Robustness of Real and Virtual Queue based Active Queue Management Schemes

Size: px
Start display at page:

Download "Robustness of Real and Virtual Queue based Active Queue Management Schemes"

Transcription

1 Robustness of Real and Virtual Queue based Active Queue Management Schemes Ashvin Lakshmikantha, C. L. Beck and R. Srikant Department of General Engineering University of Illinois November 2, 2002 Abstract In this paper, we compare the performances of the real and virtual queue based marking schemes used at the routers in the Internet. Using simple fluid flow models, we show via analysis and simulations that a Virtual Queue (VQ) based marking scheme is superior to a Real Queue (RQ) based marking scheme in terms of robustness to disturbances and the ability to maintain low queueing delays. Our analytical results are applicable to the combinations of proportionally-fair and TCP-type congestion controllers at the sources, and REM and Proportional Control (PC) at the routers. The behavior of RED and PI controllers at the routers are studied via simulations. Introduction In recent years, there has been a significant interest in the design of a low-loss, low-delay Internet [7, 8, 0, 2, 3]. The primary enabling technology for this is the possible introduction of Early Congestion Notification (ECN) capability at the routers. Unlike the traditional congestion notification mechanism whereby routers drop packets to signal congestion, with ECN, routers have the capability to mark a packet to indicate congestion. Marking refers to the process of flipping a bit in the packet header from a zero to a one when the router detects incipient congestion. Each receiver echoes the marks to its source and the source is expected to respond to each mark by reducing its transmission rate. In this paper, we focus on the mechanism by which marking is performed at the routers. Specifically, we compare schemes where a router marks packets based on its queue length to schemes where the router marks packets based on the queue length of a virtual queue (VQ) [4]. A virtual queue is a fictitious queue maintained at each link whose capacity is less than the actual capacity of the link. The idea behind maintaining a Research supported by AFOSR grant F and DARPA grant F

2 virtual queue is that it provides early warning about congestion since the virtual queue s capacity is smaller than the capacity of the real queue. We consider the following congestion control mechanisms at the router: a proportionally fair congestion controller (PFC) [6] and a minimum potential delay controller [4]. Due to its similarity to the TCP congestion avoidance algorithm [9], we refer to the minimum potential delay controller as a TCP-type congestion controller. We consider the following Active Queue Management (AQM) schemes at the router: RED (random early detection) [3], REM (random early marking) [], PC (proportional control) [5] and PI control [5]. We compare implementations of each of these AQM schemes on the real queue with implementations on a virtual queue. We show through a combination of analysis and simulation that, by using a virtual queue and reducing the link utilization from 00% to slightly less than 00% (say, 95%), we can acheive a significant improvement in the performance of the network. We consider two criteria for assessing the performance of the network: Queueing delay: We want the queueing delay to be a small fraction of the propagation delay in the network. Robustness: In most models of congestion control, it is typically assumed that flows are long-lived and thus, steady-state stability analysis is reasonable. However, in a real network, there are many sources of disturbances such as short-lived flows (popularly known as web mice) and sources that do not respond to congestion notification such as real-time flows. In this paper, we evaluate the robustness of our system with respect to these unmodelled disturbances. Specifically, we evaluate the intensity of disturbance traffic that the system can tolerate while maintaining small queue lengths. We first consider the case of PFC with REM at the router. We present necessary conditions that the controller and the REM parameters should satisfy to ensure local stability of this system with delayed feedback. Using this, we show that it is not possible to have very low queueing delays in the presence of disturbances. Further, we will show that if REM is implemented in a virtual queue, both stability and small queueing delays can be achieved for any value of link utilization smaller than one. We then show that the same phenomenon occurs for the following combinations of source controllers and AQM schemes: PFC and Proportional Control (PC), TCP and REM, and TCP and PC. Proportional Control at the router is an AQM scheme that captures the behavior of RED when queue length averaging is not performed. Thus, by proportional control we mean that the instantaneous queue length is used along with the RED-marking profile. Additional congestion control/aqm scheme combinations are studied via simulations with the following results.. PFC/RED, TCP/RED: The same results that were analytically established for the PFC/PC and TCP/PC combinations seem to hold for this case. 2. PFC/PI, TCP/PI : In all of the previous cases, the RQ-based controllers perform worse than the VQ-based controllers even in the presence of constant disturbances. Interestingly, this is no longer the case with the 2

3 PI controller. In fact all our simulations seem to indicate that the PI controller is robust to deterministic disturbances with or without a VQ. However, these results change dramatically in the presence of random disturbances, which are more realistic in modeling short flows in the Internet. As the fraction of the total capacity occupied by these short flows increases, the queue length in the case of RQ-based PI increases, but the VQ-based PI control continues to maintain a small queue length. The main contribution of this paper is the demonstration of the fact that marking based on a VQ is more robust in the sense that the system is locally stable and is able to maintain small queue lengths even in the presence of disturbances. Further, based on our analytical and simulation studies, we can conclude that when a VQ-based scheme is used, the choice of the specific AQM scheme seems to be less important. However, among RQ-based schemes, PI control seems to perform better than the other schemes that we have considered. The intuitive reason for the robustness of a VQ-based AQM scheme is as follows: in a VQ-based scheme, the queue length is guaranteed to be small since the arrival rate is less than the link capacity. Thus, the system parameters have to be designed only to maintain stability in the presence of disturbances. On the other hand, with RQ-based AQM schemes, one has further to design the system to maintain small queue lengths. Thus, in a sense, VQ-based schemes have an additional degree of freedom which allows us to choose the system parameters to stabilize the system even in the presence of unknown disturbances. We note that we do not consider adapting the virtual capacity to changing network traffic conditions. Typically, this is performed on a time scale that is slower than the dynamics of the congestion controllers [2, 0, ], whereas the analysis in this paper is appropriate for models at the congestion-control time scale. The rest of the paper is organized as follows. In Section 2, we present the models for the various congestion controllers and AQM schemes used in this paper. In Section 3, we present the main analytical results. Section 4 contains simulation results that strengthen the observations made in Section 3 and provide further insight into those combinations of controllers/aqm schemes that are not addressed in Section 3. Concluding remarks are provided in Section 5. 2 Models of Congestion Controllers and AQM Schemes We consider a deterministic fluid model of a single congestion-controlled source accessing a single link. Suppose that the transmission rate of the user at time t is denoted by x(t), the link capacity is denoted by C, and queue length is denoted by q. In addition to the congestion controlled source, we also assume that a fraction of the link s capacity is occupied by short flows or unresponsive flows. Let δ denote the fraction of the link s capacity that is used by these disturbance processes. Then the evolution of the queue is governed by the equation q = x(t) + δc C, q > 0 () = (x(t) + δc C) +, q = 0. The analysis can be easily extended to the case of multiple sources with equal delay by appropriately rescaling the system parameters. 3

4 Similarly if a virtual queue is maintained at the router, then the evolution of the virtual queue length is given by q v = x(t) + δc C, q > 0 ( = x(t) + δc C ) + (2), q = 0. where C < C. Denoting the desired utilization by γ, i.e., C = γc, we can write q v = x(t) + δc γc, q > 0 = (x(t) + δc γc) +, q = 0. (3) Congestion Control Schemes We consider two types of dynamics for the source rate x(t) :. PFC (Proportionally-Fair Controller): Let P(q) denote the probability that a packet is marked at the link when the queue length is q. The PFC is then given by ẋ = κ [ x(t τ(t))p(q(t τ(t)))], (4) where the right-hand side of the above equation has to be appropriately modified to account for the fact that the source rate is always non-negative. Here κ and are controller parameters, and τ denotes the feedback delay (also known as round-trip time or RTT) in the network. The RTT is the sum of two components: the propagation delay, which we denote by τ pr, and the queueing delay q(t) C. We also note that (4) should be modified by replacing P(q) with P(q v ) when marking is done based on the virtual queue length. 2. TCP-type congestion controller: The congestion avoidance phase of the TCP-type congestion controller can be modeled as ẋ = αx(t)x(t τ(t))p(q(t τ(t))) (5) τ2 where α = 2 3, and P(q), q and τ are defined as before. The value of 2 3 for α is justified by the analysis in [5] and [9] where a value of ln(2) (which is close to 2 3 ) is suggested for β. For our analysis, we will consider the following general form of the controller: ẋ = κ [ βx(t)x(t τ(t))p(q(t τ(t)))]. (6) Note that through appropriate choice of κ, and β, (6) can be put in the form (5). AQM schemes We consider the following AQM schemes. 4

