SlideShare uma empresa Scribd logo
1 de 5
International Journal of Engineering Inventions
ISSN: 2278-7461, ISBN: 2319-6491
Volume 2, Issue 1 (January 2013) PP: 46-50
www.ijeijournal.com P a g e | 46
Fairness in Transfer Control Protocol for Congestion
Control in Multiplicative Increase and Multiplicative
Decrease
Sarika Gupta Agarwal1
, Parul Gupta2
, Mamta Narwaria3
1,3
Department of Computer Science, Greater Noida-201308 India
2
Department of Computer Science, Mumbai Maharashtra, India
Abstract:- High speed Network(Scalable TCP) uses Multiplicative Increase Multiplicative Decrease (MIMD)
algorithm . This paper investigates fairness among sessions sharing a common bottleneck link, where one or
more sessions use the MIMD algorithm. Congestion occur when Traffic reached Beyond the capacity of
window. We first study how two MIMD sessions share the capacity in the presence of generalcombinations of
synchronous and asynchronous losses. We show that, in the presence of rate dependent losses, the capacity is
fairly shared whereas rate independent losses provide high unfairness.
Keyword:- MIMD, Scalable TCP, AIMD,CUBIC,WESTWOOD,Fairness
I. INTRODUCTON
TCP provides the mechanisms that provide data to be transferred across networks that are dynamic and
have a large variety of resources. Until now the AIMD algorithm was found to provide satisfactory
performance.However, in high speed networks , the additive increasing the sender’s rate may lead to inefficient
link utilization[1].To overcome this drawback in high speed networks, the MIMD algorithm has been proposed
as an alternativeto the AIMD algorithm In the future, situations may arise when sessions using these two
algorithms would compete for the same network resource. The share of the capacity obtained by each of these
sessions will depend on the various parameters specific to the algorithms. The sharing of a resource gives rise to
the question of how fairly is this resource shared among the sessions. Fairness issues have been addressed in
several previous works. In [4], the authors considered a class of rate control algorithms in the presence of
synchronous control signals. They showed that the AIMD algorithm converged to fairness whereas the MIMD
algorithm did not converge. In [5], the author studied the MIMD algorithm under a more realistic assumption
of rate dependent losses and argued that MIMD algorithm also converges to fairness. In [6] the convergence to
fairness ofthe different flavors of TCP was studied both analyticallyand using simulations. The monotonic
convergence to fairness for algorithms in rate-based TCP-friendly applications was studied in [7].
II. BASIC CONCEPTS OFTCP CONGESTION CONTROL ALGORITHMS
2.1 AIMD Algorithim
The data transfer of TCP starts from a slow start, in which TCP tries to increase its sending rate
exponentially, until it encounters the first loss. It then switches to another stage, called congestion avoidance, in
which TCP employs the Additive Increase, Multiplicative decrease mechanism to slowly adapt to the available
bandwidth. Further congestion, the TCP goes into the Fast Recovery &Fast Retransmission stages. In this
scenario, when TCP do not receive an acknowledgment for a packet after some timeout period, it assumes that
this packet is lost. & then retransmits that packet and doubles its retransmission timeout value (RTO) detecting
packet loss. This process continues until the packet is successfully transmitted & acknowledged. TCP tries to
clear congestion by cutting its sending rate in half.
2.1.1 Additive Increment
After receiving an ACK for new data, congestion window is increment by (MSS)2
/Cwnd, where MSS
is maximum segment size, this formula is known as additive increment. The goal of additive increment is to
open congestion window by a maximum of one MSS per RTT. Additive increment can be described by using
the equation (1):
Cwnd = Cwnd + a*MSS2/Cwnd Eq (1)
Where the value of a is a constant, a = 1.
2.1.2 Multiplicative Decrement
Fairness in Transfer Control Protocol for Congestion Control in…
www.ijeijournal.com P a g e | 47
Multiplicative decrement occurs after a congestion event, such as a lost packet or a timeout. After a
congestion event occurs, the slow start threshold is set to half current congestion window. This update to slow
start threshold follows equation (2)
ssthresh = (1 – b)*CWND
Eq(2)
CWND is equal to amount of data that has been sent but not yet ACKed and b is a constant, b = 0.5. The
congestion window is adjusted accordingly. After a timeout occurs, congestion window is set to one MSS and
slow start algorithm is reuse.
2.2Multiplicative Increase and Multiplicative Decrease(MIMD)
Scalable TCP uses a different congestion avoidance algorithm than Standard TCP. Scalable TCP uses a
multiplicative increment multiplicative decrement (MIMD) rather than the AIMD of Standard TCP
2.2.1 Multiplicative Increment
The multiplicative increment occurs when standard additive increment would normally occurs. In
equation (8) shows the formula used to adjust congestion window after receiving a new ACK.
Cwnd = Cwnd + a*Cwnd Eq. (3 )
