Fact-checked by Grok 2 weeks ago
References
-
[1]
Congestion Control Principles - » RFC EditorWe say that TCP flows are "responsive" to congestion signals (i.e., dropped packets) from the network. It is these TCP congestion avoidance algorithms that ...<|control11|><|separator|>
-
[2]
Understanding Network Traffic & Network Congestion - SplunkCommon causes of congestion include increased user demand, limited bandwidth, hardware limitations, inefficient network configurations, and unexpected traffic ...Network Bandwidth & Network... · Network Bandwidth In Cloud... · Estimating Network Bandwidth...
- [3]
-
[4]
[PDF] Congestion control in computer networks: issues and trendsCongestion control allocates network resources to maintain acceptable performance when demand exceeds capacity, including bandwidth, buffer space, and ...
-
[5]
Network Congestion - an overview | ScienceDirect TopicsNetwork congestion refers to a situation in a network where a node is overwhelmed with traffic beyond its capacity, leading to delays in queues and loss of ...
-
[6]
[PDF] Congestion Avoidance and Control - CS 162To make this concrete, if the network is running at 75% of capacity, as the Arpanet was in last April's collapse, one should expect round-trip-time to vary by a ...Missing: 1980s | Show results with:1980s
-
[7]
[PDF] Congestion Control in Computer NetworkIf the processors of routers are slow then queue will build up which again causes congestion. 3. Low bandwidth lines also affect congestion. If the bandwidth of ...
-
[8]
Traffic Management for High-Speed Networks (1997)Network congestion will increase as network speed increases. New control methods are needed, especially for handling "bursty" traffic expected in very high ...Missing: primary insufficient inefficiencies<|separator|>
-
[9]
Unjamming the Information Superhighway and saving the InternetDec 5, 2018 · In 1986, the burgeoning Internet was nearly two decades old and had 10,000 users. It was also facing imminent collapse due to network ...
-
[10]
Computer Networks and Systems: Queueing Theory and ...From the Publisher: This text, intended for a first course in performance evaluation, is a self-contained treatment covering all aspects of queuing theory.
-
[11]
RFC 6349: Framework for TCP Throughput Testing... bits per second) and its end-to-end delay (in seconds). +---+ +----+ +----+ ... Ishac, "Defining Network Capacity", RFC 5136, February 2008. [RFC5357] ...
-
[12]
RFC 9097: Metrics and Methods for One-Way IP Capacity... Network Capacity and Maximum IP-Layer Capacity, and the Experimental metric ... bits per second.¶. In addition, the use of the load rate adjustment ...
-
[13]
A QoE Perspective on Sizing Network Buffers - ACM Digital LibraryTraditionally, the size of router buffers is determined by the bandwidth-delay product discipline (normal discipline), which is the product of the link ...
-
[14]
A Survey on Mechanisms for Fast Network Packet ProcessingNetwork performance is affected by data transmission based on physical link and packet processing handled by operating system.Missing: influencing capacity
-
[15]
Measured capacity of an Ethernet: myths and realityThere are many factors that influence a choice between different technplogies, including availability, acceptance as a standard, cost per station and per ...
- [16]
-
[17]
Hardware cost and capacity analysis of future TDM- and WDM-PON ...We developed a Pareto access traffic model to take into account the bandwidth gain reachable through statistical multiplexing of the shared bandwidth for TDM ...
-
[18]
Capacity-Delay-Error-Boundaries: A Composable Model of Sources ...In 1962. Kleinrock advanced this theory to prove the resource efficiency of packet-switching, that is achieved by bursty sources due to resource sharing. For ...<|control11|><|separator|>
-
[19]
Congestion avoidance and control - ACM Digital LibraryCongestion control involves finding places that violate conservation and fixing them. By 'conservation of packets' I mean that for a connection 'in equilibrium ...
-
[20]
[PDF] Analytical methods for network congestion control - Caltech's NetlabABSTRACT. The congestion control mechanism has been responsible for maintaining stability as the. Internet scaled up in size, speed, traffic volume, ...
-
[21]
[PDF] The Macroscopic Behavior of the TCP Congestion Avoidance ...In this paper, we analyze a performance model for the TCP Congestion Avoidance algorithm. The model pre- dicts the bandwidth of a sustained TCP connection sub- ...Missing: fluid | Show results with:fluid<|control11|><|separator|>
-
[22]
[PDF] shadow prices, proportional fairness and stabilityThis paper analyzes rate control algorithms for communication networks, focusing on stability and fairness, and how bandwidth is shared between competing ...
-
[23]
RFC 2914 - Congestion Control Principles - IETF DatatrackerThe goal of this document is to explain the need for congestion control in the Internet, and to discuss what constitutes correct congestion control.
-
[24]
RFC 2581 - TCP Congestion Control - IETF DatatrackerThis document defines TCP's four intertwined congestion control algorithms: slow start, congestion avoidance, fast retransmit, and fast recovery.
