TCP Congestion Control
TCP Congestion Control
TCP Congestion Control
Transmission Control Protocol (TCP) uses a network congestion-avoidance algorithm that includes
various aspects of an additive increase/multiplicative decrease (AIMD) scheme, along with other
schemes including slow start and congestion window, to achieve congestion avoidance. The TCP
congestion-avoidance algorithm is the primary basis for congestion control in the Internet.[1][2][3][4] Per
the end-to-end principle, congestion control is largely a function of internet hosts, not the network itself.
There are several variations and versions of the algorithm implemented in protocol stacks of operating
systems of computers that connect to the Internet.
Contents
Operation
Congestion window
Slow start
Additive increase/multiplicative decrease
Fast retransmit
Algorithms
TCP Tahoe and Reno
TCP Vegas
TCP New Reno
TCP Hybla
TCP BIC
TCP CUBIC
Agile-SD TCP
TCP Westwood+
Compound TCP
TCP Proportional Rate Reduction
TCP BBR
C2TCP
Elastic-TCP
NATCP/NACubic
Other TCP congestion avoidance algorithms
Classification by network awareness
Black box
Grey box
Green box
Usage
See also
Notes
References
Sources
External links
Operation
To avoid congestive collapse, TCP uses a multi-faceted congestion-control strategy. For each connection,
TCP maintains a congestion window, limiting the total number of unacknowledged packets that may be
in transit end-to-end. This is somewhat analogous to TCP's sliding window used for flow control. TCP
uses a mechanism called slow start[1] to increase the congestion window after a connection is initialized
or after a timeout. It starts with a window, a small multiple of the maximum segment size (MSS) in size.
Although the initial rate is low, the rate of increase is very rapid; for every packet acknowledged, the
congestion window increases by 1 MSS so that the congestion window effectively doubles for every
round-trip time (RTT).
When the congestion window exceeds the slow-start threshold, ssthresh,[a] the algorithm enters a new
state, called congestion avoidance. In congestion avoidance state, as long as non-duplicate ACKs are
received[b] the congestion window is additively increased by one MSS every round-trip time.
Congestion window
In TCP, the congestion window is one of the factors that determines the number of bytes that can be sent
out at any time. The congestion window is maintained by the sender. Note that this is not to be confused
with the sliding window size which is maintained by the receiver. The congestion window is a means of
stopping a link between the sender and the receiver from becoming overloaded with too much traffic. It is
calculated by estimating how much congestion there is on the link.
When a connection is set up, the congestion window, a value maintained independently at each host, is
set to a small multiple of the MSS allowed on that connection. Further variance in the congestion
window is dictated by an AIMD approach. This means that if all segments are received and the
acknowledgments reach the sender on time, some constant is added to the window size. When the
window reaches ssthresh, the congestion window increases linearly at the rate of 1/(congestion window)
segment on each new acknowledgement received. The window keeps growing until a timeout occurs. On
timeout:
The flow of data over a TCP connection is also controlled by the use of the receive window advertised by
the receiver. By comparing its own congestion window with the receive window, a sender can determine
how much data it may send at any given time.
Slow start
Slow start is part of the congestion control strategy used by TCP in conjunction with other algorithms to
avoid sending more data than the network is capable of forwarding, that is, to avoid causing network
congestion. The algorithm is specified by RFC 5681.
Although the strategy is referred to as slow start, its congestion window growth is quite aggressive, more
aggressive than the congestion avoidance phase.[1] Before slow start was introduced in TCP, the initial
pre-congestion avoidance phase was even faster.
Slow start begins initially with a congestion window size (CWND) of 1, 2, 4 or 10 MSS.[5][3]:1 The value
for the congestion window size will be increased by one with each acknowledgement (ACK) received,
effectively doubling the window size each round-trip time.[c] The transmission rate will be increased by
the slow-start algorithm until either a loss is detected, or the receiver's advertised window (rwnd) is the
limiting factor, or ssthresh is reached. If a loss event occurs, TCP assumes that it is due to network
congestion and takes steps to reduce the offered load on the network. These measurements depend on the
exact TCP congestion avoidance algorithm used.
TCP Tahoe
When a loss occurs, fast retransmit is sent, half of the current CWND is saved as
ssthresh and slow start begins again from its initial CWND. Once the CWND reaches
ssthresh, TCP changes to congestion avoidance algorithm where each new ACK
increases the CWND by MSS / CWND. This results in a linear increase of the CWND.