Where a is adjustable, the value of a used was 0.02
2.2.2 Multiplicative Decrement
The multiplicative decrement is same as Standard TCP except that the value of b in equation (2) is
adjustable, the value of b used 0.125. The connection starts in the slow start algorithm until channel is filled.
The connection uses the multiplicative increment portion of congestion avoidance to adjust congestion window.
After a single drop occur around 1.4 seconds, fast retransmit and recovery algorithms are used to cut congestion
window by 0.125, the value of b, and congestion avoidance is used again to reopen congestion window
III. COMPARISON BETWEEN STANDARD TCP AND SCALABLE TCP
Table 1:Comparison between Standard and Scalable TCP
Standard TCP(AIMD) Scalable TCP(MIMD)
no losses Wn+1=Wn+1=
linear increase
dw/dt=1/T
Wn+1=∝*Wn= multiplicative increase
dW/dt=log[∝]/T*W
=exponential growth
≥1 loss Wn+1=0.5*Wn
multiplicative decrease
Wn+1=𝜷*Wn
multiplicative decrease
IV. FAIRNESS IN MIMD SESSIONS (EQUAL RTTS)
We consider two sessions which share a link of capacity C. At time t, the rates obtained by the two
sessions are denoted by x(t) ≡ (x1(t), x2(t)). At each control instant, the controller sends a control signal to each
source. This control signal either informs on no congestion (a 0 signal) or of congestion (a 1signal). In the
absence of congestion, the sources increase theirrate exponentially xk(t + τ) = ατ/τ0 ・xk(t), k= 1, 2,
Table 2: (REACTION TO CONTROL SIGNALS)
control vector x1(tj+) x2(tj+)
(0,0) x1(tj) x2(tj)
(0,1) x1(tj) β ・x(tj)(A Synchronous Congestion)
(1,0) β ・x1(tj) x2(tj) (A Synchronous Congestion)
(1,1) β ・x1(tj) β ・x2(tj)(Synchronous Congestion)
Whereτ0 is the time constant (for example, the RTT) for the sessions, and α >1 is the increase factor
The above Formulation is a continuous time equivalent of a multiplicativealgorithm in which, for every RTT
without congestion signals, the sender multiplies the window by a factor of α. This can be seen by substituting t
= nτ0. We assume that the two sources receive the control signals at the same instant. However, unlike the
model in [4], the two sources can receive different control signals. That is, a congestion signal need not be sent
to both the sources at the same instant. Hence, the congestion signals could be asynchronous. Let β <1 be the
Fairness in Transfer Control Protocol for Congestion Control in…
www.ijeijournal.com P a g e | 48
decrease factor. Let thejthcontrol signal be received at time tj. Then, the four possibilities for the rate vector,
x(tj+), just after tj, are givenin Table 1 The source continues with the increase algorithm on the reception of 0
signal. On the other hand, when a source receives a 1 signal, it instantaneously reduces its rate.
V. INTER PROTOCOL FAIRNESS (SAME RTT)
In this we study the fairness issue when sessions using two different congestion control algorithms
share a common link, and the losses are synchronous. Recently Scalable TCP, which uses the MIMD algorithm,
has been proposed as an enhancement for TCP in high-speed networks. Situations may, therefore, arise in which
a user with Scalable TCP shares a link with a user with standard TCP. Specifically, we study the equilibrium
behaviour of the window size, and the throughput obtained by a session of each algorithm at equilibrium in the
presence of synchronous losses
only. We also look at conditions under which a user of one algorithm can obtain a better throughput than a user
of the other algorithm. Previous work (e.g., [6], [8]) mainly studied the behaviour of sessions using the same
algorithm.
In this section, we assume that each session has the same RTT, τ . As mentioned in Section II, window-based
notation is equivalent to rate-based notation. In the rest of this paper, we use the window-based notation since
we are interested in obtaining the equilibrium window sizes for the sessions
5.1 System Model
Consider l sessions which share a link of capacity C bits/s.Each session transmits data using packets of
size M bits. Let Λ be the bandwidth-delay product (BDP) of the network. We assume that each session has the
same RTT, τ , and that the RTT is mainly determined by the propagation delay and, hence, can be considered to
be a constant. Let x(t) = (x1(t) x2(t) . . . xl(t)) denote the vector of window sizes of the k sessions at time t. A
synchronous loss (i.e., a loss for each session) is assumed to occur at time t if
x𝑖(𝑡) > Λ𝑙
𝑖=1 Eq.4
The above condition is equivalent to saying that a synchronous loss occurs when the total number of
outstanding packets in the network exceeds the total number of packets that the network can handle. Without
loss of generality, let sessions 1, 2, k use the MIMD congestion control algorithm and the rest of the l –ksessions
use the AIMD congestion control algorithm. In the absence of losses, the two algorithms increase the window in
the following way
xi(t+Δ) ={ x(t)αΔ/τ, 1 ≤ i ≤ k Eq.5
xi(t+Δ) ={ x(t) +, αa Δ/ τ, k+ 1 ≤ i ≤ l, Eq.6
Whereαm and αa are the increase parameters of the MIMD and the AIMD algorithm, respectively. For
