SlideShare une entreprise Scribd logo
1  sur  95
Queue Management


3 October 2008   NUS CS5229, Semester 1 2008/09   1
Not all flows are
         congestion controlled


3 October 2008   NUS CS5229, Semester 1 2008/09   2
1.          Don’t need reliability, so
                 use UDP, which has no
                 congestion control


3 October 2008        NUS CS5229, Semester 1 2008/09   3
2.          No incentive to limit
                 own sending rate



3 October 2008       NUS CS5229, Semester 1 2008/09   4
Sally Floyd and Kevin Fall
      “Promoting End-to-End
      Congestion Control in
          the Internet”
           TON, 1999

3 October 2008     NUS CS5229, Semester 1 2008/09   5
What mechanisms can we
      add to the router to provide
        incentives for congestion
                 control?


3 October 2008   NUS CS5229, Semester 1 2008/09   6
Idea: Identify unresponsive flows,
   then drop their packets or
       regulate their rate.


3 October 2008   NUS CS5229, Semester 1 2008/09   7
Note: Not scalable to large
           number of flows
         (eg in core routers).


3 October 2008   NUS CS5229, Semester 1 2008/09   8
How to identify
                 unresponsive flows in a
                        router?


3 October 2008        NUS CS5229, Semester 1 2008/09   9
Approach 1:
         Use TCP Throughput
              Equation


3 October 2008   NUS CS5229, Semester 1 2008/09   10
The paper uses a rough approximation




3 October 2008   NUS CS5229, Semester 1 2008/09   11
MSS: Maximum packet size in bytes
          over all outgoing links
     p:   Packet drop rates over all
          outgoing links
     RTT: Twice the 1-way propagation
          delay of outgoing links
3 October 2008   NUS CS5229, Semester 1 2008/09   12
The expression will overestimate
     the fair throughput for TCP.

     Thus, not all unfriendly flows will
     be identified.

3 October 2008   NUS CS5229, Semester 1 2008/09   13
Approach 2:
            Unresponsive Flows



3 October 2008   NUS CS5229, Semester 1 2008/09   14
Does the packet arrival rate of a
 flow reduce appropriately when
   packet drop rate increase?


3 October 2008   NUS CS5229, Semester 1 2008/09   15
If packet drop rate increases by
      x%, then packet arrival rate
      should decrease by sqrt(x)%


3 October 2008   NUS CS5229, Semester 1 2008/09   16
Does Not Work:
when packet drop rate is constant



3 October 2008   NUS CS5229, Semester 1 2008/09   17
Does Not Work:
       packet might be dropped by
              earlier router


3 October 2008   NUS CS5229, Semester 1 2008/09   18
Does Not Work:
   A flow has an incentive to start
       with high throughput


3 October 2008   NUS CS5229, Semester 1 2008/09   19
Approach 3:
                    Flows with
                 Disproportionate
                    Bandwidth

3 October 2008       NUS CS5229, Semester 1 2008/09   20
A flow should share 1/n of
             total bandwidth



3 October 2008   NUS CS5229, Semester 1 2008/09   21
When congestion is low
           (packet drop rate is low),
               skewness is OK.


3 October 2008    NUS CS5229, Semester 1 2008/09   22
Condition 1: If a flow’s
  bandwidth is more than ln(3n)/n
  of the aggregate, then it is using
      disproportionate share.

                 (ln(3n)/n : magic)
3 October 2008      NUS CS5229, Semester 1 2008/09   23
Condition 2: If a flow’s
           bandwidth is more than



     For MSS=512 and RTT=0.05s
3 October 2008   NUS CS5229, Semester 1 2008/09   24
If a flow’s bandwidth is more
    than ln(3n)/n of the aggregate
   flow bandwidth, then it is using
        disproportionate share.

                 (ln(3n)/n : magic)
3 October 2008      NUS CS5229, Semester 1 2008/09   25
Does Not Work:
    flows with short RTT will be
   considered as disproportionate


3 October 2008   NUS CS5229, Semester 1 2008/09   26
Does Not Work:
    the only flow with sustained
     demand (long live) will be
  considered as disproportionate.


3 October 2008   NUS CS5229, Semester 1 2008/09   27
Sally Floyd and Van Jacobson
         “Random Early
      Detection Gateway for
      Congestion Avoidance”
           TON, 1993
3 October 2008   NUS CS5229, Semester 1 2008/09   28
Router’s
             Queue Management


3 October 2008   NUS CS5229, Semester 1 2008/09   29
Manages sharing of
                  (i) buffer space
                   (ii) bandwidth

3 October 2008       NUS CS5229, Semester 1 2008/09   30
Q1: Which packet to drop
     when queue is full?


3 October 2008   NUS CS5229, Semester 1 2008/09   31
Q2: Which packet to send
           next?


3 October 2008   NUS CS5229, Semester 1 2008/09   32
FIFO + Drop Tail


3 October 2008   NUS CS5229, Semester 1 2008/09   33
Keep a single queue


3 October 2008    NUS CS5229, Semester 1 2008/09   34
Drop what?
          Drop arriving packets
           when queue is full

