Lecture 7: Congestion control
نویسنده
چکیده
Last lecture, we looked at the phenonmenon of congestion collapse, i.e., what happens when you pick a very large window size in the sliding window protocol. The problem of congestion collapse on the Internet was first documented by John Nagle in 1984 [2]. It was also observed by Van Jacobson in 1986 [8]. In both cases, the congestion collapse was the result of a large number of packets being prematurely retransmitted. The network was still doing work and heavily utilized, but not all of it was contributing to useful transport-layer throughput because the receiver was receiving duplicate copies of the same packet. Figure 3 of Van Jacobson’s paper [8] illustrates this problem beautifully. Quoting the caption of Figure 3 from that paper: “The dashed line shows the 20 KBps bandwidth available for this connection. Only 35% of this bandwidth was used; the rest was wasted on retransmits.” The solution to the Internet’s congestion collapse problem was a congestion-control algorithm. This algorithm was first implemented on end hosts by Van Jacobson in the BSD Operating System around 1986-87 and published in 1988 [8]. This algorithm is today called AIMD (Additive Increase Multiple Increase); the reason for this will become apparent soon. AIMD allows a sliding window sender to adaptively find a window size equal to the BDP of the network. This is unlike what we have done so far, where we hardcoded a fixed window size into the sliding window protocol. AIMD was first developed by Ramakrishnan and Jain at Digital Equipment Corporation (DEC) in an algorithm that later came to be called DECbit [9]. However, Ramakrishnan and Jain’s evaluation was confined to simulated networks and required changes to the routers—something that was quite antithetic to the Internet’s ethic of minimalism in the routers. Van Jacobson then adapted the same algorithm for use in the Internet without modifying the routers and evaluated it on a real network. DECbit was eventually adopted and standardized as the Explicit Congestion Notification (ECN) mechanism in routers in 2001. But it took a while, unlike Van Jacobson’s approach, which was implemented in every Internet end host by the early 1990s. This is another example of keeping things simple on the Internet: by minimizing the number of entities that need to be modified, Van Jacobson’s approach was more readily adopted. We’ll discuss AIMD in more detail now. There are two main parts to this AIMD algorithm:
منابع مشابه
EE 228 a - Lecture - Spring 2006
We have, by now, seen the various uses of game theory in different aspects of networking like bandwidth trading, MAC Layer access, congestion control, etc. In this lecture, we will see how routing is modeled using game theory.
متن کاملLecture 6: Emulating a Faulty Mesh 6.1 Introduction: Mesh Emulation
In the last lecture, we talked about how to emulate one network on another by constructing embeddings with low load, congestion and dilation. In this lecture we apply this embedding technique to emulate a fault-free square mesh on a faulty square mesh. Up to certain fault parameters we can achieve embeddings with constant load and congestion and small dilation. This allows us to use the result ...
متن کاملLecture 3 : Price of Anarchy ( PoA ) : Routing
In this lecture we consider the problem of routing traffic to optimize the performance of a congested and unregulated network. We are given a network, a rate of traffic between each pair of nodes and a latency function specifying the time needed to traverse each edge given its congestion. The goal is to route traffic while minimizing the total latency. In many situations, network traffic cannot...
متن کاملCOMS E 6998 : Algorithmic Game Theory and Economics Jan 27 , 2011 Lecture 2 – Congestion Games
Last week we looked at a global network connection game, and used the potential function method to show the existence of a global potential function and a pure equilibrium for that game. This week we will broaden our focus to the generalization of this game, which is the category of the Congestion Games. These games are of interest because they model many network, routing and resource allocatio...
متن کاملCS364A: Algorithmic Game Theory Lecture #20: Mixed Nash Equilibria and PPAD-Completeness∗
Today we continue our study of the limitations of learning dynamics and polynomial-time algorithms for converging to and computing equilibria. Recall that we have sweeping positive results for coarse correlated and correlated equilibria, which are tractable in arbitrary games. We have only partial positive results for pure Nash equilibria of routing and congestion games, and last lecture we dev...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017