 2 Department of ECE, Jayaram College of Engineering and Technology, Pagalavadi, Trichy, India.alps_aila@yahoo.com 3 Assistant Professor, Department of CSE, Government College of Engineering, Salem 636 0, India rsdwb@yahoo.com Abstract This paper introduces and analyses a class of nonlinear congestion control algorithms called polynomial congestion control algorithms. They generalize the AIMD algorithms used for the TCP connections. These algorithms provide additive increase and multiplicative decrease using the polynomial of the current window size. There are infinite numbers of TCP-compatible polynomial algorithms by assuming polynomial of different order. This paper analyses the performance of two models of these generalized algorithms for the TCP networs. TCP compatibility of these algorithms is evaluated using the simulations done using ns2, a discrete event simulator. One such model is also proved to be TCP- compatible. The results of simulation are compared withthat of TCP and TCP/Reno. Keywords: Congestion control, TCP, non-linear algorithms, AIMD, ns2, Mobile ad hoc networs.. Introduction. The rapid growth of the Internet has spared the demand of several applications, which require the stability of the Internet. The stability of Internet depends on transmission errors, bandwidth sharing of sources that use common bottlenec lins, round trip time (RTT) and mainly due to congestion. TCP/IP is the standard networ protocol stac on the Internet. TCP s end-to-end congestion control mechanism reacts to pacet loss by adjusting the number of outstanding unacnowledged data segments allowed in the networ [], [8]. Such algorithms are implemented in its protocol, TCP. [2], [3] and [4]. In the existing algorithms, increasing the congestion window linearly with time increases the bandwidth of the TCP connection and when the congestion is detected, the window size is multiplicatively reduced by a factor of two. TCP is not well suited for several emerging applications including streaming and real time audio and video because it increases end-to-end delay and delay variations. In this paper a new class of nonlinear congestion control algorithms for Internet Transport Protocols and applications are presented for analysis. The authors see to develop a family of algorithms for applications such as Internet audio and video that does not react well to rate reductions, because the rate reduction technique used for these applications will result into the degradation in userperceived quality [5], [6]. TCP-compatibility of the generalized Additive Increase and Multiplicative Decrease (AIMD) congestion control algorithms are studied and the proposed algorithms are simulated wired TCP networ. In this paper the performance of the proposed algorithms in Mobile Ad hoc Networs that uses TCP are also studied. The rest of this paper is organized as follows: section 2 discusses the window based TCP congestion control mechanism. Section 3 discusses about the proposed generalized congestion control algorithms called Polynomial algorithms and the two models used for our simulations. Section 4 discusses the implementation details and TCP compatibility of one such model. In section 5 the implementation details, simulation and analysis of the two models for wired TCP networ are explained. Simulation of the proposed models for Mobile Ad hoc Networs are given in section 6. This paper finally concludes in section Window Based Congestion Control for TCP Networs. TCP is a connection-oriented protocol that offers reliable data transfer as well as flow and congestion control. [8]. TCP maintains a congestion window that controls the number of outstanding unacnowledged data pacets in the networ. Sending data consumes slots in the window of the sender and the sender can send pacets only as long as free slots are available. On start-up, TCP performs slowstart, during which the rate roughly doubles each round-trip time to quicly gain its fair share of bandwidth. In steady state, TCP uses the AIMD mechanism to detect additional bandwidth and to react to congestion. When there is no indication of loss, TCP increases the congestion window by one slot per round-trip time. In case of pacet loss, indicated by a timeout, the congestion window is reduced to one slot and TCP reenters the slowstart phase. Pacet loss ind icated b y three duplicate results in a window reduction to half of its previous size. The AIMD algorithm may be expressed as given in [8], [9] and [0]. ACKs I: W t+rf W t + α ; α > 0 D: W t+δtf ( - β ) W t;0< β < () where I In cr e a s e in window as a result of the receipt of one window of acnowledgement in a round-trip-time (RTT) and D Decrease in window size on detection of congestion by the sender W t Window size at time t R RTT of the flow and α and β Increase and Decrease Rule constants.