TCP Reno
A fast retransmit is sent, half of the current CWND is saved as ssthresh and as new
CWND, thus skipping slow start and going directly to the congestion avoidance algorithm.
The overall algorithm here is called fast recovery.
Once ssthresh is reached, TCP changes from slow-start algorithm to the linear growth (congestion
avoidance) algorithm. At this point, the window is increased by 1 segment for each round-trip delay time
(RTT).
Slow start assumes that unacknowledged segments are due to network congestion. While this is an
acceptable assumption for many networks, segments may be lost for other reasons, such as poor data link
layer transmission quality. Thus, slow start can perform poorly in situations with poor reception, such as
wireless networks.
The slow start protocol also performs badly for short-lived connections. Older web browsers would
create many consecutive short-lived connections to the web server, and would open and close the
connection for each file requested. This kept most connections in the slow start mode, which resulted in
poor response time. To avoid this problem, modern browsers either open multiple connections
simultaneously or reuse one connection for all files requested from a particular web server. Connections,
however, cannot be reused for the multiple third-party servers used by web sites to implement web
advertising, sharing features of social networking services,[6] and counter scripts of web analytics.
Duplicate acknowledgement is the basis for the fast retransmit mechanism. After receiving a packet an
acknowledgement is sent for the last in order byte of data received. For an in order packet, this is
effectively the last packet's sequence number plus its payload length. If the next packet in the sequence is
lost but a third packet in the sequence is received, then the receiver can only acknowledge the last in-
order byte of data, which is the same value as was acknowledged for the first packet. The second packet
is lost and the third packet is not in order, so the last in order byte of data remains the same as before.
Thus a Duplicate acknowledgement occurs. The sender continues to send packets, and a fourth and fifth
packet are received by the receiver. Again, the second packet is missing from the sequence, so the last in
order byte has not changed. Duplicate acknowledgements are sent to both these packets.
When a sender receives three duplicate acknowledgements, it can be reasonably confident that the
segment carrying the data that followed the last in order byte specified in the acknowledgment was lost.
A sender with fast retransmit will then retransmit this packet immediately without waiting for its timeout.
On receipt of the re-transmitted segment, the receiver can acknowledge the last in order byte of data
received. In the above example, this would acknowledge to the end of the payload of the fifth packet.
There is no need to acknowledge intermediate packets.
Algorithms
The naming convention for algorithms may have originated in a 1996 paper by Kevin Fall and Sally
Floyd.[8]
Tahoe: if three duplicate ACKs are received (i.e. four ACKs acknowledging the same
packet, which are not piggybacked on data and do not change the receiver's advertised
window), Tahoe performs a fast retransmit, sets the slow start threshold to half of the
current congestion window, reduces the congestion window to 1 MSS, and resets to slow
start state.[13]
Reno: if three duplicate ACKs are received, Reno will perform a fast retransmit and skip the
slow start phase by instead halving the congestion window (instead of setting it to 1 MSS
like Tahoe), setting the slow start threshold equal to the new congestion window, and enter
a phase called fast recovery.[14]
In both Tahoe and Reno, if an ACK times out (RTO timeout), slow start is used, and both algorithms
reduce congestion window to 1 MSS.
TCP Vegas
Until the mid-1990s, all of TCP's set timeouts and measured round-trip delays were based upon only the
last transmitted packet in the transmit buffer. University of Arizona researchers Larry Peterson and
Lawrence Brakmo introduced TCP Vegas (named after Las Vegas, the largest city in Nevada) in which
timeouts were set and round-trip delays were measured for every packet in the transmit buffer. In
addition, TCP Vegas uses additive increases in the congestion window. In a comparison study of various
TCP congestion control algorithms, TCP Vegas appeared to be the smoothest followed by TCP
CUBIC.[15]
TCP Vegas was not widely deployed outside Peterson's laboratory but was selected as the default
congestion control method for DD-WRT firmware v24 SP2.[16]
Because the timeout is reset whenever there is progress in the transmit buffer, New Reno can fill large
holes, or multiple holes, in the sequence space – much like TCP SACK. Because New Reno can send
new packets at the end of the congestion window during fast recovery, high throughput is maintained
during the hole-filling process, even when there are multiple holes, of multiple packets each. When TCP
enters fast recovery it records the highest outstanding unacknowledged packet sequence number. When
this sequence number is acknowledged, TCP returns to the congestion avoidance state.
