performance analysis of tcp and tcp-friendly rate … · using udp as the transport protocol should...

95
PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE CONTROL FLOWS IN WIRED AND WIRELESS NETWORKS SUDHARSANAN S R (M.S. (By Research), Information Technology) A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE (COMPUTER SCIENCE) DEPARTMENT OF COMPUTER SCIENCE SCHOOL OF COMPUTING NATIONAL UNIVERSITY OF SINGAPORE 2003

Upload: others

Post on 27-Oct-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE CONTROL FLOWS IN WIRED

AND WIRELESS NETWORKS

SUDHARSANAN S R (M.S. (By Research), Information Technology)

A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF

MASTER OF SCIENCE (COMPUTER SCIENCE)

DEPARTMENT OF COMPUTER SCIENCE SCHOOL OF COMPUTING

NATIONAL UNIVERSITY OF SINGAPORE

2003

Page 2: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

i

Acknowledgements

I would like to express my deepest gratitude to my supervisor, Dr. Lillykutty

Jacob, who guided me in all aspects until the completion of this thesis. Her

constant support, patience and sincere evaluations made me understand many

aspects pertaining to research.

I am highly grateful to my co-supervisor, Prof. A. L. Ananda, for his

encouragement, support and for providing the best work atmosphere. His critical

advice and suggestions helped me to focus more on work when there were

problems.

I would like to acknowledge Prof. Konstantin Avrachenkov, for his insightful

discussions, critical comments, and words of encouragement. I am thankful to

Frank Akujobi, Rupinder Makkar, and Nabil Seddigh for their help regarding the

BECN implementation in ns simulator.

Sincere appreciations should go to my colleagues Aurbind Sharma, Rahul

Chaudhary, Sridhar K N, Venkatesh S O and M K Saravanan. Special mention to

Sridhar K N for his help in the BECN implementation. I have not only enjoyed

being with you guys but will remember forever the days we spent together.

I am forever indebted to my parents and my brothers for their constant

understanding, endless patience and encouragement. This thesis would be

incomplete and impossible without the support given by them in every

imaginable way.

Page 3: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

ii

Dedicated

To

My parents – Smt. Vasantha Ranganathan & Sri. Ranganathan

My Brothers – Sridhar & Sriram

For their sacrifices and endless encouragement …

Page 4: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

iii

Table of Contents Acknowledgements.............................................................................................................. i

Dedication ........................................................................................................................... ii

Table of Contents............................................................................................................... iii

List of Figures .................................................................................................................... vi

List of Tables ................................................................................................................... viii

Abstract .............................................................................................................................. ix

Chapter 1: Introduction ................................................................................................... 1

1.1. Motivation........................................................................................................... 3

1.2. Research Objectives............................................................................................ 4

1.3. Contributions of the thesis .................................................................................. 5

1.4. Thesis Organization ............................................................................................ 6

Chapter 2: Background and Related Work ................................................................... 7

2.1. Background......................................................................................................... 7

2.1.1. Congestion Control in TCP............................................................................... 7

2.1.2. TCP Friendliness............................................................................................... 8

2.1.3. TCP-Friendly Rate Control............................................................................... 9

2.1.4. TFRC Protocol ................................................................................................ 10

2.1.5. Self-Similarity in Network Traffic.................................................................. 12

2.1.5.1. Definition ........................................................................................... 12

2.1.5.2. Long-range Dependency (LRD) ........................................................ 12

2.1.5.3. Heavy-tailed Distributions ................................................................. 13

2.1.5.4. Hurst Parameter – The Measure of Self-Similarity ........................... 14

Page 5: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

iv

2.1.5.5. Causes of Self-Similarity ................................................................... 15

2.1.6. Random Early Detection (RED) ..................................................................... 16

2.1.7. Explicit Congestion Notification (ECN)......................................................... 17

2.1.8. Backward Explicit Congestion Notification (BECN)..................................... 19

2.2. Related Work .................................................................................................... 24

2.2.1. Related work on TCP-friendly Rate Control .................................................. 24

2.2.2. Related work on Self-Similarity, Long-range Dependence and its ................ 26

Impact on Network Performance .................................................................... 26

2.2.3. Related Work on ECN .................................................................................... 30

2.2.4. Related work on BECN .................................................................................. 31

Chapter 3: Characterization of TCP-Friendly Rate Control (TFRC) Flows............ 33

3.1. Introduction....................................................................................................... 33

3.2. Experiments ...................................................................................................... 34

3.2.1. Packet Inter-arrival Time Measurement ......................................................... 34

3.2.2. Packet Delay Measurement............................................................................. 35

3.3. Results............................................................................................................... 35

3.3.1. Correlation of packet inter-arrival times......................................................... 38

3.3.2. Correlation between delay and loss ................................................................ 39

3.4. Discussions ............................................................................................................ 41

Chapter 4: Performance Analysis of ECN and BECN enabled TCP flows............... 43

4.1. Introduction............................................................................................................ 43

4.2. ECN and BECN Capable Networks ................................................................. 43

4.2.1. TCP Sender Behavior ..................................................................................... 43

Page 6: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

v

4.2.4. Router Behavior .............................................................................................. 45

4.3. Analytical Model .............................................................................................. 46

4.4. Simulation Setup............................................................................................... 52

4.5. Results and Discussion ..................................................................................... 54

4.5.1. Varying number of flows (N) ......................................................................... 54

4.5.2. Comparison of ECN and BECN for varying number of flows....................... 59

4.5.3. Varying round-trip time (RTTo)...................................................................... 62

4.5.4. Bottleneck router queue size vs. time ............................................................. 71

4.5.5. Experiments with reverse lossy link ............................................................... 72

4.5.6. Experiments with Multiple Bottlenecks.......................................................... 74

Chapter 5: Conclusion.................................................................................................... 77

References......................................................................................................................... 79

Page 7: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

vi

List of Figures

Figure 1: Real-time Internet 2 measurement setup ........................................................... 34 Figure 2: Estimate of the Hurst Parameter by R/S method for real-time measurement (Packet inter-arrival times) (2 – day data) ......................................................... 37 Figure 3: Estimate of the Hurst Parameter by R/S method for real-time measurement (Packet inter-arrival times) (4 – day data) ......................................................... 37 Figure 4: Estimate of the Hurst Parameter by R/S method for real-time measurement (Packet inter-arrival times) (1 – week data)....................................................... 38 Figure 5: Histogram plot for packet inter-arrival times .................................................... 39 Figure 6: Delay versus Loss rate....................................................................................... 40 Figure 7: Congestion window evolution over time when indications are due to marking 50 Figure 8: Packets sent during a congestion notification period ........................................ 50 Figure 9: Network Topology 1 ......................................................................................... 53 Figure 10: Network Topology 2 ....................................................................................... 54 Figure 11: Analytical and simulation results for ECN...................................................... 56 Figure 12: Analytical and simulation results for BECN................................................... 58 Figure 13: BECN-ISQ traffic versus number of flows ..................................................... 58 Figure 14: Comparison of ECN and BECN for varying number of flows ....................... 61 Figure 15: Analytical and simulation results for ECN...................................................... 63 Figure 16: Analytical and simulation results for BECN................................................... 65 Figure 17: BECN-ISQ traffic versus RTTo....................................................................... 65 Figure 18: Analytical and simulation results for ECN...................................................... 67 Figure 19: Analytical and simulation results for BECN................................................... 69

Page 8: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

vii

Figure 20: BECN-ISQ traffic versus RTTo....................................................................... 69 Figure 21: Instantaneous and average queue sizes for BECN and ECN (No. of flows = 22)

................................................................................................................................... 72 Figure 22: Comparison of ECN and BECN for varying loss rates ................................... 73 Figure 23: Comparison of ECN and BECN for multiple bottlenecks .............................. 75 Figure 24: BECN ISQ traffic versus number of flows ..................................................... 75

Page 9: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

viii

List of Tables

Table 1: Estimate of H values by R/S method.................................................................. 36

Table 2: The BECN scaling factor γ versus number of flows .......................................... 54

Table 3: The BECN scaling factor γ versus round trip delay (minimum no. of flows).... 66

Table 4: The BECN scaling factor γ versus round trip delay (maximum no. of flows) ... 70

Page 10: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

ix

Abstract

This thesis has two parts: analysis of TCP-Friendly Rate Control (TFRC) flows through

real-time measurements, and analysis of Explicit Congestion Notification (ECN) and

Backward Explicit Congestion Notification (BECN) enabled TCP flows through

analytical modeling and simulation.

With the rapid increase of multimedia traffic and the deployment of real-time audio/video

streaming applications, the current Internet has seen an exponential increase in the

percentage of non-TCP traffic. These multimedia streaming applications do not share the

available bandwidth fairly with applications built on TCP. This evolution can lead to a

congestion collapse and starvation for TCP traffic. TCP-friendly protocols have been

developed for these multimedia applications that behave fairly with respect to co-existent

TCP flows. The first part of this thesis analyzes and characterizes the TFRC flows

through real-time measurements. This study leads to some interesting observations: the

aggregate traffic exhibits long-range dependence (LRD) over different levels of

aggregation, packet inter-arrival times tend to be correlated, and there exists a correlation

between packet loss and delay. This measurement and analysis are done only for wired

networks.

The second part of this thesis presents a comparative performance evaluation of ECN and

BECN enabled TCP flows. In this study, throughput expressions as functions of packet

marking probability (p) and round trip time (RTT) are obtained for ECN and BECN

enabled TCP flows. Comparative performance of the ECN and BECN mechanisms are

Page 11: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

x

then evaluated using analytical model and/or simulation. This evaluation is done for

varying network load, for different bandwidth-delay product networks, reverse lossy links,

and for single- as well as multiple-bottleneck networks. Analytical and simulation results

show that BECN mechanism benefits from its early congestion notification via ICMP

source quench messages. For paths that have large bandwidth-delay product, results show

that BECN mechanism offers significant improvement in throughput for bulk transfers,

and also that packet drops are comparatively reduced, compared to ECN mechanism.

Page 12: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

1

Chapter 1

1. Introduction

In an ever-growing network like the Internet, end systems should react to

congestion by adapting their transmission rates to share the bandwidth fairly so that

congestion collapse can be avoided and network utilization will be kept high. The

robustness of the current Internet is due in large part to the end-to-end congestion control

mechanisms of TCP. However, while TCP congestion control is appropriate for

applications such as bulk data transfer, other applications such as streaming multimedia

would find halving the sending rate of a flow to be too severe a response to a congestion

indication as it can noticeably reduce the flow’s user-perceived quality [1]. Applications

using UDP as the transport protocol should try to be TCP-friendly, which is important

because if the UDP flow is more aggressive it would gain all the bandwidth (a major

portion of it) and could lead the TCP session to starvation. Also TCP flows are bursty and

never stabilize at a particular bandwidth, and TCP aggressively seeks available

bandwidth, while this behavior does not blend with multimedia streaming applications.

Given the queuing and forwarding mechanisms of the current Internet, TCP-

friendliness is essential for end-to-end transport protocols. Router mechanisms that

enforce TCP-friendly behavior and punish non-conformant streams will be necessary as

an incentive for end-to-end congestion control. In the past few years, many unicast and

multicast TCP-friendly congestion control protocols have been proposed and in use with

different characteristics. However, evaluations of these protocols are focused towards

protocol fairness in stationary environments. TCP-Friendly Rate Control Protocol (TFRC)

Page 13: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

2

is a loss based rate control mechanism for unicast UDP flows. This mechanism tries to

make UDP flows friendly with competing TCP flows. In the first part of this thesis, we

characterize the TFRC flows for continuous media applications in the Internet. We study

the behavior of packet inter-arrival times, per-packet delay and packet loss through real-

time measurements.

Recently, Backward Explicit Congestion Notification (BECN) mechanism has

been proposed for congestion control in TCP/IP networks. BECN mechanism uses ICMP

Source Quenches (ISQ) as a means to explicitly notify (backward notification) the TCP

sender about incipient congestion in the network. Studies have found that BECN reduces

the transfer delay for interactive TCP applications and improves the goodput for bulk

TCP applications compared to the Explicit Congestion Notification (ECN) mechanism.

BECN has also shown significant improvement for TCP flows that traverse paths with a

high bandwidth-delay product. In the second part of this thesis, we extend the stochastic

model for TCP congestion control developed in [2] and [3] in order to analyze the TCP

flow throughput and router buffer queue size in ECN and BECN capable networks. We

then evaluate comparative performance for varying network load, for different

bandwidth-delay product networks, and for single- as well as multiple-bottleneck

networks.

