Professional Documents
Culture Documents
Johari
Johari
Johari
6, DECEMBER 2001
Abstract—Under the assumption that queueing delays will even- the end users: to signal congestion, routers simply drop packets.
tually become small relative to propagation delays, we derive sta- It is left to the end systems to detect these packet drops, and act
bility results for a fluid flow model of end-to-end Internet conges- accordingly. Conversely, in ATM networks, quality-of-service
tion control. The theoretical results of the paper are intended to
be decentralized and locally implemented: each end system needs (QoS) is a key concern, and ensuring that QoS requirements are
knowledge only of its own round-trip delay. Criteria for local sta- met is a task handled primarily by the links in the network.
bility and rate of convergence are completely characterized for a Today, this choice is at the center of research efforts to imple-
single resource, single user system. Stability criteria are also de- ment differentiated services in the Internet—i.e., proposals to
scribed for networks where all users share the same round-trip provide different levels of network service depending on the de-
delay. Numerical experiments investigate extensions to more gen-
eral networks. Through simulations, we are able to evaluate the mands and preferences of end users. For example, the DiffServ
relative importance of queueing delays and propagation delays on proposal [6] suggests several traffic classes, used to prioritize
network stability. Finally, we suggest how these results may be used traffic service at routers (resource-centered congestion control).
to design network resources. On the other hand, Gibbens and Kelly have suggested a con-
Index Terms—Delayed systems, distributed systems, end-to-end gestion-dependent pricing scheme [13], which gives end users
congestion control. the necessary information and incentives to use the network ef-
ficiently (end system congestion control).
Our first goal is to understand how communication delays in-
I. INTRODUCTION
form the choice of congestion control. Generically, a congestion
scheme which acts on the timescale of the end-to-end propa- are negligible relative to propagation delays, the packet-level
gation delay, and thus one might hope for a stable, distributed queueing behavior at the resources is not modeled; instead, a
end-to-end congestion control algorithm. On the other hand, a deterministic fluid flow approximation is considered.
resource-centered congestion controller would be constrained We will represent a network by a set of resources. Let a
to act on a timescale determined by the propagation delays of route be a nonempty subset of , and denote the set of all
all flows through the resource—a very difficult design problem routes by . We will ignore routing choices, and thus assume we
in a network on the scale of the Internet. can identify each user with one and only one route. Consider the
Past studies of congestion control with feedback delays sup- primal algorithm of [18], with strictly positive gain parameters
port this point. Several early papers suggested algorithms for , :
closed loop control of queue sizes at congested nodes in the
network; this includes the work of Bolot and Shankar [7], Ben-
mohamed and Meerkov [3], Fendick et al. [11], and Bonomi (1)
et al. [8]. In all cases, the congestion control algorithms share
a common goal: the queue size at a single congested node is
controlled (via delayed feedback to the end systems) to reach a where
target buffer level.
The key limitation to these approaches is the problem cited
(2)
above: namely, that if multiple users were to share the resource,
then the node is required to have information on the propagation
delays experienced by all flows. For example, in the work of The first equation describes the time evolution of , the sending
Bonomi et al. [8], stability in the presence of multiple users re- rate of user . The second equation describes the generation
quires that their adaptation gains be chosen to jointly satisfy cer- of congestion indication signals at resource , by means of a
tain constraints [8, eq. 4.9]. Benmohamed and Meerkov make congestion indication function . We will assume is
progress in this direction by suggesting robust controllers at the increasing, nonnegative, and not identically zero.
resource, which exchange lower performance for robustness in We may motivate the algorithm (1)–(2) as follows. Suppose
the face of multiple flow delays [3]. This approach amounts that user generates packets at time . If the total flow
to designing the congestion controller for the worst possible through resource is , we interpret as the probability a
delay—indeed, the authors conclude that the robust congestion packet at resource receives a “mark”—a congestion indication
control may have unacceptably low performance relative to an signal. Then is the probability a packet at resource re-
adaptive controller that has broader knowledge of propagation ceives a mark at time . We assume a packet may only be marked
delays in the network. However, this type of controller does not at most once. We make two stochastic approximations. First, we
readily yield to distributed implementation, a difficulty the au- assume that marking is independent from resource to resource;
thors admit in extending their work to the multiple congested then the probability a packet on route receives a mark at time
node scenario [4]. is . Second, we assume is “small,”
More recently, Chong et al. [9], [10] have proposed a model in the sense that we may approximate the previous expression
of a single congested buffer, where the rate allocated to each by . In this case, is just the (ap-
user is the difference between the observed queue length and the proximate) expected number of marks user receives at time
queue threshold, multiplied by a control gain. To maintain sta- . User then adjusts to reach a target number of marks
bility of such an algorithm, the resource again needs knowledge per unit time . [Although the preceding discussion is at the
of the propagation delays experienced by all users. In the net- packet level, notice that (1)–(2) is a fluid flow approximation.]
