Skip to main content
Top
Published in: Annals of Telecommunications 1-2/2011

01-02-2011

Towards end-host-based identification of competing protocols against TCP in a bottleneck link

Authors: Idris A. Rai, Abdul Serwadda

Published in: Annals of Telecommunications | Issue 1-2/2011

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Classical Transmission Control Protocol (TCP) designs have never considered the identity of the competing transport protocol as useful information to TCP sources in congestion control mechanisms. When competing against a TCP flow on a bottleneck link, a User Datagram Protocol (UDP) flow can unfairly occupy the entire link bandwidth and suffocate all TCP flows on the link. If it were possible for a TCP source to know the type of transport protocol that deprives it of link access, perhaps it would be better for the TCP source to react in a way which prevents total starvation. In this paper, we use coefficient of variation and power spectral density of throughput traces to identify the presence of UDP transport protocols that compete against TCP flows on bottleneck links. Our results show clear traits that differentiate the presence of competing UDP flows from TCP flows independent of round-trip times variations. Signatures that we identified include an increase in coefficient of variation whenever a competing UDP flow joins the bottleneck link for the first time, noisy spectral density representation of a TCP flow when competing against a UDP flow in the bottleneck link, and a dominant frequency with outstanding power in the presence of TCP competition only. In addition, the results show that signatures for congestion caused by competing UDP flows are different from signatures due to congestion caused by competing TCP flows regardless of their round-trip times. The results in this paper present the first steps towards development of more ’intelligent’ congestion control algorithms with added capability of knowing the identity of aggressor protocols against TCP, and subsequently using this additional information for rate control.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
We focus on constant bitrate UDP sources
 