example, αm =1.01 for Scalable TCP, and αa= 1 for standard TCP. Let tndenote the time instant when the nth
congestion signal is received. We note that a congestion signal is generated when a synchronous loss occurs.
In response to a congestion signal the two algorithms decrease the window in the following way.
xi(t+n) = { βmx(tn), 1 ≤ i ≤ k, Eq.7
xi(t+n) = { βax(tn), k+ 1 ≤ i ≤ l, Eq.8
_
Whereβm and βa are the decrease parameters of the MIMD and the AIMD algorithm, respectively. For example,
βm =0.875 for Scalable TCP, and βa = 0.5 for standard TCP.
VI. SIMULATIONS
We now compare these observations with simulations performed using ns-2 (version 2.26) and
wireshark. Unless stated otherwise, the simulation had the same set of parameters. The MIMD sessions used
Scalable TCP, and the AIMD sessions used TCP New Reno. The packet size, M, for each session was set to
1040 bytes (1000 bytes of data + 40 bytes of header). The propagation delay, σ, was taken to be 100ms. The
increase and decrease parameters for the two algorithms were set to αm = 1.01, αa= 1.0, βm = 0.75, and βa =
0.5. Since the ψifor AIMD increases with decrease in βm, we set βm to a value smaller than its recommended
value so that the AIMD sessions also obtain a certain throughputwe note that the AIMD sessions indeed
converge to the same equilibrium window size whereas the equilibrium window size of an MIMD session
depends on its window just before the first synchronous loss. The ψifor AIMD sessions remains the same even
though the link capacity is increased from 200Mbps to 300Mbps and the total number of sessions is increased
Fairness in Transfer Control Protocol for Congestion Control in…
www.ijeijournal.com P a g e | 49
from six to twelve. Let ηaand ψadenote the throughput and the equilibrium window size, respectively, of any
one of the AIMD sessions.
Fig:1 Window Evolution of Sessions[source: Ref.11]
Fairness in Transfer Control Protocol for Congestion Control in…
www.ijeijournal.com P a g e | 50
Fig:2RTT Graph for TCP CUBIC+Vegas+Reno Fig:3 Throughput Graph for TCP Cubic+Vegas+Reno
VII. CONCLUSIONS
Scalable TCP implements simple changes to the currently used congestion control algorithm. These
changes have both a positive and negative effects on the existing network traffic. Each algorithm provides
higher channel utilization for high speed and long delay environment. However, the alternative algorithms do
not shares chainnnel equally, when mixed with Standard TCP traffic. In a homogenous environment, the overall
channel utilization and sharing between streams increments as compared to a mixed environment. Future work
is needed to study the effects of more than two competing streams. In This Paper , we studied the fairness in
sessions using MIMD congestion control algorithm. For sessions with the same RTT, it was observed that there
was extreme unfairness when the asynchronous losses were rate independent. It was shown that fair sharing
could be achieved by introducing a stream of rate dependent losses. For sessions with different RTTs, it was
observed that the arrival rate of these rate dependent losses had to be greater than a certain minimum rate in
order to achieve fairness. Therefore, in networks with sessions using MIMD algorithms, a stream of rate
dependent losses, using, for example, some
buffer management scheme, would be necessary to ensure fair sharing.
REFERENCES
1) KulvinderSingh”Experimental Study of TCP Congestion Control Algorithms”,IJCEM International
Journal of Computational Engineering & Management, Vol. 14, October 2011 ISSN (Online): 2230-
7893
2) S. Floyd. HighSpeed TCP for Large Congestion Windows. RFC 3649, Experimental, December 2003.
3) T. Kelly. Scalable TCP: Improving Performance in Highspeed Wide Area Networks. Computer Comm.
Review, 33(2):83–91, April 2003.
4) G. Vinnicombe. On the Stability of Networks Operating TCP-like Congestion Control. In Proceedings
of the IFAC World Congress, 2002.
5) D. Chiu and R. Jain. Analysis of the Increase/Decrease Algorithms for Congestion Avoidance in
Computer Networks. Journal of ComputerNetworks and ISDN, 17(1):1–14, 1989.
6) S. Gorinsky. Feedback Modeling in Internet Congestion Control. In Proceedings of the NEW2AN,
February 2004. Also see a techincal report at http://www.arl.wustl.edu/∼gorinsky/ TR2002-39.ps.
7) G. Hasegawa, M. Murata, and H. Miyahara. Fairness and Stability of congestion control mechanisms
of TCP. Telecommunication Systems,November 2000.
8) ]D. Loguinov and H. Radha. End-to-End Rate-Based Congestion Control:Convergence Properties and
Scalability Analysis. IEEE/ACM Transactionson Networking, 11(4), August 2003
9) L. Xu, K. Harfoush, and I. Rhee. Binary Increase Congestion Control(BIC) for Fast Long-Distance
Network. In Proceedings of the IEEEINFOCOM, March 2004.
10) A. Budhiraja, F. Hernndez-Campos, V.G. Kulkarni, and F. D. Smith. Stochastic Differential Equation
for TCP Window Size: Analysis and Experimental Validation. Prob. in the Engg. and Informational
Sciences,18:111–140, 2004.
11) E. Altman K., E. Avrachenkov, B. J. Prabhu. Fairness in MIMD Congestion Control Algorithim 2004.