work context, Low and Lapsley [19] have given a resource-cen- In [18], the system (1)–(2) is shown to be asymptotically
tered, distributed pricing algorithm for rate control in the pres- stable in the large, and hence convergent to a unique equilib-
ence of communication delays, based on methods developed by rium point given by
Bertsekas and Tsitsiklis in [5]. However, although the algorithm
is “distributed,” the step size used in updating rates must be
(3)
chosen globally, and is a function of all the delays in the net-
work. Again, for a network as large as the Internet, such an im-
plementation does not seem feasible.
In [18], Kelly et al. proposed two complementary conges-
tion control algorithms. The algorithms of Low and Lapsley and Notice that the system (1)–(2) uses aggregate feedback [22]:
Chong et al. [9], [10], [19] are similar to the “dual algorithm” of since is a function of aggregate flow, individual flows are
[18]: they rely on the resource to implement the congestion con- not identified at the resources. This is a direct benefit of end
trol. For the reasons described above, in this paper we will in- system congestion control. In a network with large propagation
stead focus on end-to-end congestion control, with only simple delays, the earlier discussion suggests that congestion control
feedback from network resources. In particular, we will study algorithms centered at resources require flow identification. On
the “primal algorithm” of [18], where the end user implements the other hand, for the end-to-end algorithm (1)–(2), we will
a TCP-like rate control algorithm which responds to conges- preserve the aggregate feedback property as we introduce delays
tion indication signals from resources. Because queueing delays into the model.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on August 16,2023 at 13:55:29 UTC from IEEE Xplore. Restrictions apply.
820 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 6, DECEMBER 2001
We will add propagation delays to (1)–(2) as follows. Given a Such a condition says that if the product is less than some
route , for each resource we define a forward delay , constant dependent on route topology and/or the network oper-
and a return delay . The forward delay is the delay incurred ating point, then the system (4)–(5) will be locally stable [i.e.,
in communication from the user to the resource; the return delay for initial conditions in a neighborhood of the stable point (3),
is the delay incurred in communication from the resource back the system asymptotically achieves the equilibrium as ].
to the user. In the current Internet, each route is subject to a Notice that the controller gain must be inversely proportional
round-trip delay. We model this delay by assuming each route to the delay . This is precisely the control engineering intu-
has an associated delay , such that for each ition presented earlier: namely, given a system feedback delay of
. Consider now the following delayed difference equations , a stable controller cannot react any faster than the timescale
analogous to the primal algorithm, where we assume that determined by . In our model, this requirement bounds the
and are integer valued: product .
In a typical network where the round-trip delays may not be
known, the condition (6) suggests that self-clocking rate con-
trol algorithms will work well to maintain network stability. In
a self-clocking algorithm, the sender uses an acknowledgment
(4) from the receiver to prompt a step forward. This gives the in-
verse dependence of the gain on the round-trip delay . (For
for , where, for
more details on self-clocking algorithms, see [13] and [16].)
The type of constraint described by (6) is very desirable in
(5) a large network such as the Internet. Implementing end-to-end
congestion control would be very difficult if the “route-depen-
dent constant” involved information not available to the user. In-
This is the simplest possible discrete-time system corresponding stead, the condition (6) allows stable behavior to result without
to the continuous-time equations (1)–(2); the change to dis- any central control. We will study the form of the route-depen-
crete-time is made for later mathematical convenience. Suppose dent constant, and also consider what this constant implies for
again that we consider to model the number of packets resource design.
generated by user at time . These packets experience a delay The paper is organized as follows. In Section II, we study
of before arriving at resource ; therefore, as before, a simplified model with one resource, and give a condition on
gives the probability a packet at resource receives a mark at which ensures the system is locally stable. Next, we discuss
time . Packets leaving resource experience a delay of be- rate of convergence for the one resource model in Section III,
fore returning to user . Thus, the total (approximate) expected completely characterizing convergence to equilibrium for the
number of marks received by user at time is now given by region of stability. Much of the material in the first two sections
. Notice that the number of marks can be found in expanded form in [23].
received by user at time is proportional to the rate units of
We next turn our attention to the network scenario. In Sec-
time ago: this is a direct result of the fact that
tion IV, we develop conditions for stability of a network where
for all . As before, user adjusts to reach a target
all routes have the same round-trip delay ( for all
number of marks per unit time .