A problem occurs with New Reno when there are no packet losses but instead, packets are reordered by
more than 3 packet sequence numbers. In this case, New Reno mistakenly enters fast recovery. When the
reordered packet is delivered, ACK sequence-number progress occurs and from there until the end of fast
recovery, all sequence-number progress produces a duplicate and needless retransmission that is
immediately ACKed.
New Reno performs as well as SACK at low packet error rates, and substantially outperforms Reno at
high error rates.[17]
TCP Hybla
TCP Hybla aims to eliminate penalties to TCP connections that incorporate a high-latency terrestrial or
satellite radio links. Hybla improvements are based on analytical evaluation of the congestion window
dynamics.[18]
TCP BIC
Binary Increase Congestion control is an implementation of TCP with an optimized congestion control
algorithm for high speed networks with high latency (called LFN, long fat networks, in RFC 1072[19]).
BIC is used by default in Linux kernels 2.6.8 through 2.6.18.
TCP CUBIC
CUBIC is a less aggressive and more systematic derivative of BIC, in which the window is a cubic
function of time since the last congestion event, with the inflection point set to the window prior to the
event. CUBIC is used by default in Linux kernels between versions 2.6.19 and 3.2.
Agile-SD TCP
Agile-SD is a Linux-based Congestion Control Algorithm (CCA) which is designed for the real Linux
kernel. It is a receiver-side algorithm employs a loss-based approach using a novel mechanism, called
Agility Factor (AF). It has been proposed by Mohamed A. Alrshah et al.[20] to increase the bandwidth
utilization over high-speed and short-distance networks (low-BDP networks) such as local area networks
or fiber-optic network, especially when the applied buffer size is small. It has been evaluated by
comparing its performance to Compound-TCP (the default CCA in MS Windows) and CUBIC (the
default of Linux) using NS-2 simulator. It improves the total performance up to 55% in term of average
throughput.
TCP Westwood+
Westwood+ is a sender-side only modification of the TCP Reno protocol stack that optimizes the
performance of TCP congestion control over both wireline and wireless networks. TCP Westwood+ is
based on end-to-end bandwidth estimation to set congestion window and slow start threshold after a
congestion episode, that is, after three duplicate acknowledgments or a timeout. The bandwidth is
estimated by properly low-pass filtering the rate of returning acknowledgment packets. The rationale of
this strategy is simple: in contrast with TCP Reno, which blindly halves the congestion window after
three duplicate ACKs, TCP Westwood+ adaptively sets a slow start threshold and a congestion window
which takes into account the bandwidth used at the time congestion is experienced. TCP Westwood+
significantly increases throughput over wireless links and fairness compared to TCP Reno/New Reno in
wired networks.
Compound TCP
Compound TCP is a Microsoft implementation of TCP which maintains two different congestion
windows simultaneously, with the goal of achieving good performance on LFNs while not impairing
fairness. It has been widely deployed in Windows versions since Microsoft Windows Vista and Windows
Server 2008 and has been ported to older Microsoft Windows versions as well as Linux.
TCP BBR
Bottleneck Bandwidth and Round-trip propagation time (BBR) is a TCP congestion control algorithm
developed at Google in 2016.[24] While most congestion control algorithms are loss-based, in that they
rely on packet loss as a signal to lower rates of transmission, BBR, like Vegas, is model-based. The
algorithm uses the maximum bandwidth and round-trip time at which the network delivered the most
recent flight of outbound data packets to build an explicit model of the network. Each cumulative or
selective acknowledgment of packet delivery produces a rate sample which records the amount of data
delivered over the time interval between the transmission of a data packet and the acknowledgment of
that packet.[25] As network interface controllers evolve from megabit per second to gigabit per second
performance, latency associated with bufferbloat instead of packet loss becomes a more reliable marker
of the maximum throughput, making latency/model-based congestion control algorithms which provide
higher throughput and lower latency, such as BBR, a more reliable alternative to more popular loss-based
algorithms like CUBIC.
When implemented within YouTube, BBR yielded an average of 4% higher network throughput and up
to 14% in some countries.[26] BBR is also available for QUIC. It is available for Linux TCP since Linux
4.9.[27][28]
BBR is efficient and fast, but its fairness to non-BBR streams is disputed. While Google's presentation
shows BBR co-existing well with CUBIC,[24] researchers like Geoff Huston and Hock, Bless and
Zitterbart finds it unfair to other streams and not scalable.[29] Hock et al also found "some severe inherent
issues such as increased queuing delays, unfairness, and massive packet loss" in the BBR implementation
of Linux 4.9.[30]
Soheil Abbasloo et al. (authors of C2TCP) show that BBR doesn't perform well in dynamic environments
such as cellular networks.[9][10] They have also shown that BBR has an unfairness issue. For instance,
when a CUBIC flow (which is the default TCP implementation in Linux, Android, and MacOS) coexists
with a BBR flow in the network, the BBR flow can dominate the CUBIC flow and get the whole link
bandwidth from it (see figure 18 in [9]).
