| < draft-leith-tcp-htcp-05.txt | draft-leith-tcp-htcp-06.txt > | |||
|---|---|---|---|---|
| draft-leith-tcp-htcp-05 D. Leith | draft-leith-tcp-htcp-06 D. Leith | |||
| Internet-Draft R. Shorten | Internet-Draft Hamilton Institute | |||
| Intended status: Experimental Hamilton Institute | Intended status: Experimental April 7, 2008 | |||
| Expires: August 4, 2008 Feb 2008 | Expires: October 9, 2008 | |||
| H-TCP: TCP Congestion Control for High Bandwidth-Delay Product Paths | H-TCP: TCP Congestion Control for High Bandwidth-Delay Product Paths | |||
| Status of this Memo | Status of this Memo | |||
| By submitting this Internet-Draft, each author represents that any | By submitting this Internet-Draft, each author represents that any | |||
| applicable patent or other IPR claims of which he or she is aware | applicable patent or other IPR claims of which he or she is aware | |||
| have been or will be disclosed, and any of which he or she becomes | have been or will be disclosed, and any of which he or she becomes | |||
| aware will be disclosed, in accordance with Section 6 of BCP 79. | aware will be disclosed, in accordance with Section 6 of BCP 79. | |||
| skipping to change at page 1, line 33 ¶ | skipping to change at page 1, line 33 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| This Internet-Draft will expire on August 4, 2008. | This Internet-Draft will expire on October 9, 2008. | |||
| Copyright Notice | ||||
| Copyright (C) The IETF Trust (2008). | ||||
| Abstract | Abstract | |||
| Our objective in this document is to renew discussion on how the TCP | This document describes a number of changes to the TCP congestion | |||
| congestion control algorithm might best be modified to improve | control algorithm to to improve performance in high bandwidth-delay | |||
| performance in high bandwidth-delay product paths. We focus on | product paths. We focus on changes to the congestion avoidance mode, | |||
| changes to the additive increase element of the TCP AIMD algorithm. | rather than slow-start. | |||
| Table of Contents | Table of Contents | |||
| 1. Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 2. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3. Additive Increase for High Bandwidth-Delay Product Paths . . . 6 | 3. Additive Increase for High Bandwidth-Delay Product Paths . . . 6 | |||
| 4. Choice of Increase Function . . . . . . . . . . . . . . . . . 8 | 4. Impact of Changes on Performance . . . . . . . . . . . . . . . 8 | |||
| 4.1. RTT unfairness . . . . . . . . . . . . . . . . . . . . . . 8 | 4.1. RTT unfairness . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 4.2. Friendliness . . . . . . . . . . . . . . . . . . . . . . . 8 | 4.2. Friendliness . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 4.3. Responsiveness . . . . . . . . . . . . . . . . . . . . . . 9 | 4.3. Responsiveness . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 4.4. Efficiency . . . . . . . . . . . . . . . . . . . . . . . . 9 | 4.4. Efficiency . . . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 5. RTT Scaling . . . . . . . . . . . . . . . . . . . . . . . . . 10 | 5. Optional RTT Scaling . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 6. Security Considerations . . . . . . . . . . . . . . . . . . . 11 | 6. Security Considerations . . . . . . . . . . . . . . . . . . . 11 | |||
| 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 12 | 7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 12 | |||
| 8. Informative References . . . . . . . . . . . . . . . . . . . . 13 | 8. Changelog . . . . . . . . . . . . . . . . . . . . . . . . . . 13 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 14 | 9. Informative References . . . . . . . . . . . . . . . . . . . . 14 | |||
| Intellectual Property and Copyright Statements . . . . . . . . . . 15 | Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 15 | |||
| Intellectual Property and Copyright Statements . . . . . . . . . . 16 | ||||
| 1. Conventions | 1. Conventions | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in RFC 2119. | document are to be interpreted as described in RFC 2119. | |||
| 2. Introduction | 2. Introduction | |||