5 . REM : The marking probability function used by REM is given by P(q) = e θq, (7) where q is the instantaneous queue length at the buffer (which may be real or virtual depending on the policy at the router), and θ is a parameter that determines the responsiveness of the router to incipient congestion. Higher values of θ lead to higher marking probability, which means the router is more aggressive in responding to congestion. 2. RED: The RED algorithm maintains an average queue length which we denote by q avg. The average queue length at any time t is computed as a weighted sum of the current queue length and the previous value of the average queue length. The marking probability is chosen as a function of the average queue length as follows: if q avg < q min, then P(q) = 0. if q min < q avg < q max, then P(q) = K p (q avg q min ) if q avg > q max P(q) =.0, where q max and q min are user-defined thresholds and K p is a constant. As in [5], we approximate this behavior by the following differential equation where K is a function of the averaging parameter used in computing q avg. P = K(K p q(t) P(q(t))), (8) 3. PI: A PI controller is of the following form: ( ) P q = K pi η + q q ref, (9) where K pi and η are controller gains which may be chosen to control the system behavior, and q ref is the desired queue length. 4. PC : The PC (Proportional Control) algorithm marks packets with a probability that is directly proportional to the instantaneous queue length, that is, where K p is a proportionality constant. P(q) = K p q, (0) 3 Analytical Results We begin by stating a basic theorem regarding the stability of delay differential equations. This result is used extensively throughout the paper and provides a means of assessing the maximum delay interval over which a delay 5

6 differential equation is stable. In particular, we present a version of the result given in [2] for delay differential equations of the following form: ẋ = Ax(t) + A x(t τ), () where A,A i R n n and τ is the delay parameter. In the theorem, the following notation is used. We define the generalized eigenvalue λ(a, B) of two n n matrices A and B as any solution λ to the equation det(a λb) = 0. For convenience, we denote the n generalized eigenvalues by λ (A, B) through λ n (A, B). Further, let ρ(a, B) := min{ λ : det(a λb) = 0}. Theorem Let rank(a ) = m. Suppose the system () is stable for some τ [0, ). Define α τ i + min i k k n if λ ω = k i i (jωk i I A, A e jτωi k) = e jαi k for some ωk i (0, ) if ρ(jωk i I A, A e jτωi k) > for all ωk i (0, ) Further, define Then the following statements are true. τ + = min i m τ+ i. The system is stable for any τ [τ, τ + τ + ). 2. The system becomes unstable at τ = τ + τ PFC and REM based on RQ We first study a proportionally-fair controller with REM at the router and no uncontrolled disturbances at the link, i.e., we let δ = 0. The system of delay differential equations given in (4), (7) and () is nonlinear. To apply Theorem, we linearize () and (4) about the equilibrium point. Thus, we study only the local stability of () and (4). The equilibrium point of () and (4), with REM used at the router, is given by x e = C q e = ( ) C θ log. C (2) 6

7 Suppose we perturb the equilibrium values of the source rate and queue length by y(t) and r(t), respectively, i.e., x(t) = x e + y(t), (3) q(t) = q e + r(t). Linearizing around (x e, q e ) yields the following linear delay differential equation for (y(t), r(t)) : Ẋ = AX + A X(t τ) (4) where X = y r, A = 0 0 0, A = κp e κx e P e 0 0, and τ = τ pr + q e C. In the above differential equation, P e denotes the equilibrium value for the marking probability (and is equal to C ), and P e denotes the first derivative of P(q) evaluated at q e. We then have the following stability result as a direct consequence of Theorem. Corollary 2 The system defined by (4) is stable for all values of τ < τ where τ is given by τ = ( ) Pe ω ω tan CP e (5) and ω is a positive solution of the equation ω 4 κ 2 P 2 e ω 2 κ 2 C 2 (P e) 2 = 0. (6) Proof. First note that the system is stable when τ = 0, then apply Theorem. The above theorem provides a condition to test for the stability of the system. The following lemma proves that it is always possible to choose parameters so that the linear system is stable. Lemma 3 Given τ pr, and C it is always possible to choose θ and κ such that the system is stable. 7

8 Proof. The condition for stability from Corollary is τ < ( ) Pe ω ω tan = ω ( CP tan e ω C(C )θ ), (7) where Substituting for q e we have τ = τ pr + q e C. τ = τ pr + ( ) C Cθ log. C Therefore (7) can be rewritten as τ pr < ( ) Pe ω ω tan ( ) C CP e θc log. (8) C From (6), when κ 0, ω 0. Hence lim κ 0 ω tan ( ) ω C(C )θ Therefore given an ǫ > 0, there exists κ such that ( ) ω ω tan C(C )θ From (8) and (9) we can write τ pr < ( Cθ (C ) Cθǫ log( C C ) > = ) < ω tan ( C(C )θ. ǫ. (9) C(C )θ ) ω ( ) C C(C )θ θc log. C Using the fact that x log( + x) > 0 for all x > 0, it is now easy to see that, by choosing κ and θ sufficiently small, the stability condition can be satisfied. Recall that the equilibrium value of the queueing delay is given by qe C. Our goal is to ensure system stability while keeping the queueing delay small. The following theorem shows that this is possible only if the equilibrium marking probability is large (close to ). Theorem 4 Suppose that the system parameters are chosen such that the linearized form of the system given by (4), (7) and () is stable and qe C < ǫτ pr for some ǫ > 0. Then, P e must satisfy the following inequality: ǫ + ǫ > P ( e log + P ) e. P e P e Thus, ǫ 0 implies P e. In other words, if we require the queueing delay to be a small fraction of the propagation delay and require that the system is stable, then the equilibrium marking probability must be very high. 8

9 Proof. From Corollary 2, for stability, we need τ < ( ) Pe ω ω tan, CP e where ω > 0 is a solution of the equation ω 4 κ 2 P 2 e ω 2 κ 2 C 2 (P e) 2 = 0. Since tan (x) < x for x > 0, a necessary condition for stability is given by τ < P e CP e = C(C )θ. Alternately, given τ pr, the parameter θ must satisfy the condition θ < C(C )(τ pr + τ q ) (20) for the linear system to be stable. Denote the equilibrium queueing delay by τ q. Thus, τ q = qe C (20), we have or equivalently, If we require that then (2) can be written as Now it is clear that as ǫ 0, P e. τ q τ > τ q τ pr + τ q > ǫ ǫ + > ( C ( Pe P e ( Pe P e ) ( ) C log, C and, from (2) and ) ( log + P ) e. (2) P e q e Cτ pr < ǫ, ) ( log + P ) e. P e As an example, suppose that the equilibrium queueing delay is required to be less than 0% of the propagation delay. Then, it is easy to show that P e must be greater than We now consider the effect of disturbances, which may be represented by the system (4) and () with the parameter δ (0,). Linearizing the system about the equilibrium gives where X = y, A = r Ẋ = AX + A X(t τ) (22), and A = κp e(δ) κx e (δ)p e(δ) 0 0 We assume that δ is a constant whose value is not known apriori. Thus, we have a linear system whose parameters are unknown. We would like to ensure stability and also maintain low queueing delays in the presence of disturbances.. 9

10 In other words, we are interested in finding the range of δ for which the system is stable when the original system is designed assuming δ = 0. The following lemma states that designing the system for low queueing delays results in poor disturbance rejection properties, i.e., stability is maintained only when δ is very small. Lemma 5 Suppose that the parameters of the linearized form of the system () and (4) are designed to maintain stability and low queueing delays (i.e. qe C < ǫτ q, where ǫ is small) in the absence of disturbances. Then, as ǫ 0, to ensure stability, δ must decrease to 0. Proof. Let P enom denote the design value of the equilibrium marking probability, i.e., when δ = 0. In other words, P enom = C. Let the actual disturbance level at the router be denoted by δ. The equilibrium throughput is then given by x e = C( δ). Let the actual equilibrium marking probability be denoted by P e (δ). Since P e (δ) <, we have ( δ)c <, or equivalently δ < P enom. Clearly as P enom, δ 0, and the result follows from Theorem 4. In other words, if the system is designed to maintain both stability and low queueing delays, then only low levels of disturbances can be handled at the router. In the next theorem, we show that designing the system for a disturbance level of δ max would result in instability when the system experiences a lower level of disturbance. Theorem 6 Suppose that the parameters of the linearized form of system () and (4) are designed so that the system maintains stability and low queueing delays ( qe Cτ < ǫ) when the disturbance level is δ max. Then given any δ c < δ max there exists ǫ c > 0 such that for all ǫ < ǫ c, the linear stability condition is violated for all δ [0, δ c ]. In other words, a controller design based on the linear stability criterion cannot maintain small queueing delays if the disturbance is unknown. Proof. The equilibrium marking probability when the disturbance is δ max is given by P e (δ max ) = C( δ max ). From the conditions for stability, we have τ pr τ < ( ) ω ω tan < C( δ max )(C( δ max ) )θ C( δ max )(C( δ max ) )θ. 0

