[PDF] Notes on burst mitigation for transport protocols | Semantic Scholar (2024)

Figures from this paper

  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5

Topics

Transport Protocol (opens in a new tab)TCP Connection (opens in a new tab)

40 Citations

On the Impact of Bursting on TCP Performance
    Ethan BlantonM. Allman

    Computer Science, Engineering

    PAM

  • 2005

After analyzing traffic from three networks, it is found that bursts are fairly rare and only large bursts cause loss in practice.

  • 33
  • PDF
Observing and Mitigating Micro-Burst Traffic in Data Center Networks
    Danfeng ShanFengyuan RenPeng ChengRan ShuChuanxiong Guo

    Computer Science, Engineering

    IEEE/ACM Transactions on Networking

  • 2020

Inspired by the findings and insights from experimental observations, a Micro-burst-Aware Transport Control Protocol (MATCP), which leverages characteristic behaviors of micro-burst traffic derived from the time derivative of the queue occupancy, is proposed.

  • 16
Enhancing TCP to support rate-limited traffic
    A. SathiaseelanR. SecchiG. Fairhurst

    Computer Science, Engineering

    CSWS@CoNEXT

  • 2012

Simulation results show that the proposed new-CWV method provides faster convergence to the rate requested by a rate-limited application, demonstrated by a higher throughput, and better utilisation of unused capacity compared to Standard TCP or TCP with Congestion Window Validation.

  • 6
  • PDF
Micro-Burst in Data Centers: Observations, Analysis, and Mitigations
    Danfeng ShanFengyuan RenPeng ChengRan ShuChuanxiong Guo

    Computer Science, Engineering

    2018 IEEE 26th International Conference on…

  • 2018

Inspired by the findings and insights from experimental observations, S-ECN policy is proposed, which is an ECN marking policy leveraging the slope of queue length evolution, which can suppress the sharp queue length increment by over 2×, and reduce the average query completion time by ~12-27%.

Evaluation of Mitigation to Bursty Packets by a TCP Proxy in a Wired and Wireless Network
    T. Shikama

    Computer Science, Engineering

  • 2012

To mitigate bursts of packets by the TCP proxy, this paper proposes a scheme that the proxy performs a pacing function, which places a gap between two consecutive pack- ets, which has an advantage that it requires a small amount of forwarding buffers for the pacing.

  • PDF
Micro-burst in Data Centers: Observations, Implications, and Applications
    Danfeng ShanFengyuan RenPeng ChengRan Shu

    Computer Science, Engineering

    ArXiv

  • 2016

Inspired by the findings and insights from experimental observations, S-ECN policy is proposed, which is an ECN marking policy leveraging the slope of queue length increasing, which can suppress the sharp queue length increment by over 50%, and reduce the 99th percentile of query completion time by ~20%.

TCP-Aix Making TCP Robust to Reordering and Delay Variations
    Hannes EkströmS. LandströmR. LudwigLars-Åke Larzon

    Computer Science, Engineering

  • 2006

TC-Aix, a sender-side TCP algorithm designed to make TCP performance robust to packet reordering and delay, is described and evaluated.

  • 6
  • PDF
Bullet trains: a study of NIC burst behavior at microsecond timescales
    Rishi KapoorA. SnoerenG. VoelkerG. Porter

    Computer Science, Engineering

    CoNEXT

  • 2013

The burst behavior of traffic emanating from a 10-Gbps end host across a variety of data center applications is studied, finding that at 10--100 microsecond timescales, the traffic exhibits large bursts (i.e., 10s of packets in length).

  • 65
  • PDF
Revisiting wireless link layers and in-order delivery
    S. LandströmLars-Åke Larzon

    Computer Science, Engineering

  • 2008

Wireless link layers, which perform retransmissions to hide transmission errors from upper layers, enforce inorder delivery to avoid triggering TCP's congestion control mechanisms. However, new reo

  • 3
  • PDF
Understanding the impact of host networking elements on traffic bursts
    Erfan SharafzadehSepehr AbdousS. Ghorbani

    Computer Science, Engineering

    NSDI

  • 2023

This work develops Valinor, a traffic measurement framework that consists of eBPF hooks and measurement modules in a programmable network that offers visibility into traffic burstiness over a wide span of timescales at multiple vantage points, and demonstrates that burstiness varies significantly across host stacks.

  • 2
  • PDF

...

...

23 References

On the Impact of Bursting on TCP Performance
    Ethan BlantonM. Allman

    Computer Science, Engineering

    PAM

  • 2005

After analyzing traffic from three networks, it is found that bursts are fairly rare and only large bursts cause loss in practice.

