Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperAugust 2024
POSTER: Expanding the Design Space for in-Network Congestion Control on the Internet
ACM SIGCOMM Posters and Demos '24: Proceedings of the ACM SIGCOMM 2024 Conference: Posters and DemosPages 42–44https://doi.org/10.1145/3672202.3673733The Internet has historically been built on the assumption of a smart edge and a dumb network. This design philosophy is also reflected in end-to-end Internet congestion control. The stability and general fairness of the current Internet are heavily ...
- research-articleAugust 2024
Keeping an Eye on Congestion Control in the Wild with Nebby
ACM SIGCOMM '24: Proceedings of the ACM SIGCOMM 2024 ConferencePages 136–150https://doi.org/10.1145/3651890.3672223The Internet congestion control landscape is rapidly evolving. Since the introduction of BBR and the deployment of QUIC, it has become increasingly commonplace for companies to modify and implement their own congestion control algorithms (CCAs). To ...
- research-articleOctober 2023
Containing the Cambrian Explosion in QUIC Congestion Control
IMC '23: Proceedings of the 2023 ACM on Internet Measurement ConferencePages 526–539https://doi.org/10.1145/3618257.3624811Since its introduction in 2015, QUIC has seen rapid adoption and is set to be the default transport stack for HTTP3. Given that developers can now easily implement and deploy their own congestion control algorithms in the user space, there is an imminent ...
Masking Corruption Packet Losses in Datacenter Networks with Link-local Retransmission
ACM SIGCOMM '23: Proceedings of the ACM SIGCOMM 2023 ConferencePages 288–304https://doi.org/10.1145/3603269.3604853Packet loss due to link corruption is a major problem in large warehouse-scale datacenters. The current state-of-the-art approach of disabling corrupting links is not adequate because, in practice, all the corrupting links cannot be disabled due to ...
- research-articleOctober 2022
Understanding speciation in QUIC congestion control
IMC '22: Proceedings of the 22nd ACM Internet Measurement ConferencePages 560–566https://doi.org/10.1145/3517745.3561459The QUIC standard is expected to replace TCP in HTTP 3.0. While QUIC implements a number of the standard features of TCP differently, most QUIC stacks re-implement standard congestion control algorithms. This is because these algorithms are well-...
-
- research-articleOctober 2022
Are we heading towards a BBR-dominant internet?
IMC '22: Proceedings of the 22nd ACM Internet Measurement ConferencePages 538–550https://doi.org/10.1145/3517745.3561429Since its introduction in 2016, BBR has grown in popularity rapidly and likely already accounts for more than 40% of the Internet's downstream traffic. In this paper, we investigate the following question: given BBR's performance benefits and rapid ...
- research-articleNovember 2023
LinkGuardian: Mitigating the impact of packet corruption loss with link-local retransmission
APNet '22: Proceedings of the 6th Asia-Pacific Workshop on NetworkingPages 36–42https://doi.org/10.1145/3542637.3542643Packet corruption loss is a serious problem in datacenter networks. A large-scale study by Microsoft reported that the number of packets lost due to corruption is comparable to those lost due to congestion. Previous attempts to mitigate the impact of ...
- research-articleJuly 2020
The Great Internet TCP Congestion Control Census
ACM SIGMETRICS Performance Evaluation Review (SIGMETRICS), Volume 48, Issue 1Pages 59–60https://doi.org/10.1145/3410048.3410083In 2016, Google proposed and deployed a new TCP variant called BBR. BBR represents a major departure from traditional congestion control as it uses estimates of bandwidth and round-trip delays to regulate its sending rate. BBR has since been introduced ...
- abstractJune 2020
The Great Internet TCP Congestion Control Census
SIGMETRICS '20: Abstracts of the 2020 SIGMETRICS/Performance Joint International Conference on Measurement and Modeling of Computer SystemsPages 59–60https://doi.org/10.1145/3393691.3394221In 2016, Google proposed and deployed a new TCP variant called BBR. BBR represents a major departure from traditional congestion control as it uses estimates of bandwidth and round-trip delays to regulate its sending rate. BBR has since been introduced ...
- research-articleDecember 2019
The Great Internet TCP Congestion Control Census
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 3, Issue 3Article No.: 45, Pages 1–24https://doi.org/10.1145/3366693In 2016, Google proposed and deployed a new TCP variant called BBR. BBR represents a major departure from traditional congestion-window-based congestion control. Instead of using loss as a congestion signal, BBR uses estimates of the bandwidth and round-...
- research-articleFebruary 2020
Re-factoring based program repair applied to programming assignments
ASE '19: Proceedings of the 34th IEEE/ACM International Conference on Automated Software EngineeringPages 388–398https://doi.org/10.1109/ASE.2019.00044Automated program repair has been used to provide feedback for incorrect student programming assignments, since program repair captures the code modification needed to make a given buggy program pass a given test-suite. Existing student feedback ...
- research-articleAugust 2018
BurstRadar: Practical Real-time Microburst Monitoring for Datacenter Networks
APSys '18: Proceedings of the 9th Asia-Pacific Workshop on SystemsArticle No.: 8, Pages 1–8https://doi.org/10.1145/3265723.3265731Microbursts can degrade application performance in datacenters by causing increased latency, jitter and packet loss. The detection of microbursts and identification of the contributing flows is the first step towards mitigating this problem. ...
- research-articleNovember 2017
TCP Congestion Control Beyond Bandwidth-Delay Product for Mobile Cellular Networks
CoNEXT '17: Proceedings of the 13th International Conference on emerging Networking EXperiments and TechnologiesPages 167–179https://doi.org/10.1145/3143361.3143378TCP does not work well in modern cellular networks because the current congestion-window-based (cwnd-based) congestion control mechanism intimately couples congestion control and packet dispatch, which provides TCP with only indirect control of the ...
- ArticleOctober 2015
Improving Neighbor Discovery with Slot Index Synchronization
MASS '15: Proceedings of the 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)Pages 253–261https://doi.org/10.1109/MASS.2015.14Neighbor discovery is essential for docking applications, where mobile nodes communicate with static nodes situated at various rendezvous points. In existing neighbor discovery protocols, the probabilistic protocols perform well in the average-case but ...
- research-articleOctober 2015
SkyStitch: A Cooperative Multi-UAV-based Real-time Video Surveillance System with Stitching
MM '15: Proceedings of the 23rd ACM international conference on MultimediaPages 261–270https://doi.org/10.1145/2733373.2806225Recent advances in unmanned aerial vehicle (UAV) technologies have made it possible to deploy an aerial video surveillance system to provide an unprecedented aerial perspective for ground monitoring in real time. Multiple UAVs would be required to cover ...
- research-articleSeptember 2014
Potential pitfalls of the message in message mechanism in modern 802.11 networks
WiNTECH '14: Proceedings of the 9th ACM international workshop on Wireless network testbeds, experimental evaluation and characterizationPages 41–48https://doi.org/10.1145/2643230.2643231We study the performance impact of the Message in Message (MIM) mechanism in modern 802.11 networks. The MIM mechanism refers to the capability of receiver to abandon an ongoing reception of an 802.11 MAC frame and shift to decode another frame with a ...
- ArticleMarch 2014
An End-to-End Measurement Study of Modern Cellular Data Networks
PAM 2014: Proceedings of the 15th International Conference on Passive and Active Measurement - Volume 8362Pages 34–45https://doi.org/10.1007/978-3-319-04918-2_4With the significant increase in cellular data usage, it is critical to better understand the characteristics and behavior of cellular data networks. With both laboratory experiments and crowd-sourcing measurements, we investigated the characteristics ...