The design philosophy of the DARPA internet protocols
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Analysis and simulation of a fair queueing algorithm
SIGCOMM '89 Symposium proceedings on Communications architectures & protocols
Modeling TCP throughput: a simple model and its empirical validation
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Promoting the use of end-to-end congestion control in the Internet
IEEE/ACM Transactions on Networking (TON)
Paris metro pricing for the internet
Proceedings of the 1st ACM conference on Electronic commerce
Approximate fairness through differential dropping
ACM SIGCOMM Computer Communication Review
Flow rate fairness: dismantling a religion
ACM SIGCOMM Computer Communication Review
The resource pooling principle
ACM SIGCOMM Computer Communication Review
Resource pricing and the evolution of congestion control
Automatica (Journal of IFAC)
Investigating the deployment and adoption of re-ECN
Proceedings of the Re-Architecting the Internet Workshop
Metering Re-ECN: performance evaluation and its applicability in cellular networks
Proceedings of the 23rd International Teletraffic Congress
UARA in edge routers: an effective approach to user fairness and traffic shaping
International Journal of Communication Systems
Hi-index | 0.00 |
Ideally, everyone should be free to use as much of the Internet resource pool as they can take. But, whenever too much load meets too little capacity, everyone's freedoms collide. We show that attempts to isolate users from each other have corrosive side-effects - discouraging mutually beneficial sharing of the resource pool and harming the Internet's evolvability. We describe an unusual form of traffic policing which only pushes back against those who use their freedom to limit the freedom of others. This offers a vision of how much better the Internet could be. But there are subtle aspects missing from the current Internet architecture that prevent this form of policing being deployed. This paper aims to shift the research agenda onto those issues, and away from earlier attempts to isolate users from each other.