Mais conteúdo relacionado

Mais procurados

Approaches to online quantile estimation
Approaches to online quantile estimationApproaches to online quantile estimation
Approaches to online quantile estimation
Data Con LA
 
Presentation - Dynamic Tuning of RTS Threshold
Presentation - Dynamic Tuning of RTS ThresholdPresentation - Dynamic Tuning of RTS Threshold
Presentation - Dynamic Tuning of RTS Threshold
Mohammad Saiful Islam
 
A Comparison of Serial and Parallel Substring Matching Algorithms
A Comparison of Serial and Parallel Substring Matching AlgorithmsA Comparison of Serial and Parallel Substring Matching Algorithms
A Comparison of Serial and Parallel Substring Matching Algorithms
zexin wan
 

Mais procurados (19)

Chapter 5 pc
Chapter 5 pcChapter 5 pc
Chapter 5 pc
 
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORMDESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
 
Short term traffic volume prediction in umts networks using the kalman filter...
Short term traffic volume prediction in umts networks using the kalman filter...Short term traffic volume prediction in umts networks using the kalman filter...
Short term traffic volume prediction in umts networks using the kalman filter...
 
Joint Timing and Frequency Synchronization in OFDM
Joint Timing and Frequency Synchronization in OFDMJoint Timing and Frequency Synchronization in OFDM
Joint Timing and Frequency Synchronization in OFDM
 
iscas07
iscas07iscas07
iscas07
 
Chap3 slides
Chap3 slidesChap3 slides
Chap3 slides
 
Chap11 slides
Chap11 slidesChap11 slides
Chap11 slides
 
Collective Communications in MPI
 Collective Communications in MPI Collective Communications in MPI
Collective Communications in MPI
 
Matrix Multiplication Report
Matrix Multiplication ReportMatrix Multiplication Report
Matrix Multiplication Report
 
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
Graphical Visualization of MAC Traces for Wireless Ad-hoc Networks Simulated ...
 
Optimization of Collective Communication in MPICH
Optimization of Collective Communication in MPICH Optimization of Collective Communication in MPICH
Optimization of Collective Communication in MPICH
 
Low complexity design of non binary ldpc decoder using extended min-sum algor...
Low complexity design of non binary ldpc decoder using extended min-sum algor...Low complexity design of non binary ldpc decoder using extended min-sum algor...
Low complexity design of non binary ldpc decoder using extended min-sum algor...
 
PPoPP15
PPoPP15PPoPP15
PPoPP15
 
Approaches to online quantile estimation
Approaches to online quantile estimationApproaches to online quantile estimation
Approaches to online quantile estimation
 
Scheduling Using Multi Objective Genetic Algorithm
Scheduling Using Multi Objective Genetic AlgorithmScheduling Using Multi Objective Genetic Algorithm
Scheduling Using Multi Objective Genetic Algorithm
 
Presentation - Dynamic Tuning of RTS Threshold
Presentation - Dynamic Tuning of RTS ThresholdPresentation - Dynamic Tuning of RTS Threshold
Presentation - Dynamic Tuning of RTS Threshold
 
Basic Communication
Basic CommunicationBasic Communication
Basic Communication
 
A Comparison of Serial and Parallel Substring Matching Algorithms
A Comparison of Serial and Parallel Substring Matching AlgorithmsA Comparison of Serial and Parallel Substring Matching Algorithms
A Comparison of Serial and Parallel Substring Matching Algorithms
 
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMSIMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
 

Destaque

Perfume ads, mood bord
Perfume ads, mood bordPerfume ads, mood bord
Perfume ads, mood bord
emselim
 
Resumen el nombre de la rosa alba
Resumen el nombre de la rosa albaResumen el nombre de la rosa alba
Resumen el nombre de la rosa alba
fernandoi
 

Destaque (20)

Perfume ads, mood bord
Perfume ads, mood bordPerfume ads, mood bord
Perfume ads, mood bord
 
Resumen el nombre de la rosa alba
Resumen el nombre de la rosa albaResumen el nombre de la rosa alba
Resumen el nombre de la rosa alba
 
The Survey of Pattern of Knowledge Management in Education
The Survey of Pattern of Knowledge Management in EducationThe Survey of Pattern of Knowledge Management in Education
The Survey of Pattern of Knowledge Management in Education
 
Different Steganography Methods and Performance Analysis
Different Steganography Methods and Performance AnalysisDifferent Steganography Methods and Performance Analysis
Different Steganography Methods and Performance Analysis
 
Effects of Hall Current on an Unsteady MHD Flow of Heat and Mass Transfer alo...
Effects of Hall Current on an Unsteady MHD Flow of Heat and Mass Transfer alo...Effects of Hall Current on an Unsteady MHD Flow of Heat and Mass Transfer alo...
Effects of Hall Current on an Unsteady MHD Flow of Heat and Mass Transfer alo...
 
Further Generalizations of Enestrom-Kakeya Theorem
Further Generalizations of Enestrom-Kakeya TheoremFurther Generalizations of Enestrom-Kakeya Theorem
Further Generalizations of Enestrom-Kakeya Theorem
 
Design, Modelling & Analytical Analysis of Rotary Fixture for CNC with an App...
Design, Modelling & Analytical Analysis of Rotary Fixture for CNC with an App...Design, Modelling & Analytical Analysis of Rotary Fixture for CNC with an App...
Design, Modelling & Analytical Analysis of Rotary Fixture for CNC with an App...
 
