SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 3, Issue 1 (July-Aug. 2012), PP 13-19
www.iosrjournals.org

     Performance Evaluation of High Speed Congestion Control
                            Protocols
                             Mohamed Ali Mani and Rachid Mbarek
ABSTRACT: Computer networks are facing several technological and scientific challenges. Among these
challenges is congestion control. It limits the quantity of information input at a rate less important than that of
the transmission one to ensure good performance as well as protect against overload and blocking of the
network. Researchers have done a great deal of work on improving congestion control protocols, especially on
high speed networks.
In this paper, we will be studying the congestion control alongside low and high speed congestion control
protocols. We will be also simulating, evaluating, and comparing seven of high speed congestion control
protocols : Bic TCP, Cubic TCP, Hamilton TCP, HighSpeed TCP, Illinois TCP, Scalable TCP and YeAH TCP,
with multiple flows.
KEYWORDS: HIGH-SPEED, TCP PROTOCOLS, CONGESTION CONTROL, PERFORMANCE, MULTIPLE FLOWS.

                                          I.         INTRODUCTION
          Due to the ease of finding information, data access and utilization by a simple mouse move in
multimedia pages, Internet has become necessary in our daily lives. In fact, the number of Internet users is
growing rapidly, and according to the ITU (International Telecommunication Union) it reached only 500 million
users in the beginning of 2000s while it was 1.6 billion in 2008 to rise to the number of 2 billions in 2011.
          This increase must undergo a parallel development of both of hardware and software at the same time.
Early, throughput was about 56 kbps, however, now we talk about Gigabit Internet aiming to meet the users’
needs mainly in astronomy and video conference fields.
          In Internet, there are some machines responsible for transmitting data packets, and other that take off
these packets from the queue. If the sender machine sends a data packet rate much more important than the rate
of the receiver, network congestion is produced, hence, a congestion control will limit the quantity of input
information with a lower rate than the transmission one to guarantee a good performance as well as a network
protection against overloading and blocking.
          The high number of high speed congestion control protocols led us to prepare this research work,
which focuses on evaluating and comparing high speed congestion control protocols.
This paper is organized as follows:
          In the second section we study the state of the art. In the third one, we present the architectures used as
well as the curves and the performances evaluation for different high speed congestion control protocols.

STATE OF THE ART
          Researchers have worked on the enhancement of high speed congestion control protocols. Practically
every year, one or two protocols are implemented having for each one of them its own specific strengths and
weaknesses.
          Recently, the research works are interested in evaluating the performance of these protocols by
comparing among 2 to 5 protocols with 1 to 12 flows [1] [2] [3] [4] [5].
HS-TCP [6]: If the congestion window is low, HS-TCP behaves just like the standard TCP, once the congestion
window exceeds the max_ssthresh, it rises in an aggressive way. The algorithm of HS-TCP is an AIMD
Additive Increment cwnd = cwnd + a(cwnd) Multiplicative Decrement cwnd = (1- b(cwnd)) x cwnd, the values
used for HSTCP are a(cwnd) in the interval of [1,72], b(cwnd) in the interval of [0.1,0.5] and low_window
equals 38 packets. when cwnd is lower than low_window a(cwnd) = 1 and b(cwnd) = 0.5 thus the algorithm acts
just like a standard TCP, in the case of a packet loss, the cwnd is reduced to 50%, when the cwnd reaches the
high_window a(cwnd ) = 72 and b(cwnd)=1.
If there is an acknowledgment:
                                        1+β
                                  𝑤1 =         × cwnd          cwnd < 𝑤1
                                           2
                                  𝑤1 = cwnd                   cwnd ≥ 𝑤1
w2 = cwnd
Scalable TCP [7]: For this protocol the cwnd increases with 0.001, if a congestion is detected the cwnd reduces
with 0.125 independently from the throughput and the packet size. This algorithm is a MIMD; Multiplicative
                                              www.iosrjournals.org                                         13 | Page
Performance Evaluation Of High Speed Congestion Control Protocols
Increase since the cwnd increases with 0.01 per acknowledgment, Therefore there is a total increase of 0.01
cwnd per RTT, and Multiplicative Decrease since the cwnd decreases with 0.125 per packet loss.
BIC TCP [8]: uses a function that allows to have a rapid increase of cwnd when its value is far from the
maximal threshold Smax and to slowly decrease when having a value close to w_1.
cwnd = (1 – β) × cwnd
With :
                             β
                             δ
                                    δ ≤ 1 and cwnd < w1
                                      or w1 ≤ cwnd < w1 + β
         fα (δ, cwnd) =      δ      1 < δ ≤ Smax and cwnd < w1
                              w1
                             β−1
                                     β ≤ cwnd − w1 < Smax 1 − β
                             Smax          otherwise

cwnd     : Current congestion window
Smax     : Maximal threshold
Smin     : Minimal threshold
Β        : Decrease factor usually equals 0.875
CUBIC TCP [9]: The name CUBIC refers to the function of the congestion window increase which is cubic,
when receiving an ACK:
        cwnd = C (T – K) ³ + Maxcwnd
When having a packet loss:
        cwnd = β Maxcwnd
With :
Cwnd*:*Current congestion window
C*:*Constant
T*:*Duration of time since the last congestion
Maxcwnd *:*Size of the last congestion window
K*:* 3 Maxcwnd β/C

HTCP [10]: uses Δ the duration since the last congestion rather than cwnd as information about the product
delay bandwidth BDP. The increase parameter of AIMD (additive-increase/multiplicative-decrease) varies
depending on Δ. It also depends on the value of RTT which has provoked the unfairness among the competitor
flows with different RTTs.
In case of receiving an ACK:
                         2 1−β f (Δ)
         cwnd = cwnd + cwndα
In case of packet loss:
         cwnd = g β (B) × cwnd
With :
                     1                            Δ ≤ ΔL
         fα (Δ) =
                     max fα Δ Tmin ,1             Δ > ΔL
                                                B K+1 – B(k)
                      0.5                          B (K)
                                                               > ΔB
         g β (B) =          T min
                      min   T max
                                    ,0.8        otherwise

cwnd*:*Current congestion window
α*:*Increase parameter
β*:*Decrease parameter
Δ*:*Duration of time since the last congestion
ΔL *:*Threshold to change the mode low speed to highspeed
Tmin *:*Minimal duration of sending and receiving packets
Tmax *:*Maximal duration of sending and receiving packets
B K + 1 *:*Maximal throughput reached before a congestion
fα Δ *=*1 +10 (Δ - ΔL ) + 0,25 (Δ - ΔL )²




