SlideShare a Scribd company logo
TCP Westwood
End-to-End Congestion Control for Wired/Wireless Networks




                                            By
                                            Guillem C. Mayol
                                            Adrian Viala
                                            Dídac Montero
                                            Mateu Seguí
TCP Westwood: Main features

¤  Improves the performances of TCP Reno over leaky and
    dynamically loaded canal as wireless networks (small
    improve for wired network)
   ¤  TCPW in not very sensitive to random errors.

¤  TCPW fully complies with end-to-end TCP design principle.
   ¤  Not requires inspection of TCP packets at intermediate nodes.
   ¤  BW estimated by continuously monitoring ACKs.

¤  Friendliness with TCP variants, such as Reno.
   ¤  TCPW is a reactive process.

¤  TCPW convergence to fair share.
TCP Westwood: How works?
¤  TCPW works as TCP Reno but with smallest changes.

¤  After 3 ACK losses
   ¤  ssthresh = (BWE * RTTmin)/seg_size;
   ¤  If (cwin > ssthresh) cwin = ssthresh;

¤  Timeout expiration
   ¤  ssthresh = (BWE * RTTmin)/seg_size; (min 2)   3 ACK losses
   ¤  cwin = 1;




                              Timeout
TCP Westwood: How works?




Image source: http://c3lab.poliba.it/index.php/Westwood
delivered to the destination.                                       equal to τ/2 is necessary. But, since the ACK
                             We discuss the use of the information in (2) in section 2.3.     chronous, the sampling frequency constraint c
                          For now, let assume that an ACK is received at the source at        anteed. Thus, to guarantee the Nyquist constr
                          time tk , notifying that dk bytes have been received at the TCP     lish that if a time τ/m (m         2) has elapsed
                          receiver. We can measure the following sample bandwidth             received ACK without receiving any new AC
                          used by that connection as bk = dk / k , where k = tk −tk−1         ter assumes the reception of a virtual null sa
                          and tk−1 is the time the previous ACK was received.                 The situation is shown in figure 1, where tk
                             Since congestion occurs whenever the low-frequency input         an ACK is received, tk+j are the arrival time

   TCP Westwood: End-to-End
                          traffic rate exceeds the link capacity [15] we employ a low-         samples, with tk+j +1 − tk+j = τ/m for j
                          pass filter to average sampled measurements and to obtain the        and bk+j = 0 for j = 0, n − 1 are th
                          low-frequency components of the available bandwidth. No-            ples. Then, bk+n = dk+n / k+n is the bandw

   bandwidth measurement I
                          tice that this averaging is also useful in filtering out the noise   tk+n .
                          due to delayed acknowledgments.                                         It is desirable that after a long time witho
                             In our early design and experimentation, we used a filter         because no new data were sent), the filter ac

¤  BW estimated (BWE) by monitoring the TCP ACKs
                          similar to the one used for RTT estimation in TCP. We de-           vative fashion, progressively decreasing the b
                          termined that such an exponential filter with constant coeffi-        mation as time elapses without new samples.
                          cients is not capable of efficiently filtering out high-frequency     the operation of the TCPW filter when there is
                                                                   Transmitted Bytes
                          components of the bandwidth measurements. We propose the            sence of ACKs after a time t = tk . As can be
            dk     dk
       bk =    =          ;
BW
            Δ k tk − tk−1

      Interarrival ACKs           ACK received at source
delivered to the destination.                                       equal to τ/2 is necessary. But, since the ACK
                          We discuss the use of the information in (2) in section 2.3.     chronous, the sampling frequency constraint c
                       For now, let assume that an ACK is received at the source at        anteed. Thus, to guarantee the Nyquist constr
                       time tk , notifying that dk bytes have been received at the TCP     lish that if a time τ/m (m         2) has elapsed
                       receiver. We can measure the following sample bandwidth             received ACK without receiving any new AC
                       used by that connection as bk = dk / k , where k = tk −tk−1         ter assumes the reception of a virtual null sa
                       and tk−1 is the time the previous ACK was received.                 The situation is shown in figure 1, where tk
                          Since congestion occurs whenever the low-frequency input         an ACK is received, tk+j are the arrival time

