Random Early Detection (RED) Mechanism for Congestion Control

Total Page:16

File Type:pdf, Size:1020Kb

Random Early Detection (RED) Mechanism for Congestion Control Rochester Institute of Technology RIT Scholar Works Theses 7-2-2015 TCP – Random Early Detection (RED) mechanism for Congestion Control Asli Sungur [email protected] Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Sungur, Asli, "TCP – Random Early Detection (RED) mechanism for Congestion Control" (2015). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. R.I.T TCP – Random Early Detection (RED) mechanism for Congestion Control by ASLI SUNGUR This thesis is presented as part of the Degree of Master of Science in Network and System Administration with emphasis in Networking Committee Members: Ali Raza Muhieddin Amer Nirmala Shenoy Information Science and Technologies Department, B. Thomas Golisano College of Computing & Information Sciences Rochester Institute of Technology Rochester, NY July 2, 2015 i Table of Contents Abstract ........................................................................................................................................................ iv Acknowledgement ........................................................................................................................................ v List of Figures .............................................................................................................................................. vi List of Formulas .......................................................................................................................................... vii Acronyms ..................................................................................................................................................... ix 1. Introduction ........................................................................................................................................... 1 1.1 TCP Sequence and Acknowledgement Numbering ...................................................................... 3 1.2 Problem Statement ........................................................................................................................ 5 2. Earlier congestion control techniques ................................................................................................. 10 2.1 Introduction ................................................................................................................................... 10 2.2 Tail Drop ..................................................................................................................................... 11 2.3 Random Drop .............................................................................................................................. 12 3. Random Early Detection ..................................................................................................................... 14 3.1 Introduction ................................................................................................................................. 14 3.2 RED Parameterization................................................................................................................. 14 3.2.1 Introduction ................................................................................................................................. 14 3.2.2 Wq parameterization .................................................................................................................... 16 3.2.3 Minth and Maxth parameterization ............................................................................................... 17 3.2.4 Average Queue Length ............................................................................................................... 18 3.3 RED Algorithm ........................................................................................................................... 19 3.4 Simulations ................................................................................................................................. 24 3.4.1 RED Simulations................................................................................................................. 24 3.4.2 RED and Tail Drop comparison .......................................................................................... 25 3.4.3 RED and Random Drop comparison................................................................................... 27 4. Improvements to RED ............................................................................................................................ 31 4.1 Introduction ................................................................................................................................... 31 4.2 Weighted RED .............................................................................................................................. 32 4.2.1 Cisco WRED Configuration ............................................................................................. 33 4.2.1.1 Enabling WRED .............................................................................................. 33 4.2.1.2 Configuring WRED in a Traffic Policy ........................................................... 34 4.2.1.3 DSCP Compliant WRED Configuration .......................................................... 35 4.2.2 Cisco WRED Implementations ........................................................................................... 36 ii 4.2.3 Juniper WRED Configuration ............................................................................................. 