| This document describes a number of changes to the TCP congestion | ||||
| control algorithm to to improve performance in high bandwidth-delay | ||||
| product paths. | ||||
| The current TCP congestion control algorithm is known to perform | The current TCP congestion control algorithm is known to perform | |||
| poorly on paths where the TCP congestion window becomes very large. | poorly on paths where the TCP congestion window becomes large. | |||
| [Kelly02, Flo03, FAST04]. Following congestion, the congestion | [Kelly02, Flo03, FAST04]. Following congestion, the congestion | |||
| window is halved and only increases at a rate of 1 packet per RTT. | window is halved and only increases at a rate of 1 packet per RTT. | |||
| As a result flows can take an unacceptably long time to recover their | As a result flows can take an unacceptably long time to recover their | |||
| window size after a congestion event. | window size after a congestion event. | |||
| A direct solution is to make the time between congestion events | A direct solution is to make the time between congestion events | |||
| smaller. This can be achieved by, for example, adjusting the AIMD | smaller. This can be achieved by, for example, adjusting the AIMD | |||
| additive increase rate to be greater for flows with larger congestion | additive increase rate to be greater for flows with larger congestion | |||
| window. Backward compatibility with legacy TCP can be ensured | window. Backward compatibility with legacy TCP can be ensured | |||
| through the inclusion of a separate mode of operation that behaves as | through the inclusion of a separate mode of operation that behaves as | |||
| skipping to change at page 4, line 38 ¶ | skipping to change at page 4, line 42 ¶ | |||
| High-Speed TCP [Flo03] proposal. In addition to adjusting the AIMD | High-Speed TCP [Flo03] proposal. In addition to adjusting the AIMD | |||
| increase parameter alpha as a function of congestion window, this | increase parameter alpha as a function of congestion window, this | |||
| proposal also increases the multiplicative decrease factor beta to | proposal also increases the multiplicative decrease factor beta to | |||
| further increase the aggressiveness of a flow. (Note. On | further increase the aggressiveness of a flow. (Note. On | |||
| multiplicative decrease, the congestion window cwnd is updated to | multiplicative decrease, the congestion window cwnd is updated to | |||
| beta x cwnd. We use this definition of the backoff factor beta | beta x cwnd. We use this definition of the backoff factor beta | |||
| throughout this document). | throughout this document). | |||
| While such modifications might appear straightforward, it has been | While such modifications might appear straightforward, it has been | |||
| shown [Sho04, Yi05] that they often negatively impact the behaviour | shown [Sho04, Yi05] that they often negatively impact the behaviour | |||
| of networks of TCP flows. High-speed TCP[Flo03] and BIC-TCP [BIC04] | of networks of TCP flows. High-speed TCP[Flo03], BIC-TCP [BIC04] and | |||
| can exhibit extremely slow convergence following network disturbances | Cubic can exhibit slow convergence following network disturbances | |||
| such as the start-up of new flows; Scalable-TCP [Kelly02] is a | such as the start-up of new flows; Scalable-TCP [Kelly02] is a | |||
| multiplicative-increase multiplicative-decrease strategy and as such | multiplicative-increase multiplicative-decrease strategy and as such | |||
| it is known that it may fail to converge to fairness in drop-tail | it is known that it may fail to converge to fairness in drop-tail | |||
| networks [Jain89]. | networks [Jain89]. | |||
| Our objective in this document is to therefore to renew discussion on | ||||
| how the TCP congestion control algorithm might best be modified to | ||||
| improve performance when the congestion window is large. Large | ||||
| congestion windows are associated with high bandwidth-delay product | ||||
| (BDP) paths and with the ongoing increase in network speeds, high BDP | ||||
| paths are becoming increasingly prevalent. In this document we focus | ||||
