Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1095921.1095948acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
Article

Root cause analysis for long-lived TCP connections

Published: 24 October 2005 Publication History

Abstract

While the applications using the Internet have changed over time, TCP is still the dominating transport protocol that carries over 90% of the total traffic. Throughput is the key performance metric for long TCP connections. The achieved throughput results from the aggregate effects of the network path, the parameters of the TCP end points, and the application on top of TCP. Finding out which of these factors is limiting the throughput of a TCP connection -- referred to as TCP root cause analysis -- is important for end users that want to understand the origins of their problems, ISPs that need to troubleshoot their network, and application designers that need to know how to interpret the performance of the application. In this paper, we revisit TCP root cause analysis by first demonstrating the weaknesses of a previously proposed flight-based approach. We next discuss in detail the different possible limitations and highlight the need to account for the application behavior during the analysis process. The main contribution of this paper is a new approach based on the analysis of time series extracted from packet traces. These time series allow for a quantitative assessment of the different causes with respect to the resulting throughput. We demonstrate the interest of our approach on a large BitTorrent dataset.

References

[1]
S. Baset and H. Schulzrinne, "An Analysis of the Skype P2P Internet Telephony Protocol", CUCS-039-04, Department of Computer Science, Columbia University, 2004.
[2]
J. Bellardo and S. Savage, "Measuring packet reordering", In IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, pp. 97--105, New York, NY, USA, 2002, ACM Press.
[3]
S. M. Bellovin, "A technique for counting natted hosts", In IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, pp. 267--272, New York, NY, USA, 2002, ACM Press.
[4]
M. Carson and D. Santay, "NIST Net: a Linux-based network emulation tool", Comput. Commun. Rev., 33(3):111--126, 2003.
[5]
K. Claffy, R. S. Prasad, M. Murray, and C. Dovrolis, "Bandwidth Estimation: Metrics, Measurement Techniques, and Tools", IEEE Network, 17(6):27--35, November 2003.
[6]
M. Dyrna, "Network Tomography Tools", M.S. Thesis, TU Muenchen/Eurecom, September 2005.
[7]
N. Hu, L. E. Li, Z. M. Mao, P. Steenkiste, and J. Wang, "Locating internet bottlenecks: algorithms, measurements, and implications", In Proceedings of ACM SIGCOMM 2004 Conference, pp. 41--54, New York, NY, USA, 2004, ACM Press.
[8]
M. Izal, G. Urvoy-Keller, E. Biersack, P. Felber, A. Al Hamra, and L. Garcés-Erice, "Dissecting BitTorrent: Five Months in a Torrent's Lifetime", In Passive and Active Measurements 2004, April 2004.
[9]
S. Katti, D. Katabi, C. Blake, E. Kohler, and J. Strauss, "MultiQ: Automated Detection of Multiple Bottleneck Capacities Along a Path", In Proceedings of Internet Measurement Conference (IMC '04), pp. 245--250, October 2004.
[10]
M. Mathis, J. Heffner, and R. Reddy, "Web100: extended TCP instrumentation for research, education and diagnosis", SIGCOMM Comput. Commun. Rev., 33(3):69--79, 2003.
[11]
M. Mathis, J. Semke, J. Mahdavi, and T. Ott, "The Macroscopic Behavior of the TCP Congestion Avoidance Algorithm", SIGCOMM Comput. Commun. Rev., 27(3):67--82, July 1997.
[12]
A. Medina, M. Allman, and S. Floyd, "Measuring the Evolution of Transport Protocols in the Internet", Comput. Commun. Rev., 35(2):37--52, April 2005.
[13]
R. S. Prasad, M. Jain, and C. Dovrolis, "Socket Buffer Auto-Sizing for High-Performance Data Transfers", Journal of Grid Computing, 1(4):361--376, December 2003.
[14]
S. Shakkottai, R. Srikant, N. Brownlee, A. Broido, and kc claffy, "The RTT Distribution of TCP Flows in the Internet and its Impact on TCPbased Flow Control", Cooperative Association for Internet Data Analysis (CAIDA), University of Illinois, 2004.
[15]
B. Silverman, Density Estimation for Statistics and Data Analysis, CRC Press, 1986, ISBN 0412246201.
[16]
R. Teixeira and J. Rexford, "A measurement framework for pin-pointing routing changes", In NetT '04: Proceedings of the ACM SIGCOMM workshop on Network troubleshooting, pp. 313--318, New York, NY, USA, 2004, ACM Press.
[17]
B. Veal, K. Li, and D. Lowenthal, "New Methods for Passive Estimation of TCP Round-Trip Times", In Proceedings of Passive and Active Measurements(PAM), 2005.
[18]
Y. Zhang, L. Breslau, V. Paxson, and S. Shenker, "On the Characteristics and Origins of Internet Flow Rates", In Proceedings of ACM SIGCOMM 2002 Conference, Pittsburgh, PA, USA, August 2002.