39 4.2.3.1 Enabling WRED .......................................................................................... 39 4.2.3.2 Configuring WRED in a Traffic Policy ....................................................... 40 4.2.4 Juniper WRED Implementations ........................................................................................ 43 4.3 Flow RED ...................................................................................................................................... 46 4.4 Adaptive RED ................................................................................................................................ 47 5. Conclusion .............................................................................................................................................. 50 6. Future work ............................................................................................................................................. 52 Glossary ...................................................................................................................................................... 53 References ................................................................................................................................................... 57 iii Abstract This thesis discusses the Random Early Detection (RED) algorithm, proposed by Sally Floyd, used for congestion avoidance in computer networking, how existing algorithms compare to this approach and the configuration and implementation of the Weighted Random Early Detection (WRED) variation. RED uses a probability approach in order to calculate the probability that a packet will be dropped before periods of high congestion, relative to the minimum and maximum queue threshold, average queue length, packet size and the number of packets since the last drop. The motivation for this thesis has been the high QoS provided to current delay-sensitive applications such as Voice-over-IP (VoIP) by the incorporation of congestion avoidance algorithms derived from the original RED design [45]. The WRED variation of RED is not directly invoked on the VoIP class because congestion avoidance mechanisms are not configured for voice queues. WRED is instead used to prioritize other traffic classes in order to avoid congestion to provide and guarantee high quality of service for voice traffic [43][44]. The most notable simulations performed for the RED algorithm in comparison to the Tail Drop (TD) and Random Drop (RD) algorithms have been detailed in order to show that RED is much more advantageous in terms of congestion control in a network. The WRED, Flow RED (FRED) and Adaptive RED (ARED) variations of the RED algorithm have been detailed with emphasis on WRED. Details of the concepts of forwarding classes, output queues, traffic policies, traffic classes, class maps, schedulers, scheduler maps, and DSCP classification shows that the WRED feature is easily configurable on tier-1 vendor routers. iv Acknowledgement I would like to express my gratitude to Dr. Ali Raza for his scholarly advice, valuable time and encouragement. Dr. Ali Raza’s vast knowledge in networking has helped me achieve a clear picture of concepts that were vital in my understanding of the complex algorithms detailed in this paper. I thank him whole-heartedly. Finally, I would like to thank my parents for their love and supporting me on my journey towards the completion of my degree. v List of Figures Figure 1: Data Transmission between two computers Figure 2: Slow-Start algorithm Figure 3: RED algorithm diagram Figure 4: RED simulation network Figure 5: RED and Tail Drop comparison simulation network Figure 6: Tail Drop delay time Figure 7: RED delay time Figure 8: RED and Random Drop comparison
Recommended publications
  • Control Methods for Data Flow in Communication Networks
    Control Methods for Data Flow in Communication Networks DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Peng Yan, M.S. ***** The Ohio State University 2003 Dissertation Committee: Approved by Professor Hitay Ozbay¨ , Adviser Professor Kevin M. Passino Adviser ¨ ¨ Professor Umit Ozg¨uner Department of Electrical Engineering c Copyright by Peng Yan 2003 ABSTRACT In this dissertation, we investigate various control methods for data flow in communica- tion networks. First, we develop a rate-based flow controller for self-similar network traffic, ½ which consists of a robust À control block and an adaptive LMMSE capacity predictor. The controller guarantees robust stability against time-varying time delay uncertainties and improves the transient response by predicting the self-similar cross traffic. Window-based congestion control methods are also explored for TCP traffic on IP networks. We propose a variable structure approach in Active Queue Management (AQM) support Explicit Con- gestion Notification (ECN). By analyzing the robustness and performance of the control scheme for the nonlinear TCP/AQM model, we show that the proposed design has good performance and robustness with respect to the uncertainties of the round-trip time (RTT) and the number of active TCP sessions, which are central to the notion of AQM. Alterna- ½ tively, we design robust À AQM controllers for the linearized TCP/AQM model, with ½ the presence of uncertain time delays. The À performance is analyzed and a switching control scheme is introduced to improve the system performance. Motivated by the Lin- ½ ear Parameter Varying (LPV) nature of the linearized TCP/AQM model, a switching À control method is further investigated for LPV systems where we provide some stability conditions in terms of the dwell time and the average dwell time.