| on changes to the additive increase element of the TCP AIMD algorithm | ||||
| (we leave discussion of modifications to the backoff factor to a | ||||
| later date). In particular, we present proposed changes to the | ||||
| additive increase algorithm that we argue are promising enough (based | ||||
| on the outcome of experimental tests carried out by a number of | ||||
| groups [Hegde04, Yi05, Cot05]) to warrant further discussion within | ||||
| the wider networking community. | ||||
| Scope | Scope | |||
| ----- | ----- | |||
| Our focus in this document is on the behaviour of long-lived flows | Our focus in this document is on the behaviour of long-lived flows | |||
| and so we do not consider changes to slow-start. We also seek to | and so we do not consider changes to slow-start. We also seek to | |||
| make the smallest possible changes to the existing TCP congestion | make the smallest possible changes to the existing TCP congestion | |||
| control algorithm, and so confine consideration to the AIMD packet- | control algorithm, and so confine consideration to the AIMD packet- | |||
| loss based paradigm. Use of jumbo packets is viewed as complementary | loss based paradigm. Use of jumbo packets is viewed as complementary | |||
| to the changes proposed here. We confine consideration to drop-tail | to the changes proposed here. | |||
| queues as this is the prevalent queueing discipline in the current | ||||
| Internet and leave discussion of active queueing to a later date. | ||||
| 3. Additive Increase for High Bandwidth-Delay Product Paths | 3. Additive Increase for High Bandwidth-Delay Product Paths | |||
| The AIMD algorithm used in TCP has two key features that underpin its | It is known that modifying the AIMD backoff factor can have a | |||
| convergence behaviour. Firstly, flows with the same RTT increase | significant impact on network responsiveness, and this is discussed | |||
| their congestion windows at the same rate. Secondly, the backoff | in more detail elsewhere [Sho04, Sho05]. In this document we confine | |||
| mechanism is multiplicative. Hence, following congestion, flows with | attention to modifications to the AIMD increase rate with the aim of | |||
| a larger congestion window will reduce their congestion window by | improving performance in high bandwidth-delay product paths. We | |||
| more, in absolute terms, than flows with a smaller congestion window. | begin with the observation that making the AIMD increase rate an | |||
| Thus larger flows yield more bandwidth than smaller flows. Since | increasing function of flow cwnd (as is done in the HS-TCP, BIC, | |||
| flows increase congestion window at the same rate, flows with smaller | Cubic etc algorithms) means that flows with smaller cwnd are placed | |||
| congestion window thereby gain a certain advantage over flows with | at a disadvantage to flows with larger cwnd when competing for | |||
| larger congestion window, and it is this that enables flows with | bandwidth. This is a primary source of unfairness and slow | |||
| small congestion window to seize bandwidth from flows with large | convergence. We therefore take an alternative approach. Noting that | |||
| congestion window until balance is reached in the network. | it is the increase in congestion epoch duration with bandwidth-delay | |||
| product that is the source of many issues, we make the AIMD increase | ||||
| It follows from this observation that modifying the AIMD backoff | rate purely a function of the elapsed time since the last congestion | |||
| factor can have a very significant impact on network responsiveness, | event. This allows us to increase the aggressiveness of the AIMD | |||
| and this is discussed in more detail elsewhere [Sho04, Sho05]. In | increase as the congestion epoch duration increases (so improving | |||
| this document we do not consider changes to the backoff factor. | performance in high bandwidth-delay product paths) while avoiding | |||
| Instead, we confine attention to modifications to the AIMD increase | placing flows with small cwnd at a consistent disadvantage. | |||
| rate with the aim of improving performance in high bandwidth-delay | ||||
