skip to main content
article

A wavelet-based approach to detect shared congestion

Published: 01 August 2008 Publication History

Abstract

Per-flow congestion control helps endpoints fairly and efficiently share network resources. Better utilization of network resources can be achieved, however, if congestion management algorithms can determine when two different flows share a congested link. Such knowledge can be used to implement cooperative congestion control or improve the overlay topology of a P2P system. Previous techniques to detect shared congestion either assume a common source or destination node, drop-tail queueing, or a single point of congestion. We propose in this paper a novel technique, applicable to any pair of paths on the Internet, without such limitations. Our technique employs a signal processing method, wavelet denoising, to separate queueing delay caused by network congestion from various other delay variations. Our wavelet-based technique is evaluated through both simulations and Internet experiments. We show that, when detecting shared congestion of paths with a common endpoint, our technique provides faster convergence and higher accuracy while using fewer packets than previous techniques, and that it also accurately determines when there is no shared congestion. Furthermore, we show that our technique is robust and accurate for paths without a common endpoint or synchronized clocks; more specifically, it can tolerate a synchronization offset of up to one second between two packet flows.

References

[1]
M. S. Kim, T. Kim, Y. Shin, S. S. Lam, and E. J. Powers, "A wavelet-based approach to detect shared congestion," in Proc. ACM SIGCOMM, 2004, pp. 293-305.
[2]
H. Balakrishnan, H. Rahul, and S. Seshan, "An integrated congestion management architecture for Internet hosts," in Proc. ACM SIGCOMM, 1999, pp. 175-187.
[3]
M. S. Kim, Y. Li, and S. S. Lam, "Eliminating bottlenecks in overlay multicast," in Proc. IFIP Networking, May 2005, pp. 893-905.
[4]
K. Harfoush, A. Bestavros, and J. Byers, "Robust identification of shared losses using end-to-end unicast probe," in Proc. 8th IEEE Int. Conf. Network Protocols, Nov. 2000, pp. 22-33.
[5]
D. Rubenstein, J. Kurose, and D. Towsley, "Detecting shared congestion of flows via end-to-end measurement," IEEE/ACM Trans. Netw., vol. 10, no. 3, pp. 381-395, Jun. 2002.
[6]
D. Katabi, I. Bazzi, and X. Yang, "A passive approach for detecting shared bottlenecks," in Proc. 10th IEEE Int. Conf. Comput. Commun. Netw., Oct. 2001, pp. 174-181.
[7]
Y. Zhang, N. Duffield, V. Paxson, and S. Shenker, "On the constancy of Internet path properties," in Proc. ACM SIGCOMM Internet Measurement Workshop, Nov. 2001, pp. 197-211.
[8]
D. L. Mills, "Network time protocol (version 3) specification, implementation and analysis," RFC 1305, Mar. 1992.
[9]
K. Harfoush, A. Bestavros, and J. Byers, "Robust identification of shared losses using end-to-end unicast probe," Comput. Sci. Dept., Boston Univ., Boston, MA, Tech. Rep. BUCS-TR-2001-001, 2001.
[10]
O. Younis and S. Fahmy, "Flowmate: Scalable on-line flow clustering," IEEE/ACM Trans. Netw., vol. 13, no. 2, pp. 288-301, Apr. 2005.
[11]
R. H. Riedi, M. S. Crouse, V. J. Ribeiro, and R. G. Baraniuk, "A multifractal wavelet model with application to network traffic," IEEE Trans. Inf. Theory, vol. 45, no. 5, pp. 992-1018, Nov., 1990.
[12]
P. Abry, R. Baraniuk, P. Flandlin, R. Riedi, and D. Veitch, "Multiscale nature of network traffic," IEEE Signal Process. Mag., vol. 19, no. 3, pp. 28-46, May 2002.
[13]
M. Coates, A. O. Hero, III, R. Nowak, and B. Yu, "Internet tomography," IEEE Signal Process. Mag., vol. 19, no. 3, pp. 47-65, May 2002.
[14]
P. Huang, A. Feldmann, and W. Willinger, "A non-instrusive, wavelet-based approach to detecting network performance problems," in Proc. 1st ACM SIGCOMM Internet Measurement Workshop, Nov. 2001, pp. 213-227.
[15]
D. L. Donoho, "De-noising by soft-thresholding," IEEE Trans. Inf. Theory, vol. 41, no. 3, pp. 613-627, May 1995.
[16]
I. Daubechies, "The wavelet transform, time-frequency localization and signal analysis," IEEE Trans. Inf. Theory, vol. 36, no. 5, pp. 961-1005, Sep. 1990.
[17]
D. L. Donoho and I. M. Johnstone, "Ideal spatial adaptation by wavelet shrinkage," Biometrika, vol. 81, pp. 425-455, 1994.
[18]
Wavelet Toolbox (Ver. 2.2) User's Guide. The Mathworks, 2002.
[19]
Y. Shin, E. J. Powers, W. M. Grady, and S. C. Bhatt, "Optimal Daubechies' wavelet bases for detection of voltage sag in electric power distribution and transmission systems," Proc. SPIE, Wavelet Applications in Signal and Image Processing VII, pp. 873-883, Jul. 1999.
[20]
W. Williams, "Uncertainty, information, and time-frequency distributions," Proc. SPIE, Advanced Signal Processing Algorithms, Architectures and Implementations II, pp. 144-156, Jul. 1991.
[21]
H. L. V. Trees, Detection, Estimation, and Modulation Theory. New York: Wiley, 1968.
[22]
A. Akella, S. Seshan, and H. Balakrishnan, "The impact of false sharing on shared congestion management," in Proc. 11th IEEE Int. Conf. Network Protocols, Nov. 2003, pp. 84-94.
[23]
W. Cui, S. Machiraju, R. H. Katz, and I. Stoica, "SCONE: A tool to estimate shared congestion along internet paths," Elect. Eng. Comput. Sci. Dept., Univ. of California, Berkeley, CA, Tech. Rep. UCB/CSD-4- 1320, 2004.
[24]
M. S. Kim, T. Kim, Y.-J. Shin, S. S. Lam, and E. J. Powers, "Scalable clustering of Internet paths by shared congestion," in Proc. IEEE INFOCOM , Apr. 2006, pp. 1-10.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE/ACM Transactions on Networking
IEEE/ACM Transactions on Networking  Volume 16, Issue 4
August 2008
249 pages

Publisher

IEEE Press

Publication History

Published: 01 August 2008
Revised: 19 February 2007
Received: 25 October 2005
Published in TON Volume 16, Issue 4

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media