    [Show full text]
  • An Adaptive Active Queue Management Algorithm in Internet
    UNIVERSITÉ DU QUÉBEC À CHICOUTIMI AN ADAPTIVE ACTIVE QUEUE MANAGEMENT ALGORITHM IN INTERNET MÉMOIRE PRÉSENTÉ COMME EXIGENCE PARTIELLE DE LA MAÎTRISE EN INFORMATIQUE EXTENSIONNÉE DE L'UNIVERSITÉ DU QUÉBEC À MONTRÉAL PAR WANG JIANG JUIN 2006 UNIVERSITÉ DU QUÉBEC À MONTRÉAL Service des bibliothèques Avertissement La diffusion de ce mémoire se fait dans le respect des droits de son auteur, qui a signé le formulaire Autorisation de reproduire et de diffuser un travail de recherche de cycles supérieurs (SDU-522 - Rév.01-2006). Cette autorisation stipule que «conformément à l'article 11 du Règlement no 8 des études de cycles supérieurs, [l'auteur] concède à l'Université du Québec à Montréal une licence non exclusive d'utilisation et de publication de la totalité ou d'une partie importante de [son] travail de recherche pour des fins pédagogiques et non commerciales. Plus précisément, [l'auteur] autorise l'Université du Québec à Montréal à reproduire, diffuser, prêter, distribuer ou vendre des copies de [son] travail de recherche à des fins non commerciales sur quelque support que ce soit, y compris l'Internet. Cette licence et cette autorisation n'entraînent pas une renonciation de [la] part [de l'auteur] à [ses] droits moraux ni à [ses] droits de propriété intellectuelle. Sauf entente contraire, [l'auteur] conserve la liberté de diffuser et de commercialiser ou non ce travail dont [il] possède un exemplaire.» ABSTRACT Random Ear1y Detection (RED) algorithm a recommended active queue management scheme, that is expected to provide several Internet performance advantages such as minimizing packet loss and router queueing delay, avoiding global synchronization of sources, guaranteeing high link utilization and fairness.
    [Show full text]
  • TCP and Queue Management
    White Paper TCP and Queue Management Agilent N2X TCP and Queue Management Background and Motivation Slow start – The slow start mechanism was a direct attempt to avoid congestion collapse by increasing the packet rate Transmission Control Protocol (TCP) and various queue of a connection in a controlled fashion – slowly at first, management algorithms such as tail drop and random faster later on - until congestion is detected (i.e. packets are early detection (RED), etc. are intimately related topics. dropped), and ultimately arrive at a steady packet rate, or Historically, the two evolved together and have had a equilibrium. To achieve this goal, the designers of the slow symbiotic relationship. However, a poor understanding of start mechanism chose an exponential ramp-up function to the relationship between TCP and queue-management successively increase the window size. Slow start introduces algorithms is at the root of why measured performance in a new parameter called the congestion window or cwnd, routers is dramatically different from the actual performance which specifies the number of packets that can be sent of live networks, leading to a need for massive over- without needing a response from the server. TCP starts off provisioning. Explanations of how the various components slowly (hence the name “slow start”) by sending just one of TCP work, and the effect various queuing schemes have packet, then waits for a response (an ACK) from the receiver. on TCP, tends to be isolated on specific topics and scattered. These ACKs confirm that it is safe to send more packets This paper attempts to bring the key concepts together in into the network (i.e.
    [Show full text]
  • Auto-Tuning Active Queue Management
    2017 9th International Conference on Communication Systems and Networks (COMSNETS) Auto-Tuning Active Queue Management Joe H. Novak Sneha Kumar Kasera University of Utah University of Utah Abstract not require pre-specification of even those parameters including 3 Active queue management (AQM) algorithms preemptively EWMA weights or protocol timer intervals that are routinely drop packets to prevent unnecessary delays through a network specified in protocol design and implementation. while keeping utilization high. Many AQM ideas have been When we view the network link in terms of utilization proposed, but none have been widely adopted because these rely and the queue corresponding to the link in terms of delay on pre-specification or pre-tuning of parameters and thresholds (Fig. 1 shows a typical delay-utilization curve), we see that that do not necessarily adapt to dynamic network conditions. as utilization increases, delay also increases. At a certain point, We develop an AQM algorithm that relies only on network however, there is a very large increase in delay for only a small runtime measurements and a natural threshold, the knee on improvement in utilization. This disproportionate increase in the delay-utilization curve. We call our AQM algorithm Delay delay is of little to no value to the applications at the endpoints. Utilization Knee (DUK) based on its key characteristic of We want to avoid this unstable region of high increase in delay keeping the system operating at the knee of the delay-utilization with little increase in utilization. As a result, a natural threshold curve. We implement and evaluate DUK in the Linux kernel in becomes apparent.
