Dynamic Internet Congestion with Bursts Stefan Schmid Roger Wattenhofer Distributed Computing Group, ETH Zurich 13th International Conference On High Performance Computing (HiPC) Bangalore, India, December 2006 Dynamic Internet Internet Stefan Schmid, ETH Zurich @ HiPC 2006 2 Dynamic Internet Stefan Schmid, ETH Zurich @ HiPC 2006 3 Dynamic Internet Stefan Schmid, ETH Zurich @ HiPC 2006 4 Dynamic Internet Stefan Schmid, ETH Zurich @ HiPC 2006 5 TCP Congestion Control • The available bandwidth changes dynamically over time depending on the demands of other computers. • In order to prevent collapses, hosts in the Internet collaboratively reduce load in busy times of high congestion! • Successful strategy: TCP congestion control - Additive Increase, Muliplicative Decrease (AIMD) - Indications for congestion: e.g., packet loss Stefan Schmid, ETH Zurich @ HiPC 2006 6 Selfish Behavior (1) Stefan Schmid, ETH Zurich @ HiPC 2006 7 Selfish Behavior (2) • Some participants may not care about stability of Internet, but selfishly aim at maximizing own throughput! • Given the dynamics of the available bandwidth, selfish throughput maximization constitutes an optimization problem! Stefan Schmid, ETH Zurich @ HiPC 2006 8 In this Paper… • Introduction of models for dynamic changes of congestion. • Study of selfish (online) algorithms which maximize throughput. Stefan Schmid, ETH Zurich @ HiPC 2006 9 Talk Overview • Model • Multiplicative Dynamics • „Bursty Dynamics“ • Open Research Questions and Conclusion Stefan Schmid, ETH Zurich @ HiPC 2006 10 Talk Overview • Model • Multiplicative Dynamics • „Bursty Dynamics“ • Open Research Questions and Conclusion Stefan Schmid, ETH Zurich @ HiPC 2006 11 Model (1) • We divide time into rounds t, for t = 1, 2, ….! • The available bandwidth at time t is ut • The selfish sender uses a sending rate xt at time t • Selfish player does not know ut: All a sender knows is whether her sending in the last round was larger than the available bandwidth (i.e., xt>ut, hence congestion!), or not (binary feedback). - If xt>ut packets are dropped by routers. - Consequently, a selfish transfer protocol has to decide xt without knowing the present or future available bandwidth: framework for online algorithms! Stefan Schmid, ETH Zurich @ HiPC 2006 12 Model (2) • • The optimization problem can be formalized as follows! rate Sending rate too large, no transmission at all! Gain of optimal (offline algorithm) OPT: ut xt • t Gain of online algorithm ALG: Packets come through, but opportunity costs! Maybe harsh, but retransmissions, timeouts, etc. is overhead! Stefan Schmid, ETH Zurich @ HiPC 2006 13 Model (3) • Goal of the online algorithm is to send always at the rate of the available bandwidth, or slightly lower! • We are interested in minimizing the strict competitive ratio (worst-case!): That is, the gain of ALG should be almost as large as the one of the optimal offline algorithm OPT! Stefan Schmid, ETH Zurich @ HiPC 2006 14 Talk Overview • Model • Multiplicative Dynamics • „Bursty Dynamics“ • Open Research Questions and Conclusion Stefan Schmid, ETH Zurich @ HiPC 2006 15 Talk Overview • Model • Multiplicative Dynamics • „Bursty Dynamics“ • Open Research Questions and Conclusion Stefan Schmid, ETH Zurich @ HiPC 2006 16 Multiplicative Dynamics (1) • If ut can change arbitrarily over time, there is no competitive algorithm: ut can always be chosen slightly smaller than xt! • However, assuming arbitrary changes may also be too pessimistic! • Consequently, we want to restrict the dynamics. • Model 1: Multiplicative dynamics changes max by a constant factor μ, i.e., an adversary (worst-case!) can choose the available bandwidth from the interval Stefan Schmid, ETH Zurich @ HiPC 2006 17 Multiplicative Dynamics (2) • Online Algorithm: After a round with sending rate lower or equal the available bandwidth, increase rate by a factor of μ, otherwise reduce sending rate