Cited By

View all
  • (2020)Vulnerability Prioritization, Root Cause Analysis, and Mitigation of Secure Data Analytic Framework Implemented with MongoDB on Singularity Linux ContainersProceedings of the 2020 the 4th International Conference on Compute and Data Analysis10.1145/3388142.3388168(58-66)Online publication date: 9-Mar-2020
  • (2017)Cross Fertilization Between Wireless Testbeds and NS-3 Simulation ModelsProceedings of the 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems10.1145/3127540.3127550(295-302)Online publication date: 21-Nov-2017
  • (2012)Explaining BGP Slow Table TransfersProceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems10.1109/ICDCS.2012.14(657-666)Online publication date: 18-Jun-2012
  • Show More Cited By

Index Terms

  1. Root cause analysis for long-lived TCP connections

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CoNEXT '05: Proceedings of the 2005 ACM conference on Emerging network experiment and technology
        October 2005
        318 pages
        ISBN:159593197X
        DOI:10.1145/1095921
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 24 October 2005

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. TCP root cause
        2. internet
        3. throughput
        4. time series

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate 198 of 789 submissions, 25%

        Upcoming Conference

        CoNEXT '24

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)4
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 18 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2020)Vulnerability Prioritization, Root Cause Analysis, and Mitigation of Secure Data Analytic Framework Implemented with MongoDB on Singularity Linux ContainersProceedings of the 2020 the 4th International Conference on Compute and Data Analysis10.1145/3388142.3388168(58-66)Online publication date: 9-Mar-2020
        • (2017)Cross Fertilization Between Wireless Testbeds and NS-3 Simulation ModelsProceedings of the 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems10.1145/3127540.3127550(295-302)Online publication date: 21-Nov-2017
        • (2012)Explaining BGP Slow Table TransfersProceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems10.1109/ICDCS.2012.14(657-666)Online publication date: 18-Jun-2012
        • (2011)Intelligent Automated Diagnosis of Client Device Bottlenecks in Private CloudsProceedings of the 2011 Fourth IEEE International Conference on Utility and Cloud Computing10.1109/UCC.2011.42(261-266)Online publication date: 5-Dec-2011
        • (2011)Diagnosing client faults using SVM-based intelligent inference from TCP packet traces7th International Conference on Broadband Communications and Biomedical Applications10.1109/IB2Com.2011.6217894(68-73)Online publication date: Nov-2011
        • (2008)A root cause analysis toolkit for TCPComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2008.03.00552:9(1846-1858)Online publication date: 26-Jun-2008
        • (2007)Performance limitations of ADSL usersProceedings of the 8th international conference on Passive and active network measurement10.5555/1762888.1762908(145-154)Online publication date: 5-Apr-2007
        • (2007)Performance Limitations of ADSL Users: A Case StudyPassive and Active Network Measurement10.1007/978-3-540-71617-4_15(145-154)Online publication date: 2007
        • (2006)How to Identify the Speed Limiting Factor of a TCP Flow2006 4th IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services10.1109/E2EMON.2006.1651275(17-24)Online publication date: 2006
        • (2006)Object-Relational DBMS for Packet-Level Traffic Analysis: Case Study on Performance Optimization2006 4th IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services10.1109/E2EMON.2006.1651274(9-16)Online publication date: 2006

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media