-
[25]
ATM Congestion ControlOpen-Loop vs Close-Loop. Open-loop approaches do not need end-to-end feedback ... The debate between rate- based and credit-based approach is presented.
-
[26]
[PDF] On the Effectiveness of Delay-Based Congestion AvoidanceThe debate between Loss-based Congestion Avoidance (LCA) and Delay-based Congestion Avoidance (DCA) is almost as old as TCP congestion control itself.
-
[27]
TCP Vegas: new techniques for congestion detection and avoidanceVegas is a new TCP implementation achieving 40-70% better throughput and less loss than Reno TCP, using three key techniques.
-
[28]
RFC 5166 - Metrics for the Evaluation of Congestion Control ...This document discusses the metrics to be considered in an evaluation of new or modified congestion control mechanisms for the Internet.Missing: latency | Show results with:latency
-
[29]
RFC 3290 - An Informal Management Model for Diffserv Routers1 Leaky Buckets A leaky bucket algorithm is primarily used for shaping traffic as it leaves an interface onto the network (handled under Queues and Schedulers ...
-
[30]
RFC 2992 - Analysis of an Equal-Cost Multi-Path AlgorithmThis document gives an analysis of one method for making that decision. The analysis includes the performance of the algorithm and the disruption caused by ...
-
[31]
Best Practices in Core Network Capacity Planning White Paper - CiscoTo ensure that bursts above the average do not affect the SLAs, the actual bandwidth may need to be overprovisioned relative to the measured average rates.
-
[32]
RFC 2474 - in the IPv4 and IPv6 Headers - IETF DatatrackerThis document defines the IP header field, called the DS (for differentiated services) field. In IPv4, it defines the layout of the TOS octet; in IPv6, the ...Missing: EF AF
-
[33]
RFC 5681: TCP Congestion ControlThis document defines TCP's four intertwined congestion control algorithms: slow start, congestion avoidance, fast retransmit, and fast recovery.
-
[34]
RFC 6298 - Computing TCP's Retransmission TimerRFC 6298 defines the standard algorithm for TCP senders to compute and manage their retransmission timer, using SRTT and RTTVAR state variables.
-
[35]
RFC 6582 - The NewReno Modification to TCP's Fast Recovery ...This document describes a specific algorithm for responding to partial acknowledgments, referred to as "NewReno".
-
[36]
RFC 9438: CUBIC for Fast and Long-Distance NetworksCUBIC is a standard TCP congestion control algorithm that uses a cubic function instead of a linear congestion window increase function to improve scalability ...Table of Contents · Design Principles of CUBIC · CUBIC Congestion Control
-
[37]
RFC 7567 - IETF Recommendations Regarding Active Queue ...It presents a strong recommendation for testing, standardization, and widespread deployment of active queue management (AQM) in network devices.Missing: bufferbloat | Show results with:bufferbloat
-
[38]
[PDF] Random Early Detection Gateways for Congestion AvoidanceThis paper presents Random Early Detection (RED) gate- ways for congestion avoidance in packet-switched net- works. The gateway detects incipient congestion ...
-
[39]
RFC 2309 - Recommendations on Queue Management and ...This memo presents two recommendations to the Internet community concerning measures to improve and preserve Internet performance.
-
[40]
Chapter: Configuring Weighted Random Early Detection - CiscoMar 17, 2008 · This module describes the tasks for configuring Weighted Random Early Detection (WRED), distributed WRED (DWRED), flow-based WRED, and DiffServ ...Missing: original | Show results with:original
-
[41]
Dynamics of random early detection - ACM Digital Library... Random Early Drop (FRED), a modified version of RED. FRED uses per-active-flow accounting to impose on each flow a loss rate that depends on the flow's buffer ...
- [42]
- [43]
- [44]
-
[45]
Data center TCP (DCTCP) - ACM Digital LibraryDCTCP leverages Explicit Congestion Notification (ECN) in the network to provide multi-bit feedback to the end hosts. We evaluate DCTCP at 1 and 10Gbps speeds ...
-
[46]
[PDF] Data Center TCP (DCTCP) - People | MIT CSAILAug 30, 2010 · DCTCP combines Explicit Congestion Notification (ECN) with a novel control scheme at the sources. It extracts multibit feed- back on congestion ...
-
[47]
RFC 3168 - The Addition of Explicit Congestion Notification (ECN) to ...This memo specifies the incorporation of ECN (Explicit Congestion Notification) to TCP and IP, including ECN's use of two bits in the IP header.
- [48]
-
[49]
RFC 8087 - The Benefits of Using Explicit Congestion Notification ...ECN benefits include increased throughput, reduced delay, reduced head-of-line blocking, and reduced probability of RTO expiry.
-
[50]
[PDF] TCP Performance Issues over Wireless Links - UCSD CSEA prime concern for TCP is congestion. Congestion occurs when routers are overloaded with traffic that causes their queues to build up and eventually overflow, ...
