Networking Essentials: Congestion Control
This is the sixth in a series of class notes as I go through the free Udacity Computer Networking Basics course.
Say we have a central switch S that is linked to a destination D with a connection capacity of 1 Mbps. However, we have two source hosts H1 and H2 connecting through S trying to send data to D at rates of 10 Mbps and 100 Mbps respectively.
The exact numbers don’t matter, but the point is H1 and H2 are trying to send data at a much higher rate than the S-D link can take it. The S-D link is a bottleneck!
By Internet architecture design, the source hosts H1 and H2 are unaware of each other, and of the current state of the S-D link. As a result, they very inefficiently compete for resources on the bottleneck and this can be lead to lost packets and long delays, to the point where the S-D link isn’t even used to its full capacity because of all the failures. This is called congestion collapse.
Congestion Collapse is defined where an increase in load leads to a decrease in useful work. It can be caused by:
- spurious retransmission (of packets, due to how TCP works when packets are dropped and ACKs aren’t received)
- solution: better timers and TCP congestion control
- undelivered packets (packets consume resources but are dropped elsewhere in the network)
- apply congestion control to ALL traffic
So given the realities of different bandwidths in our network, we want to:
- Use network resources efficiently
- Preserve fair allocation of resources
- avoid congestion collapse
You can chart Fairness and Efficiency between two hosts with a phase plot:
You can accomplish these goals with network-assisted congestion control where routers provide feedback with a bit to indicate congestion (eg the Explicit Congestion Notification extension in TCP) but more commonly the congestion control is implicit, or end-to-end, where the network does not give feedback and congestion is inferred by looking at packet loss and delays.
In TCP Congestion Control, senders slowly increase their rate until packets are dropped. Packet loss is interpreted as congestion and the rate is slowed down. The rate is increased again periodically to retest the network in case the congestion was temporary (eg due to a maxed out buffer in a router).
The increase/decrease algorithm can work in two ways.
- Window-based algorithms have a set number of packets out at any given time. New packets are sent when ACKs from old packets are received. So if extant packets drop, new packets don’t get sent, and the effective send rate decreases, and vice versa. So the window size is a natural control. The increase and decrease of window size is a different matter: when a packet is successfully sent, the window size “additively” increases by one. When a packet fails, the window size is cut “multiplicatively” in half. This asymmetric increase/decrease algorithm is known as Additive Increase, Multiplicative Decrease (AIMD).
- Rate-based alogithms monitor their loss rate instead, and use a timer to modulate their rate. This is less common.
On a phase plot, AIMD moves rates up parallel to the X1 = X2 “fair” line, and down according to its angle to the origin:
In terms of individual rate over time, AIMD also results in a “sawtooth” plot:
A TCP sender sends at an average rate of 3/4 of it’s window size due to AIMD.
To calculate throughput, you take the average rate divided by the RTT, or
3/4 * Wm/RTT.
Also because of AIMD, the time between the troughs is given by
Wm/2 + 1 (the
Wm/2 being the time taken to increase the height of half the window 1 at a time, and the
1 being the time it takes to decrease it in half).
To calculate the loss rate, Compare the area under the sawtooth (successful sends) to the total packets sent, i.e.
1/2 * Wm/2 * (Wm/2 + 1) or basically
Wm^2 / 8.
Throughput and LossRate are related by
Throughput ~ k/(RTT * sqrt(Lossrate)).
There is a special congestion problem that specifically happens in the conditions of data centers. Incast is a drastic reduction in application throughput that results when servers using TCP all simultaneously request data (sometimes with Barrier Synchronization, leading to a gross underutilization of network capacity in many-to-one communication networks like a datacenter. This is due to:
- Requirement of high bandwidth and low latency
- Many parallel requests coming from servers
- High “fan in” in a data center
- Small buffers in switches
- Filled up switch buffers result in bursty retransmissions cause by TCP timeouts that last hundreds of milliseconds
- But (as above) the requirement of low latency typically on the order of <1ms.
Two solutions are:
- Fine grained TCP retransmission timers on the order of microseconds instead of milliseconds
- Clients acknowledging every other packet instead of every packet, reducing network load
Bottom line: Timers should operate on a granularity close to the RTT of the network, and in a Data Center that is <1ms.
The next half of this piece focuses on dealing with the unique problems of sending multimedia and streaming. Some characteristics of these situations are:
- Large volume of data (eg video with sound)
- Data volume varies over time (depending on compression algorithm)
- Low tolerance for delay variation
- Low tolerance for delay
The most important of these is delay variation. We can establish a clientside buffer to manage some variation and variance but delay variations will threaten the smooth playback especially if the buffer is starved.
TCP is not a good fit for streaming. It is meant to:
- deliver reliably - but the client may not care about that
- slow down upon loss - this leads to delay variation
- 20 byte header for every packet - significant overhead
UDP is better:
- no retransmission
- no sending rate adaptation
- small header
Youtube (streaming video)
All videos are converted to Flash, and every browser can play it with HTTP/TCP. Even though TCP isn’t a good fit for streaming, the creators of Youtube preferred to keep it simple so it can leverage existing HTTP/TCP infrastructure like CDNs.
Skype has a central login server but uses P2P to exchange data. It compresses to a fairly low bitrate (67 bytes/pkt, 140 pkts/sec or 40kbps), encrypted both ways. But it is still very susceptible to drops in network quality.
We can use explicit reservations, or marking and policing packet streams as higher priorities.
If we have a VOIP app and an FTP app both sharing the same bandwidth, we want to make sure the VOIP has a higher priority. We can mark the audio packets as they arrive at the router with a priority queue, and then use scheduling (eg weighted fair queueing where you simply serve the high-pri queue more often than the low-pri queue)
Hopefully this has been a good high level overview of the Congestion control and some of its practical implementations/applications. I am planning more primers and would love your feedback and questions on: