In ATM networks, the information is transmitted using short fixed-length cells, which reduces the delay variance, making it suitalbe for integrated traffic consisting of voice, video and data. By proper traffic management, ATM can also ensure efficient operation to meet different quality of service (QoS) desired by different types of traffic.
There are several misunderstandings about the cause and the solutions of congestion control [6]
Larger buffer is useful only for very short term congestions and will cause undesirable long delays. Suppose the total input rate of a switch is 1Mbps and the capacity of the output link is 0.5Mbps, the buffer will overflow after 16 second with 1Mbyte memory and will also overflow after 1 hour with 225Mbyte memory if the situation persists. Thus larger buffer size can only postpone the discarding of cells but cannot provent it. The long queue and long delay introduced by large memory is undesirable for some applications.
It is not always the case, sometimes increases in link bandwidth can aggravate the congestion problem because higher speed links may make the network more unbalanced. For the configuration showed in the Figure 1, if both of the two sources begin to send to destination 1 at their peak rate, congestion will occur at the switch. Higher speed links can make the congestion condition in the switch worse.
This statement can be explained to be wrong similarly to the second one. Faster processors will transmit more data in unit time. If several nodes begin to transmit to one destination simutaneously at their peak rate, the target will be overwhelmed soon.
Congestion is a dynamic problem, any static solutions are not sufficient to solve the problem. All the issues presented above: buffer shortage, slow link, slow processor are symptoms not the causes of congestion. Proper congestion management mechanisms is more important than ever.
The delay experienced by a cell between the first bit of the cell is transmitted by the source and the last bit of the cell is received by the destination. Maximum Cell Transfer Delay ( Max CTD) and Mean Cell Transfer Delay (Mean CTD) are used.
The difference of the maximum and minumum CTD experienced during the connection. Peak-to-peak CDV and Instantaneous CDV are used.
The percentage of cells that are lost in the network due to error or congestion and are not received by the destination.
BT and MBS are related as follows: Burst Tolerance = ( MBS - 1 )( 1/SCR - 1/PCR )
To make it easier to manage, the traffic in ATM is divied into five service classes [16]:
Quality requirements: constant cell rate, i.e. CTD and CDV are tightly constrained; low CLR.
Example applications: interactive video and audio.
Quality requirements: variable cell rate, with CTD and CDV are tightly constrained; a small nonzero random cell loss is possible as the result of using statistical multiplexing.
Example applications: interactive compressed video.
Quality requirements: variable cell rate, with only CTD are tightly constrained; a small nonzero random cell loss is possible as the result of using statistical multiplexing.
Example applications: response time critical transaction processing.
Quality requirements: using any left-over capacity, no CTD or CDV or CLR constrained.
Example applications: email and news feed.
Quality requirements: using the capacity of the network when available and controlling the source rate by feedback to minimize CTD , CDV and CLR.
Example applications: critical data transfer, remote procedure call and distributed file service.
The QoS and Usage parameters for these classes are summarized in Table 1:
Parameters | CBR | rt-VBR | nrt-VBR | UBR | ABR |
---|---|---|---|---|---|
PCR and CDVT(5) | specified | specified | specified | specified(3) | specified(4) |
SCR, MBS, CDVT(5,6) | n/a | specified | specified | n/a | n/a |
MCR(5) | n/a | n/a | n/a | n/a | specified |
Peak-to-peak CDV | specified | specified | unspecified | unspecified | unspecified |
Mean CTD | unspecified | unspecified | specified | unspecified | unspecified |
Max CTD | specified | specified | unspecified | unspecified | unspecified |
CLR(5) | specified(1) | specified(1) | specified(1) | unspecified | specified(2) |
ATM Forum Technical Committee specified the feedback mechanism for ABR flow control. We will discuss it in more detail later.
The scheme should not be limited to a particular range of speed, distance, number of switches, or number of VCs. The scheme should be appliable for both local area networks (LAN) and wide area networks (WAN).
In a shared environment, the throughput for a source depends upon the demands by other sources. There are several proposed criterion for what is the correct share of bandwidth for a source in a network environment. And there are ways to evaluate a bandwidth allocation scheme by comparing its results with a optimal result.
The share of bandwidth for each source should be equeal to or converge to the optimal value according to some optimality criterion. We can estimate the fairness of a certain scheme numerically as follows. Suppose a scheme allocates x1, x2, ..., xn, while the optimal allocation is y1, y2, ..., yn. The normalized allocation is zi = xi / yi for each source and the fairness index is defined as following:
Fairness = sum(zi) * sum(zi) / sum(zi * zi)
The scheme should be insensitive to minor deviations such as slight mistuning of parameters or loss of control messages. It should also isolate misbehaving users and protect other users from them.
The scheme should not dictate a particular switch architecture. It also should not be too complex both in term of time or space it uses.
We can classify the congestion control schemes by the time scale they operate upon [12]: network design, connection admission control (CAC), routing (static or dymanic), traffic shaping, end-to-end feedback control, hop-by-hop feedback control, buffering. The different schemes are functions on different severity of congestion as well as different duration of congestion [5].
Another classification of congestion control schemes is by the stage that the operation is performed: congestion prevention, congestion avoidance and congestion recovery. Congestion prevention is the method that make congestion impossible. Congestion avoidance is that the congestion may happen, but the method avoid it by get the network state always in balance. Congestion recovery is the remedy steps to take to pull the system out of the congestion state as soon as possible and make it less damaging when the congestion already happened.
No matter what kind of scheme is used, the following outstanding problems are the main diffculties that need to be treated carefully: the burstiness of the data traffic, the unpredictability of the resource demand and the large propagation delay versas the large bandwidth.
To meet the objectives of traffic control and congestion control in ATM networks, the following funtions and procedures are suggested by the ATM Forum Tecnical Committee [16].
Based on the CAC algorithm, a connection request is progressed only when sufficient resources such as bandwidth and buffer space are available along the path of a connection. The decision is made based on the service category, QoS desired and the state of the network which means that the number and conditions of existing connections.
Routing and resource allocation are part of CAC when a call is accepted.
The Generic Cell Rate Algorithm (GCRA) is used to define conformance with respect to the traffic contract. For each cell arrival, the GCRA determines whether the cells conforms to traffic contract of the connection. The UPC fuction may implement GCRA, or one or more equivalent algorithms to enforce conformance.
GCRA is a virtual scheduling algorithm or a continuous-state Leaky Bucket Algorithm as difined by the flowchart in Figure 2 and Figure 3 It is defined with two parameters: the Increment (I) and the Limit (L). The notation GCRA(I,L) is often used.
The GCRA is used to define the relationship between PCR and CDVT, and relationship between SCR and BT. The GCRA is also used to specify the conformance of the declared values of and the above parameters.
Examples of traffic shaping are peak cell rate reduction, burst length limiting, reduction of CDV by suitably spacing cells in time, and queue service schemes.
Traffic shaping may be performed in conjuntion with suitable UPC functions.
The most famous algorithm for traffic shaping is leaky bucket algorithm. This method provides a pseudo-buffer(Figure 4). Whenever a user sends a cell, the queue in the pseudo-buffer is increased by one. The pseudo-server serves the queue and the service-time distribution is constant. Thus there are two control parameters in the algorithm: the service rate of the pseudo-server and the pseudo-buffer size.
As long as the queue is not empty, the cells are transmitted with the constant rate of the service rate. So the algorithm can receive a bursty traffic and control the output rate. If excess traffic makes the pseudo-buffer overflow, the algorithm can choose discarding the cells or tagging them with CLP=1 and transmitting them.
PCR or SCR can be controlled by choosing appropritiate values of service rate and buffer size. In addition, PCR and SCR can both be controlled by combining two buckets with one for each of the parameters. And there are many variances of the original scheme.
Feedback mechanisms are specified for ABR service class by ATM Forum Technical Committee. We will discuss it in detail later.
The ATM Forum Technical Committee Traffic Management Working Group have worked hard on this topic, and here are some of the main issues and the current progress of this area.
