< draft-irtf-tmrg-tools-04.txt   draft-irtf-tmrg-tools-05.txt >
Internet Engineering Task Force S. Floyd Internet Engineering Task Force S. Floyd
INTERNET-DRAFT E. Kohler INTERNET-DRAFT E. Kohler
Intended status: Informational Editors Intended status: Informational Editors
Expires: January 2008 8 July 2007 Expires: August 2008 23 February 2008
Tools for the Evaluation of Simulation and Testbed Scenarios Tools for the Evaluation of Simulation and Testbed Scenarios
draft-irtf-tmrg-tools-04.txt draft-irtf-tmrg-tools-05.txt
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 1, line 33 skipping to change at page 1, line 33
months and may be updated, replaced, or obsoleted by other documents months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress." reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 2008. This Internet-Draft will expire on August 2008.
Abstract Abstract
This document describes tools for the evaluation of simulation and This document describes tools for the evaluation of simulation and
testbed scenarios used in research on Internet congestion control testbed scenarios used in research on Internet congestion control
mechanisms. We believe that research in congestion control mechanisms. We believe that research in congestion control
mechanisms has been seriously hampered by the lack of good models mechanisms has been seriously hampered by the lack of good models
underpinning analysis, simulation, and testbed experiments, and that underpinning analysis, simulation, and testbed experiments, and that
tools for the evaluation of simulation and testbed scenarios can tools for the evaluation of simulation and testbed scenarios can
help in the construction of better scenarios, based on better help in the construction of better scenarios, based on better
skipping to change at page 3, line 14 skipping to change at page 3, line 14
Table of Contents Table of Contents
1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . 5 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . 5
2. Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2. Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.1. Characterizing Aggregate Traffic on a Link . . . . . . . 6 2.1. Characterizing Aggregate Traffic on a Link . . . . . . . 6
2.2. Characterizing an End-to-End Path. . . . . . . . . . . . 6 2.2. Characterizing an End-to-End Path. . . . . . . . . . . . 6
2.3. Other Characteristics. . . . . . . . . . . . . . . . . . 7 2.3. Other Characteristics. . . . . . . . . . . . . . . . . . 7
3. The Distribution of Per-packet Round-trip Times . . . . . . . 7 3. The Distribution of Per-packet Round-trip Times . . . . . . . 7
4. The Distribution of Connection Sizes. . . . . . . . . . . . . 8 4. The Distribution of Connection Sizes. . . . . . . . . . . . . 8
5. The Distribution of Packet Sizes. . . . . . . . . . . . . . . 9 5. The Distribution of Packet Sizes. . . . . . . . . . . . . . . 10
6. The Ratio Between Forward-path and Reverse-path Traf- 6. The Ratio Between Forward-path and Reverse-path Traf-
fic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 fic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
7. The Distribution of Per-Packet Peak Flow Rates. . . . . . . . 11 7. The Distribution of Per-Packet Peak Flow Rates. . . . . . . . 11
8. The Distribution of Transport Protocols.. . . . . . . . . . . 11 8. The Distribution of Transport Protocols.. . . . . . . . . . . 12
9. The Synchronization Ratio . . . . . . . . . . . . . . . . . . 12 9. The Synchronization Ratio . . . . . . . . . . . . . . . . . . 12
10. Drop or Mark Rates as a Function of Packet Size. . . . . . . 13 10. Drop or Mark Rates as a Function of Packet Size. . . . . . . 14
11. Drop Rates as a Function of Burst Size.. . . . . . . . . . . 15 11. Drop Rates as a Function of Burst Size.. . . . . . . . . . . 16
12. Drop Rates as a Function of Sending Rate.. . . . . . . . . . 18 12. Drop Rates as a Function of Sending Rate.. . . . . . . . . . 18
13. Congestion Control Mechanisms for Traffic, along 13. Congestion Control Mechanisms for Traffic, along
with Sender and Receiver Buffer Sizes. . . . . . . . . . . . . . 18 with Sender and Receiver Buffer Sizes. . . . . . . . . . . . . . 19
14. Characterization of Congested Links in Terms of 14. Characterization of Congested Links in Terms of
Bandwidth and Typical Levels of Congestion . . . . . . . . . . . 18 Bandwidth and Typical Levels of Congestion . . . . . . . . . . . 19