Page 14: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

3

1.1. Motivation

The rapid increase in the amount of multimedia traffic and the deployment of

real-time audio/video streaming applications has increased the percentage of non-TCP

traffic in the current Internet. These streaming applications do not guarantee congestion

control, i.e., they do not share the available bandwidth fairly with applications built on

TCP in a “TCP-friendly” manner. This evolution could lead to a congestion collapse and

starvation for TCP traffic. TCP-friendly protocols have been developed for these

multimedia applications that behave fairly with respect to co-existent TCP flows. It is

important to study and analyze the behavior of TCP-friendly flows where a significant

amount of multimedia traffic needs to be handled in the near future. Moreover,

multimedia traffic flowing out of TCP-friendly protocols have not been studied and

analyzed. This draws motivation to the first part of this thesis to analyze and characterize

TCP-friendly rate control flows through measurements and study its impact on network

performance.

Explicit Congestion Notification (ECN) was proposed for TCP/IP networks as a

means of explicitly notifying end-hosts of network congestion by marking, instead of

dropping packets [4]. Studies have shown that Random Early Detection (RED) based

active queue management [5, 6] with ECN support can give definite improvement in time

delays for interactive traffic over packet drop schemes [7, 8]. Backward Explicit

Congestion Notification (BECN) has been proposed for congestion control in TCP/IP

networks [9, 10]. The BECN mechanism has been previously used in non-IP networks,

but there has been limited experimental investigation into the application of the BECN

scheme as congestion control mechanism in IP networks. The motivation for the second

Page 15: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

4

part of the thesis is to present throughput expressions as functions of packet marking

probability (p) and round trip time (RTT) for ECN and BECN enabled TCP flows and to

evaluate the comparative performance of ECN and BECN mechanisms using analytical

model and simulation.

1.2. Research Objectives

The main objective of this research is to evaluate the performance of ECN and

BECN enabled TCP flows and TCP-friendly rate control flows for congestion control that

gives optimal performance over wired and wireless networks. In particular, the objectives

comprise:

Characterizing and observing the TCP-friendly rate control protocol (TFRC)

flows through real-time measurements.

Observing the behavior through packet inter-arrival times, packet loss rates and

delay.

Obtaining throughput expressions as a function of packet marking probability (p)

and round trip time (RTT) for ECN and BECN enabled TCP flows.

Validating the analytical model developed for ECN and BECN capable networks

through simulation experiments.

Evaluating the comparative performance of ECN and BECN mechanisms through

simulation over wired and wireless networks.

Page 16: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

5

1.3. Contributions of the thesis

The contribution of this thesis is two-fold:

Analysis and characterization of TFRC flows through real-time measurements

with focus on packet inter-arrival times, packet loss and delay. This study leads to

some interesting findings:

o The aggregate traffic exhibits long-range dependence (LRD) over different

levels of aggregation.

o Packet inter-arrival times tend to be correlated.

o There exists a correlation between packet loss and delay. This

measurement and analysis are done only for wired networks.

Comparative performance evaluation of ECN and BECN based congestion

control mechanisms under the following test cases:

o Bulk transfers with varying network load.

o Different bandwidth-delay product networks.

o Reverse lossy links, and

o Single- as well as multiple-bottleneck networks.

In this study, throughput expressions as functions of packet marking probability

(p) and round trip time (RTT) are obtained for ECN and BECN enabled TCP

flows and validated through simulation. Analytical and simulation results show

that BECN mechanism benefits from its early congestion notification via ICMP

source quench messages. For paths that have large bandwidth-delay product,

results show that BECN mechanism offers significant improvement in throughput

Page 17: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

6

for bulk transfers, and also that packet drops are comparatively reduced,

compared to ECN mechanism.

1.4. Thesis Organization

This thesis is organized into five chapters. Chapter 1 provides the introduction,

motivation, and research objectives of the work. Chapter 2 presents a brief overview

containing the background study, various schemes related to this thesis and surveys

previously done related work on TFRC, ECN and BECN. Chapter 3 details the first

contribution of this thesis, characterization of TCP-friendly rate control flows for wired

networks through real-time measurements and analysis of some of the major issues. The

second contribution of this thesis, analysis of ECN and BECN enabled TCP flows

through analytical modeling and simulation, is described in Chapter 4 which contains the

extended analytical model for TCP throughput and queue dynamics for ECN and BECN.

Chapter 4 also presents the comparative performance evaluation of ECN and BECN

enabled TCP flows for wired and wireless networks. The thesis concludes in chapter 5.

Page 18: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

7

Chapter 2

Background and Related Work

2.1. Background

We present background information on TFRC, ECN and BECN mechanisms related to

performance evaluation of TCP and TCP-friendly rate control flows for wired and

wireless networks that have been referred in this thesis.

2.1.1. Congestion Control in TCP

The general congestion control framework of TCP depends on the following four

parameters: AIMD, retransmit timer, slow start mechanism, and acknowledgement (ACK)

– clocking. TCP congestion control is based on additive increase multiplicative decrease

(AIMD) meaning that when there is a packet loss the congestion window will be reduced

to half of its original size, and the congestion window will be increased by one segment

every round-trip time (RTT) otherwise [11]. When a retransmitted packet gets dropped,

the retransmit timer is used where it backs-off exponentially. This is very useful for

congestion control in TCP during highly congested periods [11]. A TCP source in order

to send data according to the bandwidth available in a network uses the slow start

mechanism to probe initially for available bandwidth at the start of a TCP connection,

after initial probing the TCP source sends data according to the bandwidth available [11].

Acknowledgement (ACK) – clocking is an important congestion control mechanism for

TCP. Here the arrival of acknowledgements at the TCP source is used for clocking out

the transmission of new data. ACK clocking sends data smoothly [11].

Page 19: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

8

A typical TCP connection starts with the “slow start” phase [3, 12]. During this

phase, the TCP sender sets its initial congestion window (cwnd) to either 1 or 2 segments

[13]. For every acknowledgement (ACK) received from the receiver, the cwnd is

increased by one segment per round trip time, an exponential increase of the cwnd. The

slow start threshold (ssthresh) is used in determining if the slow start or congestion

avoidance is used to control data transmission [13]. The “slow start” phase continues

until cwnd < ssthresh. The “congestion avoidance” phase then takes over if cwnd goes

above ssthresh. Here, for every ACK received cwnd is increased by 1/cwnd segments per

round trip time [13]. The TCP sender will come to know of the congestion in the network

either through a timeout (while waiting for an ACK from the receiver) or through three

duplicate ACKs. When the TCP sender gets either of this, it sets the value of cwnd and

the value of ssthresh to one-half of the current value [3, 13, 14].

2.1.2. TCP Friendliness

A non-TCP connection is defined as “TCP-friendly” if it receives the same share

of bandwidth as a TCP connection would receive under the same circumstances [15].

Floyd et al., defines non-TCP flows as TCP-friendly when their long-term throughput

does not exceed the throughput of a conformant TCP flow under the same conditions [16].

Also in [15] “a flow is defined as TCP-friendly if other TCP connections’ sharing the

same bottleneck link as it does not receive less bandwidth in the long term than they

would receive if the flow in concern is also a TCP connection possibly with a short RTT”.

TCP Friendliness for Unicast - A unicast flow is considered TCP-friendly when it does

not reduce the long-term throughput of any co-existent TCP flow more than another TCP

flow on the same path would under the same network conditions [70].

Page 20: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

9

TCP Friendliness for Multicast - A multicast flow is defined as TCP-friendly when for

each sender-receiver pair, the multicast flow has the property of being unicast TCP-

friendly [70].

The major advantage of TCP friendliness is that it ensures that coexisting TCP flows are

given a “fair share” of bandwidth by non-TCP flows (such as UDP flows), that is the

non-TCP flow should not consume more bandwidth than the competing TCP flow. This

does not necessarily mean that all TCP and TCP-friendly flows on a bottleneck link

receive the same throughput [70]. Even competing flows that use only TCP for

congestion control will often not receive the same amount of bandwidth [70].

2.1.3. TCP-Friendly Rate Control

If a unicast flow needs its data to be transferred reliably and quickly, it can

directly use TCP for data transfer [18]. But the TCP-friendly Rate Control protocol

(TFRC) mechanism is designed to support applications that require a smoother, more

predictable transmission rate than TCP can achieve [18, 71]. As a result the effect of this

smoothness is a more moderate response to transient changes in congestion. TFRC works

based on the TCP throughput equation (equation-based) and it is basically designed for

unicast flows for congestion control which usually runs over UDP [71]. Equation-based

congestion control is designed mainly to not to be so aggressive in terms of available

bandwidth, but also to maintain a relatively steady sending rate at the same time being

responsive to congestion [18, 71]. The following design principles of equation-based

congestion control are contrasting to the behavior of TCP [71]:

Page 21: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

10

It should not probe for available bandwidth aggressively. And increase the

sending rate slowly in response to a decrease in the loss event rate [71].

It should not reduce the sending rate to half (as in TCP) in response to a single

loss event (instead of a packet loss). When there is congestion, it should react to

congestion in a manner that ensures TCP-compatibility [71].

The receiver should send feedback to the sender at least once per round-trip time

if it has received any packets in that interval [71].

In case if the sender has not received any feedback after several round-trip times,

then the sender should reduce its sending rate, and ultimately stop sending

completely. This prevents the sending of unnecessary packets in case of a severe

network failure where (almost) all packets are dropped [71].

2.1.4. TFRC Protocol

TFRC is a receiver based rate control mechanism where the congestion control

information is processed at the receiver and not at the sender. In order to compete fairly

with TCP flows, TFRC uses the TCP throughput equation, which roughly describes

TCP’s sending rate as a function of loss event rate and round trip time [19]. The currently

recommended TCP throughput equation to be used for TFRC is a simplified version of

throughput equation for Reno TCP [19]. The equation is as follows:

)]321(8

33[3

2 2ppbpRTObpR

sX++

=

where,

X is the transmit rate in bytes/second

s is the packet size in bytes.

Page 22: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

11

R is the round trip time in seconds

p is the loss event rate of the number of loss events as a fraction of the number of

packets transmitted

RTO is the TCP retransmission timeout value in seconds

b is the number of packets acknowledged by a single TCP ACK.

TFRC has been designed for applications that uses a fixed packet size ‘s’, and vary the

sending rate in packets per second to respond to congestion [19]. For applications that

needs to vary their packet size and keep a fixed sending rate should use a variant of

TFRC called TFRC-PS (TFRC-PacketSize) for congestion control [19].

The TFRC mechanism works as follows [19]:

The receiver measures the packet loss event rate p and feedbacks this information

to the sender.

The sender upon receipt of this feedback message uses it to measure the round trip

time R.

Next the loss event rate and RTT are fed by the sender into the above throughput

equation to compute the acceptable sending rate.

The sender then adjusts it’s transmit rate to match the calculated rate.

TFRC calculates the “loss event rate” instead of simply taking the “packet loss rate”.

“Packet loss rate” is nothing but the number of lost packets over the total number of

packets transmitted. But a “loss event” contains one or more packets lost within an RTT.

The “loss event rate” is measured over a certain time interval [19]. The default method

that TFRC uses for calculating the loss event rate is the average loss interval, i.e. a

weighted average of recent intervals between packet losses is computed.

Page 23: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

12

2.1.5. Self-Similarity in Network Traffic

A self-similar phenomenon shows structural similarities over wide range of

timescales [39]. Network traffic that exhibits burstiness over varying timescales can be

shown statistically using the notion of self-similarity (or modeled using self-similar

notations) [39]. The concept of self-similarity is associated with “fractals”, which are

nothing but objects whose appearances are unchanged regardless of the scale at which

they are viewed [20, 39]. For stochastic objects like time series, self-similarity is used in

the distributed sense – when viewed at varying timescales, irrespective of the level of

aggregation (different level of data sets), the object’s relational structure remains

unchanged. Such a time series exhibits burstiness over wide range of timescales [39].

2.1.5.1. Definition

o Let X = (Xk: k > 0) be a stationary random process representing the amount of data

transmitted in consecutive short time periods [49].

o Let ∑+−=

=km

mkii

mk XmX

1)1(

)( /1 , where m ≥ 1. )0:( )()( >= kXX mk

m denotes the m-

aggregated process [49].

o X is self-similar if X and m1-H X(m) (aggregated processes) have the same variance and

autocorrelation (with Hurst parameter H; 0.5 < H < 1) [49].

2.1.5.2. Long-range Dependency (LRD)

Long-range dependent processes can be characterized by an autocorrelation

function which decays hyperbolically [39]. Also the autocorrelation function is non-

summable, in contrast to the more conventional short-range dependent processes, which

Page 24: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

13

decays exponentially [21, 39]. Another important characteristic of LRD traffic is the

queue length decays much more slowly, that is hyperbolically, compared to short-range

dependent (SRD) traffic sources such as Poisson sources that decays exponentially [39].