The Commemorate Service Planning with Assistance-Oriented Architecture
The Commemorate Service Planning with Assistance-Oriented ArchitectureThe Commemorate Service Planning with Assistance-Oriented Architecture
The Commemorate Service Planning with Assistance-Oriented Architecture
 
Spatial Patterns of Urban Air Pollution in an Industrial Estate, Lagos, Nigeria
Spatial Patterns of Urban Air Pollution in an Industrial Estate, Lagos, NigeriaSpatial Patterns of Urban Air Pollution in an Industrial Estate, Lagos, Nigeria
Spatial Patterns of Urban Air Pollution in an Industrial Estate, Lagos, Nigeria
 
The Credibility and Plausibility of the Modified Usage of the Activity Based ...
The Credibility and Plausibility of the Modified Usage of the Activity Based ...The Credibility and Plausibility of the Modified Usage of the Activity Based ...
The Credibility and Plausibility of the Modified Usage of the Activity Based ...
 
Performance Study of Wire Cut Electric Discharge Machining Process by Using T...
Performance Study of Wire Cut Electric Discharge Machining Process by Using T...Performance Study of Wire Cut Electric Discharge Machining Process by Using T...
Performance Study of Wire Cut Electric Discharge Machining Process by Using T...
 
κεφ5
κεφ5κεφ5
κεφ5
 
Thompson CV
Thompson CVThompson CV
Thompson CV
 
Mundo libre en peligro
Mundo libre en peligroMundo libre en peligro
Mundo libre en peligro
 
κεφ4
κεφ4κεφ4
κεφ4
 
Pulseiras
PulseirasPulseiras
Pulseiras
 
Adicciones en el trabajo
Adicciones en el trabajoAdicciones en el trabajo
Adicciones en el trabajo
 
Task 10 homework
Task 10 homeworkTask 10 homework
Task 10 homework
 
Masculino
MasculinoMasculino
Masculino
 
Discourse community presentation
Discourse community presentationDiscourse community presentation
Discourse community presentation
 

Semelhante a Fairness in Transfer Control Protocol for Congestion Control in Multiplicative Increase and Multiplicative Decrease

A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
ijcseit
 

Semelhante a Fairness in Transfer Control Protocol for Congestion Control in Multiplicative Increase and Multiplicative Decrease (20)

COMPARISON OF HIGH SPEED CONGESTION CONTROL PROTOCOLS
COMPARISON OF HIGH SPEED CONGESTION CONTROL PROTOCOLSCOMPARISON OF HIGH SPEED CONGESTION CONTROL PROTOCOLS
COMPARISON OF HIGH SPEED CONGESTION CONTROL PROTOCOLS
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless network
 
U01725129138
U01725129138U01725129138
U01725129138
 
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
ANALYSIS AND EXPERIMENTAL EVALUATION OF THE TRANSMISSION CONTROL PROTOCOL CON...
 
M017137072
M017137072M017137072
M017137072
 
Congestion Control: A Dynamic Approach
Congestion Control: A Dynamic ApproachCongestion Control: A Dynamic Approach
Congestion Control: A Dynamic Approach
 
Congestion Control: A Dynamic Approach
Congestion Control: A Dynamic ApproachCongestion Control: A Dynamic Approach
Congestion Control: A Dynamic Approach
 
Performance Evaluation of High Speed Congestion Control Protocols
Performance Evaluation of High Speed Congestion Control  ProtocolsPerformance Evaluation of High Speed Congestion Control  Protocols
Performance Evaluation of High Speed Congestion Control Protocols
 
tcp congestion .pptx
tcp congestion .pptxtcp congestion .pptx
tcp congestion .pptx
 
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
A Packet Drop Guesser Module for Congestion Control Protocols for High speed ...
 
A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...A packet drop guesser module for congestion Control protocols for high speed ...
A packet drop guesser module for congestion Control protocols for high speed ...
 
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
 
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CON...
 
Studying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdfStudying_the_TCP_Flow_and_Congestion_Con.pdf
Studying_the_TCP_Flow_and_Congestion_Con.pdf
 
TCP Congestion Control By Owais Jara
TCP Congestion Control By Owais JaraTCP Congestion Control By Owais Jara
TCP Congestion Control By Owais Jara
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
 
TCP Congestion Control
TCP Congestion ControlTCP Congestion Control
TCP Congestion Control
 
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKSENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
ENHANCEMENT OF TCP FAIRNESS IN IEEE 802.11 NETWORKS
 
LOSS DIFFERENTIATION ALGORITHMS VS. CONGESTION CONTROL SCHEMES: DYNAMICS AND ...
LOSS DIFFERENTIATION ALGORITHMS VS. CONGESTION CONTROL SCHEMES: DYNAMICS AND ...LOSS DIFFERENTIATION ALGORITHMS VS. CONGESTION CONTROL SCHEMES: DYNAMICS AND ...
LOSS DIFFERENTIATION ALGORITHMS VS. CONGESTION CONTROL SCHEMES: DYNAMICS AND ...
 

