Predicting TCP Throughput From Non-invasive Network Sampling

Loading...
Thumbnail Image
Penn collection
Departmental Papers (ESE)
Degree type
Discipline
Subject
Funder
Grant number
License
Copyright date
Distributor
Related resources
Author
Goyal, Mukul
Rajan, Raju
Contributor
Abstract

In this paper, we wish to derive analytic models that predict the performance of TCP flows between specified end-points using routinely observed network characteristics such as loss and delay. The ultimate goal of our approach is to convert network observables into representative user and application relevant performance metrics.The main contributions of this paper are in studying which network performance data sources are most reflective of session characteristics, and then in thoroughly investigating a new TCP model based on [1] that uses non-invasive network samples to predict the throughput of representative TCP flows between given end-points.

Advisor
Date of presentation
2002-06-23
Conference name
Departmental Papers (ESE)
Conference dates
2023-05-16T22:28:27.000
Conference location
Date Range for Data Collection (Start Date)
Date Range for Data Collection (End Date)
Digital Object Identifier
Series name and number
Volume number
Issue number
Publisher
Publisher DOI
Journal Issue
Comments
Copyright 2002 IEEE. Reprinted from Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies 2002 (INFOCOM 2002), Volume 1, pages 180-189. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Pennsylvania's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
Copyright 2002 IEEE. Reprinted from Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies 2002 (INFOCOM 2002), Volume 1, pages 180-189. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Pennsylvania's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
Recommended citation
Collection