), by linearization of (4)–(5). The condition that
The delay structure we have assumed here is very similar to
proves to be essential in developing these stability criteria.
the current operation of TCP [16]. In TCP, the sender transmits
We also suggest two extensions to this model: one where we
packets to a receiver; for every packet received, an acknowledg-
add completely nonadaptive users, and another where we add
ment is transmitted back to the sender. All packets make a round
instantly adaptive users. In Section V, we discuss a conjecture
trip from sender to receiver, and back to sender. As a result, the
extending our results to networks with diverse round-trip delays.
sum of forward and return delays is fixed for all resources on a
This conjecture is investigated with numerical experiments.
given route. This sum is the round-trip delay encountered in
In Section VI, we give simulation results which add queueing
our previous development.
and packet-level behavior to the theoretical model. In particular,
We will focus in this paper on the engineering requirement
we are able to further investigate how queueing delays and prop-
that the network remain stable under communication delays;
agation delays affect network stability, and what it means for
in particular, since queueing delays are assumed to be small,
queueing delays to become negligible. In Section VII, we con-
the key source of instability will be the propagation delay, as
sider the implications our results for the design of resources in-
captured by the round-trip delay . We primarily seek decen-
side the network. Finally, we comment on the implications of
tralized conditions for stability. Given any network with many
our results for future networks in Section VIII.
users, the results of [18] give a global condition for stability of
the lagged system. Here, we will pursue conditions which each
individual user must satisfy to ensure that the system remains II. STABILITY CRITERION: ONE ROUTE, ONE RESOURCE
stable.
We first consider a simple network consisting of one resource
We will consider stability conditions of the form (approxi-
and one route. The difference equation describing this system is
mately)
route-dependent constant (6) (7)
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on August 16,2023 at 13:55:29 UTC from IEEE Xplore. Restrictions apply.
JOHARI AND TAN: END-TO-END CONGESTION CONTROL FOR THE INTERNET: DELAYS AND STABILITY 821
where . To investigate local stability, we consider the fixed point be where and . Then
the linearization of (7) around the stable point. Let the stable linearizing with , we obtain
point be , where , and suppose is differentiable
at this point with derivative . Then linearizing with
, we obtain
neglecting higher order terms. The corresponding characteristic
(8) equation, obtained by substituting , is thus
(14)
The routes in are nonadaptive: they do not respond to , and for , we can linearize to
congestion indication signals from the resource. We will show obtain, for
that if for all , Theorem 5 provides a sufficient
stability condition for the system (4), (18)–(19).
As before, let be the fixed point, with
and . Note that
these definitions include the routes in both and . We have
the following theorem.
Theorem 6: Suppose for all . The system
(4), (18)–(19) is locally stable if the condition (16) is satisfied
for all . and for
Proof: The linearization of the system (4), (18)–(19) is
given by (13) for all , with and defined as above.
Thus, the exact same proof as used for Theorem 5 goes through
to give the result.
(20)
and
diag
(21)
Notice the similar structure of and ; in fact,
The existence and uniqueness of the equilibrium (3), demon- by showing that when ,
strated in [18], shows the system (4), (20)–(21) is well defined. we can prove the following theorem. Details can be found in
The routes in are instantly adaptive: they instantaneously Appendix IV.
achieve their own equilibrium, given the current state of the net- Theorem 7: Suppose for all . The system
work. Thus, as described above, they are users who update rates (4), (20)–(21) is locally stable if the condition (16) is satisfied
much more quickly than the users in . for all .
As before, the system has a unique equilibrium point The results of this subsection and the previous subsection add
. Then, defining for two extremes of users to the basic result of Theorem 5: those
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on August 16,2023 at 13:55:29 UTC from IEEE Xplore. Restrictions apply.
JOHARI AND TAN: END-TO-END CONGESTION CONTROL FOR THE INTERNET: DELAYS AND STABILITY 825
who act much more slowly, and much more quickly, than users queueing delays to become negligible. We will then look more
with round-trip delays . The result of Theorem 7 is particu- closely at instability in the system, revealing the phenomenon
larly revealing. By showing that , of phase locking. Finally, we will investigate stability when
notice that the system with instantly adaptive users is, loosely, users with different round-trip delays interact with each other.
