Sunteți pe pagina 1din 6

Charge Allocation Concept for Fairer Resource

Sharing in Best-Effort Network


Yaser Miaji and Suhaidi Hassan
InternetWorks Research Group, UUM College of Arts and Sciences,
University Utara Malaysia, 06010 UUM Sintok, MALAYSIA.
yaser@gmail.com, suhaidi@ieee.org
Abstract-The potential increase in the popularity of greedy The rest of the paper is organized as following. Next
software such as download accelerator software and greedy section demonstrates some background in the topic which
application such as P2P leads to a significant demands for followed by a discussion section in the max-min fairness
reconstruction of the old fashion max-min fairness definition. and its weakness with simulation support. Section IV
Furthermore, these applications and software monopolize
proposes the max-min charge concept and its mathematics.
network bandwidth and hence result in magnificent degrada-
tion in the performance of real-time application such as VOIP, Section V conceptually and analytically compares the
video conferencing and IPTV. This paper intends to conventional fairness concept with the proposed. The final
introduce new fairness concept based on charge allocation in section concludes the paper.
oppose of bandwidth allocation. This idea is discussed and
II. BACKGROUND
analyzed conceptually and analytically with comparison to
the famous Weighted Fair Queueing. The result shows The Internet is considered as a best effort network since it
impressive increases in fairness and protection of resource heavily depends on Internet Protocol (IP) which has a
sharing. This research stimulates and redirects researcher primary concept of best-effort. By the concept of best-
attention to another dimension.
effort IP tend to deliver the packets with no guarantee and
I. INTRODUCTION no reliability. However, such behavior could potentially
harm some real-time application such Voice Over IP
Network and Internet nowadays, are the most powerful
(VOIP) and Internet Protocol Television (IPTV) which are
tools for academic, public facilities, leisure, hospital and
quite popular in these days.
everyone everywhere. Its popularity is increased in daily
basis with the introduction of less cost service, software On the other hand, Routing in datagram network requires
and even hardware. This excessive boom leads to potential subtle and rigorous procedure since it involves congestion
lack in resources; therefore, those gigantesque clients control which is complicated with the presence of the
deliberately endeavor to achieve larger resources than they conflict between the reliable Transport Control Protocol
deserve and hence accelerate their download, browsing and (TCP) and the best effort and no guarantee Internet
so forth. Consequently, users utilize malicious programs Protocol (IP). Figure 2.1 shows some categorization of the
and applications such as download accelerator programs strategies used for congestion control. Among those
and P2P. The use of such programs and application shall strategies, scheduling mechanism is the potential specially,
be with the sacrifice of others, particularly with the most for real-time application to achieve the Quality of Service
sensitive application such as real-time application. (QoS) criterion.
Scheduling mechanism plays a central responsibility in Congestion
remedy such issue and protect these application and hence Control
regular users from those misbehaved [1]. However,
scheduler themselves suffer from insufficient functionality Close Loop Open Loop
due to an old fashion and restricted law of fairness. These
antiquated concepts are ineffectively serve packets and
result in limitation in the ability of real-time application [2]. Explicit Implicit Source
This tragic impact is the consequence of the utilization of
the old concept of fairness and protection namely; max- Scheduling
Destination
min fairness by Demers et al. [3]. Although there are Mechanism
several other fairness notions have proposed in the Figure 2.1: Congestion control categorization
literature such as proportional fairness and balanced
fairness [4-6], all of them are primarily based on
bandwidth allocation. Therefore, max-min fairness is Scheduling mechanism provide implicit congestion control
discussed in this paper since it is the most deployment with its meticulous chore. However, the ultimate mission
notion. This paper proposes different concept or in other of scheduling discipline has not been precisely met due to
words the opposition of bandwidth allocation. It rather some weakness in the essential component of the
proposes the charge allocation. mechanism which called fairness.
The principle of fairness is based on max-min criterion , individual demand
which first introduced by Demers in 1989 [3] and no
Therefore, according to max-min fairness, if all the
further modification or update have been integrated in this
demands are equals and there is no weight for any of the
definition since that time. This definition depends on three
elements. Which is been discussed in section III. Later in users, each user shall get even though, the sum of their
the literature, scholars evolve the first fair queueing demands could exceed the available bandwidth which is 1
mechanism introduces by Negle [7-9] but the fairness in this case.
principle remain the same.