2 3. Polynomial Congestion Control Algorithms This section discusses the properties of polynomial congestion control algorithms. The window adjustment policy is only one component of the congestion control protocol derived from polynomial algorithms. Other mechanisms such as congestion detection (loss, ECN etc.), retransmissions (if required), estimation of Round-trip-time etc., remain the same as TCP [7]. The authors propose a generalization of the AIMD rules in the following manner, in order to study and understand the notions of TCP compatibility and the trade off between the increase and decrease rules. The polynomial rules are given below: I : Wt+R f Wt + ( α / Wt ) + ( α / Wt ) 2 + ( α / Wt ) ; α > 0 D: Wt+δtf Wt - ( β Wt ) l - ( β Wt ) 2l - ( β Wt ) 3l ; 0 < β < (2) These rules generalize the class of all congestion control algorithms based on window size adjustment. Now for the analysis of the algorithms the above rules are restrict ed into a Model as given below. I: W t+r f W t + ( α / W t ) D: W t+δtf W t - ( β W t ) l (3) For various values of and l the above rules show the forms of various increase and decrease rules () For = 0, l = the rules show AIMD. I: W t+r f W t + D: W t+δtf W t - β W t (4) (2) For = -, l = the rules show Multiplicative Increase and Multiplicative Decrease (MIMD) I: W t+r f W t + W t / α D: W t+δtf W t - β W t (5) (3) For = -, l = 0 the rules show Multiplicative Increase and Additive Decrease (MIAD) I: W t+r f W t + W t / α D: W t+δtf W t - (6) (4) For = 0, l = 0 the rule show Additive Increase and Additive Decrease (AIAD) I: W t+r f W t + D:W t+δtf W t - (7) The polynomial algorithms of different order are obtained by including the higher order terms. For example, the authors assume the general rules restricted to the first two terms only (second order polynomial algorithms) as shown below: I: W t+r f W t + ( α / W t ) + ( α / W t ) 2 ; α > 0 D: W t+δtf W t - ( β W t ) l - ( β W t ) 2l ; 0 < β < (8) Using the above second order polynomial rules and assuming various values of and l the following general polynomial algorithms are obtained: () For = 0, l = 0 the rules show AIAD. I: W t+rf W t + 2 D: W t+δtf W t - 2 (9) (2) For =, l = the rules show PIPD. I: W t+r f W t+ ( α / W t) + ( α / W t ) 2 D: W t+δtf W t - ( β W t) - ( β W t) 2 (0) (3) For = 0, l = the rules show Additive Increase and Polynomial Decrease (AIPD) and (4) For =, l = 0 the rules show Polynomial Increase and Additive Decrease (PIAD). By choosing different values of α and β in equations (3) and (8), they became the members of the polynomial family. All possible algorithms that may be used for the window size adjustment for the congestion avoidance are obtained by including the higher order terms 4. Implementation The authors have implemented the algorithms represented by equations (3) and (8) and these polynomial algorithms are named as MIMD and PIPD. Both these algorithms are implemented to study the variation of window size and the resulting throughput with respect to time. The algorithm begins in the slowstart state []. In this state, the congestion window size is doubled for every window of pacets acnowledged. Upon the first congestion indication, the congestion window size is cut in half and the session enters into the polynomial congestion control state. In this state the congestion window size is increased by [( α / W t ) +(α / W t ) 2 + ( α / W t ) ] for each new acnowledgement received, where W t is the current congestion window size. The algorithm reduces the window size when congestion is detected. Congestion is detected by two events: (i) triple-duplicate ACK and (ii) timeout. If by triple-duplicate ACK, the algorithm reduces the window size by [( β W t ) l -( β W t ) 2l -( β W t ) 3l -... ]. If the congestion indication is by time-out, the window size is set to. The algorithms for MIMD and PIPD are implemented as explained above. The window size and throughput of these algorithms are compared with the standard congestion algorithms for TCP and TCP/Reno [8], [2]. 4.. Throughput The throughput of the MIMD polynomial algorithm is analysed now as a function of the loss- rate it experiences. The analysis is similar to the analysis explained in [8], [9]. T h e following analysis is made by using the Increase rule of MIMD of the polynomial algorithms and by linear interpolation of window size between W t and Wt+R : dw dt + = α () W R W α t = + C (2) + R where C is the constant of integration. The functional form of this curve is shown in figure. The two parameters which are of interest are T d, and N d mared in the figure ; where T d is the time between two successive pacet drops, and N d is the number of pacets received between two successive drops.

3 W m Fig. Functional form of window vs. time curve Let W m be the maximum value of the window W t at time t 2, at which congestion occurs. Then the expressions for T d and N d are evaluated as given below: T d = t 2 t R α ( + ) + l l + = W - ( Wm β Wm ) + l l + R Wm α ( + ) = ( β W ) = W α R W + + ( ) m l l β Wm ( + ) l β R + m (3) α + N d is the shaded area under the curve in figure. l T d W ( ) N d= ( + ) + α R + α t dt R R Calculating the integral results into l N β +l+ d = W m ( + ) t + T d t t 2 (4) (5) α The average throughput, λ of a flow using the polynomial congestion control Model is the number of pacets sent between successive drops (N d ) divided by the duration between drops (T d ). The pacet loss probability p = / N d. Writing λ and p in terms of Wm by substituting the expressions for N d and T d yield: λ / p /+l+ (6) This implies that for polynomial Model to be TCPcompatible as per [9], λ must vary as / p 0.5, and hence +l =. (Refer [8], [3]). This can be extended to find the throughput of the polynomial Model 2 also. The authors have restricted the analysis for the Model and in future attempt N d t will be made to prove the TCP-compatibility of the throughput relation for the Model 2 and other polynomial models. 5. Simulation and Analysis Wired TCP Networs This section presents the results of ns-2 [4] simulation of various polynomial algorithms in wired TCP networs. T h e a u t h o r s investigated the connections running the TCPcompatible polynomial algorithms MIMD and PIPD represented by equations 3 and 8. The simulations use the topology shown in figure 2. It consists of 4 connections sharing a bottlenec lin with total bandwidth equal to 2Mbps, where all connections have an almost identical round-trip propagation delay equal to 20ms. Each polynomial flow uses a modified TCP with AIMD algorithm replaced by the polynomial family; other mechanisms lie slow-start and time-out remain unchanged as already mentioned in the implementation section of this paper. Each source always has data to send, modeled using networ simulator s FTP application. The figures and graphs display the information of the observed values. The results are obtained using the Drop Tail buffer management algorithm at the bottlenec gateway [5], [6]. Figures 3 and 5 shows the variation of window size over a simulation period of 200 sec for TCP, TCP/Reno, and MIMD and PIPD models. The increase and decrease parameters α and β are also changed. The results show that PIPD model seems to be TCP-compatible and MIMD model consumes most of the bandwidth. Fig 2. Simulation Topology (simulated using ns2) Figures 4 and 6 show the throughput of the TCP, TCP/Reno, MIMD and PIPD models for two different values of increase and decrease parameters, α and β. The throughput (λ ) is modeled using the equation (7). c s λ = (7) R p