| product paths. Provided we retain appropriate symmetry between the | ||||
| increase rates of competing flows, modifying the increase rate | ||||
| affects the interval between congestion events but otherwise does not | ||||
| affect the responsiveness of TCP. | ||||
| We therefore propose generalising the AIMD algorithm by allowing the | RFC2591 specifies that during congestion avoidance, cwnd is | |||
| increase parameter alpha to vary as a function of the elapsed time | incremented by 1 full-sized segment per round-trip time (RTT). We | |||
| since the last congestion event. Specifically, if we let Delta | modify this behaviour to increase cwnd by alpha segments per RTT, | |||
| denote the time in seconds that has elapsed since the last congestion | where alpha is calculated as follows. | |||
| event experienced by a flow, we adjust the AIMD increase parameter | ||||
| according to some function which we denote f_alpha(Delta). To | ||||
| provide backward compatibility with legacy TCP flows we consider | ||||
| adjusting the increase parameter as follows | ||||
| if Delta <= Delta_L | if Delta <= Delta_L | |||
| alpha = 1 | alpha = 1 | |||
| else | else | |||
| alpha = f_alpha(Delta) | alpha = f_alpha(Delta) | |||
| where Delta_L is the threshold for switching from standard/legacy | where Delta is the time in seconds that has elapsed since the last | |||
| operation to the new increase function. The choice of function | congestion event experienced by a flow and Delta_L is the threshold | |||
| f_alpha is governed by the rate at which bandwidth should be | for switching from standard/legacy operation to the new increase | |||
| acquired. | function. Delta_L MUST be at least 1 second, although larger values | |||
| MAY be used. The increase function f_alpha is selected such that the | ||||
| We can immediately make the observation that, because the adjustment | duration of the congestion epochs remains reasonably small as the | |||
| is based on time since the last backoff, a degree of symmetry is | bandwidth-delay product on a path increases. Below, we discuss a | |||
| maintained between competing network flows and in particular flows | choice of increase function that yields convergence times that seem | |||
| already in high speed mode are not awarded a long-term advantage over | reasonable. However, the precise responsiveness requirement in | |||
| newer flows. Specifically, when packet drops are synchronised Delta | future networks is currently not well defined and so the specific | |||
| is necessarily the same for all flows. Hence all flows share | choice of increase function may change. | |||
| identical increase profiles and symmetry is maintained [Sho04]. When | ||||
| drops are not synchronised, Delta is the same *on average* for all | ||||
| flows provided flows share the same probability of backing off on | ||||
| congestion. Hence, symmetry is still maintained, albeit in an | ||||
| average sense. | ||||
| We select the increase function f_alpha such that the duration of the | ||||
| congestion epochs remains reasonably small as the bandwidth-delay | ||||
| product on a path increases. Below, we discuss one choice of | ||||
| increase function that yields convergence times that seem reasonable. | ||||
| However, the precise responsiveness requirement in future networks is | ||||
| currently not well defined and so we leave this, and the associated | ||||
| specific choice of increase function, as a question for further | ||||
| debate. | ||||
| 4. Choice of Increase Function | ||||
| We consider, as an illustrative example, use of the increase function | Use of the following increase function is RECOMMENDED: | |||
| f_alpha(Delta) = 1 + 10(Delta-Delta_L)+0.5(Delta-Delta_L)^2 (1) | f_alpha(Delta) = 1 + 10(Delta-Delta_L)+0.5(Delta-Delta_L)^2 (1) | |||
| and Delta_L=1 second. This choice yields the congestion epoch | This choice yields the congestion epoch duration for a single flow, | |||
| duration for a single flow, as a function of congestion window size, | as a function of congestion window size, shown in Table 1. | |||
| shown in Table 1. | ||||