• Definition: Autocorrelation r(k) ~ k-β, as k → ∞, this means the process follows a

power law, instead of decaying exponentially (0 < β < 1) [72].

Where β is related to the Hurst parameter as H = 1 – β/2, and in this case the self-similar

process shows long-range dependency if 0.5 < H < 1. Long-range dependence intuitively

reflects the persistence phenomenon in self-similar process, i.e., the existence of

clustering and bursty characteristics at all time scales.

2.1.5.3. Heavy-tailed Distributions

Heavy-tailed distributions can be used to characterize probability densities that

describe traffic processes such as packet inter-arrival times and burst lengths [73]. The

distribution of a random variable X is said to be heavy tailed if

1 – F(x) = Pr [X > x] ~ 1/xα as x → ∞, 0 < α [73]

In general, a random variable with a heavy-tailed distribution exhibits a high or even

infinite variance [73]. The simplest heavy-tailed distribution is the Pareto distribution

with parameters k and α (k, α > 0), with density and distribution functions

f (x) = F(x) = 0 ; (x ≤ k)

1

)(+

⎟⎠⎞

⎜⎝⎛=

ααxk

kxf ,

α

⎟⎠⎞

⎜⎝⎛−=

xkxF 1)( ; (x > k; α > 0) [73]

And a mean value

kXE1

][−

=αα ; (α > 1) [73]

Page 25: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

14

The parameter k specifies the minimum value that the random variable can take. The

parameter α determines the mean and variance of the random variable: If α ≤ 2, then the

distribution has infinite variance, and if α ≤ 1, it has infinite mean and variance [73].

Usually, the tail of the Pareto distribution decays much more slowly than exponential and

hence the distribution is called heavy tailed distribution.

2.1.5.4. Hurst Parameter – The Measure of Self-Similarity

Hurst parameter H is a measure of the level of self-similarity of a time series. H

takes values from 0.5 to 1. In order to determine if a given series exhibits self-similarity,

a method is needed to estimate H for a given series. The following are the approaches for

H parameter estimation [22, 23]:

o Analysis of the rescaled (R/S) statistic for different block sizes (R/S method).

o Analysis of the variances of the aggregated processes X(m) (Aggregated Variance

method).

o Whittle’s estimator.

o Periodogram.

o Wavelets.

Self-similar processes provide an elegant explanation of an empirical law known as

Hurst’s law or Hurst effect. For a stochastic process X defined in discrete time {Xj: j = 1,

2, …, n}, the rescaled range of X over a time interval n is defined as the ratio R/S:

{ } { })var(

...,,2,1:min...,,2,1:maxX

niWniWSR ii =−==

where ∑∑ ====−=

n

i ii

k ki Xn

XandniXXW11

1...,,2,1),(

Page 26: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

15

It can be proven [22] for any stationary process with LRD that the ratio R/S has the

following characteristics for large n:

HnSR

⎟⎠⎞

⎜⎝⎛≈

2

which is known under the name Hurst effect. Thus if we plot R/S versus n on a log-log

graph log (R/S) ≈ H log (n) – H log 2, the plot should fit a straight line with slope H.

2.1.5.5. Causes of Self-Similarity

Self-similar phenomenon is believed to have considerable effect on network

performance, this shows that the causes of self-similarity is to be understood [39].

Crovella et al. [24] prove that web traffic (traffic generated by World Wide Web transfers)

shows self-similar characteristics [39]. In web traffic (HTTP traffic), browser sessions

correspond to ON/OFF processes. While ON sessions are the times during which packets

arrive at regular intervals (transmission of web files) and the OFF sessions are periods

with no packet arrivals (user’s idle periods) [24].

Crovella et al. [24] found that ON time distribution was heavier-tailed than the

OFF time distribution [39]. They concluded that the distribution of file sizes in the web

might be the primary cause of web traffic self-similarity [39]. Also, Park et al. [25]

showed that the transfer of files whose sizes are drawn from a heavy-tailed distribution is

enough to generate self-similarity in network traffic [39]. Considering a real network

scenario, the degree to which file sizes are heavy-tailed can directly determine the degree

of traffic of self-similarity at the link level [25, 26, 39]. This causal relation is proven to

have a significant impact with respect to changes in network resources, network topology,

the influence of cross-traffic, and the distribution of inter-arrival times [39].

Page 27: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

16

2.1.6. Random Early Detection (RED)

TCP’s congestion control is an end-to-end mechanism. Two router-based

mechanisms proposed for congestion control are: Random Early Detection (RED) – an

active queuing mechanism for controlling the average queue size and reducing

unnecessary packet drops, and Explicit Congestion Notification (ECN) – which builds on

active queue management, and allows routers the option of marking packets rather than

dropping packets as an indication of congestion to the end nodes. The most important

example of proactive packet discard is RED introduced in [5]. The following are the ideal

characteristics of RED:

• Congestion avoidance: RED is designed to avoid congestion rather than reacting to

it. RED will detect the onset of congestion to maintain the network in a region of low

delay and high throughput.

• Global synchronization avoidance: When the onset of congestion is recognized, the

router will decide which connection (or connections) to notify to back off. In current

implementations, this notification is implicit and provided by dropping packets. By

detecting congestion early and notifying only as many connections as necessary,

global synchronization is avoided.

• Avoidance of bias against bursty traffic: The onset of congestion is likely to occur

with the arrival of a burst of traffic from one or a few sources. This burst adds to the

burden already supported at the router. If only arriving packets are selected for

dropping, then it is likely that the discard algorithm will be biased against burst

sources as compared to smooth sources with the same average traffic.

Page 28: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

17

• Bound on average queue length: RED should be able to control the average queue

size and therefore control the average delay.

RED maintains a long term average of the queue length (buffer occupancy) of a router

using a low-pass filter. If this average queue length falls below a certain minimum

threshold, all packets are admitted into the queue. If the average queue length exceeds a

certain maximum threshold, all incoming packets are dropped. When the queue length

lies between the minimum and maximum thresholds, incoming packets are

dropped/marked with a linearly increasing probability up to a maximum drop probability

value, Pmax. RED includes an option known as the ‘gentle’ variant, where the packet drop

probability varies linearly from Pmax to 1 as the average queue size varies from maximum

threshold to twice the maximum threshold.

2.1.7. Explicit Congestion Notification (ECN)

Explicit Congestion Notification is a mechanism proposed as an extension to

RED which marks a packet instead of dropping it when the average queue size is between

minth and maxth [8, 4]. ECN mechanism is basically useful for protocols like TCP which

is sensitive to even a single packet drop, as ECN scheme marks packets (notifying

incipient congestion) before the actual congestion occurs [8]. When the receiver receives

a marked packet it subsequently notifies the sender about incipient congestion in the

network. After receiving this feedback, the sender will invoke the TCP congestion

avoidance algorithm [8, 4]. The ECN scheme needs coordination from both the router

and also from the end hosts. Non-ECN flows will follow the normal RED procedure that

is when they exceed the queue limit they will continue to be dropped by RED [8].

Page 29: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

18

2.1.7.1. Implementation of ECN

When the average queue size goes between minth and maxth the router will mark

packets if the flow is ECN enabled. Support for ECN at the router can be given by

altering current RED implementations [8, 4].

The sender host sets the ECN Capable Transport indicator (ECT) bit at bit 6 of the

IP header Service Type field provided if both the end hosts are ECN capable [8, 4]. When

a packet that is traversing the network encounters congestion it is marked by the router

using the Congestion Experienced (CE) bit at bit 7 of the IP header Service Type field (if

the average queue size is between minth and maxth) on their way to the receiver host

(from the sender host), with a probability proportional to their bandwidth usage similar to

the procedure used in RED [6] routers [8, 4].

TCP modifications at the host side for adding ECN requires two new flags in the

reserved field of the TCP header, here bit 9 is used as the ECN-Echo (ECE) flag and bit 8

is used as the Congestion Window Reduced (CWR) notification flag [8, 4].

2.1.7.2. Functional Description of ECN

The following points describe the connection setup for ECN capable flows, as

well as subsequent behavior of TCP for ECN flows, in case there is congestion

experienced in the network.

In the connection setup phase, the source and the destination TCP hosts have to

exchange information about their desire and/or capability to use ECN. This is

done by setting both the ECN-Echo flag and the CWR flag in the SYN packet of

the initial connection phase by the sender; on receipt of this SYN packet, the

Page 30: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

19

receiver will set the ECN-Echo flag in the SYN-ACK response. Once this

agreement has been reached, the sender will thereon set the ECT bit in the IP

header of data packets for that flow, to indicate to the network that it is capable

and willing to participate in ECN.

When a router experiences congestion it sets the CE bit in the IP header if the IP-

ECT bit is set. When such a packet reaches the receiver, it responds by setting the

ECN-Echo flag (in TCP header) in the next outgoing ACK for the flow. It will

continue to do this in subsequent ACKs till it receives from the sender an

indication that the sender has responded to the congestion notification.

Upon receipt of this ACK, the sender triggers its congestion avoidance algorithm

by halving its congestion window (cwnd) and updating its congestion window

threshold value (ssthresh). Once it has taken these appropriate steps, the sender

sets the CWR bit on the next outgoing packet to tell the receiver that it has reacted

to the receiver’s notification of congestion. The receiver reacts to the CWR by

halting the sending of the congestion notifications (ECE) to the sender if there is

no new congestion in the network.

2.1.8. Backward Explicit Congestion Notification (BECN)

Backward Explicit Congestion Notification (BECN) is an alternative approach to

the current ECN mechanism involving the use of an existing IP signaling mechanism, the

Internet Control Message Protocol (ICMP) Source Quench message. It has been

suggested by Hadi et al in [9]. The use of ICMP Source Quench (ISQ) allows a basic

ECN mechanism for IP, which does not require any negotiation between end systems.

Congestion notification is kept at the network (IP) level. The congestion state can be

Page 31: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

20

reflected up to the transport layer (e.g. TCP or UDP) for appropriate action. The authors

in their draft believe that the ISQ based approach reduces the reaction time to congestion

in the network.

In addition, they have proposed a mechanism in which the ISQ message can

include information on the severity of congestion, allowing the end host to react

accordingly so as to make maximal use of the resources and thereby maximizing network

utilization. It is termed as MECN (Multiple Explicit Congestion Notification). In MECN,

the ISQ message sent back to the sender will include the information of the severity of

congestion and the sender, based on this information will adjust its cwnd. In this thesis,

we limit ourselves to BECN, its implementation and evaluation. IP currently does not

have any adhered mechanism to notify its transport protocols of network congestion

problems. ISQ’s have been used in the past for congestion notification. TCP implements

its own congestion control algorithm to infer congestion as explained earlier.

2.1.8.1. Benefits of BECN over ECN

Following are some of the drawbacks that are intuitive in case of ECN but

eliminated/avoided in case of BECN.

BECN uses existing network layer signaling and does not require the use of any

transport layer protocol for congestion notification. Therefore, it is protocol

independent and can be used by other transport protocols such as UDP.

BECN has certain advantages of ECN over TCP with RED. This is due to the fact

that for both ECN and BECN, packets are marked probabilistically and not

dropped. Advantages include lower packet loss rates, reduction in number of TCP

Page 32: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

21

timeouts and retransmissions, faster congestion notification, and lower packet

delay.

ECN is coupled to the transport layer (TCP) via the use of header information

(ECE) bit. To extend this proposal to other transport protocols will require

changes to each of their respective headers. BECN proposed to decouple the

transport level protocols and use the source quench mechanism to notify the

transport layer of congestion problems. This provides the value that all IP

transport protocols are notified in the same manner about network congestion.

Here we will be considering the effects of BECN for TCP (excluding UDP).

ECN requires the congestion notification to incur a round trip time (RTT) before

the sender can react (since the sender has to wait for the acknowledgement of a

packet before it gets notified of incipient congestion). This might create problems

in case of a path with high bandwidth-delay product for the following reasons

[74]: (i) The case where the bandwidth-delay product is dominated by high

bandwidth, a large amount of traffic will pass through the intermediate routers

causing an increase in the level of congestion before the sender is notified of

incipient congestion [74]. (ii) The case where the bandwidth-delay product is

dominated by high latency/RTT (for ex. as in satellite networks), it will take too

long to react to the congestion. In both cases, the efficient use of available

bandwidth is affected [74]. BECN avoids this by having the router send the

congestion notification as soon as congestion occurs in the router to the sender.

