Giaccone Ton05 TCP
Giaccone Ton05 TCP
net/publication/3335135
Using partial differential equations to model TCP mice and elephants in large
IP networks
CITATIONS READS
56 128
6 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Emilio Leonardi on 02 December 2014.
Abstract—In this paper we propose a new fluid model approach In this paper, we develop a fluid model approach in which
in which a different description of the dynamics of traffic sources the sources dynamics are described by partial differential equa-
is adopted, exploiting partial differential equations. This new de- tions. This new description of the source dynamics allows the
scription of the source dynamics allows the natural representation
of short-lived as well as long-lived TCP connections, with no sac- natural representation of TCP mice as well as elephants, with
rifice in the scalability of the model. In addition, the use of partial no sacrifice in the scalability of the model. In addition, the use
differential equations permits the description of distributions, in- of partial differential equations permits the description of TCP
stead of averages, thus providing better accuracy in the results. window distributions, instead of averages, thus providing better
The comparison between the performance estimates obtained accuracy in the performance predictions.
with fluid models and with ns-2 simulations proves the accuracy
of the proposed modeling approach. The rest of this paper is organized as follows. Section II
overviews the fluid model of IP networks originally proposed
Index Terms—Computer network performance, differential by Misra, Gong, and Towsley [3]–[5], and Section III discusses
equations, modeling, transport protocol, wide-area networks.
other previous works in the same area. Section IV describes
the modeling methodology that we propose in this paper, based
I. INTRODUCTION on partial differential equations, for the case of TCP elephants.
We first introduce the simplest version of our model, and then
A NEW CLASS of semi-analytical models has recently been
introduced in the networking arena, and today appears to
be the most promising approach for scalable and accurate per-
progressively extend it to cope with finite window sizes, fast
recovery, and drop-tail buffers. Results are shown along the
formance analysis of large IP networks. These new models, way, and compared with performance estimates generated by
often called fluid models, adopt a deterministic description of ns-2 simulations, so as to prove the accuracy of the proposed
the average network dynamics through a set of differential equa- fluid model approach. In Section V, we move on to considering
tions [1]–[5], thus neglecting the detailed, packet-by-packet de- the case of TCP mice, generalizing the equations adopted for
scription of the stochastic network dynamics. The resulting set TCP elephants; we point out the fundamental limitation of a
of differential equations is then solved numerically, obtaining deterministic approach to describe the network behavior, and
estimates of the time-dependent network behavior. suggest solutions to overcome this limitation. Numerical and
The most attractive property of fluid models resides in the fact simulation results are then presented and discussed for different
that their complexity (i.e., the number of differential equations network scenarios. Finally, Section VI concludes the paper.
to be solved) is independent of the number of TCP flows and of
II. MGT FLUID MODEL OF IP NETWORKS
link capacities, when considering traffic scenarios comprising
only long-lived TCP flows (commonly called elephants). In ad- In [3]–[5], Misra, Gong, and Towsley presented simple dif-
dition, fluid models have been recently proved to capture the ferential equations to describe the behavior of TCP elephants
limiting behavior of TCP elephants in single bottleneck topolo- over networks of IP routers adopting a RED (Random Early De-
gies when the number of TCP flows, the bottleneck capacity and tection [10]) active queue management (AQM) scheme. Their
the buffer size jointly grow to infinity [1], [6]–[9]. approach (that we call MGT) spurred several research efforts
An important limit of the fluid model approaches presented aiming at the application of various kinds of fluid models to the
so far in the literature is their poor representation of scenarios performance analysis of packet networks. It is important to note
comprising the short-lived TCP flows (commonly called mice), that the equations of the MGT model heavily rely on the assump-
which are the majority of the flows in the Internet. tions mentioned above (all TCP connections are elephants, and
all IP routers adopt RED), and that the extension to mice and
Manuscript received April 23, 2004; revised January 24, 2005; approved by drop-tail routers may be not simple.