“more stable” than the basic system (4)–(5). This is to be
expected, as instantly adaptive users damp oscillations in the A. A Discrete-Time Queue With Threshold Marking
system; in other words, the network is more stable if there are We will consider a stochastic model analogous to (4)–(5),
users who back off quickly when congestion increases. with one resource and several users. We wish to model queueing
effects, but on a discrete-time scale. The dynamics of such a
V. STABILITY CRITERIA: NETWORKS WITH DIVERSE queueing resource are modeled as
ROUND-TRIP DELAYS
As was noted above, the condition that for all (26)
was essential to the proof of Theorem 5. We now wish to inves-
where is the queue length at time , and is the number
tigate extensions to Theorem 5, which remove the condition of
of packets which arrive at the queue at time . The interpreta-
constant round-trip delay. Given the form of the bounds in The-
tion of the model is as follows. Packets arrive at the queue as
orems 1 and 5, we may make the following conjecture:
a (discrete-time) stochastic process . At time , the
Conjecture 8: The system (4)–(5) is locally stable if the fol-
resource first adds packets (if any) to the queue. If the queue
lowing condition is satisfied for all :
is now nonempty, exactly one packet is served. Notice the simi-
larity of these equations with the analysis of a (continuous-time)
queue, examined at time points where individuals leave
the queue; in that case, the “ imbedded” queue length equation
(25) is [1].
We will suppose that, for each , is a Poisson random vari-
This is just Theorem 5, without the stipulation that able of parameter , independent of the past history of
for all . the process. This makes a discrete time Markov chain. Let
An immediate question arises: does there exist a counterex- be the invariant distribution of this Markov
ample to Conjecture 8? To attempt to answer this question, we chain; then a simple calculation shows has generating func-
generated 10 000 “random” networks, as follows. A random tion
number of routes, from 1 to 5, and a random number of re-
sources, from 1 to 5, were chosen. A random matrix was then
generated. For each and , and were randomly gener-
ated, with between 1 and 15; we then set . The coefficients of the power series expansion of give the
Finally, we chose vectors , , and randomly, and fixed ac- invariant distribution .
cording to (3). This allowed us to compute the critical value of We may interpret the parameter as the mean number of
for each as predicted by (25). We randomly chose packets per unit time which arrive at the queue. A simple choice
to lie in the open interval between 0 and this critical value. for a congestion indication mechanism is a threshold marking
For each of these 10 000 networks, we computed the max- scheme: we mark all arriving packets whenever the queue is
imum modulus of the roots of the characteristic equation (15). at or above a threshold . The user interprets the number of
In every instance, the maximum modulus was strictly less than marks received as an indication of the level of congestion at the
1, so the network was locally stable. This experiment certainly resource, and slows the sending rate accordingly.
suggests that Conjecture 8 might be true, and an interesting fu- The corresponding congestion indication function
ture research problem concerns finding a formal proof of Con- in our fluid flow model is just the probability that an arriving
jecture 8. packet receives a mark. Suppose the queue is in equilibrium;
then we wish to calculate the probability the queue is at or
VI. SIMULATIONS above , given that a packet arrives:
If we are to implement the stability criteria given here in ac-
tual networks, then an obvious question is how well our model
of a network approximates that of a real system. Our model uses
a linearized approximation to study stability, rather than ana-
lyzing the nonlinear equations (4)–(5). Also, queues at the re- by independence of and . For a fixed value of , we
sources are not modeled at all. In this chapter, we will address can compute a closed form expression for by finding the
these concerns through simulations, and compare with our ear- first terms of the power series for . Note that, in the
lier theoretical results. simulations which follow, the queue will not necessarily be at
Our simulations involve one resource, modeled as a dis- equilibrium; thus, is an approximation to the true marking
crete-time queue, with several users. We will investigate probability.
stability of this stochastic system under various round-trip For later reference, it will also be useful to compute the
delays and gain parameters, and determine what it means for queueing delay experienced by a packet at equilibrium—i.e.,
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on August 16,2023 at 13:55:29 UTC from IEEE Xplore. Restrictions apply.
826 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 6, DECEMBER 2001
the equilibrium total time spent in queueing and in service. We equilibrium, as long as for each user. Further, we can
define ; then we have use the triple to determine the critical gain for each
user, from (25).
the evolution equation for the imbedded queue length C. Instability: Queueing Delays versus Propagation Delays
process described above. From the Pollaczek–Khintchine for- Prior to simulating the system described in the previous two
mula [1], at equilibrium we have subsections, we begin by asking what results we expect to see.
