skip to main content
10.1145/52324.52356acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

Congestion avoidance and control

Published: 01 August 1988 Publication History

Abstract

In October of '86, the Internet had the first of what became a series of 'congestion collapses'. During this period, the data throughput from LBL to UC Berkeley (sites separated by 400 yards and three IMP hops) dropped from 32 Kbps to 40 bps. Mike Karels1 and I were fascinated by this sudden factor-of-thousand drop in bandwidth and embarked on an investigation of why things had gotten so bad. We wondered, in particular, if the 4.3BSD (Berkeley UNIX) TCP was mis-behaving or if it could be tuned to work better under abysmal network conditions. The answer to both of these questions was “yes”.
Since that time, we have put seven new algorithms into the 4BSD TCP:
round-trip-time variance estimation
exponential retransmit timer backoff
slow-start
more aggressive receiver ack policy
dynamic window sizing on congestion
Karn's clamped retransmit backoff
fast retransmit Our measurements and the reports of beta testers suggest that the final product is fairly good at dealing with congested conditions on the Internet.
This paper is a brief description of (i) - (v) and the rationale behind them. (vi) is an algorithm recently developed by Phil Karn of Bell Communications Research, described in [KP87]. (viii) is described in a soon-to-be-published RFC.
Algorithms (i) - (v) spring from one observation: The flow on a TCP connection (or ISO TP-4 or Xerox NS SPP connection) should obey a 'conservation of packets' principle. And, if this principle were obeyed, congestion collapse would become the exception rather than the rule. Thus congestion control involves finding places that violate conservation and fixing them.
By 'conservation of packets' I mean that for a connection 'in equilibrium', i.e., running stably with a full window of data in transit, the packet flow is what a physicist would call 'conservative': A new packet isn't put into the network until an old packet leaves. The physics of flow predicts that systems with this property should be robust in the face of congestion. Observation of the Internet suggests that it was not particularly robust. Why the discrepancy?
There are only three ways for packet conservation to fail:
The connection doesn't get to equilibrium, or
A sender injects a new packet before an old packet has exited, or
The equilibrium can't be reached because of resource limits along the path. In the following sections, we treat each of these in turn.

References

[1]
David J. Aldous. Ultimate instability of exponential back-off protocol for acknowledgment based transmission control of random access communication channels. IEEE Transactions on Information Theory, IT- 33(2), March 1987.]]
[2]
David Clark. Window and Acknowlegement Strategy in TCP. ARPANET Working Group Requests for Comment, DDN Network Information Center, SRI International Menlo Park, CA, July 1982. RFC-813.]]
[3]
Stephen William Edge. An adaptive timeout algorithm for retransmission across a packet switching network. In Proceedings of SIGCOMM '83. ACM, March 1983.]]
[4]
William Feller Probability Theory and its Applications, volume II. John Wiley & Sons, second edition, 1971.]]
[5]
Internet Engineering Task Force meeting, Boston, MA, April 1987. Proceedings available as NIC document IETF-87/2P from DDN Network Information Center, SRI International, Menlo Park, CA.]]
[6]
Internet Engineering Task Force meeting, San Diego, CA, March 1988. Proceedings available as NIC document IETF-88/?P from DDN Network Information Center, $RI international, Menlo Park, CA.]]
[7]
International Organization for Standardization. ISO International Standard 8473, Information Processing Systems-- Open Systems Interconnection -Connectionless-mode Network Service Protocol Specification, March 1986.]]
[8]
Raj Jain. Divergence of timeout algorithms for packet retransmissions. In Proceedings Fifth Annual International Phoenix Conference on Computers and Communications, Scottsdale, AZ, March 1986.]]
[9]
RajJain. A timeout-based congestion control scheme for window flow-controlled networks. IEEE Journal on Selected Areas in Communications, SAC-4(7), October 1986.]]
[10]
Raj Jain, K.K. Ramakrishnan, and Dah-Ming Chiu. Congestion avoidance in computer networks with a connectionless network layer. Technical Report DEC-TR-506, Digital Equipment Corporation, August 1987.]]
[11]
Leonard Kleinrock. Queueing Systems, volume II. John Wiley & Sons, 1976.]]
[12]
Charley Kline. Supercomputers on the Internet: A case study. In Proceedings of SIGCOMM '87. ACM, August 1987.]]
[13]
Phil Karn and Craig Partridge. Estimating roundtrip times in reliable transport protocols. In Proceedings of SIGCOMM '87. ACM, August 1987.]]
[14]
Lennart Ljung and Torsten SSderstrSm. Theory and Practice of Recursive Identification. MIT Press, 1983.]]
[15]
David Mills. Internet Delay Experiments. ARPANET Working Group Requests for Comment, DDN Network Information Center, SRI International, Menlo Park, CA, December 1983. RFC-889.]]
[16]
John Nagle. Congestion Control in IP/TCP Internetworks. ARPANET Working Group Requests for Comment, DDN Network Information Center, SRI International, Menlo Park, CA, January 1984. RFC-896.]]
[17]
W. Prue and J. Postel. Something A Host Could Do with Source Quench. ARPANti'r Working Group Requests for Comment, DDN Network Information Center, SRI International, Menlo Park, CA, July 1987. RFC- 1016.]]
[18]
Jon Postel, editor. Transmission Control Protocol Specification. ARP^NET Working Group Requests for Comment, DDN Network Information Center, SRI International, Menlo Park, CA, September 1981. RFC-793.]]
[19]
Lixia Zhang. Why TCP timers don't work well. In Proceedings of StGCOMM '86. ACM, August 1986.]]