IEEE/ACM TRANSACTIONS ON NETWORKING Editor R. Srikant. This work was Consider a network comprising router output interfaces,
supported by the Italian Ministry for Education, University and Research, within equipped with FIFO buffers, and interfacing data channels at
the TANGO FIRB project. A preliminary version of this paper was presented at
the IEEE INFOCOM 2004, Hong Kong. rate (the extension to nonhomogeneous data rates is straight-
The authors are with the Dipartimento di Elettronica, Politecnico di forward). The network is fed by classes of long-lived TCP
Torino, 10129 Torino, Italy (e-mail: [email protected]; garetto@ flows; all the elephants within the same class follow the same
mail.tlc.polito.it; [email protected]; [email protected];
[email protected]; [email protected]). route through the network, thus experiencing the same round-
Digital Object Identifier 10.1109/TNET.2005.860102 trip time (RTT), and the same average loss probability (ALP).
1063-6692/$20.00 © 2005 IEEE
1290 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 6, DECEMBER 2005
At time all buffers are assumed to be empty. Buffers drop perceived by elephants of class satisfies the following
packets according to their average occupancy, as dictated by a expression:
RED AQM scheme.
(5)
where is the average RTT for class , and is the loss
indicator rate experienced by TCP flows of class . The loss indicator rate is instead given by
The differential equation is obtained by considering the fact
that elephants can be assumed to always be in congestion avoid- (6)
ance (CA) mode, so that the window dynamics are close to ad-
ditive increase, multiplicative decrease (AIMD). The window
where is the instantaneous emission rate of TCP
increase rate in CA mode is approximatively linear, and cor-
sources, is a calibration parameter, and is the instanta-
responds to one packet per RTT. The window decrease rate is
neous loss probability experienced by elephants in class :
proportional to the rate with which congestion indications are
received by the source, and each congestion indication implies
a reduction of the window by a factor two. (7)
consider general multi-bottleneck topologies comprising RED distribution for the TCP flow population. This major improve-
routers. ment in the representation of the TCP sources dynamics gives
The equations reported in Section II briefly summarize the us the advantage of a greater model flexibility, which: 1) allows
fluid model proposed in [5], which constitutes the starting point TCP mice to be described in a way such that the insensitivity of
for our work. This set of ordinary differential equations must be complexity with respect to the number of TCP flows is main-
solved numerically, using standard discretization techniques. tained and 2) permits the modeling of networks in which AQM
In [1] and [2], an alternative fluid model has been proposed routers coexist with drop-tail routers.
to describe the dynamics of the average window for TCP ele- In other words, rather than just describing the average TCP
phants traversing a network of drop-tail routers. The behavior connection behavior, we statistically model the dynamics of the
of such a network is pulsing: congestion epochs in which some entire population of TCP flows sharing the same path. This ap-
buffers are overloaded (and overflow) are interleaved to periods proach leads to systems of partial derivatives differential equa-
of time in which no buffer is overloaded, and no loss is experi- tions, and produces more flexible models, which scale indepen-
enced, due to the fact that previous losses forced TCP sources dently of the number of TCP flows.
to reduce their sending rate. In such a setup, a careful analysis In this section, we first introduce the basic model for the TCP
of the average TCP window dynamics at congestion epochs is flow population. This basic model can be extended by adding
necessary, whereas sources can be simply assumed to increase several features, which permit a progressively more accurate de-
their rate at constant speed between congestion epochs. This be- scription of the behavior of TCP sources. Such extensions are
havior allows the development of fluid equations and an efficient described one by one for the sake of readability, but they can
methodology to solve them. Ingenious queueing theory argu- be combined at will, to obtain models with the desired level of
ments are exploited to evaluate the loss probability during con- accuracy and numerical complexity.
gestion epochs, and to study the synchronization effect among
sources sharing the same bottleneck link. Also in this case, the A. Basic TCP Sources
complexity of the fluid model analysis is independent of link To begin, consider a fixed number of TCP elephants. We use
capacities and of the number of TCP flows. An extension that to indicate the number2 of elephants of class whose
allows considering TCP mice has also been proposed in [1] and window is at time . For the sake of simplicity, we consider
[2]. In this case, since the dynamics of TCP mice with different just one class of flows, and omit the index from all variables.
size and/or different start times are different, each mouse must The source dynamics are approximately described by the fol-
be described with two differential equations; one representing lowing equation, for :
the average window evolution, and one describing the workload
evolution. As a consequence, one of the nicest properties of fluid
models, the insensitivity of the complexity with respect to the (9)
number of TCP flows, is lost.