Open-loop approaches do not need end-to-end feedback, one of the examples of this type are prior-reservation and hop-to-hop flow control. In close-loop approaches, the source adjust its cell rate in responding to the feedback information received from the network.
It has been argued that close-loop congestion control schemes are too slow in todays high-speed, large range network, by the time a source gets the feed back and reacts to it, several thousand cells may have been lost. But on the other hand, if the congestion has already happened and and the overload is of long duration, the condition cannot be released unless the source causing the congestion is asked to reduce its rate. Furthermore, ABR service is designed to use any bandwidth that is left over the source must have some knowledge of what is available when it is sending cells.
The ATM Forum Technical Committee Traffic Management Working Group spesified that feedback is necessary fro ABR flow control.
Credit-Based approaches consists of per-link, per-VC window flow control. The receiver monitors queue lengths of each VC and determines the number of cells the sender can transmit on that VC, which is called ``credit''. The sender transmits only as many cells as allowed by the credit.
Rate-Based approaches control the rate by which the source can transmit. If the network is light loaded, the source are allowed to increase its cell rate. If the network is congested, the source should decrease its rate.
After a long debate, ATM Forum finally adopted the rate-based approach and rejected the credit-based approach [5]. The main reason for the credit-based approach not being adopted is that it requires per-VC queueing, which will cause considerable complexity in the large switches which support millions of VCs. It is not scalable. Rate-Based approaches can work with or without per-VC queueing.
Binary Feedback uses on bit in the cell to indicate the elements along the flow path is congested or not. The source will increase or decrease its rate by some pre-decided rule upon receice the feedback. In Explicit Feedback, the network tells the source exactly what rate is allowed for it to send.
Explicit Rate (ER) feedback approach is preferred, because ER schemes have several advatages over single-bit binary feedback [5]. First, ATM networks are connection oriented and the switches know more information along the flow path, the increased information can only be used by explicit rate feedback. Secondly, the explicit rate feedback is faster to get the source to the optimal operating point. Third, policing is straight forward. The entry switches can monitor the returning message and use the rate directly. Fourth, with fast convergence time, the initial rate has less impact. Fifth, the schemes are robust against errors in or loss of a single message. the next correct message will bring the system to the correct operating point.
There are two ways for explicit rate feedback: forward feedback and backward feedback. With forward feedback, the messages are sent forward along the path and are returned to the source by the destination upon receiving the message. With backward feedback, the messages are sent directly back to the source by the switches whenever congestion condition happens or is pending in any of the switches along the flow path.
Actually this issue does not cause too much debate. In earlier schemes, large queue length is often used as the indication of congestion. But there some problems with this method.
First, it is a static measurement. For example, a switch with a 10k cells waiting in queue is not necessarily more congested than a switch with a 10 cell queue if the former one is draining out its queue with 10k cell per second rate and the queue in the latter is building up quickly. Secondly, using queue length as the method of congestion detection was shown to result in unfairness [5]. Sources that start up late were found to get lower throughput than those which start early.
Queue growth rate is more appropriate as the parameter to monitor the congestion state because it shows the direction that the network state is going. It is natural and direct to use queue growth rate in a rate-based scheme, with the controlled parameter and the input paramter have the same unit.
ATM Forum Technical Committee specifies the format of the RM-cell. The already defined fields in a RM-cell that is used in ABR service is explained in this section.
The function and usage of these paramters are still under study.
There are two notations that need to be explained before we discuss the network behavior.
In-Rate Cells : The cells that counted in the user's rate with CLP=0. In-rate cells include data cells and in-rate RM-cells.
Out-of-Rate Cells : These cells are RM-cells and are not counted in the user's rate. They are used when ACR=0 and in-rate RM cells can not be send. The CLP is set to 1 for them.
In this section, we discuss some highlights of the specification.
These class of feedback mechanisms use binary feedback involving the setting of the EFCI bit in the cell header. The simplest example of a binary feedback mechanism is based on the old DECbit scheme. In this scheme all the VCs in a switch share a common FIFO queue and the queue length is monitored. When the queue legnth exceeds a threshold congestion is declared and the cells passing the switch have their EFCI bit set. When the queue length falls below the threshold the cells are passed without their EFCI bit set. The source will adjust its rate accordingly when it sees the feedback cells with the EFCI bit set or not. Variations of this scheme include using two thresholds for the indication and removing congestion respectively.