Mais de International Journal of Engineering Inventions www.ijeijournal.com

Mais de International Journal of Engineering Inventions www.ijeijournal.com (20)

H04124548
H04124548H04124548
H04124548
 
G04123844
G04123844G04123844
G04123844
 
F04123137
F04123137F04123137
F04123137
 
E04122330
E04122330E04122330
E04122330
 
C04121115
C04121115C04121115
C04121115
 
B04120610
B04120610B04120610
B04120610
 
A04120105
A04120105A04120105
A04120105
 
F04113640
F04113640F04113640
F04113640
 
E04112135
E04112135E04112135
E04112135
 
D04111520
D04111520D04111520
D04111520
 
C04111114
C04111114C04111114
C04111114
 
B04110710
B04110710B04110710
B04110710
 
A04110106
A04110106A04110106
A04110106
 
I04105358
I04105358I04105358
I04105358
 
H04104952
H04104952H04104952
H04104952
 
G04103948
G04103948G04103948
G04103948
 
F04103138
F04103138F04103138
F04103138
 
E04102330
E04102330E04102330
E04102330
 
D04101822
D04101822D04101822
D04101822
 
C04101217
C04101217C04101217
C04101217
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Fairness in Transfer Control Protocol for Congestion Control in Multiplicative Increase and Multiplicative Decrease

