Markovian Model of Internetworking Flow Control

Similar documents
Analysis of Scalable TCP in the presence of Markovian Losses

Analytic Performance Evaluation of the RED Algorithm

Compound TCP with Random Losses

Compound TCP with Random Losses

A Stochastic Model for TCP with Stationary Random Losses

TCP over Cognitive Radio Channels

Theoretical Analysis of Performances of TCP/IP Congestion Control Algorithm with Different Distances

TCP modeling in the presence of nonlinear window growth

communication networks

A Mathematical Model of the Skype VoIP Congestion Control Algorithm

Modelling TCP with a Discrete Time Markov Chain

Impact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis

Reliable Data Transport: Sliding Windows

A Stochastic Model of TCP/IP with Stationary Random Losses

cs/ee/ids 143 Communication Networks

An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1

Methodology for Computer Science Research Lecture 4: Mathematical Modeling

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min

Boundedness of AIMD/RED System with Time Delays

Window Flow Control Systems with Random Service

Modeling Impact of Delay Spikes on TCP Performance on a Low Bandwidth Link

Analysis of TCP Westwood+ in high speed networks

OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION

Performance Modeling of TCP/AQM with Generalized AIMD under Intermediate Buffer Sizes

Modelling an Isolated Compound TCP Connection

Wireless Internet Exercises

Capturing Network Traffic Dynamics Small Scales. Rolf Riedi

Stochastic Hybrid Systems: Applications to Communication Networks

Stochastic process. X, a series of random variables indexed by t

Chapter 2 SOME ANALYTICAL TOOLS USED IN THE THESIS

IN THIS PAPER, we describe a design oriented modelling

Window Size. Window Size. Window Size. Time. Time. Time

PIQI-RCP: Design and Analysis of Rate-Based Explicit Congestion Control

Analysis of two competing TCP/IP connections

Bayesian Congestion Control over a Markovian Network Bandwidth Process: A multiperiod Newsvendor Problem

Stability Analysis of TCP/RED Communication Algorithms

384Y Project June 5, Stability of Congestion Control Algorithms Using Control Theory with an application to XCP

On the Resource Utilization and Traffic Distribution of Multipath Transmission Control

Positive Harris Recurrence and Diffusion Scale Analysis of a Push Pull Queueing Network. Haifa Statistics Seminar May 5, 2008

Controlo Switched Systems: Mixing Logic with Differential Equations. João P. Hespanha. University of California at Santa Barbara.

Introduction to Markov Chains, Queuing Theory, and Network Performance

TCP-friendly SIMD Congestion Control and Its Convergence Behavior

Link Models for Circuit Switching

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods

Stability Analysis of TCP/RED Communication Algorithms

Models and Techniques for Network Tomography

One-Parameter Processes, Usually Functions of Time

Queueing Theory and Simulation. Introduction

Concise Paper: Deconstructing MPTCP Performance

Performance de Compound TCP en présence de pertes aléatoires

CSE 123: Computer Networks

On the Resource Utilization and Traffic Distribution of Multipath. Transmission Control

Internet Congestion Control: Equilibrium and Dynamics

Robustness of Real and Virtual Queue based Active Queue Management Schemes

Introduction to queuing theory

Continuous-time hidden Markov models for network performance evaluation

TCP is Competitive Against a Limited AdversaryThis research was supported in part by grants from NSERC and CITO.

Information in Aloha Networks

Performance Evaluation of Queuing Systems

A positive systems model of TCP-like congestion control: Asymptotic results

18.175: Lecture 30 Markov chains

Recap. Probability, stochastic processes, Markov chains. ELEC-C7210 Modeling and analysis of communication networks

Computer Systems Modelling

Switched Systems: Mixing Logic with Differential Equations

Analysis of Rate-distortion Functions and Congestion Control in Scalable Internet Video Streaming

TWO PROBLEMS IN NETWORK PROBING

IN today s high speed telecommunication networks, a large

Homework 4 due on Thursday, December 15 at 5 PM (hard deadline).

Performance of Round Robin Policies for Dynamic Multichannel Access

Rate adaptation, Congestion Control and Fairness: A Tutorial. JEAN-YVES LE BOUDEC Ecole Polytechnique Fédérale de Lausanne (EPFL)

GI/M/1 and GI/M/m queuing systems

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers

Dynamic resource sharing

A flow-based model for Internet backbone traffic

Extended Analysis of Binary Adjustment Algorithms

Processor Sharing Flows in the Internet

Stochastic Processes. Theory for Applications. Robert G. Gallager CAMBRIDGE UNIVERSITY PRESS

AIMD, Fairness and Fractal Scaling of TCP Traffic

Stochastic Hybrid Systems: Applications to Communication Networks

LIMITS FOR QUEUES AS THE WAITING ROOM GROWS. Bell Communications Research AT&T Bell Laboratories Red Bank, NJ Murray Hill, NJ 07974

arxiv: v2 [math.pr] 4 Sep 2017

Congestion Control. Topics

Queueing Theory. VK Room: M Last updated: October 17, 2013.