BECN mechanism allows the development in the future of multi-level congestion

feedback schemes. Currently, this has not been possible since both the duplicate

Page 33: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

22

ACKs and ECN schemes cannot carry multi-level congestion feedback

notification. With the use ISQs there is a possibility for multi-level feedback. Due

to the binary nature of the feedback of ECN, the reaction is limited to halving the

window size even if the congestion level is very low. Network resources could be

more effectively utilized if the feedback was indicative of the congestion level at

the overloaded point in the network. This is explained in the draft [9] under

MECN.

2.1.8.2. Implementation Issues for BECN

We discuss as to why the use of ISQ’s for congestion notification was

discouraged and what arguments are put forth by the proponents of BECN for the use of

ISQ’s.

Router CPU’s inefficient use while processing these extra messages – the authors

argue that CPU time is no longer a constrained resource today. It has been shown

[5] that when using RED (with cooperating end systems) less packet drops happen

at the router in comparison to the traditional drop-tail algorithms used in

disapproving ISQ. This implies the amount of processing needed at the router is

reduced. Further faster reaction to congestion is provided but ISQ’s would

alleviate it faster, resulting in further reductions.

Bandwidth consumption on reverse path – ISQ’s are supposed to consume too

much bandwidth in the reverse path because of drop-tail i.e. once the maximum

capacity of queue is reached all incoming packets will be dropped, thus

generating a lot of ISQ’s. However due to RED being a part in BECN, ISQ’s will

Page 34: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

23

be generated at a rate proportional to the connection’s share of the bandwidth at

the congested router. Given this scheme, which addresses congested routers

sequentially on a downstream path, it can be argued that the reverse path even if it

is the same as the forward path, is probably not really congested since it covers

the path only to the first point of congestion along that path. In this work, we also

confirm that for the considered scenarios, the contribution of ISQs to reverse

traffic in a BECN capable network does not significantly impact performance of

BECN.

It has been argued that BECN is not a general solution, particularly for multicast

as some connections can have receiver-based congestion control instead of

sender-based congestion control [66]. And in addition, one would not like to have

a "Source Quench" implosion in a multicast tree. However, it has also been

pointed out that with sender-based multicast congestion control, the BECN

feedback mechanism is more scalable than earlier proposals for feedback control

in multicast environments since it is provided by the router not by all the receivers

in a multicast session [67].

Another concern from [66], pointed that network stability would be affected when

source quench packets are lost on the reverse path. It is observed that during

persistent congestion this condition is no worse than the loss of ECN-Echo ACK

[4] in the case of ECN, since ISQs continue to be generated irrespective of the

previous one. We consider a scenario with “reverse lossy links”, and address this

particular problem.

Page 35: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

24

2.2. Related Work

2.2.1. Related work on TCP-friendly Rate Control

Huge amount of work has been contributed to the field of TCP modeling and

validation [27]. Especially, the important papers on TCP throughput estimation and

simple model for TCP throughput [2, 28, 29] which give a thorough analysis of TCP

modeling make a major contribution. The TCP throughput equation in this work is

considered by most of the current work on modeling for TCP and TCP-friendly protocols

as a base equation and methodology for their modeling approach apart from other

approaches [30, 31].

In TEAR (TCP Emulation at the Receivers) the receivers estimate a TCP-friendly

rate and adjust their receiving rates without actually modulating the rates to probe for

spare bandwidth [32]. Actually, the receiver emulates congestion window modifications

of a TCP sender and translates it from a window-based to a rate-based congestion control

mechanism [75]. The receiver does this by maintaining an exponentially weighted

moving average of the congestion window, and divides it by the estimated RTT to

calculate a TCP-friendly sending rate [75]. In [33], TCP’s increase by one, decrease by

half behavior is extended to arbitrary increase and decrease factors. The resulting

protocol is called general AIMD (GAIMD). The authors analyze the impact of these

factors on the long-term sending rate of GAIMD and examine which relationship

between the factors results in TCP-friendliness. The so-called binomial congestion

control mechanisms proposed in [34] allow for even higher flexibility in the

increase/decrease policy. The authors show which combinations of parameters result in

TCP-friendliness and give an in-depth analysis of some specific parameter combinations.

Page 36: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

25

A class of unicast congestion control mechanisms one step removed from those of

TCP are those that use additive increase multiplicative decrease (AIMD) in some form,

but do not apply AIMD to a congestion window. The Rate Adaptation Protocol (RAP)

[35] is an end-to-end AIMD mechanism designed for unicast flows. RAP is a receiver

based mechanism where each packet is acknowledged by the receiver and the ACKs are

used to detect packet loss, to calculate round-trip time [35, 70]. When there is congestion

the sending rate is halved and for periods without congestion sending rate is increased by

one packet per RTT, which is similar to the AIMD mechanism [35, 70]. Once every RTT

whether to increase or decrease the rate will be decided. In order to provide additional

fine-grained delay-based congestion avoidance, the ratio of a short-term average RTT and

a long term average RTT is used to adjust the inter-packet gap between successive data

packets [35, 70]. This will result in a smoother sending rate without consuming excessive

bandwidth [35]. In a scenario where TCP experiences no or few timeouts, RAP will

achieve rates similar to that of TCP, as RAP’s rate reductions resemble TCP’s reaction to

triple duplicate ACKs [35, 70]. RAP does not take timeouts into account and is more

aggressive when TCP’s throughput is dominated by timeout events [35, 70].

The TCP-Friendly Rate Control Protocol (TFRCP) [36] uses an equation-based

congestion control mechanism for unicast traffic where the receiver acknowledges each

packet. At fixed time intervals, the sender computes the loss rate observed during the

previous interval and updates the sending rate using the TCP response function described

in [2]. Since the protocol adjusts its send rate only at fixed time intervals, the transient

response of the protocol is poor at lower time scales. In addition, computing loss rates at

fixed time intervals makes the protocol vulnerable to changes in RTT and sending rate.

Page 37: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

26

2.2.2. Related work on Self-Similarity, Long-range Dependence and its

Impact on Network Performance

Analytical studies in the literature shows that self-similar network traffic can have

a detrimental impact on network performance, including amplified queuing delay and

packet loss rate [25, 37, 26]. A practical effect of self-similarity is that the buffers needed

at switches and multiplexers must be bigger than those predicted by traditional queuing

analysis and simulations. These large buffers create greater delays in individual streams

than originally expected [21, 26]. Apart from this, QoS considerations are another issue

for real-time multimedia communication that has created further complexities to the

problem of optimizing performance. Another study has shown that queuing delay

exhibited a superlinear dependence on self-similarity when the buffer capacity was large

[38, 37]. The queue length distribution decayed more slowly for long-range dependent

(LRD) sources than short-range dependent (SRD) sources.

For multimedia traffic, the effect of self-similarity on network performance is

modulated by the protocols acting at the transport/network layer. An exponential tradeoff

relationship was observed between queuing delay and packet loss rate [37].

Network performance as captured by throughput, packet loss rate, and packet

retransmission rate degrades gradually with increasing heavy-tailedness. The degree to

which heavy-tailedness affects self-similarity is determined by how well congestion

control is able to shape its source traffic into an on-average constant output stream while

conserving a flow [37, 39]. Congestion prevention by appropriate sizing of switches and

multiplexers is difficult because data network traffic does not exhibit a predictable level

of busy traffic periods, where patterns can change over a period of days, weeks, months,

Page 38: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

27

and congestion can occur unpredictably with higher intensity. To tackle this problem,

predictive congestion control was studied for improving network performance by Tuan

and Park [26]. In their work, information about the future is utilized to make traffic

control decisions which they call as Selective Aggressiveness Control (SAC). SAC tries

to aggressively soak up bandwidth if it predicts the future network state to be “idle,”

adjusting the level of aggressiveness as a function of the predicted idleness and its

confidence. The authors in [26] showed that the performance gain through SAC will be

higher the more self-similar the network traffic is.

Packet loss and retransmission rate decline smoothly as self-similarity is increased

under reliable flow-controlled packet transport [25]. In the context of facilitating

multimedia traffic such as video and voice in a best-effort manner while satisfying their

diverse QoS requirements, low packet loss, on an average it can only be achieved at a

significant increase in queuing delay. High bandwidth communication links for

multimedia applications should be employed to alleviate the exponential trade-off

between queuing delay and packet loss for supporting QoS-sensitive traffic.

For data traffic (non-multimedia traffic), such as FTP, it is found that data

connections within a single FTP session (which are initiated whenever the user lists a

directory or transfers a file) exhibits burstiness (self-similarity) [40]. Commonly used

Poisson models seriously underestimate the burstiness of TCP traffic over wide range of

timescales. For interactive TELNET traffic, connection arrivals are well modeled as

Poisson. However, the Poisson assumption for packet arrivals, namely, exponentially

distributed inter-arrival times, significantly underestimates the burstiness of the traffic,

Page 39: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

28

while for bulk transfers performed by FTP, the traffic structure differs markedly from

Poisson.

The other predominant data traffic, WWW, is found to exhibit a consistent

behavior with self-similar traffic models. Reports on a study of Web traffic showed that

the pattern generated by the browsers was self-similar [24]. The causes for the presence

of self-similarity in web traffic can be traced to the heavy-tailed distribution of web file

sizes. By looking at the size of the WWW transfers from servers back to browsers it is

found that the tail of the distribution followed a Pareto-type (heavy-tailed) distribution.

Multimedia files contribute to very large files, which is more popular on the web. This is

due to the explicit support for multimedia formats that might encourage larger files,

thereby increasing the tail weight of distribution sizes.

Recent studies have shown that round trip delay (RTT) in the Internet is found to

be self-similar in nature [41, 42]. Packet delay characteristic is an important network

parameter especially in feedback-control based network protocols. The literature [43, 44]

studies the impact of packet delay self-similarity on TCP. It indicates that the queuing

delay of self-similar traffic is the reason for self-similar nature of packet delay. It is

important to evaluate the effects of RTT self-similarity on TCP as its impact and

performance depends on the round trip packet delay (RTT). Since RTT is found to be

self-similar, it will affect the calculation of RTO (Retransmission Timeout) which is

dependent on RTT. Based on RTT and RTO, TCP throughput is calculated. As RTT is

found to be self-similar, it will have a major impact on the TCP throughput performance.

This might be the case with TCP-friendly protocols (as it is dependent on RTT, RTO, and

TCP throughput). Some of the implications are as follows [43, 44]:

Page 40: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

29

1. Self-Similarity of traffic volume is one of the factors, which generate the RTT Self-

Similarity. There is a correlation between traffic volume and RTT Self-Similarities.

2. The long range dependence (LRD) of RTT makes the variability of file forwarding

time high. This may create severe fairness problem among TCP connections in terms

of steady communication.

3. The impact of RTT self-similarity on RTO makes way for more frequent unnecessary

timeouts. If unnecessary timeout occurs continuously, network utilization will

decrease remarkably due to the TCP rate control algorithm.

There are many contributions for the Long-range Dependence (LRD) and Self-Similar

behavior of TCP and RTT, which motivated us to study the traffic characterization, self-

similarity and its impact on TCP-friendly protocols. Many papers in the literature have

argued that self-similarity in data networks can be induced by application layer protocols

[24, 45, 40, 46, 47, 48]. It is demonstrated how the induced self-similarity is propagated

and spread in the network by lower layer adaptive protocols, in specific, by TCP, which

represents the dominant transport protocol of the Internet [49]. The effect and the causes

of self-similarity in TCP and UDP transport protocols are investigated in [50, 25, 37] and

it is proved that TCP preserves long-range dependence (LRD) from application to link

layer. The authors [50, 51] argue that “transport mechanisms affect strongly the short

timescale behavior of traffic, but they have no impact on large timescales”. It is shown

that “TCP can inherit self-similarity from a self-similar background traffic stream”. In

this work, we study whether the self-similar effect of UDP or TCP affects TCP-friendly

traffic flows while competing to achieve a fair share with co-existent TCP flows.

Page 41: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

30

2.2.3. Related Work on ECN

ECN mechanism for TCP/IP networks as a means to explicitly notify end-hosts of

incipient network congestion by marking packets instead of dropping was suggested and

evaluated by Floyd [7]. Later, RFC 2481 explained the required behavior for end-to-end

hosts and routers for implementing ECN in TCP/IP networks [4]. Hadi Salim et al in RFC

2884 [8] evaluated the performance of ECN versus random early drop mechanisms. They

showed that using ECN, timeouts and triple duplicate ACKs are significantly reduced and

better goodput is obtained. Kwon and Fahmy proposed modifications for the TCP sender

response to ECN which improves goodput and reduces rate fluctuations and delay

variance in a multiple bottleneck scenario [3].