-
[51]
[PDF] Understanding Congestion in IEEE 802.11b Wireless NetworksAs channel utilization increases, a large number of frame errors and retransmissions occur. As retransmissions increase, most network cards decrease the rate at ...
-
[52]
Forward acknowledgement: refining TCP congestion controlThe FACK algorithm is based on first principles of congestion control and is designed to be used with the proposed TCP SACK option. By decoupling congestion ...
-
[53]
RFC 2018 - TCP Selective Acknowledgment OptionsA Selective Acknowledgment (SACK) mechanism, combined with a selective repeat retransmission policy, can help to overcome these limitations.
-
[54]
Performance and improvements of TCP CUBIC in low-delay cellular ...We show that the early transition to Congestion Avoidance results in significant underutilization of the cellular network capacity, particularly for short-lived ...
-
[55]
[PDF] Improving TCP Slow Start Performance in Wireless Networks with ...Unfortunately, the typical default TCP implementation often exits slow start too early, before capacity has been reached, causing underutilization, particularly ...
-
[56]
[PDF] The war between mice and elephants - Network Protocols Ninth ...Our simulation results show that: (1) in a highly loaded network, pref- erential treatment is necessary to provide short TCP connections with better response ...
-
[57]
[PDF] Halfback: Running Short Flows Quickly and Safely - acm sigcommAs TCP's slow-start needs multiple RTTs to detect its fair sending rate, many short flows do not leave this startup phase before finishing transmission. The ...
-
[58]
RFC 9000: QUIC: A UDP-Based Multiplexed and Secure TransportThis document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, ...
-
[59]
A Comprehensive Overview of TCP Congestion Control in 5G ... - NIHNetwork congestion is the result of a network node being overwhelmed with more data than it can process. Buffers are added to the communication nodes to prevent ...
-
[60]
End-to-end congestion control approaches for high throughput and ...Feb 26, 2021 · In this work, we present end-to-end CCAs that target a high throughput and a low latency over highly variable network links, and classify them ...Missing: budgets | Show results with:budgets
-
[61]
Understanding TCP incast throughput collapse in datacenter networksTCP Throughput Collapse, also known as Incast, is a pathological behavior of TCP that results in gross under-utilization of link capacity in certain many-to- ...Missing: problem | Show results with:problem
-
[62]
[PDF] Understanding TCP Incast and Its Implications for Big Data WorkloadsTCP incast is a recently identified network transport pathology that affects many- to-one communication patterns in datacenters . It is caused by a ...
-
[63]
[PDF] Re-architecting Congestion Management in Lossless EthernetTo enable RoCE deployment in large-scale. IP-routed data center networks, DCQCN [49] is developed through replacing the congestion notification mechanism de-.
-
[64]
Improving datacenter performance and robustness with multipath TCPWith MPTCP, this outperforms FatTree for a wide range of workloads, but costs the same. In existing data centers, MPTCP is readily deployable leveraging widely ...
-
[65]
Hedera: Dynamic Flow Scheduling for Data Center Networks | USENIXHedera: Dynamic Flow Scheduling for Data Center Networks, booktitle = 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 10), year = ...
-
[66]
[PDF] VFP: A Virtual Switch Platform for Host SDN in the Public CloudMar 27, 2017 · VFP runs on all Azure servers, powering millions of VMs, petabits per second of traffic, and providing load balancing for exabytes of storage, ...
-
[67]
How the U.S. National Science Foundation Enabled Software ...Oct 24, 2025 · For our datacenter networks, we built Jupiter to scale out to many petabits per second of bisection bandwidth per datacenter. The key ...
-
[68]
Congestion Control for AI Workloads with Message-Level SignalingAug 6, 2025 · Large-scale AI training is among the most demanding workloads in datacenter networks. The unique characteristics of low flow entropy ...
-
[69]
5G for the connected World - 3GPPNov 13, 2019 · Ultra-high reliability of the connection between device and network means at least 99.999% (three nines!) reliability is needed to keep a ...
- [70]
- [71]
-
[72]
[PDF] Machine Learning for End-to-end Congestion Control2) Congestion Prediction: Congestion prediction plays an important role in dynamic routing, congestion control, con- gestion avoidance, and proactive ...Missing: v2 | Show results with:v2
-
[73]
Reinforcement Learning based Adaptive Congestion Control for ...Sep 12, 2025 · A Comprehensive Overview of TCP Congestion Control in 5G Networks: Research Challenges and Future Perspectives ... congestion control and ML.
-
[74]
RFC 9000 - QUIC: A UDP-Based Multiplexed and Secure TransportTo enable ECN, a sending QUIC endpoint first determines whether a path supports ECN ... ECN is rarely disabled for paths that properly support ECN. Any path that ...Table of Contents · Streams · Cryptographic and Transport... · Connection Migration
-
[75]
Hybrid traffic Offloading method for distributed edge computing in 6G ...Jul 2, 2025 · This solution will enable drastic reduction of task processing delays and power consumption by the user devices [9-11]. INC is based on network ...Missing: post- | Show results with:post-