3 October 2008   NUS CS5229, Semester 1 2008/09   35
Send what?
                 Send the packet at
                   head of queue

3 October 2008       NUS CS5229, Semester 1 2008/09   36
Round Robin


3 October 2008     NUS CS5229, Semester 1 2008/09   37
One queue per flow


3 October 2008   NUS CS5229, Semester 1 2008/09   38
Drop what?
 Drop arriving packets from
 flow i when queue i is full

3 October 2008   NUS CS5229, Semester 1 2008/09   39
Send what?
   Each flow takes turn --
send the packet at the head
  of the queues in a round
       robin manner.
3 October 2008   NUS CS5229, Semester 1 2008/09   40
Advantages of
                 FIFO and Drop Tail


3 October 2008       NUS CS5229, Semester 1 2008/09   41
Simple to implement


3 October 2008   NUS CS5229, Semester 1 2008/09   42
Scale well
  (no per-connection states)


3 October 2008   NUS CS5229, Semester 1 2008/09   43
Reduce delay for a bursty
          connection
          (e.g. VoIP)

3 October 2008   NUS CS5229, Semester 1 2008/09   44
Problems with
                 FIFO and Drop Tail


3 October 2008       NUS CS5229, Semester 1 2008/09   45
Problem 1
     Bias against bursty traffic

    burstiness increases chances that the
            queue will overflow

3 October 2008   NUS CS5229, Semester 1 2008/09   46
Problem 2
        Global synchronization

      connections reduce their windows
      simultaneously, lowering utilization.

3 October 2008   NUS CS5229, Semester 1 2008/09   47
Problem 3
                 Queue size

       higher bandwidth needs longer
    queue, increasing delay. TCP tries to
             keep the queue full

3 October 2008    NUS CS5229, Semester 1 2008/09   48
Problem 4
             No isolation against
             unresponsive flows

3 October 2008    NUS CS5229, Semester 1 2008/09   49
Random Drop


3 October 2008     NUS CS5229, Semester 1 2008/09   50
Keep a single queue


3 October 2008    NUS CS5229, Semester 1 2008/09   51
Drop what?
Drop random packet in the
 queue when queue is full

3 October 2008   NUS CS5229, Semester 1 2008/09   52
Send what?
                 Send the packet at
                   head of queue

3 October 2008       NUS CS5229, Semester 1 2008/09   53
No bias against bursty traffic --
   bursty arrival causes random
   packets to be dropped.


3 October 2008   NUS CS5229, Semester 1 2008/09   54
Flows with higher rate occupy
   more buffer spaces, have higher
   chance to be dropped.


3 October 2008   NUS CS5229, Semester 1 2008/09   55
Signal flows that is congesting
   the network to slow down.



3 October 2008   NUS CS5229, Semester 1 2008/09   56
Random drop recovers from
   congestion (full queue) by
   dropping packets.


3 October 2008   NUS CS5229, Semester 1 2008/09   57
Early Random Drop


3 October 2008   NUS CS5229, Semester 1 2008/09   58
Drop what?
    Drop arriving packet
 randomly if queue is longer
      than a threshold

3 October 2008   NUS CS5229, Semester 1 2008/09   59
Early random drop avoids
   congestion (full queue) by
   dropping packets before queue
   is full.


3 October 2008   NUS CS5229, Semester 1 2008/09   60
RED
    Random Early Detection

3 October 2008   NUS CS5229, Semester 1 2008/09   61
Drop what?
 Drop arriving packet randomly
   if average queue length is
        above a threshold

3 October 2008   NUS CS5229, Semester 1 2008/09   62
Differences 1: Use average
     queue length instead of
 instantaneous length to absorb
      transient congestion.

3 October 2008   NUS CS5229, Semester 1 2008/09   63
Differences 2: Dropping
         probability should change
         dynamically depending on
                queue length.

3 October 2008   NUS CS5229, Semester 1 2008/09   64
Dropping Probability



     1




                                                Average Queue Length
3 October 2008       NUS CS5229, Semester 1 2008/09               65
foreach incoming packet X
     calc average queue length
     if minth < average < maxth
        calc p
        drop X with probability p
     else if average > maxth
        drop X
3 October 2008   NUS CS5229, Semester 1 2008/09   66
(Instead of dropping packets, we
   can also set the ECN bit to
   indicate congestion)



3 October 2008   NUS CS5229, Semester 1 2008/09   67
How to calculate average queue
   length?

   How to calculate drop probability?

   How to set thresholds?