11 From Lemma 3, it is always possible to choose θ and κ such that the system is stable. Hence, we can write τ pr = ν C( δ max )(C( δ max ) )θ, (23) where ν (0,) is some fixed constant. Now, suppose that the system experiences a disturbance of δ < δ max, the system must then satisfy τ < C( δ)(c( δ) )θ. (24) Since the expression on the right hand side of (24) is an increasing function of δ, one can explicitly determine the value of δ for which the right hand sides of (23) and (24) are equal. At this value of δ, which we refer to as δ c, the stability condition is violated. That is, δ c satisfies C( δ c )(C( δ c ) )θ = ν C( δ max )(C( δ max ) )θ. It follows that for all values of δ < δ c, the stability criterion is not met. Solving for δ c we get δ max δ c = ( δ max ) P (Pe ) e(δ max ) (δ max ) 2 ( ) Pe (δ max ) ν From this it is clear that as ǫ 0, P e (δ max ) and hence (δ max δ c ) 0. Hence there exists an ǫ c > 0 such that for all ǫ < ǫ c and δ [0, δ c ] the system is unstable. From the above analysis we can conclude the following. To achieve low queueing delays with a RQ-based REM, one has to have very high equilibrium marking probability (P e ). Since P e is simply /C, this implies that has to be large. In other words, the QoS (quality of service) requirement that the queueing delay should be small constrains the possible values for. Since one of the system parameters,, is constrained due to our QoS requirement, it limits our ability to choose the system parameters for the purpose of disturbance rejection. As a result, the system has poor disturbance rejection properties. In other words, it is not possible to maintain low queueing delays and reject disturbances unless the disturbance level is known a priori. 3.2 PFC and REM based on VQ We first consider the VQ-based marking system represented by (3) and (4) with δ = 0. Linearizing this system about the equilibrium point gives the system represented by (4), but with a different set of equilibrium values given by x e = γ d C

12 P e = γ d C, where γ d denotes the design value of γ. The stability conditions for the VQ-based AQM scheme, which are a direct consequence of Theorem, are stated in the following corollary. Corollary 7 The system is stable for all values of τ < τ where τ is given by τ = ( ) Pe ω ω tan γ d CP e and ω is a positive solution of the equation ω 4 κ 2 P 2 e ω 2 κ 2 C 2 (P e) 2 = 0. Now, as in Lemma 3, it can readily be shown that in the case of a VQ-based controller, given τ,, γ d and C, it is always possible to choose θ and κ such that the system is stable. For a VQ-based controller, the equilibrium value of the real queue is zero since the equilibrium arrival rate is less than the link capacity. Hence the queueing delay is always zero. Thus, unlike the RQ case, an upper bound on the queueing delay does not impose any restriction on the system parameters. As we will see, this allows us to achieve better disturbance rejection properties in a VQ-based system. We now consider the effect of disturbances in VQ-based systems. Specifically, consider the system defined by (3) and (4) with δ 0. The rate at which the queue length grows is given by q = x(t) γ d C + δc. The equilibrium rate at which the user can send data is given by x e = (γ d δ)c. Now, since P e (δ) <, we have or equivalently (γ d δ)c <, δ < γ d C. The main theorem of this section states that, given an upper bound on the disturbance level, it is possible to ensure that the system is stable for all levels of disturbance less than this upper bound. We first state and prove the following lemma regarding the uniform convergence of a sequence of functions, which is used in the main theorem. 2

13 Replacing κ by n, where n N, we consider the following sequence of real-valued functions: ( ω(γ, f n (γ) = ω(γ, n ) tan n ) ). (25) γc(γc )θ Given δ max < γ d C, an upper bound on the disturbance, the sequence of functions {f n} is defined in the domain [γ d δ max, γ d ]. In this domain, the sequence of functions converge pointwise to f(γ) = γc(γc )θ. Let f n denote the first derivative of f n w.r.t γ. Recall that ω is the positive root of the equation given in Corollary 7, that is, ω 4 Note that as n, κ 0 and ω(γ, n ) 0. ( ) 2 ( ) 2 ω 2 n γc ( ) 2 (θ(γc )) 2 = 0, n Lemma 8 The sequence of functions {f n } converges uniformly to f in the domain D := [γ d δ max, γ d ]. Proof. We first prove that the sequence of functions {f n } and {f n} are uniformly bounded. Note that for any n, the function f n (γ) has no singularities in D. Further f n (γ) is clearly bounded above by f(γ) for all n N, and f(γ) has no singularities in D. Hence f n is uniformly bounded. Differentiating f n w.r.t γ gives where and F = ω(γ, n ) tan F 2 = + f n(γ) = df n dγ = F ω(γ, n ) ω(γ, n ) F 2, (26) γ ( ω(γ, n ) ) γc(γc )θ ( ω(γ, n ) γc(γc )θ ) 2 ( ω(γ, n ) ω(γ, n ) = γ Here, g i denote continuous bounded functions of γ given by g = 2 γ 3 C 2 g 2 = 4 γ 5 C ( ω(γ, n ) γc(γc )θ γ 2 (γc ) + n g + ( n )2 g 2 +g 3 ) 2, (27) γc(γc )θ ) C γ(γc ) 2 Cθ, (28) ( n )2 g 4 +g 5. ( n )g 6 + ( n )2 g 4 + g 5 g 3 = 2θ 2 (γc )C g 4 = 4 γ 4 C 4 g 5 = 4θ 2 (γc ) 2 g 6 = 2 γ 2 C 2. It is straightforward to show that the sequence {f n} is also uniformly bounded. This implies that the family of functions {f n } is equicontinuous. A direct application of the Arzela-Ascoli theorem (see, for example, [6]) gives the result. 3

14 Theorem 9 Consider the linearized form of the system defined by (3) and (4) with δ 0. Let γ d denote the design value of γ. Given an upper bound δ max < γ d C on the disturbance level, there exist κ and θ such that the system is stable for any δ < δ max. Proof. Fix θ > 0 and consider the sequence of functions defined in (25). By Lemma 8, we know that given any ǫ > 0 there exists an N such that, for all n > N, f f n < ǫ for all γ [γ d δ max, γ d ]. Letting κ = n and defining f κ accordingly, we can equivalently state that given any ǫ > 0 there exists κ such that f f κ < ǫ for all γ [γ d δ max, γ d ]. The following inequality clearly holds: Thus there exists a κ > 0 such that or equivalently, + + ( ω(γ,κ) γc(γc )θ ( ω(γ,κ) γc(γc )θ ) 2 ) 2 γc(γc )θ < f. γc(γc )θ f κ < ǫ, F < ǫ, where F is defined in (27). Therefore, there exists κ > 0 such that df κ dγ = ω(γ, κ) ω(γ, κ) F F 2 < γ ω(γ, κ) ω(γ, κ) ǫ F 2 γ for all γ [γ d δ max, γ d ], with F 2 as defined in (28). Note that ǫ can be made arbitrarily small. Further, as κ 0, F 2 > µ for some µ > 0. Hence it follows that there exists a κ > 0 such that df κ dγ < 0 for all γ [γ d δ max, γ d ]. That is, there exists a κ > 0 such that f κ is a decreasing function of γ, implying that if δ < δ max, then τ < ω(γ d, κ) tan ( ) ω(γd, κ) < γ d C(γ d C )θ Thus the system is stable for all δ < δ max. ( ω((γ d δ), κ) tan ω((γ d δ), κ) (γ d δ)c((γ d δ)c )θ ). Remark The previous theorem states that the system is stable for all δ < γ C. Thus, by choosing small, we can reject large levels of disturbances. 4

15 3.3 Analysis of a TCP-REM based on RQ and VQ TCP-type congestion controllers can be analyzed in a manner similar to the analysis in the previous two subsections. The system is now defined by () and (6). The equilibrium point is given by x e = C and q e = θ log( βc 2 βc 2 ), when RQ-based marking is used. In the case of VQ-based schemes, the equilibrium points change appropriately. The following analysis is done considering a RQ-based REM at the router. Linearizing this system gives Ẋ = AX + A X(t τ) (29) where X = y r, A = κp ex e 0 0, A = κp ex e κx 2 ep e 0 0 and τ = τ pr + q e C, where P e is the equilibrium marking probability and P e is the first derivative of P e evaluated at q e. Again, as a direct consequence of Theorem we can state the following. Corollary 0 The system is stable for all τ < τ where τ = 2 ω tan ( P eω ) CP e and ω = κp e x 2 e. We now derive stability conditions under the constraint that the queueing delays remain small. Theorem Suppose that the system parameters are chosen such that the linearized form of the system given in (6), (7) and () is stable and qe C < ǫτ pr for some ǫ > 0. Then P e must satisfy the following inequality: ǫ + ǫ > P ( e log + P ) e. 2P e P e Thus, ǫ 0 implies P e. In other words, if we require the queueing delay to be a small fraction of the propagation delay and we require that the system is stable, then the equilibrium marking probability must be very high. 5

