TCP/IP illustrated (vol. 1): the protocols
TCP/IP illustrated (vol. 1): the protocols
Random early detection gateways for congestion avoidance
IEEE/ACM Transactions on Networking (TON)
TCP and explicit congestion notification
ACM SIGCOMM Computer Communication Review
TCP/IP illustrated (vol. 2): the implementation
TCP/IP illustrated (vol. 2): the implementation
Wide area traffic: the failure of Poisson modeling
IEEE/ACM Transactions on Networking (TON)
Evaluation of TCP Vegas: emulation and experiment
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Dynamics of random early detection
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Controlling high bandwidth aggregates in the network
ACM SIGCOMM Computer Communication Review
Guest Editors' Introduction: Scalable Internet Services
IEEE Internet Computing
Network Systems Design Using Network Processors
Network Systems Design Using Network Processors
Computer Communications
IEEE Network: The Magazine of Global Internetworking
Optimal anticipative congestion control of flows with time-varying input stream
Performance Evaluation
Hi-index | 0.24 |
Recently, we introduced a new congestion signaling method called ACK spoofing, which offers significant benefits over existing methods, such as packet dropping and Explicit Congestion Notification (ECN). Since ACK spoofing requires the router to create a 'short circuit' signaling path, by matching marked data packets in a congested buffer with ACK packets belonging to the same flow that are traveling in the opposite direction, the focus of this paper is evaluating the feasibility of reverse flow matching. First, we study the behavior of individual flows from real bi-directional Internet traces to show that ACK spoofing has the potential to significantly reduce the signaling latency for Internet core routers. We then show that reverse flow matching can be implemented at reasonable cost, using essentially the same hardware as the packet filtering logic commonly employed in Layer 2 transparent bridges. Finally, we show that this architecture can be scaled to accommodate worst-case traffic patterns on multi-gigabit links that would render ordinary route caching algorithms completely ineffective.