In particular, the results in Theorems 1 and 5 give sufficient con-
ditions for local stability by means of the linearized system (13).
In the system (28) that we are simulating, however, “stability”
must be carefully defined—a priori, no well-defined notion ex-
Thus we conclude at equilibrium, and
ists. For our purposes, we can immediately identify two useful
by Little’s formula [1], this implies the queueing delay at equi-
concepts of stability, or equivalently, instability.
librium is
1) Instability of the Nonlinear System (4)–(5). When the
(27) conditions in 1 or 5 are violated, instability results—i.e.,
the trajectories of the linearized system become un-
The previous formula will allow us to estimate the queueing bounded as , for any initial condition. However,
delay experienced by packets in our simulations. the same is not true for the nonlinear system; indeed, since
as , we do not expect the rates to be-
B. The Simulation Model come arbitrarily large when the system is locally unstable.
Typically, instability in the linearization will imply oscil-
We are now ready to describe the model used for simulations.
lation of the trajectories of the nonlinear system, around
We will consider a set of users sharing one resource, modeled
the stable point (local instability). As the linearization be-
as a discrete-time queue with threshold marking; let be the
comes increasingly unstable, the magnitude of the oscil-
number of marks received by user at time . We will suppose
lations of the nonlinear system (4)–(5) will increase.
that each user maintains a sending “rate” , updated as fol-
Now recall that the equations (4)–(5) are fluid flow ap-
lows:
proximations to the simulation model (28). Thus, when-
(28) ever the nonlinear system (4)–(5) is locally unstable, we
expect to also see oscillations in the simulated trajectories
At time , user generates packets according to a Poisson dis- of (28). Such oscillations can be detected by computing
tribution with mean . These packets suffer a propagation the sample variance of the trajectory; when oscillations
delay of before arriving at the resource. are large, then sample variance of the trajectory will also
At the resource, packets arriving at time are added to the be large.
queue in random order, ensuring that no user receives priority Finally, we note that this type of instability is due to the
at the queue. The resource then serves exactly one packet, if the presence of propagation delays in the equations (4)–(5).
queue is nonempty. Each packet returns to its original sender; In the absence of propagation delays (i.e., ), the
a packet returning to user suffers a propagation delay of linearized system (13) is stable for all values of the gain
in transmission from the resource to the user. Thus, the marked parameter , and hence the nonlinear system is locally
packets received by user at time , , left the resource stable for all .
units of time earlier. We still define ; however, 2) Stochastic Instability of the Simulation Model (28). In the
notice that now the observed round-trip delay consists of the simulation equation (28), note that the term is sto-
propagation delay plus a random queueing delay. chastic. As a result, although we might expect the average
The last paragraph makes clear the analogy between our sim- rates to approach an equilibrium as , the
ulation and equations (4)–(5): in the fluid flow approximation, limiting will also have a distribution around this equi-
is given by , which we had described librium. If this distribution has a large variance, then the
as the expected number of marks received by user at time . rates will be widely distributed around the mean, ap-
We are now explicitly modeling, at the packet level, the conges- proximately equal to the stable point. Thus, a second type
tion indication behavior described by (4)–(5)—but we are also of instability can be observed as a high variance of rates at
adding to this model queueing at the resource. equilibrium. This “stochastic instability” can be detected
In Theorems 1 and 5, the stability criteria are expressed in statistically as a high sample variance of rates.
terms of the stable point . For our simulations, we can We note that the stochastic behavior of is
fix the stable point in advance. We begin by choosing for caused by the random queueing delay at the resource: the
each user ; then, given the threshold , we can explicitly queueing at the resource causes a stochastic delay in the
calculate from the theory in the last section. arrival of marked packets back to the end user.
Similarly, we can calculate . (Note this is only We wish to test whether Theorems 1 and 5 give accurate con-
sensible as long as , so the arrival rate does not exceed ditions for local stability of the stochastic, packet-level system
service capacity.) We then expect the rates to converge to at (28). Our approach will be to vary the gain parameters , and
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on August 16,2023 at 13:55:29 UTC from IEEE Xplore. Restrictions apply.