3 October 2008   NUS CS5229, Semester 1 2008/09   68
We can use exponentially
        weighted average. On every
        packet arrival:




3 October 2008   NUS CS5229, Semester 1 2008/09   69
Large wq : A burst of packets will
    cause avg to increase too fast, hit
    the max threshold

    Small wq : avg increases too slowly
    and we are unable to detect initial
    stage of congestions.
3 October 2008   NUS CS5229, Semester 1 2008/09   70
3 October 2008   NUS CS5229, Semester 1 2008/09   71
3 October 2008   NUS CS5229, Semester 1 2008/09   72
We can use exponentially
        weighted average. On every
        packet arrival:




3 October 2008   NUS CS5229, Semester 1 2008/09   73
We can use exponentially
        weighted average. On every
        packet arrival:




3 October 2008   NUS CS5229, Semester 1 2008/09   74
What if q drops to zero and no
        packet arrives?



         m is a function of period when
         queue is empty
3 October 2008   NUS CS5229, Semester 1 2008/09   75
How to calculate average queue
   length?

   How to calculate drop probability

   How to set thresholds?

3 October 2008   NUS CS5229, Semester 1 2008/09   76
Dropping Probability



     1



 pmax



                                                       Average
                                                       Queue Length


                   minth                   max    th
3 October 2008       NUS CS5229, Semester 1 2008/09              77
3 October 2008   NUS CS5229, Semester 1 2008/09   78
3 October 2008   NUS CS5229, Semester 1 2008/09   79
How to calculate average queue
   length?

   How to calculate drop probability

   How to set thresholds?

3 October 2008   NUS CS5229, Semester 1 2008/09   80
maxth - minth should be sufficiently
   large otherwise average queue
   size can oscillate beyond maxth
   “need more research” for
   optimal value.

3 October 2008   NUS CS5229, Semester 1 2008/09   81
Advantages of RED




3 October 2008      NUS CS5229, Semester 1 2008/09   82
No bias against bursty flows
         Less global synchronization
        Control average queue length



3 October 2008   NUS CS5229, Semester 1 2008/09   83
RED does not deal with
                   unresponsive flows



3 October 2008        NUS CS5229, Semester 1 2008/09   84
ns-2 demo


3 October 2008    NUS CS5229, Semester 1 2008/09   85
Variations of
                     RED
3 October 2008      NUS CS5229, Semester 1 2008/09   86
RED biases against flow with
               large packet size



3 October 2008   NUS CS5229, Semester 1 2008/09   87
We can fix this by weighting drop
      probability to packet size



3 October 2008   NUS CS5229, Semester 1 2008/09   88
A router can keep one queue per
   flow and apply RED to each one.



3 October 2008   NUS CS5229, Semester 1 2008/09   89
Drop probability can be weighted
      with the priority of the flow.



3 October 2008   NUS CS5229, Semester 1 2008/09   90
This is known as WRED and is
        implemented in some Cisco
                  routers.



3 October 2008   NUS CS5229, Semester 1 2008/09   91
Simulation
                   Results
3 October 2008     NUS CS5229, Semester 1 2008/09   92
Four TCP flows starting at time 0.2, 0.4, 0.6 and 0.8




3 October 2008         NUS CS5229, Semester 1 2008/09          93
3 October 2008   NUS CS5229, Semester 1 2008/09   94
Conclusion:
   RED increases throughput,
   reduces delay, controls average
   queue sizes, reduces global sync
   and is fairer to bursty traffic. It is
   deployed in routers today.

   But careful tuning of parameters
   is needed.
3 October 2008   NUS CS5229, Semester 1 2008/09   95

Contenu connexe

En vedette

iQ queue management system
iQ queue management systemiQ queue management system
iQ queue management systemONLINET Group
 
Electronic queue management
Electronic queue managementElectronic queue management
Electronic queue managementAnne Cole
 
Profit generated by Queue Management System
Profit generated by Queue Management SystemProfit generated by Queue Management System
Profit generated by Queue Management SystemONLINET Group
 
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...IJARIDEA Journal
 
The blue active queue management algorithms
The blue active queue management algorithmsThe blue active queue management algorithms
The blue active queue management algorithmsambitlick
 
Queue management system software
Queue management system softwareQueue management system software
Queue management system softwareAnne Cole
 
Onlinet Queue Management System - Visual Tour
Onlinet Queue Management System - Visual TourOnlinet Queue Management System - Visual Tour
Onlinet Queue Management System - Visual TourONLINET Group
 
Efficient Digital Signage With Queue Management System
Efficient Digital Signage With Queue Management SystemEfficient Digital Signage With Queue Management System
Efficient Digital Signage With Queue Management SystemONLINET Group
 
iBANKING - The future of queue management (ENG)
iBANKING - The future of queue management (ENG) iBANKING - The future of queue management (ENG)
iBANKING - The future of queue management (ENG) ONLINET Group
 
Queue Management System
Queue Management SystemQueue Management System
Queue Management SystemAmr Omar
 
queueing problems in banking
queueing problems in bankingqueueing problems in banking
queueing problems in bankingMani Deep
 
Queuing theory
Queuing theoryQueuing theory
Queuing theoryAmit Sinha
 
Queuing Theory - Operation Research
Queuing Theory - Operation ResearchQueuing Theory - Operation Research
Queuing Theory - Operation ResearchManmohan Anand
 
QUEUING THEORY
QUEUING THEORYQUEUING THEORY
QUEUING THEORYavtarsingh
 

En vedette (16)

iQ queue management system
iQ queue management systemiQ queue management system
iQ queue management system
 
Electronic queue management
Electronic queue managementElectronic queue management
Electronic queue management
 
Profit generated by Queue Management System
Profit generated by Queue Management SystemProfit generated by Queue Management System
Profit generated by Queue Management System
 
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...
 