    [Show full text]
  • Controlling Queuing Delays for Real-Time Communication: the Interplay of E2E and AQM Algorithms
    Controlling Queuing Delays for Real-Time Communication: The Interplay of E2E and AQM Algorithms Gaetano Carlucci Luca De Cicco Saverio Mascolo Politecnico di Bari, Italy Politecnico di Bari, Italy Politecnico di Bari, Italy [email protected] [email protected] [email protected] ABSTRACT requirements can be met by employing two complementary control Real-time media communication requires not only congestion algorithms: one placed at the end points, namely the end-to-end control, but also minimization of queuing delays to provide congestion control algorithm; the other placed in the network interactivity. In this work we consider the case of real-time routers, i.e. the Active Queue Management (AQM) algorithm. communication between web browsers (WebRTC) and we focus When designing end-to-end congestion control algorithms on the interplay of an end-to-end delay-based congestion control for video conference, UDP is the natural choice, since such algorithm, i.e. the Google congestion control (GCC), with two applications cannot tolerate large latencies due to TCP packet delay-based AQM algorithms, namely CoDel and PIE, and two retransmissions. Additionally, delay-based congestion control flow queuing schedulers, i.e. SFQ and Fq_Codel. Experimental algorithms are usually preferred to loss-based ones since they can investigations show that, when only GCC flows are considered, detect congestion before packets are lost due to buffer overflow. the end-to-end algorithm is able to contain queuing delays without On the other hand, AQM schemes control the router buffers AQMs. Moreover the interplay of GCC flows with PIE or CoDel by dropping the packets or marking them if ECN is used [21].
    [Show full text]
  • Congestion Control and Active Queue Management During Flow Startup
    Department of Computer Science Series of Publications A Report A-2019-7 Congestion Control and Active Queue Management During Flow Startup Ilpo J¨arvinen Doctoral dissertation, to be presented for public examination with the permission of the Faculty of Science of the University of Helsinki, in Auditorium A129, Chemicum building, Kumpula, Helsinki, on the 14th of November, 2019 at 12 o’clock. University of Helsinki Finland Supervisor Markku Kojo, University of Helsinki, Finland Sasu Tarkoma, University of Helsinki, Finland Pre-examiners Pasi Sarolahti, Aalto University, Finland Michael Welzl, University of Oslo, Norway Opponent Anna Brunstr¨om,Karlstad University, Sweden Custos Sasu Tarkoma, University of Helsinki, Finland Contact information Department of Computer Science P.O. Box 68 (Pietari Kalmin katu 5) FI-00014 University of Helsinki Finland Email address: [email protected].fi URL: http://cs.helsinki.fi/ Telephone: +358 2941 911 Copyright c 2019 Ilpo J¨arvinen ISSN 1238-8645 ISBN 978-951-51-5585-6 (paperback) ISBN 978-951-51-5586-3 (PDF) Helsinki 2019 Unigrafia Congestion Control and Active Queue Management During Flow Startup Ilpo J¨arvinen Department of Computer Science P.O. Box 68, FI-00014 University of Helsinki, Finland [email protected].fi PhD Thesis, Series of Publications A, Report A-2019-7 Helsinki, November 2019, 87+48 pages ISSN 1238-8645 ISBN 978-951-51-5585-6 (paperback) ISBN 978-951-51-5586-3 (PDF) Abstract Transmission Control Protocol (TCP) has served as the workhorse to trans- mit Internet traffic for several decades already. Its built-in congestion con- trol mechanism has proved reliable to ensure the stability of the Internet, and congestion control algorithms borrowed from TCP are being applied largely also by other transport protocols.