C2TCP
Cellular Controlled Delay TCP (C2TCP)[9][10] was motivated by the lack of a flexible end-to-end TCP
approach that can satisfy various QoS requirements of different applications without requiring any
changes in the network devices. C2TCP aims to satisfy ultra-low latency and high bandwidth
requirements of applications such as virtual reality, video conferencing, online gaming, vehicular
communication systems, etc. in a highly dynamic environment such as current LTE and future 5G
cellular networks. C2TCP works as an add-on on top of loss-based TCP (e.g. Reno, NewReno, CUBIC,
BIC, ...) and makes the average delay of packets bounded to the desired delays set by the applications.
Researchers at NYU[31] showed that C2TCP outperforms the delay/Jitter performance of various state-
of-the-art TCP schemes. For instance, they showed that compared to BBR, CUBIC, and Westwood on
average, C2TCP decreases the average delay of packets by about 250%, 900%, and 700% respectively on
various cellular network environments.[9]
Elastic-TCP
Elastic-TCP has been proposed in February 2019 by Mohamed A. Alrshah et al.[32] to increase the
bandwidth utilization over high-BDP networks to support recent applications such as cloud computing,
big data transfer, IoT, etc. It is a Linux-based Congestion Control Algorithm (CCA) which is designed for
the Linux kernel. It is a receiver-side algorithm that employs a Loss-delay-based approach using a novel
mechanism, called Window-correlated Weighting Function (WWF). It has a high level of elasticity to
deal with different network characteristics without the need for human tuning. It has been evaluated by
comparing its performance to Compound-TCP (the default CCA in MS Windows), CUBIC (the default
of Linux) and TCP-BBR (the default of Linux 4.9 by Google) using NS-2 simulator and testbed. Elastic-
TCP significantly improves the total performance in term of average throughput, loss ratio, and delay.[32]
NATCP/NACubic
Recently, Soheil Abbasloo et. al. proposed NATCP (Network-Assisted TCP)[11] a controversial TCP
design targeting Mobile Edge networks such as MEC. The key idea of NATCP is that if the
characteristics of the network were known beforehand, TCP would have been designed in a better way.
Therefore, NATCP employs the available features and properties in the current MEC-based cellular
architectures to push the performance of TCP close to the optimal performance. NATCP uses an out-of-
band feedback from the network to the servers located nearby. The feedback from the network, which
includes the capacity of cellular access link and the minimum RTT of the network, guides the servers to
adjust their sending rates. As preliminary results show,[11][33] NATCP outperforms the state-of-the-art
TCP schemes by at least achieving 2x higher Power (defined as Throughput/Delay). NATCP replaces the
traditional TCP scheme at the sender.
To deal with backward compatibility issue, they proposed another version called NACubic. NACubic is a
backward compatible design, requiring no change in TCP on the connected nodes. NACubic employs the
received feedback and enforces a cap on the congestion window (CWND) and the pacing rate as
required. [11]
When the per-flow product of bandwidth and latency increases, regardless of the queuing scheme, TCP
becomes inefficient and prone to instability. This becomes increasingly important as the Internet evolves
to incorporate very high-bandwidth optical links.
TCP Interactive (iTCP)[43] allows applications to subscribe to TCP events and respond accordingly
enabling various functional extensions to TCP from outside TCP layer. Most TCP congestion schemes
work internally. iTCP additionally enables advanced applications to directly participate in congestion
control such as to control the source generation rate.
Zeta-TCP detects the congestions from both the latency and loss rate measures, and applies different
congestion window backoff strategies based on the likelihood of the congestions to maximize the
goodput. It also has a couple of other improvements to accurately detect the packet losses, avoiding
retransmission timeout retransmission; and accelerate/control the inbound (download) traffic.[44]
Black box algorithms offer blind methods of congestion control. They operate only on the binary
feedback received upon congestion and do not assume any knowledge concerning the state of the
networks which they manage.
Grey box algorithms use time-instances in order to obtain measurements and estimations of bandwidth,
flow contention, and other knowledge of network conditions.
