New techniques for making transport protocols robust to corruption-based loss

Current congestion control algorithms treat packet loss as an indication of network congestion, under the assumption that most losses are caused by router queues overflowing. In response to losses (congestion), a sender reduces its sending rate in an effort to reduce contention for shared network resources. In network paths where a non-negligible portion of loss is caused by packet corruption, performance can suffer due to needless reductions of the sending rate (in response to "perceived congestion" that is not really happening). This paper explores a technique, called Cumulative Explicit Transport Error Notification (CETEN), that uses information provided by the network to bring the transport's long-term average sending rate closer to that dictated by only congestion-based losses. We discuss several ways that information about the cumulative rates of packet loss due to congestion and corruption might be obtained from the network or through fairly generic transport layer instrumentation. We then explore two ways to use this information to develop a more appropriate congestion control response (CETEN). The work in this paper is done in terms of TCP. Since numerous transport protocols use TCP-like congestion control schemes, the CETEN techniques we present are applicable to other transports as well. In this paper, we present early simulation results that show CETEN to be a promising technique. In addition, this paper discusses a number of practical and thorny implementation issues associated with CETEN.

[1]  Randall J. Atkinson,et al.  Security Architecture for the Internet Protocol , 1995, RFC.

[2]  Jeffrey C. Mogul,et al.  Fragmentation considered harmful , 1987, CCRV.

[3]  Jon Postel,et al.  Internet Control Message Protocol , 1981, RFC.

[4]  Hari Balakrishnan,et al.  Explicit Loss Notification and Wireless Web Performance , 2006 .

[5]  V. Jacobson,et al.  Congestion avoidance and control , 1988, CCRV.

[6]  Benjamin Arazi,et al.  A commonsense approach to the theory of error correcting codes , 1988, MIT Press Series in Computer Systems.

[7]  Stephen E. Deering,et al.  Path MTU discovery , 1990, RFC.

[8]  David L. Black,et al.  The Addition of Explicit Congestion Notification (ECN) to IP , 2001, RFC.

[9]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[10]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[11]  Sally Floyd,et al.  TCP Selective Acknowledgement Options , 1996 .

[12]  Jerome H. Saltzer,et al.  End-to-end arguments in system design , 1984, TOCS.

[13]  Srinivasan Seshan,et al.  Improving TCP/IP performance over wireless networks , 1995, MobiCom '95.

[14]  Mark Handley,et al.  Equation-based congestion control for unicast applications , 2000, SIGCOMM.

[15]  Stephen E. Deering,et al.  Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.

[16]  Lixia Zhang,et al.  Stream Control Transmission Protocol , 2000, RFC.

[17]  B. R. Badrinath,et al.  I-TCP: indirect TCP for mobile hosts , 1995, Proceedings of 15th International Conference on Distributed Computing Systems.

[18]  Stephen Deering,et al.  Internet Protocol Version 6(IPv6) , 1998 .

[19]  Mischa Schwartz,et al.  ACM SIGCOMM computer communication review , 2001, CCRV.

[20]  Craig Partridge,et al.  Packet reordering is not pathological network behavior , 1999, TNET.

[21]  Ray Jain,et al.  The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.

[22]  Wesley M. Eddy Improving Transport Control Protocol Performance With Path Error Rate Information , 2004 .

[23]  Sally Floyd,et al.  Simulation-based comparisons of Tahoe, Reno and SACK TCP , 1996, CCRV.

[24]  William Stallings,et al.  Data and Computer Communications , 1985 .

[25]  Stefan Savage,et al.  TCP congestion control with a misbehaving receiver , 1999, CCRV.

[26]  Raj Jain,et al.  The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.

[27]  Ramesh Govindan,et al.  Estimating Router ICMP Generation Delays , 2002 .

[28]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[29]  Rajesh Krishnan,et al.  Explicit transport error notification (ETEN) for error-prone wireless and satellite networks , 2004, Comput. Networks.

[30]  Sven Jaap,et al.  TCP-friendly Rate Control (TFRC) , 2004 .

[31]  Mark Allman,et al.  Estimating loss rates with TCP , 2003, PERV.

[32]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[33]  Donald F. Towsley,et al.  Modeling TCP throughput: a simple model and its empirical validation , 1998, SIGCOMM '98.

[34]  Sally Floyd,et al.  Measuring interactions between transport protocols and middleboxes , 2004, IMC '04.

[35]  Mark Handley,et al.  Congestion control for high bandwidth-delay product networks , 2002, SIGCOMM '02.

[36]  Jörg Widmer,et al.  TCP Friendly Rate Control (TFRC): Protocol Specification , 2003, RFC.

[37]  Sally Floyd,et al.  An Extension to the Selective Acknowledgement (SACK) Option for TCP , 2000, RFC.