14.1. Bandwidth . . . . . . . . . . . . . . . . . . . . . . . 19 14.1. Bandwidth . . . . . . . . . . . . . . . . . . . . . . . 19
14.2. Queue Management Mechanisms . . . . . . . . . . . . . . 19 14.2. Queue Management Mechanisms . . . . . . . . . . . . . . 19
14.3. Typical Levels of Congestion. . . . . . . . . . . . . . 19 14.3. Typical Levels of Congestion. . . . . . . . . . . . . . 19
15. Characterization of Challenging Lower Layers.. . . . . . . . 19 15. Characterization of Challenging Lower Layers.. . . . . . . . 19
15.1. Error Losses. . . . . . . . . . . . . . . . . . . . . . 19 15.1. Error Losses. . . . . . . . . . . . . . . . . . . . . . 20
15.2. Packet Reordering . . . . . . . . . . . . . . . . . . . 20 15.2. Packet Reordering . . . . . . . . . . . . . . . . . . . 20
15.3. Delay Variation . . . . . . . . . . . . . . . . . . . . 20 15.3. Delay Variation . . . . . . . . . . . . . . . . . . . . 21
15.4. Bandwidth Variation . . . . . . . . . . . . . . . . . . 21 15.4. Bandwidth Variation . . . . . . . . . . . . . . . . . . 22
15.5. Bandwidth and Latency Asymmetry . . . . . . . . . . . . 22 15.5. Bandwidth and Latency Asymmetry . . . . . . . . . . . . 23
15.6. Queue Management Mechanisms . . . . . . . . . . . . . . 23 15.6. Queue Management Mechanisms . . . . . . . . . . . . . . 24
16. Network Changes Affecting Congestion . . . . . . . . . . . . 23 16. Network Changes Affecting Congestion . . . . . . . . . . . . 24
16.1. Routing Changes: Routing Loops . . . . . . . . . . . . 24 16.1. Routing Changes: Routing Loops . . . . . . . . . . . . 24
16.2. Routing Changes: Fluttering. . . . . . . . . . . . . . 24 16.2. Routing Changes: Fluttering. . . . . . . . . . . . . . 25
16.3. Routing Changes: Routing Asymmetry . . . . . . . . . . 25 16.3. Routing Changes: Routing Asymmetry . . . . . . . . . . 26
16.4. Link Disconnections and Intermittent Link Con- 16.4. Link Disconnections and Intermittent Link Con-
nectivity . . . . . . . . . . . . . . . . . . . . . . . . . . 25 nectivity . . . . . . . . . . . . . . . . . . . . . . . . . . 26
16.5. Changes in Wireless Links: Mobility . . . . . . . . . . 26 16.5. Changes in Wireless Links: Mobility . . . . . . . . . . 27
17. Using the Tools Presented in this Document . . . . . . . . . 27 17. Using the Tools Presented in this Document . . . . . . . . . 27
18. Related Work . . . . . . . . . . . . . . . . . . . . . . . . 27 18. Related Work . . . . . . . . . . . . . . . . . . . . . . . . 27
19. Conclusions. . . . . . . . . . . . . . . . . . . . . . . . . 27 19. Conclusions. . . . . . . . . . . . . . . . . . . . . . . . . 27
20. Security Considerations. . . . . . . . . . . . . . . . . . . 27 20. Security Considerations. . . . . . . . . . . . . . . . . . . 27
21. IANA Considerations. . . . . . . . . . . . . . . . . . . . . 27 21. IANA Considerations. . . . . . . . . . . . . . . . . . . . . 28
22. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 27 22. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 28
Informative References . . . . . . . . . . . . . . . . . . . . . 27 Informative References . . . . . . . . . . . . . . . . . . . . . 28
Editors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 31 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 32
Full Copyright Statement . . . . . . . . . . . . . . . . . . . . 31 Full Copyright Statement . . . . . . . . . . . . . . . . . . . . 32
Intellectual Property. . . . . . . . . . . . . . . . . . . . . . 32 Intellectual Property. . . . . . . . . . . . . . . . . . . . . . 32
TO BE DELETED BY THE RFC EDITOR UPON PUBLICATION: TO BE DELETED BY THE RFC EDITOR UPON PUBLICATION:
Changes from draft-irtf-tmrg-tools-04.txt:
* Added to the cection on "Congestion Control Mechanisms for
Traffic". From a contribution from Sara Landstrom.
Changes from draft-irtf-tmrg-tools-03.txt: Changes from draft-irtf-tmrg-tools-03.txt:
* No changes. * No changes.
Changes from draft-irtf-tmrg-tools-02.txt: Changes from draft-irtf-tmrg-tools-02.txt:
* Added sections on Challenging Lower Layers and Network * Added sections on Challenging Lower Layers and Network
Changes affecting Congestion. Contributed by Jasani Rohan, Changes affecting Congestion. Contributed by Jasani Rohan,
with Julie Tarr, Tony Desimone, Christou Christos, and with Julie Tarr, Tony Desimone, Christou Christos, and
Vemulapalli Archana. Vemulapalli Archana.