   TCP Westwood: End-to-End
                       traffic rate exceeds the link capacity [15] we employ a low-         samples, with tk+j +1 − tk+j = τ/m for j
                       pass filter to average sampled measurements and to obtain the        and bk+j = 0 for j = 0, n − 1 are th
                       low-frequency components of the available bandwidth. No-            ples. Then, bk+n = dk+n / k+n is the bandw

   bandwidth measurement II
                       tice that this averaging is also useful in filtering out the noise   tk+n .
                       due to delayed acknowledgments.                                         It is desirable that after a long time witho
                          In our early design and experimentation, we used a filter         because no new data were sent), the filter ac
                       similar to the one used for RTT estimation in TCP. We de-           vative fashion, progressively decreasing the b
                       termined that such an exponential filter with constant coeffi-        mation as time elapses without new samples.
¤  TCPW uses a low pass filter to average sampled
                       cients is not capable of efficiently filtering out high-frequency
                       components of the bandwidth measurements. We propose the
                                                                                           the operation of the TCPW filter when there is
                                                                                           sence of ACKs after a time t = tk . As can be
    measurements and to obtain low-freq. components of the
    available bandwidth.      BW (Actual)     ACK received at source
     BWE

ˆ = α b + (1− α )( bk + bk−1 ) α k = 2τ − Δ k
bk    ˆ
     k k−1     k
                       2             2τ + Δ k
 Last BWE
                   τ =1/cut-off freq.                                                           Interarrival ACKs

¤  When interarrival ACKs increases (losses?) the most
    important values are the two most recent BW calculated,
    otherwise the Last BWE has more weight.
TCP Westwood: End-to-End
bandwidth measurement III
TCP Westwood: End-to-End
bandwidth measurement IV
TCP Westwood: performance with
       lossy link & fair share
¤  Avg. throughput versus
    number of Reno connections
    over good and lossy link.




                                 "   Convergence toward fair
                                     bandwidth sharing when
                                     connection A started firstly
TCP Westwood: performance
TCP Westwood: performance

More Related Content

What's hot

Otn network poster_web
Otn network poster_webOtn network poster_web
Otn network poster_web
Laura Villarreal
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolMohd Arif
 
Topic : B ISDN
Topic : B ISDNTopic : B ISDN
Topic : B ISDN
Dr Rajiv Srivastava
 
8_QAM__16_QAM.pdf
8_QAM__16_QAM.pdf8_QAM__16_QAM.pdf
8_QAM__16_QAM.pdf
INDIABOLLYWOOD
 
Comm lab manual_final-1
Comm lab manual_final-1Comm lab manual_final-1
Comm lab manual_final-1
Abhishek Bansal
 
AusNOG 2019: TCP and BBR
AusNOG 2019: TCP and BBRAusNOG 2019: TCP and BBR
AusNOG 2019: TCP and BBR
APNIC
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcp
samarai_apoc
 
Wireless Communication Networks and Systems 1st Edition Beard Solutions Manual
Wireless Communication Networks and Systems 1st Edition Beard Solutions ManualWireless Communication Networks and Systems 1st Edition Beard Solutions Manual
Wireless Communication Networks and Systems 1st Edition Beard Solutions Manual
puriryrap
 
Solvedproblems 120406031331-phpapp01
Solvedproblems 120406031331-phpapp01Solvedproblems 120406031331-phpapp01
Solvedproblems 120406031331-phpapp01
Rimple Mahey
 
Cubic
CubicCubic
Cubic
deawoo Kim
 
Sdh concept
Sdh conceptSdh concept
OTN for Beginners
OTN for BeginnersOTN for Beginners
OTN for Beginners
MapYourTech
 
Jitter & wander measurement guide
Jitter & wander measurement guideJitter & wander measurement guide
Jitter & wander measurement guide
HARRY CHAN PUTRA
 
Admission control
Admission controlAdmission control
Admission control
Vishal Waghmare
 