Binary feedback mechanisms can sometimes be fair because long hop VCs have higher posibility to have their cell EFCI bit set and get fewer opportunities to increase their rate. It is called the ``beat down problem''. This problem can be alleviated by some enhancements to the basic scheme such provide seperate queues for each VCs.
But a coherent problem with binary feedback mechanisms are that they are too slow for rate-based control in high-speed networks [5].
As we have discussed before, explicit rate feedback control would not only be faster but would offer more flexibility to switch designers [5]. Many explicit rate feedback control schemes has been proposed, the following are some that is documented by the ATM Forum.
In EPRCA, the source sends data cells with EFCI set to 0 and sends RM-cells every n data cells. The RM-cells contain desired explicit rate (ER), current cell rate (CCR) and congestion indication (CI). The source usually initailizes CCR to the allowed cell rate (ACR) and CI to zero.
The switch computes a mean allowed cell rate (MACR) for all VCs using exponential weighted average:
MACR = (1 - alpha) * MACR + alpha * CCR
and the fair share as a fraction of this average, where alpha and the fraction are chosen to be 1/16 and 7/8 respectively. The ER field in the returning RM-cells are reduced to fair share if necessary. The switch may also set the CI bit in the cells passing when it is congested which is sensed by monitoring its queue length.
The destination monitors the EFCI bits in data cells and mark the CI bit in the RM-cell if the last seen data cell had EFCI bit set.
The source decreases its rate continously after every cell by a fixed factor and increases its rate by an fixed amount if the CI bit is not set. Another rule is that the new increased rate must never exceed either the ER in the returned cell or the PCR of the connection.
The main problem of this scheme is that the congestion detection is based on the queuelength and this method is shown to result in unfairness [5]. Sources that start up late may get lower throughput than those start early.
In each switch, a target rate is defined as slightly below the link bandwidth, such as 85-90% of the full capacity. The input rate of the switch is measured over a fixed averaging interval. The load factor z is then computed as:
Load Factor z = Input Rate / Target Rate
When the load factor is far from z, which means the switch is either highly overloaded or highly underloaded, all VCs are asked to change their load by this factor z. When the load factor is close to 1, between 1-delta and 1+delta for a small delta, the switch gives different feedback to underloading sources and overloading sources.
A fairshare is computed, and all sources whose rates are more than the fair share are asked to devided their rates by z/(1+delta), while those below the fair share are asked to devided their rates by z/(1-delta).
This scheme tries to achieve efficiency and fairness concurrently by allowing underloaded VCs to increase their rate to fair share inspite of the conditions of the network and the sources already equal or greater than fair share may increase their rate if the link is under used. And the target capacity of the switch is set higher, 90-95% of the full bandwidth.
The switch calculates fair share as:
Fairshare = Target capacity / Number of active VCs
And the remaining capacity that a source can use is:
VCshare = CCR / Load Factor z
Then the switch sets the source's rate to the maximum of the two.
The information used to compute the quantities comes from the forward RM-cells and the feedback is given in the backward RM-cells. this ensures that the most current infermation is used to provide fastest feedback.
Another advantage of this scheme is that it has few parameters which can be tuned easily.
In this scheme, the switches also set a target utilization slightly below 1 and measure the input rate to compute load factor z.
During underload (z is less than 1), fair share is increased as:
Fairshare = Fairshare * Min( ERU, 1+(1-z)*Rup)
where Rup is a slope parameter between 0.025 and 0.1, and ERU is the maximum increase allowed.
During overload (z is greater than 1), fair share is decreased as:
Fairshare = Fairshare * Max(ERF, 1-(z-1)*Rdn)
where Rdn is a slope parameter between 0.2 and 0.8, and ERF is the minimum decrease required.
The source should never allowed to transmit at a rate higher than the fair share.