In [6]–[9], fluid models have been exploited to prove proper- where is the loss indication rate. A formal derivation of
ties related to the asymptotic behavior of a single RED bottle- (9) is given in Appendix A. Note that this equation is equivalent
neck topology fed by long lived TCP connections in the so called to the deterministic transport equation reported in Corollary 1
“many flows regime”, i.e., when the number of TCP flows, the of [9], which was obtained by applying Mean Field Analysis.
bottleneck capacity, and the buffer-size increase jointly to in- The intuitive explanation of the formula is the following. The
finity. In particular, in [9] the windows size dynamic for a pop- time evolution of the population described by is gov-
ulation of long-lived TCP connections is represented by a erned by two terms: 1) the integral accounts for the growth rate
stochastic process whose time samples are the window size dis- of due to sources with window between and that
tributions (the process is said to be measure-valued), and the experience losses, and 2) the second term is the decrease rate
mean field dynamics of the process are described by a deter- of due to sources increasing their window with rate
ministic “transport equation” which can be approximated by a .
partial differential equation, under mild assumptions. The quantity can be computed by recalling (6):
In this paper, differently from [9], we adopt an approach
which allows us to directly obtain an approximate description
(10)
of the TCP source window size distribution dynamics, based on
partial differential equations. We also show that our description
of the source dynamics allows a natural representation of mice in which the current window size of the sources that emitted the
as well as elephants, with no sacrifice in the scalability of the lost fluid approximates the window size value at which those
model. sources emitted this fluid. Intuitively, this loss model distributes
the lost fluid over the entire population, proportionally to the
window size. Note that this loss model does not require any cal-
IV. MODELING TCP ELEPHANTS ibration parameter, contrary to the MGT model; indeed, statis-
The class of fluid models that we propose in this paper differs tics like the variance of the TCP flow windows size impacts on
from the previous proposals (with the exception of [9]) because, the network stationary behavior.
instead of describing just the evolution of the average window 2P (w; t) is assumed to be a continuous function IR ! IR due to the fluid
size of TCP sources, we model the evolution of the window size nature of the model.
1292 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 6, DECEMBER 2005
Fig. 1. Fluid model (left) and ns-2 (right): average window size distribution for 8 TCP elephants traversing a single bottleneck link with RED buffer, varying
their maximum window size; these TCP flows compete with 8 other TCP elephants with maximum window size 64.
(11)
for , where is the unit step function, and Consider the case of a single bottleneck link topology
is the number of TCP flows whose window is exactly in which a gentle version of the RED AQM algorithm
equal to . ( , , , )
For we can write is implemented, with two classes of eight TCP elephants
saturating the link capacity ( Mb/s), assuming a
propagation delay equal to 30 ms. We compare the results of
(12) three different experiments, in which the first elephant class
with the boundary conditions and (class 1) has always maximum window size 64, while the other
. The derivation of (11) class (class 2) has maximum window size 64, 32, and 24. The
is very similar to that of (9). The first term in (11) is the packet size for this and all other experiments in this paper is
contribution of all TCP sources which experience losses at 10 000 bits. In Fig. 1, we show the window size probability
window size between and ( if exceeds it). The density function of elephants in class 2 predicted by our model
second term of (11) is the contribution of all TCP sources at and by ns-2. In Table I, we compare the average window size,
maximum window size that experience losses; note that this the average queue length and the loss probability for the model
contribution exists only for windows greater than . and the ns-2 simulator. Note that for lower , the average
The growth rate of is obtained as the limit of the window size of class 2 elephants is smaller; at the same time,
usual growth rate of . The de- the average window size for class 1 flows increases, so that the
crease rate of is simply . average window size of all the 16 TCP elephants is roughly
constant and equal to 20. A model without window size clip-
C. Experiments With RED Buffers ping, like for example the one in [3]–[5], is capable of correctly
In this subsection, we discuss some numerical results refer- estimating the average window size of the 16 elephants, but
ring to the mathematical model in (11). Before proceeding, we fails in capturing the differences among classes with different
notice that all the results shown in this paper were obtained by maximum window size values. The comparison clearly shows
numerically solving the model. For this purpose, we applied that the fluid model is quite accurate.
standard discretization techniques; in particular, a first-order fi-
nite differences method for the sources equations, and a fourth- D. Considering Fast Recovery
order Runge–Kutta method for the queue equations, as better Newer versions of TCP (such as NewReno—see RFCs 2581
explained in Appendix E. and 3782) avoid halving the window more than once for RTT,
AJMONE MARSAN et al.: USING PARTIAL DIFFERENTIAL EQUATIONS TO MODEL TCP MICE AND ELEPHANTS IN LARGE IP NETWORKS 1293
(13)
(14) Fig. 2. Fluid model and ns-2 simulator: queue size evolution for one bottleneck
link fed by a drop-tail buffer and traversed by TCP elephants.