TDD & FDD Interference on TD-LTE B Network
TDD & FDD Interference on TD-LTE B NetworkTDD & FDD Interference on TD-LTE B Network
TDD & FDD Interference on TD-LTE B Network
Ray KHASTUR
 
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Rupesh Sharma
 
Huawei GPON Fundamentals
Huawei GPON FundamentalsHuawei GPON Fundamentals
Huawei GPON Fundamentals
ibrahimnabil17
 
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.comFEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
MapYourTech
 
Chap 09 icmp
Chap 09 icmpChap 09 icmp
Chap 09 icmp
Noctorous Jamal
 

What's hot (20)

Otn network poster_web
Otn network poster_webOtn network poster_web
Otn network poster_web
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Topic : B ISDN
Topic : B ISDNTopic : B ISDN
Topic : B ISDN
 
8_QAM__16_QAM.pdf
8_QAM__16_QAM.pdf8_QAM__16_QAM.pdf
8_QAM__16_QAM.pdf
 
Comm lab manual_final-1
Comm lab manual_final-1Comm lab manual_final-1
Comm lab manual_final-1
 
Advantages of qpsk
Advantages of qpskAdvantages of qpsk
Advantages of qpsk
 
AusNOG 2019: TCP and BBR
AusNOG 2019: TCP and BBRAusNOG 2019: TCP and BBR
AusNOG 2019: TCP and BBR
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcp
 
Wireless Communication Networks and Systems 1st Edition Beard Solutions Manual
Wireless Communication Networks and Systems 1st Edition Beard Solutions ManualWireless Communication Networks and Systems 1st Edition Beard Solutions Manual
Wireless Communication Networks and Systems 1st Edition Beard Solutions Manual
 
Solvedproblems 120406031331-phpapp01
Solvedproblems 120406031331-phpapp01Solvedproblems 120406031331-phpapp01
Solvedproblems 120406031331-phpapp01
 
Cubic
CubicCubic
Cubic
 
Sdh concept
Sdh conceptSdh concept
Sdh concept
 
OTN for Beginners
OTN for BeginnersOTN for Beginners
OTN for Beginners
 
Jitter & wander measurement guide
Jitter & wander measurement guideJitter & wander measurement guide
Jitter & wander measurement guide
 
Admission control
Admission controlAdmission control
Admission control
 
TDD & FDD Interference on TD-LTE B Network
TDD & FDD Interference on TD-LTE B NetworkTDD & FDD Interference on TD-LTE B Network
TDD & FDD Interference on TD-LTE B Network
 
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
 
Huawei GPON Fundamentals
Huawei GPON FundamentalsHuawei GPON Fundamentals
Huawei GPON Fundamentals
 
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.comFEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
FEC-Forward Error Correction for Optics Professionals..www.mapyourtech.com
 
Chap 09 icmp
Chap 09 icmpChap 09 icmp
Chap 09 icmp
 

Viewers also liked

Analysis of TCP variants
Analysis of TCP variantsAnalysis of TCP variants
Lecture 4: TCP and TFRC
Lecture 4: TCP and TFRCLecture 4: TCP and TFRC
Lecture 4: TCP and TFRCWei Tsang Ooi
 
TCP congestion control
TCP congestion controlTCP congestion control
TCP congestion control
Shubham Jain
 
Dial의 이해
Dial의 이해Dial의 이해
Dial의 이해
남억 김
 
CS5229 Lecture 5: TCP and TRFC
CS5229 Lecture 5: TCP and TRFCCS5229 Lecture 5: TCP and TRFC
CS5229 Lecture 5: TCP and TRFCWei Tsang Ooi
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
anuragjagetiya
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
Naveen Dubey
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
Akhil .B
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
Ram Dutt Shukla
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
TCP Model
TCP ModelTCP Model
TCP Model
manojkum22
 
wimax Ppt for seminar
wimax Ppt for seminarwimax Ppt for seminar
wimax Ppt for seminar
Pratik Anand
 

Viewers also liked (16)

Analysis of TCP variants
Analysis of TCP variantsAnalysis of TCP variants
Analysis of TCP variants
 