4 Figure 3.Window size vs time of TCP, TCP/Reno, MIMD Model and IPDModel2. ( α= 0.75 and β = 0.25 ) Figure 6.Throughput size vs time of TCP, TCP/Reno, MIMD Model and IPDModel2. ( α=.75 and β = 0. ) where s is the segment size, R is the round trip time, p is the pacet loss rate and c is a constant value commonly approximated as The graphs show that the throughput of MIMD model is very high and PIPD model is comparable with that of TCP and TCP/Reno. Figure 4.Throughput vs time of TCP, TCP/Reno, MIMD Model and IPDModel2. ( = 0.75 and = 0.25 ) Figure 5. Window size vs time of TCP, TCP/Reno, MIMD Model and IPDModel2. ( α=.75 and β = 0. ) 6. Simulation and Analysis Mobile Ad hoc Networs A Mobile Ad hoc Networ is a networ in which a group of mobile computing devices communicate among themselves using wireless radios, without the aid of a fixed networing infrastructure [7], [8]. They can be used anywhere that a fixed infrastructure does not exist, or is not desirable.. Mobile ad hoc networs provide an extension to the Internet. Since TCP/IP is the standard networ protocol on the Internet, its use over mobile ad hoc networ is a certainty [9], [20]. In this paper the performance of the proposed window based Polynomial congestion control algorithms over the mobile ad hoc networs are also analysed and compared with the standard algorithms implemented for TCP and TCP/Reno. A mobile networ is simulated with the proposed algorithms using the four routing algorithms used for Mobile ad hoc networs: Dynamic Source Routing (DSR), Dynamic Destination Sequenced Distance Vector (DSDV) Routing, Ad-hoc On- demand Distance Vector (AODV) Routing and Temporarily Ordered Routing Algorithm (TORA) [9], [2]. Even though the TCP congestion control algorithms in the form implemented for the wired networs can not be used for mobile ad hoc networs, a study is carried to compare the performance assuming the pacet drop is only due to congestion. But in practical scenario the pacet drop is also due to other facts such as transmission loss, radio lin failure, node movements and node failure etc. The throughput is evaluated based on the equation (7). Figure 7 shows the comparison of the total throughput of TCP, TCP/Reno, and MIMD and PIPD congestion control for each of the four routing algorithms.

5 Total Throughput Throughput in Kbps TCP/Reno TCP MIMD PIPD AODV DSDV DSR TORA Figure 7. Total throughput of TCP, TCP/Reno, MIMD and PIPD Algorithm The results show that the PIPD and MIMD algorithms improved the total throughput regardless of the routing method used. 7. Conclusion In this paper, the authors presented and evaluated a family of nonlinear congestion control algorithms, called polynomial algorithms. The Model and Model 2 of the polynomial family are considered for experimentation. These polynomial algorithms generalize the familiar class of linear algorithms. The authors showed that for one of the restricted model of the polynomial family, Model, the throughput λ / p /+l+, where p is the pacet loss rate it encounters. This shows that the model is TCP compatible. The simulation results showed good performance and interactions between polynomial algorithms (Model and Model 2) and TCP in wired and mobile ad hoc networs. The algorithms MIMD and PIPD obtain higher long-term throughput than TCP and TCP/Reno. The figures 3, 4, 5 and 6 show the variation of congestion window and throughput with respect to time for the TCP, TCP/Reno, MIMD and PIPD Algorithms in the case of wired networ topology shown in figure 2. Figure 7 display the total throughput for the algorithms using different routing methods in mobile ad hoc networ. The results show that the two proposed algorithms results in two higher long term throughput compared with TCP and TCP/Reno. REFERENCES []. Van Jacobson, "Congestion Avoidance and Control," ACM Computer Communication Review, vol.8, pp , Aug Proceedings of the Sigcomm '88 Symposium in Stanford, CA, August 988. [2]. Congestion Control Schemes for TCP/IP Networs current implementation in BSD Unix. Douglas E. Comer, Internetworing with TCP/IP Volume I, Englewood Cliffs, New Jersey, Prentice Hall, 99. [3]. W. R. Stevens, TCP/IP Illustrated, Volume, Addison-Wesley, Reading, MA, November 994. [4]. M. Allman and V. Paxson, TCP Congestion Control, Internet Engineering Tas Force, April 999, RFC 258. [5]. Sally Floyd and Kevin Fall, Promoting the use of end-to-end congestion control in the Internet, IEEE/ACM Transactions on Networing, vol. 7(4), pp , August 999. [6]. R. Rejaie, M. Handley, and D. Estrin, RAP: An End-to-end Rate-based Congestion Control Mechanism for Real time Streams in the Internet, in Proc. IEEE INFOCOM, March 999, vol. 3, pp [7]. Sally Floyd, "TCP and Explicit Congestion Notification," ACM Computer Communication Review, vol. 24, pp. 8-23, Oct [8]. Shudong Jin, Liang Guo, Ibrahim Matta, and Azer Bestavros, A spectrum of TCP-friendly window-based congestion control algorithms, Tech. Rep. BU-CS , Computer Science Department, Boston University, July 200, Available at [9]. Deepa Bansal and Hari Balarishnan, Binomial congestion control algorithms, in Proceedings of IEEE INFOCOM, April 200. [0]. Y. Richard Yang and Simon S. Lam, General AIMD congestion control, in Proceedings of ICNP, November []. Zheng Wang and Jon Crowcroft, "A New Congestion Control Scheme: Slow Start and Search (Tri-S)," ACM Computer Communication Review, vol. 2, pp 32-43, Jan 99 [2]. Lawrence S. Bramo and Sean W. O'Malley, "TCP Vegas: New Techniques for Congestion Detection and Avoidance," in SIGCOMM '94 Conference on Communications Architectures and Protocols, (London, United Kingdom), pp , Oct [3]. D. Bansal and H. Balarishnan, TCP-friendly Congestion Control for Real-time Streaming Applications, Tech. Rep. MIT-LCS-TR-806, MIT Laboratory for Computer Science, May 2000 [4]. ns-2 Networ Simulator, [5]. S. Floyd and V. Jacobson, Random Early Detection Gateways for Congestion Avoidance, IEEE/ACM Transactions on Networing, vol., no. 4, Aug. 993 [6]. Tejas Koje Vijay Kaadia, Analysis of Congestion Control Strategies For TCP Variants Using Droptail and RED Queuing Disciplines Department of Computer Science University of Southern California, Los Angeles [7]. Xiang Chen, Hongqiang Zhai,Jianfeng Wang, and Yuguang Fang, TCP Performance over Mobile Ad Hoc Networs [8]. Jorg Widmer, Robert denda, and Martin Mauve, A Survey on TCP- Friendly Congestion Control. [9]. K.Sundaresan, V.Anantharaman, H-Y Hsieh, and R.Sivaumar. ATP: a reliable transport protocol for ad hoc networs, ACM Mobihoc, Jun [20]. G.Holland, and N.H.Vaidya, Analysis of TCP performance over mobile ad hoc networs, ACM MOBICOM 99, Seattle, August 999. [2]. K.Chen, Y.Xue, and K.nahstedt, On setting TCP s congestion window limit in mobile ad hoc networs, IEEE ICC 03, Anchorage, Alasa, May 2003.