There has been lot of contributions on modeling and evaluation of TCP with ECN

[52, 53, 54]. For most studies published to date, the AQM (Active Queue Management)

underlying ECN has been Random Early Detection (RED) [5]. In [8] the authors use a

Linux based test-bed network to study the performance advantage of TCP with ECN in

terms of throughput for both bulk and transactional transfers. Their findings include:

increased relative advantage for TCP/ECN over standard TCP when congestion levels

increase; limited number of retransmission when ECN is employed; and less time spent

in error recovery. Another study [55] evaluates TCP performance under RED and Drop

Tail (DT) examining different scenarios including, long and short transfers, different

RTTs, mix of TCP and UDP traffic and two-way traffic. Recent study [56] analyses the

case where infrequent random drops are happening in the network (simulating errors in a

wireless environment), and conclude that ECN can help to increase TCP’s performance

in hybrid wired/wireless networks.

Page 42: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

31

2.2.4. Related work on BECN

BECN mechanism has been used earlier in non-IP networks [57, 58]. BECN for

IP networks was first proposed by Hadi Salim et al [9] which provided guidelines for

generating ISQs and responding to them in a TCP/IP network. According to this work, a

BECN TCP sender responds to an ISQ notification by halving its congestion window.

Recently, Akujobi et al [10] proposed an enhanced BECN algorithm where the TCP

sender upon receipt of a congestion notification (through ISQ) will reduce its congestion

window and waits an RTT before it starts increasing the window. We use this algorithm

in our performance analysis. In [59], a mechanism which is somewhat similar to BECN

using ISQ is studied to regulate unresponsive UDP flows. There is a growing concern

about the ICMP Source Quenches that it will impose extra reverse traffic. RFC 896 [60]

reports that appropriate handling of ISQs results in measurable benefits for the network.

The ISQ messaging was originally standardized as a mechanism to explicitly

notify end hosts when congestion arises in the network [10, 61]. However, the conditions

to generate an ISQ by the router in case of congestion and how the end hosts should react

for an ISQ was not standardized nor implemented [10]. RFC 1812 [62] specifies that a

router must be able to limit the rate at which it generates ISQ messages to the source host

in order to avoid reverse traffic congestion [10]. Moreover, Floyd [7] considers ISQs as

one of the able router-level mechanisms to explicitly notify the TCP source host about

congestion apart from the proposed ECN [10].

Other works include proposal of Multi-Level ECN [63, 64], which is a

modification to ECN, where the marking information is carried using 2 bits instead of 1

Page 43: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

32

bit. Here, the TCP source reaction was modified so that it takes advantage of the extra

information about congestion and adapts faster to the changing scenario.

Page 44: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

33

Chapter 3

Characterization of TCP-Friendly Rate Control (TFRC) Flows

3.1. Introduction

In the current scenario, a wide variety of multimedia applications have emerged,

each with different traffic characteristics at optimized performance to be carried by both

wired and wireless networks [1]. Models of the traffic offered to the network or a

component of the network will be critical to providing high quality of service (QoS).

Traffic models are used as the input to analytical or simulation studies of resource

allocation strategies. Traffic can be viewed either at the application or packet level. An

example of the application level view is the offered traffic of a videoconference between

three parties. The packet level traffic model is given by a stochastic model that mimics

the arrival process of packets associated with this application reasonably well [39]. In our

work, we consider the application level traffic.

We characterize the TFRC flows for continuous media applications in the Internet

through real-time measurements at the application level, and study its impacts on network

performance with respect to packet inter-arrival times, packet delay and packet loss rate.

Page 45: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

34

3.2. Experiments

We conducted real-time passive measurements in order to analyze and

characterize the TFRC flows and observe its impact on network performance with respect

to packet inter-arrival times, packet delay and packet loss rate, over wide range of

timescales. Measurements were done real-time on Internet2 (Figure 1), with the TFRC

implementations running on the sender and the receiver. Experiments were done from

CiRA to TOKXP (see Fig. 1) with continuous media applications running over TFRC.

The following quantities were measured:

1. Packet inter-arrival times

2. Packet loss rate

3. Packet delay

Figure 1: Real-time Internet 2 measurement setup1

3.2.1. Packet Inter-arrival Time Measurement

Network traffic for the experiments comprises continuous media flows and mixed

traffic running for different durations: 2-days, 4-days and 1-week. The sender transmits a

mixture of files (multimedia, mixed traffic) to the receiver. Packets were captured and

1 Since conducting experiments, Cisco 7507 San Jose POP has moved to Seattle POP

CiRA CiR7505

SingAREN

Cisco7513Singapore

POP

Cisco7507San Jose (US)

POP

TOKXP, Japan

Internet 2

Page 46: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

35

packet inter-arrival times were collected at the receiver. Using the obtained packet inter-

arrival times, time-series analyses are made and tests for Long-range Dependence (LRD)

are conducted using statistical tools.

3.2.2. Packet Delay Measurement

The aim of this experiment is to examine the correlation between packet loss and

the delay of the previous packet. Clocks at both the sender and receiver are initially

synchronized by adjusting the system time on both the machines. Each packet contains a

sequence number (to measure packet loss rate) and is time-stamped when it leaves the

sender (t1). Once the receiver receives a packet, it adds a time-stamp (t2) and upon

receiving the feedback the sender adds a third time-stamp (t3). Data is collected at both

the source and the destination with timestamps to calculate end-to-end delay.

Experiments were repeated for different durations such as 400 sec, 600 sec, and 800 sec.

Once the experiment is started the clock synchronization lasts for a few milliseconds

before drifting apart. There is a frequency drift in the delay values after a few

milliseconds from the start of the experiment.

3.3. Results

According to our results and analysis, “packet inter-arrival times” for TCP-

Friendly rate control protocol (TFRC) flows tend to be “bursty” over wide range of

timescales and in turn exhibit Long-Range Dependence (LRD) behavior. This is

confirmed using the standard Hurst (H) parameter estimation for real experimental data.

Page 47: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

36

The method used for estimation of “H” parameter is R/S analysis [22, 23]. The R/S plot

uses the fact that for self-similar data, the rescaled range or R/S statistic grows according

to a power law with exponent H as a function of the number of points (number of

samples) included, n. Thus the plot of R/S against n on a log-log plot has a slope which is

an estimate of H. If we plot R/S versus n on a log-log graph: log (R/S) ≈ H log (n) – H

log 2, the plot should fit a straight line with slope H. Here we show the plot taken from

R/S analysis for continuous media traffic, 2 – day data collected from CiRA to TOKXP

(Fig. 2). Results also show that TFRC flows tend to be “bursty” over wide range of

timescales irrespective of the levels of aggregation (Figs. 3 and 4). Table 1 shows the

estimate of H values by R/S method for the measured packet inter-arrival times from

CiRA to TOKXP:

Table 1: Estimate of H values by R/S method

Hurst Parameter values H Estimation

2 – day Data 4 – day Data 1 week Data

R/S Method [Continuous media

Traffic]

0.71 0.88 0.95

Based on the “H” estimation, the larger values of “H” suggest a higher degree of

persistent variability in the data (burstiness factor persists). Higher values of H indicate

that buffer requirements start to increase depending on the utilization level (it would

increase as the utilization increases, i.e. higher degree of long-range dependence) [39].

Considering earlier results that of continuous media traffic over UDP [65] exhibiting

long-range dependence [76, 77], here in our tests it is not different for continuous media

flows running over a rate control protocol like TFRC.

Page 48: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

37

Figure 2: Estimate of the Hurst Parameter by R/S method for real-time measurement (Packet inter-arrival times) (2 – day data)

Figure 3: Estimate of the Hurst Parameter by R/S method for real-time measurement (Packet inter-arrival times) (4 – day data)

H = 0.71

log10(n)

H = 0.88

log10(n)

Page 49: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

38

Figure 4: Estimate of the Hurst Parameter by R/S method for real-time measurement (Packet inter-arrival times) (1 – week data)

3.3.1. Correlation of packet inter-arrival times

The histogram plot (Fig. 5) for packet inter-arrival times at the receiving application

shows multimodal characteristics. The multimodal characteristics may be due to the load

generated on the network by a mixture of applications with different characteristics. The

correlation coefficient (k) is calculated for the packet inter-arrival times data and it tends

to be highly correlated (k = +0.81).

H = 0.95

log10(n)

Page 50: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

39

Figure 5: Histogram plot for packet inter-arrival times

3.3.2. Correlation between delay and loss

In the packet delay measurement, loss rates are plotted against the delay value of the

previous packet. We define the following:

N: length of a trace

i: packet sequence number, 1 ≤ i ≤ N

li: indicates a loss

⎩⎨⎧>

=lostispacketreceivedispacket

li ,0,0

di: delay of the ith packet

Page 51: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

40

M: number of packets that are received at the destination. Note that M ≤ N and N

= M + | i: li = 1|.

∑=

=M

iid

MdE

1

1][ : average delay

If we plot di and li together as a function of i, we may observe a temporal correlation

between delay and loss. As di’s increase over a period due to congestion, there may be

increasingly more li’s that take high values near intervals of high delay. Fig. 6 shows the

delay versus loss rate.

TFRC Flows

00.5

11.5

22.5

33.5

4

200 210 220 230 240 250 260 270 280 290 300

Delay (ms)

Loss

Rat

e (%

)

Figure 6: Delay versus Loss rate

Page 52: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

41

3.4. Discussions

At the application level, it was believed that ON/OFF sources with heavy-tailed ON

and/or OFF periods lead to long-range dependence in the aggregated process that is

determined by the heavy-tailedness of ON or OFF periods [24, 25, 45]. At the transport

level, it was believed that with TCP, or flow-controlled UDP, long-range dependence of

aggregate traffic is insensitive to details in the protocol stack or network configuration as

long as connection durations or object sizes being transported are heavy-tailed [37, 38, 45,

49].

The possible implications for “packet inter-arrival times” that are foreseen:

• Our conclusion based on the analysis is that traffic behavior and the impact of TFRC

flows depend on the file size from the sender to the receiver.

• For continuous media traffic, the file size is large and it tends to be heavy-tailed, this

will have an impact over the quality of the application being delivered to the receiver.

• For mixed traffic, the effect of Long-range Dependence of the application level traffic

on the network performance is modulated by the protocols acting at the

transport/network layer. In this case, it is TFRC over UDP, where UDP has its source

behavior of long-range dependence [65] and this will have a direct impact on network

performance as it might increase queuing delay, which in-turn will increase the

packet loss rate.

Page 53: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

42

The possible implications for packet delay and loss that are foreseen:

• It is clear that packet delay and loss have tremendous impact on continuous media

applications, as both delay and loss result from buffering within the network. As

packets traverse the network, they are queued in buffers, adding to their end-to-end

delay and dropped accordingly due to buffer overflow.

• The correlation between delay and loss, i.e., when the delay increases over a period

we can predict that more loss is expected to occur. The TFRC sender will reduce its

sending rate based on the delay variation and it will decide on the sending rate to

maintain a good quality of the continuous media flow. However, there will not be any

adverse effect to the protocol or network performance from a flow perspective.

• The correlation might be due to the delay experienced at the application level, for

which the traffic tends to be bursty. This is in accordance with the present evidence

that shows the degree of self-similarity for a round-trip path in the Internet may be

correlated with the packet loss observed on that path [41, 42].

Page 54: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

43

Chapter 4

Performance Analysis of ECN and BECN enabled TCP flows

4.1. Introduction

In this chapter, we extend the stochastic model for TCP congestion control developed in

[8] and [3] in order to analyze the TCP flow throughput and router buffer queue size in

ECN and BECN capable networks. Comparative performance of the ECN and BECN

mechanisms are then evaluated using analytical model and/or simulation. This evaluation

is done for varying network load, for different bandwidth-delay product networks,

reverse lossy links, and for single- as well as multiple-bottleneck networks.

4.2. ECN and BECN Capable Networks

In this section, we discuss the TCP sender behavior and router behavior for

networks that are ECN and BECN enabled.

4.2.1. TCP Sender Behavior

In the case of ECN-capable networks, the TCP end hosts need initial end-to-end

negotiations. Upon receipt of an ECN marking, the TCP sender halves the congestion

window (cwnd) and reduces the slow start threshold (ssthresh). The sending TCP does

not increase the congestion window in response to the receipt of an ECN-Echo ACK

packet. TCP should react to an ECN at most once per roundtrip time. Immediately after

Page 55: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

44

reacting to an ECN, if the TCP sender receives three duplicate ACKs indicating a

dropped packet, the TCP sender should not repeat the reduction of the congestion

window, as the packet would have been probably dropped before the sender reduced its

window in response to an ECN. The TCP source should ignore succeeding ECNs if the

source has reacted to a previous ECN or to a dropped packet within the last round trip

time (RTT). TCP follows existing algorithms for sending data packets in response to

incoming ACKs, multiple duplicate ACKs, or retransmit timeouts.