Green box algorithms offer bimodal methods of congestion control which measures the fair-share of total
bandwidth which should be allocated for each flow, at any point, during the system's execution.
Black box
Highspeed-TCP[46]
BIC TCP (Binary Increase Congestion Control Protocol) uses a concave increase of the
sources rate after each congestion event until the window is equal to that before the event,
in order to maximise the time that the network is fully utilised. After that, it probes
aggressively.
CUBIC TCP – a less aggressive and more systematic derivative of BIC, in which the
window is a cubic function of time since the last congestion event, with the inflection point
set to the window prior to the event.
AIMD-FC (Additive Increase Multiplicative Decrease with Fast Convergence), an
improvement of AIMD.[47]
Binomial Mechanisms
SIMD Protocol
GAIMD
Grey box
TCP Vegas – estimates the queuing delay, and linearly increases or decreases the window
so that a constant number of packets per flow are queued in the network. Vegas
implements proportional fairness.
FAST TCP – achieves the same equilibrium as Vegas, but uses proportional control instead
of linear increase, and intentionally scales the gain down as the bandwidth increases with
the aim of ensuring stability.
TCP BBR – estimates the queuing delay, but uses exponential increase. Intentionally slows
down periodically for fairness and decreased delay.
TCP-Westwood (TCPW) – a loss causes the window to be reset to the sender's estimate of
the bandwidth-delay product, which is the smallest measured RTT times the observed rate
of receiving ACKs.[48]
C2TCP[10][9]
TFRC[49]
TCP-Real
TCP-Jersey
Green box
Bimodal Mechanism – Bimodal Congestion Avoidance and Control mechanism.
Signalling methods implemented by routers
Random Early Detection (RED) randomly drops packets in proportion to the router's
queue size, triggering multiplicative decrease in some flows.
Explicit Congestion Notification (ECN)
Network-Assisted Congestion Control
Explicit Control Protocol (XCP) – XCP routers signal explicit increase and decreases in the
senders' congestion windows.
MaxNet – MaxNet uses a single header field, which carries the maximum congestion level
of any router on a flow's path. The rate is set as a function of this maximum congestion,
resulting in max-min fairness.[50]
JetMax – JetMax, like MaxNet, also responds only to the maximum congestion signal, but
also carries other overhead fields
Usage
BIC is used by default in Linux kernels 2.6.8 through 2.6.18. (August 2004 – September
2006)
CUBIC is used by default in Linux kernels since version 2.6.19. (November 2006)
PRR is incorporated in Linux kernels to improve loss recovery since version 3.2. (January
2012)
BBR is incorporated in Linux kernels to enable model-based congestion control since
version 4.9. (December 2016)
See also
Transmission Control Protocol §§ Congestion control and Development
Network congestion § Mitigation
Low Extra Delay Background Transport (LEDBAT)
Notes
a. In some implementations (e.g., Linux), the initial ssthresh is large, and so the first slow start
usually ends after a loss. However, ssthresh is updated at the end of each slow start, and
will often affect subsequent slow starts triggered by timeouts.
b. When a packet is lost, the likelihood of duplicate ACKs being received is very high. It is also
possible in this case, though unlikely, that the stream just underwent extreme packet
reordering, which would also prompt duplicate ACKs.
c. Even if, actually, the receiver may delay its ACKs, typically sending one ACK for every two
segments that it receives[2]
References
1. Jacobson & Karels 1988.
2. W. Stevens (January 1997). TCP Slow Start, Congestion Avoidance, Fast Retransmit, and
Fast Recovery Algorithms (https://tools.ietf.org/html/rfc2001). doi:10.17487/RFC2001 (http
s://doi.org/10.17487%2FRFC2001). RFC 2001.
3. M. Allman; S. Floyd; C. Partridge (October 2002). Increasing TCP's Initial Window (https://to
ols.ietf.org/html/rfc3390). doi:10.17487/RFC3390 (https://doi.org/10.17487%2FRFC3390).
RFC 3390.
4. "TCP Congestion Avoidance Explained via a Sequence Diagram" (http://www.eventhelix.co
m/RealtimeMantra/Networking/TCP_Congestion_Avoidance.pdf) (PDF). eventhelix.com.
5. Corbet, Jonathan. "Increasing the TCP initial congestion window" (https://lwn.net/Articles/42
7104/). LWN. Retrieved 10 October 2012.