16 Proof. The proof of this theorem is similar to the proof of Theorem 4. This result implies that to achieve a low queueing delay one must have a high equilibrium marking probability. A disturbance rejection analysis similar to that for PFC and RQ-based REM shows that it is not possible to simultaneously ensure stability, disturbance rejection and small queueing delays. Similar to the analysis in Section 3.2, it can be shown that, in the case of a TCP-type congestion controller and VQ-based REM, it is possible to maintain both stability and low queueing delays in presence of large levels of disturbance. 3.4 Analysis of a PFC-PC and TCP-PC based on RQ and VQ Consider a PFC at the source and RQ-based PC at the router. It follows from Theorem that the system is stable if τ < ( ) Pe ω ω tan. P ec As tan (x) < x, a necessary condition for stability would be, or equivalently τ < P e P ec, K p < C 2 τ. Suppose the maximum desired queueing delay is τ q. Then the equilibrium queue length would be bounded above by Cτ q. Substituting for K p we get, which is equivalent to τ q C 2 < C 2 τ, τ q τ >. This implies that if we use PFC-PC with RQ-based marking, irrespective of the values of all the system parameters the queueing delay is always greater than the propagation delay. A similar analysis can be used to show that in the case of a TCP-type congestion controller the following holds: τ q τ > 2. Further analysis similar to Section 3.2 reveals that it is possible to reject large disturbance levels with a VQ-based PC while maintaining stability and low queueing delays. 6

17 3.5 Queueing Delay/Propagation Delay Time Figure : Evolution of the Queueing delay with PFC at the source, RQ-based REM at the router and a constant disturbance of 3.% of link capacity 4 Simulations In this section, we demonstrate the robustness of VQ-based congestion controllers via simulations. We study REM, PI and RED marking schemes at the router, along with PFC and TCP-type congestion controllers at the source. For all virtual queues, the target utilization γ d is set to The capacity C is chosen to be 0000 packets/sec. (The bandwidth associated with this is approximately equal to the bandwidth of 00 Mbps link, assuming that each packet is 000 bytes long). The number of users is 000. The roundtrip propagation delay for all users is taken to be 40 msec. Although the analysis in the earlier sections was carried out treating the disturbance as an unknown constant, in these simulations random flows are taken into account. Whenever the system is simulated in the presence of random flows, we take these random flows to be i.i.d. Bernoulli random variables with the total mean flow rate equal to 25% of the link capacity. 4. Experiment : REM We first consider RQ-based REM at the router with PFC at the source. For this experiment, the values of κ, and θ are chosen so that the system is stable and the queueing delay is less than 0% of the propagation delay. Specifically we chose κ =, = 9.7 and θ = We introduced a constant disturbance of 3.% of the link capacity. Our analytical results in Section 3. indicate that the linear system is unstable for this disturbance. Figure shows that, in the original non-linear system, the queue length becomes very large. In the case of VQ-based REM, we chose = and θ = Note that such low values of cannot be chosen in the case of RQ-based REM since 7

18 0.5 Queueing Delay/Propagation Delay Time Figure 2: Evolution of the Queueing delay with PFC at source, VQ-based REM at the router the resulting queueing delays are very large. In Figure 2, the performance of VQ-based REM with no disturbance is shown. To demonstrate robustness, a constant disturbance of 80% in magnitude is introduced without changing any design parameters; the results are shown in Figure 3. This demonstrates that VQ-based REM is able to reject very high levels of disturbance. Next we consider the impact of random disturbances on RQ and VQ-based versions of REM. Since our analysis is based on deterministic control theory, when random disturbances were introduced, the system parameters for RQ-based schemes were designed assuming the system was subjected to a constant disturbance equal to the mean. Based on this we chose = 7.3 and θ = The VQ-based REM parameters were chosen assuming no disturbances. Figure 4 shows that the queueing delay performance of VQ-based REM is significantly superior to that of RQ-based REM despite the fact that VQ-based REM parameters were not chosen to reject any disturbance. Similar experiments are conducted with the TCP-type congestion controller (6) and both RQ and VQ-based REM. In the case of RQ-based REM we chose κ =, = 65 and θ = 0.. When dealing with VQ-based REM we chose κ = 000, = 0 3 and θ = Again, as with PFC, a small constant disturbance (in this case.3%) causes the queue to become very large for RQ-based REM, as shown in Figure 5. With VQ-based REM, the queueing delay is zero with or without disturbances (Figure 6 and Figure 7). When random flows are introduced in the router, for the RQ-based REM we chose = 36 and θ = From Figure 8 it is clear that VQ-based REM performs significantly better than RQ-based REM. 8

19 5 Queueing Delay/Propagation Delay Time Figure 3: Evolution of the Queueing delay with PFC at the source, VQ-based REM at the router and a constant disturbance of 80% of link capacity 4.2 Experiment 2: RED As mentioned before, RED can be thought of as proportional control with the averaging being performed at the router. So the parameters for PC were used as a guideline for choosing the parameters for RED. However, further experiments were used to ensure that the best setting was chosen for RED. Accordingly, we chose K to be 00 and K p to be when a TCP-type congestion controller is used at the source, and we chose K to be 00 and K p to be when PFC is used at the source. Further, for PFC we choose = and for a TCP-type congestion controller we chose = 0 2 at the source. A typical plot of queueing delay versus time is shown in Figure 9. As noted in the analysis of PC, the queueing delay cannot be made arbitrarily small compared to the propagation delay when RQ-based RED is used. However, as Figure 0 shows, the queueing delay is zero with VQ-based RED. Random flows are introduced at the router to study the robustness of VQ-based RED. The corresponding plot is shown in Figure. From the figure, it is clear that VQ-based RED is able to maintain low queueing delays even in the presence of random flows. 4.3 Experiment 3: PI When the disturbance level is assumed to be an unknown constant, extensive simulations (not shown here) indicate that the performance of RQ and VQ-based PI are very similar. Specifically, when the disturbance level is constant, the queue length is equal to zero in the case VQ-based PI, and equal to q ref, which can be chosen to be close to zero in the case of RQ-based PI. When random flows are introduced, we observed that the overall link utilization of the PI controller decreases 9

20 Queueing Delay/Propagation Delay RQ: mean =0.49 SD=0.37 VQ: mean = SD= RQ REM VQ REM time Figure 4: Comparison between PFC/RQ-based REM and PFC/VQ-based REM with random flows at the router amounting to 25% of link capacity significantly if q ref is chosen close to zero. Therefore to keep the utilization fairly high, q ref was set to be 300 packets for both RQ and VQ-based PI controllers. The remaining PI parameters are chosen based on the results given in [5]. Even though the focus in [5] is on the TCP-type congestion controller, it is straightforward to see that the same type of analysis can be used to choose the parameters with PFC at the source. Figure 2 shows the queueing delays of both VQ and RQ-based PI with PFC in the presence of random flows. As seen in the figure it is clear that the introduction of random flows increases the queueing delays substantially in the case of RQ-based PI, whereas the VQ-based PI maintains low queueing delays. Figure 3 shows that similar behavior results with PI implemented in the real queue and the virtual queue for the case of a TCP-type congestion controller. 5 Conclusions In this paper, we have demonstrated through analysis and simulations that a VQ-based marking scheme performs better than a RQ-based scheme in terms of queueing delays and robustness in the presence of disturbances. An interesting observation is that the PI controller performs well with or without a VQ when there is no randomness in the system. However, when random flows are introduced, the VQ-based PI performs significantly better than the RQ-based PI controller. We also observed that small queue lengths can be maintained by the VQ-based schemes irrespective of the kind of AQM scheme used in the VQ. An avenue for further research would be the analytical study of the robustness with random disturbances. 20