A formal derivation of (13) and (14) is reported in Appendix B.
An intuitive explanation of the two equations can be provided the same buffer. In addition, during congestion epochs, losses
as follows. In the right-hand side of (13), the first two terms are not evenly distributed among TCP flows, but are more likely
account for the decrease rate of the number of elephants of class to affect TCP sources with larger window size. In this context,
whose window is at time , due to: (i) sources in class it is necessary to distinguish among sources with different in-
experiencing losses and moving to class , (ii) sources in stantaneous window size, while at the same time accounting for
class increasing their window. The third term refers to the the effects of the TCP fast recovery mechanism, which prevents
sources moving to class from class after experiencing a TCP sources from halving their window several times within
RTT without losses. In the right-hand side of (14), the first term one round trip time.
accounts for the growth rate of the number of elephants of class The level of detail in the description of the TCP sources dy-
whose window is at time , due to sources in class namics adopted in this paper allows an easy description of the
experiencing losses. The second and third terms account for the time-dependent behavior of the packet loss probability:
decrease rate due to: 1) sources moving to class from class
after a RTT without losses and 2) sources in class increasing (15)
their window.
More general fluid equations describing TCP elephants and that is, the loss probability equals (the
accounting for the TCP threshold mechanisms and for time-outs relative difference between the instantaneous arrival rate and the
are reported in [13]. service rate) only when the buffer is full, being the capacity
of buffer , and the indicator function.
E. Modeling Drop-Tail Buffers A different approach is used in [1] and [2] to describe the
As we have already mentioned, a fluid model for the descrip- dynamics of the average window size for TCP flows traversing
tion of RED AQM schemes was originally proposed in [3]. RED a network with drop-tail buffers. In those papers, the loss indi-
matches quite well the fluid modeling approach, since in RED cator rate is obtained by applying queueing theory results which
buffers the loss probability is a smooth function of the queue are not “internal” to the fluid model. That approach is probably
length averaged over a rather long time window. The case of difficult to generalize to networks including both drop-tail and
drop-tail buffers is instead much more difficult to describe with AQM buffers.
fluid models, since in this case the loss probability is a discon- F. Experiments With Drop-Tail Buffers
tinuous function of the instantaneous queue size.
Many studies have shown that the behavior of networks car- In this subsection, we briefly comment some numerical re-
rying TCP traffic is pulsing: congestion epochs in which some sults obtained with our modeling approach in the case of drop-
buffers are overloaded (and overflow) are interleaved to periods tail buffers.
of time in which traffic is lighter, buffers are not saturated, and First, we consider the case of a single bottleneck link (with
no loss is experienced. Light traffic periods are the result of data rate Mb/s, propagation delay 30 ms), traversed by
losses at the previous congestion epochs, that force TCP sources just one class of 30 TCP elephants, with maximum window size
to reduce their emission rate. As a consequence, the loss pro- 64 packets; the maximum buffer size is set to 1000. The curves
cesses experienced by TCP flows traversing drop-tail buffers are in Fig. 2 show the queue size evolution over time. Our model
quite bursty. This burstiness induces a high degree of correlation captures the well-known oscillating behavior of TCP, which was
(synchronization) among the dynamics of TCP sources sharing observed in simulation experiments as well as measurements
[11], [12].
3For the sake of simplicity, the equations in this section and in the rest of
The results of ns-2 simulations are reported in Fig. 2 and
the paper do not consider the effect of the maximum window size. However, in
all numerical results that are presented in this paper the effect of the maximum Table II for comparison, and again show that the fluid model
window size is always accounted for. is accurate.