* Minor editing. * Minor editing.
Changes from draft-irtf-tmrg-tools-01.txt: Changes from draft-irtf-tmrg-tools-01.txt:
* Added section on "Drop Rates as a Function of Sending Rate." * Added section on "Drop Rates as a Function of Sending Rate."
* Added a number of new references. * Added a number of new references.
END OF SECTION TO BE DELETED. END OF SECTION TO BE DELETED.
1. Introduction 1. Introduction
This document discusses tools for the evaluation of simulation and This document discusses tools for the evaluation of simulation and
testbed scenarios used in research on Internet congestion control testbed scenarios used in research on Internet congestion control
skipping to change at page 18, line 42 skipping to change at page 19, line 10
Internet, the level of statistical multiplexing on the congested Internet, the level of statistical multiplexing on the congested
links of an end-to-end path can be inferred indirectly through per- links of an end-to-end path can be inferred indirectly through per-
flow measurements, by observing whether the packet drop rate varies flow measurements, by observing whether the packet drop rate varies
as a function of the sending rate of the flow. as a function of the sending rate of the flow.
13. Congestion Control Mechanisms for Traffic, along with Sender and 13. Congestion Control Mechanisms for Traffic, along with Sender and
Receiver Buffer Sizes. Receiver Buffer Sizes.
Effect on congestion control metrics: Please don't evaluate AQM Effect on congestion control metrics: Please don't evaluate AQM
mechanisms by using Reno TCP, or evaluate new transport protocols by mechanisms by using Reno TCP, or evaluate new transport protocols by
comparing them with the performance of Reno TCP! For an comparing them with the performance of Reno TCP. For measurement
explanation, see [FK02] (Section 3.4). data, see below. For a more detailed explanation, see [FK02]
(Section 3.4).
Measurements: See [MAF05]. SACK and DSACK: Medina et al. in [MAF05] tested 84,394 servers for
SACK capability. Of these, the majority, 68%, were SACK-Capable.
Approximately half of the SACK-Capable web servers supported DSACK.
Allman in [A00] reports that the percentage of web clients that were
SACK-Capable increased from 8% in December 1998 to 40% in March
2000. This trend continued, with 88% of the clients advertising
`SACK permitted' in the 2004 data reported in [MAF05]. Only 3% of
the clients sent DSACKs, but this number does not reveal how many
clients would have sent DSACKs upon receiving duplicate data.
Reno and NewReno: When the TBIT client used by Medina et al. in
[MAF05] pretended not to be SACK-Capable, only 33% of the web
servers were classified as NewReno, Reno, Tahoe, or Other, but of
these, the majority (76%) were classified as NewReno, and 15% were
classified as Reno. In [PF01] NewReno was already observed as the
dominating congestion control algorithm in the absence of SACK
information. Out of 3,728 web servers, 1,571 performed NewReno
congestion control in that investigation.
14. Characterization of Congested Links in Terms of Bandwidth and 14. Characterization of Congested Links in Terms of Bandwidth and
Typical Levels of Congestion Typical Levels of Congestion
14.1. Bandwidth 14.1. Bandwidth
14.2. Queue Management Mechanisms 14.2. Queue Management Mechanisms
14.3. Typical Levels of Congestion 14.3. Typical Levels of Congestion
[Pointers to the current state of our knowledge.] [Pointers to the current state of our knowledge.]
15. Characterization of Challenging Lower Layers. 15. Characterization of Challenging Lower Layers.
skipping to change at page 27, line 31 skipping to change at page 28, line 15
21. IANA Considerations 21. IANA Considerations
There are no IANA considerations in this document. There are no IANA considerations in this document.
22. Acknowledgements 22. Acknowledgements
Thanks to Xiaoliang (David) Wei for feedback and contributions to Thanks to Xiaoliang (David) Wei for feedback and contributions to
this document. The sections on "Challenging Lower Layers" and this document. The sections on "Challenging Lower Layers" and
"Network Changes Affecting Congestion" are contributions from Jasani "Network Changes Affecting Congestion" are contributions from Jasani
Rohan with Julie Tarr, Tony Desimone, Christou Christos, and Rohan with Julie Tarr, Tony Desimone, Christou Christos, and
Vemulapalli Archana. Vemulapalli Archana. The section on "Congestion Control Mechanisms
for Traffic, along with Sender and Receiver Buffer Sizes" includes
contributions from Sara Landstrom.
