Window Flow Control: Macroscopic Properties from Microscopic Factors

Similar documents
Window Flow Control: Macroscopic Properties from Microscopic Factors

Queue Dynamics with Window Flow Control

Internet Congestion Control: Equilibrium and Dynamics

ACK-Clocking Dynamics: Modelling the Interaction between Windows and the Network

Fairness comparison of FAST TCP and TCP Vegas

An Improved Link Model for Window Flow Control and Its Application to FAST TCP

communication networks

A Generalized FAST TCP Scheme

cs/ee/ids 143 Communication Networks

OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION

Performance Effects of Two-way FAST TCP

Switched Systems: Mixing Logic with Differential Equations

Analysis of TCP Westwood+ in high speed networks

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays.

IN THIS PAPER, we describe a design oriented modelling

Controlo Switched Systems: Mixing Logic with Differential Equations. João P. Hespanha. University of California at Santa Barbara.

Analysis of Scalable TCP in the presence of Markovian Losses

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min

Compound TCP with Random Losses

Stochastic Hybrid Systems: Applications to Communication Networks

Local and Global Stability of Symmetric Heterogeneously-Delayed Control Systems

Robust Control of Heterogeneous Networks (e.g. congestion control for the Internet)

Modelling an Isolated Compound TCP Connection

Modeling and Stability of PERT

PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control

Impact of Queueing Delay Estimation Error on Equilibrium and Its Stability

NEW CONGESTION CONTROL SCHEMES OVER WIRELESS NETWORKS: STABILITY ANALYSIS. Minghua Chen Alessandro Abate Shankar Sastry

Compound TCP with Random Losses

384Y Project June 5, Stability of Congestion Control Algorithms Using Control Theory with an application to XCP

Robustness of Real and Virtual Queue based Active Queue Management Schemes

Growth conditions for the global stability of highspeed communication networks

Understanding TCP Vegas: A Duality Model

A Mathematical Model of the Skype VoIP Congestion Control Algorithm

MaxNet: Theory and Implementation

A Stochastic Model for TCP with Stationary Random Losses

Understanding TCP Vegas: A Duality Model

Stochastic Hybrid Systems: Modeling, analysis, and applications to networks and biology

A positive systems model of TCP-like congestion control: Asymptotic results

Window Size. Window Size. Window Size. Time. Time. Time

A positive systems model of TCP-like congestion control: Asymptotic results

TCP over Cognitive Radio Channels

Capturing Network Traffic Dynamics Small Scales. Rolf Riedi

CS276 Homework 1: ns-2

Markovian Model of Internetworking Flow Control

Performance Analysis of Priority Queueing Schemes in Internet Routers

A positive systems model of TCP-like congestion control: Asymptotic results

Can Shortest-path Routing and TCP Maximize Utility

Hopf Bifurcation and Stability of an Improved Fluid Flow Model with Time Delay in Internet Congestion Control

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBER

Impact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis

Competitive Management of Non-Preemptive Queues with Multiple Values

Stability of window-based queue control with application to mobile terminal download

Stability Analysis of TCP/RED Communication Algorithms

THE Internet is increasingly being used in the conduct of

Resource Allocation and Pricing. R. Srikant University of Illinois

class class ff ff (t) packet loss packet loss (t) - - RED controlled queue Figure : Illustration of a Differentiad Services framework. RED has been an

Dynamics of Network Resource Management

Stability Analysis of TCP/RED Communication Algorithms

Reliable Data Transport: Sliding Windows

On the Resource Utilization and Traffic Distribution of Multipath. Transmission Control

TWO PROBLEMS IN NETWORK PROBING

Rate Control in Communication Networks

A Time-Scale Decomposition Approach to Adaptive Explicit Congestion Notification (ECN) Marking

On the Resource Utilization and Traffic Distribution of Multipath Transmission Control

A Globally Stable Adaptive Congestion Control Scheme for Internet-Style Networks with Delay 1

Performance Modeling of TCP/AQM with Generalized AIMD under Intermediate Buffer Sizes

Optimization and Stability of TCP/IP with Delay-Sensitive Utility Functions

TCP-friendly SIMD Congestion Control and Its Convergence Behavior

Extended Analysis of Binary Adjustment Algorithms

A Theoretical Study of Internet Congestion Control: Equilibrium and Dynamics

Processor Sharing Flows in the Internet

Boundedness of AIMD/RED System with Time Delays

Analytic Performance Evaluation of the RED Algorithm

THE problem of network flow control is to control

TCP modeling in the presence of nonlinear window growth

Design and Tuning of Fractional-order PID Controllers for Time-delayed Processes

THE prediction of network behavior is an important task for

Modelling TCP with a Discrete Time Markov Chain

Window Flow Control Systems with Random Service

Analysis of TCP-AQM Interaction via Periodic Optimization and Linear Programming: The Case of Sigmoidal Utility Function

Information in Aloha Networks

Congestion Control In The Internet Part 1: Theory. JY Le Boudec 2018

Synchronization Transitions in Complex Networks

Stochastic Hybrid Systems: Applications to Communication Networks

Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances

Fair Scheduling in Input-Queued Switches under Inadmissible Traffic

Asymptotic Stability of Congestion Control Systems with Multiple Sources

Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications

On queueing in coded networks queue size follows degrees of freedom

Performance analysis of IEEE WLANs with saturated and unsaturated sources

A New TCP/AQM System Analysis

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods

Comparison of TCP Reno and TCP Vegas via Fluid Approximation

Models and Techniques for Network Tomography

Review of Linear Time-Invariant Network Analysis

Performance analysis of IEEE WLANs with saturated and unsaturated sources

A Utility-Based Congestion Control Scheme for Internet-Style Networks with Delay

Frequency methods for the analysis of feedback systems. Lecture 6. Loop analysis of feedback systems. Nyquist approach to study stability

These are special traffic patterns that create more stress on a switch

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Transcription:

Window Flow Control: Macroscopic Properties from Microscopic Factors Ao Tang, Lachlan L. H. Andrew, Krister Jacobsson, Karl H. Johansson, Steven H. Low, Håkan Hjalmarsson California Institute of Technology, Pasadena, CA 925, USA Royal Institute of Technology KTH, Stockholm, SE-29 32, Sweden Abstract This paper studies window flow control focusing on bridging the gap between microscopic factors such as burstiness in sub-rtt timescales, and observable macroscopic properties such as steady state bandwidth sharing and flow level stability. Using new models, we analytically capture notable effects of microscopic behaviors on macroscopic quantities. For loss-based protocols, we calculate the loss synchronization rate for different flows and use it to quantitatively explain the unfair bandwidth sharing between paced and unpaced TCP flows. For delaybased protocols, we show that the ratios of round trip delays are critical to the stability of the system. These results provide fundamental understanding of congestion control systems. Packet level simulations are used to verify our theoretical claims. I. INTRODUCTION Flow control has been studied since at least the 97s; see [7] and the references therein. Since the rapid explosion of the Internet, Internet congestion control algorithms, which are implemented in TCP Transmission Control Protocol and currently control the majority of Internet traffic, have been extensively studied for two decades. Roughly speaking, in the first ten years 988-997 starting with [8], research focused on packet-level microscopic properties and implementations, and researchers usually relied on qualitative reasoning and simulations, as in [4], [6], [], [27]. In the last ten years 998-27, following the seminal paper [2], the focus shifted to fluid models and tools from optimization and control theories, seeking macroscopic understandings with more quantitative calculations [4], [8], [2], [25], [26]. However, there is a significant gap between these two types of studies; although the microscopic studies are usually more qualitative, they are much closer to the actual implementations while the recent macroscopic quantitative work generally ignores many sometimes important details of real protocols. One major issue that most existing analytical work misses is the traffic burstiness within a round trip time RTT. Current TCPs use window control, and rapid changes in the window induce burstiness, like slow-start causing bursts of almost back to back packets. There are also other sources of burstiness such as cross traffic [29]. Most importantly, once such burstiness is generated, it is self-perpetuating because of ACK-clocking. Because a new packet is transmitted only when an acknowledgment is received, the prior bursty pattern of acknowledgments caused by bursty transmissions will cause the transmissions in the next RTT also to be bursty. This has been verified with simulations and real Internet tests []. Can we bridge the gap mentioned above by reconciling these two types of work? Can we capture sub-rtt phenomena, especially sustainable burstiness patterns, with a tractable closed loop model? Will this study provide useful new insight and solve previously unsolved problems? This paper is devoted to these questions and answers yes to all of them. It turns out that some microscopic factors are very important and can affect macroscopic properties including steady state bandwidth allocation and flow level stability. In order to explain these analytically, we solve two main difficulties sidestepped by existing work in this area. One is modeling window flow control with sub-rtt factors and the other is to properly capture the closed loop effects. The paper is organized as follows. Section II describes the mathematical model, which captures sub-rtt behavior. We then show its impact by applying it to analysis of both lossbased and delay-based protocols. In Section III, we focus on steady state analysis. By using a simple solution to our model, we analytically predict unfair bandwidth allocation between paced and unpaced TCP Reno when they share a link. In Section IV, we shift our attention to dynamics. Using our new model, we show that the stability of FAST TCP [3] is dependent on the heterogeneity of the RTTs of the flows. This leads to the first discovery of unstable patterns of FAST TCP and also stability conditions that are usually satisfied in practice. Section V discusses some possible extensions. II. MODEL Consider a single bottleneck link with capacity c shared by multiple TCP flows, which are indexed by i =,..., N. The following variables are used throughout the paper. All are functions of time t; written without explicit time dependence, they denote equilibrium values. p: queuing delay at the link. w i : window size of flow i. x i : arrival rate of flow i s data at the queue. d i : propagation delay for flow i. τ i : round trip delay RTT for flow i, τ i = d i + p. A model for a congestion control system must specify two things: a the window control algorithm e.g., TCP Reno in Section III and FAST TCP in Section IV which determines how the congestion signal affects the window and b how the congestion signal, based on the queue length, evolves in response to the window sizes. For b, it is well accepted that the length of a FIFO queue integrates the difference between We assume this is also the number of packets in the network, although a sudden reduction in w i t will not instantly withdraw packets.

2 incoming traffic and the link capacity, ṗt = N x i t c. c i= It remains to find an equation to relate the window which sources control with the rate which affects the queue. This is traditionally done by approximating the rate by the ratio between the corresponding window and RTT, i.e., x i t = w it τt. 2 Although 2 applies to the average over an RTT and is good for equilibrium analysis, it does not apply to the instantaneous quantities and so is not suitable for more detailed analysis like dynamics and microscopic rate patterns. It has several fatal problems. First, there is ambiguity over whether to use w i t τ and/or τt τ for w i t and τt. Second, it completely ignores ACK-clocking by letting rate directly follow the window s change while, as noted in Section I, rates are affected by the acknowledgment stream. Third, it implicitly assumes that the rate is almost uniform within one RTT while in reality, persistent sub-rtt burstiness is prevalent. The solution is to capture ACK-clocking. The following equation, mentioned in passing in [9], expresses window flow control s goal of equating the packets in flight with the window. More precisely, the window at time t + d + pt is the integral of the data rate from t to t + d + pt. This is because for the data that is sent out at t, which experiences a queuing delay pt, its acknowledgment arrives at the source at t + d + pt, assuming without loss of generality that the delay from the source to the link is. Formally, t+d+pt t x i sds = w i t + d + pt. 3 Note that 3 holds for every t and hence it defines a rate function xt based on the window function. Equations, 3 combined with the equation that describes the window control e.g. equation 9 for FAST TCP form our model. Extensive packet level simulations in a companion paper [9] show the accuracy of the model and its superiority to all existing models. Here, we apply the model to find how some microscopic factors affect certain macroscopic properties. III. APPLICATION TO LOSS BASED PROTOCOLS: BURSTINESS AFFECTS STEADY STATE A basic assumption of optimization flow control [8] is that all flows sharing a link see the same congestion signal at that link. However, in reality this may not be the case, especially for loss-based protocols using droptail routers. When a loss event occurs several packet losses within one RTT due to the overflow of the buffer, some flows may escape losing packets, and will not detect the event. Current TCP Reno halves its window once in any RTT in which packets are lost, and thus the window is determined by the frequency of detecting loss events, rather than the expected number of packets lost. The probability that a flow will detect a given loss event, called the synchronization rate, is used to analyze this effect in [2] and further in [6], [7], [23]. It was demonstrated in [6] that flows with lower synchronization rates observe higher throughput, even if they have the same RTT. Early models [2], [6], [23], take the synchronization rate as a given parameter. In this section, we instead calculate it based on the instantaneous rates. This closed loop analysis shows the effect of microscopic burstiness on steady state throughputs. In particular, it is shown that flows with the same macroscopic fluid equation but different microscopic burstiness patterns TCP Reno and Paced TCP 2, receive not only different instantaneous rates but also different steady state rates 3. This is in stark contrast to the prediction from standard macroscopic analysis, where these flows should have the same equilibrium rates. Similar analysis can be used to help explain the unfairness between TCP Reno and TFRC [2], [28]. To simplify the presentation, we study the case where all flows have the same RTT. A. Basic Setting Consider a single-bottleneck network shared by a set U of N u unpaced TCP Reno flows and a set P of N p paced TCP Reno flows, with identical propagation delays d. Let N = N u + N p be the cardinality of A = U P. Let Σ u t = i U w it, Σ p t = i P w it and Σ a t = Σ u t+σ p t. Assume the buffer is large enough that it never empties 4. The total RTT τt = Σ a t/c varies with changes in window sizes. At any time, the instantaneous rate of paced flow i P is x i t = w i t/τt = cw i t/σ a. 4 Unpaced flows i U transmit in bursts. During the portion i t of the RTT that flow i sends, it sends at rate Xt = c k P x kt, giving instantaneous rates { Xt = c Σp t/σ x i t = a t i t 5 otherwise. The total time during which flow i has non-zero rate is w i t/xt = w i t/cσ a t/σ u t. 6 This time may consist of several non-contiguous bursts. At each point in time, exactly one non-paced flow is transmitting. This is illustrated in Figure. When the window sizes are constant, this pattern of burstiness is a solution to the model, 3, see [9] for details. Loss occurs in the round trip during which the sum of the windows reaches the bandwidth-delay product plus the buffer size. The exact time of the loss is uniformly chosen within that round trip, and D packets are dropped simultaneously. This models a brief burst of cross traffic which the almostfull buffer is unable to handle. The probability that each loss is incurred by flow i is independent, and proportional to the instantaneous rate of flow i when the loss occurs. 2 Paced TCP was proposed in late 9s; see e.g., [3]. It reduces burstiness by sending packets smoothly over an RTT, at a rate given by 2. 3 This has already been observed and intuitively explained []. Our contribution is to provide a closed loop analytical explanation 4 Paced TCP seeks to improve throughput by avoiding bursts too large for the buffers. However, for moderate to large buffers, Paced TCP flows actually gets smaller throughput than unpaced flows