    [Show full text]
  • Control of Traffic Congestion with Weighted Random Early Detection and Neural Network Implementation
    ICAS 2018 : The Fourteenth International Conference on Autonomic and Autonomous Systems Control of Traffic Congestion with Weighted Random Early Detection and Neural Network Implementation Irina Topalova Pavlinka Radoyska Department of Information Technology College of Energy and Electronics University of Telecommunications and Post, Bulgaria Technical University - Sofia Sofia, Bulgaria Sofia, Bulgaria [email protected] [email protected] Abstract—Applying Quality of Service mechanisms to modern class based QoS policy, of new users added to the backbone communications is essential for the efficiency and for the of the network. A Neural Network (NN), defined among traffic reliability. The various Quality of Service methods are many other types of neural networks NNs by Graupe [1] is based on queues management depending on individual traffic trained to adapt new end users to the QoS policy, already set parameters. Choosing Quality of Service parameters on the by other end-users and accepted by the intermediate routers. edge network devices defines the management queue and packet discard/queued parameters on the intermediate devices. The Weighted Random Early Detection (WRED) method, The proposed research explores the possibility of automatically described in Cisco guide [2], was applied to manage and to adapting to the already selected class based Quality of Service define the train and test NN parameters. The automatic policy, of new users added to the backbone of the network. A adaptation of additional networking devices to existing neural network is trained to automaticlly adapt new end users infrastructure with an already-defined QoS policy would to the quality of service policy, already set by other end-users lead to the release of human resources and acceleration of and accepted by the intermediate routers.
    [Show full text]
  • With Deficit Round Robin (DRR) to Overcome Bufferbloat Problem in Wired Network
    International Journal of Current Engineering and Technology E-ISSN 2277 – 4106, P-ISSN 2347 – 5161 ©2015INPRESSCO®, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Comparative Analysis of Controlled Delay (CoDel) with Deficit Round Robin (DRR) to Overcome Bufferbloat Problem in Wired Network Hashim Ali†* Samiullah Khan† and Muhammad Quaid† †Department of Computer Science, Institute of Business and Management Sciences (IBMS), The University of Agriculture Peshawar Pakistan Accepted 10 Oct 2015, Available online13 Oct 2015, Vol.5, No.5 (Oct 2015) Abstract Bufferbloat is a problem in a packet-switched network which can happen due to increase in buffer size usage with increase in internet traffic. This creates high latency in network which ultimately degrades network performance. The active queue management (AQM) is considered to be solution for bufferbloat problem. The usage of larger size buffer in networks increases the queuing delay. This delay becomes more severe when the buffer remains full persistently behave as bad queue. The transport layer protocol misinterprets this large delay with congestion in networks which degrade their sending rate. This research study focuses on evaluation of CoDel performance for solving bufferbloat problem in wired networks. CoDel was compared with DRR in bandwidth and maximum transmission unit (MTU) simulation scenarios using network simulator-2 (ns-2).The range of packet delay and dropped rate parameters are used to analysis the Codel in above mentioned scenarios for its strengthen and weakness. The results revealed that CoDel has efficiently overcome bufferbloat problem as compare to DRR by having less packet delay. Keywords: Bufferbloat, active queue management, Controlled Delay, Deficit Round Robin, network simulator-2 1.
    [Show full text]
  • Quality of Service (Qos) Primer
    Quality of Service (QoS) Primer Avinash Tadimalla Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Agenda Du Jour What is QoS? Why is it Required? QoS Mechanisms QoS Architectures QoS Deployment Guide Q and A (and C) Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 What is QoS? Quality of Service is an attempt to provide predictable response for applications from end-point to end-point by administratively applying different services within the network infrastructure for the applications OR Quality of Service refers to the capability of a network to provide better service to selected network traffic OR Network provides application with level of performance needed for application to function. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3 What is QoS (contd) “(Better) performance” as described by a set of parameters or measured by a set of metrics. Generic parameters: Bandwidth Delay, Delay-jitter Packet loss rate (or probability) Transport/Application-specific parameters: Timeouts Percentage of “important” packets lost These parameters can be measured at several granularities: “micro” flow, aggregate flow, population. QoS considered “better” if a) more parameters can be specified b) QoS can be specified at a fine-granularity. Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4 What is QoS - Three Perspectives The user perspective • Users perceive that their applications are performing properly Voice, video, and data The network manager perspective • Need to manage bandwidth allocations to deliver the desired application performance Control delay, jitter, and packet loss Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved.