21 .2 Queueing Delay/Propagation Delay Time Figure 5: Evolution of the Queueing delay with TCP at the source, RQ-based REM at the router and a constant disturbance of.3% of link capacity References [] S. Athuraliya, V. H. Li, S. H. Low, and Q. Yin. REM: Active queue management. IEEE Network, 5, May/June 200. [2] J. Chen. On computing the maximal delay intervals for stability of linear delay systems. In Proceedings of the American Control Conference, pages , 994. [3] S. Floyd and V. Jacobson. Random early detection gateways for congestion avoidance. IEEE/ACM Transactions on Networking, August 993. [4] R.J. Gibbens and F.P. Kelly. Resource pricing and the evolution of congestion control. Automatica, 35: , 999. [5] C.V. Hollot, V. Misra, D. Towsley, and W. Gong. On designing improved controllers for AQM routers supporting TCP flows. In Proceedings of IEEE INFOCOM, Anchorage, Alaska, April 200. [6] F. P. Kelly, A. Maulloo, and D. Tan. Rate control in communication networks: shadow prices, proportional fairness and stability. Journal of the Operational Research Society, 49: , 998. [7] F.P. Kelly. Models for a self-managed Internet. Philosophical Transactions of the Royal Society, A358: ,

22 0.6 Queueing Delay/Propagation Delay Time Figure 6: Evolution of the Queueing delay with TCP at the source and VQ-based REM at the router [8] F.P. Kelly. Mathematical modelling of the Internet. In Mathematics Unlimited and Beyond (Editors B. Engquist and W. Schmid), pages , Berlin, 200. Springer-Verlag. [9] S. Kunniyur and R. Srikant. End-to-end congestion control: utility functions, random losses and ECN marks. In Proceedings of IEEE INFOCOM, Tel Aviv, Israel, March [0] S. Kunniyur and R. Srikant. Analysis and design of an adaptive virtual queue algorithm for active queue management. In Proceedings of ACM Sigcomm, pages 23 34, San Diego, CA, August 200. [] S. Kunniyur and R. Srikant. Stable, scalable, fair congestion control and AQM schemes that achieve high utilization in the Internet, Technical Report, available at srikant. Earlier versions in the Proceedings of the Asian Control Conference, September 2002 and the Proceedings of the CISS, March [2] S. Kunniyur and R. Srikant. A time-scale decomposition approach to adaptive ECN marking. IEEE Transactions on Automatic Control, June [3] S. H. Low, F. Paganini, and J. C. Doyle. Internet congestion control. IEEE Control Systems Magazine, 22:28 43, February [4] L. Massoulie and J. Roberts. Bandwidth sharing: Objectives and algorithms. In Proceedings of INFOCOM, New York, NY, March 999. [5] J. Padhye, V. Firoiu, D. Towsley, and J. Kurose. Modeling TCP throughput: A simple model and its empirical validation. In Proceedings of ACM SIGCOMM,

23 4 Queueing Delay/Propagation Delay Time Figure 7: Evolution of the Queueing delay with TCP at the source, VQ-based REM at the router and a constant disturbance of 50% of link capacity [6] W. Rudin. Real and Complex Analysis. Mcgraw-Hill, 987. Third Edition. 23

24 Queueing Delay/Propagation Delay RQ: mean =0.35 SD=0.24 VQ: mean = SD= RQ REM VQ REM time Figure 8: Comparison between RQ and VQ REM with TCP at the source and random flows amounting to 25% of the link capacity 3.5 Queueing delay/propagation Delay PFC TCP Time Figure 9: Evolution of the Queueing delay with PFC, TCP at the source and RQ-based RED at the router 24

25 3 Queueing delay/propagation Delay PFC TCP Time Figure 0: Evolution of the Queueing delay with PFC, TCP at the source and VQ-based RED at the router Queueing Delay/Propagation Delay mean =3.3 SD=0.087 mean = SD=0.005 RQ RED VQ RED Time Figure : Comparison between RQ and VQ RED with TCP at the source and random flows amounting to 25% of the link capacity 25

26 Queueing Delay/Propagation Delay RQ: mean =.3 SD=0.28 VQ: mean = SD=0.002 RQ PI VQ PI Time Figure 2: Comparison between RQ and VQ PI, with PFC at the source and random flows amounting to 25% of the link capacity.4 Queueing Delay/Propagation Delay RQ: mean =0.74 SD=0.8 VQ: mean =0.006 SD= Time Figure 3: Comparison between RQ and VQ PI,with TCP at the source and random flows amounting to 25% of the link capacity 26

communication networks

communication networks Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth

More information

A Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification (ECN) Marking

A Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification (ECN) Marking University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering June 2002 A Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification

More information

OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION

OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION International Journal of Bifurcation and Chaos, Vol. 18, No. 5 (28) 1459 1475 c World Scientific Publishing Company OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION XI CHEN,

More information

Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems

Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems Yueping Zhang and Dmitri Loguinov Texas A&M University, College Station, TX 77843 Email: {yueping, dmitri}@cs.tamu.edu Abstract

More information

A Stackelberg Network Game with a Large Number of Followers 1,2,3

A Stackelberg Network Game with a Large Number of Followers 1,2,3 A Stackelberg Network Game with a Large Number of Followers,,3 T. BAŞAR 4 and R. SRIKANT 5 Communicated by M. Simaan Abstract. We consider a hierarchical network game with multiple links, a single service

More information

384Y Project June 5, Stability of Congestion Control Algorithms Using Control Theory with an application to XCP

384Y Project June 5, Stability of Congestion Control Algorithms Using Control Theory with an application to XCP 384Y Project June 5, 00 Stability of Congestion Control Algorithms Using Control Theory with an application to XCP . Introduction During recent years, a lot of work has been done towards the theoretical

More information

Internet Congestion Control: Equilibrium and Dynamics

Internet Congestion Control: Equilibrium and Dynamics Internet Congestion Control: Equilibrium and Dynamics A. Kevin Tang Cornell University ISS Seminar, Princeton University, February 21, 2008 Networks and Corresponding Theories Power networks (Maxwell Theory)

More information

PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control

PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control Saurabh Jain Joint work with Dr. Dmitri Loguinov June 21, 2007 1 Agenda Introduction Analysis of RCP QI-RCP PIQI-RCP Comparison Wrap

More information

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays.

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays. V. Guffens 1 and G. Bastin 2 Intelligent Systems and Networks Research

More information

Modeling and Stability of PERT

Modeling and Stability of PERT Modeling Stability of PET Yueping Zhang yueping@cs.tamu.edu I. SYSTEM MODEL Our modeling of PET is composed of three parts: window adjustment ED emulation queuing behavior. We start with the window dynamics.

More information

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min JetMax: Scalable Max-Min Min Congestion Control for High- Speed Heterogeneous Networks Yueping Zhang Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer Science

More information

Performance Analysis of Priority Queueing Schemes in Internet Routers

Performance Analysis of Priority Queueing Schemes in Internet Routers Conference on Information Sciences and Systems, The Johns Hopkins University, March 8, Performance Analysis of Priority Queueing Schemes in Internet Routers Ashvin Lakshmikantha Coordinated Science Lab

More information

Research Article Design of the Congestion Control for TCP/AQM Network with Time-Delay

Research Article Design of the Congestion Control for TCP/AQM Network with Time-Delay Mathematical Problems in Engineering, Article ID 834698, 7 pages http://dx.doi.org/.55/4/834698 Research Article Design of the Congestion Control for TCP/AQM Network with Time-Delay Dazhong Wang and Shujing

More information

THE Internet is increasingly being used in the conduct of

THE Internet is increasingly being used in the conduct of 94 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 1, FEBRUARY 2006 Global Stability Conditions for Rate Control With Arbitrary Communication Delays Priya Ranjan, Member, IEEE, Richard J. La, Member,

More information

Analysis of TCP-AQM Interaction via Periodic Optimization and Linear Programming: The Case of Sigmoidal Utility Function

Analysis of TCP-AQM Interaction via Periodic Optimization and Linear Programming: The Case of Sigmoidal Utility Function Analysis of TCP-AQM Interaction via Periodic Optimization and Linear Programming: The Case of Sigmoidal Utility Function K. Avrachenkov 1, L. Finlay 2, and V. Gaitsgory 2 1 INRIA Sophia Antipolis, France

More information

Complete Stability Region Characterization for PI-AQM

Complete Stability Region Characterization for PI-AQM Complete Stability Region Characterization for PI-AQM Ahmad T. Al-Hammouri, Vincenzo Liberatore, Michael S. ranicky Department of Electrical Engineering and Computer Science Case Western Reserve University

More information

Rate Control in Communication Networks

Rate Control in Communication Networks From Models to Algorithms Department of Computer Science & Engineering The Chinese University of Hong Kong February 29, 2008 Outline Preliminaries 1 Preliminaries Convex Optimization TCP Congestion Control

More information

NEW CONGESTION CONTROL SCHEMES OVER WIRELESS NETWORKS: STABILITY ANALYSIS. Minghua Chen Alessandro Abate Shankar Sastry