Lecture 4: TCP and TFRC
Lecture 4: TCP and TFRCLecture 4: TCP and TFRC
Lecture 4: TCP and TFRC
 
TCP congestion control
TCP congestion controlTCP congestion control
TCP congestion control
 
Research paper
Research paperResearch paper
Research paper
 
Dial의 이해
Dial의 이해Dial의 이해
Dial의 이해
 
CS5229 Lecture 5: TCP and TRFC
CS5229 Lecture 5: TCP and TRFCCS5229 Lecture 5: TCP and TRFC
CS5229 Lecture 5: TCP and TRFC
 
TCP protocol flow control
TCP protocol flow control TCP protocol flow control
TCP protocol flow control
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
TCP/IP(networking)
TCP/IP(networking)TCP/IP(networking)
TCP/IP(networking)
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
TCP Model
TCP ModelTCP Model
TCP Model
 
Congestion control
Congestion controlCongestion control
Congestion control
 
wimax Ppt for seminar
wimax Ppt for seminarwimax Ppt for seminar
wimax Ppt for seminar
 

Similar to TCP Westwood

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Tcp performance simulationsusingns2
Tcp performance simulationsusingns2Tcp performance simulationsusingns2
Tcp performance simulationsusingns2
Justin Frankel
 
Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDPsangusajjan
 
Congestion control avoidance
Congestion control avoidanceCongestion control avoidance
Congestion control avoidance
Anthony-Claret Onwutalobi
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
Maulik Patel
 
TCP_Congestion_Control.ppt
TCP_Congestion_Control.pptTCP_Congestion_Control.ppt
TCP_Congestion_Control.ppt
19UCSA032ASANJAYKUMA
 
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
ambitlick
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
NYversity
 
Designing TCP-Friendly Window-based Congestion Control
Designing TCP-Friendly Window-based Congestion ControlDesigning TCP-Friendly Window-based Congestion Control
Designing TCP-Friendly Window-based Congestion Control
soohyunc
 
Mobile comn.pptx
Mobile comn.pptxMobile comn.pptx
Mobile comn.pptx
DAMANDEEPSINGH61
 
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
ijwmn
 
Tcp congestion avoidance
Tcp congestion avoidanceTcp congestion avoidance
Tcp congestion avoidance
Ahmed Kamel Taha
 
Dcom ppt(en.39) dpcm
Dcom ppt(en.39) dpcmDcom ppt(en.39) dpcm
Dcom ppt(en.39) dpcm
Dharit Unadkat
 
Chapter10 switching
Chapter10 switchingChapter10 switching
Chapter10 switching
Suneel Varma
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
SonaliAjankar
 
TCP Performance Optimizations for Wireless Sensor Networks
TCP Performance Optimizations forWireless Sensor NetworksTCP Performance Optimizations forWireless Sensor Networks
TCP Performance Optimizations for Wireless Sensor Networks
Torsten Braun, Universität Bern
 
"Performance Evaluation and Comparison of Westwood+, New Reno and Vegas TCP ...
 "Performance Evaluation and Comparison of Westwood+, New Reno and Vegas TCP ... "Performance Evaluation and Comparison of Westwood+, New Reno and Vegas TCP ...
"Performance Evaluation and Comparison of Westwood+, New Reno and Vegas TCP ...
losalamos
 
Parameters of multipath channel
Parameters of multipath channelParameters of multipath channel
Parameters of multipath channelNaveen Kumar
 
[IJET-V1I3P12] Authors :Inchara K, Shreenath K N,Dr.Srinivasa K G
[IJET-V1I3P12] Authors :Inchara K, Shreenath K N,Dr.Srinivasa K G[IJET-V1I3P12] Authors :Inchara K, Shreenath K N,Dr.Srinivasa K G
[IJET-V1I3P12] Authors :Inchara K, Shreenath K N,Dr.Srinivasa K G
IJET - International Journal of Engineering and Techniques
 
Part9-congestion.pptx
Part9-congestion.pptxPart9-congestion.pptx
Part9-congestion.pptx
Olivier Bonaventure
 