In the case of BECN-capable networks, TCP end hosts do not need initial end-to-

end negotiations to establish BECN capability as the TCP receiver is not involved in the

congestion notification mechanism. The TCP sender on receipt of an ISQ due to a

marked packet sets its cwnd and ssthresh to one-half of the current cwnd and waits an

RTT before it starts increasing the window [10]. An ISQ due to a dropped packet causes

the sender to set its cwnd and ssthresh to one-half of current congestion window and

follows the TCP congestion control algorithm thereafter. The sender does not react to

ISQs more than once per RTT.

The BECN algorithm requires the use of a single bit to differentiate between an

ISQ due to a marked packet and an ISQ due to a dropped packet. An ISQ due to a marked

packet would have this bit set so that the sender on receipt of the ISQ waits an RTT

before increasing its window according to the TCP algorithm. When the bit is unset, the

sender assumes that the ISQ was generated due to a dropped packet. It halves its

congestion window and starts increasing the window according to the TCP algorithm

similar to ECN. The advantage for BECN here is early notification of packet drops since

it does not wait for duplicate acknowledgements.

Page 56: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

45

4.2.4. Router Behavior

The router support for ECN is obtained by modifying RED implementations. For

packets from ECN capable hosts, the router marks the packets rather than dropping them

(if the average queue size is between minth and maxth). The router marks only those

packets that are from ECN capable hosts, and the marking probability is proportional to

the average queue size following the procedure of RED routers [6]. The ECN Capable

Transport (ECT) bit in the IP header is set by the sender if both the end systems are ECN

capable. The router marks packets using the Congestion Experienced (CE) bit in the IP

header. The router behavior for BECN is described using the following pseudo code [10].

If (arriving packet causes the average queue size to go above maxth) {

check the IP header of packet and drop the packet just like an ECN packet; if (ECT bit was marked in the IP header)

{ send an ISQ due to a dropped packet back to the source;

} } else if (arriving packet causes average queue to go between minth and maxth) {

if (RED rules choose this packet for marking and ECT bit is set) and if (packet is not already marked)

{ mark the packet (CE bit) and send an ISQ due to a marked packet back to the source;

} else if (RED rules choose this packet and ECT bit is not set)

drop the packet; }

Page 57: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

46

4.3. Analytical Model

We extend the stochastic model for TCP congestion control developed in [2] that

yields an expression for the throughput of a saturated TCP sender, i.e., a flow with an

unlimited amount of data to send, as a function of packet marking probability (p) and

average round trip time (RTT), for the case of ECN and BECN. Results from [8] and [4]

have shown that ECN significantly reduces occurrence of timeouts (TO) and triple

duplicate ACKs (TDA). In our approach, we assume that there are no TDAs and TOs,

and extend the model to deal with congestion notification due to ECN (or) BECN, i.e.,

considering congestion notification only due to marking. We tune the RED parameters

(minth, maxth, queue limit) in such a way that the ‘average queue size’ q is maintained

within the RED thresholds (thmin and thmax).

Thus, we assume that congestion indications are exclusively of type “packet marking”, a

packet is marked in a round independently of any packets marked in other rounds, and

packet markings are correlated within a round. We define ‘p’ to be the probability that a

packet is marked, given that the preceding packet (if any) in its round is not marked.

Following similar notations as in [2], we define “ECNP” as period between two ECN

events (see Figs. 7 & 8). For the ith period we define Yi to be the number of packets sent,

Ai the duration and Wi the window size at the end. Considering {Wi}i to be a Markov

regenerative process with rewards {Yi}i, long-term steady-state TCP throughput (B) is

given by

][][

AEYEB = … (1)

Page 58: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

47

Let αi be the number of packets sent in the ith ECNP up to and including the first packet

that is marked, and Xi be the round where this marking occurs. After αi, ‘Wi – 1’ more

packets are sent in an additional round before the TCP sender is notified. However, for

BECN less than ‘Wi – 1’ packets are sent because of the early notification via ISQ. So,

we use a scaling factor “γ” to account for this early notification (0 < γ < 1).

Thus, a total of Yi = αi + γ (Wi – 1) packets are sent in Xi + 1 rounds. It follows that:

)1][(][][ −+= WEEYE γα … (2)

where

⎩⎨⎧

<<=

BECNECN

101γ

γ

Based on our earlier assumptions, {αi}i is a sequence of independent and identically

distributed (i.i.d.) random variables with geometric distribution, i.e.,

ppkP k 1)1()( −−==α , k = 1, 2, …

and mean

pE 1][ =α … (3)

From (2) & (3), it follows that:

)1][(1][ −+= WEp

YE γ

][1][ WEp

pYE γγ+

−= … (4)

Between two congestion notifications, the window increases by “1/b” packets per round,

where ‘b’ is the number of packets acknowledged by a received ACK (see Fig. 8). Let rij

be the duration of the jth round trip in the ith period.

Page 59: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

48

Clearly, ∑+

=

=1

1

iX

jiji rA

{rij} are assumed to be independent of the congestion window, and thus independent of j.

It follows that:

)]/([][ iXAEEAE =

Following the derivation in [2],

][)1][(][ rEXEAE += … (5)

Let E[r] = RTT, the average round trip time. From Figure 2, (one will be added in every b

rounds) where ‘b’ is the number of data packets acknowledged by each ACK.

bXW

W iii += −

21 , i = 1, 2, … (6)

Yi packets are transmitted in ECNPi, which is expressed as follows:

∑−

=

− +⎟⎠⎞

⎜⎝⎛ +=

1

0

1

2

bX

ki

ii

i

bkW

Y β

iiiii

i bXXWX

Y β+⎟⎠⎞

⎜⎝⎛ −+= − 1

221

Using (6),

iiii

i WWX

Y β+⎟⎠⎞

⎜⎝⎛ −+= − 1

221 … (7)

Where βi is the number of packets sent in the last round. Assuming {Xi} and {Wi} are

mutually independent sequences of i.i.d. random variables, equation (6) and equation (7)

become, respectively

bXEWE ][2][ = … (8)

Page 60: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

49

From equation (7),

)]/([][ XYEEYE =

][1][2

][2

][][ βEWEWEXEYE +⎥⎦⎤

⎢⎣⎡ −+=

][12

][][2

][][ βEWEWEXEYE +⎟⎠⎞

⎜⎝⎛ −+= … (9)

Assuming the distribution of βi as uniform in [1, γ(Wi – 1)],

2][

21][ WEE γγβ +−

= … (10)

From (4), (8), (9) & (10), we have

2][

211

2][][

4][][1 WEWEWEWbEWE

pp γγγγ

+−

+⎟⎠⎞

⎜⎝⎛ −+=+

i.e., ( ) 02

112

][4

][2

][34

2

=−

+−

−−−∗γγγ

ppWEWbEWEb

i.e., ( ) 02

11][42][

83 2 =⎟⎟

⎞⎜⎜⎝

⎛ +−−⎟

⎠⎞

⎜⎝⎛ +

−γγ

pWEbWEb

i.e., b

pb

bb

bWE3

2118

32

32][

2 ⎟⎟⎠

⎞⎜⎜⎝

⎛ +−

+⎟⎠⎞

⎜⎝⎛ +

++

=

γγγ … (11)

Page 61: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

50

Figure 7: Congestion window evolution over time when indications are due to marking

Figure 8: Packets sent during a congestion notification period

W

W1 W2

t ECNP

21−iW

Packets sent

Wi

αi

βi

ECNPi

No. of rounds

2

1

3

4

5

……1 Xi

………

b b blast round

6

2 3 4

Page 62: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

51

From (8) & (11),

32

112

62

62][

2 ⎟⎟⎠

⎞⎜⎜⎝

⎛ +−

+⎟⎠⎞

⎜⎝⎛ +

++

=

γγγ p

bbbXE … (12)

From (5) & (12),

⎟⎟⎟⎟⎟

⎜⎜⎜⎜⎜

+⎟⎟⎠

⎞⎜⎜⎝

⎛ +−

+⎟⎠⎞

⎜⎝⎛ +

++

= 13

2112

62

62][

γγ pb

bbRTTAE … (13)

where E[r] is replaced by RTT, the average round trip time.

From (1), (4), (11) & (13), we have

⎟⎟⎟⎟⎟

⎜⎜⎜⎜⎜

+⎟⎟⎠

⎞⎜⎜⎝

⎛ +−

+⎟⎠⎞

⎜⎝⎛ +

++

⎟⎟⎠

⎞⎜⎜⎝

⎛ +−

+⎟⎠⎞

⎜⎝⎛ +

+⎟⎠⎞

⎜⎝⎛ +

+−

=

13

2112

62

62

32

118

32

321

),(

2

2

γγγ

γγγγγγ

pb

bbRTT

bp

bb

bb

pp

RTTpB

… (14)

The above throughput equation for BECN reduces to that of ECN when γ is set to 1.

Next, we model N TCP flows sharing a single RED-ECN/BECN router as in [3] to

determine the equilibrium point (p, q ) where p is the packet marking probability and q

is the average queue size, in steady state. Assume the TCP flows with the same average

round trip time RTT, such that

cqRTTRTT o += … (15)

where RTTo is the propagation delay that excludes queuing delay, cq / represents queuing

delay, and c is the bottleneck link capacity. Assume that the link bandwidth is fully

utilized:

Page 63: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

52

NcpcqRTTB o /),/( =+ … (16)

The control function H( q ) of the “gentle” variant of the RED router is given as follows,

where Q denotes the maximum queue size. Note that RED-ECN/BECN marks packets

when qmin ≤ q < qmax, but drops packets when q ≥ qmax:

⎪⎪⎪⎪

⎪⎪⎪⎪

≤≤

<≤+−−

<≤−

<≤

=

Qqq

qqqpqqq

p

qqqpqq

qq

qq

qH

max

maxmaxmaxmaxmax

max

maxminmaxminmax

min

min

21

2)(1

00

)( … (17)

Thus, we have two relations between p and q . One is from the inverse function of B(.) in

(16) and the other one is from (17):

⎪⎩

⎪⎨⎧

=

−= −

)(

))/,(( 01

qHp

RTTNcpBcq RTT … (18)

In section 4.5, we obtain predictions on TCP throughput, marking probability and

average queue size for ECN and BECN connections using equations (14) and (18).

4.4. Simulation Setup

We use two network topologies (Topology-1 for single bottleneck experiments

and Topology-2 for multiple bottleneck experiments) for our simulations using NS-2.26

[68].

(i) Topology-1 (Figure 9): The bottleneck bandwidth is 1 Mbps with a propagation delay

of 50 ms. All other links have bandwidth of 10 Mbps with 10 ms propagation delay. The

timer granularity is 100ms and the packet size is 536 Bytes. Gentle RED is used. The

Page 64: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

53

TCP flavor used is NewReno. Four sources (S1 – S4) send varying number of TCP flows,

each with infinite amount of bulk data (ftp sources), to four sinks (D1 – D4) via a

bottleneck link across two routers R1, R2.

With N TCP flows, the Gentle RED control parameters of the routers are configured to be

pmax = 0.1, thmin = 3N/2 KB, thmax = 9N/2 KB, Q = 9N KB so that the model predictions

become more accurate as N increases [69]. For example, the queue limit for 10 flows

(N=10) is set to be 90 KB, thmin value 15 KB and thmax value 45 KB. The simulation time

is 100 seconds, and each simulation is repeated with five different seed values.

(ii) Topology-2 (Figure 10): With this topology, 1 ECN enabled flow, 1 BECN enabled

flow, and a set of standard TCP (NewReno) flows are generated by the sources S1 – S6 as

shown in Fig. 10 which pass through multiple routers to different destinations. All routers

are RED enabled with the same RED parameters mentioned earlier. All links have a

bandwidth of 1Mbps and propagation delay of 10 ms, except the links R1 -> R2, R2 -> R3,

and R3 -> R4 that have propagation delay of 50 ms.

Figure 9: Network Topology 1

S2 R1 R2

1 Mbps 50 ms

10 Mbps 10 ms

S1

S3

S4

D1

D2

D3

D4

10 Mbps 10 ms

Page 65: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

54

Figure 10: Network Topology 2

4.5. Results and Discussion

In this section we compare ECN and BECN performance for various cases using

predictions from the analytical model and/or measurements from simulations.