JOHARI AND TAN: END-TO-END CONGESTION CONTROL FOR THE INTERNET: DELAYS AND STABILITY 827
small, and marking is independent from link to link; see Intro- VIII. CONCLUSION
duction). Then, approximately, , so we may set This paper has considered stability of network rate control in
. More generally, as long as the number of resources used the presence of communication delays. Stability conditions are
on any given route is bounded above, say for given for both a single resource and a large network with con-
all , then since the marking probability satisfies for
stant round-trip delay, and under the addition of instantly adap-
all , we may set .
tive and completely nonadaptive users. Rate of convergence is
However, we must consider more closely the uniform bound
completely characterized for the single-resource case. Finally,
for every resource in the network. In order to
simulation results contrast the effects of queueing delays and
achieve the decentralized, decoupled implementation this re-
propagation delays, and also reveal the phenomenon of phase
quirement allows, there is a design condition for the feedback
locking.
function at every resource. As an example, consider a re-
Under the assumption that propagation delays will become
source which behaves as an queue, with service times
more significant than queueing delays, the results of this paper
exponentially distributed with mean (so is the “capacity”
suggest that network stability can be guaranteed by implemen-
of the resource). Suppose the resource is in equilibrium, and the
tation of simple, decentralized conditions on end users and re-
workload arriving at the resource is Poisson of rate . Further,
sources. The evolution of telecommunications networks in the
suppose that the resource uses a threshold marking scheme: a
next decade remains a contested and unresolved issue. However,
packet is marked if it arrives to find more than packets in
as networks expand to the size and complexity of the Internet,
the queue. The function is given by the probability that an
we may safely conclude theoretical predictions such as those
arriving packet is marked. By the PASTA property (Poisson Ar-
given here will become increasingly important to guarantee ro-
rivals See Time Averages), we can easily calculate from
bust behavior.
the stationary distribution of an queue
APPENDIX I
PROOF OF THEOREM 1
Lemma 9: Let be a polynomial in , with coeffi-
Thus, we have the result that , and the condition cients which are continuous functions of (where may be
becomes simply . Implementation of this vector valued). Then the maximum modulus of the roots of
constraint on the threshold level requires no knowledge of is continuous in .
user flows, as summarized by . Proof: The roots of any polynomial are continuous func-
In general, notice that we may typically bound below (e.g., tions of the coefficients [15]. If the coefficients are continuous
by ensuring the marking probability does not drop below a fixed functions of , this immediately implies the conclusion of the
value), and bound above (e.g., at a router, the traffic arrival lemma.
rate cannot exceed the incoming line speed). In this situation, Lemma 10: For sufficiently small , all roots of (9) have
the condition reduces to an upper bound on , modulus less than unity.
i.e., the rate of change of the marking probability with respect Proof: We define the polynomial by
to aggregate flow . The implication of this condition is that
“smoother” marking functions lead to a more stable network.
For example, suppose again that is the capacity of resource , where . Then the characteristic equation (9) is
and that at equilibrium, the resource is fully utilized ( ). . When , the roots are with multiplicity
If for , and for , then and with multiplicity 1. By direct computation, we find
will be infinitely large—leading to local instability, ob- that is nonzero at , . Thus, we can apply the
served as oscillations of the rate control algorithm. Instead, for Implicit Function Theorem to find an open interval and a
resources where is very small at equilibrium, the condition differentiable complex-valued function such that ,
(16) becomes easier to satisfy, and loosely, the system is “more” and satisfies for . For such
stable. Further details on design of the function can be found , differentiating with respect to yields
in [17].
The condition given on suggests a new paradigm
for router design. Recent research has considered the design of
Evaluating this through at yields . We take a
active queue management (AQM) schemes to control conges-
Taylor series expansion of around :
tion in router buffers (e.g., Misra et al. [21]), as well as priority
mechanisms at the routers to provide support for differentiated
services (see, e.g., the DiffServ proposal [6]). In this paper, we
have identified a different form of resource design condition, Thus, as increases away from zero, the root initially
one which constrains the choice of marking function , and in moves approximately as , and hence for sufficiently small
particular, the derivative . If routers are designed to satisfy the this root will have modulus less than unity. For the root
condition constant, then together with the decentral- of multiplicity , we note that by taking even smaller if
ized condition constant, Theorems 5–7 guarantee local necessary, we can appeal to Lemma 9 to ensure that these
stability of the network. roots remain of modulus less than unity as increases away
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on August 16,2023 at 13:55:29 UTC from IEEE Xplore. Restrictions apply.