Similar to TCP Westwood (20)

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Tcp performance simulationsusingns2
Tcp performance simulationsusingns2Tcp performance simulationsusingns2
Tcp performance simulationsusingns2
 
Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDP
 
Congestion control avoidance
Congestion control avoidanceCongestion control avoidance
Congestion control avoidance
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
TCP_Congestion_Control.ppt
TCP_Congestion_Control.pptTCP_Congestion_Control.ppt
TCP_Congestion_Control.ppt
 
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
 
Designing TCP-Friendly Window-based Congestion Control
Designing TCP-Friendly Window-based Congestion ControlDesigning TCP-Friendly Window-based Congestion Control
Designing TCP-Friendly Window-based Congestion Control
 
Mobile comn.pptx
Mobile comn.pptxMobile comn.pptx
Mobile comn.pptx
 
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
 
Tcp congestion avoidance
Tcp congestion avoidanceTcp congestion avoidance
Tcp congestion avoidance
 
Dcom ppt(en.39) dpcm
Dcom ppt(en.39) dpcmDcom ppt(en.39) dpcm
Dcom ppt(en.39) dpcm
 
Chapter10 switching
Chapter10 switchingChapter10 switching
Chapter10 switching
 
Mobile transport layer
 Mobile transport layer Mobile transport layer
Mobile transport layer
 
TCP Performance Optimizations for Wireless Sensor Networks
TCP Performance Optimizations forWireless Sensor NetworksTCP Performance Optimizations forWireless Sensor Networks
TCP Performance Optimizations for Wireless Sensor Networks
 
"Performance Evaluation and Comparison of Westwood+, New Reno and Vegas TCP ...
 "Performance Evaluation and Comparison of Westwood+, New Reno and Vegas TCP ... "Performance Evaluation and Comparison of Westwood+, New Reno and Vegas TCP ...
"Performance Evaluation and Comparison of Westwood+, New Reno and Vegas TCP ...
 
Parameters of multipath channel
Parameters of multipath channelParameters of multipath channel
Parameters of multipath channel
 
[IJET-V1I3P12] Authors :Inchara K, Shreenath K N,Dr.Srinivasa K G
[IJET-V1I3P12] Authors :Inchara K, Shreenath K N,Dr.Srinivasa K G[IJET-V1I3P12] Authors :Inchara K, Shreenath K N,Dr.Srinivasa K G
[IJET-V1I3P12] Authors :Inchara K, Shreenath K N,Dr.Srinivasa K G
 
Part9-congestion.pptx
Part9-congestion.pptxPart9-congestion.pptx
Part9-congestion.pptx
 

Recently uploaded

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 

Recently uploaded (20)