6. Nick O'Neill. "What's Making Your Site Go Slow? Could Be The Like Button (http://allfacebo
ok.com/whats-making-your-site-go-slow-could-be-the-like-button_b24121)". AllFacebook,
10 November 2010. Retrieved on 12 September 2012.
7. Chiu, Dah-Ming; Raj Jain (1989). "Analysis of increase and decrease algorithms for
congestion avoidance in computer networks". Computer Networks and ISDN Systems. 17:
1–14. CiteSeerX 10.1.1.136.8108 (https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.
1.136.8108). doi:10.1016/0169-7552(89)90019-6 (https://doi.org/10.1016%2F0169-7552%2
889%2990019-6).
8. Fall, Kevin; Sally Floyd (July 1996). "Simulation-based Comparisons of Tahoe, Reno and
SACK TCP" (https://www.icir.org/floyd/papers/sacks.pdf) (PDF). Computer Communications
Review.
9. Abbasloo, S.; Xu, Y.; Chao, H. J. (2019). "C2TCP: A Flexible Cellular TCP to Meet Stringent
Delay Requirements". IEEE Journal on Selected Areas in Communications. 37 (4): 918–
932. arXiv:1810.13241 (https://arxiv.org/abs/1810.13241). doi:10.1109/JSAC.2019.2898758
(https://doi.org/10.1109%2FJSAC.2019.2898758). ISSN 0733-8716 (https://www.worldcat.o
rg/issn/0733-8716).
10. Abbasloo, S.; Li, T.; Xu, Y.; Chao, H. J. (May 2018). "Cellular Controlled Delay TCP
(C2TCP)". 2018 IFIP Networking Conference and Workshops: 118–126. arXiv:1807.02689
(https://arxiv.org/abs/1807.02689). Bibcode:2018arXiv180702689A (https://ui.adsabs.harvar
d.edu/abs/2018arXiv180702689A). doi:10.23919/IFIPNetworking.2018.8696844 (https://doi.
org/10.23919%2FIFIPNetworking.2018.8696844). ISBN 978-3-903176-08-9.
11. Abbasloo et al. 2019.
12. "BBR: Congestion-Based Congestion Control" (https://queue.acm.org/detail.cfm?id=302218
4). ACM Queue. doi:10.1145/3012426.3022184 (https://doi.org/10.1145%2F3012426.30221
84) (inactive 22 January 2020). Retrieved 6 December 2016.
13. Kurose & Ross 2008, p. 284.
14. Kurose & Ross 2012, p. 277.
15. "Performance Analysis of TCP Congestion Control Algorithms" (http://www.wseas.us/journal
s/cc/cc-27.pdf) (PDF). Retrieved 26 March 2012.
16. "DD-WRT changelog" (http://www.dd-wrt.com/wiki/index.php/Changelog). Retrieved
2 January 2012.
17. VasanthiN., V.; SinghM., Ajith; Kumar, Romen; Hemalatha, M. (2011). Das, Vinu V;
Thankachan, Nessy (eds.). "Evaluation of Protocols and Algorithms for Improving the
Performance of TCP over Wireless/Wired Network". International Conference on
Computational Intelligence and Information Technology. Springer: 693–697.
18. "Archived copy" (https://web.archive.org/web/20071011095352/http://hybla.deis.unibo.it/).
Archived from the original (http://hybla.deis.unibo.it/) on 11 October 2007. Retrieved
4 March 2007.
19. V., Jacobson; R.T., Braden. "TCP extensions for long-delay paths" (http://tools.ietf.org/html/r
fc1072). tools.ietf.org.
20. Alrshah, M.A.; Othman, M.; Ali, B.; Hanapi, Z.M. (September 2015). "Agile-SD: A Linux-
based TCP congestion control algorithm for supporting high-speed and short-distance
networks". Journal of Network and Computer Applications. 55: 181–190.
doi:10.1016/j.jnca.2015.05.011 (https://doi.org/10.1016%2Fj.jnca.2015.05.011).
21. "Proportional Rate Reduction for TCP" (http://tools.ietf.org/html/rfc6937). Retrieved 6 June
2014.
22. Corbet, Jonathan. "LPC: Making the net go faster" (https://lwn.net/Articles/458610/).
Retrieved 6 June 2014.
23. "Linux 3.2 - Linux Kernel Newbies" (http://kernelnewbies.org/Linux_3.2#head-1c3e71416a9f
dc2f59c1c251a97963f165302b6e). Retrieved 6 June 2014.