| ------------------------------------- | ------------------------------------- | |||
| Congestion Congestion | Congestion Congestion | |||
| window epoch | window epoch | |||
| (packets) duration (s) | (packets) duration (s) | |||
| ------------------------------------- | ------------------------------------- | |||
| 100 1.1 | 100 1.1 | |||
| 1000 3.1 | 1000 3.1 | |||
| 2000 4.3 | 2000 4.3 | |||
| 5000 6.6 | 5000 6.6 | |||
| 10000 9.2 | 10000 9.2 | |||
| 20000 12.8 | 20000 12.8 | |||
| 50000 19.4 | 50000 19.4 | |||
| ------------------------------------- | ------------------------------------- | |||
| Table 1 - Congestion epoch duration vs congestion window | Table 1 - Congestion epoch duration vs congestion window | |||
| size for an RTT of 100ms | size for an RTT of 100ms | |||
| 4. Impact of Changes on Performance | ||||
| 4.1. RTT unfairness | 4.1. RTT unfairness | |||
| It follows from the introductory discussion that (when RTT scaling is | The level of unfairness between flows with different RTT's is similar | |||
| not used) the level of unfairness between flows with different RTT's | to that with the standard TCP algorithm. This behaviour is confirmed | |||
| is similar to that with the current AIMD algorithm. This behaviour | in experimental and simulation tests [HTCP04, Yi05]. | |||
| is confirmed in experimental and simulation tests [HTCP04, Yi05]. | ||||
| 4.2. Friendliness | 4.2. Friendliness | |||
| The mean AIMD increase parameter is shown in Table 2 for a range of | The mean AIMD increase parameter is shown in Table 2 for a range of | |||
| bandwidth-delay products. This an indication of the number of | bandwidth-delay products. This an indication of the number of | |||
| standard TCP flows (neglecting statistical multiplexing of backoffs) | standard TCP flows (neglecting statistical multiplexing of backoffs) | |||
| whose aggregate would be equivalent to a flow using increase function | whose aggregate would be equivalent to a flow using increase function | |||
| (1). That is, an indication of friendliness and also of the packet | (1). That is, an indication of friendliness and also of the packet | |||
| drop overhead associated with the AIMD probing action. | drop overhead associated with the AIMD probing action. | |||
| skipping to change at page 10, line 5 ¶ | skipping to change at page 10, line 5 ¶ | |||
| 4.4. Efficiency | 4.4. Efficiency | |||
| Link utilisation depends on queue provisioning in a similar manner to | Link utilisation depends on queue provisioning in a similar manner to | |||
| the current TCP congestion control algorithm. That is, for a single | the current TCP congestion control algorithm. That is, for a single | |||
| flow (or multiple synchronised flows) 100% link utilisation requires | flow (or multiple synchronised flows) 100% link utilisation requires | |||
| that the queue be sized as the bandwidth-delay product. Simulation | that the queue be sized as the bandwidth-delay product. Simulation | |||
| and experimental tests indicate that statistical multiplexing between | and experimental tests indicate that statistical multiplexing between | |||
| unsynchronised flows yields similar efficiency gains to standard TCP. | unsynchronised flows yields similar efficiency gains to standard TCP. | |||
| 5. RTT Scaling | 5. Optional RTT Scaling | |||
| We note that the parameter alpha determines the AIMD increase rate in | We note that the parameter alpha determines the AIMD increase rate in | |||
| packets per RTT. Hence, flows with the same RTT have the same | packets per RTT. Hence, flows with the same RTT have the same | |||
| increase rate in packets per second, but flows with different RTTs | increase rate in packets per second, but flows with different RTTs | |||
| have different increase rate in packets per second. It is this that | have different increase rate in packets per second. It is this that | |||
| primarily leads to unfairness between flows with different RTTs. | primarily leads to unfairness between flows with different RTTs. | |||
| Removing RTT unfairness is not one of our objectives here. However, | Removing RTT unfairness is not one of our objectives here. However, | |||