The most famous scheduling mechanism in the literature is
Weighted Fair Queueing (WFQ) [3]. WFQ occupies the
max-min, indeed, it is the first scheduling mechanism
which introduces this concept. Primarily, it attempts to
approximate General Process Sharing (GPS) model which
considered as the optimum resource sharing model.
However, WFQ does not achieve its promises as claimed
by Bennett [10]. The study result of Bennett shows that
WFQ fall behind GPS several packets and hence, its
fairness is weak. Therefore, Bennett proposes his
mechanism which named as Worst case Weighted Fair
Queueing (WF2Q) [11]. Unfortunately, WF2Q appears as
Figure 3-1: mix-min concept
unimplemented in real world due to its complexity.
Another distinct mechanism is Self Clocked Fair Queueing Now, let assume that user 1 has a demand of which is
(SCFQ) [12]. This mechanism establishes a novel concept less than . Consequently, the remaining bandwidth is
with much less system complexity by introducing the
principle of approximation. The Authors allege that the will be divided among all users. Therefore, the fair
virtual finish time could be estimated from the virtual time
for the current packet in service and thus no overhead
share for each user will be . The same
calculation is considered necessary. Nevertheless, this
estimation does not meet the minimum fairness required to algorithm will applied for all other users which mean that
achieve QoS for real-time application. if their demands are less than what is assigned to them,
There are tens of mechanisms proposed in the literature to they will just get their demand and the remaining will be
achieve the optimum level of all scheduling properties divided fairly among others.
which are; fairness, protection, bounding delay, flexibility Now let take a numerical example. Let assume that there
and simplicity [13, 14]. However, all of these mechanisms are three users. First user demand 5 units, second user
adopt the same fairness mechanism which is max-min demand 8 units and the last demands 10 units and the total
fairness. This paper is presenting a new concept which network resource is 18 units. Obviously, the sum of their
could stimulate the research thinking and diverse their demands is 23 which are more than the available
studies. bandwidth. According to max-min rule each user will get
III. MAX-MIN FAIRNESS which is equal to 6. However, the demand for the first
3.1 The principle of max-min fairness user is 5 and hence according to max-min, first user will
get just what it demand which is equal to 5. Therefore,
The max-min concept is defines as the maximization of the there is one remaining unit which will be divided equally
minimum fair share of the bandwidth. Fairness in the among the other two users. As a consequence, the second
network resource sharing with the concept of max-min and the third user will receive 6.5 each and since 6.5 is less
generally, should encounter three basic conditions. Firstly, than the demand of the second and the third users’ demand,
resources are allocated in increasing order of the demand. they will get equal share.
Secondly, no user receives more than their demands.
Finally, users with unsatisfied demands obtain equal shares. These three main conditions of max-min fairness regulate
There could be another condition which weight assigns to the concept. However, even though it tightens the max-min
each user. principle and provides reasonable link-share fairness, there
are some weaknesses and breaches which could be
Figure 3-1 present an example of implementing max-min exploited from greedy user and allow more bandwidth
algorithm. Let assume that we have total bandwidth of 1 allocation to them. These weaknesses are been identified
and the demands of the users are and and elaborated in next sub-section.
the total number of users are N. Notice that users demand
could exceed the available resource as in equation 2.1, 3.2 Max-min and scheduling mechanism
however, the total resource is distributed fairly among Max-min principle has tightened packet transmission by
users. occupying the three conditions. So, how these rules could
2.1 be applied in scheduling mechanisms? In this section WFQ
is adopted to exemplify the utilization of max-min concept
= total demand
in scheduling mechanisms since WFQ is most widely used Now let us take this scenario which is given in figure 3.1,
scheduler and is considered as the basis for all scheduling consider that is a small packet (VOIP) arrived in
mechanisms. session i at time with size of and at a bursty stream of
WFQ is primarily based on max-min principle and assigns 3 long size (FTP) packets arrived at session
weighted for the flows, so, there will some management of j at time , respictively. Furthermore, since
the promptness of the packet transmission. Furthermore, by packet rate for session i is second packet is
providing weight, WFQ is indeed, imposing an anticipated to be arrived at . Now, the virtual finishing
enhancement for QoS for real-time applications as packets time for each packet before the arrival of in flow based
from such sensitive applications are assigned higher weight. WFQ is:
So, how the cooperation between scheduling mechanism 3.4
and max-min is been implemented? WFQ as an example of
most scheduling mechanisms in the literature, implements
the max-min and the scheduling as following. Virtual 3.5
finishing time is calculated for each packet according to
packet length, flow rate, virtual finishing time of previous 3.6
packet and the access time of current packet as in equation
3.1.