1294 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 6, DECEMBER 2005
TABLE II
AVERAGE WINDOW SIZE (AWS), AVERAGE QUEUE LENGTH (AQL) AND
AVERAGE LOSS PROBABILITY (ALP) FOR THE SETUP OF SECTION IV-F
Fig. 4. Overlap of TCP0 curves from the fluid model (Fig. 3) and ns-2.
in which they are in congestion avoidance, their window is description of the network dynamics by means of stochastic
and their residual workload goes back to . models, such as continuous-time or discrete-time Markov
Equation (17) is very similar to (16), since the evolution of chains and queueing models.
with respect to the residual workload (second and Deterministic fluid models have been proven to represent cor-
third terms) is the same, and the first term differs only for the rectly the asymptotic behavior of TCP when the number of ac-
fact that the window growth is in this case exponential rather tive flows (elephants) tends to infinity [8].
than linear. Moreover, the fourth term refers to sources moving Indeed, when considering scenarios with only elephants, ran-
into congestion avoidance because of a loss [similarly to the fifth domness, which is completely lost in fluid models, plays a minor
term of (16)]. Finally, being the mice arrival rate, the last role, because queues tend to be heavily congested, and the loss
term accounts for newly activated TCP mice. rate is basically determined by the load offered by TCP connec-
Note that the representation of the TCP window dynamics tions in excess of the bottleneck capacity.
over the space allows us to distinguish among TCP mice Instead, fluid models are not suitable to analyze network sce-
with different instantaneous window sizes, thus providing the narios in which the capacity of the links is not saturated. In par-
correct level of detail for the analysis of this type of TCP flows. ticular, they completely fail to predict the behavior of a network
Indeed, TCP mice open in slow-start, with window 1, and then loaded only by TCP mice: if links are underloaded (i.e., their av-
their window evolves according to (16) and (17). erage utilization is smaller than one), fluid models predict that
The model of TCP mice can be simplified by assuming flow buffers are constantly empty. This is not what we observe and
lengths to be exponentially distributed, with average . Thanks measure in packet networks; the discrepancy is essentially due
to the memoryless property of the exponential distribution, we to the fact that, in underload conditions, the stochastic nature
can write of the input traffic plays a fundamental role that cannot be ne-
glected.
Randomness, indeed, impacts the system behavior at many
levels:
1) at flow level, since the arrival process of TCP flows ex-
hibits a nonnegligible burstiness, which causes the short-
term offered load at the queues to randomly vary over
time, thus leading to sporadic periods of congestion;
(18) 2) at packet level, since the arrival process of packets at
queues exhibits a bursty behavior, thus causing sporadic
buffer overloads also during periods in which the average
utilization factor is smaller than 1.
This implies that, when analyzing the behavior of under-
loaded networks, the complete determinism of fluid models is
not satisfactory: we must stop short of reducing the network
(19) operations to the deterministic evolution of average parameters,
keeping in the model some of the stochastic characteristics of
where is the average loss probability experienced by the the network behavior. This can be done by using stochastic
flow, during its total active period. The formal derivation of the differential equations, rather than deterministic differential
second term is reported in Appendix D. We can approximate equations, to describe the system dynamics, and then solving
by using the same approach proposed in [3] and [4] to them (for example) with a Monte Carlo technique.
evaluate the average loss probability in a RED queue; we obtain In practice, with respect to the model we just presented, we
can:
(20) 1) use a Poisson counter with average to describe the
mice arrival rate, rather than a deterministic rate, so that
instead of (19) we have a stochastic partial differential
with the instantaneous loss probability, defined in (6), and equation.
the average window size at time . 2) use a nonhomogeneous Poisson process to describe the
We wish to stress the fact that (18)–(20) provide quite a pow- completion of TCP connections; the average at time of
erful tool for an efficient representation of TCP mice, since a such process is represented by the second term of (18); by
wide range of distributions (including those incorporating long- so doing, also (18) becomes a stochastic partial differen-
tail distributions) can be approximated with an arbitrary degree tial equation. Note that this suggests that, due to retrans-
of accuracy by a mixture of exponential distributions [14]. missions, the completion time of connections increases as
their loss probability grows.
A. Randomness in Fluid Models 3) use a Poisson point process (possibly with batch arrivals)
The fluid models that we have presented so far provide a de- to describe the workload emitted by TCP sources, rather
terministic description of the network behavior, thus departing than a continuous deterministic fluid process, but keeping
from the common approach of attempting a probabilistic the average rate .
1296 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 6, DECEMBER 2005
TABLE III
ARRIVAL RATES (AR), AVERAGE COMPLETION TIMES (ACT), AVERAGE
WINDOW SIZE (AWS), AVERAGE QUEUE LENGTH (AQL) AND AVERAGE LOSS
PROBABILITIES (ALP) FOR THE EXPERIMENTS OF SECTION V-B.