3 x i X i Fig.. Flow rates vs. time for the model of loss. Paced flows transmit at constant rate for the entire RTT, τ, while unpaced flows transmit in bursts. A single unpaced flow may have several bursts, as the diagonally shaded flow. The set of times in RTT t during which flow i is sending is i t. The rationale for modeling them as simultaneous is that loss occurs when the buffer is too full to absorb bursty cross traffic. A brief peak in cross traffic, such as a flow in slow-start, will cause a number of losses nearly simultaneously. The case where there are no unpaced flows corresponds to the model of [2], [23] in which the rate is assumed to be w i t/τt. Conversely, the case where there are no paced flows corresponds to the totally unsynchronized model in which a flow s probability of experiencing loss is directly proportional to its rate [2], [8]. This is clearly an extreme model of burstiness for unpaced flows, and can exaggerate the difference between paced and unpaced flows. However, it suffices to demonstrate the need to model certain microscopic factors in order to determine even the most basic macroscopic properties, such as the steady state. B. Synchronization Rates The number L i of losses experienced by flow i P during one loss event is binomially distributed with parameters D and x i t/c. The number L i of losses experienced by flow i U will be binomially distributed with parameters D and Xt/c if its rate is Xt, and otherwise. Let a i = if L i = and a i = if L i >, and let q i = Pr[a i = ]. Then D Σp t w i t i U Σ a Σ u t q i = w D 7 it i P. Σ a When no loss is occurring, each flow increases its window by, and each time a flow loses one or more packets simultaneously, it reduces its window by a factor /2. Measure time in units of round trip time, which is equal for all flows, but not constant. Let the times of consecutive loss events be indexed by k; denote by v[k] and v[k + ] the value of any variable v respectively before and after the kth loss event, and T [k] be the number of RTTs between congestion events k and k +. The evolution of the windows are then given by w i [k + ] = b i [k]w i [k] + T [k] 8 where b i [k] = a i [k] +.5a i [k]. Losses occur as soon as the number of outstanding packets equals the bandwidth delay product, giving b i [k]w i [k] + NT [k] = BDP = Σ a [k]. 9 i A c Using the fact that i A w i[k] = Σ a [k], i A T [k] = b i[k]w i [k] N whence 8 becomes w[k + ] = A[k]w[k] where w[k] is a vector of windows at time k, and A[k] = diagb i [k]+ N. b [k], b 2 [k],..., b N [k] 2 is a random matrix whose distribution depends on w[k]. C. Steady State Analysis As in [7], the loss indicator b i [k] in this model depends on x i [k], but now the relationship between x i [k] and w i [k] depends on whether or not i is paced, with x i [k] not proportional to w i [k] for unpaced flows. We assume the Markov chain admits a unique and globally attractive invariant distribution and is ergodic. The following generalizes a result in [7], which says the expectation of the window and the synchronization rate is an invariant. Its intuitive consequence which will be proved later is that flows with higher synchronization rates will have smaller windows and therefore rates on average. Theorem. Under, for all i, j A, E[w i [k]q i [k]] = E[w j [k]q j [k]]. 3 Proof: From equations and 2 and b i [k] = a i [k] +.5a i [k] =.5a i [k], we have w[k + ] = w[k].5 I N E diaga[k]w[k] where E is a square matrix with all entries. Taking expectations of both sides and noting E[w[k + ]] = E[w[k]] as they follow the unique steady state distribution, gives I N E E[diaga[k]w[k]] = which is equivalent to E E[diaga[k]w[k]] = E[diaga[k]w[k]]. N Hence E[diaga[k]w[k]] is an eigenvector corresponding to the eigenvalue for /NE, which is κ[,,..., ] T where κ is a constant. Thus E[w i [k]q i [k]] = E[w i [k]a i [k]] = E[w j [k]a j [k]] = E[w j [k]q j [k]] for all i, j A. We now show that TCP Reno and Paced TCP don t share the link fairly. The following lemma is proved in the appendix. Lemma 2. For all D > and r, ], d r D r <. dr r Theorem 3. For all i U, all j P and all w, Σ a, q i w i P > E[q i w i U]. 4