  • 1. International Journal of Engineering Inventions ISSN: 2278-7461, ISBN: 2319-6491 Volume 2, Issue 1 (January 2013) PP: 46-50 www.ijeijournal.com P a g e | 46 Fairness in Transfer Control Protocol for Congestion Control in Multiplicative Increase and Multiplicative Decrease Sarika Gupta Agarwal1 , Parul Gupta2 , Mamta Narwaria3 1,3 Department of Computer Science, Greater Noida-201308 India 2 Department of Computer Science, Mumbai Maharashtra, India Abstract:- High speed Network(Scalable TCP) uses Multiplicative Increase Multiplicative Decrease (MIMD) algorithm . This paper investigates fairness among sessions sharing a common bottleneck link, where one or more sessions use the MIMD algorithm. Congestion occur when Traffic reached Beyond the capacity of window. We first study how two MIMD sessions share the capacity in the presence of generalcombinations of synchronous and asynchronous losses. We show that, in the presence of rate dependent losses, the capacity is fairly shared whereas rate independent losses provide high unfairness. Keyword:- MIMD, Scalable TCP, AIMD,CUBIC,WESTWOOD,Fairness I. INTRODUCTON TCP provides the mechanisms that provide data to be transferred across networks that are dynamic and have a large variety of resources. Until now the AIMD algorithm was found to provide satisfactory performance.However, in high speed networks , the additive increasing the sender’s rate may lead to inefficient link utilization[1].To overcome this drawback in high speed networks, the MIMD algorithm has been proposed as an alternativeto the AIMD algorithm In the future, situations may arise when sessions using these two algorithms would compete for the same network resource. The share of the capacity obtained by each of these sessions will depend on the various parameters specific to the algorithms. The sharing of a resource gives rise to the question of how fairly is this resource shared among the sessions. Fairness issues have been addressed in several previous works. In [4], the authors considered a class of rate control algorithms in the presence of synchronous control signals. They showed that the AIMD algorithm converged to fairness whereas the MIMD algorithm did not converge. In [5], the author studied the MIMD algorithm under a more realistic assumption of rate dependent losses and argued that MIMD algorithm also converges to fairness. In [6] the convergence to fairness ofthe different flavors of TCP was studied both analyticallyand using simulations. The monotonic convergence to fairness for algorithms in rate-based TCP-friendly applications was studied in [7]. II. BASIC CONCEPTS OFTCP CONGESTION CONTROL ALGORITHMS 2.1 AIMD Algorithim The data transfer of TCP starts from a slow start, in which TCP tries to increase its sending rate exponentially, until it encounters the first loss. It then switches to another stage, called congestion avoidance, in which TCP employs the Additive Increase, Multiplicative decrease mechanism to slowly adapt to the available bandwidth. Further congestion, the TCP goes into the Fast Recovery &Fast Retransmission stages. In this scenario, when TCP do not receive an acknowledgment for a packet after some timeout period, it assumes that this packet is lost. & then retransmits that packet and doubles its retransmission timeout value (RTO) detecting packet loss. This process continues until the packet is successfully transmitted & acknowledged. TCP tries to clear congestion by cutting its sending rate in half. 2.1.1 Additive Increment After receiving an ACK for new data, congestion window is increment by (MSS)2 /Cwnd, where MSS is maximum segment size, this formula is known as additive increment. The goal of additive increment is to open congestion window by a maximum of one MSS per RTT. Additive increment can be described by using the equation (1): Cwnd = Cwnd + a*MSS2/Cwnd Eq (1) Where the value of a is a constant, a = 1. 2.1.2 Multiplicative Decrement
  • 2. Fairness in Transfer Control Protocol for Congestion Control in… www.ijeijournal.com P a g e | 47 Multiplicative decrement occurs after a congestion event, such as a lost packet or a timeout. After a congestion event occurs, the slow start threshold is set to half current congestion window. This update to slow start threshold follows equation (2) ssthresh = (1 – b)*CWND Eq(2) CWND is equal to amount of data that has been sent but not yet ACKed and b is a constant, b = 0.5. The congestion window is adjusted accordingly. After a timeout occurs, congestion window is set to one MSS and slow start algorithm is reuse. 2.2Multiplicative Increase and Multiplicative Decrease(MIMD) Scalable TCP uses a different congestion avoidance algorithm than Standard TCP. Scalable TCP uses a multiplicative increment multiplicative decrement (MIMD) rather than the AIMD of Standard TCP 2.2.1 Multiplicative Increment The multiplicative increment occurs when standard additive increment would normally occurs. In equation (8) shows the formula used to adjust congestion window after receiving a new ACK. Cwnd = Cwnd + a*Cwnd Eq. (3 ) Where a is adjustable, the value of a used was 0.02 2.2.2 Multiplicative Decrement The multiplicative decrement is same as Standard TCP except that the value of b in equation (2) is adjustable, the value of b used 0.125. The connection starts in the slow start algorithm until channel is filled. The connection uses the multiplicative increment portion of congestion avoidance to adjust congestion window. After a single drop occur around 1.4 seconds, fast retransmit and recovery algorithms are used to cut congestion window by 0.125, the value of b, and congestion avoidance is used again to reopen congestion window III. COMPARISON BETWEEN STANDARD TCP AND SCALABLE TCP Table 1:Comparison between Standard and Scalable TCP Standard TCP(AIMD) Scalable TCP(MIMD) no losses Wn+1=Wn+1= linear increase dw/dt=1/T Wn+1=∝*Wn= multiplicative increase dW/dt=log[∝]/T*W =exponential growth ≥1 loss Wn+1=0.5*Wn multiplicative decrease Wn+1=𝜷*Wn multiplicative decrease IV. FAIRNESS IN MIMD SESSIONS (EQUAL RTTS) We consider two sessions which share a link of capacity C. At time t, the rates obtained by the two sessions are denoted by x(t) ≡ (x1(t), x2(t)). At each control instant, the controller sends a control signal to each source. This control signal either informs on no congestion (a 0 signal) or of congestion (a 1signal). In the absence of congestion, the sources increase theirrate exponentially xk(t + τ) = ατ/τ0 ・xk(t), k= 1, 2, Table 2: (REACTION TO CONTROL SIGNALS) control vector x1(tj+) x2(tj+) (0,0) x1(tj) x2(tj) (0,1) x1(tj) β ・x(tj)(A Synchronous Congestion) (1,0) β ・x1(tj) x2(tj) (A Synchronous Congestion) (1,1) β ・x1(tj) β ・x2(tj)(Synchronous Congestion) Whereτ0 is the time constant (for example, the RTT) for the sessions, and α >1 is the increase factor The above Formulation is a continuous time equivalent of a multiplicativealgorithm in which, for every RTT without congestion signals, the sender multiplies the window by a factor of α. This can be seen by substituting t = nτ0. We assume that the two sources receive the control signals at the same instant. However, unlike the model in [4], the two sources can receive different control signals. That is, a congestion signal need not be sent to both the sources at the same instant. Hence, the congestion signals could be asynchronous. Let β <1 be the