24. "BBR: Congestion-Based Congestion Control" (https://research.google.com/pubs/pub4564
6.html). Retrieved 25 August 2017.
25. "Delivery Rate Estimation" (https://tools.ietf.org/html/draft-cheng-iccrg-delivery-rate-estimati
on-00#section-2.2). Retrieved 25 August 2017.
26. "TCP BBR congestion control comes to GCP – your Internet just got faster" (https://cloudpla
tform.googleblog.com/2017/07/TCP-BBR-congestion-control-comes-to-GCP-your-Internet-j
ust-got-faster.html). Retrieved 25 August 2017.
27. "BBR congestion control [LWN.net]" (https://lwn.net/Articles/701165/). lwn.net.
28. "BBR update" (https://datatracker.ietf.org/meeting/100/materials/slides-100-iccrg-a-quick-bb
r-update-bbr-in-shallow-buffers). datatracker.ietf.org.
29. "TCP and BBR" (https://ripe76.ripe.net/presentations/10-2018-05-15-bbr.pdf) (PDF).
Retrieved 27 May 2018.
30. "Experimental Evaluation of BBR Congestion Control" (https://doc.tm.uka.de/2017-kit-icnp-b
br-authors-copy.pdf) (PDF). Retrieved 27 May 2018.
31. "Cellular Controlled Delay TCP (C2TCP)" (https://wp.nyu.edu/c2tcp/). wp.nyu.edu.
Retrieved 27 April 2019.
32. Alrshah, M.A.; Al-Maqri, M.A.; Othman, M. (June 2019). "Elastic-TCP: Flexible Congestion
Control Algorithm to Adapt for High-BDP Networks". IEEE Systems Journal. 13 (2): 1336–
1346. arXiv:1904.13105 (https://arxiv.org/abs/1904.13105). Bibcode:2019ISysJ..13.1336A
(https://ui.adsabs.harvard.edu/abs/2019ISysJ..13.1336A).
doi:10.1109/JSYST.2019.2896195 (https://doi.org/10.1109%2FJSYST.2019.2896195).
33. Abbasloo, Soheil (3 June 2019), GitHub - Soheil-ab/natcp (https://github.com/Soheil-ab/natc
p), retrieved 5 August 2019
34. Yuan, Cao; Tan, Liansheng; Andrew, Lachlan L. H.; Zhang, Wei; Zukerman, Moshe (5
September 2008). "A generalized FAST TCP scheme". Computer Communications. 31 (14):
3242–3249. doi:10.1016/j.comcom.2008.05.028 (https://doi.org/10.1016%2Fj.comcom.200
8.05.028). hdl:1959.3/44051 (https://hdl.handle.net/1959.3%2F44051).
35. "Rice Networks Group" (http://www.ece.rice.edu/networks/TCP-LP/).
36. "TCP Veno: TCP Enhancement for Transmission over Wireless Access Networks" (https://w
ww.ie.cuhk.edu.hk/fileadmin/staff_upload/soung/Journal/J3.pdf) (PDF). IEEE Journal on
Selected Areas in Communication.
37. "XCP @ ISI" (http://www.isi.edu/isi-xcp/).
38. "High speed TPC" (http://www.csc.lsu.edu/~sjpark/cs7601/4-YeAH_TCP.pdf) (PDF).
www.csc.lsu.edu.
39. "Archived copy" (https://web.archive.org/web/20110403142334/http://media.cs.tsinghua.ed
u.cn/~multimedia/tcp-fit/). Archived from the original (http://media.cs.tsinghua.edu.cn/~multi
media/tcp-fit/) on 3 April 2011. Retrieved 5 March 2011.
40. Benaboud, H.; Berqia, A.; Mikou, N. (2002). "An analytical study of CANIT algorithm in TCP
protocol". ACM Sigmetrics Performance Evaluation Review. 30 (3): 20.
doi:10.1145/605521.605530 (https://doi.org/10.1145%2F605521.605530).
41. Rouhani, Modjtaba. "Nonlinear Neural Network Congestion Control Based on Genetic
Algorithm for TCP/IP Networks" (https://ieeexplore.ieee.org/document/5615789).
42. "Summary of Five New TCP Congestion Control Algorithms Project" (http://forums.freebsd.o
rg/showthread.php?t=22396).
43. "iTCP - Interactive Transport Protocol - Medianet Lab, Kent State University" (http://www.me
dianet.kent.edu/itcp/main.html).