                                                www.iosrjournals.org                              14 | Page
Performance Evaluation Of High Speed Congestion Control Protocols
Illinois TCP [11] : Similar to standard TCP, Illinois-TCP increases the congestion window by using two
parameters α and β, it is based on packet loss to define the congestion window value, however the values of α
and β are not constant by using the delays.
When receiving an ACK:
                            α
         cwnd = cwnd +
                           𝑐𝑤𝑛𝑑
When losing packets:
         cwnd = (1- β) × cwnd
With :
                 α 𝑚𝑎𝑥             𝑑 𝑎 ≤ 𝑑1
α = 𝑓1 (𝑑 𝑎 ) =     𝑘1
                  𝑘2+ 𝑑 𝑎
                                    𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
                    β 𝑚𝑖𝑛             𝑑 𝑎 ≤ 𝑑2
β = 𝑓2 (𝑑 𝑎 ) =     𝑘3 + 𝑘4 𝑑 𝑎    𝑑2 < 𝑑 𝑎 < 𝑑3
                     β 𝑚𝑎𝑥          𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒

        (𝑑 𝑚 − 𝑑 1 ) α 𝑚𝑖𝑛 α 𝑚𝑎𝑥
𝑘1 =                             *
             α 𝑚𝑎𝑥 − α 𝑚𝑖𝑛
        (𝑑 𝑚 − 𝑑 1 ) α 𝑚𝑖𝑛
𝑘2 =     α      −α
                            - 𝑑1
           𝑚𝑎𝑥      𝑚𝑖𝑛
        β 𝑚𝑖𝑛 𝑑 3 − β 𝑚𝑎𝑥 𝑑 2        β     −β
𝑘3 =          𝑑3− 𝑑2
                              *𝑘4 = 𝑚𝑎𝑥 − 𝑑 𝑚𝑖𝑛
                                        𝑑3   2
               𝑘                     𝑘
α   𝑚𝑖𝑛 = 𝑘 + 𝑑1       , α 𝑚𝑎𝑥 = 𝑘 +1 𝑑
           2       𝑚𝑜𝑦             2    1
β 𝑚𝑖𝑛 = 𝑘3 + 𝑘4 𝑑2 , β 𝑚𝑎𝑥 =𝑘3 + 𝑘4 𝑑3

YeAH TCP [12] the algorithm starts with the Slow Start if cwnd < ssthresh and Scalable TCP once cwnd
reaches the ssthresh. This protocol uses two modes, fast mode and slow mode. In the case of the fast one, the
congestion window increases aggressively, for the second mode, the protocol behaves similarly to Reno TCP.
The mode is chosen according to the queue status. Having RTTBASE the minimal RTT measured by the sender
and RTTMIN the minimal RTT estimated from the current window. The estimated delay is:
                                        RTTqueue = RTTmin − RTTbase
Thanks to this value, the number of packet on hold in the queue can be defined as follows:
                                                                       cwnd
                                  Q = RTTqueue × G = RTTqueue ×
                                                                      RTTmin
 And G is the throughput.

                              II.        SIMULATION AND PERFORMANCES EVALUATION
2.1. Architecture
         In order to simulate the high speed congestion control protocols, we have chosen a topology (as shown
in figure 1) composed of a sender and a receiver linked together with two routers by a line of 1Gbps of
bandwidth, the delay is 1ms. The routers are linked to each other with a line having a bandwidth of 200Mbps,
the delay is equal to 92 ms and the queue capacity is exactly 100 packets [13]. The MSS size equals 1460 bytes.
The differences among the bandwidths capacities provoke congestion.


Figure 1. Basic topology
         To evaluate the performances, we have used 2, 4, 6, 8, 10, 12, 16 and 24 identical flows (as shown in
figure 2) with a link capacity of 1 Gbps and a delay of 1 ms.




Figure 2. Topology with multiple flows

2.2. TCP-Friendly
         To test the TCP Friendly of different protocols, we have used a multiple flows topology with 4 input
flows triggered at the same time. The results are shown in the following graphs:




                                                   www.iosrjournals.org                               15 | Page
Performance Evaluation Of High Speed Congestion Control Protocols




   Figure 3.a. HS TCP : Throughput variation for 4 flows




              *
Figure 3.b. Scalable TCP : Throughput variation for 4 flows




  Figure 3.c. Bic TCP : Throughput variation for 4 flows




            *
Figure 3.d. Hamilton TCP : Throughput variation for 4 flows




 Figure 3.e. Cubic TCP : Throughput variation for 4 flows




               *
 Figure 3.f. Illinois TCP : Throughput variation for 4 flows




 Figure 3.g. YeAH TCP : Throughput variation for 4 flows

                  www.iosrjournals.org                           16 | Page
Performance Evaluation Of High Speed Congestion Control Protocols
2.3. Efficiency
          The efficiency (rate of utilization or performance) of a network is the percentage of utilization [14].
Mathematically, it is the division of the average throughput by the optimal throughput.
An efficient network uses the maximum of capacity.
The following variable 𝑞 𝑖 is used as the average throughput of a flow i.
The throughput of a source with n flows is:
                                                            𝑛
                                                        1
                                                    𝑄=         𝑞𝑖
                                                        𝑛
                                                           𝑖=1
We calculate the ratio between the average throughput and the optimal one which is the result of an ideal
network performance:
                                                             𝑄
                                                     𝐸=
                                                           𝑄 𝑜𝑝𝑡
We have used these two topologies to simulate the seven protocols for 1, 2, 4, 6, 8, 10, 12, 16 and 24 flows.
The efficiency calculus results are as mentioned in the following graph:




                                 Figure 4. Efficiency for different flow numbers

2.4. Fairness
            The fairness is the attempt of sharing the network capacities among users in a fair way.
For the purpose of measuring the fairness, one method is used in the networks field which is called the Maximin
law proposed by Raj Jain [15]. Here is the procedure that allows us to calculate the fairness of a proposed
algorithm:
Having an algorithm that provides the distribution vi = [x1 , x2 ,…,xn ] instead of the optimal distribution vopt =
 [x1,opt , x2,opt , … , xn,opt ]. We calculate the standardized distribution for every source as follows:
                                                                       𝑥𝑖
                                                            𝑋𝑖 =
                                                                    𝑥 𝑜𝑝𝑡
Thus, the fairness index F equals the sum of distributions squared and divided by the square of sums:
                                                                  𝑛
                                                               ( 𝑖=1 𝑋 𝑖 )²
                                                         𝐹=          𝑛
                                                                𝑛 𝑖=1 𝑋 𝑖 ²
We have used these two topologies to simulate the seven protocols for 1, 2, 4, 6, 8, 10, 12, 16 and 24 flows.
The fairness calculus results are as mentioned in the following graph:




                                  Figure 5. Fairness for different flow numbers

2.5. Performance
         The performance of a congestion control algorithm is the relation between efficiency and fairness:
Performance = α × E + (1 – α) × F
With α = [0,1.. 0,9], E the efficiency and F the fairness.
For the different algorithms, we have calculated the performances for a network rather efficient with α = 0,8, a
network rather fair with α = 0,2 and a balanced network when α = 0,5. The results for 1, 2, 4, 6, 8, 10, 12, 16 and
24 flows are as follows:




                                             www.iosrjournals.org                                        17 | Page
Performance Evaluation Of High Speed Congestion Control Protocols




                          Figure 6.a. Performance for different flow numbers (α = 0,8)




                          Figure 6.b. Performance for different flow numbers (α = 0,5)




                          Figure 6.c. Performance for different flow numbers (α = 0,2)

2.6. Link Utilisation per RTT
         We varied the RTT for different congestion control algorithms to calculate the link utilization. The
used RTT values are: 20 ms, 60 ms, 100 ms, 140 ms, 180 ms and 220 ms.
We used the basic topology with only one flow; the results are described in the following graph:




                                  Figure 7. Link utilization for different RTTs

2.7. Link utilization for different queue sizes
         Certainly the queue size has an important impact on the efficiency of the network, but which algorithm
benefits the more of this change? We varied the queue size for different congestion control algorithms to
calculate the link utilization. The used sizes are: 50, 100, 150, 200, 250 and 300 packets.
We used the basic topology with one flow, the results are as follows:




                               Figure 8. Link utilization for different queue sizes

                                      III.          CONCLUSIONS
          The high number of congestion control algorithms never satisfied the researchers. Since this field is
always having changes and enhancements due to the users’ needs and the evolution of both of hardware and
software in Telecommunications. Indeed, it is difficult to conceive an algorithm that gives satisfying results for
all the architectures.


                                            www.iosrjournals.org                                        18 | Page
Performance Evaluation Of High Speed Congestion Control Protocols
          During this research work, we simulated seven high speed congestion control protocols for 1, 2, 4, 6, 8,
10, 12, 16 and 24 flows. We evaluated their performances by calculating the efficiency, the fairness as well as
the performance while varying the RTT and the queue size.
Basing on the simulation and the high speed protocols performance evaluation, we can conclude that:
• Some protocols perform well in some defined cases, but weak in others.
• The network architecture has got an important impact on the protocols performance.
• For 24 flows, all protocols are unfair.
• For 24 flows, the protocols: Bic TCP, Cubic TCP, Hamilton TCP, Scalable TCP and YeAH TCP are
     efficient.
• Scalable is not only TCP-friendly, but also selfish, since the first flow gets the most important throughput,
     and doesn’t leave its place for any other flow such as the case of Cubic TCP, Hamilton TCP and Illinois
     TCP.
• The protocols Bic TCP, HighSpeed TCP and YeAH TCP are TCP-friendly
• For low values of RTT, all the protocols use the network capacities in a bad way.
• For low values of the queue size, Cubic TCP is the most efficient.
• YeAH TCP and Illinois TCP give the best results while increasing the queue size.
• Although his aggressiveness, YeAH TCP is quite TCP-friendly. It is also quite performant, but it doesn’t
     suit all the architectures.
          Further work is required to evaluate the performances of these protocols by using Relentless TCP
which will be the topic for a multitude of research works in the near future, particularly to define if the protocols
that have more stability and take more time before falling another time in a new congestion such as Cubic TCP
and Illinois TCP in order to check if they will well exploit the law that forms the basis of Relentless TCP which
is the reduction of the congestion window with the number of lost segments. It will be also interesting to create a
model that changes dynamically the congestion control protocols used in terms of flow number to better exploit
the network capacities as well as studying the QoS.

                                                           REFERENCES
[1]    R. Mbarek, M. T. BenOthman and S. Nasri. “Fairness of High-Speed TCP Protocols with Different Flow Capacities”. Journal Of
       Networks, Vol. 4, No. 3, pp. 163-169, May 2009.
[2]    S. Hemminger. “TCP testing – Preventing global Internet warming”. LinuxConf Europe, Sep. 2007.
[3]    S. Ha, L. Le, I. Rhee and L. Xu. “Impact of Background Traffic on Performance of High-Speed TCP Variant Protocols”. The
       International Journal of Computer and Telecommunications Networking, Vol.51, May, 2007.
[4]    M. Nabeshima and K. Yata. “Performance Evaluation and Comparison of Transport Protocols for Fast Long-Distance Networks”.
       IEICE Trans. Commun., Vol.E89-B, No.4, pp. 1273-1283, Apr. 2006.
[5]    M. Weigle, P. Sharma and J. Freeman. “Performance of Competing High-Speed TCP Flows”. Networking 2006, LNCS 3976, pp.
       476-487, 2006.
[6]    S. Floyd. “High-Speed TCP for Large Congestion Windows”. RFC 3649, Experimental, Dec. 2003.
[7]    T. Kelly. “Scalable TCP : Improving Performance in High-Speed Wide Area Networks”. In Proceedings of PFLDnet, Geneva,
       Switzerland, Feb. 2003.
[8]    L. Xu, K. Harfoush, and I. Rhee. “Binary Increase Congestion Control for Fast, Long Distance Networks”. In Proceedings of IEE E
       INFOCOM, Hong Kong, Mar. 2004.
[9]    I. Rhee and L. Xu. “CUBIC: A New TCP-Friendly High-Speed TCP Variant”. In Proceedings of PFLDnet, Lyon, France, Feb.
       2005.
[10]   R. N. Shorten and D. J. Leith. “H-TCP : TCP for high-speed and long-distance networks”. In Proceedings of PFLDnet, Argonne,
       Feb. 2004.
[11]   S. Liu, T. Basar and R. Srikant.,"TCP-Illinois : A Loss- and Delay-based Congestion Control Algorithm for High-Speed Networks",
       Performance Evaluation, 65(6-7) : 417-440, Mar. 2008.
[12]   A. Baiocchi, A. P. Castellani and F. Vacirca. “YeAH-TCP: Yet Another Highspeed TCP”. PFLDnet, Roma, Italy, Feb. 2007.
[13]   J. Semke, J. Mahdavi, and M. Mathis. "Automatic TCP Buffer Tuning", Computer Communications Review, a publication of ACM
       SIGCOMM, Vol. 28, No. 4, Oct. 1998.
[14]   R. Mbarek, M. T. BenOthman and S. Nasri. “Performance Evaluation of Competing High-Speed TCP Protocols”. IJCSNS
       International Journal of Computer Science and Network Security, VOL.8 No.6, pp. 99-105, June 2008.
[15]   R. Jain. “Congestion Control and Traffic Management in ATM Networks : Recent Advances and A Survey”. Computer networks
       and ISDN Systems, Nov. 1995.

Authors
                M. Mohamed Ali Mani received his M.S degree from ISITCOM, Hammam Sousse, Sousse University Tunisia, in 2011.
                He is currently a lecturer in the Department of Computer Science in ISTLS in the same University. His research interests
                lie in the general area of computer networks, including high speed transports protocols, flow control, congestion control in
                high-speed networks and wireless networks.