4.5.1. Varying number of flows (N)

In this experiment, two sets of simulations are done where all flows are either ECN

capable or BECN capable, using Topology 1. We fix the RTT to be 140ms and vary the

number of FTP flows from 10 (min) to 22 (max). In the prediction for ECN, the scaling

factor γ = 1. In the prediction for BECN, the scaling factor γ is chosen as given in Table 2.

Table 2: The BECN scaling factor γ versus number of flows

No of flows 10 12 14 16 18 20 22 Γ value 0.7 0.68 0.65 0.63 0.61 0.59 0.56

S3

ECN Enabled Flow

BECN Enabled Flow

Standard TCP Flows Standard TCP Flows

R2

S4

S1

S2

S5 S6

D1

D2

D6 D5 D4 D3

R3 R1 R4

Page 66: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

55

(a) Throughput versus number of flows for ECN

(b) Average queue size versus number of flows for ECN

Page 67: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

56

(c) Average marking probability versus number of flows for ECN

Figure 11: Analytical and simulation results for ECN

Figures 11 and 12 show both the analytical and simulation results for ECN and BECN,

respectively. Also shown in the graphs for throughput and average queue size are the

95% confidence intervals for the measurement (simulation) data. As the number of flows

increases from 10 to 22, throughput decreases, while average queue size and marking

probability increase. The predicted values are close to the measurement values.

Page 68: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

57

(a) Throughput versus number of flows for BECN

(b) Average queue size versus number of flows for BECN

Page 69: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

58

(c) Average marking probability versus number of flows for BECN

Figure 12: Analytical and simulation results for BECN

Figure 13: BECN-ISQ traffic versus number of flows

Page 70: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

59

Figure 13 shows the ICMP Source Quench (ISQ) traffic measured in the simulations. The

ratio of the number of ISQs generated to the total number of packets received in the

reverse direction of traffic is computed and plotted as a function of the number of flows.

4.5.2. Comparison of ECN and BECN for varying number of flows

(a) Throughput versus number of flows

Page 71: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

60

(b) Average queue size versus number of flows

(c) Average marking probability versus number of flows

Page 72: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

61

(d) Percentage loss versus number of flows

Figure 14: Comparison of ECN and BECN for varying number of flows

Figure 14 shows comparative performance of ECN and BECN as measured through

simulation. BECN offers higher throughput with varying number of flows (Fig. 14a). As

the congestion level increases, BECN flows suffer less loss compared to ECN flows (Fig.

14d). However, the losses are of the order of only up to 0.6% that our assumption of

congestion indication only by marking in the analytical model is reasonable. Also as the

number of flows increases, the average queue size and average marking probability

remain less for BECN compared to ECN (Figs. 14b and 14c, respectively), this is due to

the early congestion notification to the TCP sender.

Page 73: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

62

4.5.3. Varying round-trip time (RTTo)

In this set of experiments, we fix the number of flows and vary RTTo from 120ms

to 200ms and observe the performance of ECN and BECN. Again, Topology 1 is used,

and in each experiment, all flows are either ECN capable or BECN capable.

4.5.3.1. Minimum number of flows (10)

(a) Throughput versus round trip delay for ECN (No. of flows = 10)

Page 74: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

63

(b) Average queue size versus round trip delay for ECN (No. of flows = 10)

(c) Average marking probability versus round trip delay for ECN (No. of flows = 10)

Figure 15: Analytical and simulation results for ECN

Page 75: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

64

(a) Throughput versus round trip delay for BECN (No. of flows = 10)

(b) Average queue size versus round trip delay for BECN (No. of flows = 10)

Page 76: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

65

(c) Average marking probability versus round trip delay for BECN (No. of flows = 10)

Figure 16: Analytical and simulation results for BECN

Figure 17: BECN-ISQ traffic versus RTTo

Page 77: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

66

Table 3: The BECN scaling factor γ versus round trip delay (minimum no. of flows)

RTTo (ms) 120 140 160 180 200 γ value 0.72 0.7 0.67 0.65 0.63

4.5.3.2. Maximum number of flows (22)

(a) Throughput versus round trip delay for ECN (No. of flows = 22)

Page 78: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

67

(b) Average queue size versus round trip delay for ECN (No. of flows = 22)

(c) Average marking probability versus round trip delay for ECN (No. of flows = 22)

Figure 18: Analytical and simulation results for ECN

Page 79: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

68

(a) Throughput versus round trip delay for BECN (No. of flows = 22)

(b) Average queue size versus round trip delay for BECN (No. of flows = 22)

Page 80: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

69

(c) Average marking probability versus round trip delay for BECN (No. of flows = 22)

Figure 19: Analytical and simulation results for BECN

Figure 20: BECN-ISQ traffic versus RTTo

Page 81: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

70

Table 4: The BECN scaling factor γ versus round trip delay (maximum no. of flows)

RTTo (ms) 120 140 160 180 200 γ value 0.6 0.57 0.55 0.53 0.5

In the prediction for BECN, γ is chosen as given in Tables 3 and 4. Figures 15 and 16

show both the analytical and simulation results for ECN and BECN, respectively, for 10

flows. Figures 18 and 19 show both the analytical and simulation results for ECN and

BECN, respectively, for 22 flows. Figures 15 (b), 16 (b), 18 (b) and 19 (b) show that the

average queue size decreases with increasing RTTo for both ECN and BECN. Naturally,

the marking probability also decreases with increasing RTTo (Figures 15 (c), 16 (c), 18 (c)

and 19 (c)). This decreasing marking probability combined with increasing RTTo cause

the throughput to remain more or less the same with the increasing RTTo (Figures 15 (a),

16 (a), 18 (a) and 19 (a)). Note that with a lesser marking probability, the number of cwnd

reductions will be lesser. However, after each reduction, it will take longer time for the

cwnd to grow to the earlier value because of larger RTTo. Comparing Figures 15, 16, 18

and 19, we find that BECN yields slightly higher throughput, while the average queue

size remains less for BECN. Figures 17 and 20 show the measured ISQ traffic percentage

in BECN simulations.

Page 82: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

71

4.5.4. Bottleneck router queue size vs. time

In this section we provide the results of bottleneck router queue size variations for

ECN and BECN. Figure 21 shows the results for RTTo of 140 ms and for 22 flows. For

less number of flows packets are not dropped for either BECN or ECN flows. Due to

earlier congestion notification BECN case have lower average and instantaneous queue

sizes. As the congestion level increases (22 flows), the instantaneous queue size for the

ECN case occasionally goes beyond the maximum threshold. Since queue variability is

less for BECN enabled flows, it offers better network utilization under high congestion.

(a) Instantaneous and average queue size for BECN

Page 83: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

72

(b) Instantaneous and average queue size for ECN

Figure 21: Instantaneous and average queue sizes for BECN and ECN (No. of flows = 22)

4.5.5. Experiments with reverse lossy link

In this case, we investigate the impact of loss of reverse traffic on the behavior of ECN

and BECN by controlling the loss rate on the reverse traffic path. In particular, we

investigate the impact of loss of ECN-Echo ACK and BECN-ISQ packets on the

performance of ECN and BECN, respectively. For these experiments we use Topology 1

(Fig. 9) with random losses introduced for the packets flowing from router R1 to sources

S1 – S4.

Page 84: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

73

(a) Throughput versus loss rate

(b) Average queue size versus loss rate

Figure 22: Comparison of ECN and BECN for varying loss rates

Page 85: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

74

The above figures summarize our observations. First, throughput decreases steadily with

increase in loss rate. No significant difference in throughput was found between the

mechanisms. Second, due to the loss of ISQs the BECN flows do not achieve the early

congestion notification and this will cause considerable fluctuation in average queue size.

However, ECN flows are less affected due to the fact that even if an ECN-Echo ACK is

lost, the subsequent ACKs also carry ECN-Echo message. In this case, even though there

is a gain of RTT it does not reflect on the performance of BECN flows as ISQs are lost.

This is one reason that BECN does not achieve a better throughput compared to ECN.

4.5.6. Experiments with Multiple Bottlenecks

(a) Throughput versus number of flows

Page 86: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

75

(b) Loss versus number of flows

Figure 23: Comparison of ECN and BECN for multiple bottlenecks

Figure 24: BECN ISQ traffic versus number of flows

Page 87: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

76

These experiments were done using Topology 2 (Figure 10). In multiple bottlenecks

scenario, BECN flows perform much better than ECN flows. First, it yields higher

throughput and second, the loss percentage is significantly less compared to ECN. In an

ideal multiple bottlenecks scenario where different TCP flows along with an ECN flow

compete for bandwidth the BECN flow is bound to perform better. This is because when

there is congestion each router sends an ISQ to notify its respective source and this makes

a BECN flow more efficient than an ECN flow under such conditions (for achieving

higher throughput). Whereas in case of an ECN flow the source has to wait for an ECN-

Echo ACK before reducing its sending rate. BECN flow gains by half-RTT. Packet loss is

less than 4% for a BECN flow compared to an ECN flow (7.5%). In case of a BECN flow

when there is a packet loss the source is notified earlier for it to reduce the sending rate

which in-turn prevents further packet losses. It can also be seen that the percentage of

ISQ traffic is less (just above 9.5%) for maximum number of flows and do not affect the

performance for a BECN flow in this case.

Page 88: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

77

Chapter 5

Conclusion

This thesis makes two contributions: analysis of TCP-Friendly Rate Control (TFRC)

flows through real-time measurements, and analysis of Explicit Congestion Notification

(ECN) and Backward Explicit Congestion Notification (BECN) enabled TCP flows

through analytical modeling and simulation.

In the first part of this thesis, we characterize the TFRC flows through real-time

measurements and present analysis based on packet inter-arrival times, packet delay and

packet loss rate. This study leads to some interesting observations: the aggregate traffic

exhibits long-range dependence (LRD) over different levels of aggregation, packet inter-

arrival times tend to be correlated, and there exists a correlation between packet loss and

delay. This measurement and analysis are done only for wired networks. It is clear that

packet delay and loss have tremendous impact on continuous media applications, as both

delay and loss result from buffering within the network. As packets traverse the network,

they are queued in buffers, adding to their end-to-end delay and dropped accordingly due

to buffer overflow. The correlation between delay and loss, i.e., when the delay increases

over a period we can predict that more loss is expected to occur. The TFRC sender will

reduce its sending rate based on the delay variation and it will decide on the sending rate

to maintain a good quality of the continuous media flow. However, there will not be any

adverse effect to the protocol or network performance from a flow perspective.

Page 89: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

78

In the second part of this thesis, we extend the analytical model for TCP throughput for

the case of ECN and BECN capable networks and validate this model through simulation

experiments. We evaluate and compare the performance of ECN and BECN mechanisms

using homogeneous long-lived FTP flows for various scenarios. There is a clear cut

advantage in the case of BECN due to the gain in RTT and due to the early congestion

notification, which results in significant improvement in performance for the BECN

flows. These include improvement in throughput and packet loss. We also evaluated the

performance of ECN and BECN flows with reverse lossy links, where the difference in

throughput was not much, but the average queue size for BECN remains less compared to

ECN. Our simulation with multiple bottlenecks shows that BECN gives much better

performance in the improvement of throughput and packet loss. Therefore, we conclude

that the use of BECN mechanism for congestion control in TCP/IP networks significantly

improves performance compared to ECN. BECN mechanism should be used to offer

improved quality of service on high bandwidth-delay product links.

For future work, it would be interesting to further examine the following: analysis and

characterization of TFRC flows over wireless networks, performance analysis of BECN

enabled TCP flows for satellite networks, applicability of ECN and BECN mechanisms

for congestion control in mobile ad hoc networks.

Page 90: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

79

References [1] W. Tan, and A. Zakhor, “Real-time Internet video using error resilient scalable

compression and TCP-Friendly transport protocol,” IEEE Transactions on Multimedia, Vol. 1, June 1999.

[2] J. Padhye, V. Firoiu, D. Towsley, and J. Kurose, “Modeling TCP Throughput: A

Simple Model and its Empirical Validation”, ACM SIGCOMM, 1998. [3] M. Kwon and S. Fahmy, “TCP Increase/Decrease Behavior for Explicit Congestion

Notification (ECN)”, Proc. IEEE ICC, V. 4, pp. 2335 – 2340, April 2002. [4] K. Ramakrishnan, S. Floyd, “A Proposal to add Explicit Congestion Notification

(ECN) to IP”, RFC 2481, January 1999. [5] S. Floyd, V. Jacobson, “Random Early Detection Gateways for Congestion

Avoidance”, IEEE/ACM Transactions on Networking, Vol. 1, No. 4, August 1993. [6] B. Braden et al, “Recommendations on Queue Management and Congestion

Avoidance in the Internet”, RFC 2309, April 1998. [7] S. Floyd, “TCP and Explicit Congestion Notification,” ACM Computer

Communication Review, V. 24, N. 5, pp. 10 – 23, October 1994. [8] J. Hadi Salim, U. Ahmed, “Performance Evaluation of Explicit Congestion

Notification (ECN) in IP Networks”, RFC 2884, July 2000. [9] J. Hadi Salim, B. Nandy, N. Seddigh, “A proposal for Backward ECN for the

Internet Protocol (IPv4/IPv6),” Internet Draft <draft-salim-jhsbnns-ecn00.txt> July 1998. http://www.globecom.net/ietf/draft/draft-salim-jhsbnns-ecn00.html.