The blue active queue management algorithms
The blue active queue management algorithmsThe blue active queue management algorithms
The blue active queue management algorithms
 
Queue management system software
Queue management system softwareQueue management system software
Queue management system software
 
Onlinet Queue Management System - Visual Tour
Onlinet Queue Management System - Visual TourOnlinet Queue Management System - Visual Tour
Onlinet Queue Management System - Visual Tour
 
Efficient Digital Signage With Queue Management System
Efficient Digital Signage With Queue Management SystemEfficient Digital Signage With Queue Management System
Efficient Digital Signage With Queue Management System
 
iBANKING - The future of queue management (ENG)
iBANKING - The future of queue management (ENG) iBANKING - The future of queue management (ENG)
iBANKING - The future of queue management (ENG)
 
Queue Management System
Queue Management SystemQueue Management System
Queue Management System
 
queueing problems in banking
queueing problems in bankingqueueing problems in banking
queueing problems in banking
 
QUEUING THEORY
QUEUING THEORY QUEUING THEORY
QUEUING THEORY
 
Queuing theory
Queuing theoryQueuing theory
Queuing theory
 
Queuing Theory - Operation Research
Queuing Theory - Operation ResearchQueuing Theory - Operation Research
Queuing Theory - Operation Research
 
QUEUING THEORY
QUEUING THEORYQUEUING THEORY
QUEUING THEORY
 
Queueing theory
Queueing theoryQueueing theory
Queueing theory
 

Similaire à CS5229 Lecture 7: Queue Management

CS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet DynamicsCS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet DynamicsWei Tsang Ooi
 
CS5229 Lecture 3: Congestion Avoidance and Control
CS5229 Lecture 3: Congestion Avoidance and ControlCS5229 Lecture 3: Congestion Avoidance and Control
CS5229 Lecture 3: Congestion Avoidance and ControlWei Tsang Ooi
 
CS5229 Lecture 1: Design Principles of the Internet
CS5229 Lecture 1: Design Principles of the InternetCS5229 Lecture 1: Design Principles of the Internet
CS5229 Lecture 1: Design Principles of the InternetWei Tsang Ooi
 
Latency on a_switched_ethernet_network
Latency on a_switched_ethernet_networkLatency on a_switched_ethernet_network
Latency on a_switched_ethernet_networkzeedoui2
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcpsamarai_apoc
 
Optimizing the Robustness of X-by-Wire using Word Combinatorics
Optimizing the Robustness of X-by-Wire using Word CombinatoricsOptimizing the Robustness of X-by-Wire using Word Combinatorics
Optimizing the Robustness of X-by-Wire using Word CombinatoricsNicolas Navet
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)NYversity
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...vtunotesbysree
 
CS5229 09/10 Lecture 6: Simulation
CS5229 09/10 Lecture 6: SimulationCS5229 09/10 Lecture 6: Simulation
CS5229 09/10 Lecture 6: SimulationWei Tsang Ooi
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
tcp-wireless-tutorial.ppt
tcp-wireless-tutorial.ppttcp-wireless-tutorial.ppt
tcp-wireless-tutorial.pptRadwan Mahmoud
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...ijcseit
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...ijcseit
 
08-Switching.ppt
08-Switching.ppt08-Switching.ppt
08-Switching.pptSanaMateen7
 
Flow Control & Error control in Data Link Layer .ppt
Flow Control & Error control in Data Link Layer .pptFlow Control & Error control in Data Link Layer .ppt
Flow Control & Error control in Data Link Layer .pptErAnjuBala
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Available network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsAvailable network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsIJCNCJournal
 

Similaire à CS5229 Lecture 7: Queue Management (20)

CS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet DynamicsCS5229 09/10 Lecture 9: Internet Packet Dynamics
CS5229 09/10 Lecture 9: Internet Packet Dynamics
 
CS5229 Lecture 3: Congestion Avoidance and Control
CS5229 Lecture 3: Congestion Avoidance and ControlCS5229 Lecture 3: Congestion Avoidance and Control
CS5229 Lecture 3: Congestion Avoidance and Control
 
CS5229 Lecture 1: Design Principles of the Internet
CS5229 Lecture 1: Design Principles of the InternetCS5229 Lecture 1: Design Principles of the Internet
CS5229 Lecture 1: Design Principles of the Internet
 
Latency on a_switched_ethernet_network
Latency on a_switched_ethernet_networkLatency on a_switched_ethernet_network
Latency on a_switched_ethernet_network
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcp
 
Optimizing the Robustness of X-by-Wire using Word Combinatorics
Optimizing the Robustness of X-by-Wire using Word CombinatoricsOptimizing the Robustness of X-by-Wire using Word Combinatorics
Optimizing the Robustness of X-by-Wire using Word Combinatorics
 
Congestion control avoidance
Congestion control avoidanceCongestion control avoidance
Congestion control avoidance
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
 
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
VTU 6TH SEM CSE COMPUTER NETWORKS 2 SOLVED PAPERS OF JUNE-2013 JUNE-14 & JUNE...
 