  • 3. Fairness in Transfer Control Protocol for Congestion Control in… www.ijeijournal.com P a g e | 48 decrease factor. Let thejthcontrol signal be received at time tj. Then, the four possibilities for the rate vector, x(tj+), just after tj, are givenin Table 1 The source continues with the increase algorithm on the reception of 0 signal. On the other hand, when a source receives a 1 signal, it instantaneously reduces its rate. V. INTER PROTOCOL FAIRNESS (SAME RTT) In this we study the fairness issue when sessions using two different congestion control algorithms share a common link, and the losses are synchronous. Recently Scalable TCP, which uses the MIMD algorithm, has been proposed as an enhancement for TCP in high-speed networks. Situations may, therefore, arise in which a user with Scalable TCP shares a link with a user with standard TCP. Specifically, we study the equilibrium behaviour of the window size, and the throughput obtained by a session of each algorithm at equilibrium in the presence of synchronous losses only. We also look at conditions under which a user of one algorithm can obtain a better throughput than a user of the other algorithm. Previous work (e.g., [6], [8]) mainly studied the behaviour of sessions using the same algorithm. In this section, we assume that each session has the same RTT, τ . As mentioned in Section II, window-based notation is equivalent to rate-based notation. In the rest of this paper, we use the window-based notation since we are interested in obtaining the equilibrium window sizes for the sessions 5.1 System Model Consider l sessions which share a link of capacity C bits/s.Each session transmits data using packets of size M bits. Let Λ be the bandwidth-delay product (BDP) of the network. We assume that each session has the same RTT, τ , and that the RTT is mainly determined by the propagation delay and, hence, can be considered to be a constant. Let x(t) = (x1(t) x2(t) . . . xl(t)) denote the vector of window sizes of the k sessions at time t. A synchronous loss (i.e., a loss for each session) is assumed to occur at time t if x𝑖(𝑡) > Λ𝑙 𝑖=1 Eq.4 The above condition is equivalent to saying that a synchronous loss occurs when the total number of outstanding packets in the network exceeds the total number of packets that the network can handle. Without loss of generality, let sessions 1, 2, k use the MIMD congestion control algorithm and the rest of the l –ksessions use the AIMD congestion control algorithm. In the absence of losses, the two algorithms increase the window in the following way xi(t+Δ) ={ x(t)αΔ/τ, 1 ≤ i ≤ k Eq.5 xi(t+Δ) ={ x(t) +, αa Δ/ τ, k+ 1 ≤ i ≤ l, Eq.6 Whereαm and αa are the increase parameters of the MIMD and the AIMD algorithm, respectively. For example, αm =1.01 for Scalable TCP, and αa= 1 for standard TCP. Let tndenote the time instant when the nth congestion signal is received. We note that a congestion signal is generated when a synchronous loss occurs. In response to a congestion signal the two algorithms decrease the window in the following way. xi(t+n) = { βmx(tn), 1 ≤ i ≤ k, Eq.7 xi(t+n) = { βax(tn), k+ 1 ≤ i ≤ l, Eq.8 _ Whereβm and βa are the decrease parameters of the MIMD and the AIMD algorithm, respectively. For example, βm =0.875 for Scalable TCP, and βa = 0.5 for standard TCP. VI. SIMULATIONS We now compare these observations with simulations performed using ns-2 (version 2.26) and wireshark. Unless stated otherwise, the simulation had the same set of parameters. The MIMD sessions used Scalable TCP, and the AIMD sessions used TCP New Reno. The packet size, M, for each session was set to 1040 bytes (1000 bytes of data + 40 bytes of header). The propagation delay, σ, was taken to be 100ms. The increase and decrease parameters for the two algorithms were set to αm = 1.01, αa= 1.0, βm = 0.75, and βa = 0.5. Since the ψifor AIMD increases with decrease in βm, we set βm to a value smaller than its recommended value so that the AIMD sessions also obtain a certain throughputwe note that the AIMD sessions indeed converge to the same equilibrium window size whereas the equilibrium window size of an MIMD session depends on its window just before the first synchronous loss. The ψifor AIMD sessions remains the same even though the link capacity is increased from 200Mbps to 300Mbps and the total number of sessions is increased
  • 4. Fairness in Transfer Control Protocol for Congestion Control in… www.ijeijournal.com P a g e | 49 from six to twelve. Let ηaand ψadenote the throughput and the equilibrium window size, respectively, of any one of the AIMD sessions. Fig:1 Window Evolution of Sessions[source: Ref.11]
  • 5. Fairness in Transfer Control Protocol for Congestion Control in… www.ijeijournal.com P a g e | 50 Fig:2RTT Graph for TCP CUBIC+Vegas+Reno Fig:3 Throughput Graph for TCP Cubic+Vegas+Reno VII. CONCLUSIONS Scalable TCP implements simple changes to the currently used congestion control algorithm. These changes have both a positive and negative effects on the existing network traffic. Each algorithm provides higher channel utilization for high speed and long delay environment. However, the alternative algorithms do not shares chainnnel equally, when mixed with Standard TCP traffic. In a homogenous environment, the overall channel utilization and sharing between streams increments as compared to a mixed environment. Future work is needed to study the effects of more than two competing streams. In This Paper , we studied the fairness in sessions using MIMD congestion control algorithm. For sessions with the same RTT, it was observed that there was extreme unfairness when the asynchronous losses were rate independent. It was shown that fair sharing could be achieved by introducing a stream of rate dependent losses. For sessions with different RTTs, it was observed that the arrival rate of these rate dependent losses had to be greater than a certain minimum rate in order to achieve fairness. Therefore, in networks with sessions using MIMD algorithms, a stream of rate dependent losses, using, for example, some buffer management scheme, would be necessary to ensure fair sharing. REFERENCES 1) KulvinderSingh”Experimental Study of TCP Congestion Control Algorithms”,IJCEM International Journal of Computational Engineering & Management, Vol. 14, October 2011 ISSN (Online): 2230- 7893 2) S. Floyd. HighSpeed TCP for Large Congestion Windows. RFC 3649, Experimental, December 2003. 3) T. Kelly. Scalable TCP: Improving Performance in Highspeed Wide Area Networks. Computer Comm. Review, 33(2):83–91, April 2003. 4) G. Vinnicombe. On the Stability of Networks Operating TCP-like Congestion Control. In Proceedings of the IFAC World Congress, 2002. 5) D. Chiu and R. Jain. Analysis of the Increase/Decrease Algorithms for Congestion Avoidance in Computer Networks. Journal of ComputerNetworks and ISDN, 17(1):1–14, 1989. 6) S. Gorinsky. Feedback Modeling in Internet Congestion Control. In Proceedings of the NEW2AN, February 2004. Also see a techincal report at http://www.arl.wustl.edu/∼gorinsky/ TR2002-39.ps. 7) G. Hasegawa, M. Murata, and H. Miyahara. Fairness and Stability of congestion control mechanisms of TCP. Telecommunication Systems,November 2000. 8) ]D. Loguinov and H. Radha. End-to-End Rate-Based Congestion Control:Convergence Properties and Scalability Analysis. IEEE/ACM Transactionson Networking, 11(4), August 2003 9) L. Xu, K. Harfoush, and I. Rhee. Binary Increase Congestion Control(BIC) for Fast Long-Distance Network. In Proceedings of the IEEEINFOCOM, March 2004. 10) A. Budhiraja, F. Hernndez-Campos, V.G. Kulkarni, and F. D. Smith. Stochastic Differential Equation for TCP Window Size: Analysis and Experimental Validation. Prob. in the Engg. and Informational Sciences,18:111–140, 2004. 11) E. Altman K., E. Avrachenkov, B. J. Prabhu. Fairness in MIMD Congestion Control Algorithim 2004.