DMCA
Transport Layer Adaptable Rate Control (TARC): Analysis of a Transport Layer Flow Control Mechanism for High Speed Networks (1998)
Citations
2723 | Congestion avoidance and control
- Jacobson
- 1988
(Show Context)
Citation Context ...terature Survey and Related Work The earliest of recent transport layer flow control research has concentrated on modifications of the byte-oriented 16-bit window-based algorithms used in TP4 and TCP =-=[26]-=-[27][29][38]. (A 16-bit window only allows for 64KB of outstanding data). XTP [12] uses a byte-oriented 32-bit window in conjunction 0-7803-4386-7/98/$10.00 (c) 1998 IEEE with a rate/burst-specified o... |
1053 |
Transmission Control Protocol”,
- Postel
- 1981
(Show Context)
Citation Context ...vey and Related Work The earliest of recent transport layer flow control research has concentrated on modifications of the byte-oriented 16-bit window-based algorithms used in TP4 and TCP [26][27][29]=-=[38]-=-. (A 16-bit window only allows for 64KB of outstanding data). XTP [12] uses a byte-oriented 32-bit window in conjunction 0-7803-4386-7/98/$10.00 (c) 1998 IEEE with a rate/burst-specified open-loop rat... |
827 | Architectural considerations for a new generation of protocols”, - Clark, Tennenhouse - 1990 |
522 | TCP Vegas: End to End Congestion Avoidance on a Global Internet,
- Brakmo, Peterson
- 1995
(Show Context)
Citation Context ...s primarily due to inefficient use of bandwidth, and that loss performance can be grossly inadequate without substantial buffering requirements, which in turn results in poor packet delay performance =-=[7]-=-[40][42]. Clearly, new mechanisms for efficient transport layer flow control are needed. 1.1 Literature Survey and Related Work The earliest of recent transport layer flow control research has concent... |
351 | A binary feedback scheme for congestion avoidance in computer networks
- Ramakrishnan, Jain
- 1990
(Show Context)
Citation Context ...d rate behavior, meaning that congested nodes cycle through periods of over- and under-utilization.sFlow control windows have also been extensively studied at the network layer. Ramakrishnan and Jain =-=[39] depend on-=- "congestion indication bits" to throttle/revive a flow control window. Jain [29] performs a similar study using round-trip packet delays as congestion indicators. Mitra and Seery [34] and H... |
124 | Flow control: a comparative survey - Gerla, Kleinrock - 1980 |
118 | VMTP: Versatile Message Transaction Protocol
- Cheriton
- 1988
(Show Context)
Citation Context ...ontrol research at the transport layer has focused on rate-based control. Danthine [15] shows that ratebased flow control responds better to QoS requirements than window-based flow control does. VMTP =-=[11]-=- (streamlined for request-response transactions) and HeiTP [16] (designed to work with the ST-II multimedia network protocol) use an interpacket gap specification. Jacquet and Muhlethaler [28] suggest... |
101 | The tenet real-time protocol suite: De- sign, implementation and experiences
- Banerjea, Ferrari, et al.
- 1996
(Show Context)
Citation Context ...d to work with the ST-II multimedia network protocol) use an interpacket gap specification. Jacquet and Muhlethaler [28] suggest a multilayer flow control scheme based on bandwidth reservation. Tenet =-=[3]-=- contains a lightweight transport layer protocol, which defers all flow control to the network layer, trusting that end-user resources will be protected by the admission control procedure. A great dea... |
82 | A survey of Light-Weight Transport Protocols for High-Speed Networks”, - Doeringer, Dykeman, et al. - 1990 |
74 | TCP Extensions for Long Delay Paths,
- Jacobsen, Braden
- 1988
(Show Context)
Citation Context ... deployed transport layer protocols were designed for networks with small bandwidth-delay products. We are now faced with "Long Fat Networks" (LFNs)--networks with very large bandwidth-delay=-= products [27]-=-. Under these new conditions, the old transport protocols will no longer perform with the same utilization efficiency. Multi-gigabit data rates are already available at the link and network levels, bu... |
59 | A timeout-based congestion control scheme for window flowcontrolled networks
- Jain
- 1986
(Show Context)
Citation Context ... Survey and Related Work The earliest of recent transport layer flow control research has concentrated on modifications of the byte-oriented 16-bit window-based algorithms used in TP4 and TCP [26][27]=-=[29]-=-[38]. (A 16-bit window only allows for 64KB of outstanding data). XTP [12] uses a byte-oriented 32-bit window in conjunction 0-7803-4386-7/98/$10.00 (c) 1998 IEEE with a rate/burst-specified open-loop... |
46 |
Dynamical behavior of rate-based flow control mechanisms,”
- Bolot, Shankar
- 1990
(Show Context)
Citation Context ...and Lin [41] analyze a credit manager algorithm with feedback at the usernetwork access point, using a zero-delay assumption Another popular network layer flow control algorithm is the "choke pac=-=ket" [5]-=-[36] in which a single bit is used to return congestion information to the sender, indicating whether the queue-size at a bottleneck node is above or below a given threshold. Congestion causes a propo... |
43 | Adaptive algorithms for feedback-based flow control in high-speed wide-area ATM networks
- Bonomi, Mitra, et al.