CS5229 09/10 Lecture 6: Simulation
CS5229 09/10 Lecture 6: SimulationCS5229 09/10 Lecture 6: Simulation
CS5229 09/10 Lecture 6: Simulation
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
tcp-wireless-tutorial.ppt
tcp-wireless-tutorial.ppttcp-wireless-tutorial.ppt
tcp-wireless-tutorial.ppt
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...
 
08-Switching.ppt
08-Switching.ppt08-Switching.ppt
08-Switching.ppt
 
Flow Control & Error control in Data Link Layer .ppt
Flow Control & Error control in Data Link Layer .pptFlow Control & Error control in Data Link Layer .ppt
Flow Control & Error control in Data Link Layer .ppt
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Ch08
Ch08Ch08
Ch08
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Available network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsAvailable network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocols
 

Plus de Wei Tsang Ooi

SIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business MeetingSIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business MeetingWei Tsang Ooi
 
The Computer Science behind YouTube
The Computer Science behind YouTubeThe Computer Science behind YouTube
The Computer Science behind YouTubeWei Tsang Ooi
 
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked GamesCS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked GamesWei Tsang Ooi
 
CS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game TrafficCS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game TrafficWei Tsang Ooi
 
CS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid ArchitectureCS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid ArchitectureWei Tsang Ooi
 
CS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest ManagementCS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest ManagementWei Tsang Ooi
 
CS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P SynchronizationCS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P SynchronizationWei Tsang Ooi
 
Cs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest ManagementCs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest ManagementWei Tsang Ooi
 
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception FilterCS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception FilterWei Tsang Ooi
 
CS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: ConsistencyCS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: ConsistencyWei Tsang Ooi
 
CS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: IntroductionCS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: IntroductionWei Tsang Ooi
 
CS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNSCS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNSWei Tsang Ooi
 
CS5229 09/10 Lecture 10: Internet Routing
CS5229 09/10 Lecture 10: Internet RoutingCS5229 09/10 Lecture 10: Internet Routing
CS5229 09/10 Lecture 10: Internet RoutingWei Tsang Ooi
 
Lecture 4: TCP and TFRC
Lecture 4: TCP and TFRCLecture 4: TCP and TFRC
Lecture 4: TCP and TFRCWei Tsang Ooi
 
Lecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceLecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceWei Tsang Ooi
 
Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229Wei Tsang Ooi
 
Lecture 1: Design Principles of the Internet
Lecture 1: Design Principles of the InternetLecture 1: Design Principles of the Internet
Lecture 1: Design Principles of the InternetWei Tsang Ooi
 
CS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid ArchitectureCS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid ArchitectureWei Tsang Ooi
 
CS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player DynamicsCS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player DynamicsWei Tsang Ooi
 

Plus de Wei Tsang Ooi (20)

SIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business MeetingSIGMM Education Effort Presentation at Business Meeting
SIGMM Education Effort Presentation at Business Meeting
 
CS2106 Tutorial 2
CS2106 Tutorial 2CS2106 Tutorial 2
CS2106 Tutorial 2
 
The Computer Science behind YouTube
The Computer Science behind YouTubeThe Computer Science behind YouTube
The Computer Science behind YouTube
 
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked GamesCS4344 09/10 Lecture 10: Transport Protocol for Networked Games
CS4344 09/10 Lecture 10: Transport Protocol for Networked Games
 
CS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game TrafficCS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
CS4344 09/10 Lecture 9: Characteristics of Networked Game Traffic
 
CS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid ArchitectureCS4344 09/10 Lecture 8: Hybrid Architecture
CS4344 09/10 Lecture 8: Hybrid Architecture
 
CS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest ManagementCS4344 09/10 Lecture 7: P2P Interest Management
CS4344 09/10 Lecture 7: P2P Interest Management
 
CS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P SynchronizationCS4344 09/10 Lecture 6: P2P Synchronization
CS4344 09/10 Lecture 6: P2P Synchronization
 
Cs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest ManagementCs4344 09/10 Lecture 5: Interest Management
Cs4344 09/10 Lecture 5: Interest Management
 
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception FilterCS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
CS4344 09/10 Lecture 3: Dead Reckoning and Local Perception Filter
 