NEW CONGESTION CONTROL SCHEMES OVER WIRELESS NETWORKS: STABILITY ANALYSIS. Minghua Chen Alessandro Abate Shankar Sastry NEW CONGESTION CONTROL SCHEMES OVER WIRELESS NETWORKS: STABILITY ANALYSIS Minghua Chen Alessandro Abate Shankar Sastry Department of Electrical Engineering and Computer Science University of California

More information

Boundedness of AIMD/RED System with Time Delays

Boundedness of AIMD/RED System with Time Delays Boundedness of AIMD/ED System with Time Delays Lijun Wang 1, Lin Cai, Xinzhi Liu 1 and Xuemin (Sherman) Shen 3 Department of Applied Mathematics 1, Department of Electrical and Computer Engineering 3 University

More information

Resource Allocation and Pricing. R. Srikant University of Illinois

Resource Allocation and Pricing. R. Srikant University of Illinois Resource Allocation and Pricing R. Srikant University of Illinois References The Mathematics of Internet Congestion Control, Birkhauser, 2004. Pricing: Kelly Distributed Resource Allocation: Kelly, Mauloo

More information

THE prediction of network behavior is an important task for

THE prediction of network behavior is an important task for TCP Networ Calculus: The case of large delay-bandwidth product Eitan Altman, Konstantin Avrachenov, Chadi Baraat Abstract We present in this paper an analytical model for the calculation of networ load

More information

Network anomaly estimation for TCP/AQM networks using an observer

Network anomaly estimation for TCP/AQM networks using an observer 1 Network anomaly estimation for TCP/AQM networks using an observer Yassine Ariba, Yann Labit, Frederic Gouaisbaut University of Toulouse, LAAS-CNRS 7 avenue du Colonel Roche, 3177 Toulouse cedex 4 FRANCE

More information

Extended Analysis of Binary Adjustment Algorithms

Extended Analysis of Binary Adjustment Algorithms 1 Extended Analysis of Binary Adjustment Algorithms Sergey Gorinsky Harrick Vin Technical Report TR22-39 Department of Computer Sciences The University of Texas at Austin Taylor Hall 2.124, Austin, TX

More information

Hopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion Control

Hopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion Control International Journal of Engineering esearch And Management (IJEM) ISSN: 349-58, Volume-5, Issue-6, June 18 Hopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion

More information

Performance Modeling of TCP/AQM with Generalized AIMD under Intermediate Buffer Sizes

Performance Modeling of TCP/AQM with Generalized AIMD under Intermediate Buffer Sizes Performance Modeling of TCP/AQM with Generalized AIMD under Intermediate Buffer Sizes Do Young Eun and Xinbing Wang Dept. of Electrical and Computer Engineering orth Carolina State University Raleigh,

More information

Window Flow Control Systems with Random Service

Window Flow Control Systems with Random Service Window Flow Control Systems with Random Service Alireza Shekaramiz Joint work with Prof. Jörg Liebeherr and Prof. Almut Burchard April 6, 2016 1 / 20 Content 1 Introduction 2 Related work 3 State-of-the-art

More information

Dynamics of Network Resource Management

Dynamics of Network Resource Management Dynamics of Network Resource Management Ibrahim Matta Department Boston University The Internet is So HUGE that no one really knows how big But, rough estimates: Users ~ 1.8B in 2009 (source: etforecasts)

More information

Analysis and Design of Controllers for AQM Routers Supporting TCP Flows

Analysis and Design of Controllers for AQM Routers Supporting TCP Flows To appear in IEEE TAC s special issue on Systems and Control Methods for Communication Networks Analysis and Design of Controllers for AQM Routers Supporting TCP Flows C.V. Hollot, V. Misra, D. Towsley

More information

Modelling multi-path problems

Modelling multi-path problems 1 Modelling multi-path problems Richard Gibbens Computer Laboratory, University of Cambridge 2nd Annual Conference on Information Sciences and Systems Princeton University 19 21 March 2 2 Multi-path flow

More information

Fairness comparison of FAST TCP and TCP Vegas

Fairness comparison of FAST TCP and TCP Vegas Fairness comparison of FAST TCP and TCP Vegas Lachlan L. H. Andrew, Liansheng Tan, Tony Cui, and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks (CUBIN), an affiliated

More information

Congestion Control for Infrastructure-based CRNs: A Multiple Model Predictive Control Approach

Congestion Control for Infrastructure-based CRNs: A Multiple Model Predictive Control Approach Congestion Control for Infrastructure-based CRNs: A Multiple Model Predictive Control Approach Kefan Xiao, Shiwen Mao, and Jitendra K Tugnait Department of Electrical and Computer Engineering, Auburn University,

More information

A Generalized FAST TCP Scheme

A Generalized FAST TCP Scheme A Generalized FAST TCP Scheme Cao Yuan a, Liansheng Tan a,b, Lachlan L. H. Andrew c, Wei Zhang a, Moshe Zukerman d,, a Department of Computer Science, Central China Normal University, Wuhan 430079, P.R.

More information

arxiv: v1 [cs.ni] 5 Feb 2009

arxiv: v1 [cs.ni] 5 Feb 2009 On Designing Lyapunov-Krasovskii Based AQM for Routers Supporting TCP Flows Yann Labit, Yassine Ariba and Frédéric Gouaisbaut arxiv:0902.0922v1 [cs.ni] 5 Feb 2009 December 2007 Abstract For the last few

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBER

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBER IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 6, DECEMBER 2009 1697 Understing XCP: Equilibrium Fairness Lachlan L H Andrew, Senior Member, IEEE, Steven H Low, Fellow, IEEE, Bartek P Wydrowski, Member,

More information

Stability Analysis of TCP/RED Communication Algorithms

Stability Analysis of TCP/RED Communication Algorithms Stability Analysis of TCP/RED Communication Algorithms Ljiljana Trajković Simon Fraser University, Vancouver, Canada ljilja@cs.sfu.ca http://www.ensc.sfu.ca/~ljilja Collaborators Mingjian Liu and Hui Zhang

More information

Stability of the Maximum Size Matching

Stability of the Maximum Size Matching Stability of the Maximum Size Matching Mohsen Bayati Dept. of Electrical Engineering Stanford University Stanford, CA 9405-950 bayati@stanford.edu Neda Beheshti Dept. of Electrical Engineering Stanford

More information

Stability Analysis of TCP/RED Communication Algorithms

Stability Analysis of TCP/RED Communication Algorithms Stability Analysis of TCP/RED Communication Algorithms Ljiljana Trajković Simon Fraser University, Vancouver, Canada ljilja@cs.sfu.ca http://www.ensc.sfu.ca/~ljilja Collaborators Mingjian Liu and Hui Zhang

More information

instantaneous queue (pkts)

instantaneous queue (pkts) A Control Theoretical Look at Internet Congestion Control Fernando Paganini 1,JohnDoyle 2, and Steven H. Low 2 1 UCLA Electrical Engineering, Los Angeles, CA 90095, USA 2 California Institute of Technology,

More information

Impact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis

Impact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis Impact of ross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis Rebecca Lovewell and Jasleen Kaur Technical Report # TR11-007 Department of omputer Science University of North arolina

More information

Analysis of Scalable TCP in the presence of Markovian Losses

Analysis of Scalable TCP in the presence of Markovian Losses Analysis of Scalable TCP in the presence of Markovian Losses E Altman K E Avrachenkov A A Kherani BJ Prabhu INRIA Sophia Antipolis 06902 Sophia Antipolis, France Email:altman,kavratchenkov,alam,bprabhu}@sophiainriafr

More information

A Mechanism for Pricing Service Guarantees

A Mechanism for Pricing Service Guarantees A Mechanism for Pricing Service Guarantees Bruce Hajek Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign Sichao Yang Qualcomm

More information

Scalable Laws for Stable Network Congestion Control

Scalable Laws for Stable Network Congestion Control Roeeediog of the 40th IEEE Conference on Decision and Conel Orbdo, Florida USA, December 200 Scalable Laws for Stable Network Congestion Control Fernando Paganinil John Doyle2 Steven Low3 Abstract This

More information

TCP modeling in the presence of nonlinear window growth

TCP modeling in the presence of nonlinear window growth TCP modeling in the presence of nonlinear window growth Eitan Altman, Kostia Avrachenkov, Chadi Barakat Rudesindo Núñez-Queija Abstract We develop a model for TCP that accounts for both sublinearity and

More information

Statistical Detection of Congestion in Routers

Statistical Detection of Congestion in Routers Submitted to IEEE/ACM Transactions on Networking Statistical Detection of Congestion in Routers Ivan D. Barrera, Member, IEEE, Stephan Bohacek, Member, IEEE, and Gonzalo Arce, Fellow, IEEE, Abstract Detection