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 

TCP Westwood

  • 1. TCP Westwood End-to-End Congestion Control for Wired/Wireless Networks By Guillem C. Mayol Adrian Viala Dídac Montero Mateu Seguí
  • 2. TCP Westwood: Main features ¤  Improves the performances of TCP Reno over leaky and dynamically loaded canal as wireless networks (small improve for wired network) ¤  TCPW in not very sensitive to random errors. ¤  TCPW fully complies with end-to-end TCP design principle. ¤  Not requires inspection of TCP packets at intermediate nodes. ¤  BW estimated by continuously monitoring ACKs. ¤  Friendliness with TCP variants, such as Reno. ¤  TCPW is a reactive process. ¤  TCPW convergence to fair share.
  • 3. TCP Westwood: How works? ¤  TCPW works as TCP Reno but with smallest changes. ¤  After 3 ACK losses ¤  ssthresh = (BWE * RTTmin)/seg_size; ¤  If (cwin > ssthresh) cwin = ssthresh; ¤  Timeout expiration ¤  ssthresh = (BWE * RTTmin)/seg_size; (min 2) 3 ACK losses ¤  cwin = 1; Timeout
  • 4. TCP Westwood: How works? Image source: http://c3lab.poliba.it/index.php/Westwood
  • 5. delivered to the destination. equal to τ/2 is necessary. But, since the ACK We discuss the use of the information in (2) in section 2.3. chronous, the sampling frequency constraint c For now, let assume that an ACK is received at the source at anteed. Thus, to guarantee the Nyquist constr time tk , notifying that dk bytes have been received at the TCP lish that if a time τ/m (m 2) has elapsed receiver. We can measure the following sample bandwidth received ACK without receiving any new AC used by that connection as bk = dk / k , where k = tk −tk−1 ter assumes the reception of a virtual null sa and tk−1 is the time the previous ACK was received. The situation is shown in figure 1, where tk Since congestion occurs whenever the low-frequency input an ACK is received, tk+j are the arrival time TCP Westwood: End-to-End traffic rate exceeds the link capacity [15] we employ a low- samples, with tk+j +1 − tk+j = τ/m for j pass filter to average sampled measurements and to obtain the and bk+j = 0 for j = 0, n − 1 are th low-frequency components of the available bandwidth. No- ples. Then, bk+n = dk+n / k+n is the bandw bandwidth measurement I tice that this averaging is also useful in filtering out the noise tk+n . due to delayed acknowledgments. It is desirable that after a long time witho In our early design and experimentation, we used a filter because no new data were sent), the filter ac ¤  BW estimated (BWE) by monitoring the TCP ACKs similar to the one used for RTT estimation in TCP. We de- vative fashion, progressively decreasing the b termined that such an exponential filter with constant coeffi- mation as time elapses without new samples. cients is not capable of efficiently filtering out high-frequency the operation of the TCPW filter when there is Transmitted Bytes components of the bandwidth measurements. We propose the sence of ACKs after a time t = tk . As can be dk dk bk = = ; BW Δ k tk − tk−1 Interarrival ACKs ACK received at source
  • 6. delivered to the destination. equal to τ/2 is necessary. But, since the ACK We discuss the use of the information in (2) in section 2.3. chronous, the sampling frequency constraint c For now, let assume that an ACK is received at the source at anteed. Thus, to guarantee the Nyquist constr time tk , notifying that dk bytes have been received at the TCP lish that if a time τ/m (m 2) has elapsed receiver. We can measure the following sample bandwidth received ACK without receiving any new AC used by that connection as bk = dk / k , where k = tk −tk−1 ter assumes the reception of a virtual null sa and tk−1 is the time the previous ACK was received. The situation is shown in figure 1, where tk Since congestion occurs whenever the low-frequency input an ACK is received, tk+j are the arrival time TCP Westwood: End-to-End traffic rate exceeds the link capacity [15] we employ a low- samples, with tk+j +1 − tk+j = τ/m for j pass filter to average sampled measurements and to obtain the and bk+j = 0 for j = 0, n − 1 are th low-frequency components of the available bandwidth. No- ples. Then, bk+n = dk+n / k+n is the bandw bandwidth measurement II tice that this averaging is also useful in filtering out the noise tk+n . due to delayed acknowledgments. It is desirable that after a long time witho In our early design and experimentation, we used a filter because no new data were sent), the filter ac similar to the one used for RTT estimation in TCP. We de- vative fashion, progressively decreasing the b termined that such an exponential filter with constant coeffi- mation as time elapses without new samples. ¤  TCPW uses a low pass filter to average sampled cients is not capable of efficiently filtering out high-frequency components of the bandwidth measurements. We propose the the operation of the TCPW filter when there is sence of ACKs after a time t = tk . As can be measurements and to obtain low-freq. components of the available bandwidth. BW (Actual) ACK received at source BWE ˆ = α b + (1− α )( bk + bk−1 ) α k = 2τ − Δ k bk ˆ k k−1 k 2 2τ + Δ k Last BWE τ =1/cut-off freq. Interarrival ACKs ¤  When interarrival ACKs increases (losses?) the most important values are the two most recent BW calculated, otherwise the Last BWE has more weight.
  • 9. TCP Westwood: performance with lossy link & fair share ¤  Avg. throughput versus number of Reno connections over good and lossy link. "   Convergence toward fair bandwidth sharing when connection A started firstly