                Dr. Rachid Mbarek received his Ph.D from the College of Engineering (ENIS), Sfax University, Tunisia, received his
                M.Sc. degree in Computer Engineering in 2003 from the same University. He is currently a Lecturer in the Department of
                Telecommunication in the ISITCOM at Sousse University, Tunisia. His research interests lie in the general area of
                computer communication networks, including high-speed transports protocols, flow control and congestion control in
                high-speed networks, network performance analysis, peer to peer networking.



                                                     www.iosrjournals.org                                                       19 | Page

More Related Content

What's hot

Chapter2
Chapter2Chapter2
Chapter2
Eshwar Prasad
 
Cubic
CubicCubic
Cubic
deawoo Kim
 
Adaptive Linear Solvers and Eigensolvers
Adaptive Linear Solvers and EigensolversAdaptive Linear Solvers and Eigensolvers
Adaptive Linear Solvers and Eigensolvers
inside-BigData.com
 
05 directnets errors
05 directnets errors05 directnets errors
05 directnets errors
jyang1983
 
1568973267 effect of multi-tone
1568973267 effect of multi-tone1568973267 effect of multi-tone
1568973267 effect of multi-tone
University of Technology
 
Tcp congestion control (1)
Tcp congestion control (1)Tcp congestion control (1)
Tcp congestion control (1)
Abdo sayed
 
Investigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion ControlInvestigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion Control
Michele Weigle
 
Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...
Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...
Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...
Andrea Tassi
 
CCDT(client connection)MQ.docx
CCDT(client connection)MQ.docxCCDT(client connection)MQ.docx
CCDT(client connection)MQ.docx
sarvank2
 
Queue Manager both as sender and Receiver.docx
Queue Manager both as sender and Receiver.docxQueue Manager both as sender and Receiver.docx
Queue Manager both as sender and Receiver.docx
sarvank2
 
Sparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesSparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast Services
Andrea Tassi
 
Pilot Optimization and Channel Estimation for Multiuser Massive MIMO Systems
Pilot Optimization and Channel Estimation for Multiuser Massive MIMO SystemsPilot Optimization and Channel Estimation for Multiuser Massive MIMO Systems
Pilot Optimization and Channel Estimation for Multiuser Massive MIMO Systems
T. E. BOGALE
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
IJERD Editor
 
Project 5 report 5.13 pm
Project 5 report 5.13 pmProject 5 report 5.13 pm
Project 5 report 5.13 pm
Muhammad Harith Mohd Fauzi
 
Assignment 1 -_jasper_hatilima
Assignment 1 -_jasper_hatilimaAssignment 1 -_jasper_hatilima
Assignment 1 -_jasper_hatilima
Hatilima
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
NYversity
 
Transaction Timestamping in Temporal Databases
Transaction Timestamping in Temporal DatabasesTransaction Timestamping in Temporal Databases
Transaction Timestamping in Temporal Databases
Gera Shegalov
 

What's hot (17)

Chapter2
Chapter2Chapter2
Chapter2
 
Cubic
CubicCubic
Cubic
 
Adaptive Linear Solvers and Eigensolvers
Adaptive Linear Solvers and EigensolversAdaptive Linear Solvers and Eigensolvers
Adaptive Linear Solvers and Eigensolvers
 
05 directnets errors
05 directnets errors05 directnets errors
05 directnets errors
 
1568973267 effect of multi-tone
1568973267 effect of multi-tone1568973267 effect of multi-tone
1568973267 effect of multi-tone
 
Tcp congestion control (1)
Tcp congestion control (1)Tcp congestion control (1)
Tcp congestion control (1)
 
Investigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion ControlInvestigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion Control
 
Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...
Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...
Sleep Period Optimization Model For Layered Video Service Delivery Over eMBMS...
 
CCDT(client connection)MQ.docx
CCDT(client connection)MQ.docxCCDT(client connection)MQ.docx
CCDT(client connection)MQ.docx
 
Queue Manager both as sender and Receiver.docx
Queue Manager both as sender and Receiver.docxQueue Manager both as sender and Receiver.docx
Queue Manager both as sender and Receiver.docx
 
Sparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast ServicesSparse Random Network Coding for Reliable Multicast Services
Sparse Random Network Coding for Reliable Multicast Services
 
Pilot Optimization and Channel Estimation for Multiuser Massive MIMO Systems
Pilot Optimization and Channel Estimation for Multiuser Massive MIMO SystemsPilot Optimization and Channel Estimation for Multiuser Massive MIMO Systems
Pilot Optimization and Channel Estimation for Multiuser Massive MIMO Systems
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Project 5 report 5.13 pm
Project 5 report 5.13 pmProject 5 report 5.13 pm
Project 5 report 5.13 pm
 
Assignment 1 -_jasper_hatilima
Assignment 1 -_jasper_hatilimaAssignment 1 -_jasper_hatilima
Assignment 1 -_jasper_hatilima
 
Computer network (13)
Computer network (13)Computer network (13)
Computer network (13)
 
Transaction Timestamping in Temporal Databases
Transaction Timestamping in Temporal DatabasesTransaction Timestamping in Temporal Databases
Transaction Timestamping in Temporal Databases
 

Viewers also liked

B0340710
B0340710B0340710
B0340710
iosrjournals
 
A0350107
A0350107A0350107
A0350107
iosrjournals
 
G0314043
G0314043G0314043
G0314043
iosrjournals
 
C0351725
C0351725C0351725
C0351725
iosrjournals
 
F0112937
F0112937F0112937
F0112937
iosrjournals
 
C0121116
C0121116C0121116
C0121116
iosrjournals
 
D0362035
D0362035D0362035
D0362035
iosrjournals
 
B0110508
B0110508B0110508
B0110508
iosrjournals
 
G0333946
G0333946G0333946
G0333946
iosrjournals
 

Viewers also liked (9)

B0340710
B0340710B0340710
B0340710
 
A0350107
A0350107A0350107
A0350107
 
G0314043
G0314043G0314043
G0314043
 
C0351725
C0351725C0351725
C0351725
 
F0112937
F0112937F0112937
F0112937
 
C0121116
C0121116C0121116
C0121116
 
D0362035
D0362035D0362035
D0362035
 
B0110508
B0110508B0110508
B0110508
 
G0333946
G0333946G0333946
G0333946
 

Similar to B0311219

Performance Evaluation of High Speed Congestion Control Protocols
Performance Evaluation of High Speed Congestion Control  ProtocolsPerformance Evaluation of High Speed Congestion Control  Protocols
Performance Evaluation of High Speed Congestion Control Protocols
IOSR Journals
 
Tcp traffic control and red ecn
Tcp traffic control and red ecnTcp traffic control and red ecn
Tcp traffic control and red ecn
Abhishek Kesharwani
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
Kathirvel Ayyaswamy
 
Boosting the Performance of Nested Spatial Mapping with Unequal Modulation in...
Boosting the Performance of Nested Spatial Mapping with Unequal Modulation in...Boosting the Performance of Nested Spatial Mapping with Unequal Modulation in...
Boosting the Performance of Nested Spatial Mapping with Unequal Modulation in...
Ealwan Lee
 
Course on TCP Dynamic Performance
Course on TCP Dynamic PerformanceCourse on TCP Dynamic Performance
Course on TCP Dynamic Performance
Javier Arauz
 
Tcp congestion control
Tcp congestion controlTcp congestion control
Tcp congestion control
Abdo sayed
 
TCP_Congestion_Control.ppt
TCP_Congestion_Control.pptTCP_Congestion_Control.ppt
TCP_Congestion_Control.ppt
19UCSA032ASANJAYKUMA
 
04030038 proposal presentation
04030038 proposal presentation04030038 proposal presentation
04030038 proposal presentation
Sanjay Kikani
 
DCTcp
DCTcpDCTcp
tcp congestion .pptx
tcp congestion .pptxtcp congestion .pptx
tcp congestion .pptx
ECE01AJAYS
 
Tcp congestion avoidance
Tcp congestion avoidanceTcp congestion avoidance
Tcp congestion avoidance
Ahmed Kamel Taha
 
Transport layer
Transport layerTransport layer
Transport layer
Jinank Jain
 
TCP Traffic Control Chapter12
TCP Traffic Control Chapter12TCP Traffic Control Chapter12
TCP Traffic Control Chapter12
daniel ayalew
 
Improvement of Congestion window and Link utilization of High Speed Protocols...
Improvement of Congestion window and Link utilization of High Speed Protocols...Improvement of Congestion window and Link utilization of High Speed Protocols...
Improvement of Congestion window and Link utilization of High Speed Protocols...
IOSR Journals
 
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networksEmploying non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
journalBEEI
 
Fairness in Transfer Control Protocol for Congestion Control in Multiplicativ...
Fairness in Transfer Control Protocol for Congestion Control in Multiplicativ...Fairness in Transfer Control Protocol for Congestion Control in Multiplicativ...
Fairness in Transfer Control Protocol for Congestion Control in Multiplicativ...
International Journal of Engineering Inventions www.ijeijournal.com
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcp
samarai_apoc
 
8
88
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 
TCP congestion control
TCP congestion controlTCP congestion control
TCP congestion control
Shubham Jain
 

Similar to B0311219 (20)

Performance Evaluation of High Speed Congestion Control Protocols
Performance Evaluation of High Speed Congestion Control  ProtocolsPerformance Evaluation of High Speed Congestion Control  Protocols
Performance Evaluation of High Speed Congestion Control Protocols
 
Tcp traffic control and red ecn
Tcp traffic control and red ecnTcp traffic control and red ecn
Tcp traffic control and red ecn
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Boosting the Performance of Nested Spatial Mapping with Unequal Modulation in...
Boosting the Performance of Nested Spatial Mapping with Unequal Modulation in...Boosting the Performance of Nested Spatial Mapping with Unequal Modulation in...
Boosting the Performance of Nested Spatial Mapping with Unequal Modulation in...
 
Course on TCP Dynamic Performance
Course on TCP Dynamic PerformanceCourse on TCP Dynamic Performance
Course on TCP Dynamic Performance
 
Tcp congestion control
Tcp congestion controlTcp congestion control
Tcp congestion control
 
TCP_Congestion_Control.ppt
TCP_Congestion_Control.pptTCP_Congestion_Control.ppt
TCP_Congestion_Control.ppt
 
04030038 proposal presentation
04030038 proposal presentation04030038 proposal presentation
04030038 proposal presentation
 
DCTcp
DCTcpDCTcp
DCTcp
 
tcp congestion .pptx
tcp congestion .pptxtcp congestion .pptx
tcp congestion .pptx
 
Tcp congestion avoidance
Tcp congestion avoidanceTcp congestion avoidance
Tcp congestion avoidance
 
Transport layer
Transport layerTransport layer
Transport layer
 
TCP Traffic Control Chapter12
TCP Traffic Control Chapter12TCP Traffic Control Chapter12
TCP Traffic Control Chapter12
 
Improvement of Congestion window and Link utilization of High Speed Protocols...
Improvement of Congestion window and Link utilization of High Speed Protocols...Improvement of Congestion window and Link utilization of High Speed Protocols...
Improvement of Congestion window and Link utilization of High Speed Protocols...
 
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networksEmploying non-orthogonal multiple access scheme in UAV-based wireless networks
Employing non-orthogonal multiple access scheme in UAV-based wireless networks
 
Fairness in Transfer Control Protocol for Congestion Control in Multiplicativ...
Fairness in Transfer Control Protocol for Congestion Control in Multiplicativ...Fairness in Transfer Control Protocol for Congestion Control in Multiplicativ...
Fairness in Transfer Control Protocol for Congestion Control in Multiplicativ...
 
Congestion control in tcp
Congestion control in tcpCongestion control in tcp
Congestion control in tcp
 
8
88
8
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
TCP congestion control
TCP congestion controlTCP congestion control
TCP congestion control
 

More from iosrjournals

I0114549
I0114549I0114549
I0114549
iosrjournals
 
H0124246
H0124246H0124246
H0124246
iosrjournals
 
H0114044
H0114044H0114044
H0114044
iosrjournals
 
G0145458
G0145458G0145458
G0145458
iosrjournals
 
G0135059
G0135059G0135059
G0135059
iosrjournals
 
G0123541
G0123541G0123541
G0123541
iosrjournals
 
G0113839
G0113839G0113839
G0113839
iosrjournals
 
F0144153
F0144153F0144153
F0144153
iosrjournals
 
F0134249
F0134249F0134249
F0134249
iosrjournals
 
F0122934
F0122934F0122934
F0122934
iosrjournals
 
E0143640
E0143640E0143640
E0143640
iosrjournals
 
E0133641
E0133641E0133641
E0133641
iosrjournals
 
E0112128
E0112128E0112128
E0112128
iosrjournals
 
D0142635
D0142635D0142635
D0142635
iosrjournals
 
D0133235
D0133235D0133235
D0133235
iosrjournals
 
D0121720
D0121720D0121720
D0121720
iosrjournals
 
D0111420
D0111420D0111420
D0111420
iosrjournals
 
C0141625
C0141625C0141625
C0141625
iosrjournals
 
C0132131
C0132131C0132131
C0132131
iosrjournals
 
B0140815
B0140815B0140815
B0140815
iosrjournals
 

More from iosrjournals (20)