    [Show full text]
  • Lab 16: Random Early Detection (RED)
    NETWORK TOOLS AND PROTOCOLS Lab 16: Random Early Detection (RED) Document Version: 10-10-2019 Award 1829698 “CyberTraining CIP: Cyberinfrastructure Expertise on High-throughput Networks for Big Science Data Transfers” Lab 16: Random Early Detection Contents Overview ............................................................................................................................. 3 Objectives............................................................................................................................ 3 Lab settings ......................................................................................................................... 3 Lab roadmap ....................................................................................................................... 3 1 Introduction ................................................................................................................ 3 1.1 Random Early Detection mechanism ................................................................... 4 2 Lab topology................................................................................................................ 6 2.1 Starting host h1, host h2, and host h3 ................................................................. 7 2.1 Emulating high-latency WAN ............................................................................... 8 2.4 Testing connection ............................................................................................... 9 3 Testing throughput on a network using Drop Tail
    [Show full text]
  • The Yellow Active Queue Management Algorithm in ICN Routers Based on the Monitoring of Bandwidth Competition
    electronics Article The Yellow Active Queue Management Algorithm in ICN Routers Based on the Monitoring of Bandwidth Competition Li Zeng 1,2 , Hong Ni 1,2 and Rui Han 1,2,* 1 National Network New Media Engineering Research Center, Institute of Acoustics, Chinese Academy of Sciences, No. 21 North Fourth Ring Road, Haidian District, Beijing 100190, China; [email protected] (L.Z.); [email protected] (H.N.) 2 School of Electronic, Electrical and Communication Engineering, University of Chinese Academy of Sciences, No. 19A Yuquan Road, Shijingshan District, Beijing 100049, China * Correspondence: [email protected]; Tel.: +86-1-381-107-7380 Abstract: Deploying the active queue management (AQM) algorithm on a router is an effective way to avoid packet loss caused by congestion. In an information-centric network (ICN), routers not only play a role of packets forwarding but are also content service providers. Congestion in ICN routers can be further summarized as the competition between the external forwarding traffic and the internal cache response traffic for limited bandwidth resources. This indicates that the traditional AQM needs to be redesigned to adapt to ICN. In this paper, we first demonstrated mathematically that allocating more bandwidth for the upstream forwarding flow could improve the quality of service (QoS) of the whole network. Secondly, we propose a novel AQM algorithm, YELLOW, which predicts the bandwidth competition event and adjusts the input rate of request and the marking probability adaptively. Afterwards, we model YELLOW through the totally asymmetric simple exclusion process (TASEP) and deduce the approximate solution of the existence condition for each Citation: Zeng, L.; Ni, H.; Han, R.
    [Show full text]
  • Active Queue Management As Quality of Service Enabler for 5G Networks
    Active Queue Management as Quality of Service Enabler for 5G Networks Mikel Irazabal, Elena Lopez-Aguilera and Ilker Demirkol Dept. of Network Engineering, Universitat Politecnica` de Catalunya, Barcelona, Spain Email: [email protected], [email protected], [email protected] Abstract—5G is envisioned as the key technology for guaran- with a bulky TCP traffic for the network resources. Experi- teeing low-latency wireless services. Packets will be marked with mental results expose the benefits that AQM brings into delay- QoS Flow Indicators (QFI) for different forwarding treatment. sensitive traffic, and corroborate that AQM mechanisms will 3GPP defines the end-to-end delay limits, but leaves the QoS provisioning methods as implementation dependent. Different be key enablers to guarantee the QoS criteria defined by 3GPP. services with different constraints will inevitably share queues at some network entity. On the one hand, maintaining the shared II. RELATED WORK queues uncongested will guarantee a rapid packet delivery to the The softwarization process [3] of telecommunication net- subsequent entity. A brief sojourn time is indispensable for an works is leading to new and heterogeneous business models on time low-latency priority traffic delivery. On the other hand, if shared queues are maintained undersized, throughput will be with different constraints and challenges. Thus, the QoS squandered. In this paper, we propose the use of AQM techniques scenario for the 5G standalone network proposed by the in 5G networks to guarantee delay limits of QoS flows. Through 3GPP is challenging. Even though slicing has emerged as the the evaluation of realistic delay-sensitive and background traffic, correct tool for virtualizing the 5G stack, the QoS problems we compare different possible solutions.
    [Show full text]