4 Proof: Consider a flow sending for time δ τ per RTT at rate w/δ < c, and rate otherwise. If D losses occur simultaneously, the probability of this flow not experiencing a loss is P w, δ = δ τ + δ w D. τ cδ W p / W u.4.2.8 D=2 D=3 D=4 NS, 5ms NS, 2ms By Lemma 2 with r = cδ/w, for any w, P w, δ > P w, τ for all δ < τ. Although the particular δ will depend on the window sizes of other flows, an unpaced flow will always transmit with such a pattern with some δ < τ, while a paced flow corresponds to δ = τ. Thus for a given window size, w, an unpaced flow will always have a lower loss probability than a paced flow. That is, q p w := q i w i P > q u w := E[q i w i U]. Theorem 3 shows that unpaced TCP Reno sees fewer loss events, and thus can be expected to achieve higher rate. Figure 2 compares the actual ratio of window sizes at loss events for paced and unpaced flows as predicted by, as N u and N p increase equally, for D = 2, 3, 4. It also shows the ratios of rates obtained from NS simulations with propagation delays of 5 ms and 2 ms, link capacity of 8.3 pkts/ms and a buffer of the product of the capacity and propagation delay, averaged over experiments. It shows that this simple model roughly captures the initial decrease in fairness as N u and N p increase, and the leveling off after about 4 flows. To see why Figure 2 asymptotes to a constant, note that if N >> D then Dw i [k]/σ a << for i P, giving w i [k]/σ a D Dw i [k]/σ a 5 and if N u is large, then Σ u [k] N u E[w i ], whence by 3 D E[wi 2 ] Σ a N ue[w i ]/Σ a D E[wi 2 ] i P N u E[w i ] 6 i U In [7] it was shown that E[wi 2] E[w i] 2 when synchronization is low. In the above model, this approximation applies as synchronization is limited by the burstiness of the unpaced flows. This gives an algebraic equation relating W u = E[w i ] for i U with W p = E[w i ] for i P. If also N u W u /Σ a D << the equation is a quadratic in W p, D Wp 2 W u = Σ a Σa N p W p, 7 Σ a N u N u N u valid for log/ N u W u /Σ a << D << N, with solution W p + 4DNu /N p 2 W u 2DN u /N p N p /N u N p /N u 2 + 4D. 8 This depends on N u and N p only through N u /N p. Remark:. The model depends on the number of drops, D. We currently take D as a constant, but it could be drawn from a distribution. 2. In practice, drops are spread over an interval. This, and the fact that non-identical RTTs will cause bursts to spread, mean that real networks will show less bias against paced flows than this model predicts, especially when D is large. Until now, we have focused on mean throughput window behavior. The model actually also provides information on.6.4 2 4 8 6 32 N u = N p Fig. 2. Ratio of window sizes for paced and unpaced flows, and ratios of simulated rates. Fig. 3. probability density 5 x 3 4 3 2 paced unpaced 5 5 2 Window size packets Histogram of window sizes for paced and unpaced TCP Reno flows. steady state throughput window distributions. Figure 3 exemplifies the distribution of window sizes of paced and unpaced flows, with N p = 3, N u = 3, total bandwidth-delay-product of Σ a = 27 packets and D = 6, based on simulation of. This confirms the significant sustained unfairness. It also demonstrates that the window of an unpaced flow has a larger variance, which matches intuition. IV. APPLICATION TO DELAY BASED PROTOCOLS: RTT RATIOS DETERMINE STABILITY Among the research work on congestion control, one line of work of fundamental interest is the dynamics of congestion control algorithms. In particular, stability despite feedback delay is required in order to ensure that the system operating point is indeed the intended equilibrium, with the desired efficiency and fairness. However, due to the lack of an accurate model whose prediction can be verified by packet level simulations, there has been certain confusion in this area. Take FAST TCP as an example; existing experiments always showed it to be stable regardless of feedback delay [3] while models have made diverse predictions see [24]. In this section, by applying the new model to this problem, we show that for any step size γ, there is a possibly pathological network in which FAST is unstable, as verified by both analysis and packet level simulations. We finally also provide conditions which guarantee FAST to be stable. A. Model of FAST and the network FAST TCP is an algorithm which aims at improving TCP Reno s performance especially for networks with large band-

5 width delay products [3]. FAST sets the congestion window based on the queuing delay, p i t τ, seen by the packets. Its continuous time form is p i t τ ẇ i t = γ d i + p i t τ 2 w it + γ d i + p i t τ α i 9 where γ, ] is a step size and α i is a constant measured in packets. Since we are interested in local stability, we linearize and take the Laplace transform of 9. That yields s + γ p τ 2 i w i s = γ α id i qτ i 2 p ise sτi, 2 while the linearization of the network model, 3 gives N e N sτi w i s c + x i ps =. 2 e sτi sτi e i= i= Combining 2 and 2 gives a negative feedback system with an open loop transfer function where Ls = N µ i L i s 22a i= µ i = α i cq = α i c N n= α = x i n c 22b L i s = d iγe sτi T sτ i τi 2s + γq N n= µ 22c nt sτ n T sτ =. 22d e sτ Note that ReT jφ = /2 for all φ. Define y such that 2 + jyφ := e jφ = 2 j sinφ 2 cosφ. 23 Geometrically, T jφ is the intersection between the line Rez = /2 and the line passing through the origin and the point e +jφ, as shown in Figure 4. As a consequence, ˆT = N i= µ it sτ i also lies on the line Rez = /2. In particular, as ω increases from to 2π/τ max, ˆT monotonically traces the line from /2 j to /2 + j. We now focus on the case of q, in which the open loop transfer function tends to Ls = γ N i= µ i T sτ i e sτi /sτ i N n= µ nt sτ n. 24 This model will now be used to predict two previously unknown modes of instability of FAST. B. Instability due to RTT heterogeneity Since each individual flow does not have complete knowledge of the network, we would like to be able to set FAST s parameters, such as γ, so that it will be stable in all networks. In the following, we show that that is impossible. For a given γ, we construct a network carrying two flows with very different RTTs such that FAST is unstable. Imaginary axis.5.5.5.5 e sτ e sτ 2 / e sτ 2 / e sτ 2 2 3 Real axis Fig. 4. Construction of T jφ. The circle is e jφ ; T jφ is where the line joining the conjugate of e jφ to the origin cuts Rez = /2. The circles show jφ = sτ, and the triangles show jφ = sτ 2. The dash-dot line joins e jφ to its conjugate, and the dotted line joins T jφ to the origin. For two flows with equal α, µ = µ 2 = /2, so the loop gain 24 reduces to Ls = γ e sτ e sτ2 + e sτ2 e sτ sτ sτ 2. 25 2 e sτ2 e sτ The main idea of the proof is that the loop gain becomes very large near ω = 2π/τ + τ 2 as the heterogeneity increases. Let λ = τ /τ + τ 2. Let ωτ, λ, β be the solution to ωτ 2 = 2π ωτ β, 26 with ωτ, ωτ 2, 2π and β, ωτ. Let L λ β = Ljωτ, λ, β 27 e jωτ e jωτ+β e jβ e + ejωτ jωτ jωτ = γ j2π ωτ β 2 e jωτ e jβ 28 e jωτ where each ω in 28 refers to ωτ, λ, β. The following lemma is proved in the appendix. Lemma 4. Let ω = 2π/τ + τ 2. Then 25 satisfies ImLjω >. 29 Let β = 2πλ 3. For < λ < /2π 2, 27 satisfies ImL λ β < 3 and for all ω [ω β/τ, ω ], 25 satisfies Ljω γ 4λ 2. 3 For all ω >, the general case 2, and hence 25, satisfies d argljω. 32 dω The primary result of Lemma 4 is 3 which shows that there is an arbitrarily large positive feedback near ω. To see where this arises, consider the limit as ωτ. As τ 2 τ,