[10] F. Akujobi, I. Lambadaris, R. Makkar, N. Seddigh, B. Nandy, “BECN for

Congestion Control in TCP/IP Networks: Study and Comparative Evaluation,” Globecom 2002.

[11] S. Floyd, “A report on recent developments in TCP congestion control,” IEEE

Communications Magazine, pp. 84 – 90, April 2001. [12] V. Jacobson, “Congestion Avoidance and Control,” ACM SIGCOMM, August 1988. [13] M. Allman, V. Paxson, and W. Stevens, “TCP congestion control,” RFC 2581,

April 1999. [14] S. Fahmy and T. P. Karwa, “TCP Congestion Control: Overview and Survey of

Ongoing Research,” Technical Report TR-01-016, Purdue University, 2000.

Page 91: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

80

[15] B. Yu, “Survey on TCP-Friendly Congestion Control Protocols for Media Streaming Applications,” Technical Report, Boston University, December 2001.

[16] S. Floyd, and K. Fall, “Promoting the use of End-to-end congestion control in the

Internet,” IEEE/ACM Transactions on Networking, vol. 7, no. 4, pp. 458 – 472, August 1999.

[17] H. A. Wang, and M. Schwartz, “Achieving bounded fairness for multicast and TCP

traffic in the Internet,” ACM SIGCOMM, 1998. [18] S. Floyd, M. Handley, J. Padhye, and J. Widmer. Equation-based congestion control

for unicast applications. In Proc. ACM SIGCOMM, pages 43 – 56, Stockholm, Sweden, August 2000.

[19] M. Handley, J. Padhye, S. Floyd, J. Widmer, “TCP Friendly Rate Control (TFRC):

Protocol Specification”, RFC 3448, January, 2003. [20] K. Thompson, G. J. Miller, and R. Wilder, “Wide-Area Internet Traffic Patterns and

Characteristics,” IEEE Network, November 1997. [21] P. R. Morin, “The Impact of Self-Similarity on Network Performance Analysis,”

Ph.D. dissertation, Carleton University, December 1995. [22] M. S. Taqqu, V. Teverovsky, and W. Willinger, “Estimators for Long-range

Dependence: an empirical study,” Fractals, Vol. 3, No. 4, pp. 785 – 798, 1995. [23] W. Willinger, V. Paxson, R. H. Riedi, and M. S. Taqqu, “Long-range dependence

and data network traffic,” Long-range Dependence: Theory and Applications, Birkhauser, 2002.

[24] M. Crovella and A. Bestavros, “Self-similarity in World Wide Web traffic:

Evidence and possible causes,” IEEE/ACM Transactions on Networking, Vol. 5, No. 6, pp. 835 – 946, December 1997.

[25] K. Park, G. Kim, and M. Crovella, “On the relationship between file sizes, transport

protocols, and self-similar network traffic,” In Proceedings of ICNP, 1996, pp. 171 – 180.

[26] T. Tuan and Kihong Park, “Congestion control for self-similar network traffic,”

Dept. of Comp. Science, Purdue University, CSD-TR 98-014, May 1998. [27] C. Barakat, “TCP/IP Modeling and Validation,” IEEE Network, June 2001. [28] J. Padhye, V. Firoiu, D. Towsley, and J. Kurose, “Modeling TCP Reno

Performance: A Simple Model and its Empirical Validation,” IEEE/ACM Transactions on Networking, Vol. 8, No. 2, April 2000.

Page 92: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

81

[29] J. Padhye, V. Firoiu, and D. Towsley, “A Stochastic Model of TCP Reno Congestion Avoidance and Control,” CMPSCI Technical Report 99-02, UMASS, 1999.

[30] N. Cardwell, S. Savage, and T. Anderson, “Modeling TCP Latency,” IEEE

INFOCOM, 2000. [31] T. V. Lakshman, and U. Madhow, “The Performance of TCP/IP for networks with

high bandwidth-delay products and random loss,” In Workshop on the Modeling of TCP, December 1998.

[32] I. Rhee, V. Ozdemir, and Y. Yi. TEAR: TCP emulation at receivers - flow control

for multimedia streaming. Technical report, Department of Computer Science, North Carolina State University, April 2000.

[33] Y. R. Yang and S. S. Lam. General AIMD congestion control. In Proc. IEEE ICNP,

Osaka, Japan, November 2000. [34] D. Bansal and H. Balakrishnan. Binomial congestion control algorithms. In Proc.

IEEE INFOCOM 2001 proceedings, volume 2, pages 631–640, Anchorage, Alaska, April 2001.

[35] R. Rejaie, M. Handley, and D. Estrin. Rap: An end-to-end rate-based congestion

control mechanism for real time streams in the internet. Proc. IEEE INFOCOM, March 1999.

[36] J. Padhye, J. Kurose, and D. Towsley. A model based TCP-friendly rate control

protocol. Proc. International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), June 1999.

[37] K. Park, G. Kim and M. Crovella, “On the effect of traffic self-similarity on

network performance,” In Proceedings of SPIE International Conference on Performance and control of network systems, pp. 296 – 310, 1997.

[38] D. P. Heyman and T. V. Lakshman, “What are the Implications of Long-Range

Dependence for VBR-Video Traffic Engineering?” IEEE/ACM Transactions on Networking, Vol. 4, No. 3, pp. 301 – 317, June 1996.

[39] Z. Sahinoglu and S. Tekinay, “On Multimedia Networks: Self-Similar Traffic and

Network Performance,” IEEE Communications Magazine, January 1999. [40] V. Paxson and S. Floyd, “Wide area traffic: The failure of Poisson modeling,”

IEEE/ACM Transaction on Networking, Vol. 3, No. 3, pp. 226 – 244, June 1995. [41] M. S. Borella and I. Sidhu, “Self-Similarity of Internet Packet Delay,” IEEE ICN,

pp. 513 – 517, January 1997.

Page 93: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

82

[42] M. S. Borella and G. B. Brewster, “Measurement and analysis of long-range dependent behavior of Internet packet delay,” IEEE INFOCOM, pp. 497 – 504, 1998.

[43] Q. Li and D. Mills, “On the Long-range Dependence of Packet Round-trip Delays

in Internet,” In Proceedings of IEEE ICC, pp. 1185 – 1191, 1998. [44] T. Hagiwara, H. Majima, T. Matsuda, and M. Yamamoto, “Impact of Round Trip

Delay Self-Similarity on TCP Performance,” In Proceedings of ICCCN, 2001. [45] M. Crovella, M. S. Taqqu, and A. Bestavros, “Heavy-tailed probability distributions

in the world wide web,” Preprint: A Practical Guide to Heavy Tails: Statistical Techniques and Applications, 1996.

[46] M. S. Taqqu, W. Willinger, and R. Sherman, “Proof of a fundamental result in self-

similar traffic modeling,” ACM Computer Communication Review, Vol. 27, pp. 5 – 23, 1997.

[47] A. Veres and M. Boda, “The chaotic nature of TCP congestion control,” IEEE

INFOCOM, April 2000. [48] W. Willinger, M. Taqqu, R. Sherman, and D. Wilson, “Self-similarity through high-

variability: Statistical analysis of Ethernet LAN traffic at the source level,” IEEE/ACM Transactions on Networking, Vol. 5, No. 1, pp. 71 – 86, February 1997.

[49] A. Veres, Zs. Kenesi, S. Molnar, G. Vattay, “On the Propagation of Long-Range

Dependence in the Internet,” ACM SIGCOMM, September 2000. [50] A. Feldmann, A. C. Gilbert, P. Huang, and W. Willinger, “Dynamics of IP traffic:

A study of the role of variability and the impact of control,” ACM SIGCOMM, 1999. [51] A. Feldmann, A. C. Gilbert, and W. Willinger, “Data networks as cascades:

Investigating the multifractal nature of Internet WAN traffic,” ACM Computer Communication Review, Vol. 28, pp. 42 – 55, September 1998.

[52] K. Pentikousis and H. Badr, "An Evaluation of TCP with Explicit Congestion

Notification", to appear in Annals of Telecommunications, Mid-2003. [53] K. Pentikousis and H. Badr, "On the Resource Efficiency of Explicit Congestion

Notification", In Proceedings of Networking 2002, Pisa, Italy, May 2002. [54] K. Pentikousis and H. Badr, "TCP with ECN: The case of two simultaneous

downloads", In Proceedings of IASTED International Conference on Advances in Communications (AIC 2001), Rhodes, Greece, July 2001.

Page 94: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

83

[55] Y. Zhang, and L. Qiu, “Understanding the End-to-End Impact of RED in a Heterogeneous Environment,” Cornell CS Technical Report 2000-1802, July 2000.

[56] K. Pentikousis, “TCP in wired-cum-wireless environments,” IEEE Communications

Surveys, Vol. 3, No. 4, Fourth Quarter 2000. [57] U. Black, “Frame relay networks: specifications and implementations”, McGraw-

Hill, New York, 1994. [58] P. Newman, “Traffic Management for Local Area Networks”, IEEE

Communications Magazine, pp. 44 – 50, August 1994. [59] A. Rangarajan and A. Acharya, “Early regulation of unresponsive Best Effort

Traffic”, ICNP, October 1999. [60] J. Nagle, “Congestion Control in TCP/IP Internetworks”, RFC 896, January 1984. [61] J. Postel, “Internet Control Message Protocol (ICMP)”, RFC 792, September, 1981. [62] F. Baker, “Requirements for IP Version 4 Routers”, RFC 1812, June, 1995. [63] A. Durresi, M. Sridharan, C. Liu, M. Goyal and R. Jain, “Traffic Management using

Multilevel Explicit Congestion Notification”, Proc. Systemics, Cybernetics & Informatics, SCI, 2001.

[64] P-F. Quet, S. Chellappan, A. Durresi, M. Sridharan, C. Liu, M. Goyal and R. Jain,

“Guidelines for optimizing Multi-Level ECN, using fluid flow based TCP model”, Proc. ITCOMM, 2002.

[65] F. Xue, V. Markovski, and L. Trajkovic, “Packet loss in video transfers over IP

networks,” In Proceedings of IEEE International Symposium on Circuits and Systems, May 2001.

[66] ftp://ftp.ee.lbl.gov/email/sf.98may7.txt. [67] A. Matrawy, I. Lambadaris, C. Huang, “Multicasting of Adaptively-encoded

MPEG4 on a QoS-aware IP Networks”, IEEE ICC, 2002. [68] http://www.isi.edu/nsnam/ns/. [69] T. Bu, and D. Towsley, “Fixed point approximations for TCP behavior in an AQM

network”, ACM SIGMETRICS, 2001. [70] J. Widmer, R. Denda and M. Mauve, “A Survey on TCP-Friendly Congestion

Control”, IEEE Network, Vol. 15, No. 3, pp. 28 – 37, May/June 2001.

Page 95: PERFORMANCE ANALYSIS OF TCP AND TCP-FRIENDLY RATE … · using UDP as the transport protocol should try to be TCP-friendly, which is important because if the UDP flow is more aggressive

84

[71] J. Widmer, “Equation-Based Congestion Control for Unicast and Multicast Data Streams”, Ph.D. Thesis, University of Mannheim, May 2003.

[72] A. Veres, et al, “On the Propagation of Long-Range Dependence in the Internet”,

SIGCOMM Presentation Slides, 2000. [73] W. Stallings, “High-Speed Networks: TCP/IP and ATM Design Principles”,

Prentice Hall, 1998. [74] http://www.cse.iitk.ac.in/~dheeraj/reports/ecn/intro.html. [75] N. Feamster, et al, “On the Interactions between Layered Quality Adaptation and

Congestion Control for Streaming Video”, Packet Video Workshop, May 2001. [76] J. Beran, R. Sherman, M. Taqqu, W. Willinger, “Long-range dependence in

variable-bit-rate video traffic”, IEEE Transactions on Communications, 43, pp. 1566 – 1579, April 1995.

[77] M. Garrett, W. Willinger, “Analysis, modeling and generation of self-similar VBR

video traffic”, ACM SIGCOMM, September 1994.