Computer Science ›› 2022, Vol. 49 ›› Issue (2): 321-328.doi: 10.11896/jsjkx.201200266

• Computer Network • Previous Articles     Next Articles

BBR Unilateral Adaptation Algorithm for Improving Empty Window Phenomenon in STARTUP Phase

MA Li-wen, ZHOU Ying   

  1. College of Automation & College of Artificial Intelligence, Nanjing University of Posts, Telecommunications, Nanjing 210023, China
  • Received:2020-12-31 Revised:2021-06-04 Online:2022-02-15 Published:2022-02-23
  • About author:MA Li-wen,born in 1996,postgraduate,is a member of China Computer Federation.Her main research interests include computer network and network programming.
    ZHOU Ying,born in 1978,Ph.D,asso-ciate professor.Her main research in-terests include networked control system and so on.
  • Supported by:
    National Natural Science Foundation of China(62073172).

Abstract: In order to solve the problem of delay oscillation and empty window caused by the bottleneck bandwidth and round-trip time(BBR) congestion control algorithm in the STARTUP phase due to not receiving the acknowledge character(ACK) in the campus network,the BBR unilateral adaptation algorithm is proposed.The algorithm only runs on the sender,and it is not restricted by network protocols and upper-layer applications.By improving the weighting coefficient of the delay estimator,we design the instantaneous average deviation estimator of the delay and use the estimation result as the oscillation smoothing factor of the delay estimator to improve the ability of the delay estimator to deal with severe delay jitter.To solve the inevitable empty window problem and sequence number wraparound as much as possible,a flow state machine and a STARTUP state machine are designed at the sending end to maintain a high link throughput.According to the specific transmission situation,the traffic is divided into 6 states:new,blocked,waiting,time_waiting,running,terminated,and according to the traffic feedback,the transmission performance of the STARTUP stage is divided into 3 states:GOOD,NORMAL,BAD.Experimental results show that the improved BBR has better transmission performance in the STARTUP phase than the original BBR algorithm and is better than the passive congestion control algorithm (Reno,CUBIC) currently.

Key words: Flow state machine, Instantaneous average deviation, Oscillation smoothing factor, STARTUP state machine, Time delay estimator

CLC Number: 

  • TP393
[1]FAN Z F,LI S,ZHANG D.SDN data center network congestion control algorithm based on traffic scheduling[J].Computer Science,2017,44(S1):266-269,273.
[2]WANG H H,ZHOU Y W,LIU J B.Hybrid-based routing algorithm for network congestion control in LLN[J].Computer Science,2019,46(6):107-111.
[3]NEAL C,CHENG Y C,STEPHEN G,et al.BBR:congestion-based congestion control[J].Communications of the ACM,2017,60(2):58-66.
[4]ZHANG H,ZHU H,XIA Y,et al.Performance Analysis ofBBR Congestion Control Protocol Based on NS3[C]//2019 Se-venth International Conference on Advanced Cloud and Big Data (CBD).Suzhou:IEEE CS CPS,2019:363-368.
[5]JAMES G,KATHLEEN N.Bufferbloat:dark buffers in the Internet[J].Communications of the ACM,2012,55(1):57-65.
[6]HORIE Y,THI D,NGUYEN A,et al.A Comparison of Con-gestion Control Algorithms in Emulated Wi-Fi Networks[C]//2020 International Conference on Information and Communication Technology Convergence (ICTC).Guayaquil:Association for Computing Machinery,2020:305-310.
[7]KANAYA T,TABATA N,YAMAGUCHI S.A Study on Performance of CUBIC TCP and TCP BBR in 5G Environment[C]//2020 IEEE 3rd 5G World Forum (5GWF).Bangalore:IEEE Press,2020:508-513.
[8]SASAKI K,YAMAGUCHI S.A Study on Bottleneck Band-width Estimation Based onAcknowledge Reception on TCP BBR[C]//2020 IEEE 44th Annual Computers,Software,and Applications Conference (COMPSAC).Madrid:IEEE Computer Society,2020:1107-1108.
[9]NEIL A,MATTEO V,ANDRIUS A,et al.Mind the delay:the adverse effects of delay-based TCP on HTTP[C]//Proceedings of the 16th International Conference on emerging Networking Experiments and Technologies(CoNEXT '20).New York:Asso-ciation for Computing Machinery,2020:364-370.
[10]ZAD D,AHMED F,SHARMA P,et al.Homa:An Efficient Topology and Route Management Approach in SD-WAN Overlays[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications.Beijing:IEEE Press,2020:2351-2360.
[11]LI Y L,MIAO R,LIU H Q,et al.HPCC:high precision congestion control[C]//Proceedings of the ACM Special Interest Group on Data Communication(SIGCOMM '19).New York:Association for Computing Machinery,2019:44-58.
[12]MA Y,LIANG J.Throughput Maximization of NFV-EnabledMulticasting in Mobile Edge Cloud Networks[J].IEEE Tran-sactions on Parallel and Distributed Systems,2020,31(2):393-407.
[13]CHEN K F,SHAN D F,LUO X H,et al.One Rein to RuleThem All:A Framework for Datacenter-to-User Congestion Control[C]//4th Asia-Pacific Workshop on Networking(APNet '20).New York:Association for Computing Machinery,2020:44-51.
[14]FOREMCICH A,SNOEREN A,PORTER G,et al.Corundum:An Open-Source 100-Gbps Nic[C]//2020 IEEE 28th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM).IEEE Press,2020:38-46.
[15]JACOBSON V.Congestion avoidance and control[J].ACM SIGCOMM Computer Communication Review,1995,25(1):157-187.
[16]ZENG G X,HU S H,ZHANG J X,et al.Overview of Data Center Network Transmission Protocol[J].Computer Research and Development,2020,57(1):74-84.
[17]ASHUTOSH S,FRAIDA F,SHIVENDRA P.A Low Latency Congestion ControlThat Can Compete[C]//Proceedings of the Student Workshop(CoNEXT '20).New York:Association for Computing Machinery,2020:15-16.
[18]LLOYD B,GANESH A,ETHAN K,et al.On the Future of Congestion Control for the Public Internet[C]//Proceedings of the 19th ACM Workshop on Hot Topics in Networks(HotNets '20).New York:Association for Computing Machi-nery,2020:30-37.
[19]AYUSH M,SUN X P,ATISHYA J,et al.The Great Internet TCP Congestion Control Census[J].Measurement and Analysis of Computing Systems,2019,3(3):1-24.
[20]NANDITA D,TIZIANA R,CHENG Y C.An argument for increasing TCP's initial congestion window[J].ACM SIGCOMM Computer Communication Review,2010,40(3):26-33.
[1] LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267.
[2] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[3] HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332.
[4] JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339.
[5] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[6] WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9.
[7] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[8] FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349.
[9] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[10] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[11] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[12] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[13] TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484.
[14] HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507.
[15] GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!