830 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 6, DECEMBER 2001
from zero. Thus, for sufficiently small , (9) has all roots of Lemma 11: For , the rate of conver-
modulus less than unity. gence of the system (12) decreases monotonically from to
Proof of Theorem 1: We can easily check the result for 0.
since the linearized system becomes Proof: Let the root be where . Then
; so assume for the rest of the proof. from (11):
By Lemma 9, the maximum modulus of the roots of (9) varies
continuously with . Also we know that the system is locally (31)
stable for small from Lemma 10. Hence, for the first part of (32)
the theorem, it suffices to look for the smallest such that (9)
has a root of unit modulus. Let the root be ; then (9) Notice that if satisfies the above equations, then so does
may be rewritten as . Hence, without loss of generality, we may assume that
. Equation (32) gives
(33)
where . Hence we conclude that
which on substitution into (31) yields
(34)
where is an integer. We choose since we are looking Observe that where since
for the smallest positive such that is of unit modulus. Hence, and from equations (33)–(34). Also, from
substituting for in , we see that there are no so- (33) is monotonic decreasing in from 1 to 0 for .
lutions for if . This gives the first Then the left-hand side of (34) is monotonic increasing in
part of the theorem. from to for . Hence, a root of equations
For the second part of the theorem, it suffices to prove that (33)–(34) exists for which is decreasing in as
there exists a root of modulus to (9) when increases from to . It remains to show that this
, where . From (9), note that is the root with the smallest . Notice that if is larger,
, and that as vectors in the complex plane, the then has to be larger for (34) to be satisfied. But
angle between and 1 is . Thus, applying the cosine rule, we for and for , so taking
have yields the root with the smallest . Then, since the rate of
convergence is , we have the required result.
(29)
Lemma 12: The rate of convergence of the system (12) is
monotonic increasing and convex from 0 to , and the con-
Further, by equating imaginary parts in (9), we have
vergence is nonoscillatory, for .
Proof: Consider the function when is real and
(30)
negative. Suppose we maximize the function with respect to .
We have
We know that for , and
. Suppose . Then the right-hand side
of (29) is less than for . Notice that the left-hand
side of (29) decreases from to for
which equals zero when , giving a maximum of
. To prove that a root of modulus greater than
. Moreover, is convex increasing in , rising from
unity exists, it suffices to show that increases from 1 to
an asymptote of 0 to on the interval ; and
for and that the right-hand side of (29) is
concave decreasing from to 0 on the interval . This
increasing in for . From (30), we may conclude
characterization implies that (11) has two negative roots when
for , since and
and one negative root when . More-
. So increases from 1 to
over, the modulus of the smaller root (in modulus) increases
for . Further, differentiating the right-hand
from 0 to 1 as increases from 0 to , and is clearly a
side of (29) with respect to shows that the right-hand side of
convex function of .
(29) is increasing in for , tending to when is
It remains to show that taking to be real yields the root
large. Thus a root of modulus greater than unity exists for which
with the smallest (in modulus) negative real part; this will also
when . This proves the
show that the convergence is nonoscillatory. First, note that the
second part of the theorem.
modulus of the smaller real root is not greater than 1. Suppose
there are complex roots for . Then using the same
APPENDIX II argument as in the proof of Lemma 11, we see that there are no
PROOF OF THEOREM 4 roots for , , since the left-hand side of (34) is greater
Theorem 4 follows immediately from the following two than . Also, for , , so the complex root,
lemmas. if any, will have . This completes the proof.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on August 16,2023 at 13:55:29 UTC from IEEE Xplore. Restrictions apply.
JOHARI AND TAN: END-TO-END CONGESTION CONTROL FOR THE INTERNET: DELAYS AND STABILITY 831
The argument above also shows that is positive semidefi- [8] F. Bonomi, D. Mitra, and J. B. Seery, “Adaptive algorithms for feedback
nite; further, from the definition, it is symmetric. If , then based flow control in high-speed, wide-area data networks,” IEEE J.
Select. Areas Commun., vol. 13, pp. 1267–1283, Sept. 1995.
from the definition of , we may write [9] S. Chong, R. Nagarajan, and Y. T. Wang, “Designing stable ABR flow
, where is diagonal and positive definite, is control with rate feedback and open loop control: First-order control
real diagonal and positive semidefinite with , and case,” Perform. Eval., vol. 34, pp. 189–206, 1998.
[10] , “First-order rate-based flow control with dynamic queue
. Using the bound for from threshold for high-speed wide-area ATM networks,” Comput. Networks
our proof of Theorem 5 ISDN Syst., vol. 29, pp. 2201–2212, 1998.
[11] K. W. Fendick, M. A. Rodrigues, and A. Weiss, “Analysis of a rate-based
feedback control strategy for long haul data transport,” Perform. Eval.,
vol. 16, pp. 67–84, 1992.