CHAPTER 3 MATHEMATICAL AND SIMULATION TOOLS FOR MANET ANALYSIS

Introduction to Queueing Theory

1 Introduction. 2 Diffusion equation and central limit theorem. The content of these notes is also covered by chapter 3 section B of [1].

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Singular perturbation analysis of an additive increase multiplicative decrease control algorithm under time-varying buffering delays.

A New TCP/AQM System Analysis

Bayesian Congestion Control over a Markovian Network Bandwidth Process

Multi-Armed Bandit: Learning in Dynamic Systems with Unknown Models

An M/M/1 Queue in Random Environment with Disasters

Analysis of TCP-AQM Interaction via Periodic Optimization and Linear Programming: The Case of Sigmoidal Utility Function

Lecturer: Olga Galinina

jwperiod. font=small,labelsep=jwperiod,justification=justified,singlelinecheck=false

Stochastic Hybrid Systems: Modeling, analysis, and applications to networks and biology

DISCRETE STOCHASTIC PROCESSES Draft of 2nd Edition

Mathematics, Box F, Brown University, Providence RI 02912, Web site:

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

Transcription:

Информационные процессы, Том 2, 2, 2002, стр. 149 154. c 2002 Bogoiavlenskaia. KALASHNIKOV MEMORIAL SEMINAR Markovian Model of Internetworking Flow Control O. Bogoiavlenskaia Petrozavodsk State University Lenin St., 33, Petrozavodsk, 185640, Russia email: olbgvl@cs.karelia.ru Received October 14, 2002 1. GENERAL OVERVIEW The Internet transport layer presently plays a key role in the internetworking traffic control. The transport layer protocols form the network connections behavior at the end-to-end level. Therefore, the transport layer provides a decisive contribution in internetworking reliability, stability and performance. The family of transport layer protocols presently use a wide selection of flow and congestion control algorithms. Nevertheless, the Additive Increase Multiplicative Decrease (AIMD) algorithm plays a key role among them. We investigate a throughput provided by the AIMD algorithm. Our evaluation comes from a sender s point of view to understand the rate that a sender injects segments to the network under AIMD control. As a result of our investigation, we have developed a Markovian model of AIMD sliding window size, cwnd, and throughput, T CA. Our new model yields new important results concerning AIMD behavior. We obtained the steady state distributions of the AIMD cwnd and T CA. This provides complete information of AIMD behavior in a particular networking environment. Several recent publications (the most highly referenced among them are [1], [2]) present estimations of T CA expectation or its bounds. All of them have restrictions on their applicability that will vary depending on the properties of the networking environment. Our model can establish bounds for using of algebraic estimations. Our model incorporates the probabilistic nature of the networking environment. It provides a new, powerful tool for planning and designing of the AIMD based transport layer, including issues of QoS. Our approach relaxes several important restrictions accepted in most of analytical AIMD models. Round trip time (RTT) is considered to be a random variable described by its distribution function. The model of cwnd size and throughput never exceeds their natural limits, which are parameters of the model. The model is valid for high and low bandwidth links, since it does not use round modeling (see details in [2]). RTT and segment loss probability may (or may not) depend on the congestion window size. This features make the approach highly flexible and applicable to a wide range of networking environments. All results, including the distributions mentioned above, are obtained in explicit analytical form. We have developed an algorithm that optimizes calculation of the cwnd distribution and computes it with linear complexity. Our analytical results are validated by using observations of experimental connections in an emulated network environment. In addition, we compare our model with other models of AIMD [1,2]. T CA expectation provided by the model demonstrates high stability and good agreement with the experimental data.