The distinquishing feature of this scheme is that it is oscillation-free in steady state.
The switch calculates the Mean Allowed Cell rate (MACR) basing on a running exponential average of the ACR value from each VC's forward RM-cells as:
MACR = MACR + (ACR - MACR) * AVF
where AVF (ACR Variation Factor) is set to 1/16.
If the load factor is less than 1, the left-over bandwidth is reallocated according to:
MACR = MACR + MAIR
where MAIR is the MACR Additive Increase Rate.
The ER value is computed as:
ER = MACR * MRF
where MRF is the MACR Reduction Factor if congestion is detected,
ER = MACR
if no congestion is detected.
The congestion condition is detected by observing that the queue derivative is positive.
Summary
Traffic management for ATM networks encompasses a number of interrelated elements operating over different levels and time scales. Among these, the congestion control is one of the most improtant component for the performance of the network and also is the most challenging one.
This report introduced the concepts in congestion control for ATM networks, and the specifications for ATM traffic control proposed by ATM Forum are explained. The work done so far by the members of ATM Forum is presented.
References
Summary
This scheme also uses explicit feedback to adjust the source rate. The most important feature of it is that arrival rate rather than the queue length is used as the measure of congestion (MOC). The arrival rate is more accurate and may detect the onset of congestion sooner so that it can account for the propagation delay.
The preceeding several schemes all use rate as the control objective. There is long debate over using rate or using credit as the control approach [5]. The ATM forum finally select rate mainly because that credit control need per-VC queueing, which is hard to implement.
Summury
This is a routing scheme which in cooperation with congestion control. The basic idea is that shortest path is always used under light load, alternative path is used if the shortest one becomes congested. In selecting the alternative path, different classes of traffic such as delay-sensitive or loss-sensitive is treated differently, considering the different QoS required for them.
This scheme works best when the traffic in the network is unbalanced, with some part of it heavyly loaded and other part is not. One shortcoming of this scheme is that it decises the path when the connection is set up and does not change the path if the network state changes. It should work better if it uses dynamic routing. But the advantage of static routing is that the implementation is simple.
Summary
The scheme uses system identification and adaptive control theory. First it uses k-step ahead prediction and recursive least squares to estimate the network state and the control parameters and uses adaptive feedback and adaptive feedforward techniques to control the behavior of the network.
Similar to the first scheme, it applies some approach borrowed from control theory and it also combines CAC with lower level flow control. The idea is perfect if the charicateristics of the network system can be abtained accurately by the estimation, which is still to be studied.
Summary
The scheme uses priority queueing to meet the quality of service (QoS) requirements when the switch is congested.
When congestion happened at a node, the total input rate is greater than the output link capacity, the queue will build up in the node. Thus enough buffering is important in congestion management. As the congestion condition persists, the storage space in the node may runs out, then dropping cells is inevitable. So selective discarding is also an important decision to be made in congestion management.
In this scheme, priority is used to achieve the desired performance in congestion conditions: delay-sensitive cells are given higher priority to be transmitted and loss-sensitive cells are given higher priority to get a buffer space so that they are less likely to be dropped.
Another selective discarding scheme drops all cells of one packet because one cell loss may cause the retransmission of the whole packet, which may cause more traffic when congestion already happened [5].
Summary
The basic concept in ATM is introduced, especialy the importance, mechanism and criteria of congestion control in ATM networks. Different congestion schemes are discribed and compared. The debate between rate- based and credit-based approach is presented.
Summary
Some wrong ideas about congestion management in high-speed networks are pointed out and explained. Several competing approaches about congestion control and avoidance are presented, and the advantages and weakness of both sides are discussed. The conclusion is that a combination of several schemes is needed to achieve a desired performance.
Summary
Several congestion control schemes are studied by simulation, including ATM-Early Packet Discard (ATM-EPD) and ATM flow-controlled virtual channals (ATM-FCVC), which support TCP/IP on a multi-hop ATM network. The performance of these schemes are compared in terms of effective throughput, the number of retransmissions, degree of fairness, mean packet delivery time and packet delivery time standard deviation for different buffer size and network configurations.