| we note that an AIMD flow generates roughly alpha packet drops per | we note that an AIMD flow generates roughly alpha packet drops per | |||
| RTT as a result of its probing action. Hence, flows with short RTT | RTT as a result of its probing action. Hence, flows with short RTT | |||
| are more aggressive than flows with long RTT in the sense that they | are more aggressive than flows with long RTT in the sense that they | |||
| skipping to change at page 10, line 27 ¶ | skipping to change at page 10, line 27 ¶ | |||
| seconds. We can reduce the aggressiveness of short RTT flows by | seconds. We can reduce the aggressiveness of short RTT flows by | |||
| scaling the increase parameter alpha with RTT. This need not | scaling the increase parameter alpha with RTT. This need not | |||
| compromise the responsiveness of TCP flows. As noted in [Sh04, Sh05, | compromise the responsiveness of TCP flows. As noted in [Sh04, Sh05, | |||
| HTCP04], the convergence time of TCP flows using an AIMD backoff | HTCP04], the convergence time of TCP flows using an AIMD backoff | |||
| factor of 0.5 is approximately 4 congestion epochs. Scaling alpha by | factor of 0.5 is approximately 4 congestion epochs. Scaling alpha by | |||
| RTT leads to scaling of the congestion epoch duration to become | RTT leads to scaling of the congestion epoch duration to become | |||
| effectively the same for both short and long RTT flows. The | effectively the same for both short and long RTT flows. The | |||
| convergence time is therefore also scaled to be effectively the same | convergence time is therefore also scaled to be effectively the same | |||
| for both short and long RTT flows. | for both short and long RTT flows. | |||
| Such RTT scaling can be readily implemented by modifying the increase | Such RTT scaling MAY be implemented by modifying the increase rule to | |||
| rule to | ||||
| if Delta <= Delta_L | if Delta <= Delta_L | |||
| alpha = 1 | alpha = 1 | |||
| else | else | |||
| alpha = K x f_alpha(Delta) | alpha = K x f_alpha(Delta) | |||
| where K = RTT/RTT_ref. Note that RTT scaling is not applied in low- | where K = RTT/RTT_ref. Note that RTT scaling is not applied in low- | |||
| speed conditions in order to maintain backward compatibility with | speed conditions in order to maintain backward compatibility with | |||
| legacy TCP flows (ensuring adequate backward compatibility presented | legacy TCP flows (ensuring adequate backward compatibility presented | |||
| a major difficulty in previous studies on the use of RTT scaling). | a major difficulty in previous studies on the use of RTT scaling). | |||
| Note also that the scaling is proportional to RTT rather than RTT^2, | Note also that the scaling is proportional to RTT rather than RTT^2, | |||
| as we do not seek to achieve throughput fairness here. RTT_ref is | as we do not seek to achieve throughput fairness here. RTT_ref is | |||
| the reference RTT for which f_alpha is designed to ensure acceptable | the reference RTT for which f_alpha is designed to ensure acceptable | |||
| congestion epoch durations. | congestion epoch durations, with the recommended value being 100ms. | |||
| 6. Security Considerations | 6. Security Considerations | |||
| Security implications are not discussed in this document. | Security implications are not discussed in this document. | |||
| 7. Acknowledgements | 7. Acknowledgements | |||
| This work was supported by Science Foundation Ireland grants 00/PI.1/ | This work was supported by Science Foundation Ireland grants 00/PI.1/ | |||
| C067 and 04/IN3/I460. | C067 and 04/IN3/I460. | |||
| 8. Informative References | 8. Changelog | |||
| April 2008: Updated to use RFC2119 terminology. Discussion | ||||
| streamlined. | ||||
| 9. Informative References | ||||
| [Jain89] D.M. Chiu, R. Jain, Analysis of the increase and decrease | [Jain89] D.M. Chiu, R. Jain, Analysis of the increase and decrease | |||
| algorithms for congestion avoidance in computer networks. Computer | algorithms for congestion avoidance in computer networks. Computer | |||
| Networks and ISDN Systems, 1989. | Networks and ISDN Systems, 1989. | |||
