• Aucun résultat trouvé

Decongestion Transport Protocol: a Transport Protocol for Anarchical Networks

N/A
N/A
Protected

Academic year: 2021

Partager "Decongestion Transport Protocol: a Transport Protocol for Anarchical Networks"

Copied!
13
0
0

Texte intégral

(1)

Institut Supérieur de l’Aéronautique et de l’Espace Institut Supérieur de l’Aéronautique et de l’Espace

P-U Tournoux (Univ. Réunion), E. Lochin (ISAE), J. Lacan (ISAE)

Decongestion Transport Protocol:

a Transport Protocol for Anarchical

Networks

(2)

Principles given by

A. Snoeren : Decongestion Control (ACM HotNets'07)

T. Bonald : Is the Law of Jungle Sustanaible for the Internet (IEEE Infocom'09)

Main hypothesis

– A sender can emit as fast/much as possible

– Use of retransmission is not recommended / No retransmission possible

● Need a perfect coding scheme (i.e. each received packets must be a useful packet) ● Repair symbols are genererated arbiritraly

Fair AQM strategies must be deployed inside the network

● No E2E congestion control but fair AQM is mandatory

(3)

A. Snoeren: Decongestion Control

– First paper in the area

Proposal (called Achoo) based on a block code scheme – No implementation/measurments

T. Bonald: Is the Law of Jungle Sustanaible for the Internet

– Fluid model that evaluates the efficiency of the concept – No proposal, fully assume the aformentioned hypothesis – Claim : overestimation of the congestion collapse

– Advantage : resistant to DDOS, misconfiguration, ...

– Efficiency is 80 % while reaches 100 % with fair-dropping mechanisms in the core

Anarchical Networks (state of

the art)

(4)

To propose an

efficient mechanism for Anarchical Networks

Based on an on-the-fly convolutional coding scheme named Tetrys

● http://websites.isae.fr/tetrys

– Objective: to approach the performance of a perfect coding scheme in order to

allow the deployment of a « de-congestion » transport protocol

Implementation of such proposal called DCTP

(DeCongestion Transport Protocol)

– Comparison with our own Achoo [Snoeren] implementation over several topolgies

studied in [Bonald]

– Evaluation of the concept with real-time applications

(5)

Convolutional Network-Coding

Blocks FEC Coding

Sliding encoding window (E. Martinian)

Tetrys : elastic encoding window

continuous data flow

block i block i+1 block i+2

continuous data flow sliding encoding window

continuous data flow elastic encoding window

(6)

6

Convolutional Network-Coding

The encoding window can be adjusted depending

on the feedback

6

In this example, R(1,2) is a redundant packet calculated with the two packets of the encoding window, P1 and P2. Since the acknowledgment of P1 has been lost, the encoding window grows and encompasses packets P1 to P4 the next time a redundant packet is

calculated, R(1,4). In the absence of acknowledgment, the encoding window

keeps on growing… until an acknowledgment of packets P1 to P8 arrives at the sender. Then the encoding window is updated to contain only P9 and P10, and the R(9,10) redundant

packet is then calculated.

(7)

7

Convolutional Network-Coding

Blocks FEC Coding

● burst erasure protection increases with the block size ● as well as the encoding/decoding complexity

● there are limits on the block size with real time flows ● useless data are sent between two blocks

Tetrys, elastic encoding window

● full reliability is achievable

● encoding/decoding complexity are only function of the RTT ● the recovery delay is independent of the RTT

● recovery delay easily adjustable with the code-rate

● Compliant with elastic and non-elastic traffic requirements

(8)

Two versions of DTCP are tested

DTCP-max

● The sender always emits at his maximum throughput

DTCP-min

● Always sends at a higher rate than the theoretical e2e

fair-share but tends toward this value in order to reduce «dead packets » (packets not useful)

Tests with ns-2 over an equivalent ISP topology

(9)
(10)

Comparison DCTP / TCP :

- Loss rate tolerance

Queue size on router :

– 20 for DCTP – BDP for TCP

BW between core routers

– 16mb/s

Efficiency is defined as

Losses occures on

access links

Without AQM (Drop Tail)

With AQM (Fair Drop) achieved total goodput

(11)

Comparison DCTP / TCP :

- Impact of router's queue size

Queue size on router :

– As shown on the x-axis

BW between core routers

– 16mb/s

Efficiency is defined as

maximum achievable total goodputachieved total goodput

With AQM (Fair Drop)Without AQM (Drop Tail)

(12)

Comparison DCTP / TCP :

- Note on fairness

Without AQM (Drop Tail)

With AQM (Fair Drop)

Queue size on router :

– As shown on the x-axis

BW between core routers

– 16mb/s

Fairness is defined as

(13)

DTCP allows to reach max capacity despite link layer losses

DCTP-min saves a lot of capacity compared to DCTP-max,

the fully anarchical version

DCTP allows to use small queue size (< 10) compared to

TCP

AQM (Fair-drop) isn't mandatory but increases the capacity

by (10~20 %) and allows DTCP to achieve better fairness

than TCP

Comparison DCTP / TCP :

- Promising remarks

Références

Documents relatifs

According to the point of view of the French mathematicians who participated to the conference, a number of topics on which Iraqi mathematicians are doing research is not connected

Because of the need to serve transport connections of various levels of operating priority, an implementation shall support the withdrawal of flow control credit from any Class

The x and y coordinates are relative to drawable’s origin, and specify the upper left corner of a rectangule. Generated when a destination region could not be

For TCP, ECN requires three new mechanisms: negotiation between the endpoints during setup to determine if they are both ECN-capable; an ECN-Echo flag in the TCP header so

LIPKEY uses the established SPKM-3 context handle as the input to GSS_Wrap (with conf_req_flag set to TRUE) to encrypt what the claimant_cred_handle refers to (user name

Node executing a short path protection request signals an idle request with wrapped status on the short (across the failed span) path and a protection request on the long

If the breast is pendulous elevate the breast (infra-mammary area/undersurface of the breast). Notice any changes in the breast skin such as dimpling, puckering, or asymmetry..

QSTP combines QoS-aware TFRC congestion control mechanism, which takes into account the network-level band- width reservations, with a Selective ACKnowledgment (SACK) mechanism in