Summary
A scheme to solve the speed mismatch at ATM LAN/MAN gateways. A source quench message is sent to the host to slow down the traffic if the output buffer occupancy of the source gateway reaches a certain threshold. The distance gateway sends a turn-off signal to the source gateway for the same reason.
Summary
The scheme is realized by using some fuzzy logic controllers. A fuzzy traffic controller is desinged, whose major components are a fuzzy congestion controller, a traffic negotiator and a fuzzy admission controller.
Connection admission control is a open-loop, preventive congestion scheme. It is a higher level method and is necessary because the network cannot satisfy all the QoS negotiated using lower level schemes if there are too many users are there. But CAC alone is likely to be too conservative and not sufficient in regard of resource usage, because the peak rate bandwidth must be allocated to the source in case all of the source trying to transmit at their peak rate simutaneously. Thus lower level management must be used to take the advantage of the gain from statistical multiplexing. The merit of this scheme is that it uses both CAC and lower level congestion control approach to get the network work efficiently.
The problem is that it over simplifies the charicateristics of the network. There are so many factors that influence the state of the traffic condition, the membership functions and control rules given cannot represent all the complex problems. On the other hand, if the membership functions and control rules are designed too complex, the algorithm will be impossible to run in real-time.
Summary
The scheme provides two different ways to control two different types of traffic.
For the best effort class, the scheme combines forward explicit congestion notification (FECN) and backpressure to reduce the rate. The FECN is for the congestion condition which last longer than a round trip time and backpressure is for the immediate release to prevent the buffer overflow of the congestioned node.
For the guaranteed burst class, the scheme applies a modification of fast reservation protocol (FRP), which reduces the peak rate to be received after each NACK.
The merits of this scheme is that it treat different types of traffic according to their particular patterns and special needs, and that it combines two levels of control efforts to achieve the desired performance.
Another issue here is that it uses FECN, the notification of congestion is sent forword and then returned by the distination. Some control schemes uses backward explicit congestion notification (BECN) instead. Some believe that BECN can reach the source quickly and release the congestion faster. But others argue that BECN is not necessarily faster and may not reflect the whole state of the network.
Summary
The paper introduced the notion of Congestion Process (CP) and applies the concepts to police the source traffic.
Traffic policing is used to make sure that the user is sending its cells within the negociated parameter and to isolate the misbehaving source to prevent it from causing harm to the network and other users. It is called usage parameter control (UPC) in ATM networks. Traffic shaping is used to shape the traffic sent to the network to prevent the switch from being overwhelmed. Both of the approaches help to prevent or lessen the congestion situation.
One of the widely used scheme for policing and shaping is leaky bucket algorithm. It has two control parameters, one of which controls the average rate (or the peak rate) the source can transmit, and the other controls how much the source can temperarily exceed that rate. There are many variances of the original scheme.
Summary
The scheme uses explicit forward congestion indication (EFCI) as feedback. This is an improvement compared with the previous scheme in that the source has more information as to how to adjust its transmission rate.
Another merit of this scheme is that the source can transmit at a rate greater than its sustainable cell rate (SCR) if the load of the network is light. Hence the resources of the network are fully utilized.
Third, only the sources that exceed their SCR are required to decrease their rate when congestion is experienced. Thus the negotiated quality of service (QoS) is guaranteed.
The weakness of this scheme is that it uses the average queue length to determine the congestion condition, which is inaccurate and misleading in some cases [5].
Summary
The scheme uses a feedback cell (FC) to get the information of the network along the path. FC is issued periodically and is transmitted with highest priority. The source adjusts its rate upon receiving each returning FC.
The merit of this scheme is that it considers the feedback delay when uses the information in the FC. The problem is that binary feedback is usually not sufficient for the algorithm to converge to the desired rate [5].
Summary
Using a hierarchical model to analysis the performance of the multilevel control of congestion in ATM networks. It is observed that allowing a small probability of burst level block can significantly decrease the probability of call blocking and increase the link utilization. Thus, to achieve an optimal performance rather than get improvement on a certain point.
Return to the Table of Contents