I0114549
I0114549I0114549
I0114549
 
H0124246
H0124246H0124246
H0124246
 
H0114044
H0114044H0114044
H0114044
 
G0145458
G0145458G0145458
G0145458
 
G0135059
G0135059G0135059
G0135059
 
G0123541
G0123541G0123541
G0123541
 
G0113839
G0113839G0113839
G0113839
 
F0144153
F0144153F0144153
F0144153
 
F0134249
F0134249F0134249
F0134249
 
F0122934
F0122934F0122934
F0122934
 
E0143640
E0143640E0143640
E0143640
 
E0133641
E0133641E0133641
E0133641
 
E0112128
E0112128E0112128
E0112128
 
D0142635
D0142635D0142635
D0142635
 
D0133235
D0133235D0133235
D0133235
 
D0121720
D0121720D0121720
D0121720
 
D0111420
D0111420D0111420
D0111420
 
C0141625
C0141625C0141625
C0141625
 
C0132131
C0132131C0132131
C0132131
 
B0140815
B0140815B0140815
B0140815
 

Recently uploaded

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 

Recently uploaded (20)

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 

B0311219

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 1 (July-Aug. 2012), PP 13-19 www.iosrjournals.org Performance Evaluation of High Speed Congestion Control Protocols Mohamed Ali Mani and Rachid Mbarek ABSTRACT: Computer networks are facing several technological and scientific challenges. Among these challenges is congestion control. It limits the quantity of information input at a rate less important than that of the transmission one to ensure good performance as well as protect against overload and blocking of the network. Researchers have done a great deal of work on improving congestion control protocols, especially on high speed networks. In this paper, we will be studying the congestion control alongside low and high speed congestion control protocols. We will be also simulating, evaluating, and comparing seven of high speed congestion control protocols : Bic TCP, Cubic TCP, Hamilton TCP, HighSpeed TCP, Illinois TCP, Scalable TCP and YeAH TCP, with multiple flows. KEYWORDS: HIGH-SPEED, TCP PROTOCOLS, CONGESTION CONTROL, PERFORMANCE, MULTIPLE FLOWS. I. INTRODUCTION Due to the ease of finding information, data access and utilization by a simple mouse move in multimedia pages, Internet has become necessary in our daily lives. In fact, the number of Internet users is growing rapidly, and according to the ITU (International Telecommunication Union) it reached only 500 million users in the beginning of 2000s while it was 1.6 billion in 2008 to rise to the number of 2 billions in 2011. This increase must undergo a parallel development of both of hardware and software at the same time. Early, throughput was about 56 kbps, however, now we talk about Gigabit Internet aiming to meet the users’ needs mainly in astronomy and video conference fields. In Internet, there are some machines responsible for transmitting data packets, and other that take off these packets from the queue. If the sender machine sends a data packet rate much more important than the rate of the receiver, network congestion is produced, hence, a congestion control will limit the quantity of input information with a lower rate than the transmission one to guarantee a good performance as well as a network protection against overloading and blocking. The high number of high speed congestion control protocols led us to prepare this research work, which focuses on evaluating and comparing high speed congestion control protocols. This paper is organized as follows: In the second section we study the state of the art. In the third one, we present the architectures used as well as the curves and the performances evaluation for different high speed congestion control protocols. STATE OF THE ART Researchers have worked on the enhancement of high speed congestion control protocols. Practically every year, one or two protocols are implemented having for each one of them its own specific strengths and weaknesses. Recently, the research works are interested in evaluating the performance of these protocols by comparing among 2 to 5 protocols with 1 to 12 flows [1] [2] [3] [4] [5]. HS-TCP [6]: If the congestion window is low, HS-TCP behaves just like the standard TCP, once the congestion window exceeds the max_ssthresh, it rises in an aggressive way. The algorithm of HS-TCP is an AIMD Additive Increment cwnd = cwnd + a(cwnd) Multiplicative Decrement cwnd = (1- b(cwnd)) x cwnd, the values used for HSTCP are a(cwnd) in the interval of [1,72], b(cwnd) in the interval of [0.1,0.5] and low_window equals 38 packets. when cwnd is lower than low_window a(cwnd) = 1 and b(cwnd) = 0.5 thus the algorithm acts just like a standard TCP, in the case of a packet loss, the cwnd is reduced to 50%, when the cwnd reaches the high_window a(cwnd ) = 72 and b(cwnd)=1. If there is an acknowledgment: 1+β 𝑤1 = × cwnd cwnd < 𝑤1 2 𝑤1 = cwnd cwnd ≥ 𝑤1 w2 = cwnd Scalable TCP [7]: For this protocol the cwnd increases with 0.001, if a congestion is detected the cwnd reduces with 0.125 independently from the throughput and the packet size. This algorithm is a MIMD; Multiplicative www.iosrjournals.org 13 | Page
  • 2. Performance Evaluation Of High Speed Congestion Control Protocols Increase since the cwnd increases with 0.01 per acknowledgment, Therefore there is a total increase of 0.01 cwnd per RTT, and Multiplicative Decrease since the cwnd decreases with 0.125 per packet loss. BIC TCP [8]: uses a function that allows to have a rapid increase of cwnd when its value is far from the maximal threshold Smax and to slowly decrease when having a value close to w_1. cwnd = (1 – β) × cwnd With : β δ δ ≤ 1 and cwnd < w1 or w1 ≤ cwnd < w1 + β fα (δ, cwnd) = δ 1 < δ ≤ Smax and cwnd < w1 w1 β−1 β ≤ cwnd − w1 < Smax 1 − β Smax otherwise cwnd : Current congestion window Smax : Maximal threshold Smin : Minimal threshold Β : Decrease factor usually equals 0.875 CUBIC TCP [9]: The name CUBIC refers to the function of the congestion window increase which is cubic, when receiving an ACK: cwnd = C (T – K) ³ + Maxcwnd When having a packet loss: cwnd = β Maxcwnd With : Cwnd*:*Current congestion window C*:*Constant T*:*Duration of time since the last congestion Maxcwnd *:*Size of the last congestion window K*:* 3 Maxcwnd β/C HTCP [10]: uses Δ the duration since the last congestion rather than cwnd as information about the product delay bandwidth BDP. The increase parameter of AIMD (additive-increase/multiplicative-decrease) varies depending on Δ. It also depends on the value of RTT which has provoked the unfairness among the competitor flows with different RTTs. In case of receiving an ACK: 2 1−β f (Δ) cwnd = cwnd + cwndα In case of packet loss: cwnd = g β (B) × cwnd With : 1 Δ ≤ ΔL fα (Δ) = max fα Δ Tmin ,1 Δ > ΔL B K+1 – B(k) 0.5 B (K) > ΔB g β (B) = T min min T max ,0.8 otherwise cwnd*:*Current congestion window α*:*Increase parameter β*:*Decrease parameter Δ*:*Duration of time since the last congestion ΔL *:*Threshold to change the mode low speed to highspeed Tmin *:*Minimal duration of sending and receiving packets Tmax *:*Maximal duration of sending and receiving packets B K + 1 *:*Maximal throughput reached before a congestion fα Δ *=*1 +10 (Δ - ΔL ) + 0,25 (Δ - ΔL )² www.iosrjournals.org 14 | Page