Informative References Informative References
[MAWI] M.W. Group, Mawi working group traffic archive, URL [MAWI] M.W. Group, Mawi working group traffic archive, URL
"http://tracer.csl.sony.jp/mawi/". "http://tracer.csl.sony.jp/mawi/".
[A00] M. Allman, A Web Server's View of the Transport Layer, [A00] M. Allman, A Web Server's View of the Transport Layer,
Computer Communication Review, 30(5), October 200. Computer Communication Review, 30(5), October 200.
[AAR03] Alhussein A. Abouzeid, Sumit Roy, Stochastic Modeling of TCP [AAR03] Alhussein A. Abouzeid, Sumit Roy, Stochastic Modeling of TCP
skipping to change at page 30, line 14 skipping to change at page 30, line 47
[MAF05] A. Medina, M. Allman, and A. Floyd. Measuring the Evolution [MAF05] A. Medina, M. Allman, and A. Floyd. Measuring the Evolution
of Transport Protocols in the Internet. Computer Communication of Transport Protocols in the Internet. Computer Communication
Review, April 2005. Review, April 2005.
[NISTNet] NIST Net, URL "http://snad.ncsl.nist.gov/itg/nistnet/". [NISTNet] NIST Net, URL "http://snad.ncsl.nist.gov/itg/nistnet/".
[NM01] J. Neale and A. Mohsen. Impact of CF-DAMA on TCP via [NM01] J. Neale and A. Mohsen. Impact of CF-DAMA on TCP via
Satellite Performance. Globecom, Nov. 2001. Satellite Performance. Globecom, Nov. 2001.
[PF01] J. Padhye and S. Floyd, Identifying the TCP Behavior of Web
Servers, SIGCOMM 2001, August 2001.
[P96] Paxson, V., (1996) End-to-end Routing Behavior in the [P96] Paxson, V., (1996) End-to-end Routing Behavior in the
Internet. Proceedings of SIGCOMM 96, pp. 25-38, August 1992. Internet. Proceedings of SIGCOMM 96, pp. 25-38, August 1992.
[P97] V. Paxson. End-to-end Routing Behavior in the Internet. [P97] V. Paxson. End-to-end Routing Behavior in the Internet.
IEEE/ACM Transactions on Networking, 5(5):60115, October 1997. IEEE/ACM Transactions on Networking, 5(5):60115, October 1997.
[PJD04] R. Prasad, M. Jain, and C. Dovrolis, On the Effectiveness of [PJD04] R. Prasad, M. Jain, and C. Dovrolis, On the Effectiveness of
Delay-Based Congestion Avoidance, PFLDnet 2004, February 2004. Delay-Based Congestion Avoidance, PFLDnet 2004, February 2004.
[QZK01] L. Qiu, Y. Zhang, and S. Keshav, Understanding the [QZK01] L. Qiu, Y. Zhang, and S. Keshav, Understanding the
skipping to change at page 31, line 22 skipping to change at page 32, line 11
[ZSC91] L. Zhang, S. Shenker, and D.D. Clark, Observations and [ZSC91] L. Zhang, S. Shenker, and D.D. Clark, Observations and
Dynamics of a Congestion Control Algorithm: the Effects of Two- Dynamics of a Congestion Control Algorithm: the Effects of Two-
way Traffic, SIGCOMM 1991. way Traffic, SIGCOMM 1991.
[22] [22]
[23] [23]
[24] [24]
Editors' Addresses Authors' Addresses
Sally Floyd <floyd@icir.org> Sally Floyd
ICSI Center for Internet Research ICSI Center for Internet Research
1947 Center Street, Suite 600 1947 Center Street, Suite 600
Berkeley, CA 94704 Berkeley, CA 94704
USA USA
Email: floyd@acm.org
Eddie Kohler <kohler@cs.ucla.edu> Eddie Kohler
4531C Boelter Hall 4531C Boelter Hall
UCLA Computer Science Department UCLA Computer Science Department
Los Angeles, CA 90095 Los Angeles, CA 90095
USA USA
Email: kohler@cs.ucla.edu
Full Copyright Statement Full Copyright Statement
Copyright (C) The IETF Trust (2007). This document is subject to Copyright (C) The IETF Trust (2008). This document is subject to
the rights, licenses and restrictions contained in BCP 78, and the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights. except as set forth therein, the authors retain all their rights.
This document and the information contained herein are provided on This document and the information contained herein are provided on
an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE
IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY
WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE
ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS
 End of changes. 28 change blocks. 
32 lines changed or deleted 67 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/