- 1995
(Show Context)
Citation Context ...research explores the effects of variable thresholds, proper selection of gain and damping parameters, the effect of multiple connections on a single link, and long propagation delays [24][25][36][23]=-=[6]-=-. Yin and Hluchyj [44] analyze a 2-rate server whose serving rate depends on bottleneck node queue-size. Threshold-based algorithms naturally result in periodic queue-size and rate behavior, meaning t... |
35 |
Congestion control for high speed packet switched networks,” in
- Bala, Cidon, et al.
- 1990
(Show Context)
Citation Context ...te control. A well-known open-loop rate control algorithm is the "leaky bucket," in which network access is controlled by a quota of tokens which accumulate at a fixed rate, up to the bucket=-= capacity [2]-=-[32]. Konstantopoulos et. al. [30] prove that the classic leaky bucket controller provides optimal cell loss performance under finite buffer constraints. An enhancement to the leaky bucket is a markin... |
32 |
Performance Analysis of a Rate Control Throttle Where Tokens and Jobs Queue
- Berger
- 1990
(Show Context)
Citation Context ...king algorithm, which allows traffic with insufficient credit to still enter the network with a violation tag, at the risk of being dropped first if it later encounters congestion [2][10][41]. Berger =-=[4]-=- examines an implementation in which traffic arriving at a queue with no tokens is dropped. Rubin and Lin [41] analyze a credit manager algorithm with feedback at the usernetwork access point, using a... |
32 | Backward explicit congestion notification for ATM local area networks,” in
- Newman
- 1993
(Show Context)
Citation Context ... Lin [41] analyze a credit manager algorithm with feedback at the usernetwork access point, using a zero-delay assumption Another popular network layer flow control algorithm is the "choke packet=-=" [5][36]-=- in which a single bit is used to return congestion information to the sender, indicating whether the queue-size at a bottleneck node is above or below a given threshold. Congestion causes a proportio... |
31 |
An optimal flow control scheme that regulates the burstiness of traffic subject to delay constraints,
- Konstantopoulos, Anantharam
- 1995
(Show Context)
Citation Context ...p rate control algorithm is the "leaky bucket," in which network access is controlled by a quota of tokens which accumulate at a fixed rate, up to the bucket capacity [2][32]. Konstantopoulo=-=s et. al. [30]-=- prove that the classic leaky bucket controller provides optimal cell loss performance under finite buffer constraints. An enhancement to the leaky bucket is a marking algorithm, which allows traffic ... |
31 |
A dynamic rate control mechanism for source coded traffic in a fast packet network
- Yin, Hluchyj
- 1991
(Show Context)
Citation Context ... effects of variable thresholds, proper selection of gain and damping parameters, the effect of multiple connections on a single link, and long propagation delays [24][25][36][23][6]. Yin and Hluchyj =-=[44]-=- analyze a 2-rate server whose serving rate depends on bottleneck node queue-size. Threshold-based algorithms naturally result in periodic queue-size and rate behavior, meaning that congested nodes cy... |
22 |
Design and Implementation of a High Speed Transport Protocol
- Netravali, Roome, et al.
- 1990
(Show Context)
Citation Context ...ontrol scheme for coupled error recovery and flow control. NETBLT [13] employs a block-oriented window with a rate/burst-specified open-loop rate control scheme for efficient bulk data transfers. SNR =-=[35]-=- uses a packet/block-oriented window flow control with periodic state information exchanges, rather than standard asynchronous acknowledgements. See Table 1 for a comparison of some of the transport l... |
21 | Loss-Load Curves: Support for Rate-based Congestion Control - Cheriton, Williamson - 1991 |
18 |
A New Transport Protocol for the Broadband Environment
- DANTHINE
- 1992
(Show Context)
Citation Context ...ee Table 1 for a comparison of some of the transport layer flow control algorithms discussed here. More recent flow control research at the transport layer has focused on rate-based control. Danthine =-=[15]-=- shows that ratebased flow control responds better to QoS requirements than window-based flow control does. VMTP [11] (streamlined for request-response transactions) and HeiTP [16] (designed to work w... |
14 | Performance analysis of MSP: A feature-rich high-speed transport protocol - Porta, Schwartz - 1993 |
14 | On hop-by-hop rate-based congestion control - Mishra, Kanakia, et al. - 1996 |
13 |
I.: A new feedback congestion control policy for long propagation delays
- Iliadis
- 1996
(Show Context)
Citation Context ...nal research explores the effects of variable thresholds, proper selection of gain and damping parameters, the effect of multiple connections on a single link, and long propagation delays [24][25][36]=-=[23]-=-[6]. Yin and Hluchyj [44] analyze a 2-rate server whose serving rate depends on bottleneck node queue-size. Threshold-based algorithms naturally result in periodic queue-size and rate behavior, meanin... |
12 | Congestion control by adaptive admission - Haas, Winters - 1991 |
11 | Feedback-based flow control of BISDN/ATM networks - Pazhyannur, Agrawal - 1995 |
9 |
Dynamic Window Flow Control on a High-Speed Wide-Area Network
- Hahne, Kalmanek, et al.
- 1992
(Show Context)
Citation Context ...ongestion indication bits" to throttle/revive a flow control window. Jain [29] performs a similar study using round-trip packet delays as congestion indicators. Mitra and Seery [34] and Hahne et.=-= al. [20]-=- also explore methods of dynamically controlling flow control window sizes. Much research has been done at the data link/network layer. However, the results of these network layer studies are not alwa... |
7 |
ATM Cell Delay and Loss for Best-Effort TCP in the Presence of Isochronous Traffic
- Bagwell, Daigle
- 1994
(Show Context)
Citation Context ...rily due to inefficient use of bandwidth, and that loss performance can be grossly inadequate without substantial buffering requirements, which in turn results in poor packet delay performance [7][40]=-=[42]-=-. Clearly, new mechanisms for efficient transport layer flow control are needed. 1.1 Literature Survey and Related Work The earliest of recent transport layer flow control research has concentrated on... |
6 |
dynamic adaptive windows for high-speed data networks: theory and simulations
- Mitra, Seery
- 1990
(Show Context)
Citation Context ... Jain [39] depend on "congestion indication bits" to throttle/revive a flow control window. Jain [29] performs a similar study using round-trip packet delays as congestion indicators. Mitra =-=and Seery [34]-=- and Hahne et. al. [20] also explore methods of dynamically controlling flow control window sizes. Much research has been done at the data link/network layer. However, the results of these network lay... |
4 |
HeiTP - A Transport Protocol for ST-II
- Delgrossi, Halstrick, et al.
- 1992
(Show Context)
Citation Context ...d control. Danthine [15] shows that ratebased flow control responds better to QoS requirements than window-based flow control does. VMTP [11] (streamlined for request-response transactions) and HeiTP =-=[16]-=- (designed to work with the ST-II multimedia network protocol) use an interpacket gap specification. Jacquet and Muhlethaler [28] suggest a multilayer flow control scheme based on bandwidth reservatio... |
4 | Survey of techniques for prevention and control of congestion in an ATM network," ICC - Hong, Suda - 1990 |
3 |
A credit manager for traffic regulation in high-speed networks: a queueing analysis
- Leung, Sengupta, et al.
- 1993
(Show Context)
Citation Context ...control. A well-known open-loop rate control algorithm is the "leaky bucket," in which network access is controlled by a quota of tokens which accumulate at a fixed rate, up to the bucket ca=-=pacity [2][32]-=-. Konstantopoulos et. al. [30] prove that the classic leaky bucket controller provides optimal cell loss performance under finite buffer constraints. An enhancement to the leaky bucket is a marking al... |
2 | MHTP--A Multimedia HighSpeed Transport Protocol - Huang, Lee - 1992 |
1 |
Derivations and Methods for the Analysis of a Credit-Based Transport Layer Flow Control Algorithm
- Brockett, Rubin
- 1996
(Show Context)
Citation Context ...timates, an algorithm for optimal selection of h f and α in order to minimize the maximum packet delay, and a discussion on the effects of random network delays. These results may be found in [8] and=-= [9]-=-. 4) System loading. If there is insufficient traffic loading to make use of reallocated bandwidth, there is no need to worry about secondary rate limits and re-sharing underutilized bandwidth. For ca... |
1 |
Analysis and Design of a Highly Reliable Transport Architecture for ISDN Frame-Relay Networks
- Chen, Ho, et al.
- 1989
(Show Context)
Citation Context ...y bucket is a marking algorithm, which allows traffic with insufficient credit to still enter the network with a violation tag, at the risk of being dropped first if it later encounters congestion [2]=-=[10]-=-[41]. Berger [4] examines an implementation in which traffic arriving at a queue with no tokens is dropped. Rubin and Lin [41] analyze a credit manager algorithm with feedback at the usernetwork acces... |
1 |
NETBLT: A Bulk Data Tranfer Protocol
- Clark, Lambert, et al.
- 1987
(Show Context)
Citation Context ...] uses a byte-oriented 32-bit window in conjunction 0-7803-4386-7/98/$10.00 (c) 1998 IEEE with a rate/burst-specified open-loop rate control scheme for coupled error recovery and flow control. NETBLT =-=[13]-=- employs a block-oriented window with a rate/burst-specified open-loop rate control scheme for efficient bulk data transfers. SNR [35] uses a packet/block-oriented window flow control with periodic st... |
1 |
RateBased Congestion Control in High Speed Packet-Switching Networks
- Inai, Kamichika, et al.
- 1992
(Show Context)
Citation Context ...fic. Additional research explores the effects of variable thresholds, proper selection of gain and damping parameters, the effect of multiple connections on a single link, and long propagation delays =-=[24]-=-[25][36][23][6]. Yin and Hluchyj [44] analyze a 2-rate server whose serving rate depends on bottleneck node queue-size. Threshold-based algorithms naturally result in periodic queue-size and rate beha... |
1 |
Transient Analysis of Packet Transmission Rate Control to Release Congestion in High Speed Networks
- Inai, Kata, et al.
- 1992
(Show Context)
Citation Context ... Additional research explores the effects of variable thresholds, proper selection of gain and damping parameters, the effect of multiple connections on a single link, and long propagation delays [24]=-=[25]-=-[36][23][6]. Yin and Hluchyj [44] analyze a 2-rate server whose serving rate depends on bottleneck node queue-size. Threshold-based algorithms naturally result in periodic queue-size and rate behavior... |
1 |
A Very Simple Algorithm for Flow Control on High Speed Networks Via La Palice Queueings
- Jacquet, Mühlethaler
- 1992
(Show Context)
Citation Context ...s. VMTP [11] (streamlined for request-response transactions) and HeiTP [16] (designed to work with the ST-II multimedia network protocol) use an interpacket gap specification. Jacquet and Muhlethaler =-=[28]-=- suggest a multilayer flow control scheme based on bandwidth reservation. Tenet [3] contains a lightweight transport layer protocol, which defers all flow control to the network layer, trusting that e... |
1 |
Dynamics of TCP Traffic of ATM Networks
- Romanow
- 1994
(Show Context)
Citation Context ...rimarily due to inefficient use of bandwidth, and that loss performance can be grossly inadequate without substantial buffering requirements, which in turn results in poor packet delay performance [7]=-=[40]-=-[42]. Clearly, new mechanisms for efficient transport layer flow control are needed. 1.1 Literature Survey and Related Work The earliest of recent transport layer flow control research has concentrate... |
1 |
Performance Evaluations of Three Input Rate Control Schemes
- Rubin, Lin
(Show Context)
Citation Context ...cket is a marking algorithm, which allows traffic with insufficient credit to still enter the network with a violation tag, at the risk of being dropped first if it later encounters congestion [2][10]=-=[41]-=-. Berger [4] examines an implementation in which traffic arriving at a queue with no tokens is dropped. Rubin and Lin [41] analyze a credit manager algorithm with feedback at the usernetwork access po... |