  • 3. Performance Evaluation Of High Speed Congestion Control Protocols Illinois TCP [11] : Similar to standard TCP, Illinois-TCP increases the congestion window by using two parameters α and β, it is based on packet loss to define the congestion window value, however the values of α and β are not constant by using the delays. When receiving an ACK: α cwnd = cwnd + 𝑐𝑤𝑛𝑑 When losing packets: cwnd = (1- β) × cwnd With : α 𝑚𝑎𝑥 𝑑 𝑎 ≤ 𝑑1 α = 𝑓1 (𝑑 𝑎 ) = 𝑘1 𝑘2+ 𝑑 𝑎 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 β 𝑚𝑖𝑛 𝑑 𝑎 ≤ 𝑑2 β = 𝑓2 (𝑑 𝑎 ) = 𝑘3 + 𝑘4 𝑑 𝑎 𝑑2 < 𝑑 𝑎 < 𝑑3 β 𝑚𝑎𝑥 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 (𝑑 𝑚 − 𝑑 1 ) α 𝑚𝑖𝑛 α 𝑚𝑎𝑥 𝑘1 = * α 𝑚𝑎𝑥 − α 𝑚𝑖𝑛 (𝑑 𝑚 − 𝑑 1 ) α 𝑚𝑖𝑛 𝑘2 = α −α - 𝑑1 𝑚𝑎𝑥 𝑚𝑖𝑛 β 𝑚𝑖𝑛 𝑑 3 − β 𝑚𝑎𝑥 𝑑 2 β −β 𝑘3 = 𝑑3− 𝑑2 *𝑘4 = 𝑚𝑎𝑥 − 𝑑 𝑚𝑖𝑛 𝑑3 2 𝑘 𝑘 α 𝑚𝑖𝑛 = 𝑘 + 𝑑1 , α 𝑚𝑎𝑥 = 𝑘 +1 𝑑 2 𝑚𝑜𝑦 2 1 β 𝑚𝑖𝑛 = 𝑘3 + 𝑘4 𝑑2 , β 𝑚𝑎𝑥 =𝑘3 + 𝑘4 𝑑3 YeAH TCP [12] the algorithm starts with the Slow Start if cwnd < ssthresh and Scalable TCP once cwnd reaches the ssthresh. This protocol uses two modes, fast mode and slow mode. In the case of the fast one, the congestion window increases aggressively, for the second mode, the protocol behaves similarly to Reno TCP. The mode is chosen according to the queue status. Having RTTBASE the minimal RTT measured by the sender and RTTMIN the minimal RTT estimated from the current window. The estimated delay is: RTTqueue = RTTmin − RTTbase Thanks to this value, the number of packet on hold in the queue can be defined as follows: cwnd Q = RTTqueue × G = RTTqueue × RTTmin And G is the throughput. II. SIMULATION AND PERFORMANCES EVALUATION 2.1. Architecture In order to simulate the high speed congestion control protocols, we have chosen a topology (as shown in figure 1) composed of a sender and a receiver linked together with two routers by a line of 1Gbps of bandwidth, the delay is 1ms. The routers are linked to each other with a line having a bandwidth of 200Mbps, the delay is equal to 92 ms and the queue capacity is exactly 100 packets [13]. The MSS size equals 1460 bytes. The differences among the bandwidths capacities provoke congestion. Figure 1. Basic topology To evaluate the performances, we have used 2, 4, 6, 8, 10, 12, 16 and 24 identical flows (as shown in figure 2) with a link capacity of 1 Gbps and a delay of 1 ms. Figure 2. Topology with multiple flows 2.2. TCP-Friendly To test the TCP Friendly of different protocols, we have used a multiple flows topology with 4 input flows triggered at the same time. The results are shown in the following graphs: www.iosrjournals.org 15 | Page
  • 4. Performance Evaluation Of High Speed Congestion Control Protocols Figure 3.a. HS TCP : Throughput variation for 4 flows * Figure 3.b. Scalable TCP : Throughput variation for 4 flows Figure 3.c. Bic TCP : Throughput variation for 4 flows * Figure 3.d. Hamilton TCP : Throughput variation for 4 flows Figure 3.e. Cubic TCP : Throughput variation for 4 flows * Figure 3.f. Illinois TCP : Throughput variation for 4 flows Figure 3.g. YeAH TCP : Throughput variation for 4 flows www.iosrjournals.org 16 | Page
  • 5. Performance Evaluation Of High Speed Congestion Control Protocols 2.3. Efficiency The efficiency (rate of utilization or performance) of a network is the percentage of utilization [14]. Mathematically, it is the division of the average throughput by the optimal throughput. An efficient network uses the maximum of capacity. The following variable 𝑞 𝑖 is used as the average throughput of a flow i. The throughput of a source with n flows is: 𝑛 1 𝑄= 𝑞𝑖 𝑛 𝑖=1 We calculate the ratio between the average throughput and the optimal one which is the result of an ideal network performance: 𝑄 𝐸= 𝑄 𝑜𝑝𝑡 We have used these two topologies to simulate the seven protocols for 1, 2, 4, 6, 8, 10, 12, 16 and 24 flows. The efficiency calculus results are as mentioned in the following graph: Figure 4. Efficiency for different flow numbers 2.4. Fairness The fairness is the attempt of sharing the network capacities among users in a fair way. For the purpose of measuring the fairness, one method is used in the networks field which is called the Maximin law proposed by Raj Jain [15]. Here is the procedure that allows us to calculate the fairness of a proposed algorithm: Having an algorithm that provides the distribution vi = [x1 , x2 ,…,xn ] instead of the optimal distribution vopt = [x1,opt , x2,opt , … , xn,opt ]. We calculate the standardized distribution for every source as follows: 𝑥𝑖 𝑋𝑖 = 𝑥 𝑜𝑝𝑡 Thus, the fairness index F equals the sum of distributions squared and divided by the square of sums: 𝑛 ( 𝑖=1 𝑋 𝑖 )² 𝐹= 𝑛 𝑛 𝑖=1 𝑋 𝑖 ² We have used these two topologies to simulate the seven protocols for 1, 2, 4, 6, 8, 10, 12, 16 and 24 flows. The fairness calculus results are as mentioned in the following graph: Figure 5. Fairness for different flow numbers 2.5. Performance The performance of a congestion control algorithm is the relation between efficiency and fairness: Performance = α × E + (1 – α) × F With α = [0,1.. 0,9], E the efficiency and F the fairness. For the different algorithms, we have calculated the performances for a network rather efficient with α = 0,8, a network rather fair with α = 0,2 and a balanced network when α = 0,5. The results for 1, 2, 4, 6, 8, 10, 12, 16 and 24 flows are as follows: www.iosrjournals.org 17 | Page