Literature
3.
go back to reference Bisio I, Marchese M (2008) Performance evaluation of bandwidth allocation methods in a geostationary satellite channel in the presence of internet traffic. Comput Networks 52(1):275–291MATHCrossRef Bisio I, Marchese M (2008) Performance evaluation of bandwidth allocation methods in a geostationary satellite channel in the presence of internet traffic. Comput Networks 52(1):275–291MATHCrossRef
4.
go back to reference Chen Y, Hwang K, kwong Kwok Y (2005) Collaborative defense against periodic shrew ddos attacks in frequency domain. ACM Trans Inf Syst Secur (TISSEC), 3 May 2005 Chen Y, Hwang K, kwong Kwok Y (2005) Collaborative defense against periodic shrew ddos attacks in frequency domain. ACM Trans Inf Syst Secur (TISSEC), 3 May 2005
5.
go back to reference Cho S, Bettati R (2006) Use of competition detection in TCP for fair and effective utilization of network bandwidth. In: IEEE conference on local computer networks Cho S, Bettati R (2006) Use of competition detection in TCP for fair and effective utilization of network bandwidth. In: IEEE conference on local computer networks
6.
go back to reference Diot SB, Sridharan, A, Bhattacharyya S, Diot C, Guérin R, Jetcheva J, Taft N (2000) On the impact of aggregation on the performance of traffic aware routing. In: Proceedings of the 17th international teletraffic congress (ITC), Salvador da Bahia, Brazil, 2–7 December 2001 Diot SB, Sridharan, A, Bhattacharyya S, Diot C, Guérin R, Jetcheva J, Taft N (2000) On the impact of aggregation on the performance of traffic aware routing. In: Proceedings of the 17th international teletraffic congress (ITC), Salvador da Bahia, Brazil, 2–7 December 2001
7.
go back to reference Field AJ, Harder U, Harrison PG (2005) Measurement and modelling of self-similar traffic in computer networks. In: INFOCOM’05. IEEE Field AJ, Harder U, Harrison PG (2005) Measurement and modelling of self-similar traffic in computer networks. In: INFOCOM’05. IEEE
9.
go back to reference Floyd S, Kohler E (2003) Internet research needs better models. SIGCOMM Comput Commun Rev 33(1):29–34CrossRef Floyd S, Kohler E (2003) Internet research needs better models. SIGCOMM Comput Commun Rev 33(1):29–34CrossRef
10.
go back to reference Griffiths JD (1996) The coefficient of variation of queue size for heavy traffic. J Oper Res Soc 47(8):1071–1076MATH Griffiths JD (1996) The coefficient of variation of queue size for heavy traffic. J Oper Res Soc 47(8):1071–1076MATH
11.
go back to reference He X, Papadopoulos C, Heidemann J, Hussain A (2004) Spectral characteristics of saturated links. Tech. rep., University of Southern California, Computer Science Department He X, Papadopoulos C, Heidemann J, Hussain A (2004) Spectral characteristics of saturated links. Tech. rep., University of Southern California, Computer Science Department
12.
go back to reference He X, Papadopoulos C, Heidemann JS, Mitra U, Riaz U (2009) Remote detection of bottleneck links using spectral and statistical methods. Comput Networks 53(3):279–298MATHCrossRef He X, Papadopoulos C, Heidemann JS, Mitra U, Riaz U (2009) Remote detection of bottleneck links using spectral and statistical methods. Comput Networks 53(3):279–298MATHCrossRef
13.
go back to reference Hussain A, Heidemann J, Papadopoulos C (2003) A framework for classifying denial of service attacks. In: SIGCOMM ’03: Proceedings of the 2003 conference on Applications, techn ologies, architectures, and protocols for computer communications. ACM Press, New York, NY, USA. pp. 99–110. doi:10.1145/863955.863968 CrossRef Hussain A, Heidemann J, Papadopoulos C (2003) A framework for classifying denial of service attacks. In: SIGCOMM ’03: Proceedings of the 2003 conference on Applications, techn ologies, architectures, and protocols for computer communications. ACM Press, New York, NY, USA. pp. 99–110. doi:10.​1145/​863955.​863968 CrossRef
14.
go back to reference Kelly T (2003) Scalable TCP: improving performance in high speed wide area networks. ACM SIGCOMM Comput Commun Rev 33:83–91CrossRef Kelly T (2003) Scalable TCP: improving performance in high speed wide area networks. ACM SIGCOMM Comput Commun Rev 33:83–91CrossRef
16.
go back to reference Lin D, Morris R (1997) Dynamics of random early detection. In: ACM/SIGCOMM’97. pp. 127–137 Lin D, Morris R (1997) Dynamics of random early detection. In: ACM/SIGCOMM’97. pp. 127–137
17.
go back to reference Moore AW, Zuev D (2005) Internet traffic classification using Bayesian analysis techniques. In: In ACM SIGMETRICS. pp. 50–60 Moore AW, Zuev D (2005) Internet traffic classification using Bayesian analysis techniques. In: In ACM SIGMETRICS. pp. 50–60
18.
go back to reference Naoki MM, Wakamiya N, Murata M, Miyahara H (2000) Implementation of video transfer with TCP-friendly rate control protocol. In: Proceedings of International Technical Conference on Circuits/Systems, Computers and Communications. pp. 117–120 Naoki MM, Wakamiya N, Murata M, Miyahara H (2000) Implementation of video transfer with TCP-friendly rate control protocol. In: Proceedings of International Technical Conference on Circuits/Systems, Computers and Communications. pp. 117–120
19.
go back to reference Oie Y, Sawashima H, Sunahara H, Hori Y (1997) Characteristics of UDP packet loss: effect of TCP traffic. In: Inet 97 Oie Y, Sawashima H, Sunahara H, Hori Y (1997) Characteristics of UDP packet loss: effect of TCP traffic. In: Inet 97
20.
go back to reference Partridge C, Cousins D, Jackson AW, Krishnan R, Saxena T, Strayer WT (2002) Using signal processing to analyze wireless data traffic. In: Proc. ACM workshop on Wireless Security. pp. 67–76 Partridge C, Cousins D, Jackson AW, Krishnan R, Saxena T, Strayer WT (2002) Using signal processing to analyze wireless data traffic. In: Proc. ACM workshop on Wireless Security. pp. 67–76
21.
go back to reference Rai IA (2004) Qos support in edge routers. Ph.D. thesis, Institut Eurecom Rai IA (2004) Qos support in edge routers. Ph.D. thesis, Institut Eurecom
22.
go back to reference Rai IA, Urvoy-Keller G, Biersack EW (2004) Las scheduling to avoid bandwidth hogging in heterogeneous TCP networks, 3079/2004(1611–3349). Springer, Berlin. pp. 179–190 Rai IA, Urvoy-Keller G, Biersack EW (2004) Las scheduling to avoid bandwidth hogging in heterogeneous TCP networks, 3079/2004(1611–3349). Springer, Berlin. pp. 179–190
23.
go back to reference Rejaie R, Handley M, Estrin D (1999) Rap: an end-to-end rate-based congestion control mechanism for realtime streams in the internet. In: INFOCOM. pp. 1337–1345 Rejaie R, Handley M, Estrin D (1999) Rap: an end-to-end rate-based congestion control mechanism for realtime streams in the internet. In: INFOCOM. pp. 1337–1345
24.
go back to reference To SBA, Roughan M, Sen S, Spatscheck O, Duffield N (2004) Class-of-service mapping for QOS: a statistical. In: In IMC’04. pp. 135–148 To SBA, Roughan M, Sen S, Spatscheck O, Duffield N (2004) Class-of-service mapping for QOS: a statistical. In: In IMC’04. pp. 135–148
25.
go back to reference Villamizar CCS (1994) High performance TCP in ansnet. ACM Comput Commun Rev 24(5):45–60CrossRef Villamizar CCS (1994) High performance TCP in ansnet. ACM Comput Commun Rev 24(5):45–60CrossRef
26.
go back to reference Widmer J, Denda R, Mauve M (2001) A survey on TCP-friendly congestion control. IEEE Netw 15:28–37CrossRef Widmer J, Denda R, Mauve M (2001) A survey on TCP-friendly congestion control. IEEE Netw 15:28–37CrossRef
Metadata
Title
Towards end-host-based identification of competing protocols against TCP in a bottleneck link
Authors
Idris A. Rai
Abdul Serwadda
Publication date
01-02-2011
Publisher
Springer-Verlag
Published in
Annals of Telecommunications / Issue 1-2/2011
Print ISSN: 0003-4347
Electronic ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-010-0204-0

Other articles of this Issue 1-2/2011

Annals of Telecommunications 1-2/2011 Go to the issue

Acknowledgments

List of 2010 reviewers