3.7
3.1
Notice that:
F = Virtual finish time for the previous packet, a = Virtual
arrival time, = weight assigned to the session and L =
packet length
for all packets and sessions since IP precedence
Consequently, there are two cases. Firstly, if IP precedence (TOS) is not active in flow based WFQ.
(Type of Service (TOS)) is applied, packets with TOS,
which apparently sensitive applications, is been transmitted depend on not on as in the
first. Secondly, in the absence of TOS, packets with case of since is higher than .
minimum vertical finishing time are served first.
Referring to equation 3.3 the new virtual finishing time for
Apparantely, the length of the packet plays an important
session j would be:
role and hence sensitive application such as real-time and
telnet packets are served first as they have smaller packet 3.8
size (see equation 3.2).
3.9
3.2
3.10
Now, let us examine the scheduling of the arrival of bursty
traffic with long size packet in a single session (flow) and a When packet arrived in session i at , its is
constant rate real-time traffic such as VOIP by posing the calculated as following:
scenario shown in figure 3.1. The behavior of Constant Bit
Rate (CBR) of real-time traffic is about 64Kbps if Pulse 3.11
Coded Modulation (PCM) is been used [15]. Furthermore,
the average packet size is about 80bytes. However, in the Therefore, although . This has been
case of non-sensitive traffics such as FTP, its bit rate is demonstrated in figure 3.3. Consequently, WFQ with max-
varies and unpredictable and the average packet size is min principle is supportive for QoS for real-time
about 512 bytes. application. Furthermore, in the presence of IP precedence
(TOS), the previous mentioned statement shall be much
Assume that there are two users i and j are sending various
enhanced since TOS will provide prioritization property.
packets. User i is sending small packets with CBR of and
packet size of . The other user j is sending long size
packets with bursty behavior and for simplicity we assume Pi,1 Pj,1 Pj,3 Pj,4, Pi,2
that it is sending packets every with the rate of Packet virtual access
time (a) ta1 ta2 ta3 ta4
every and packet length of .
Pi,1 Pj,1 Pi,2 Pj,3
Suppose that the mean size of real-time packets is times Packet virtual
smaller than the second user, we assume that departure time (d) td1 td2 td3 td4
3.3
Figure 3.3: timeframe for virtual access and finishing time for the packets

Notice that
= maximum packet size eligible for transmission in
link . Furthermore, it is all usually assigned as 1500B by
default.
3.3 Weakness of max-min fairness principle Consequently, according to max-min principle and
equation 3.1, . Therefore, will suffer from
Under the previous mentioned concepts and conditions, all
packets will be treated equally and QoS will not be delay since at least two packets from will be served
provided. Therefore, assigning a weight for each user before the departure of packets.
could apply some Quality of Service to the algorithm. 3.3.2 Congestion predicament
Weighted Fair Queuing (WFQ) proposed by Demers [3]
provides such functions. However, in the presence of According to max-min principle and conditions, in the
congestion, WFQ will assign the same weight for all the occurrence of congestion all packets will be treated equally
flows or in other words it would be a fair queuing. This and this will be with the tradeoff for real-time application
section reveals three primary weakness of max-min which and hence QoS is not supported in such situation. In other
has been exploited form malicious user to monopolize the words, sensitive application such as real-time application
bandwidth. will not receive any priority over the others in the
occurrence of congestion which leads to enormous
3.3.1 Small packet predicament degradation in its reliability and performance.
Misbehaved users could establish a connection and keep 3.3.3 Concurrent connection predicament
sending packets with smaller size than other applications
and hence, they will be eventually allocated more Concurrent connection is misbehaved attitudes which
bandwidth than others. For example, the smallest packet recently gather attention by various users and several
size for telnet, which is probably very small, is about 45 software have been designed to efficiently accomplish such
bytes including the IP header of 20 bytes and TCP header behavior. Even though, users are not aware of the
of 20 bytes. That means the data in this packet according to unfairness caused due to the utilization of such software,
real data taken using Snoop, in figure 3.1 is 5 bytes1. these greedy application should be stopped by imposing
network mechanism on them and hence, users will not use
If we have taken in account that this specific packet has it anymore. Next section is designed to explore the
used the minimum size of TCP header and its data is about previous mentioned three issues with examples and
5 bytes, we will estimate that the reiteration of such packet simulation support.