  • 33
  • PDF
Understanding the performance of TCP pacing
    Amit AggarwalS. SavageT. Anderson

    Computer Science

    Proceedings IEEE INFOCOM 2000. Conference on…

  • 2000

It is shown that contrary to intuition, pacing often has significantly worse throughput than regular TCP because it is susceptible to synchronized losses and it delays congestion signals.

  • 369
  • PDF
Datagram Congestion Control Protocol (DCCP)
    Eddie KohlerMark HandleySally Floyd

    Computer Science, Engineering

    RFC

  • 2006

The Datagram Congestion Control Protocol is a transport protocol that provides bidirectional unicast connections of congestion-controlled unreliable datagrams that is suitable for applications that transfer fairly large amounts of data.

  • 721
Increasing TCP's Initial Window
    M. AllmanS. FloydC. Partridge

    Computer Science, Engineering

    RFC

  • 1998

This document specifies an optional standard for TCP to increase the permitted initial window from one or two segment(s) to roughly 4K bytes, replacing RFC 2414, and provides guidance on implementation issues.

  • 550
  • PDF
A Swifter Start For TCP
    C. PartridgeD. RockwellM. AllmanR. KrishnanJ. Sterbenz

    Computer Science

  • 2002

A new way for TCP to estimate available network capacity and swiftly scale its transmission rate at the start of a TCP connection is presented, which does estimate capacity, as predicted by prior simulation.

  • 39
TCP Congestion Control with Appropriate Byte Counting (ABC)
    M. Allman

    Computer Science

    RFC

  • 2003

This document proposes a small modification to the way TCP increases its congestion window, basing the increase on the number of previously unacknowledged bytes each ACK covers, which improves the performance of TCP, as well as closing a security hole TCP receivers can use to induce the sender into increasing the sending rate too rapidly.

  • 138
  • Highly Influential
  • PDF
Observations on the dynamics of a congestion control algorithm: the effects of two-way traffic
    Lixia ZhangS. ShenkerD. Clark

    Computer Science

    SIGCOMM '91

  • 1991

This paper uses simulation to study the dynamics of the congestion cent rol algorithm embedded in the BSD 4.3-Tahoe TCP implementation and finds that the one-way traffic clustering and loss-synchronization phenomena persist in this new situation, albeit in a slightly modified form.

  • 507
  • PDF
Stream Control Transmission Protocol
    R. Stewart

    Computer Science, Engineering

    RFC

  • 2007

This document describes the Stream Control Transmission Protocol (SCTP). SCTP is designed to transport PSTN signaling messages over IP networks, but is capable of broader applications.

  • 2,158
  • PDF
Source-level IP packet bursts: causes and effects
    Hao JiangC. Dovrolis

    Computer Science, Engineering

    IMC '03

  • 2003

This work identifies several causes of source-level bursts, including TCP's slow start, idle restart, window advancement after loss recovery, and segmentation of application messages into multiple UDP packets, and shows that the presence of packet bursts in individual flows can have a major impact on aggregate traffic.

  • 71
  • PDF
Improving Restart of Idle TCP Connections
    Usc TrVikram VisweswaraiahJ. Heidemann

    Computer Science, Engineering

  • 1999

This paper proposes a third alternative: pacing some packets at a certain rate until the ACK clock can be restarted, and describes the motivation and implementation and simulation results which show that it achieves the elapsed-time performance comparable to NSSR and loss behavior of SSR.

  • 84
  • PDF

...

...

Related Papers

Showing 1 through 3 of 0 Related Papers

    [PDF] Notes on burst mitigation for transport protocols | Semantic Scholar (2024)
    Top Articles
    Latest Posts
    Article information

    Author: Prof. An Powlowski

    Last Updated:

    Views: 5553

    Rating: 4.3 / 5 (44 voted)

    Reviews: 83% of readers found this page helpful

    Author information

    Name: Prof. An Powlowski

    Birthday: 1992-09-29

    Address: Apt. 994 8891 Orval Hill, Brittnyburgh, AZ 41023-0398

    Phone: +26417467956738

    Job: District Marketing Strategist

    Hobby: Embroidery, Bodybuilding, Motor sports, Amateur radio, Wood carving, Whittling, Air sports

    Introduction: My name is Prof. An Powlowski, I am a charming, helpful, attractive, good, graceful, thoughtful, vast person who loves writing and wants to share my knowledge and understanding with you.