Cited By

View all
  • (2024)Athena: Seeing and Mitigating Wireless Impact on Video Conferencing and BeyondProceedings of the 23rd ACM Workshop on Hot Topics in Networks10.1145/3696348.3696889(103-110)Online publication date: 18-Nov-2024
  • (2024)POSTER: Expanding the Design Space for in-Network Congestion Control on the InternetProceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos10.1145/3672202.3673733(42-44)Online publication date: 4-Aug-2024
  • (2024)An Empirical Study of 5G: Effect of Edge on Transport Protocol and Application PerformanceIEEE Transactions on Mobile Computing10.1109/TMC.2023.327470823:4(3172-3186)Online publication date: Apr-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGCOMM '88: Symposium proceedings on Communications architectures and protocols
August 1988
339 pages
ISBN:0897912799
DOI:10.1145/52324
  • Editor:
  • Vinton Cerf
  • cover image ACM SIGCOMM Computer Communication Review
    ACM SIGCOMM Computer Communication Review  Volume 18, Issue 4
    August 1988
    338 pages
    ISSN:0146-4833
    DOI:10.1145/52325
    Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 1988

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SIGCOMM88
Sponsor:
SIGCOMM88: Communication Architecture and Protocols
August 16 - 18, 1988
California, Stanford, USA

Acceptance Rates

Overall Acceptance Rate 462 of 3,389 submissions, 14%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,926
  • Downloads (Last 6 weeks)280
Reflects downloads up to 29 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Athena: Seeing and Mitigating Wireless Impact on Video Conferencing and BeyondProceedings of the 23rd ACM Workshop on Hot Topics in Networks10.1145/3696348.3696889(103-110)Online publication date: 18-Nov-2024
  • (2024)POSTER: Expanding the Design Space for in-Network Congestion Control on the InternetProceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos10.1145/3672202.3673733(42-44)Online publication date: 4-Aug-2024
  • (2024)An Empirical Study of 5G: Effect of Edge on Transport Protocol and Application PerformanceIEEE Transactions on Mobile Computing10.1109/TMC.2023.327470823:4(3172-3186)Online publication date: Apr-2024
  • (2024)TRCC: Transferable Congestion Control With Reinforcement LearningIEEE Internet of Things Journal10.1109/JIOT.2023.329237111:2(2273-2285)Online publication date: 15-Jan-2024
  • (2024)Congestion Control in Wi-Fi Networks—State of the Art, Performance Evaluation, and Key Research DirectionsIEEE Access10.1109/ACCESS.2024.342527112(94972-94989)Online publication date: 2024
  • (2023)Formation of Innovative Algorithm for High Speed Protocol using Network SimulatorJournal of Information, Communication and Intelligence Systems10.33193/JICIS.1.2.2023.61:2Online publication date: 15-Aug-2023
  • (2023)Green With EnvyProceedings of the 22nd ACM Workshop on Hot Topics in Networks10.1145/3626111.3628200(220-228)Online publication date: 28-Nov-2023
  • (2023)Harnessing ML For Network Protocol AssessmentProceedings of the 22nd ACM Workshop on Hot Topics in Networks10.1145/3626111.3628182(213-219)Online publication date: 28-Nov-2023
  • (2023)Computers Can Learn from the Heuristic Designs and Master Internet Congestion ControlProceedings of the ACM SIGCOMM 2023 Conference10.1145/3603269.3604838(255-274)Online publication date: 10-Sep-2023
  • (2023)Supporting Smart Farming through Bandwidth Adaptation in Satellite CommunicationsProceedings of the 2023 ACM Conference on Information Technology for Social Good10.1145/3582515.3609520(74-81)Online publication date: 6-Sep-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media