CS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: ConsistencyCS4344 09/10 Lecture 2: Consistency
CS4344 09/10 Lecture 2: Consistency
 
CS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: IntroductionCS4344 09/10 Lecture 1: Introduction
CS4344 09/10 Lecture 1: Introduction
 
CS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNSCS5229 09/10 Lecture 11: DNS
CS5229 09/10 Lecture 11: DNS
 
CS5229 09/10 Lecture 10: Internet Routing
CS5229 09/10 Lecture 10: Internet RoutingCS5229 09/10 Lecture 10: Internet Routing
CS5229 09/10 Lecture 10: Internet Routing
 
Lecture 4: TCP and TFRC
Lecture 4: TCP and TFRCLecture 4: TCP and TFRC
Lecture 4: TCP and TFRC
 
Lecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and AvoidanceLecture 2: Congestion Control and Avoidance
Lecture 2: Congestion Control and Avoidance
 
Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229Lecture 0: Introduction to CS5229
Lecture 0: Introduction to CS5229
 
Lecture 1: Design Principles of the Internet
Lecture 1: Design Principles of the InternetLecture 1: Design Principles of the Internet
Lecture 1: Design Principles of the Internet
 
CS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid ArchitectureCS4344 Lecture 8: Hybrid Architecture
CS4344 Lecture 8: Hybrid Architecture
 
CS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player DynamicsCS4344 Lecture 10: Player Dynamics
CS4344 Lecture 10: Player Dynamics
 