  • 6. Performance Evaluation Of High Speed Congestion Control Protocols Figure 6.a. Performance for different flow numbers (α = 0,8) Figure 6.b. Performance for different flow numbers (α = 0,5) Figure 6.c. Performance for different flow numbers (α = 0,2) 2.6. Link Utilisation per RTT We varied the RTT for different congestion control algorithms to calculate the link utilization. The used RTT values are: 20 ms, 60 ms, 100 ms, 140 ms, 180 ms and 220 ms. We used the basic topology with only one flow; the results are described in the following graph: Figure 7. Link utilization for different RTTs 2.7. Link utilization for different queue sizes Certainly the queue size has an important impact on the efficiency of the network, but which algorithm benefits the more of this change? We varied the queue size for different congestion control algorithms to calculate the link utilization. The used sizes are: 50, 100, 150, 200, 250 and 300 packets. We used the basic topology with one flow, the results are as follows: Figure 8. Link utilization for different queue sizes III. CONCLUSIONS The high number of congestion control algorithms never satisfied the researchers. Since this field is always having changes and enhancements due to the users’ needs and the evolution of both of hardware and software in Telecommunications. Indeed, it is difficult to conceive an algorithm that gives satisfying results for all the architectures. www.iosrjournals.org 18 | Page
  • 7. Performance Evaluation Of High Speed Congestion Control Protocols During this research work, we simulated seven high speed congestion control protocols for 1, 2, 4, 6, 8, 10, 12, 16 and 24 flows. We evaluated their performances by calculating the efficiency, the fairness as well as the performance while varying the RTT and the queue size. Basing on the simulation and the high speed protocols performance evaluation, we can conclude that: • Some protocols perform well in some defined cases, but weak in others. • The network architecture has got an important impact on the protocols performance. • For 24 flows, all protocols are unfair. • For 24 flows, the protocols: Bic TCP, Cubic TCP, Hamilton TCP, Scalable TCP and YeAH TCP are efficient. • Scalable is not only TCP-friendly, but also selfish, since the first flow gets the most important throughput, and doesn’t leave its place for any other flow such as the case of Cubic TCP, Hamilton TCP and Illinois TCP. • The protocols Bic TCP, HighSpeed TCP and YeAH TCP are TCP-friendly • For low values of RTT, all the protocols use the network capacities in a bad way. • For low values of the queue size, Cubic TCP is the most efficient. • YeAH TCP and Illinois TCP give the best results while increasing the queue size. • Although his aggressiveness, YeAH TCP is quite TCP-friendly. It is also quite performant, but it doesn’t suit all the architectures. Further work is required to evaluate the performances of these protocols by using Relentless TCP which will be the topic for a multitude of research works in the near future, particularly to define if the protocols that have more stability and take more time before falling another time in a new congestion such as Cubic TCP and Illinois TCP in order to check if they will well exploit the law that forms the basis of Relentless TCP which is the reduction of the congestion window with the number of lost segments. It will be also interesting to create a model that changes dynamically the congestion control protocols used in terms of flow number to better exploit the network capacities as well as studying the QoS. REFERENCES [1] R. Mbarek, M. T. BenOthman and S. Nasri. “Fairness of High-Speed TCP Protocols with Different Flow Capacities”. Journal Of Networks, Vol. 4, No. 3, pp. 163-169, May 2009. [2] S. Hemminger. “TCP testing – Preventing global Internet warming”. LinuxConf Europe, Sep. 2007. [3] S. Ha, L. Le, I. Rhee and L. Xu. “Impact of Background Traffic on Performance of High-Speed TCP Variant Protocols”. The International Journal of Computer and Telecommunications Networking, Vol.51, May, 2007. [4] M. Nabeshima and K. Yata. “Performance Evaluation and Comparison of Transport Protocols for Fast Long-Distance Networks”. IEICE Trans. Commun., Vol.E89-B, No.4, pp. 1273-1283, Apr. 2006. [5] M. Weigle, P. Sharma and J. Freeman. “Performance of Competing High-Speed TCP Flows”. Networking 2006, LNCS 3976, pp. 476-487, 2006. [6] S. Floyd. “High-Speed TCP for Large Congestion Windows”. RFC 3649, Experimental, Dec. 2003. [7] T. Kelly. “Scalable TCP : Improving Performance in High-Speed Wide Area Networks”. In Proceedings of PFLDnet, Geneva, Switzerland, Feb. 2003. [8] L. Xu, K. Harfoush, and I. Rhee. “Binary Increase Congestion Control for Fast, Long Distance Networks”. In Proceedings of IEE E INFOCOM, Hong Kong, Mar. 2004. [9] I. Rhee and L. Xu. “CUBIC: A New TCP-Friendly High-Speed TCP Variant”. In Proceedings of PFLDnet, Lyon, France, Feb. 2005. [10] R. N. Shorten and D. J. Leith. “H-TCP : TCP for high-speed and long-distance networks”. In Proceedings of PFLDnet, Argonne, Feb. 2004. [11] S. Liu, T. Basar and R. Srikant.,"TCP-Illinois : A Loss- and Delay-based Congestion Control Algorithm for High-Speed Networks", Performance Evaluation, 65(6-7) : 417-440, Mar. 2008. [12] A. Baiocchi, A. P. Castellani and F. Vacirca. “YeAH-TCP: Yet Another Highspeed TCP”. PFLDnet, Roma, Italy, Feb. 2007. [13] J. Semke, J. Mahdavi, and M. Mathis. "Automatic TCP Buffer Tuning", Computer Communications Review, a publication of ACM SIGCOMM, Vol. 28, No. 4, Oct. 1998. [14] R. Mbarek, M. T. BenOthman and S. Nasri. “Performance Evaluation of Competing High-Speed TCP Protocols”. IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, pp. 99-105, June 2008. [15] R. Jain. “Congestion Control and Traffic Management in ATM Networks : Recent Advances and A Survey”. Computer networks and ISDN Systems, Nov. 1995. Authors M. Mohamed Ali Mani received his M.S degree from ISITCOM, Hammam Sousse, Sousse University Tunisia, in 2011. He is currently a lecturer in the Department of Computer Science in ISTLS in the same University. His research interests lie in the general area of computer networks, including high speed transports protocols, flow control, congestion control in high-speed networks and wireless networks. Dr. Rachid Mbarek received his Ph.D from the College of Engineering (ENIS), Sfax University, Tunisia, received his M.Sc. degree in Computer Engineering in 2003 from the same University. He is currently a Lecturer in the Department of Telecommunication in the ISITCOM at Sousse University, Tunisia. His research interests lie in the general area of computer communication networks, including high-speed transports protocols, flow control and congestion control in high-speed networks, network performance analysis, peer to peer networking. www.iosrjournals.org 19 | Page