6 the second term in the numerator of 28 is small, and so to first order, L λ β γ + cosωτ /jωτ sinωτ /ωτ 2 2 cosωτ jβ γ ωτ + jωτ 2 /2 ωτ ωτ 2 33 jβ using sina + β sina β for small a, β. The large gain results from the cancellation of the imaginary part of the denominator, by the τ 2, leaving only jβ. Physically, this is because there is feedback on the timescale of τ 2 τ ; the feedback gain should normally be reduced in proportion to the feedback delay [22], but flow scales its gain in proportion to its own, much smaller, RTT. Theorem 5. For all γ > and τ there exists a τ such that for all τ 2 > τ the model 25 is unstable. Proof: By 32 and the Nyquist criterion, 25 is unstable if and only if Ljω, for some ω, since low frequency behavior is as in [22]. Let τ = max 4/γ, 2π 2. For any τ 2 > τ, the right hand side of 3 exceeds, and 29 and 3 of Lemma 4 hold. By 29 and 3, Ljω crosses the real axis for some ω [ω β/τ, ω ], and by 32, this crossing must be clockwise and must be a crossing of the negative real axis. By 3 of Lemma 4, this crossing must be to the left of + j, proving the instability. The following NS-2 simulation supports Theorem 5. This is the first example to show instability of FAST TCP; previous work failed to show this as it did not explore cases with sufficient heterogeneity in feedback delays [3]. Example : Instability due to Heterogeneous RTTs Consider two FAST flows sending over a single bottleneck with capacity 2 Mbit/s with 4 byte packets, with d = ms and d 2 = 33 ms and FAST parameters γ =.5 and α = [3]. The Nyquist plot of 25 in Fig. 5 encircles, indicating instability. NS-2 simulations, reported in the three remaining plots, show that there is indeed sustained oscillation at around /d 2 3 Hz. The rate of source 2 oscillated between 338 and 355 pk/s. For this and Example 2, FAST s multiplicative increase mode was disabled. Similarly, consider two FAST flows sending over a single bottleneck with capacity Gbit/s with 5 byte packets, with d = 6 ms and d 2 = 3 ms and FAST parameters γ =.5 and α = 3 packets. This system was implemented in WANin-Lab [5] using a Gbit/s bottleneck. Fig. 6 show that there is again sustained oscillation at around /d 2 8 Hz. Since it is difficult to measure the queue size inside a hardware router, the plots instead show oscillation in the window size of the flow with a 6 ms RTT. The sustained oscillations of over 5 packets illustrates the instability. The reason for the two brief metastable periods near 5 and seconds is not clear. However, the increase in throughput during those times shows the harmful effects of even bounded instability, and importance of investigating the stability of protocols. The lower two subfigures show closeups of the abatement and onset of stability. The windows were sampled at 2 samples/second, which may explain the beating observed Imaginary axis 5 5 5 Real axis Pf 5 x 3 4 3 2 2 Frequency Hz Queue size [pkts] CWND, src [pkts] 3 25 2 5 98 98.5 99 99.5 Time [sec] 8 7 6 5 4 98 98.5 99 99.5 Time [sec] Fig. 5. Unstable mode of FAST: d = ms, d 2 = 33 ms. Upper left: Nyquist plot of loop gain. Upper right: Bottleneck queue size. Lower left: Magnitude spectrum FFT of queue size, without DC component. Lower right: Window size, source, w. CWND, src [pks] CWND, src [pks] 6 5 4 3 2 2 3 4 time s 35 3 25 22 24 26 28 3 time s Rate Mbit/s CWND, src [pks] 96 95 94 93 92 9 9 2 3 time s 35 3 25 3 32 34 36 38 time s Fig. 6. Unstable mode of FAST: d = 6 ms, d 2 = 3 ms. Upper left: Window size, source, w. Upper right: Total received rate. Lower left: Oscillation abatement, w. Lower right: Oscillation onset, w. at around 2 s. Similar experiments with two flows of 6 ms do not exhibit this osciallation, indicating that it is indeed due to the heterogeneity. For this experiment, FAST s multiplicative increase mode was used only when the measured delay was less than.3 ms. C. Instability due to RTT synchronization The precise timing of the model 24 allows another mode of instability, now to be described. This instability, which is confirmed by NS simulation, is expected not to appear in real networks with jitter as explained in Section IV-D like the phase effect artifact [5], but affects formal stability proofs. Consider a network 24 with N = 2 flows with equal rate, µ = µ 2 = /2 and RTTs τ = +δ and τ 2 = k, k = 2, 3,.... If δ is sufficiently small, this system oscillates with a frequency near ω 2π δ/k +, as will now be shown.