TCP-friendly SIMD Congestion Control and Its Convergence Behavior

TCP-friendly SIMD Congestion Control and Its Convergence Behavior Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 1-5-8 TCP-friendly SIMD Congestion Control and Its Convergence Behavior Jin, Shudong Boston University

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

Window Size. Window Size. Window Size. Time. Time. Time

Window Size. Window Size. Window Size. Time. Time. Time A Spectrum of TCP-friendly Window-based Congestion Control Algorithms Λ Shudong Jin Liang Guo Ibrahim Matta Azer Bestavros Computer Science Department Boston University Boston, MA 5 fjins, guol, matta,

More information

Analysis of Scalable TCP in the presence of Markovian Losses

Analysis of Scalable TCP in the presence of Markovian Losses Analysis of Scalable TCP in the presence of Markovian Losses E Altman K E Avrachenkov A A Kherani BJ Prabhu INRIA Sophia Antipolis 06902 Sophia Antipolis, France Email:altman,kavratchenkov,alam,bprabhu}@sophiainriafr

More information

OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION

OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION International Journal of Bifurcation and Chaos, Vol. 18, No. 5 (28) 1459 1475 c World Scientific Publishing Company OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION XI CHEN,

More information

CS276 Homework 1: ns-2

CS276 Homework 1: ns-2 CS276 Homework 1: ns-2 Erik Peterson October 28, 2006 1 Part 1 - Fairness between TCP variants 1.1 Method After learning ns-2, I wrote a script (Listing 3) that runs a simulation of one or two tcp flows

More information

Extended Analysis of Binary Adjustment Algorithms

Extended Analysis of Binary Adjustment Algorithms 1 Extended Analysis of Binary Adjustment Algorithms Sergey Gorinsky Harrick Vin Technical Report TR22-39 Department of Computer Sciences The University of Texas at Austin Taylor Hall 2.124, Austin, TX

More information

THE prediction of network behavior is an important task for

THE prediction of network behavior is an important task for TCP Networ Calculus: The case of large delay-bandwidth product Eitan Altman, Konstantin Avrachenov, Chadi Baraat Abstract We present in this paper an analytical model for the calculation of networ load

More information

Modelling TCP with a Discrete Time Markov Chain

Modelling TCP with a Discrete Time Markov Chain Modelling TCP with a Discrete Time Markov Chain José L Gil Motorola josegil@motorola.com ABSTRACT TCP is the most widely used transport protocol in the Internet. The end-to-end performance of most Internet

More information

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers A Simple Model for the Window Size Evolution of TCP Coupled with and PHY Layers George Papageorgiou, John S. Baras Institute for Systems Research, University of Maryland, College Par, MD 20742 Email: gpapag,

More information

communication networks

communication networks Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth

More information

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays.

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. V. Guffens 1 and G. Bastin 2 Intelligent Systems and Networks Research

More information

Models and Techniques for Network Tomography

Models and Techniques for Network Tomography Proceedings of the 21 IEEE Worshop on Information Assurance and Security T1C2 13 United States Military Academy West Point NY 5 6 June 21 Models and Techniques for Networ Tomography Stephan Bohace bohace@mathuscedu

More information

Fairness comparison of FAST TCP and TCP Vegas

Fairness comparison of FAST TCP and TCP Vegas Fairness comparison of FAST TCP and TCP Vegas Lachlan L. H. Andrew, Liansheng Tan, Tony Cui, and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks (CUBIN), an affiliated

More information

Analysis of TCP Westwood+ in high speed networks

Analysis of TCP Westwood+ in high speed networks Analysis of TCP Westwood+ in high speed networks 1 E. Altman, C. Barakat, S. Mascolo, N. Möller and J. Sun Abstract TCP Westwood+ is modelled and analyzed using stochastic recursive equations. It is shown

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer

More information

Transient Behaviors of TCP-friendly Congestion Control Protocols

Transient Behaviors of TCP-friendly Congestion Control Protocols Abbreviated version in Proceedings of IEEE INFOCOM 21, April 21. Transient Behaviors of -friendly Congestion Control Protocols Y. Richard Yang, Min Sik Kim, Simon S. Lam Department of Computer Sciences

More information

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods George Papageorgiou and John S. Baras Abstract We present an optimization problem that

More information

Stochastic Hybrid Systems: Applications to Communication Networks

Stochastic Hybrid Systems: Applications to Communication Networks research supported by NSF Stochastic Hybrid Systems: Applications to Communication Networks João P. Hespanha Center for Control Engineering and Computation University of California at Santa Barbara Talk

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Markovian Model of Internetworking Flow Control

Markovian Model of Internetworking Flow Control Информационные процессы, Том 2, 2, 2002, стр. 149 154. c 2002 Bogoiavlenskaia. KALASHNIKOV MEMORIAL SEMINAR Markovian Model of Internetworking Flow Control O. Bogoiavlenskaia Petrozavodsk State University

More information

Processor Sharing Flows in the Internet

Processor Sharing Flows in the Internet STANFORD HPNG TECHNICAL REPORT TR4-HPNG4 Processor Sharing Flows in the Internet Nandita Dukkipati, Nick McKeown Computer Systems Laboratory Stanford University Stanford, CA 9434-93, USA nanditad, nickm

More information

Compound TCP with Random Losses

Compound TCP with Random Losses Compound TCP with Random Losses Alberto Blanc 1, Konstantin Avrachenkov 2, Denis Collange 1, and Giovanni Neglia 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France {alberto.blanc,denis.collange}@orange-ftgroup.com

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

Analysis of TCP-AQM Interaction via Periodic Optimization and Linear Programming: The Case of Sigmoidal Utility Function

Analysis of TCP-AQM Interaction via Periodic Optimization and Linear Programming: The Case of Sigmoidal Utility Function Analysis of TCP-AQM Interaction via Periodic Optimization and Linear Programming: The Case of Sigmoidal Utility Function K. Avrachenkov 1, L. Finlay 2, and V. Gaitsgory 2 1 INRIA Sophia Antipolis, France

More information

A Generalized FAST TCP Scheme

A Generalized FAST TCP Scheme A Generalized FAST TCP Scheme Cao Yuan a, Liansheng Tan a,b, Lachlan L. H. Andrew c, Wei Zhang a, Moshe Zukerman d,, a Department of Computer Science, Central China Normal University, Wuhan 430079, P.R.

