Skip to content

Research at St Andrews

A Comparison of TCP Behaviour at High Speeds Using ns-2 and Linux

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DOI

Author(s)

Martin Bateman, Saleem Noel Bhatti, Greg Bigwood, Devan Rehunathan, Colin Allison, Tristan Henderson, Dimitrios Miras

School/Research organisations

Abstract

There is a growing interest in the use of variants of the Transmission Control Protocol (TCP) in high-speed networks. ns-2 has implementations of many of these high-speed TCP variants, as does Linux. ns-2, through an extension, permits the incorporation of Linux TCP code within ns-2 simulations. As these TCP variants become more widely used, users are concerned about how these different variants of TCP might interact in a real network environment - how fair are these protocol variants to each other (in their use of the available capacity) when sharing the same network. Typically, the answer to this question might be sought through simulation and/or by use of an experimental testbed. So, we compare with TCP NewReno the fairness of the congestion control algorithms for 5 high-speed TCP variants - BIC, Cubic, Scalable, High-Speed and Hamilton - on both ns-2 and on an experimental testbed running Linux. In both cases, we use the same TCP code from Linux. We observe some differences between the behaviour of these TCP variants when comparing the testbed results to the results from ns-2, but also note that there is generally good agreement.
Close

Details

Original languageEnglish
Title of host publicationProceedings of the 11th Communications and Networking Simulation Symposium, CNS'08
PublisherACM
Pages30-37
ISBN (Print)1-56555-318-7
DOIs
Publication statusPublished - Apr 2008
Event11th Communications and Networking Simulation Symposium, CNS'08 - Ottawa, Canada
Duration: 14 Apr 200817 Apr 2008

Conference

Conference11th Communications and Networking Simulation Symposium, CNS'08
CountryCanada
CityOttawa
Period14/04/0817/04/08

Discover related content
Find related publications, people, projects and more using interactive charts.

View graph of relations

Related by author

  1. Data protection for the common good: developing a framework for a data protection-focused data commons

    Wong, J., Henderson, T. & Ball, K., 15 Sep 2020, Data for Policy Conference 2020. Data for Policy, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Automating dynamic consent decisions for the processing of social media data in health research

    Norval, C. & Henderson, T., Jul 2020, In: Journal of Empirical Research on Human Research Ethics. 15, 3, p. 187-201

    Research output: Contribution to journalArticlepeer-review

  3. Short paper: Integrating the data protection impact assessment into the software development lifecycle

    Irvine, C., Balasubramaniam, D. & Henderson, T., 2020, Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Garcia-Alfaro, J., Navarro-Arribas, G. & Herrera-Joancomarti, J. (eds.). Cham: Springer, p. 219-228 (Lecture Notes in Computer Science (including subseries Security and Cryptology); vol. 12484 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Seamless Internet connectivity for ubiquitous communication

    Yanagida, R. & Bhatti, S., 9 Sep 2019, UbiComp/ISWC '19 Adjunct: Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers (UbiComp/ISWC '19). New York: ACM, p. 1022-1033 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

ID: 6055566

Top