7 Imaginary axis 3 2 T 2 = Tjω * τ 2 T +T 2 /2 /2+jk y ω * /kω * 2 T = Tjω * τ 3.5.5 Real axis Fig. 7. Values of T jωτ = / e jωτ for µ = µ 2 = /2, and τ =. ms, τ 2 = 2 ms, k = 2. The numerator of Ls is bounded below in magnitude by y ω /2ω 9, which is 4π times smaller than y ω, but much larger than the denominator, T + T 2 /2 = /2. Recall that the individual terms T jωτ i = /2 + jy i ω lie on the line {z C Rez = /2}, as does their convex combination in the denominator of 24. Each of these points moves vertically upwards as ω increases, at a rate depending on τ i, with all starting from /2 j at ω =. For δ < π/k, y ω is negative for ω 2π/ + δ, 2π and takes all values less than t 2π. Similarly, y 2 ω takes all values greater than y 2 2π/ + δ in that interval. Thus, for some ω, y ω + y 2 ω = making the denominator of Ls equal /2, as illustrated in Figure 7. However, since ω 2π, for δ << the numerator of 24 is approximately k + /2 + jk y ω jkω. Since y ω < y 2π as δ, the magnitude of Ls can be made arbitrarily large by taking δ small. Moreover, this large value occurs when Ls lies approximately on the negative real axis. This causes the Nyquist curve to encircle + j, and the system to be unstable. In contrast to the previous mode of instability, which was caused by the short-rtt flow over-reacting to congestion due to very heterogeneous RTTs, this new mode is caused by precise cancellations when the ratio of the RTTs is approximately rational. See [9] for a discussion of the importance of rational ratios of RTTs. Because of the s in the denominator of 24, the magnitude of the Nyquist curve tends to decrease as ω increases, and could be expected to encircle +j in its first loop around if at all. This was the source of the previous instability. This time the Nyquist curve encircles + j in the kth loop around, when the cancellation occurs. This corresponds to a frequency the reciprocal of the smaller RTT, rather than the larger. The following NS-2 simulation shows instability due to this mechanism. Example 2: Instability due to precisely matched RTTs Consider two FAST flows with γ = and α = 2 packets, sharing a bottleneck with c = 5 Mbit/s, with d = 94.4 ms and d 2 = 93.4 ms giving τ = ms and τ 2 = 2 ms. The Nyquist plot of Fig. 8 again predicts instability, and NS- 2 also exhibits oscillation. As well as the predicted peak at Hz, there is one at 5 Hz, because the implementation of Imaginary axis Pf.5.5 2.5.5.5 Real axis.5 x 3.5 2 Frequency Hz Queue size [pkts] CWND, src [pkts] 6 5 4 3 2 98 98.5 99 99.5 Time [sec] 328 326 324 322 32 98 98.5 99 99.5 Time [sec] Fig. 8. Unstable mode of FAST: τ = ms, τ 2 = 2 ms. Upper left: Nyquist plot of loop gain. Upper right: Bottleneck queue size. Lower left: Magnitude spectrum FFT of queue size, without DC component. Lower right: Window size, source. FAST freezes the window every alternate RTT, as seen in the bottom right hand figure, introducing severe nonlinearity. D. Sufficient conditions for stability With these two mechanisms which can cause instability for arbitrarily small gain γ, one might despair of finding any conditions under which 24 can be shown to be stable. However, it turns out that it is stable when there are many flows, or in the realistic case of networks with slight jitter. Let µ :, τ max ] R + { } be the distribution of RTTs, weighted by the rate of flows with each RTT; for finitely many flows, this is a sum of impulses weighted by the discrete µ i. Then sums weighted by µ i are replaced by integrals, using the shorthand M[fτ] := τmax fτµτ dτ. 34 Further, let sincθ = sinθ/θ. Define Hω as the half plane under the line that passes + j with its complex argument π 2 arg N n= µ nt sτ n. Formally, we have { Hω= x argx + π N } 2 + arg µ n T sτ n π,. Lemma 6. If n= 35 γm[sincωτ] < M[ cosωτ], 36 then for Ls defined by 24, Ljω Hω. 37 Proof: By definition, Ljω Hω is equivalent to N argljω + + arg µ i T sτ i π/2, π/2, 38 i=

8 Fig. 9. maximum γ 2.5.5 synchronization Heterogeneity 2 3 ωτ /2π Maximum γ for which 36 holds for τ = ms, τ 2 = 2 ms. or in other words, N γe N jωτi arg µ i T jωτ i + µ i T jωτ i π/2, π/2 jωτ i i i= which is equivalent to < Re M [T jωτ + γe jωτ jωτ [ = M ] cosωτ γ sinωτ ωτ ] γ sinωτ cosωτ ωτ Thus, 38 is satisfied if 36 holds. Remark: The techniques used here, analogous to those discussed in [24], yield significantly tighter bounds than those in existing linear stability analysis of TCP, which is necessary for the analysis of this problem with the accurate model. Figures 9 shows the maximum γ for which 36 holds truncated to 2. The frequencies at which instability occurred due to heterogeneity example and synchronization example 2 are cases where 36 only holds for very small γ. Small perturbations of τ cause the synchronization dips vanish, but for any distribution of τ, 36 is violated at low frequency, ω. The next lemma shows that Ljω cannot cross, ] in a low frequency region. Lemma 7. Let /ˆτ = /τµτ dτ, sinωτ sinωτ ˆτ ϕω = µτ dτ µτ dτ cosωτ cosωτ τ 39 and ω = max {ω : ω, ω, ϕω > }. 4 Then ω π/τ max and ImLjω < for all ω, ω. Proof: By 23, yωτ < yωτ max /2 for all ω, π/τ max ], and τ, τ max. Thus ϕω = 2yωτµτ dτ 2yωτ ˆτ µτ dτ τ ˆτ > µτ dτ µτ dτ τ = whence ω π/τ max. If K K 2 > Kr 2 then Re[ K r + jk ]/[K r + jk 2 ] >. Thus 4 implies that for all ω, ω, + j 2yωτˆτ/τµτ dτ < Re + j 2yωτµτ dτ /2 + jimjωτµτ dτ = ωˆτ Im jωτ /2 + jimjωτµτ dτ = ωˆτ ImLjω whence ImLjω < for all ω, ω. We can now show a sufficient condition on τ for FAST to be stable. It says that if there are many flows, with sufficiently uniformly spread RTTs, then FAST will be stable. Theorem 8. Let < a < τ, < h /2a and let δ < be such that δ > sincaπ/τ max. 4 Then for any distribution µτ :, τ max ] R + { } with µτ > h for all τ τ a, τ + a, and for any γ < 2ah δ, 42 the transfer function Ls given by 24 is stable. Proof: It is sufficient to show that the Nyquist curve does not intersect, ]. By Lemma 7, this does not happen for ω < π/τ max. Since, ] Hω =, it remains by Lemma 6 to show 36 holds for all ω π/τ max. Since cosωτ, M[ cosωτ] h τ+a τ a cosωτ dτ = 2ah cosωτ sincωa. 43 Similarly sincθ and hence M[sincωτ]. Since aπ/τ max < π/2, and sincθ < sincπ/2 for θ > π/2, it follows that sincωa δ for all ω ω π/τ max. Combining this with 36, 43 and cosωτ shows that 42 implies Ls is stable. Note that condition 42 is only a sufficient condition, and is loose for very peaked distributions µ. Typically M[sincωτ] << for ω with cosωτ and vice versa. V. CONCLUSION We have studied window flow control, the dominant congestion control mechanism in the current Internet, with a new model that includes sub-rtt burstiness. This microscopic burstiness was shown to have notable effects on macroscopic properties including steady state bandwidth allocation and flow level stability. For loss based protocols, we analytically showed that paced and unpaced TCP flows, following the same window update rule, have different steady state throughputs. For delay based protocols, new modes of instability were identified, and it was shown that the model is tractable enough to find regions of stability of practical importance. These results, ranging from equilibrium to dynamics, bridge the gap between existing large bodies of work on fluid models and microscopic studies. There are several exciting directions in which to extend this work. For example, the number of flows is assumed to be fixed