| [Flo03] S.Floyd, HighSpeed TCP for Large Congestion Windows . Sally | [Flo03] S.Floyd, HighSpeed TCP for Large Congestion Windows . Sally | |||
| Floyd. IETF RFC 3649, Experimental, Dec 2003. | Floyd. IETF RFC 3649, Experimental, Dec 2003. | |||
| [FAST04] C. Jin, D.X. Wei, S,H. Low, FAST TCP: motivation, | [FAST04] C. Jin, D.X. Wei, S,H. Low, FAST TCP: motivation, | |||
| architecture, algorithms, performance. Proc IEEE INFOCOM 2004. | architecture, algorithms, performance. Proc IEEE INFOCOM 2004. | |||
| skipping to change at page 14, line 5 ¶ | skipping to change at page 15, line 5 ¶ | |||
| [Cot05] R.L. Cottrell, S. Ansari, P. Khandpur, R. Gupta, R. Hughes- | [Cot05] R.L. Cottrell, S. Ansari, P. Khandpur, R. Gupta, R. Hughes- | |||
| Jones, M. Chen, L. MacIntosh, F. Leers, Characterization and | Jones, M. Chen, L. MacIntosh, F. Leers, Characterization and | |||
| Evaluation of TCP and UDP-Based Transport On Real Networks. . Proc. | Evaluation of TCP and UDP-Based Transport On Real Networks. . Proc. | |||
| 3rd Workshop on Protocols for Fast Long-distance Networks, Lyon, | 3rd Workshop on Protocols for Fast Long-distance Networks, Lyon, | |||
| France, 2005. | France, 2005. | |||
| [Hegde04] S. Hegde, D. Lapsley, B. Wydrowski, J. Lindheim, D.Wei, C. | [Hegde04] S. Hegde, D. Lapsley, B. Wydrowski, J. Lindheim, D.Wei, C. | |||
| Jin, S. Low, H. Newman, FAST TCP in High Speed Networks: An | Jin, S. Low, H. Newman, FAST TCP in High Speed Networks: An | |||
| Experimental Study. Proc. GridNets, San Jose, 2004. | Experimental Study. Proc. GridNets, San Jose, 2004. | |||
| Authors' Addresses | Author's Address | |||
| Doug Leith | Doug Leith | |||
| Hamilton Institute | Hamilton Institute | |||
| NUI Maynooth | NUI Maynooth | |||
| Maynooth, Co. Kildare | Maynooth, Co. Kildare | |||
| Ireland | Ireland | |||
| Email: doug.leith@nuim.ie | Email: doug.leith@nuim.ie | |||
| Robert Shorten | ||||
| Hamilton Institute | ||||
| NUI Maynooth | ||||
| Maynooth, Co. KIldare | ||||
| Ireland | ||||
| Email: robert.shorten@nuim.ie | ||||
| Full Copyright Statement | Full Copyright Statement | |||
| Copyright (C) The IETF Trust (2008). | Copyright (C) The IETF Trust (2008). | |||
| This document is subject to the rights, licenses and restrictions | This document is subject to the rights, licenses and restrictions | |||
| contained in BCP 78, and except as set forth therein, the authors | contained in BCP 78, and except as set forth therein, the authors | |||
| retain all their rights. | retain all their rights. | |||
| This document and the information contained herein are provided on an | This document and the information contained herein are provided on an | |||
| "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | |||
| skipping to change at page 15, line 44 ¶ | skipping to change at line 382 ¶ | |||
| attempt made to obtain a general license or permission for the use of | attempt made to obtain a general license or permission for the use of | |||
| such proprietary rights by implementers or users of this | such proprietary rights by implementers or users of this | |||
| specification can be obtained from the IETF on-line IPR repository at | specification can be obtained from the IETF on-line IPR repository at | |||
| http://www.ietf.org/ipr. | http://www.ietf.org/ipr. | |||
| The IETF invites any interested party to bring to its attention any | The IETF invites any interested party to bring to its attention any | |||
| copyrights, patents or patent applications, or other proprietary | copyrights, patents or patent applications, or other proprietary | |||
| rights that may cover technology that may be required to implement | rights that may cover technology that may be required to implement | |||
| this standard. Please address the information to the IETF at | this standard. Please address the information to the IETF at | |||
| ietf-ipr@ietf.org. | ietf-ipr@ietf.org. | |||
| Acknowledgment | ||||
| Funding for the RFC Editor function is provided by the IETF | ||||
| Administrative Support Activity (IASA). | ||||
| End of changes. 25 change blocks. | ||||
| 120 lines changed or deleted | 76 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||