TABLE IV
PARAMETERS OF THE HYPER-EXPONENTIAL DISTRIBUTION
Fig. 5. Average window size evolution for elephants competing with mice on a APPROXIMATING THE PARETO DISTRIBUTION
single bottleneck link; the average window size decreases when the mice arrival
rate grows from 100 to 400 connections/s.
TABLE V
AVERAGE LOSS PROBABILITY (ALP), AVERAGE QUEUE LENGTH (AQL) AND
AVERAGE COMPLETION TIMES (ACT) IN SECONDS OF THE NINE CLASSES OF
MICE FOR THE SETUP OF SECTION V-B
TABLE VI
PARAMETERS OF THE THREE FLOW LENGTH DISTRIBUTIONS
Fig. 6. Queue length distribution for single drop-tail bottleneck, varying the
random process modeling the workload emitted by the TCP sources; comparison
with ns-2 simulator.
TABLE VII
AVERAGE LOSS PROBABILITY (ALP), AVERAGE QUEUE LENGTH (AQL) AND
AVERAGE COMPLETION TIMES (ACT) IN SECONDS OF THE DIFFERENT
CLASSES OF MICE FOR THE SETUP OF SECTION V-B, HAVING INTRODUCED
RANDOM ELEMENTS
Fig. 8. Queue size distribution for single drop-tail bottleneck, varying the
bottleneck capacity.
window distribution at time . Consider a small enough such Now consider the population of sources which will leave class
that . Let be the number of sources with because an RTT is elapsed. We assume an exponential distri-
window at time , but with window at time . bution of the departure time of each source from class , with
All the sources which do not experience any loss indication average . Hence, the number of sources moving from class
during the interval increase their window with rate to class will be , by observing
. Among these sources, includes only the ones that the fraction of sources that already left class by the end of
with initial window , since they will exceed is . Now observe that the
by time . If we assume that the loss indication process can , defined as the number of sources moving from class to
be approximated locally (i.e, in the small interval ) class and exceeding window , will include sources counted
with a Poisson process with rate , the probability that no in both and . These source can be derived by ,
losses are experienced during is ( ); since . Now we are able to add all the
then contributions:
(24)
(21) By recalling (23), we can compute
APPENDIX B
where are the sources in class exceeding window by
PROOF OF (13) AND (14)—SOURCES WITH FAST
the time interval and the sources moving from class
RECOVERY MECHANISMS
to class , due to losses. It holds that
The proof is similar to the previous one. Let
and . Consider the
sources of class moving to class during the interval
; among these, will have a window and will
contribute to increase . Analogously to (22):
Analogously to , . It
can be shown that is negligible with respect to .
Hence, we can obtain (13):
The number of sources of class exceeding by time
is, analogously to (21):
(23)
1300 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 6, DECEMBER 2005
Similarly, we approximate
Finally
At last, we approximate
To account for the sources which stop their activity during the
time interval of size , it is enough to set .
APPENDIX D
PROOFS OF (18) AND (19)—SOURCES WITH FINITE FLOWS with being the numerical approximation of
EXPONENTIALLY DISTRIBUTED .
In conclusion, we obtain for the PDE the numerical recursion
Regarding (18) and (19), we prove formally only those terms
accounting the variation of the population due to the
variation of the sources residual workload. Consider a time in-
terval of size and a source which does not experience any loss
with window . The probability that this source stops within The whole set of differential equations, which defines the
the interval, i.e., its residual life time is less than , is equal fluid model for the considered network, is solved according to
to , thanks to the the following procedure. At each time iteration , the param-
memoryless property. Then, the contribution of the sources stop- eters and are evaluated. Note that
ping is at time step we assume that all queues are empty, thus
there are no losses and the RTTs account only for fixed propaga-
tion delays. Then the equations of the sources’ dynamics (PDE)
are solved, obtaining as output the amount of fluid that sources
The final contribution is given by multiplying the previous for- inject into the network. Next, the network queues’ dynamics
mula for ( ), corresponding to the number of sources (ODE) are solved using as input the amount of fluid injected
not experiencing any losses (those experiencing losses have al- by sources. The state variables of the queues are then used to
ready been considered in other terms). update the RTTs and loss rates perceived by the sources. We
notice that the proposed scheme is very similar to the one used
APPENDIX E in [5].