9 and it would be very interesting to see the effect of the new model on networks with dynamically arriving and departing flows [3]. Also, the analysis remains to be extended to general networks which can potentially have multiple congested links, on which we are optimistic as the model itself extends to general networks naturally as shown in a companion paper [9]. ACKNOWLEDGMENTS The authors thank David Wei, whose Ph.D. thesis triggered this study, for discussions and the NS-2 data in Figure 2. This material is based upon work supported by the National Science Foundation under Grant No. CNS-3362, the WAN-in-Lab project. A. Proof of Lemma 2 d dr Proof: Letting u = /r, r D r = r VI. APPENDIX r D + D D r r = + D u u D. By Taylor s theorem, for all u > there is a ν > such that whence giving the result. u D = + D u + > + D u u D B. Sufficient conditions for instability DD ν 2 Lemma 4 follows from the following four lemmas. Lemma 9. Let ω = 2π/τ + τ 2. Then 25 satisfies ImLjω >. 44 Proof: Let ɛ = ω τ. Since ω τ 2 = 2π ω τ, cosω τ 2 = cosɛ and sinω τ 2 = sinɛ, giving Ljω = L λ cosɛ j sinɛ = cosɛ j sinɛ/2 2 cosɛ jɛ cosɛ + j sinɛ + cosɛ + j sinɛ/2 2 cosɛ j2π ɛ cosɛ j sinɛ = = j 2 jɛ + j2π ɛ ɛ + 2π ɛ 2 2 cosɛ ɛ 2π ɛ jɛ j2π ɛ Since < ɛ < 2π, the imaginary part is positive. Lemma. Let β = 2πλ 3. For λ < /2π 2, sinɛ 2 2 cosɛ. ImL λ β <. 45 Proof: Let ω be the solution of 26. Note that ωτ < 2πλ and β < ωτ. If L λ β can be expressed as γ N r + jn i D r + jd i 46 with N r <, N i >, D r > and D i <, then the lemma follows provided that N i /N r < D i /D r, or equivalently N r D i N i D r >. 47 Let the numerator of 28 be N r + jn i with N r, N i R. Then, using θ θ 3 /6 sinθ θ and cosθ θ 2 /2, we have N r = + sinjβ ωτ 2π ωτ β sinωτ + sinωτ + β jωτ 2π ωτ β + + ωτ 2 ωτ + β + 6 2π 2ωτ + 2πλ2 6 + + 22πλ 2π 22πλ 62π 2 + 2 2π 2 2 / <. N r / <. Moreover, using cosx x 2 /2 and ωτ < 2πλ < /2π, we have < N i cosωτ + cosωτ + β ωτ 2π ωτ β ωτ 2 + 2ωτ 2 /2 2π 2ωτ πλ + 4λ 2λ /π 2 πλ + /2π 2 λ/3. 48 Let the denominator of 28 be D r +jd i with D r, D i R. Then, using cosx x 2 /2, β = 2πλ 3 λ and ωτ 2πλ /2π, we have < D r = 2 cosωτ cosωτ + β ωτ 2 + ωτ + β 2 2 2 = ωτ 2 + βωτ + β/2 2πλ 2 + 2πλ 3 3πλ λ 2 2π 2 + 3/2λ 2 /2π 4 λ 2 2π 2 + 3/2. 49 Moreover, using cosx < x 2 /2, sinx < x, β < 2πλ and ωτ < 2πλ /2π, we have D i = sinωτ sinωτ cosβ cosωτ sinβ ωτ β 2 /2 ωτ 2 /2β β + β + ωτ ωτ /2 β + 2πλ 2 2πλ 3 + /2π 2 <. 5 Given the signs of the foregoing, N r D i N i D r / 2πλ 3 /2π 2 λ/3 λ 2 2π 2 > + 3/2

