A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows

Size: px
Start display at page:

Download "A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows"

Transcription

1 A Large Scale Simulation Study: Impact of Unresponsive Malicious Flows Yen-Hung Hu, Debra Tang, Hyeong-Ah Choi 3 Abstract Researches have unveiled that about % of current Internet traffic is contributed by TCP flows, and the network stability mostly depends on end-to-end TCP congestion control. This paper studies the performance of various queue management algorithms implemented in current Internet routers when unresponsive high-rate malicious flows coexist in the network. Our analysis is based on large scale simulations using the NS- simulator and a set of simulated traffic generated based on IP traces reported in Oregon Gigapop. Our simulation results show that normal traffic benefits more from the RED than DropTail, and TCP flows of smaller size survive better than larger ones when the network is under the attack by malicious flows. If the network is in normal condition, the RED does not provide any clear advantage over the DropTail. I. INTRODUCTION The stability of current IP network is typically controlled at each router through queue management and packet scheduling policy. In this policy, the network is entirely dependent on the end host to react congestion, and it is expected that flows will reduce their rates after packets are dropped (these are called responsive flows). The problem with this expectation is that misbehaving flows that do not cut down their sending rates after their packets are dropped will hog the buffer space at routers and deprive all other flows of their fair share of bandwidth (these are called unresponsive flows). The first-in-first-out (FIFO) queueing with drop tail (DropTail) policy is the simplest queue management policy applied in most routers in present Internet in which as long as the memory space is available, incoming packets are stored. The Random Early Detection (RED) is the most popular active queue management scheme in which drop policy is dynamically changed in response to network traffic condition. These schemes work well when the flows are from properly implemented TCP. Several alternatives have been proposed to improve the situation with the objective of allocating fair share of bandwidth to each flow [], [], []. As it will be shown in the next section, the existing queue management schemes reveal significant shortcomings in protecting packets from normal flows when misbehaving malicious flows exist. In this paper, we present a large scale simulation using a well-designed traffic pattern whose characteristics are derived from the real Internet traffic []. The traffic pattern we considered only consists of two protocols, TCP and UDP, because they contribute more than % in bytes [] of the real Internet traffic. The rest of this paper is organized as follows. In Section II, we discuss the characteristics of IP traces used in developing our simulated traffic and details of simulation setup. In Section III, we show various simulation results and provide insightful discussions on the impact of malicious flows. Concluding remarks are given in Section IV. A. Simulated Traffic II. SIMULATION SETUP We have developed simulated traffic based on a report on Oregon Gigapop Traffic [], in which the composition of Internet traffic in terms of application protocols is discussed in deatil. The Oregon Gigapop has two POS OC3 Department of Computer Science, Hampton University, Hampton, VA 3, yenhung.hu@hamptonu.edu. US ARMY CECOM Software Engineering Center - Belvoir Fort Belvoir, VA, debra.tang@us.army.mil. 3 Department of Computer Science, George Washington University, Washington DC, hchoi@gwu.edu

2 from Abilene: one to Denver, and one to Sunnyvale. The inbound traffic collected during monitoring period has 3,3 flows and. bytes, and the outbound traffic has, flows and. bytes. The overall monitoring time is minutes combining from four monitoring segments: 3 minutes, 3 minutes, minutes, and minutes. There are protocols consist of Gigapop traffic, and TCP and UDP contribute.% in flow numbers and.% in bytes. For each protocol, there are several applications. For example, TCP includes NNTP, FTP, Gnutella, Napster, HTTP, Kazaa, LDM, Hotline, QTRTSPREAL, SSH, SMTP, Shoutcast, AIM, ICQ, and DNS. UDP includes Mutlicase, Real, Half Life, ICQ, DNS, and others. The traffic model shown in Figure is generated using the NS- simulator on two network topologies: NSF T and NSF T3. In this table, the traffic composition in terms of flow number and bytes for each protocol and flow type is very close to the information in []. Flows in different classes have different flow lives, and the average link utilization is close to.%, same number reported in []. The distribution of start time of each flow is carefully designed to reduce the unbalanced load of each link during the entire simulation period. Each flow, except multicast flows, sends out a block of data at its start time and stops when it is finished. Therefore, the flow stop time is dependant on the network condition. Multicast flows are treated as long-live flows that have packets to send out in every interval during the entire simulation period. The average hop length of flows in T and T3 networks are. and 3., respectively. NSF T NSF T3 UDP TCP UDP TCP flows # flows % interval(ms) pkt/flow total packets total bytes bytes % multicast real. 3. half life.. icq.. dns others.. nntp ftp.3. gnutella napster.. http kazaa others multicast real half life icq 3.. dns 3.. others nntp ftp gnutella napster.. http kazaa others.. Fig.. Traffic Pattern for NSF T and NSF T3. B. Simulation Details The bandwidth of each link in NSF T topology is. Mbps and is Mbps in NSF T3 topology. Propagation delay of all links in both topologies is fixed to be ms, and the maximum buffer size for all routers is packets. Two queue management algorithms are implemented: Droptail and RED. Four parameters used in our simulation associated with RED are minimum threshold=,, maximum threshold=, maximum drop probability=., and weight factor=.. Malicious flows when presented are assumed to be active during the entire simulation period. The rate of malicious flows injected into NSF T topology and NSF T3 topology are Mbps and Mbps respectively. All simulations

3 Fig.. NSF T Topology (left) and NSF T3 Topology (right). run from seconds to 3. seconds, and the traffic stops at 3 seconds. The throughput for each flow is calculated by counting the total number of packets sent out of each flow, and the goodput of each flow is done by counting packets successfully reaching their destinations. III. PERFORMANCE ANALYSIS Note that the traffic model shown in Figure has link utilization.%. In order to create congested network environment, we introduce a term load factor defined as to be new flow size original flow size. For example, load factor =, the size of each flow is doubled as compared with the original flow (where average link utilization is. %). A. Network without Malicious Flows When there is no malicious flow, the bandwidth is shared among multiple flows and bandwidth allocation is based on several factors including queue management algorithms, transport layer protocols, flow sizes, and application layer flow patterns. The advantage of RED over DropTail is reported in [3], [], []: () both TCP and UDP flows have decreased end-to-end delays, () the loss of a large number of consecutive packets is prevented as it reserves some buffer spaces, (3) the higher packet loss against bursty traffic is reduced. When a large scale simulation is performed as in our model, we find that some variations exist in some of the above observations. When the goodput of a flow using RED is same as using DropTail, RED is supposed to provide smaller end-to-end dealy as in observation (). Our results in Figure 3 however show that when TCP flows are concerned, in some cases, DropTail provides better goodputs as well as smaller end-to-end delays. (See NNTP and FTP flows in this figure.) When the traffic load is increased (i.e. load factor is increased), the traffic becomes burstier and the loss of consecutive packets is increased. Contrary to the observations () and (3), our simulation results (Figure ) show that in most cases, the DropTail provides higher average utilization and lower packets loss than the RED. As shown in Figure, the TCP flows with smaller traffic load has higher goodputs since the packet loss from short-life flows is smaller than long-life flows. But as shown in Figure, when UDP flows are concerned, whether packets are accepted or discarded at routers is not dependent on the flows sending rates. That is, it is hard to predict which UDP flows will take more bandwidth than others but such a prediction is possible for TCP flows. B. Network With Malicious Flows We have injected high-rate UDP flows in the network to model malicious flows. Intuitively, normal UDP flows survive better than normal TCP flows since TCP flows will reduce their sending rates in response to the congestion caused by malicious flows while normal flows continue to keep the same sending rates.

4 Average Life (sec) 3 Average Life (sec) 3 Fig. 3. NSF T topology, average life over TCP flows under DropTail (left) and RED (right). Average Drop (bytes).e+.e+ DropTail.E+ RED.E+.E+.E+.E+ Average Utilization.. DropTail. RED Fig.. NSF T, average drop rate (left) and link utilization (right). ) One Attack Model: In this case, only one malicious flow exists in the network with an arbitrary sourcedestination pairs and variable hop-lengths. The average utilization of links affected by the malicious flow is decreased when the load factor of the normal traffic increases, i.e., the rate of the malicious flow is relatively decreased, when using both RED and DropTail. One interesting observation is that the survivability of normal flows that do not travel through links affected by the malicious flow is in fact increased. Our simulation results confirm that the RED performs better than DropTail since incoming packets start to drop before the buffer overflows. See Figure for detailed results. ) Multiple Attack Models: We now consider multiple attack models. Two attacking models are defined: economic attack model: in which approximately minimum number ( malicious flows for NSF T, and malicious for NSF T3) of malicious flows are injected into the networks and each link is traversed by a malicious flow once; and extreme attack model: in which each malicious flow only affects one hop, and the number of malicious flows is the same as the number of links in the network. As shown in Figures,,, and, when under extreme attack, RED provides better protection for normal traffic than DropTail. When RED is implemented, normal UDP can reserve 3% to % of goodput and almost keep constant when load factor increased (i.e., congestion increased), but such reservation will be at most % for most T CP traffic (except HTTP) and is getting worse when load factor increased. However, the simulations results for DropTail are worse than RED, in which only at most 3% UDP flows and % TCP flows (included HTTP) will be protected.

5 Avg. Goodput / Avg. Goodput when = Avg. Goodput / Avg. Goodput when = Fig.. NSF T topology, TCP traffic, average goodput / average goodput when load factor = under DropTail (left) and RED (right). Avg. Goodput / Avg. Goodput when = Multicast-D Real-D Half Life-D ICQ-D DNS-D Avg. Goodput / Avg. Goodput when = Multicast-R Real-R Half Life-R ICQ-R DNS-R Fig.. NSF T topology, UDP traffic, average goodput / average goodput when load factor = under DropTail (left) and RED (right) algorithms. We would like to point out one more interesting observation that the survivability of normal UDP flows does not directly related with the flow size. However, the survivability of TCP flows is directly related with the flow size such that the goodput is better for smaller size flows (e.g., HTTP) in both RED and DropTail. IV. CONCLUSION In this paper, we studied the performance of normal and malicious flows under various network environment through large scale simulations. Our simulation study showed that the RED can benefit more to normal traffic than the DropTail and TCP flows of smaller size survive better than larger ones when hey are under malicious attacks. If the network is in normal condition, no malicious flow exists, the RED does not have any clear advantage over the DropTail. Our main contribution of this paper is that the performance of different queue management algorithms were studied under networks with/without malicious flows using () large-scale simulation, () simulated traffic whose characteristics closely reflecting those from real Internet traffic, and (3) detailed application layer flows. The presented results are believed to be useful in developing control mechanisms counteracting network congestion caused by flooding-based malicious flows. REFERENCES [] Joe St Sauver, Oregon Gigapop Traffic Characterization, Internet/NLANR Joint Techs, May th,, Lincoln NE.

6 Attacker's Average Utilization..... HOP-D-L HOP-D-L HOP-D-L Attacker's Average Utilization..... HOP-R-L HOP-R-L HOP-R-L.. Fig.. NSF T topology, average utilization of malicious flow on the affected link. The notation X Hop-R-LY means that this is a average utilization of a link which is the Y th hops in the path traversed by the malicious flow which will traverse X hops in the network. DropTail (left) and RED (right) algorithms are implemented Multicast-D Half Life-D DNS-D Real-D ICQ-D..... Fig.. NSF T topology, Economic attacks under DropTail algorithm, average flow goodput / average flow goodput without attacks [] Sean McCreary, Kc Claffy, Trends in Wide Area IP Traffic Patterns, a View from Ames Internet Exchange, in ITC Specialist Seminar, Monterey, CA, th th, Sep,. [3] S. Floyd, V. Jacobson, Random Early Detection Gateways for Congestion Avoidance, ACM Transactions on Networking, pp.3-3, Aug. 3. [] S. Floyd, and K. Fall, Promoting the Use of End-to-End Congestion Control in the Internet, IEEE/ACM Transactions on Networking, August. [] B. Braden et al, RFC 3 - Recommendations on Queue Management and Congestion Avoidance in the Internet [] M. May, Th. Bonald, and J. Bolot, Analytic Evaluation of RED Performance, in Proceedings of IEEE INFOCOM, Mar., pp. -. [] M. Christiansen, K. Jeffay, D. Ot, and F. Smith, Tuning RED for Web Traffic, in Proceeding of ACM SIGCOM,, pp. 3-. [] [] NLANR PMA, Aiblence-I data set, ttp://pma.nlanr.net/traces/long/ipls.html [] A. Demers, S. Keshav, and S. Shenkar, Analysis and simulation of a fair queueing algorithm, J. Internetw. Res. Experience, pp. 3-, Oct.. [] A. K. Parekh and R. G. Gallager, A generalized processor sharing approach to flow control in integrated services network: The single-node case, IEEE/ACM Trans. on Networking, vol., No. 3, June, 3. [] D. Lin and R. Morris, Dynamics of random early detection, Proc. ACM SIGCOMM, Cannes, France, Oct., pp. -3.

7 Avg. Goodput / Avg. Goodput Withoug Attack..... Multicast-R Half Life-R DNS-R Real-R ICQ-R Avg. Goodput / Avg. Goodput Withoug Attack..... Fig.. NSF T topology, Economic attacks under RED algorithm, average flow goodput / average flow goodput without attacks Multicast-D Half Life-D DNS-D Real-D ICQ-D.... Fig.. NSF T topology, Extreme attacks under DropTail algorithm, average flow goodput / average flow goodput without attacks Multicast-R Half Life-R DNS-R Real-R ICQ-R.... Fig.. NSF T topology, Extreme attacks under RED algorithm, average flow goodput / average flow goodput without attacks

Packet Filtering for Congestion Control under DoS Attacks

Packet Filtering for Congestion Control under DoS Attacks Packet Filtering for Congestion Control under DoS Attacks Yen-Hung Hu Department of Computer Science George Washingtin University Washington, DC 252 yenhung@gwu.edu Hyeong-Ah Choi Department of Computer

More information

A Framework For Managing Emergent Transmissions In IP Networks

A Framework For Managing Emergent Transmissions In IP Networks A Framework For Managing Emergent Transmissions In IP Networks Yen-Hung Hu Department of Computer Science Hampton University Hampton, Virginia 23668 Email: yenhung.hu@hamptonu.edu Robert Willis Department

More information

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Zhili Zhao Dept. of Elec. Engg., 214 Zachry College Station, TX 77843-3128 A. L. Narasimha Reddy

More information

Research Letter A Simple Mechanism for Throttling High-Bandwidth Flows

Research Letter A Simple Mechanism for Throttling High-Bandwidth Flows Hindawi Publishing Corporation Research Letters in Communications Volume 28, Article ID 74878, 5 pages doi:11155/28/74878 Research Letter A Simple Mechanism for Throttling High-Bandwidth Flows Chia-Wei

More information

Active Queue Management for Self-Similar Network Traffic

Active Queue Management for Self-Similar Network Traffic Active Queue Management for Self-Similar Network Traffic Farnaz Amin*, Kiarash Mizanain**, and Ghasem Mirjalily*** * Electrical Engineering and computer science Department, Yazd University, farnaz.amin@stu.yazduni.ac.ir

More information

Tuning RED for Web Traffic

Tuning RED for Web Traffic Tuning RED for Web Traffic Mikkel Christiansen, Kevin Jeffay, David Ott, Donelson Smith UNC, Chapel Hill SIGCOMM 2000, Stockholm subsequently IEEE/ACM Transactions on Networking Vol. 9, No. 3 (June 2001)

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks Random Early Detection (RED) gateways Sally Floyd CS 268: Computer Networks floyd@eelblgov March 20, 1995 1 The Environment Feedback-based transport protocols (eg, TCP) Problems with current Drop-Tail

More information

CHOKe - A simple approach for providing Quality of Service through stateless approximation of fair queueing. Technical Report No.

CHOKe - A simple approach for providing Quality of Service through stateless approximation of fair queueing. Technical Report No. CHOKe - A simple approach for providing Quality of Service through stateless approximation of fair queueing Rong Pan Balaji Prabhakar Technical Report No.: CSL-TR-99-779 March 1999 CHOKe - A simple approach

More information

Implementation of Start-Time Fair Queuing Algorithm in OPNET

Implementation of Start-Time Fair Queuing Algorithm in OPNET Implementation of Start-Time Fair Queuing Algorithm in OPNET CMPT885/ENSC835 Final Project by Daryn Mitchell daryn@cs.sfu.ca Jack Man Shun Yeung yeung@cs.sfu.ca April 4, 2002. Road map Background and Introduction

More information

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2002; 15:899 906 (DOI: 10.1002/dac.571) Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of

More information

Performance Evaluation of Controlling High Bandwidth Flows by RED-PD

Performance Evaluation of Controlling High Bandwidth Flows by RED-PD Performance Evaluation of Controlling High Bandwidth Flows by RED-PD Osama Ahmed Bashir Md Asri Ngadi Universiti Teknology Malaysia (UTM) Yahia Abdalla Mohamed Mohamed Awad ABSTRACT This paper proposed

More information

Stateless Proportional Bandwidth Allocation

Stateless Proportional Bandwidth Allocation Stateless Proportional Bandwidth Allocation Prasanna K. Jagannathan *a, Arjan Durresi *a, Raj Jain **b a Computer and Information Science Department, The Ohio State University b Nayna Networks, Inc. ABSTRACT

More information

Design and Evaluation of a Partial state router

Design and Evaluation of a Partial state router Design and Evaluation of a Partial state router Phani Gopal V Achanta and A.L. Narasimha Reddy Texas A&M University, College Station, Texas 77843-3128 Email: phani@cs.tamu.edu, reddy@ee.tamu.edu Abstract

More information

Promoting the Use of End-to-End Congestion Control in the Internet

Promoting the Use of End-to-End Congestion Control in the Internet Promoting the Use of End-to-End Congestion Control in the Internet Sally Floyd and Kevin Fall IEEE/ACM Transactions on Networking May 1999 ACN: TCP Friendly 1 Outline The problem of Unresponsive Flows

More information

Performance Consequences of Partial RED Deployment

Performance Consequences of Partial RED Deployment Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing

More information

On Standardized Network Topologies For Network Research Λ

On Standardized Network Topologies For Network Research Λ On Standardized Network Topologies For Network Research Λ George F. Riley Department of Electrical and Computer Engineering Georgia Institute of Technology Atlanta, GA 3332-25 riley@ece.gatech.edu (44)894-4767,

More information

Router s Queue Management

Router s Queue Management Router s Queue Management Manages sharing of (i) buffer space (ii) bandwidth Q1: Which packet to drop when queue is full? Q2: Which packet to send next? FIFO + Drop Tail Keep a single queue Answer to Q1:

More information

Hierarchically Aggregated Fair Queueing (HAFQ) for Per-flow Fair Bandwidth Allocation in High Speed Networks

Hierarchically Aggregated Fair Queueing (HAFQ) for Per-flow Fair Bandwidth Allocation in High Speed Networks Hierarchically Aggregated Fair Queueing () for Per-flow Fair Bandwidth Allocation in High Speed Networks Ichinoshin Maki, Hideyuki Shimonishi, Tutomu Murase, Masayuki Murata, Hideo Miyahara Graduate School

More information

On the Deployment of AQM Algorithms in the Internet

On the Deployment of AQM Algorithms in the Internet On the Deployment of AQM Algorithms in the Internet PAWEL MROZOWSKI and ANDRZEJ CHYDZINSKI Silesian University of Technology Institute of Computer Sciences Akademicka 16, Gliwice POLAND pmrozo@go2.pl andrzej.chydzinski@polsl.pl

More information

The War Between Mice and Elephants

The War Between Mice and Elephants The War Between Mice and Elephants Liang Guo and Ibrahim Matta Computer Science Department Boston University 9th IEEE International Conference on Network Protocols (ICNP),, Riverside, CA, November 2001.

More information

CHOKe A stateless mechanism for providing Quality of Service in the Internet

CHOKe A stateless mechanism for providing Quality of Service in the Internet CHOKe A stateless mechanism for providing Quality of Service in the Internet Balaji Prabhakar, Rong Pan Department of Electrical Engineering Stanford University Stanford, CA 9435 fbalaji,rongg@leland.stanford.edu

More information

The War Between Mice and Elephants

The War Between Mice and Elephants The War Between Mice and Elephants (by Liang Guo and Ibrahim Matta) Treating Short Connections fairly against Long Connections when they compete for Bandwidth. Advanced Computer Networks CS577 Fall 2013

More information

The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs

The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs I J C T A, 9(41), 2016, pp. 157-164 International Science Press ISSN: 0974-5572 The Comparative Analysis of RED, GF-RED and MGF-RED for Congestion Avoidance in MANETs Makul Mahajan 1 and Mritunjay Kumar

More information

Enhancing TCP Throughput over Lossy Links Using ECN-capable RED Gateways

Enhancing TCP Throughput over Lossy Links Using ECN-capable RED Gateways Enhancing TCP Throughput over Lossy Links Using ECN-capable RED Gateways Haowei Bai AES Technology Centers of Excellence Honeywell Aerospace 3660 Technology Drive, Minneapolis, MN 5548 E-mail: haowei.bai@honeywell.com

More information

Simulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET

Simulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET Simulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET Hafiz M. Asif and El-Sayed M. El-Alfy College of Computer Science and Engineering King Fahd University

More information

A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ

A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ A Probabilistic Approach for Achieving Fair Bandwidth Allocations in Peng Wang David L. Mills Department of Electrical & Computer Engineering University of Delaware Newark, DE 976 pwangee@udel.edu; mills@eecis.udel.edu

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL I.J.E.M.S., VOL.2 (4) 2011: 221-228 ISSN 2229-600X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION WITH DROP-TAIL Jai Kumar, Jaiswal Umesh Chandra Department of Computer Science

More information

Three-section Random Early Detection (TRED)

Three-section Random Early Detection (TRED) Three-section Random Early Detection (TRED) Keerthi M PG Student Federal Institute of Science and Technology, Angamaly, Kerala Abstract There are many Active Queue Management (AQM) mechanisms for Congestion

More information

ON STANDARDIZED NETWORK TOPOLOGIES FOR NETWORK RESEARCH. George F. Riley

ON STANDARDIZED NETWORK TOPOLOGIES FOR NETWORK RESEARCH. George F. Riley Proceedings of the 22 Winter Simulation Conference E. Yücesan, C.-H. Chen, J. L. Snowdon, and J. M. Charnes, eds. ON STANDARDIZED NETWORK TOPOLOGIES FOR NETWORK RESEARCH George F. Riley Department of Electrical

More information

Rate Based Pacing with Various TCP Variants

Rate Based Pacing with Various TCP Variants International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Rate Based Pacing with Various TCP Variants Mr. Sreekanth Bandi 1, Mr.K.M.Rayudu 2 1 Asst.Professor, Dept of CSE,

More information

Integrated and Differentiated Services. Christos Papadopoulos. CSU CS557, Fall 2017

Integrated and Differentiated Services. Christos Papadopoulos. CSU CS557, Fall 2017 Integrated and Differentiated Services Christos Papadopoulos (Remixed by Lorenzo De Carli) CSU CS557, Fall 2017 1 Preliminary concepts: token buffer 2 Characterizing Traffic: Token Bucket Filter Parsimonious

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK I.J.E.M.S., VOL.2 (3) 211: 163-171 ISSN 2229-6X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION Jai Kumar and U.C. Jaiswal Department of Computer Science and Engineering, Madan

More information

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks

RECHOKe: A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < : A Scheme for Detection, Control and Punishment of Malicious Flows in IP Networks Visvasuresh Victor Govindaswamy,

More information

Rainbow Fair Queueing: Fair Bandwidth Sharing Without Per-Flow State

Rainbow Fair Queueing: Fair Bandwidth Sharing Without Per-Flow State Fair Queueing: Fair Bandwidth Sharing Without Per-Flow State Zhiruo Cao y Zheng Wang z Ellen Zegura y y College of Computing z Bell Labs Georgia Institute of Technology Lucent Technologies Atlanta, GA

More information

Steady State Analysis of the RED Gateway: Stability, Transient Behavior, and Parameter Setting

Steady State Analysis of the RED Gateway: Stability, Transient Behavior, and Parameter Setting Steady State Analysis of the RED Gateway: Stability, Transient Behavior, and Parameter Setting Hiroyuki Ohsaki, Masayuki Murata, and Hideo Miyahara Graduate School of Engineering Science, Osaka University

More information

Visualization of Internet Traffic Features

Visualization of Internet Traffic Features Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks. Congestion Control in Today s Internet

Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks. Congestion Control in Today s Internet Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks Ion Stoica CMU Scott Shenker Xerox PARC Hui Zhang CMU Congestion Control in Today s Internet Rely

More information

A Flow Table-Based Design to Approximate Fairness

A Flow Table-Based Design to Approximate Fairness A Flow Table-Based Design to Approximate Fairness Rong Pan Lee Breslau Balaji Prabhakar Scott Shenker Stanford University AT&T Labs-Research Stanford University ICIR rong@stanford.edu breslau@research.att.com

More information

TCP based Receiver Assistant Congestion Control

TCP based Receiver Assistant Congestion Control International Conference on Multidisciplinary Research & Practice P a g e 219 TCP based Receiver Assistant Congestion Control Hardik K. Molia Master of Computer Engineering, Department of Computer Engineering

More information

Traffic Management using Multilevel Explicit Congestion Notification

Traffic Management using Multilevel Explicit Congestion Notification Traffic Management using Multilevel Explicit Congestion Notification Arjan Durresi, Mukundan Sridharan, Chunlei Liu, Mukul Goyal Department of Computer and Information Science The Ohio State University

More information

Congestion Propagation among Routers in the Internet

Congestion Propagation among Routers in the Internet Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,

More information

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs

Congestion Control for High Bandwidth-delay Product Networks. Dina Katabi, Mark Handley, Charlie Rohrs Congestion Control for High Bandwidth-delay Product Networks Dina Katabi, Mark Handley, Charlie Rohrs Outline Introduction What s wrong with TCP? Idea of Efficiency vs. Fairness XCP, what is it? Is it

More information

Stabilizing RED using a Fuzzy Controller

Stabilizing RED using a Fuzzy Controller This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 27 proceedings. Stabilizing RED using a Fuzzy Controller Jinsheng

More information

Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network

Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network Effects of Applying High-Speed Congestion Control Algorithms in Satellite Network Xiuchao Wu, Mun Choon Chan, and A. L. Ananda School of Computing, National University of Singapore Computing 1, Law Link,

More information

Computer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am

Computer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am 15-744 Computer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am (please submit through e-mail to zhuoc@cs.cmu.edu and srini@cs.cmu.edu) Name: A Congestion Control 1. At time t, a TCP connection

More information

A Better-Than-Best Effort Forwarding Service For UDP

A Better-Than-Best Effort Forwarding Service For UDP University of North Carolina at Chapel Hill A Better-Than-Best Effort Forwarding Service For UDP Lightweight Active Queue Management for Multimedia Networking Kevin Jeffay Mark Parris Don Smith http://www.cs.unc.edu/reseach/dirt

More information

Provision of Quality of Service with Router Support

Provision of Quality of Service with Router Support Provision of Quality of Service with Router Support Hongli Luo Department of Computer and Electrical Engineering Technology and Information System and Technology Indiana University Purdue University Fort

More information

Congestion control in TCP

Congestion control in TCP Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed

More information

Analysis of Dynamic Behaviors of Many TCP Connections Sharing Tail Drop/RED Routers

Analysis of Dynamic Behaviors of Many TCP Connections Sharing Tail Drop/RED Routers Analysis of Dynamic Behaviors of Many TCP Connections Sharing Tail Drop/RED Routers Go Hasegawa and Masayuki Murata Cybermedia Center, Osaka University -3, Machikaneyama, Toyonaka, Osaka 560-853, Japan

More information

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments

Cross-layer TCP Performance Analysis in IEEE Vehicular Environments 24 Telfor Journal, Vol. 6, No. 1, 214. Cross-layer TCP Performance Analysis in IEEE 82.11 Vehicular Environments Toni Janevski, Senior Member, IEEE, and Ivan Petrov 1 Abstract In this paper we provide

More information

Congestion Avoidance

Congestion Avoidance Congestion Avoidance Richard T. B. Ma School of Computing National University of Singapore CS 5229: Advanced Compute Networks References K. K. Ramakrishnan, Raj Jain, A Binary Feedback Scheme for Congestion

More information

Multicast Transport Protocol Analysis: Self-Similar Sources *

Multicast Transport Protocol Analysis: Self-Similar Sources * Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,

More information

15-744: Computer Networking. Overview. Queuing Disciplines. TCP & Routers. L-6 TCP & Routers

15-744: Computer Networking. Overview. Queuing Disciplines. TCP & Routers. L-6 TCP & Routers TCP & Routers 15-744: Computer Networking RED XCP Assigned reading [FJ93] Random Early Detection Gateways for Congestion Avoidance [KHR02] Congestion Control for High Bandwidth-Delay Product Networks L-6

More information

Denial of Service Attacks in Networks with Tiny Buffers

Denial of Service Attacks in Networks with Tiny Buffers Denial of Service Attacks in Networks with Tiny Buffers Veria Havary-Nassab, Agop Koulakezian, Department of Electrical and Computer Engineering University of Toronto {veria, agop}@comm.toronto.edu Yashar

More information

Congestion Control Mechanism using Network Border Protocol

Congestion Control Mechanism using Network Border Protocol Congestion Control Mechanism using Network Border Protocol Ashakiran.G.N 1, M.V.Panduranga Rao 2, S.Basavaraj Patil 3 1 Dept of Computer Science and Engineering Bangalore, India ashakirangn@yahoo.com 2

More information

Promoting the Use of End-to-End Congestion Control in the Internet

Promoting the Use of End-to-End Congestion Control in the Internet Promoting the Use of End-to-End Congestion Control in the Internet IEEE/ACM Transactions on ing, May 3 1999 Sally Floyd, Kevin Fall Presenter: Yixin Hua 1 About Winner of the Communications Society William

More information

On the Transition to a Low Latency TCP/IP Internet

On the Transition to a Low Latency TCP/IP Internet On the Transition to a Low Latency TCP/IP Internet Bartek Wydrowski and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks, EEE Department, The University of Melbourne,

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Amin Vahdat, Dina Katabi Lecture 14 Overview" TCP congestion control review XCP Overview 2 Congestion Control

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Protection from Unresponsive Flows with Geometric CHOKe

Protection from Unresponsive Flows with Geometric CHOKe Protection from Unresponsive Flows with Geometric CHOKe Addisu Eshete and Yuming Jiang Centre for Quantifiable Quality of Service in Communication Systems Norwegian University of Science and Technology,

More information

TCP Performance under Aggregate Fair Queueing

TCP Performance under Aggregate Fair Queueing TCP Performance under Aggregate Fair Queueing Wei Sun and Kang G. Shin Department of Electrical Engineering and Computer Science The University of Michigan Email: {wsunz, kgshin}@eecs.umich.edu Abstract

More information

Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks

Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks A.Chitkala, K.S. Vijaya Lakshmi VRSE College,India. ABSTRACT-Flow Control Packet Marking Scheme is a

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Implementation and Performance Analysis of Active Queue Management Mechanisms

Implementation and Performance Analysis of Active Queue Management Mechanisms Implementation and Performance Analysis of Active Queue Management Mechanisms Stanislav Mišković, Grozdan Petrović, and Ljiljana Trajković Abstract In this paper, we describe active queue management (AQM)

More information

CS 268: Computer Networking

CS 268: Computer Networking CS 268: Computer Networking L-6 Router Congestion Control TCP & Routers RED XCP Assigned reading [FJ93] Random Early Detection Gateways for Congestion Avoidance [KHR02] Congestion Control for High Bandwidth-Delay

More information

An Adaptive Neuron AQM for a Stable Internet

An Adaptive Neuron AQM for a Stable Internet An Adaptive Neuron AQM for a Stable Internet Jinsheng Sun and Moshe Zukerman The ARC Special Research Centre for Ultra-Broadband Information Networks, Department of Electrical and Electronic Engineering,

More information

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks

Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Impact of End-to-end QoS Connectivity on the Performance of Remote Wireless Local Networks Veselin Rakocevic School of Engineering and Mathematical Sciences City University London EC1V HB, UK V.Rakocevic@city.ac.uk

More information

A NEW CONGESTION MANAGEMENT MECHANISM FOR NEXT GENERATION ROUTERS

A NEW CONGESTION MANAGEMENT MECHANISM FOR NEXT GENERATION ROUTERS Journal of Engineering Science and Technology Vol. 3, No. 3 (2008) 265-271 School of Engineering, Taylor s University College A NEW CONGESTION MANAGEMENT MECHANISM FOR NEXT GENERATION ROUTERS MOHAMMED

More information

Effective Utilization of Router Buffer by Threshold Parameter Setting Approach in RED

Effective Utilization of Router Buffer by Threshold Parameter Setting Approach in RED Effective Utilization of Router Buffer by Threshold Parameter Setting Approach in RED Kiran Chhabra Research Scholar Computer Science & Engineering Dr. C. V. Raman University, Bilaspur (C. G.) Manali Kshirsagar

More information

Simulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University

Simulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University Simulation with NS-2 and CPN tools Ying-Dar Lin Department of Computer Science, National Chiao Tung University Outline NS-2 simulator NS-2 basics Basic syntax Tracing a simple network Mini and term projects

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

A Third Drop Level For TCP-RED Congestion Control Strategy

A Third Drop Level For TCP-RED Congestion Control Strategy A Third Drop Level For TCP-RED Congestion Control Strategy Nabhan Hamadneh, Michael Dixon, Peter Cole, and David Murray Abstract This work presents the Risk Threshold RED (RTRED) congestion control strategy

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

Analysis. Group 5 Mohammad Ahmad Ryadh Almuaili

Analysis. Group 5 Mohammad Ahmad Ryadh Almuaili Analysis Group 5 Mohammad Ahmad Ryadh Almuaili Outline Introduction Previous Work Approaches Design & Implementation Results Conclusion References WHAT IS DDoS? DDoS: Distributed denial of service attack

More information

Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways

Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways Enhancing TCP Throughput over Lossy Links Using ECN-Capable Capable RED Gateways Haowei Bai Honeywell Aerospace Mohammed Atiquzzaman School of Computer Science University of Oklahoma 1 Outline Introduction

More information

On the Effect of Router Buffer Sizes on Low-Rate Denial of Service Attacks

On the Effect of Router Buffer Sizes on Low-Rate Denial of Service Attacks On the Effect of Router Buffer Sizes on Low-Rate Denial of Service Attacks Sandeep Sarat Andreas Terzis sarat@cs.jhu.edu terzis@cs.jhu.edu Johns Hopkins University Abstract Router queues buffer packets

More information

TCP Overview Revisited Computer Networking. Queuing Disciplines. Packet Drop Dimensions. Typical Internet Queuing. FIFO + Drop-tail Problems

TCP Overview Revisited Computer Networking. Queuing Disciplines. Packet Drop Dimensions. Typical Internet Queuing. FIFO + Drop-tail Problems TCP Overview Revisited TCP modern loss recovery 15-441 Computer Networking Other Transport Issues, Attacks and Security Threats, Firewalls TCP options TCP interactions TCP modeling Workload changes TCP

More information

Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification. Chunlei Liu Raj Jain

Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification. Chunlei Liu Raj Jain Buffer Requirements for Zero Loss Flow Control with Explicit Congestion Notification Chunlei Liu Raj Jain Department of Computer and Information Science The Ohio State University, Columbus, OH 432-277

More information

Adaptive-Weighted Packet Scheduling for Premium Service

Adaptive-Weighted Packet Scheduling for Premium Service -Weighted Packet Scheduling for Premium Service Haining Wang Chia Shen Kang G. Shin The University of Michigan Mitsubishi Electric Research Laboratory Ann Arbor, MI 489 Cambridge, MA 239 hxw,kgshin @eecs.umich.edu

More information

Estimating Arrival Rates from the RED Packet Drop History

Estimating Arrival Rates from the RED Packet Drop History Estimating Arrival Rates from the RED Packet Drop History Sally Floyd, Kevin Fall, and Kinh Tieu Network Research Group Lawrence Berkeley National Laboratory, Berkeley CA ffloyd,kfallg@eelblgov ** DRAFT

More information

A Control-Theoretical Approach for Fair Share Computation in Core-Stateless Networks

A Control-Theoretical Approach for Fair Share Computation in Core-Stateless Networks A Control-Theoretical Approach for Fair Share Computation in Core-Stateless Networks Hoon-Tong Ngin and Chen-Khong Tham National University of Singapore, Department of Electrical and Computer Engineering,

More information

The Present and Future of Congestion Control. Mark Handley

The Present and Future of Congestion Control. Mark Handley The Present and Future of Congestion Control Mark Handley Outline Purpose of congestion control The Present: TCP s congestion control algorithm (AIMD) TCP-friendly congestion control for multimedia Datagram

More information

Improving QOS in IP Networks. Principles for QOS Guarantees

Improving QOS in IP Networks. Principles for QOS Guarantees Improving QOS in IP Networks Thus far: making the best of best effort Future: next generation Internet with QoS guarantees RSVP: signaling for resource reservations Differentiated Services: differential

More information

Fuzzy RED: Congestion Control for TCP/IP Diff-Serv

Fuzzy RED: Congestion Control for TCP/IP Diff-Serv Chapter 3.3.1 Fuzzy RED: Congestion Control for TCP/IP Diff-Serv L. Rossides 1, A. Sekercioglu 2, A. Pitsillides 1, A. Vasilakos 3, S. Kohler 4, P. Tran-Gia 4 1 University of Cyprus, Department of Computer

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

THE TCP specification that specifies the first original

THE TCP specification that specifies the first original 1 Median Filtering Simulation of Bursty Traffic Auc Fai Chan, John Leis Faculty of Engineering and Surveying University of Southern Queensland Toowoomba Queensland 4350 Abstract The estimation of Retransmission

More information

Congestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues

Congestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues Congestion Control Outline Queuing Discipline Reacting to Congestion Avoiding Congestion Issues Two sides of the same coin pre-allocate resources to avoid congestion (e.g. telephone networks) control congestion

More information

Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures

Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures M. Fabiano P.S. and M.A. R. Dantas Departamento da Ciência da Computação, Universidade de Brasília, 70.910-970

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Buffer Management for Self-Similar Network Traffic

Buffer Management for Self-Similar Network Traffic Buffer Management for Self-Similar Network Traffic Faranz Amin Electrical Engineering and computer science Department Yazd University Yazd, Iran farnaz.amin@stu.yazd.ac.ir Kiarash Mizanian Electrical Engineering

More information

Congestion Control and Resource Allocation

Congestion Control and Resource Allocation Problem: allocating resources Congestion control Quality of service Congestion Control and Resource Allocation Hongwei Zhang http://www.cs.wayne.edu/~hzhang The hand that hath made you fair hath made you

More information

A Note on the Stability Requirements of Adaptive Virtual Queue

A Note on the Stability Requirements of Adaptive Virtual Queue A ote on the Stability Requirements of Adaptive Virtual Queue Dina Katabi MIT-LCS dk@mit.edu Charles Blake MIT-LCS cb@mit.edu Abstract Choosing the correct values for the parameters of an Active Queue

More information

Random Early Marking: Improving TCP Performance in DiffServ Assured Forwarding

Random Early Marking: Improving TCP Performance in DiffServ Assured Forwarding Random Early Marking: Improving TCP Performance in DiffServ Assured Forwarding Sandra Tartarelli and Albert Banchs Network Laboratories Heidelberg, NEC Europe Ltd. Abstract In the context of Active Queue

More information

A Modification to RED AQM for CIOQ Switches

A Modification to RED AQM for CIOQ Switches A Modification to RED AQM for CIOQ Switches Jay Kumar Sundararajan, Fang Zhao, Pamela Youssef-Massaad, Muriel Médard {jaykumar, zhaof, pmassaad, medard}@mit.edu Laboratory for Information and Decision

More information

A Fuzzy System for Adaptive Network Routing

A Fuzzy System for Adaptive Network Routing A Fuzzy System for Adaptive Network Routing A. Pasupuleti *, A.V. Mathew*, N. Shenoy** and S. A. Dianat* Rochester Institute of Technology Rochester, NY 14623, USA E-mail: axp1014@rit.edu Abstract In this

More information

Internet Security: Firewall

Internet Security: Firewall Internet Security: Firewall What is a Firewall firewall = wall to protect against fire propagation More like a moat around a medieval castle restricts entry to carefully controlled points restricts exits

More information

Overview. TCP & router queuing Computer Networking. TCP details. Workloads. TCP Performance. TCP Performance. Lecture 10 TCP & Routers

Overview. TCP & router queuing Computer Networking. TCP details. Workloads. TCP Performance. TCP Performance. Lecture 10 TCP & Routers Overview 15-441 Computer Networking TCP & router queuing Lecture 10 TCP & Routers TCP details Workloads Lecture 10: 09-30-2002 2 TCP Performance TCP Performance Can TCP saturate a link? Congestion control

More information