More information

Robust Stability Analysis of a class of Smith Predictor-based Congestion Control algorithms for Computer Networks

Robust Stability Analysis of a class of Smith Predictor-based Congestion Control algorithms for Computer Networks Robust Stability Analysis of a class of Smith Predictor-based Congestion Control algorithms for Computer Networs Luca De Cicco, Saverio Mascolo and Silviu I. Niculescu Abstract Congestion control is a

More information

Concise Paper: Deconstructing MPTCP Performance

Concise Paper: Deconstructing MPTCP Performance 04 IEEE nd International Conference on Network Protocols Concise Paper: Deconstructing MPTCP Performance Behnaz Arzani, Alexander Gurney, Sitian Cheng, Roch Guerin and Boon Thau Loo University Of Pennsylvania

More information

A Study of Traffic Statistics of Assembled Burst Traffic in Optical Burst Switched Networks

A Study of Traffic Statistics of Assembled Burst Traffic in Optical Burst Switched Networks A Study of Traffic Statistics of Assembled Burst Traffic in Optical Burst Switched Networs Xiang Yu, Yang Chen and Chunming Qiao Department of Computer Science and Engineering State University of New Yor

More information

384Y Project June 5, Stability of Congestion Control Algorithms Using Control Theory with an application to XCP

384Y Project June 5, Stability of Congestion Control Algorithms Using Control Theory with an application to XCP 384Y Project June 5, 00 Stability of Congestion Control Algorithms Using Control Theory with an application to XCP . Introduction During recent years, a lot of work has been done towards the theoretical

More information

Reliable Data Transport: Sliding Windows

Reliable Data Transport: Sliding Windows Reliable Data Transport: Sliding Windows 6.02 Fall 2013 Lecture 23 Exclusive! A Brief History of the Internet guest lecture by Prof. Hari Balakrishnan Wenesday December 4, 2013, usual 6.02 lecture time

More information

Performance Analysis of Priority Queueing Schemes in Internet Routers

Performance Analysis of Priority Queueing Schemes in Internet Routers Conference on Information Sciences and Systems, The Johns Hopkins University, March 8, Performance Analysis of Priority Queueing Schemes in Internet Routers Ashvin Lakshmikantha Coordinated Science Lab

More information

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min JetMax: Scalable Max-Min Min Congestion Control for High- Speed Heterogeneous Networks Yueping Zhang Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer Science

More information

Dynamics of Network Resource Management

Dynamics of Network Resource Management Dynamics of Network Resource Management Ibrahim Matta Department Boston University The Internet is So HUGE that no one really knows how big But, rough estimates: Users ~ 1.8B in 2009 (source: etforecasts)

More information

Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances

Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances Tsuyoshi Ito and Mary Inaba Department of Computer Science, The University of Tokyo 7-3-1 Hongo, Bunkyo-ku,

More information

Controlo Switched Systems: Mixing Logic with Differential Equations. João P. Hespanha. University of California at Santa Barbara.

Controlo Switched Systems: Mixing Logic with Differential Equations. João P. Hespanha. University of California at Santa Barbara. Controlo 00 5 th Portuguese Conference on Automatic Control University of Aveiro,, September 5-7, 5 00 Switched Systems: Mixing Logic with Differential Equations João P. Hespanha University of California

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Total points: 40 Homework 1 - Solutions Out: 10/4, Due: 10/11 Solutions 1. Two-dimensional parity Given below is a series of 7 7-bit items of data, with an additional bit each

More information

Stability Analysis of TCP/RED Communication Algorithms

Stability Analysis of TCP/RED Communication Algorithms Stability Analysis of TCP/RED Communication Algorithms Ljiljana Trajković Simon Fraser University, Vancouver, Canada ljilja@cs.sfu.ca http://www.ensc.sfu.ca/~ljilja Collaborators Mingjian Liu and Hui Zhang

More information

Stability Analysis of TCP/RED Communication Algorithms

Stability Analysis of TCP/RED Communication Algorithms Stability Analysis of TCP/RED Communication Algorithms Ljiljana Trajković Simon Fraser University, Vancouver, Canada ljilja@cs.sfu.ca http://www.ensc.sfu.ca/~ljilja Collaborators Mingjian Liu and Hui Zhang

More information

On the Resource Utilization and Traffic Distribution of Multipath. Transmission Control

On the Resource Utilization and Traffic Distribution of Multipath. Transmission Control On the Resource Utilization and Traffic Distribution of Multipath Transmission Control UMass Computer Science Technical Report UM-CS-2011-005 Bo Jiang 1, Yan Cai 2, Don Towsley 1 1 {bjiang, towsley}@cs.umass.edu

More information

Packet Size

Packet Size Long Range Dependence in vbns ATM Cell Level Trac Ronn Ritke y and Mario Gerla UCLA { Computer Science Department, 405 Hilgard Ave., Los Angeles, CA 90024 ritke@cs.ucla.edu, gerla@cs.ucla.edu Abstract

More information

Compound TCP with Random Losses

Compound TCP with Random Losses Compound TCP with Random Losses Alberto Blanc 1, Konstantin Avrachenkov 2, Denis Collange 1, and Giovanni Neglia 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France {alberto.blanc,denis.collange}@orange-ftgroup.com