is rare in the network. Consequently, greedy users could
send packet with minimum data and bursty behavior and IV. MAX-MIN CHARGE
consequently, will be allocated more bandwidth than Section III reveals the weakness of max-min principle and
others. This could be implemented in faster downloading the inefficient fairness and protection provided by it
of a webpage using multiply HTTP connection for each adoption in scheduling mechanism. This weakness is
object in the page. This assumption is been proofed in next exposed after the development in computer and network
sub-section using simulation aids. applications such as the greedy software and the real-time
applications. Therefore, there are demands for a new
principle to be adopted which effectively provides better
fairness and higher protection.
Max-min charge is proposed in this paper. The concept of
max-min charge and its condition is presented in this
section. Analytical analysis is also, discussed and next
section provide some comparison between max-min
fairness and max-min charge.
4.1 Principle of max-min charge
Max-min charge [17] is basically based in the allocation of
charges among all users. In other words, blocking
transmission is imposed in the flows in accordance to
specific conditions. By adopting such principle, scheduling
Figure 1.3: IP packet for telnet application mechanisms are providing better fairness and higher
protection.
Let take this scenario, consider a link shared by two users
. is a misbehaved user establishing multiple Before the conditions and the principle of max-min charge
connections (HTTP for example). Moreover, assume that are illustrated further, various definitions and lemmas
sending small packets with fixed length of and with a should be explained.
bursty behavior. is a normal user establish VOIP
Consider a shared resource R and a set of users u that
connection with packet length of . Notice that
contend R with demands D = { }. Assume that
VOIP packets are normally not less than 80 bytes [16]2.
there are two policies. is used to determine bandwidth
allocation and to determine the
charge (blockage) allocation .
1
Note that this is a mean size not the minimum size. Minimum size of
data included in telnet packet could be as small as 1 byte. Definition 4.1
2
The assumption of 80 bytes ignores the header compression since
misbehaved user could perform it as well.
The policy is considered true if it respect the following Definition 4.5
conditions for all possible demand D:
A specific flow considered as saturated once
1. for all its queue size reaches 95% and above.
This means that resource allocation for user should Definition 4.6
not be negative since the negative sign implies the
The policy considered active if it satisfied the following
feeding of the resource from user side.
constraints:
2.
1.
This highlights two points: This means that to activate such policy, the output
buffer B should reach or exceed 25% of its
a. The sum of resource allocation for all users
capacity.
should not exceed the total resource available
2.
for the link shared.
The number of backlogged flows should be equal
b. is limited and finite.
to 2 or more.
3.
Property 4.4
This condition implies that the assigned resource for
user should not exceed its demand.
Now we assume that has the following properties: This property identifies the greedy user from other users.
Property 4.1 Therefore, any flow has a reception rate double or more the
most second user is considered as a greedy user.
Non of the flows is assigned larger resource than others
with the same demand. Property 4.5

If considered as saturated flow packet should be dropped.


Property 4.2
Property 4.6
If the demand of the any two flows less than the allocated
bandwidth, the allocated bandwidth should be equal.
If there are more than flow considered as backlogged and
bottleneck, non of them considered as greedy.
Property 4.3 Property 4.7
Any flow cannot increase its allocated bandwidth by
simply increases its demand.
Definition 4.7
The policy considered max-min charge if and only if
Now to define we need to first define some basic combines both .
terminology:
Lemma 4.1
Definition 4.2
A specific queue marked as bottleneck queue
if and only if its packet reception rate exceeds double Proof 4.1
the reception rate of the second most. If the demand for session considered as greedy, it will be
For example if we have three flows allocated more charges means that it will be escaped in
next round and hence the allocation is less.
Lemma 4.2
And
Output buffer will not suffer from the congestion issue
= is packet reception rate for queue . since it will be dealt in each flow.
Definition 4.3 Proof 4.2
A specific queue considered as backlogged if There are to actions is been taken by max-min charge once
and only if its packet reception rate exceeded its packet the output buffer reaches or exceed 25%. Firstly, all greedy
transmission rate . users will be blocked in current round and packets will be
dropped from the greed y flow. Secondly, all saturated
Definition 4.4 flow will be also, experienced packet drop but not
A specific flow considered as congested flow blockage. Therefore, the congestion occurrence in the
once its queue size reaches at least 75% of the total buffer output buffer is rare.
size of that flow. Lemma 4.3
Max-min charge provides better protection. [11] J. C. R. Bennett, H. Zhang, and F. Syst, "WF 2 Q:
worst-case fair weighted fair queueing," in IEEE
Proof 4.3
INFOCOM, 1996.