150 Bogoiavlenskaia 2. MODELING ASSUMPTIONS We only consider the AIMD portion of transport layer flow control. That is, the cwnd increases by one segment per RTT if no segment is lost. When the loss of a segment is detected at the sender, then cwnd is reduced by one-half. Segment losses occur according to a segment loss pattern. The segment loss pattern is defined by the distribution of the number of segments sent in succession between two consequent loss indications. Our assumptions allow any memoryless segment loss pattern. For example, the Bernoulli scheme (or Bernoulli segment loss pattern) is memoryless. We also include in our model the sender s link capacity as a parameter. Since the configuration of the end-to-end path as well as the capacity available to the connection are assigned randomly, they are difficult to be predicted. Throughput cannot be higher than the sender s link capacity, which is a natural limit. This is a very rough estimation. If one can derive the bottleneck capacity of the end-to-end path, then it may replace the sender s link capacity. The maximal window size is restricted by some given value. It may be the receiver advertised window size (rwin) or any other restriction, as well. From this set of assumptions we derive the distribution of cwnd and AIMD throughput as functions of the segment loss pattern, the RTT distribution function, the maximal window size and the sender s link capacity. There are several restrictions accepted in most T CA models that are not included in our model. The most important one is round modeling [1, 2] since it affects the limiting behavior of the resulting formulae (i.e., the T CA thus computed tends to infinity for small loss probabilities even for a deterministic segment loss pattern). This means that under round model protocol sends one window during one RTT. Let us suppose that each RTT is equal to a time unit. If there is no loses cwnd increases by 1 each round. If it starts from cwnd = 1 then during n rounds protocol sends 1 + 2 + + n = 1 2 ( n 2 + n ) segments. Thus the number of data sent becomes a quadratic function of time if there is no upper limits of cwnd and throughput. This relation requires infinite network capacity. Actual number of data sent must be linear or smaller then some linear function of time. 3. THE MODEL Let us consider the pair ξ = (w, n), where w is a current cwnd size and n is the number of the segments sent under this cwnd. For each w, n = 1,..., w. Let us denote w(t) and n(t) the values that define ξ at the moment t > 0. Then according to our assumptions ν(t) = {(w(t), n(t))} t>0 is a semi-markov random process (SMP). Let τ i be the time when ith segment is sent. The segments are numbered according to the following rule: i 1 > i 2 if τ i1 > τ i2. Then sequence ξ(τ 0 ), ξ(τ 1 ),..., ξ(τ n ),... forms a Markov chain embedded in the process ν(t). The space of states of the chain {ξ i } = ξ(τ i ) is finite. Let us denote the space X. We also denote p k ξη the probability of the transition from state ξ into state η by k steps for any ξ, η X. Since set X is finite then p k ξη π η k and π ξ = 1. ξ X Let P ξ (t) denote the probability of ν(t) = ξ and α ξ be the expectation of the segments inter-departure time. The following theorem takes place.

MARKOVIAN MODEL OF INTERNETWORKING FLOW CONTROL 151 Theorem 1. If RTT has a finite expectation, then P ξ (t) α ξ π ξ. (1) α ξ π ξ ξ X The proof is based on the Smith renewal theorem. Values π ξ obviously are solution of the Kolmogorov equations for the Markov chain {ξ i }. The equations are complicated. Therefore, we consider the time moments when the sender assigns the new cwnd. Thus, the chosen sequence of cwnd sizes ξ also forms a Markov chain. The chain {ξ i } is embedded in the chain {ξ i}. The solution of the Kolmogorov equations for the chain {ξ i } gives us the distribution π ξ for all pairs ξ = (w, 1), i.e. π ξ = π w. The following theorem on π w takes place. Theorem 2. The distribution π w satisfies following relations where π i = π j K i, K wmax = F w max 1 1 f wmax, (2) and K i = F i 1, j < i < w max, (3) K i 1 = 1 f i 1 (K i (K 2i (1 f 2i ) + K 2i+1 (1 f 2i+1 ))) i < j. (4) Here j = wmax 2, f wmax and F wmax are functions of segment loss probability. This recurrent presentation for the distribution π w is the base for the numerical algorithm we have developed. It optimizes calculation of π w and π ξ. The algorithm has a linear complexity. The values α ξ are estimated using normal distribution according to the central limit theorem. Note that random process µ(t) = {w(t)} t>0 also is SMP, and ξ i is a Markov chain embedded in it. Let U w be the duration of the round. Then { RT T, if wt0 < RT T U w = wt 0, otherwise (5) Let us denote β w the expectation of U w. Also let P w (t) be the probability of µ(t) = w. Then the following theorem on the SMP µ(t) takes place. Theorem 3. If RTT has a finite expectation, then P w (t) β w π w. (6) β w π w w max w=2 Let us denote p w,n = p ξ = lim P ξ (t). The distribution of the AIMD window size is Obviously, ω w = lim P w (t). ω i = i p i,n (7) n=1