[12] S. Floyd and V. Jacobson, “On traffic phase effects in packet-switched
gateways,” Internetworking: Research and Experience, vol. 3, no. 3, pp.
115–156, 1992.
[13] R. J. Gibbens and F. P. Kelly, “Resource pricing and the evolution of
congestion control,” Automat., vol. 35, pp. 1969–1985, 1999.
[14] N. D. Hayes, “Roots of the transcendental equation associated with a
certain differential-difference equation,” J. London Mathemat. Soc., vol.
25, pp. 226–232, 1950.
[15] R. A. Horn and C. R. Johnson, Matrix Analysis. Cambridge, U.K.:
Cambridge Univ. Press, 1985.
[16] V. Jacobson, “Congestion avoidance and control,” in Proc. ACM SIG-
COMM, 1988, pp. 314–329.
[17] F. P. Kelly, “Models for a self-managed Internet,” Philosoph. Trans.
Royal Soc. London, vol. 358, pp. 2335–2348, 2000.
[18] F. P. Kelly, A. K. Maulloo, and D. K. H. Tan, “Rate control in communi-
This completes the proof. cation networks: shadow prices, proportional fairness, and stability,” J.
Oper. Res. Soc., vol. 49, pp. 237–252, 1998.
[19] S. H. Low and D. E. Lapsley, “Optimization flow control I: Basic al-
ACKNOWLEDGMENT gorithm and convergence,” IEEE/ACM Trans. Networking, vol. 7, pp.
861–874, Dec. 1999.
The authors are grateful to F. Kelly for his support, enthu- [20] D. G. Luenberger, Introduction to Dynamic Systems: Theory, Models,
siasm, and guidance; they also wish to acknowledge helpful and Applications. New York: Wiley, 1979.
[21] V. Misra, W.-B. Gong, and D. F. Towsley, “Fluid-based analysis of a
conversations with D. Wischik, A. Neitzke, and A. Weiss. Fi- network of AQM routers supporting TCP flows with an application to
nally, they wish to thank the reviewers for their constructive RED,” in Proc. ACM SIGCOMM, 2000, pp. 151–160.
comments. [22] S. Shenker, “A theoretical analysis of feedback flow control,” in Proc.
ACM SIGCOMM, 1990, pp. 156–165.
[23] D. K. H. Tan, “Mathematical models of rate control for communication
REFERENCES networks,” Ph.D. dissertation, Univ. of Cambridge, Cambridge, U.K.,
1999.
[1] S. Asmussen, Applied Probability and Queues. New York: Wiley,
1987.
[2] R. Bellman and K. L. Cooke, Differential-Difference Equations. New
York: Academic, 1963.
[3] L. Benmohamed and S. Meerkov, “Feedback control of congestion Ramesh Johari received the A.B. degree in mathematics from Harvard Univer-
in packet switching networks: The case of a single congested node,” sity, Cambridge, MA, in 1998, and a Certificate of Advanced Study in Math-
IEEE/ACM Trans. Networking, vol. 1, pp. 693–708, Dec. 1993. ematics from Trinity College, University of Cambridge, Cambridge, U.K., in
[4] , “Feedback control of congestion in packet switching networks: 1999. He is currently working toward the Ph.D. degree in electrical engineering
the case of multiple congested nodes,” in Proc. American Control Conf., and computer science at the Massachusetts Institute of Technology, Cambridge.
1994, pp. 1104–1108.
[5] D. P. Bertsekas and J. N. Tsitsiklis, Parallel and Distributed Computa-
tion: Numerical Methods. Cambridge, MA: Athena Scientific, 1997.
[6] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss.
(1998) An architecture for differentiated services, IETF RFC 2475. [On- David Kim Hong Tan was born in Singapore and received the B.A. degree in
line]. Available: http://www.ietf.org/rfc/rfc2475.txt physics from Oxford University, Oxford, U.K., in 1986. Following a nine-year
[7] J.-C. Bolot and A. U. Shankar, “Dynamical behavior of rate based flow career in the Singapore Air Force, he received the Ph.D. degree in mathematics
control mechanisms,” Comput. Commun. Rev., vol. 20, no. 2, pp. 35–49, from Cambridge University, Cambridge, U.K., in 1999.
1990. He is currently pursuing the study of linguistics in Darwin, Australia.
Authorized licensed use limited to: INDIAN INSTITUTE OF TECHNOLOGY BOMBAY. Downloaded on August 16,2023 at 13:55:29 UTC from IEEE Xplore. Restrictions apply.