All greedy users will be punished by two methods: round
[12] S. J. Golestani and M. Bellcore, "A self-clocked
escaped and packet dropped and this will deserve the right
fair queueing scheme for broadband applications,"
for other users.
in INFOCOM'94. Networking for Global
V. Conclusion Communications, 1994, pp. 636-646.
Max-min fairness principle allows a concurrent and small [13] Y. Miaji and S. Hassan, "A Survey on the
packet breaches. In small packet weakness exploitation, Chronological Evolution of Timestamp
greedy software transmits FTP packet, which has large size Schedulers in Packet Switching Networks," in
and bursty packet behavior in nature [16], in smaller Proceedings of the 2nd IEEE International
packet size. Nevertheless, this software does not avoid the Conference on Broadband Network & Multimedia
burstiness attitude [18, 19]. Consequently, its queue is Technology, 2009 (IC-BNMT '09), 2009, pp. pp.
expected to be backlogged and the queue size is larger than 213-219.
the rest and hence is bottleneck.
[14] Y. Miaji and S. Hassan, "A Comparative Survey
Max-min charge avoids both effect the concurrent and of Scheduling Mechanisms in the Internet," in
small packet breaches. Furthermore, it provides protection Proceedings of the IEEE TENCON 2009,
and better fairness for all users. Finally, max-min charge is Singapore, 2009.
executed in all cases including congestion situation.
[15] A. P. Markopoulou, F. A. Tobagi, and M. J.
REFERENCES Karam, "Assessment of VoIP quality over Internet
backbones," 2002, pp. 150-159.
[1] E. J. Hernandez-Valencia, L. Benmohamed, R.
Nagarajan, and S. Chong, "Rate control [16] A. K. Jena, A. Popescu, and A. A. Nilsson,
algorithms for the ATM ABR service," European Modeling and Evaluation of Internet Applications:
Transactions on Telecommunications, vol. 8, pp. Karlskrona, 2002.
7-20, 2008. [17] Y. Miaji and S. Hassan, "Just Queueing (JQ):
[2] D. Comer and M. Martynov, "Extensible Modular Scheduling Algorithm for the Internet," in The
Design and Implementation of Hybrid Packet First International Conference on Networks &
Schedulers," 2008, pp. 70-74. Communications (NetCoM-2009), 2009, pp. 161-
165.
[3] A. Demers, S. Keshav, and S. Shenker, "Analysis
and simulation of a fair queueing algorithm," [18] M. Yasin, M. A. Wahla, and F. Kausar, "Analysis
Applications, Technologies, Architectures, and of Download Accelerator Plus (DAP) for Forensic
Protocols for Computer Communication, pp. 1-12, Artefacts," in 2009 Fifth International Conference
1989. on IT Security Incident Management and IT
Forensics, 2009, pp. 142-152.
[4] T. Bonald, L. Massoulié, A. Proutiere, and J.
Virtamo, "A queueing analysis of max-min [19] J. Shu and P. Varaiya, "Pricing network services,"
fairness, proportional fairness and balanced in IEEE INFOCOM 2003, 2003, pp. 1221-1230.
fairness," Queueing systems, vol. 53, pp. 65-84,
2006.
[5] Z. Cao and E. W. Zegura, "Utility max-min: an
application-oriented bandwidth
allocationscheme," 1999.
[6] L. Massoulie and J. Roberts, "Bandwidth sharing:
objectives and algorithms," 1999.
[7] J. Nagle, "Congestion Control in IP/TCP
Internetworks," ACM SIGCOMM Computer
Communication Review, 1984.
[8] J. Nagle, "RFC-896: Congestion Control in
IP/TCP Internetworks," Request For Comments,
1984.
[9] J. Nagle, "RFC 970: On packet switches with
infinite storage," Request For Comments, 1985.
[10] J. C. R. Bennett and H. Zhang, "Why WFQ Is Not
Good Enough for Integrated Services Networks,"
in NOSSDAV, 1996, p. 524—532.

S-ar putea să vă placă și