152 Bogoiavlenskaia Let t 0 be the time that the sender needs to inject one segment to the network. T CA depends on the relation between wt 0 and RTT. If wt 0 > RT T then T CA is equal to the sender s link capacity. If wt 0 RT T then T CA is T = w/rt T. Let us consider the second case in detail. We denote R w (x) as the distribution function of RTT (RTT depends on cwnd). Since T = w/rt T, we must consider all those w and RTT such that their relation gives T 0 and sum their joint probabilities to calculate the probability of T CA at the particular value. Therefore the throughput distribution function is defined as T (x) = w max i=2 ( ( )) i ω i 1 R w = (8) x w max 1 i=2 ω i R w ( i x Formula (8) is true if x < L, where L = 1/t 0 is the sender s link capacity and T (L) = 1. 4. NUMERICAL EXAMPLES. Several numerical examples here demonstrate the scope of the model. Figure 1 presents the cwnd frequencies for receiver advertised window w max = 120 segments and segment loss probability p. The frequencies are obtained using the algorithm based on the Theorem 2. ). Figure 1. Frequencies of the congestion window sizes. The figure demonstrates three basic types of the cwnd behavior. For small values of p, cwnd is likely to reach w max and stay there for a long time. This creates a peak at w max. If a segment is lost at cwnd=w max, then cwnd is halved and this creates another smaller peak of the distribution at w max /2. With larger values of p, cwnd demonstrates unstable behavior and fluctuates around a large range of sizes. Therefore the distribution loses its maximum (local or global) at w max. Figure 2 shows the T CA expectation for receiver advertised window w max = 70 with different sender s link capacities. Note that for p > 0.03, rwin (parameter w max ) does not significantly affect T CA since large windows are never reached. The presented model of T CA never exceeds the given link capacity. Our results show whether T CA utilizes the link capacity for the given combination of w max and RTT distribution. The deviation of T CA plays a significant role as it shows the stability of a connection and may be crucial for its performance. Figure 3 presents standard deviation of T CA as a function of the segment loss probability. It has a maximum between p = 0 and p = 0.05. Obviously the standard deviation of cwnd must be zero

MARKOVIAN MODEL OF INTERNETWORKING FLOW CONTROL 153 for p 1 and p = 0 and it is nonzero between these two points. Therefore, it has at least one maximum as a function of the segment loss probability. The maximum corresponds to the case of cwnd fluctuating around a wide range of values. The standard deviation of T CA in many cases inherits this property. Our model provides not only qualitative but quantitative analysis, as well. Figure 3 demonstrates how does RTT deviation affect T CA deviation. Figure 2. Expectation of T CA for different sender s link capacities. w max = 70 segments Figure 3. Standard deviation of T CA for different RTT standard deviation. w max = 30 segments, sender s link capacity 300 segs/s Table 1 provides comparison between estimation of T CA expectation presented in [1] (FF) and our model. ET in the table marks values of T CA expectation defined by distribution (8). The table contains T CA expectation values for receiver advertised window sizes 10, 40 and 80 segments and maximum link capacity 115 segs/sec. RTT satisfies normal pdf. Estimation FF grows unrestrictedly while segment loss probability tends to zero. It exceeds link capacity if segment loss probability is smaller than 0.0001. Hence in the case the maximal capacity is better estimation than FF. 5. ACKNOWLEDGMENTS I express my gratitude to Prof. T. Alanko, Prof. M. Mutka, M. Kojo and P. Salorahti for fruitful multiple discussions and friendly cooperation.

154 Bogoiavlenskaia p FF ET, w max=10 ET, w max=40 ET, w max=80 0.9 1.90 3.72 3.72 3.72 0.5 2.55 3.73 3.73 3.73 0.1 5.70 7.21 7.22 7.22 0.05 8.07 9.99 10.33 10.33 0.01 18.04 14.79 24.01 24.01 5 10 3 25.51 15.56 34.06 34.31 10 3 57.04 16.17 55.49 71.50 5 10 4 80.67 16.26 59.60 87.55 10 4 180.38 16.33 63.00 103.79 10 5 570.41 16.34 63.76 107.46 10 6 1804.00 16.34 63.84 107.76 10 7 5704.00 16.34 63.85 107.79 10 8 18040.00 16.34 63.85 107.80 Table 1. Models comparison (Absolute values). Link rate is 115 segs/sec. Values exceeding the bandwidth capacity are marked by bold font. REFERENCES 1. Floyd S., Fall F. Promoting the use of end-to-end congestion control in the Internet. IEEE/ACM Transactions on Networking, 1999, 7(4), pp. 458-472. 2. Padhey J., Firoiu V., Towsley D., Kurose J. Modeling TCP Throughput: A Simple Model and its Empirical Validation, IEEE/ACM Transactions on Networking 2001, 8(2), pp. 133-145.