44. "Whitepaper: Zeta-TCP - Intelligent, Adaptive, Asymmetric TCP Acceleration" (http://www.a
ppexnetworks.com/Assets/PDF/ZetaTCP.pdf) (PDF). Retrieved 6 December 2019.
45. Lefteris Mamatas; Tobias Harks; Vassilis Tsaoussidis (January 2007). "Approaches to
Congestion Control in Packet Networks" (https://web.archive.org/web/20140221123729/htt
p://utopia.duth.gr/~emamatas/jie2007.pdf) (PDF). Journal of Internet Engineering. 1 (1).
Archived from the original (http://utopia.duth.gr/~emamatas/jie2007.pdf) (PDF) on 21
February 2014.
46. "HighSpeed TCP" (http://www.icir.org/floyd/hstcp.html). www.icir.org.
47. "AIMD-FC Homepage" (https://web.archive.org/web/20090113204941/http://www.ccs.neu.e
du/home/ladrian/abstract/aimdfc.html). neu.edu. Archived from the original (http://www.ccs.n
eu.edu/home/ladrian/abstract/aimdfc.html) on 13 January 2009. Retrieved 13 March 2016.
48. "Welcome to Network Research Lab" (http://www.cs.ucla.edu/NRL/hpi/tcpw/).
www.cs.ucla.edu.
49. "Equation-Based Congestion Control for Unicast Applications" (http://www.icir.org/tfrc/).
www.icir.org.
50. "MaxNet -- Max-Min Fair, Stable Explicit Signalling Congestion Control" (http://netlab.caltec
h.edu/maxnet/). netlab.caltech.edu.
Sources
Kurose, James; Ross, Keith (2008). Computer Networking: A Top-Down Approach (4th ed.).
Addison Wesley. ISBN 978-0-13-607967-5.
Kurose, James; Ross, Keith (2012). Computer Networking: A Top-Down Approach (6th ed.).
Pearson. ISBN 978-0-13-285620-1.
Abbasloo, Soheil; Xu, Yang; Chao, H. Jonathon; Shi, Hang; Kozat, Ulas C.; Ye, Yinghua
(2019). "Toward Optimal Performance with Network Assisted {TCP} at Mobile Edge" (https://
www.usenix.org/conference/hotedge19/presentation/abbasloo). Renton, WA: USENIX
Association.
Afanasyev, A.; N. Tilley; P. Reiher; L. Kleinrock (2010). "Host-to-host congestion control for
TCP" (http://lasr.cs.ucla.edu/afanasyev/data/files/Afanasyev/Host-to-host%20congestion%2
0control%20for%20TCP.pdf) (PDF). IEEE Communications Surveys and Tutorials. 12 (3):
304–342. CiteSeerX 10.1.1.228.3080 (https://citeseerx.ist.psu.edu/viewdoc/summary?doi=1
0.1.1.228.3080). doi:10.1109/SURV.2010.042710.00114 (https://doi.org/10.1109%2FSURV.
2010.042710.00114).
Jacobson, Van; Karels, Michael J. (November 1988). "Congestion avoidance and control" (h
ttp://ee.lbl.gov/papers/congavoid.pdf) (PDF). ACM SIGCOMM Computer Communication
Review. 18 (4): 314–329. doi:10.1145/52325.52356 (https://doi.org/10.1145%2F52325.5235
6).
External links
Approaches to Congestion Control in Packet Networks (https://web.archive.org/web/201402
21123729/http://utopia.duth.gr/~emamatas/jie2007.pdf) (PDF), archived from the original (ht
tp://utopia.duth.gr/~emamatas/jie2007.pdf) (PDF) on 21 February 2014
Papers in Congestion Control (http://www.shivkumar.org/research/cong-papers.html)
TCP Vegas Homepage (http://www.cs.arizona.edu/projects/protocols/)
Allman, Mark; Paxson, Vern; Stevens, W. Richard (April 1999). "Fast Retransmit/Fast
Recovery" (https://tools.ietf.org/html/rfc2581#section-3.2). TCP Congestion Control (https://t
ools.ietf.org/html/rfc2581). IETF. sec. 3.2. doi:10.17487/RFC2581 (https://doi.org/10.1748
7%2FRFC2581). RFC 2581. Retrieved 1 May 2010.
TCP Congestion Handling and Congestion Avoidance Algorithms (http://www.tcpipguide.co
m/free/t_TCPCongestionHandlingandCongestionAvoidanceAlgorit-3.htm) – The TCP/IP
Guide
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using
this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia
Foundation, Inc., a non-profit organization.