by a factor μ3 • Analysis: - After a „bad“ round, there will always be a „good“ round due to the sharp cut of the sending rate. - Good rounds are at most μ4-competitive. - The gain of OPT in bad round is at most a factor μ larger than the gain of ALG in the preceding good round. - Consequently, Stefan Schmid, ETH Zurich @ HiPC 2006 18 Talk Overview • Model • Multiplicative Dynamics • „Bursty Dynamics“ • Open Research Questions and Conclusion Stefan Schmid, ETH Zurich @ HiPC 2006 19 Talk Overview • Model • Multiplicative Dynamics • „Bursty Dynamics“ • Open Research Questions and Conclusion Stefan Schmid, ETH Zurich @ HiPC 2006 20 Bursty Dynamics (1) • So far: Adversary can change congestion by at most a constant factor in each round. • There are many additional models for congestion dynamics, waiting for efficient online algorithms! • One dynamics model studied on the network layer is network calculus! Stefan Schmid, ETH Zurich @ HiPC 2006 21 Bursty Dynamics (2) • Network Calculus is used to analyse queuing strategies in networks from a worst-case perspective (worst-case queuing)! • Network Caculus are not only interesting on the network layer, but may serve as a good dynamics model on the transport layer as well! • In our paper, we propose to study Network Calculus models for congestion control! Stefan Schmid, ETH Zurich @ HiPC 2006 22 Network Calculus (1) • Traditional Network Calculus - Defines arrival curves (e.g., leaky-bucket arrival curve) - Traffic coming out of a router is assumed to adhere to arrival curve. - If this is the case, bounds for queue lengths and delays can be computed (with min-plus algebra). Arrival curve: max burst b and rate r Total number of bits coming out of router should never exceed arrival curve attached at all points! Stefan Schmid, ETH Zurich @ HiPC 2006 23 Network Calculus (2) • Leaky-bucket arrival curve allows for bursts in the traffic, as long as they are only temporal. • After quite times with low rates, power can be accumulated for another traffic burst. Stefan Schmid, ETH Zurich @ HiPC 2006 24 Dynamic Network Calculus Congestion • We adopt these properties and allow our congestion adversary to change the available bandwidth with bursts! • The adversary can choose the new bandwidth as follows: • Thereby, Change in round t Arrival curve: accumulate during quiet times with few changes, but at most factor B Stefan Schmid, ETH Zurich @ HiPC 2006 25 Results • Upper Bound: Online algorithm which cuts sending rate by half after bad rounds, and increases the rate by μ B1/3 yields a competitive ratio of • Lower Bound: No online algorithm can achieve a competitive ratio better than against a Network Calculus adversary. Stefan Schmid, ETH Zurich @ HiPC 2006 26 Talk Overview • Model • Multiplicative Dynamics • „Bursty Dynamics“ • Open Research Questions and Conclusion Stefan Schmid, ETH Zurich @ HiPC 2006 27 Talk Overview • Model • Multiplicative Dynamics • „Bursty Dynamics“ • Open Research Questions and Conclusion Stefan Schmid, ETH Zurich @ HiPC 2006 28 Open Research Questions • Selfish TCP: A real threat? • Verification of model in practice! • Fill gap between our upper and lower bound! • Randomized algorithms (also for multiplicative adversary) • Other arrival curves, study of different dynamics • More generally: Adaption and analysis of network calculus for other dynamic models! Limitations? Stefan Schmid, ETH Zurich @ HiPC 2006 29 Discussion • Selfishness in congestion control - Devise throughput maximizing protocols • Network Calculus: An interesting model for dynamics! - Lots of future research! - However, challenging analysis! • Transport layer: Algorithmically less understood than other layers! Stefan Schmid, ETH Zurich @ HiPC 2006 30 Questions and Comments? Thank you for your attention! Stefan Schmid Distributed Computing Group schmiste@ethz.ch http://dcg.ethz.ch/members/stefan.html Stefan Schmid, ETH Zurich @ HiPC 2006 31