NUMERICAL SOLUTIONS OF FLUID MODELS
REFERENCES
The solutions of our fluid models are obtained by solving nu-
[1] F. Baccelli and D. Hong, “Interaction of TCP flows as billiards,” in Proc.
merically the set of differential equations which define the fluid IEEE INFOCOM, San Francisco, CA, 2003, pp. 895–905.
model. Two different approaches have been employed to solve [2] , “Flow level simulation of large IP networks,” in Proc. IEEE IN-
the set of ordinary differential equations (ODEs) describing net- FOCOM, San Francisco, CA, 2003, pp. 1911–1921.
[3] S. Misra, W. B. Gong, and D. Towsley, “Fluid-based analysis of a
work queues dynamics and the set of partial differential equa- network of AQM routers supporting TCP flows with an application to
tions (PDEs) representing the source window dynamics. RED,” in Proc. ACM SIGCOMM, Stockholm, Sweden, Aug. 2000, pp.
Similarly to [5], we solve numerically the ODEs of our 151–160.
[4] C. V. Hollot, V. Misra, D. Towsley, and W. B. Gong, “On designing
model using a fourth-order Runge–Kutta methodology. The improved controllers for AQM routers supporting TCP flows,” in Proc.
Runge–Kutta algorithm is a widely used method to solve IEEE INFOCOM, Anchorage, AK, 2001, pp. 1726–1734.
AJMONE MARSAN et al.: USING PARTIAL DIFFERENTIAL EQUATIONS TO MODEL TCP MICE AND ELEPHANTS IN LARGE IP NETWORKS 1301
[5] Y. Liu, F. Lo Presti, V. Misra, and D. Towsley, “Fluid models and so- Michele Garetto (S’01–M’04) received the Dr.Ing.
lutions for large-scale IP networks,” in Proc. ACM SIGMETRICS, San degree in Telecommunication Engineering and the
Diego, CA, Jun. 2003, pp. 90–101. Ph.D. degree in electronic and telecommunication
[6] S. Deb, S. Shakkottai, and R. Srikant, “Stability and convergence of engineering, both from Politecnico di Torino, Italy,
TCP-like congestion controllers in a many-flows regime,” in Proc. IEEE in 2000 and 2004, respectively.
INFOCOM, San Francisco, CA, 2003, pp. 884–894. In 2002, he was a visiting scholar with the Net-
[7] S. Shakkottai and R. Srikant, “How good are deterministic fluid models works group of the University of Massachusetts,
of internet congestion control?,” in Proc. IEEE INFOCOM, New York, Amherst, and in 2004 he held a Postdoctoral position
Jun. 2002, pp. 497–505. at Rice University, Houston, TX. His research
[8] P. Tinnakornsrisuphap and A. Makowski, “Limit behavior of ECN/RED interests are in the field of performance evaluation
gateways under a large number of TCP flows,” in Proc. IEEE IN- of wired and wireless communication networks.
FOCOM, San Francisco, CA, 2003, pp. 873–883.
[9] F. Baccelli, D. R. McDonald, and J. Reynier, “A mean-field model for
multiple TCP connections through a buffer implementing RED,” Per-
form. Eval., vol. 49, no. 1/4, pp. 77–97, 2002. Paolo Giaccone (S’00–M’02) received the Dr.Ing.
[10] S. Floyd and V. Jacobson, “Random early detection gateways for con- and Ph.D. degrees in telecommunications engi-
gestion avoidance,” IEEE/ACM Trans. Netw., vol. 1, no. 4, pp. 397–413, neering from Politecnico di Torino, Italy, in 1998
Aug. 1993. and 2001, respectively.
[11] V. Jacobson, “Congestion avoidance and control,” in Proc. ACM SIG- He is Assistant Professor in the Electronics De-
COMM, Vancouver, Canada, Sep. 1988, pp. 314–329. partment, Politecnico di Torino. During the summer
[12] L. Zhang and D. Clark, “Oscillating behavior of network traffic: A Case 1998, he visited the High Speed Networks Research
study simulation,” Internetworking: Research and Experience, vol. 1, Group at Lucent Technology, Holmdel, NJ. During
no. 2, pp. 101–112, 1990. 2000–2001 and during summer 2002, he visited the
[13] M. Ajmone Marsan, M. Garetto, P. Giaccone, E. Leonardi, E. Schi- Electrical Engineering Department, Stanford Univer-
attarella, and A. Tarello. Using partial differential equations to model sity. he held a Postdoctoral position at Politecnico di
TCP mice and elephants in large IP network. [Online]. Available: Torino between 2001 and 2002, and during summer 2002 at Stanford Univer-
http://www.tlc-networks.polito.it/database/ricer.htm sity. His main area of interest is the design of scheduling policies for high-per-
[14] A. Feldmann and W. Whitt, “Fitting mixtures of exponentials to long-tail formance routers.
distributions to analyze network performance models,” in Proc. IEEE
INFOCOM, Kobe, Japan, 1997, pp. 1096–1104.