More information

Markovian Model of Internetworking Flow Control

Markovian Model of Internetworking Flow Control Информационные процессы, Том 2, 2, 2002, стр. 149 154. c 2002 Bogoiavlenskaia. KALASHNIKOV MEMORIAL SEMINAR Markovian Model of Internetworking Flow Control O. Bogoiavlenskaia Petrozavodsk State University

More information

Towards Protocol Equilibrium with Oblivious Routers

Towards Protocol Equilibrium with Oblivious Routers Towards Protocol Equilibrium with Oblivious Routers Debojyoti Dutta USC/ISI 4676 Admiralty Way Marina Del Rey, CA 9292 Email: ddutta@isi.edu Ashish Goel Dept. of MS&E Stanford University Terman 3, Stanford

More information

CS276 Homework 1: ns-2

CS276 Homework 1: ns-2 CS276 Homework 1: ns-2 Erik Peterson October 28, 2006 1 Part 1 - Fairness between TCP variants 1.1 Method After learning ns-2, I wrote a script (Listing 3) that runs a simulation of one or two tcp flows

More information

Competitive Management of Non-Preemptive Queues with Multiple Values

Competitive Management of Non-Preemptive Queues with Multiple Values Competitive Management of Non-Preemptive Queues with Multiple Values Nir Andelman and Yishay Mansour School of Computer Science, Tel-Aviv University, Tel-Aviv, Israel Abstract. We consider the online problem

More information

Robust Control of Heterogeneous Networks (e.g. congestion control for the Internet)

Robust Control of Heterogeneous Networks (e.g. congestion control for the Internet) Robust Control of Heterogeneous Networks (e.g. congestion control for the Internet) Glenn Vinnicombe gv@eng.cam.ac.uk. University of Cambridge & Caltech 1/29 Introduction Is it possible to build (locally

More information

Can Shortest-path Routing and TCP Maximize Utility

Can Shortest-path Routing and TCP Maximize Utility Can Shortest-path Routing and TCP Maximize Utility Jiantao Wang Lun Li Steven H. Low John C. Doyle California Institute of Technology, Pasadena, USA {jiantao@cds., lun@cds., slow@, doyle@cds.}caltech.edu

More information

Unresponsive Flows and AQM Performance

Unresponsive Flows and AQM Performance Unresponsive Flows and AQM Performance C.V. Hollot, Yong Liu, Vishal Misra and Don Towsley Abstract Routers handle data packets from sources unresponsive to TCP s congestion avoidance feedback. We are

More information

A Stochastic Model for TCP with Stationary Random Losses

A Stochastic Model for TCP with Stationary Random Losses A Stochastic Model for TCP with Stationary Random Losses Eitan Altman, Kostya Avrachenkov Chadi Barakat INRIA Sophia Antipolis - France ACM SIGCOMM August 31, 2000 Stockholm, Sweden Introduction Outline

More information

Methodology for Computer Science Research Lecture 4: Mathematical Modeling

Methodology for Computer Science Research Lecture 4: Mathematical Modeling Methodology for Computer Science Research Andrey Lukyanenko Department of Computer Science and Engineering Aalto University, School of Science and Technology andrey.lukyanenko@tkk.fi Definitions and Goals

More information

Optimization and Stability of TCP/IP with Delay-Sensitive Utility Functions

Optimization and Stability of TCP/IP with Delay-Sensitive Utility Functions Optimization and Stability of TCP/IP with Delay-Sensitive Utility Functions Thesis by John Pongsajapan In Partial Fulfillment of the Requirements for the Degree of Master of Science California Institute

More information

An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits

An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits Peter Jacko YEQT III November 20, 2009 Basque Center for Applied Mathematics (BCAM), Bilbao, Spain Example: Congestion

More information

HIGH-speed communication networks recently received. Randomized Algorithms for Stability and Robustness Analysis of High-Speed Communication Networks

HIGH-speed communication networks recently received. Randomized Algorithms for Stability and Robustness Analysis of High-Speed Communication Networks IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 16, NO. 5, SEPTEMBER 2005 1229 Randomized Algorithms for Stability and Robustness Analysis of High-Speed Communication Networks Tansu Alpcan, Student Member,

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Delayed Stability and Performance of Distributed Congestion Control

Delayed Stability and Performance of Distributed Congestion Control Delayed Stability and Performance of Distributed Congestion Control Yueping Zhang Texas A&M University College Station, TX 77843 yueping@cs.tamu.edu Seong-Ryong Kang Texas A&M University College Station,

More information

A New TCP/AQM System Analysis

A New TCP/AQM System Analysis A ew TCP/AQM System Analysis Qin Xu, Fan Li, Jinsheng Sun, and Moshe Zukerman, Fellow, IEEE arxiv:37.24v [cs.i] 4 Jul 23 Abstract The fluid model has been used extensively to guide designs of AQM schemes

More information

Efficient Nonlinear Optimizations of Queuing Systems

Efficient Nonlinear Optimizations of Queuing Systems Efficient Nonlinear Optimizations of Queuing Systems Mung Chiang, Arak Sutivong, and Stephen Boyd Electrical Engineering Department, Stanford University, CA 9435 Abstract We present a systematic treatment

More information

Models and Techniques for Network Tomography

Models and Techniques for Network Tomography Proceedings of the 21 IEEE Worshop on Information Assurance and Security T1C2 13 United States Military Academy West Point NY 5 6 June 21 Models and Techniques for Networ Tomography Stephan Bohace bohace@mathuscedu

More information

A New TCP End-to-End Congestion Avoidance Algorithm Through Output Feedback

A New TCP End-to-End Congestion Avoidance Algorithm Through Output Feedback 2004 5th Asian Control Conference A New TCP End-to-End Congestion Avoidance Algorithm Through Output Feedback Yi Guo*, Zhihua &U* and Nageswara bot * Department of Electrical and Computer Engineering University

More information

An Asymmetric Small-Gain Technique to Construct Lyapunov-Krasovskii Functionals for Nonlinear Time-Delay Systems with Static Components

An Asymmetric Small-Gain Technique to Construct Lyapunov-Krasovskii Functionals for Nonlinear Time-Delay Systems with Static Components 2011 American Control Conference on O'Farrell Street, San Francisco, CA, USA June 29 - July 01, 2011 An Asymmetric Small-Gain Technique to Construct Lyapunov-Krasovskii Functionals for Nonlinear Time-Delay

More information

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering, Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen

More information

Stability of window-based queue control with application to mobile terminal download

Stability of window-based queue control with application to mobile terminal download Proceedings of the 17th International Symposium on Mathematical Theory of Networks and Systems, Kyoto, Japan, July 24-28, 26 TuA8.2 Stability of window-based queue control with application to mobile terminal

More information

Capturing Network Traffic Dynamics Small Scales. Rolf Riedi

Capturing Network Traffic Dynamics Small Scales. Rolf Riedi Capturing Network Traffic Dynamics Small Scales Rolf Riedi Dept of Statistics Stochastic Systems and Modelling in Networking and Finance Part II Dependable Adaptive Systems and Mathematical Modeling Kaiserslautern,

More information

ENERGY DECAY ESTIMATES FOR LIENARD S EQUATION WITH QUADRATIC VISCOUS FEEDBACK

ENERGY DECAY ESTIMATES FOR LIENARD S EQUATION WITH QUADRATIC VISCOUS FEEDBACK Electronic Journal of Differential Equations, Vol. 00(00, No. 70, pp. 1 1. ISSN: 107-6691. URL: http://ejde.math.swt.edu or http://ejde.math.unt.edu ftp ejde.math.swt.edu (login: ftp ENERGY DECAY ESTIMATES

More information

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS

M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS M/G/FQ: STOCHASTIC ANALYSIS OF FAIR QUEUEING SYSTEMS MOHAMMED HAWA AND DAVID W. PETR Information and Telecommunications Technology Center University of Kansas, Lawrence, Kansas, 66045 email: {hawa, dwp}@ittc.ku.edu

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer

More information

Compound TCP with Random Losses

Compound TCP with Random Losses Compound TCP with Random Losses Alberto Blanc 1, Konstantin Avrachenkov 2, Denis Collange 1, and Giovanni Neglia 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France {alberto.blanc,denis.collange}@orange-ftgroup.com

More information

Analysis on Packet Resequencing for Reliable Network Protocols

Analysis on Packet Resequencing for Reliable Network Protocols 1 Analysis on Packet Resequencing for Reliable Network Protocols Ye Xia David Tse Department of Electrical Engineering and Computer Science University of California, Berkeley Abstract Protocols such as