Dernier

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

CS5229 Lecture 7: Queue Management

  • 1. Queue Management 3 October 2008 NUS CS5229, Semester 1 2008/09 1
  • 2. Not all flows are congestion controlled 3 October 2008 NUS CS5229, Semester 1 2008/09 2
  • 3. 1. Don’t need reliability, so use UDP, which has no congestion control 3 October 2008 NUS CS5229, Semester 1 2008/09 3
  • 4. 2. No incentive to limit own sending rate 3 October 2008 NUS CS5229, Semester 1 2008/09 4
  • 5. Sally Floyd and Kevin Fall “Promoting End-to-End Congestion Control in the Internet” TON, 1999 3 October 2008 NUS CS5229, Semester 1 2008/09 5
  • 6. What mechanisms can we add to the router to provide incentives for congestion control? 3 October 2008 NUS CS5229, Semester 1 2008/09 6
  • 7. Idea: Identify unresponsive flows, then drop their packets or regulate their rate. 3 October 2008 NUS CS5229, Semester 1 2008/09 7
  • 8. Note: Not scalable to large number of flows (eg in core routers). 3 October 2008 NUS CS5229, Semester 1 2008/09 8
  • 9. How to identify unresponsive flows in a router? 3 October 2008 NUS CS5229, Semester 1 2008/09 9
  • 10. Approach 1: Use TCP Throughput Equation 3 October 2008 NUS CS5229, Semester 1 2008/09 10
  • 11. The paper uses a rough approximation 3 October 2008 NUS CS5229, Semester 1 2008/09 11
  • 12. MSS: Maximum packet size in bytes over all outgoing links p: Packet drop rates over all outgoing links RTT: Twice the 1-way propagation delay of outgoing links 3 October 2008 NUS CS5229, Semester 1 2008/09 12
  • 13. The expression will overestimate the fair throughput for TCP. Thus, not all unfriendly flows will be identified. 3 October 2008 NUS CS5229, Semester 1 2008/09 13
  • 14. Approach 2: Unresponsive Flows 3 October 2008 NUS CS5229, Semester 1 2008/09 14
  • 15. Does the packet arrival rate of a flow reduce appropriately when packet drop rate increase? 3 October 2008 NUS CS5229, Semester 1 2008/09 15
  • 16. If packet drop rate increases by x%, then packet arrival rate should decrease by sqrt(x)% 3 October 2008 NUS CS5229, Semester 1 2008/09 16
  • 17. Does Not Work: when packet drop rate is constant 3 October 2008 NUS CS5229, Semester 1 2008/09 17
  • 18. Does Not Work: packet might be dropped by earlier router 3 October 2008 NUS CS5229, Semester 1 2008/09 18
  • 19. Does Not Work: A flow has an incentive to start with high throughput 3 October 2008 NUS CS5229, Semester 1 2008/09 19
  • 20. Approach 3: Flows with Disproportionate Bandwidth 3 October 2008 NUS CS5229, Semester 1 2008/09 20
  • 21. A flow should share 1/n of total bandwidth 3 October 2008 NUS CS5229, Semester 1 2008/09 21
  • 22. When congestion is low (packet drop rate is low), skewness is OK. 3 October 2008 NUS CS5229, Semester 1 2008/09 22
  • 23. Condition 1: If a flow’s bandwidth is more than ln(3n)/n of the aggregate, then it is using disproportionate share. (ln(3n)/n : magic) 3 October 2008 NUS CS5229, Semester 1 2008/09 23
  • 24. Condition 2: If a flow’s bandwidth is more than For MSS=512 and RTT=0.05s 3 October 2008 NUS CS5229, Semester 1 2008/09 24
  • 25. If a flow’s bandwidth is more than ln(3n)/n of the aggregate flow bandwidth, then it is using disproportionate share. (ln(3n)/n : magic) 3 October 2008 NUS CS5229, Semester 1 2008/09 25
  • 26. Does Not Work: flows with short RTT will be considered as disproportionate 3 October 2008 NUS CS5229, Semester 1 2008/09 26
  • 27. Does Not Work: the only flow with sustained demand (long live) will be considered as disproportionate. 3 October 2008 NUS CS5229, Semester 1 2008/09 27
  • 28. Sally Floyd and Van Jacobson “Random Early Detection Gateway for Congestion Avoidance” TON, 1993 3 October 2008 NUS CS5229, Semester 1 2008/09 28
  • 29. Router’s Queue Management 3 October 2008 NUS CS5229, Semester 1 2008/09 29
  • 30. Manages sharing of (i) buffer space (ii) bandwidth 3 October 2008 NUS CS5229, Semester 1 2008/09 30
  • 31. Q1: Which packet to drop when queue is full? 3 October 2008 NUS CS5229, Semester 1 2008/09 31
  • 32. Q2: Which packet to send next? 3 October 2008 NUS CS5229, Semester 1 2008/09 32
  • 33. FIFO + Drop Tail 3 October 2008 NUS CS5229, Semester 1 2008/09 33
  • 34. Keep a single queue 3 October 2008 NUS CS5229, Semester 1 2008/09 34
  • 35. Drop what? Drop arriving packets when queue is full 3 October 2008 NUS CS5229, Semester 1 2008/09 35
  • 36. Send what? Send the packet at head of queue 3 October 2008 NUS CS5229, Semester 1 2008/09 36
  • 37. Round Robin 3 October 2008 NUS CS5229, Semester 1 2008/09 37
  • 38. One queue per flow 3 October 2008 NUS CS5229, Semester 1 2008/09 38
  • 39. Drop what? Drop arriving packets from flow i when queue i is full 3 October 2008 NUS CS5229, Semester 1 2008/09 39
  • 40. Send what? Each flow takes turn -- send the packet at the head of the queues in a round robin manner. 3 October 2008 NUS CS5229, Semester 1 2008/09 40
  • 41. Advantages of FIFO and Drop Tail 3 October 2008 NUS CS5229, Semester 1 2008/09 41
  • 42. Simple to implement 3 October 2008 NUS CS5229, Semester 1 2008/09 42
  • 43. Scale well (no per-connection states) 3 October 2008 NUS CS5229, Semester 1 2008/09 43
  • 44. Reduce delay for a bursty connection (e.g. VoIP) 3 October 2008 NUS CS5229, Semester 1 2008/09 44
  • 45. Problems with FIFO and Drop Tail 3 October 2008 NUS CS5229, Semester 1 2008/09 45
  • 46. Problem 1 Bias against bursty traffic burstiness increases chances that the queue will overflow 3 October 2008 NUS CS5229, Semester 1 2008/09 46
  • 47. Problem 2 Global synchronization connections reduce their windows simultaneously, lowering utilization. 3 October 2008 NUS CS5229, Semester 1 2008/09 47