[15] M. Garetto and D. Towsley, “Modeling, simulation and measurements Emilio Leonardi (S’94–M’99) received the Dr.Ing.
of queueing delay under long-tail internet traffic,” in Proc. ACM SIG- degree in electronics engineering and the Ph.D. de-
METRICS, San Diego, CA, Jun. 2003, pp. 47–57. gree in telecommunications engineering, both from
[16] S. B. Fredj, T. Bonald, A. Proutiere, G. Régnié, and J. Roberts, “Statis- Politecnico di Torino, Italy, in 1991 and 1995, respec-
tical bandwidth sharing: A study of congestion at flow level,” in Proc. tively.
ACM SIGCOMM, San Diego, CA, 2001, pp. 111–122. He is currently an Associate Professor at the Di-
partimento di Elettronica, Politecnico di Torino. In
1995, he visited the Computer Science Department,
University of California, Los Angeles (UCLA);
in summer 1999, he joined the High Speed Net-
works Research Group at Bell Laboratories/Lucent
Marco Ajmone Marsan (F’99) holds degrees Technologies, Holmdel, NJ; in summer 2001, the Electrical Engineering
in electronic engineering from the Politecnico di Department of the Stanford University; and finally in summer 2003, the IP
Torino, Torino, Italy, and the University of California Group at Sprint, Advanced Technologies Laboratories, Burlingame, CA. His
at Los Angeles (UCLA). In 2002, he was awarded research interests are in the fields of performance evaluation of communication
an Honoris Causa degree in telecommunication net- networks, switching architectures, and all-optical networks.
works from the Budapest University of Technology
and Economics, Budapest, Hungary.
He is a Full Professor at the Electronics De-
Enrico Schiattarella (S’01) received the Dr.Ing.
partment of Politecnico di Torino, in Italy. Since
degree in electrical engineering from Politecnico di
September 2002, he has been the Director of the
Torino, Italy, in 2002, where he is currently pursuing
Institute for Electronics, Information Engineering
the Ph.D. degree.
and Telecommunications of the National Research Council. From November
From October 2001 to June 2002, he visited Cisco
1975 to October 1987, he was at the Electronics Department of Politecnico di
Systems, in summer 2003, Alcatel R&I, Marcoussis,
Torino, first as a Researcher, then as an Associate Professor. From November
France, and from March to November 2004, the
1987 to October 1990, he was a Full Professor at the Computer Science
Server Interconnect Fabrics group at IBM Zurich
Department of the University of Milan, Italy. During the summers of 1980 and
Research Lab, Switzerland. His main research inter-
1981, he was with the Research in Distributed Processing Group, Computer
ests are in high-performance switching and routing.
Science Department, UCLA. During summer 1998, he was an Erskine Fellow
at the Computer Science Department of the University of Canterbury, New
Zealand. He has coauthored over 300 journal and conference papers in the
areas of telecommunications and computer science, as well as the two books
Performance Models of Multiprocessor Systems (MIT Press), and Modeling Alessandro Tarello (S’03) received the M.Sc.
with Generalized Stochastic Petri Nets (Wiley). He has been the principal degree in communication engineering from Politec-
investigator in national and international research projects in the field of nico di Torino, Torino, Italy, in 2002, where he is
telecommunication networks. His current interests are in the fields of perfor- currently pursuing the Ph.D. degree.
mance evaluation of communication networks and their protocols. From January to December 2004, he visited the
Dr. Ajmone Marsan received the Best Paper Award at the Third International Laboratory for Information and Decision Systems,
Conference on Distributed Computing Systems, Miami, FL, in 1982. He is a MIT, Cambridge, MA.
corresponding member of the Academy of Sciences of Torino. He participates in
a number of editorial boards of international journals, including the IEEE/ACM
TRANSACTIONS ON NETWORKING and Computer Networks.