A spike-detecting AQM to deal with elephants
نویسنده
چکیده
The current TCP/IP architecture is known to be biased against flows of small sizes — small flows (or mice) — in the network, thereby affecting the completion times of small flows. A common approach taken to solve this problem is to prioritize small flows over large flows (elephants) during the packet-scheduling phase in the router. Past studies have shown that such ‘size-based’ priority schedulers improve the completion times of small flows with negligible affects on the completion times of large flows. On the flip side, most approaches are not scalable with increasing traffic, as they need to trace flows and estimate ongoing sizes of active flows in the router. In this context, this work attempts to improve the performance of small flows using an active queue management (AQM) system, without needing to track sizes of flows. The core idea is to exploit TCP property in detecting large ‘spikes’ and hence large flows, from which packets are dropped, and importantly, only at times of congestion. In this way, we use only a single queue, diverting from the multi-queueing systems used in size-based schedulers. We propose two spike-detecting AQM policies: (i) SDS-AQM that drops packets deterministically, and (ii) SDI-AQM that drops packets randomly. Using a simple Markov Chain model, we compare these new policies with the well-known RED AQM, highlighting the loss behaviour. We also perform simulations, and using a number of metrics, compare the performance of (mostly) small flows obtained under the new AQMs against that obtained under the traditional drop-tail buffer, RED as well as a size-based flow-scheduler PS+PS. Surprisingly, RED is seen to give better performance than the size-based flow-scheduler developed specifically for improving the This work was done when the author was affiliated with IIT Mandi. This article is an extended version of the paper published in IEEE IPCCC 2011 [1]. In comparison to the conference paper, Section 2 discusses elaborately on related works, Section 4 is new, providing insights using a model based on Markov Chain, and Section 6 presents more results from simulations. Email address: [email protected] (Dinil Mon Divakaran) Preprint submitted to Computer Networks March 20, 2012 response times of small flows. Further, we find that the spike-detecting AQM policies give better performance to small flows than any other policy (including RED). Of the three scenarios we consider, two experiment with different buffer sizes — one with large buffer size (BDP) and another with small size (fraction of BDP). The third scenario considers the case where slow and fast flows compete. The results show that the spike-detecting AQM policies, unlike other policies, consistently give improved performance to small flows in all three scenarios. Of the two, the SDI-AQM performs better with respect to some metrics.
منابع مشابه
A Brief Look into Spike Sorting Methods
Spike sorting is a class of techniques used in the analysis of electrophysiological data. Studying the dynamics of neural activity via electrical recording relies on the ability to detect and sort neural spikes recorded from a number of neurons by the same electrode. This article reviews methods for detecting and classifying action potentials, a problem commonly referred to as spike sorting.
متن کاملDetecting and Filtering Non-responsive Traffic in AQM Queues without Packet Header Examination
In the current Internet, long-term TCP flows and bursty shortterm flows both exist. The mix between the aggregated longterm TCP traffic (responsive traffic) and the bursty traffic (non-responsive traffic) has great impact on the performance of Active Queue Management (AQM) algorithms in routers. We introduce a new solution to differentiate between responsive and unresponsive traffic in AQM queu...
متن کاملCoping with heat: behavioural and physiological responses of savanna elephants in their natural habitat
Most of southern Africa's elephants inhabit environments where environmental temperatures exceed body temperature, but we do not know how elephants respond to such environments. We evaluated the relationships between apparent thermoregulatory behaviour and environmental, skin and core temperatures for tame savanna elephants (Loxodonta africana) that were free-ranging in the hot parts of the day...
متن کاملDetection of AQM on Paths using Machine Learning Methods
Active Queue Management (AQM) schemes, such as PIE [1] and RED [2], have been particularly effective in combating bufferbloat and attenuating network congestion. Despite their widespread success and improved performance over traditional Tail Drop queuing schemes, the extent of AQM deployment in contemporary networks is not known [3]. Detecting the presence of AQMs in a network has potential to ...
متن کاملThe Taming of the Shrew
The Shrew attack is a denial of service attack wherein a rogue end-system periodically generates a high-bandwidth “spike” in order to cause TCP senders to experience loss simultaneously, synchronize their retransmissions, and ultimately experience congestive collapse. Because these spikes are periodic, overall the Shrew is a low bandwidth flow and difficult to detect and police. Currently, the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computer Networks
دوره 56 شماره
صفحات -
تاریخ انتشار 2012