  • 48. Problem 3 Queue size higher bandwidth needs longer queue, increasing delay. TCP tries to keep the queue full 3 October 2008 NUS CS5229, Semester 1 2008/09 48
  • 49. Problem 4 No isolation against unresponsive flows 3 October 2008 NUS CS5229, Semester 1 2008/09 49
  • 50. Random Drop 3 October 2008 NUS CS5229, Semester 1 2008/09 50
  • 51. Keep a single queue 3 October 2008 NUS CS5229, Semester 1 2008/09 51
  • 52. Drop what? Drop random packet in the queue when queue is full 3 October 2008 NUS CS5229, Semester 1 2008/09 52
  • 53. Send what? Send the packet at head of queue 3 October 2008 NUS CS5229, Semester 1 2008/09 53
  • 54. No bias against bursty traffic -- bursty arrival causes random packets to be dropped. 3 October 2008 NUS CS5229, Semester 1 2008/09 54
  • 55. Flows with higher rate occupy more buffer spaces, have higher chance to be dropped. 3 October 2008 NUS CS5229, Semester 1 2008/09 55
  • 56. Signal flows that is congesting the network to slow down. 3 October 2008 NUS CS5229, Semester 1 2008/09 56
  • 57. Random drop recovers from congestion (full queue) by dropping packets. 3 October 2008 NUS CS5229, Semester 1 2008/09 57
  • 58. Early Random Drop 3 October 2008 NUS CS5229, Semester 1 2008/09 58
  • 59. Drop what? Drop arriving packet randomly if queue is longer than a threshold 3 October 2008 NUS CS5229, Semester 1 2008/09 59
  • 60. Early random drop avoids congestion (full queue) by dropping packets before queue is full. 3 October 2008 NUS CS5229, Semester 1 2008/09 60
  • 61. RED Random Early Detection 3 October 2008 NUS CS5229, Semester 1 2008/09 61
  • 62. Drop what? Drop arriving packet randomly if average queue length is above a threshold 3 October 2008 NUS CS5229, Semester 1 2008/09 62
  • 63. Differences 1: Use average queue length instead of instantaneous length to absorb transient congestion. 3 October 2008 NUS CS5229, Semester 1 2008/09 63
  • 64. Differences 2: Dropping probability should change dynamically depending on queue length. 3 October 2008 NUS CS5229, Semester 1 2008/09 64
  • 65. Dropping Probability 1 Average Queue Length 3 October 2008 NUS CS5229, Semester 1 2008/09 65
  • 66. foreach incoming packet X calc average queue length if minth < average < maxth calc p drop X with probability p else if average > maxth drop X 3 October 2008 NUS CS5229, Semester 1 2008/09 66
  • 67. (Instead of dropping packets, we can also set the ECN bit to indicate congestion) 3 October 2008 NUS CS5229, Semester 1 2008/09 67
  • 68. How to calculate average queue length? How to calculate drop probability? How to set thresholds? 3 October 2008 NUS CS5229, Semester 1 2008/09 68
  • 69. We can use exponentially weighted average. On every packet arrival: 3 October 2008 NUS CS5229, Semester 1 2008/09 69
  • 70. Large wq : A burst of packets will cause avg to increase too fast, hit the max threshold Small wq : avg increases too slowly and we are unable to detect initial stage of congestions. 3 October 2008 NUS CS5229, Semester 1 2008/09 70
  • 71. 3 October 2008 NUS CS5229, Semester 1 2008/09 71
  • 72. 3 October 2008 NUS CS5229, Semester 1 2008/09 72
  • 73. We can use exponentially weighted average. On every packet arrival: 3 October 2008 NUS CS5229, Semester 1 2008/09 73
  • 74. We can use exponentially weighted average. On every packet arrival: 3 October 2008 NUS CS5229, Semester 1 2008/09 74
  • 75. What if q drops to zero and no packet arrives? m is a function of period when queue is empty 3 October 2008 NUS CS5229, Semester 1 2008/09 75
  • 76. How to calculate average queue length? How to calculate drop probability How to set thresholds? 3 October 2008 NUS CS5229, Semester 1 2008/09 76
  • 77. Dropping Probability 1 pmax Average Queue Length minth max th 3 October 2008 NUS CS5229, Semester 1 2008/09 77
  • 78. 3 October 2008 NUS CS5229, Semester 1 2008/09 78
  • 79. 3 October 2008 NUS CS5229, Semester 1 2008/09 79
  • 80. How to calculate average queue length? How to calculate drop probability How to set thresholds? 3 October 2008 NUS CS5229, Semester 1 2008/09 80
  • 81. maxth - minth should be sufficiently large otherwise average queue size can oscillate beyond maxth “need more research” for optimal value. 3 October 2008 NUS CS5229, Semester 1 2008/09 81
  • 82. Advantages of RED 3 October 2008 NUS CS5229, Semester 1 2008/09 82
  • 83. No bias against bursty flows Less global synchronization Control average queue length 3 October 2008 NUS CS5229, Semester 1 2008/09 83
  • 84. RED does not deal with unresponsive flows 3 October 2008 NUS CS5229, Semester 1 2008/09 84
  • 85. ns-2 demo 3 October 2008 NUS CS5229, Semester 1 2008/09 85
  • 86. Variations of RED 3 October 2008 NUS CS5229, Semester 1 2008/09 86
  • 87. RED biases against flow with large packet size 3 October 2008 NUS CS5229, Semester 1 2008/09 87
  • 88. We can fix this by weighting drop probability to packet size 3 October 2008 NUS CS5229, Semester 1 2008/09 88
  • 89. A router can keep one queue per flow and apply RED to each one. 3 October 2008 NUS CS5229, Semester 1 2008/09 89
  • 90. Drop probability can be weighted with the priority of the flow. 3 October 2008 NUS CS5229, Semester 1 2008/09 90
  • 91. This is known as WRED and is implemented in some Cisco routers. 3 October 2008 NUS CS5229, Semester 1 2008/09 91
  • 92. Simulation Results 3 October 2008 NUS CS5229, Semester 1 2008/09 92
  • 93. Four TCP flows starting at time 0.2, 0.4, 0.6 and 0.8 3 October 2008 NUS CS5229, Semester 1 2008/09 93
  • 94. 3 October 2008 NUS CS5229, Semester 1 2008/09 94
  • 95. Conclusion: RED increases throughput, reduces delay, controls average queue sizes, reduces global sync and is fairer to bursty traffic. It is deployed in routers today. But careful tuning of parameters is needed. 3 October 2008 NUS CS5229, Semester 1 2008/09 95