More information

A Stochastic Model for TCP with Stationary Random Losses

A Stochastic Model for TCP with Stationary Random Losses A Stochastic Model for TCP with Stationary Random Losses Eitan Altman, Kostya Avrachenkov Chadi Barakat INRIA Sophia Antipolis - France ACM SIGCOMM August 31, 2000 Stockholm, Sweden Introduction Outline

More information

IN THIS PAPER, we describe a design oriented modelling

IN THIS PAPER, we describe a design oriented modelling 616 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 14, NO 3, JUNE 2006 A Positive Systems Model of TCP-Like Congestion Control: Asymptotic Results Robert Shorten, Fabian Wirth, and Douglas Leith Abstract We

More information

Congestion Control. Topics

Congestion Control. Topics Congestion Control Topics Congestion control what & why? Current congestion control algorithms TCP and UDP Ideal congestion control Resource allocation Distributed algorithms Relation current algorithms

More information

Internet Congestion Control: Equilibrium and Dynamics

Internet Congestion Control: Equilibrium and Dynamics Internet Congestion Control: Equilibrium and Dynamics A. Kevin Tang Cornell University ISS Seminar, Princeton University, February 21, 2008 Networks and Corresponding Theories Power networks (Maxwell Theory)

More information

On the Resource Utilization and Traffic Distribution of Multipath Transmission Control

On the Resource Utilization and Traffic Distribution of Multipath Transmission Control On the Resource Utilization and Traffic Distribution of Multipath Transmission Control Bo Jiang 1, Yan Cai, Don Towsley 1 1 {bjiang, towsley}@cs.umass.edu ycai@ecs.umass.edu University of Massachusetts,

More information

Hopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion Control

Hopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion Control International Journal of Engineering esearch And Management (IJEM) ISSN: 349-58, Volume-5, Issue-6, June 18 Hopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion

More information

Modelling an Isolated Compound TCP Connection

Modelling an Isolated Compound TCP Connection Modelling an Isolated Compound TCP Connection Alberto Blanc and Denis Collange Orange Labs 905 rue Albert Einstein Sophia Antipolis, France {Email: alberto.blanc,denis.collange}@orange-ftgroup.com Konstantin

More information

NONLINEAR CONTINUOUS FEEDBACK CONTROLLERS. A Thesis SAI GANESH SITHARAMAN

NONLINEAR CONTINUOUS FEEDBACK CONTROLLERS. A Thesis SAI GANESH SITHARAMAN NONLINEAR CONTINUOUS FEEDBACK CONTROLLERS A Thesis by SAI GANESH SITHARAMAN Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree

More information

Research Article Design of the Congestion Control for TCP/AQM Network with Time-Delay

Research Article Design of the Congestion Control for TCP/AQM Network with Time-Delay Mathematical Problems in Engineering, Article ID 834698, 7 pages http://dx.doi.org/.55/4/834698 Research Article Design of the Congestion Control for TCP/AQM Network with Time-Delay Dazhong Wang and Shujing

More information

Switched Systems: Mixing Logic with Differential Equations

Switched Systems: Mixing Logic with Differential Equations research supported by NSF Switched Systems: Mixing Logic with Differential Equations João P. Hespanha Center for Control Dynamical Systems and Computation Outline Logic-based switched systems framework

More information

PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control

PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control Saurabh Jain Joint work with Dr. Dmitri Loguinov June 21, 2007 1 Agenda Introduction Analysis of RCP QI-RCP PIQI-RCP Comparison Wrap

More information

Analytic Performance Evaluation of the RED Algorithm

Analytic Performance Evaluation of the RED Algorithm Prof. Dr. P. Tran-Gia Analytic Performance Evaluation of the RED Algorithm Stefan Köhler, Michael Menth, Norbert Vicari TCP Model RED Model TCP over RED Results TCP > Reliable transmission > Closed loop

More information

Crossing Over the Bounded Domain: From Exponential To Power-law Intermeeting

Crossing Over the Bounded Domain: From Exponential To Power-law Intermeeting Crossing Over the Bounded Domain: From Exponential To Power-law Intermeeting time in MANET Han Cai, Do Young Eun Department of Electrical and Computer Engineering North Carolina State University Motivation

More information

ABSTRACT FLOW CONTROL IN WIRELESS AD-HOC NETWORKS. Georgios Papageorgiou, Doctor of Philosophy, 2009

ABSTRACT FLOW CONTROL IN WIRELESS AD-HOC NETWORKS. Georgios Papageorgiou, Doctor of Philosophy, 2009 ABSTRACT Title of dissertation: FLOW CONTROL IN WIRELESS AD-HOC NETWORKS Georgios Papageorgiou, Doctor of Philosophy, 2009 Dissertation directed by: Professor John S. Baras, Department of Electrical and

More information

A Theoretical Study of Internet Congestion Control: Equilibrium and Dynamics

A Theoretical Study of Internet Congestion Control: Equilibrium and Dynamics A Theoretical Study of Internet Congestion Control: Equilibrium and Dynamics Thesis by Jiantao Wang In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy California Institute

More information

MPTCP is not Pareto-Optimal: Performance Issues and a Possible Solution

MPTCP is not Pareto-Optimal: Performance Issues and a Possible Solution MPTCP is not Pareto-Optimal: Performance Issues and a Possible Solution Ramin Khalili, Nicolas Gast, Miroslav Popovic, Jean-Yves Le Boudec To cite this version: Ramin Khalili, Nicolas Gast, Miroslav Popovic,

More information

Abstract. This paper discusses the shape of the RED drop function necessary to confirm the requirements

Abstract. This paper discusses the shape of the RED drop function necessary to confirm the requirements On the Non-Linearity of the RED Drop Function Erich Plasser, Thomas Ziegler, Peter Reichl Telecommunications Research Center Vienna Donaucity Strasse 1, 122 Vienna, Austria plasser, ziegler, reichl @ftw.at

More information

Understanding TCP Vegas: A Duality Model

Understanding TCP Vegas: A Duality Model Understanding TCP Vegas: A Duality Model STEVEN H. LOW Caltech, Pasadena, California AND LARRY L. PETERSON AND LIMIN WANG Princeton University, Princeton, New Jersey Abstract. We view congestion control