as required. Lemma. Let β = 2πλ 3 and ω = 2π/τ + τ 2. For all ω [ω β/τ, ω ], 25 satisfies Ljω γ 4λ 2. 5 Proof: Let N s = e sτ sτ e sτ2 N 2 s = e sτ2 sτ 2 e sτ Ds = 2 e sτ2 e sτ and η = ω ω [, β/τ ]. By 25, Ljω γ N jω N 2 jω / Ds. Using cosθ = cos2π θ, 2π ω τ 2 ητ 2 = ω τ +ητ 2, cosθ θ 2 /2 and sinθ sinθ 2 θ θ 2 gives Djω η = 2 cosω τ ητ cosω τ 2 ητ 2 +jsinω τ ητ sinω τ + ητ 2 ω τ ητ 2 + ω τ + ητ 2 2 + jητ + τ 2 2. Further using x+jy x + y, λ < τ /τ 2 <, ω τ = 2πλ and η 2πλ 3 /τ gives Djω η ω + ητ 2 2 + ητ + τ 2 2πλ + 2πλ 3 τ 2 /τ 2 + 2π2πλ 2 λ 2 2π 2 4 + 2π 46λ 2. 52 Similarly, since sinθ = sin2π θ and sinω τ +ητ 2 > sinω τ ητ for < ω τ ητ < ω τ + ητ 2 < π/2, N jω η = cosω τ + ητ 2 j sinω τ + ητ 2 ω τ ητ sinω τ + ητ 2 / ω τ ητ ω τ ητ 2 /6 2πλ 2 /6 /62π 2.995. 53 Moreover, using cosx x 2 /2, sinx x, λ = ω τ /2π < /2π 2 and η 2πλ 3 /τ, N 2 jω η = cosω τ ω ητ j sinω τ ω ητ ω τ 2 ητ 2 ω τ ω ητ 2 /2 jω τ ω ητ ω τ 2 ητ 2 2πλ + 2πλ3 2 /2 j2πλ + 2πλ 3 2π λ 2π 3 λ 2 λ /2π + /2π3 2 /2 j/2π + /2π 3 2π /2π 2 /2π.4. 54 Combining 52, 53 and 54 gives Ljω η.99γ 46λ 2 γ 4λ 2. 55 Lemma 2. For all ω >, the Ls of 24 satisfies d argljω. 56 dω Proof: As ω increases, the numerator and denominator of 24 are piecewise continuous, with simultaneous jump discontinuities and singularities at ω = 2kπ/τ i for k =, 2,.... Except for ω =, these singularities are removable, and Ljω is continuous, with the case N = 2 given by 25. Thus it suffices to show that argljω is decreasing where the denominator is continuous. Substituting 23 into 24, gives Ls = γ jω N n= µ n/τ n jyωτ n /2 N n= µ. njyωτ n + /2 As ω increases, yωτ n increases, except at the singularities. Since the numerator is in the left half plane, its argument decreases, while the denominator is in the left half plane, and its argument increases. REFERENCES [] A. Aggarwal, S. Savage and T. Anderson. Understanding the performance of TCP pacing. In Proc. IEEE Infocom, 2. [2] F. Baccelli and D. Hong. AIMD, fairness, and fractal scaling of TCP Traffic. In Proc. IEEE Infocom, 22. [3] T. Bonald and L. Massoulie. Impact of fairness on Internet performance. In Proc. ACM SIGMETRICS, Jun. 2. [4] L. S. Brakmo and L. L. Peterson. TCP Vegas: End-to-end congestion avoidance on a global Internet. IEEE J. Select. Areas Commun., 38:465 48, 995. [5] S. Floyd and V. Jacobson. On traffic phase effects in packet-switched gateways. Internetworking: Research and Experience, 33:5-56, Sep. 992. [6] S. Floyd and V. Jacobson. Random early detection gateways for congestion avoidance. IEEE/ACM Trans. Networking, 4:397 43, Aug. 993. [7] M. Gerla and L. Kleinrock. Flow control: A Comparative survey. IEEE Trans. Comm., 284:553 574, Apr. 98. [8] V. Jacobson. Congestion avoidance and control. In Proc. ACM SIGCOMM, 988. [9] K. Jacobsson, L. L. H. Andrew, A. Tang, K. Johansson, H. Hjalmarsson and S. H. Low. ACK-clocking dynamics: Modeling the interaction between windows and the network. [online] Available http:// netlab.caltech.edu/ lachlan/abstracts/ackclocktr.pdf. [] R. Jain. Congestion control in computer networks: Issues and trends. IEEE Network Magazine, 43:24 3, May 99. [] H. Jiang and C. Dovrolis Why is the Internet traffic bursty in short time scales. In Proc. ACM SIGMETRICS, 25. [2] F. Kelly, A. Maulloo, and D. Tan. Rate control for communication networks: Shadow prices, proportional fairness and stability. J. Op. Res. Soc., 493:237 252, Mar. 998. [3] J. Kulik, R. Coulter, D. Rockwell and C. Partridge. Paced TCP for High Delay-Bandwidth Networks. In Proc. IEEE GLOBECOM, 999. [4] S. Kunniyur and R. Srikant. End-to-end congestion control: Utility functions, random losses and ECN marks. IEEE/ACM Trans. Networking, 5:689 72, Oct. 23. [5] G. S. Lee, L. L. H. Andrew, A. Tang and S. H. Low. WAN-in-Lab: Motivation, deployment and experiments. In Proc. PFLDnet, pp 85-9, Marina Del Rey, CA, 27. [6] D.J. Leith and R. Shorten. Impact of drop synchronisation on TCP fairness in high bandwidth-delay product networks. In Proc. PFLDnet, Nara, Japan, 26.

[7] S. Liu, T. Basar and R. Srikant. TCP-Illinois: A loss and delay-based congestion control algorithm for high-speed networks. In Proc. First Int. Conf. on Perform. Eval. Methodol. Tools VALUETOOLS, 26. [8] S. H. Low and D. Lapsley. Optimization flow control, I: Basic algorithm and convergence. IEEE/ACM Trans. Networking, 76:86 874, Dec. 999. [9] J. Mo, R. La, V. Anantharam, and J. Walrand. Analysis and comparison of TCP Reno and TCP Vegas. in Proc. IEEE INFOCOM, 999. [2] J. Mo and J. Walrand. Fair end-to-end window-based congestion control. IEEE/ACM Trans. Networking, 85:556 567, Oct. 2. [2] I. Rhee and L. Xu Limitations of equation-based congestion control. in Proc. ACM SIGCOMM, 25. [22] F. Paganini, Z. Wang, J. C. Doyle and S. H. Low. Congestion control for high performance, stability, and fairness in general networks IEEE/ACM Trans. Networking, 3:43-56, Feb. 25. [23] R. N. Shorten, F. Wirth, D. J. Leith. A positive systems model of TCP-like congestion control: Asymptotic results. IEEE/ACM Trans. Networking, 43:66-629, June 26. [24] A. Tang, K. Jacobsson, L. L. H. Andrew and S. H. Low An accurate link model and its application to stability analysis of FAST TCP. in Proc. IEEE INFOCOM, 27. [25] A. Tang, J. Wang, and S. H. Low. Counter-intuitive throughput behaviors in networks under end-to-end control. IEEE/ACM Trans. Networking, 42:355 368, Apr. 26. [26] A. Tang, J. Wang, S. H. Low, and M. Chiang. Equilibrium of heterogeneous congestion control: Existence and uniqueness. To appear in IEEE/ACM Trans. Networking, Oct. 27. [27] Z. Wang and J. Crowcroft. Eliminating periodic packet losses in the 4.3-Tahoe BSD TCP congestion control algorithm. ACM SIGCOMM Comp. Commun. Rev., 222:9 6, Apr. 992. [28] M. Vojnovic and J. Boudec. On the long-run behavior of equation-based rate control IEEE/ACM Trans. Networking, 33:568 58, June. 25. [29] D. Wei. Microscopic Behavior of Internet Congestion Control. Ph.D. Thesis, California Institute of Technology, 27. [3] D. Wei, C. Jin, S. H. Low, and S. Hegde. FAST TCP: motivation, architecture, algorithms, performance. IEEE/ACM Trans. Networking, vol. 4, No. 6, pp. 246-259, December 26.