More information

IN THIS PAPER, we describe a design oriented modelling

IN THIS PAPER, we describe a design oriented modelling 616 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 14, NO 3, JUNE 2006 A Positive Systems Model of TCP-Like Congestion Control: Asymptotic Results Robert Shorten, Fabian Wirth, and Douglas Leith Abstract We

More information

Analysis of the Increase and Decrease. Congestion Avoidance in Computer Networks

Analysis of the Increase and Decrease. Congestion Avoidance in Computer Networks Analysis of the Increase and Decrease Algorithms for Congestion Avoidance in Computer Networks Dah-Ming Chiu, Raj Jain Presented by: Ashish Vulimiri Congestion Control Congestion Avoidance Congestion Avoidance

More information

Network Optimization and Control

Network Optimization and Control Foundations and Trends R in Networking Vol. 2, No. 3 (2007) 271 379 c 2008 S. Shakkottai and R. Srikant DOI: 10.1561/1300000007 Network Optimization and Control Srinivas Shakkottai 1 and R. Srikant 2 1

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

I. INTRODUCTION. This work was supported by a Wakerly Stanford Graduate Fellowship and by the Powell Foundation.

I. INTRODUCTION. This work was supported by a Wakerly Stanford Graduate Fellowship and by the Powell Foundation. Analysis of scheduling algorithms that provide 100% throughput in input-queued switches Isaac Keslassy, Nick McKeown Computer Systems Laboratory, Stanford University Stanford, CA 94305-9030 {keslassy,

More information

Modelling TCP with a Discrete Time Markov Chain

Modelling TCP with a Discrete Time Markov Chain Modelling TCP with a Discrete Time Markov Chain José L Gil Motorola josegil@motorola.com ABSTRACT TCP is the most widely used transport protocol in the Internet. The end-to-end performance of most Internet

More information

A Mathematical Model of the Skype VoIP Congestion Control Algorithm

A Mathematical Model of the Skype VoIP Congestion Control Algorithm A Mathematical Model of the Skype VoIP Congestion Control Algorithm Luca De Cicco, S. Mascolo, V. Palmisano Dipartimento di Elettrotecnica ed Elettronica, Politecnico di Bari 47th IEEE Conference on Decision

More information

ACK-Clocking Dynamics: Modelling the Interaction between Windows and the Network

ACK-Clocking Dynamics: Modelling the Interaction between Windows and the Network ACK-Clocking Dynamics: Modelling the Interaction between Windows and the Network Krister Jacobsson, Lachlan L. H. Andrew,AoTang, Karl H. Johansson,Håkan Hjalmarsson,StevenH.Low ACCESS Linnaeus Centre,

More information

KCV Kalyanarama Sesha Sayee and Anurag Kumar

KCV Kalyanarama Sesha Sayee and Anurag Kumar Adaptive Algorithms for Admission of Elastic Sessions in the Internet KCV Kalyanarama Sesha Sayee and Anurag Kumar Abstract In the Internet, the majority of the traffic consists of elastic transfers. Users

More information

Understanding TCP Vegas: A Duality Model

Understanding TCP Vegas: A Duality Model Understanding TCP Vegas: A Duality Model STEVEN H. LOW Caltech, Pasadena, California AND LARRY L. PETERSON AND LIMIN WANG Princeton University, Princeton, New Jersey Abstract. We view congestion control

More information

CDS 270-2: Lecture 6-1 Towards a Packet-based Control Theory

CDS 270-2: Lecture 6-1 Towards a Packet-based Control Theory Goals: CDS 270-2: Lecture 6-1 Towards a Packet-based Control Theory Ling Shi May 1 2006 - Describe main issues with a packet-based control system - Introduce common models for a packet-based control system

More information

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads

Operations Research Letters. Instability of FIFO in a simple queueing system with arbitrarily low loads Operations Research Letters 37 (2009) 312 316 Contents lists available at ScienceDirect Operations Research Letters journal homepage: www.elsevier.com/locate/orl Instability of FIFO in a simple queueing

More information

Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances

Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances Tsuyoshi Ito and Mary Inaba Department of Computer Science, The University of Tokyo 7-3-1 Hongo, Bunkyo-ku,

More information

Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications

Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications Alp Simsek Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Asuman E.

More information

variability in size, see e.g., [10]. 2 BTD is similar to slow-down used for scheduling problems, e.g., [11], [12].

variability in size, see e.g., [10]. 2 BTD is similar to slow-down used for scheduling problems, e.g., [11], [12]. Size-based Adaptive Bandwidth Allocation: Optimizing the Average QoS for Elastic Flows Shanchieh Yang (scyang@ece.utexas.edu), Gustavo de Veciana (gustavo@ece.utexas.edu) Department of Electrical and Computer

More information

THE problem of network flow control is to control

THE problem of network flow control is to control 1 MaxNet: Faster Flow Control Convergence Bartek P. Wydrowski, Member, IEEE, Lachlan L. H. Andrew, Member, IEEE, Iven M. Y. Mareels, Fellow, IEEE. Abstract MaxNet is a distributed congestion control architecture

More information

Congestion Control. Topics

Congestion Control. Topics Congestion Control Topics Congestion control what & why? Current congestion control algorithms TCP and UDP Ideal congestion control Resource allocation Distributed algorithms Relation current algorithms

More information

Compound TCP with Random Losses

Compound TCP with Random Losses Compound TCP with Random Losses Alberto Blanc 1, Konstantin Avrachenkov 2, Denis Collange 1, and Giovanni Neglia 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France {alberto.blanc,denis.collange}@orange-ftgroup.com

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

Congestion Control In The Internet Part 1: Theory. JY Le Boudec 2018

Congestion Control In The Internet Part 1: Theory. JY Le Boudec 2018 Congestion Control In The Internet Part 1: Theory JY Le Boudec 2018 1 Contents 1. What is the problem; congestion collapse 2. Efficiency versus Fairness 3. Definitions of fairness 4. Additive Increase

More information

Fractional order PI controllers for TCP packet flow ensuring given modulus margins

Fractional order PI controllers for TCP packet flow ensuring given modulus margins Control and Cybernetics vol. 43 (2014) No. 4 Fractional order PI controllers for TCP packet flow ensuring given modulus margins by Wies law Krajewski 1 and Umberto Viaro 2 1 Systems Research Institute,

More information

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels 1 Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels Invited Paper Ali ParandehGheibi, Muriel Médard, Asuman Ozdaglar, and Atilla Eryilmaz arxiv:0810.167v1 cs.it

More information

Delay-independent stability via a reset loop

Delay-independent stability via a reset loop Delay-independent stability via a reset loop S. Tarbouriech & L. Zaccarian (LAAS-CNRS) Joint work with F. Perez Rubio & A. Banos (Universidad de Murcia) L2S Paris, 20-22 November 2012 L2S Paris, 20-22

More information

On the Resource Utilization and Traffic Distribution of Multipath. Transmission Control

On the Resource Utilization and Traffic Distribution of Multipath. Transmission Control On the Resource Utilization and Traffic Distribution of Multipath Transmission Control UMass Computer Science Technical Report UM-CS-2011-005 Bo Jiang 1, Yan Cai 2, Don Towsley 1 1 {bjiang, towsley}@cs.umass.edu

More information

Mixed Stochastic and Event Flows

Mixed Stochastic and Event Flows Simulation Mixed and Event Flows Modeling for Simulation Dynamics Robert G. Cole 1, George Riley 2, Derya Cansever 3 and William Yurcick 4 1 Johns Hopkins University 2 Georgia Institue of Technology 3

More information

A Globally Stable Adaptive Congestion Control Scheme for Internet-Style Networks with Delay 1

A Globally Stable Adaptive Congestion Control Scheme for Internet-Style Networks with Delay 1 A Globally Stable Adaptive ongestion ontrol Scheme for Internet-Style Networks with Delay Tansu Alpcan 2 and Tamer Başar 2 (alpcan, tbasar)@control.csl.uiuc.edu Abstract In this paper, we develop, analyze

More information

Performance Effects of Two-way FAST TCP

Performance Effects of Two-way FAST TCP Performance Effects of Two-way FAST TCP Fei Ge a, Sammy Chan b, Lachlan L. H. Andrew c, Fan Li b, Liansheng Tan a, Moshe Zukerman b a Dept. of Computer Science, Huazhong Normal University, Wuhan, P.R.China

More information

Global stabilization of feedforward systems with exponentially unstable Jacobian linearization

Global stabilization of feedforward systems with exponentially unstable Jacobian linearization Global stabilization of feedforward systems with exponentially unstable Jacobian linearization F Grognard, R Sepulchre, G Bastin Center for Systems Engineering and Applied Mechanics Université catholique

More information