More information

Stochastic Hybrid Systems: Modeling, analysis, and applications to networks and biology

Stochastic Hybrid Systems: Modeling, analysis, and applications to networks and biology research supported by NSF Stochastic Hybrid Systems: Modeling, analysis, and applications to networks and biology João P. Hespanha Center for Control Engineering and Computation University of California

More information

Performance Effects of Two-way FAST TCP

Performance Effects of Two-way FAST TCP Performance Effects of Two-way FAST TCP Fei Ge a, Sammy Chan b, Lachlan L. H. Andrew c, Fan Li b, Liansheng Tan a, Moshe Zukerman b a Dept. of Computer Science, Huazhong Normal University, Wuhan, P.R.China

More information

Comparison of TCP Reno and TCP Vegas via Fluid Approximation

Comparison of TCP Reno and TCP Vegas via Fluid Approximation INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Comparison of TCP Reno and TCP Vegas via Fluid Approximation Thomas Bonald N 3563 Novembre 1998 THÈME 1 apport de recherche ISSN 0249-6399

More information

Boundedness of AIMD/RED System with Time Delays

Boundedness of AIMD/RED System with Time Delays Boundedness of AIMD/ED System with Time Delays Lijun Wang 1, Lin Cai, Xinzhi Liu 1 and Xuemin (Sherman) Shen 3 Department of Applied Mathematics 1, Department of Electrical and Computer Engineering 3 University

More information

Modeling Impact of Delay Spikes on TCP Performance on a Low Bandwidth Link

Modeling Impact of Delay Spikes on TCP Performance on a Low Bandwidth Link Modeling Impact of Delay Spikes on TCP Performance on a Low Bandwidth Link Pasi Lassila and Pirkko Kuusela Networking Laboratory Helsinki University of Technology (HUT) Espoo, Finland Email: {Pasi.Lassila,Pirkko.Kuusela

More information

Exact Sampling of TCP Window States

Exact Sampling of TCP Window States UNPUBLISHED MANUSCRIPT 1 Exact Sampling of TCP Window States Ashish Goel University of Southern California Michael Mitzenmacher Harvard University Abstract We demonstrate how to apply Coupling from the

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBER

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBER IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 6, DECEMBER 2009 1697 Understing XCP: Equilibrium Fairness Lachlan L H Andrew, Senior Member, IEEE, Steven H Low, Fellow, IEEE, Bartek P Wydrowski, Member,

More information

Statistical Detection of Congestion in Routers

Statistical Detection of Congestion in Routers Submitted to IEEE/ACM Transactions on Networking Statistical Detection of Congestion in Routers Ivan D. Barrera, Member, IEEE, Stephan Bohacek, Member, IEEE, and Gonzalo Arce, Fellow, IEEE, Abstract Detection

More information

Estimator. Sensor. Unreliable Network

Estimator. Sensor. Unreliable Network Sending the Most Recent Observation is not Optimal in Networed Control: Linear Temporal Coding and Towards the Design of a Control Specific Transport Protocol C. L. Robinson Department of Industrial and

More information

Window Flow Control Systems with Random Service

Window Flow Control Systems with Random Service Window Flow Control Systems with Random Service Alireza Shekaramiz Joint work with Prof. Jörg Liebeherr and Prof. Almut Burchard April 6, 2016 1 / 20 Content 1 Introduction 2 Related work 3 State-of-the-art

More information

Congestion Control for Infrastructure-based CRNs: A Multiple Model Predictive Control Approach

Congestion Control for Infrastructure-based CRNs: A Multiple Model Predictive Control Approach Congestion Control for Infrastructure-based CRNs: A Multiple Model Predictive Control Approach Kefan Xiao, Shiwen Mao, and Jitendra K Tugnait Department of Electrical and Computer Engineering, Auburn University,

More information

Performance Modeling of TCP/AQM with Generalized AIMD under Intermediate Buffer Sizes

Performance Modeling of TCP/AQM with Generalized AIMD under Intermediate Buffer Sizes Performance Modeling of TCP/AQM with Generalized AIMD under Intermediate Buffer Sizes Do Young Eun and Xinbing Wang Dept. of Electrical and Computer Engineering orth Carolina State University Raleigh,

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop

More information

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent

More information

Congestion Control. Need to understand: What is congestion? How do we prevent or manage it?

Congestion Control. Need to understand: What is congestion? How do we prevent or manage it? Congestion Control Phenomenon: when too much traffic enters into system, performance degrades excessive traffic can cause congestion Problem: regulate traffic influx such that congestion does not occur

More information

class class ff ff (t) packet loss packet loss (t) - - RED controlled queue Figure : Illustration of a Differentiad Services framework. RED has been an

class class ff ff (t) packet loss packet loss (t) - - RED controlled queue Figure : Illustration of a Differentiad Services framework. RED has been an Modeling RED with Two Traffic Classes P. Kuusela and J. T. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P. O. Box 3000, FIN-005 HUT, Finland Email: fpirkko.kuusela,

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

Continuous-time hidden Markov models for network performance evaluation

Continuous-time hidden Markov models for network performance evaluation Performance Evaluation 49 (2002) 129 146 Continuous-time hidden Markov models for network performance evaluation Wei Wei, Bing Wang, Don Towsley Department of Computer Science, University of Massachusetts,

More information

These are special traffic patterns that create more stress on a switch

These are special traffic patterns that create more stress on a switch Myths about Microbursts What are Microbursts? Microbursts are traffic patterns where traffic arrives in small bursts. While almost all network traffic is bursty to some extent, storage traffic usually

More information

Leopold Franzens University Innsbruck. Responding to Spurious Loss Events in TCP/IP. Master Thesis. Institute of Computer Science

Leopold Franzens University Innsbruck. Responding to Spurious Loss Events in TCP/IP. Master Thesis. Institute of Computer Science Leopold Franzens University Innsbruck Institute of Computer Science Distributed and Parallel Systems Group Responding to Spurious Loss Events in TCP/IP Master Thesis Supervisor: Dr. Michael Welzl Author:

More information

Computer Networks ( Classroom Practice Booklet Solutions)

Computer Networks ( Classroom Practice Booklet Solutions) Computer Networks ( Classroom Practice Booklet Solutions). Concept Of Layering 0. Ans: (b) Sol: Data Link Layer is responsible for decoding bit stream into frames. 0. Ans: (c) Sol: Network Layer has the

More information

A Simple Throughput Model for TCP Veno

A Simple Throughput Model for TCP Veno A Simle Throughut Model for TCP Veno Bin Zhou, Cheng Peng Fu, Dah-Ming Chiu, Chiew Tong Lau, and Lek Heng Ngoh School of Comuter Engineering, Nanyang Technological University, Singaore 639798 Email: {zhou00,

More information

Growth conditions for the global stability of highspeed communication networks

Growth conditions for the global stability of highspeed communication networks 1 Growth conditions for the global stability of highspeed communication networks C. King, R. Shorten, F. Wirth, M. Akar Abstract This note considers the design of TCP-like congestion control protocols

More information

ACK-Clocking Dynamics: Modelling the Interaction between Windows and the Network

ACK-Clocking Dynamics: Modelling the Interaction between Windows and the Network ACK-Clocking Dynamics: Modelling the Interaction between Windows and the Network Krister Jacobsson, Lachlan L. H. Andrew,AoTang, Karl H. Johansson,Håkan Hjalmarsson,StevenH.Low ACCESS Linnaeus Centre,

More information

ABSTRACT FLOW CONTROL IN WIRELESS AD-HOC NETWORKS. Georgios Papageorgiou, Doctor of Philosophy, 2009

ABSTRACT FLOW CONTROL IN WIRELESS AD-HOC NETWORKS. Georgios Papageorgiou, Doctor of Philosophy, 2009 ABSTRACT Title of dissertation: FLOW CONTROL IN WIRELESS AD-HOC NETWORKS Georgios Papageorgiou, Doctor of Philosophy, 2009 Dissertation directed by: Professor John S. Baras, Department of Electrical and

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Analysis and Design of Controllers for AQM Routers Supporting TCP Flows

Analysis and Design of Controllers for AQM Routers Supporting TCP Flows To appear in IEEE TAC s special issue on Systems and Control Methods for Communication Networks Analysis and Design of Controllers for AQM Routers Supporting TCP Flows C.V. Hollot, V. Misra, D. Towsley

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

jwperiod. font=small,labelsep=jwperiod,justification=justified,singlelinecheck=false

jwperiod. font=small,labelsep=jwperiod,justification=justified,singlelinecheck=false jwperiod. font=smalllabelsep=jwperiodjustification=justifiedsinglelinecheck=false 1 EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS Euro. Trans. Telecomms. : 2?? Published online in Wiley InterScience www.interscience.wiley.com

More information

Analysis of two competing TCP/IP connections

Analysis of two competing TCP/IP connections Performance Evaluation 49 (2002 43 55 Analysis of two competing TCP/IP connections E. Altman a,b,, T. Jiménez b, R. Núñez-Queija c,d a INRIA, 2004 Route des Lucioles, 06902 Sophia Antipolis, France b CESIMO,

More information

On Buffer Limited Congestion Window Dynamics and Packet Loss

On Buffer Limited Congestion Window Dynamics and Packet Loss On Buffer Limited Congestion Windo Dynamics and Packet Loss A. Fekete, G. Vattay Communication Netorks Laboratory, Eötvös University Pázmány P. sétány /A, Budapest, Hungary 7 Abstract The central result

More information

Size-based Adaptive Bandwidth Allocation:

Size-based Adaptive Bandwidth Allocation: Size-based Adaptive Bandwidth Allocation: Optimizing the Average QoS for Elastic Flows Shanchieh Yang (scyang@ece.utexas.edu), Gustavo de Veciana (gustavo@ece.utexas.edu) Department of Electrical and Computer

More information

WiFi MAC Models David Malone

WiFi MAC Models David Malone WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,

More information

A Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification (ECN) Marking

A Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification (ECN) Marking University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering June 2002 A Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification

More information

A Utility-Based Congestion Control Scheme for Internet-Style Networks with Delay

A Utility-Based Congestion Control Scheme for Internet-Style Networks with Delay A Utility-Based ongestion ontrol Scheme for Internet-Style Networks with Delay Tansu Alpcan and Tamer Başar (alpcan, tbasar)@control.csl.uiuc.edu Abstract In this paper, we develop, analyze and implement

More information

End-to-End and Mac-Layer Fair Rate Assignment in Interference Limited Wireless Access Networks

End-to-End and Mac-Layer Fair Rate Assignment in Interference Limited Wireless Access Networks End-to-End and Mac-Layer Fair Rate Assignment in Interference Limited Wireless Access Networks Mustafa Arisoylu, Tara Javidi and Rene L. Cruz University of California San Diego Electrical and Computer

More information

Queue Analysis for Wireless Packet Data Traffic

Queue Analysis for Wireless Packet Data Traffic Queue Analysis for Wireless Packet Data Traffic Shahram Teymori and Weihua Zhuang Centre for Wireless Communications (CWC), Department of Electrical and Computer Engineering, University of Waterloo, Waterloo,

More information

Performance Evaluation of Deadline Monotonic Policy over protocol

Performance Evaluation of Deadline Monotonic Policy over protocol Performance Evaluation of Deadline Monotonic Policy over 80. protocol Ines El Korbi and Leila Azouz Saidane National School of Computer Science University of Manouba, 00 Tunisia Emails: ines.korbi@gmail.com

More information

TCP modeling in the presence of nonlinear window growth

TCP modeling in the presence of nonlinear window growth TCP modeling in the presence of nonlinear window growth Eitan Altman, Kostia Avrachenkov, Chadi Barakat Rudesindo Núñez-Queija Abstract We develop a model for TCP that accounts for both sublinearity and

More information