2013
DOI: 10.1016/j.comnet.2013.08.001
|View full text |Cite
|
Sign up to set email alerts
|

Congestion control of TCP flows in Internet routers by means of index policy

Abstract: In this paper we address the problem of fast and fair transmission of flows in a router, which is a fundamental issue in networks like the Internet. We model the interaction between a source using the Transmission Control Protocol (TCP) and a bottleneck router with the objective of designing optimal packet admission controls in the router queue. We focus on the relaxed version of the problem obtained by relaxing the fixed buffer capacity constraint that must be satisfied at all time epoch. The relaxation allow… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
36
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(36 citation statements)
references
References 29 publications
0
36
0
Order By: Relevance
“…And equation (3) and (4) will be integrated to be equation (5) Actual N RTT RTT c   min (5) As can be seen, the additional latency of RTTc compared to RTTmin is caused by the packets backlog in cache.…”
Section: Rtt Cwnd Expectedmentioning
confidence: 99%
See 1 more Smart Citation
“…And equation (3) and (4) will be integrated to be equation (5) Actual N RTT RTT c   min (5) As can be seen, the additional latency of RTTc compared to RTTmin is caused by the packets backlog in cache.…”
Section: Rtt Cwnd Expectedmentioning
confidence: 99%
“…Meanwhile, TCPW and Reno algorithm share the identical additive increase mechanism at congestion avoidance stage, so the network has been saturated in additive increase phase and about to enter network congestion state. The same increment mechanism of TCPW and Reno will enlarge congestion window rapidly, which will induce the recongestion of network [5].…”
Section: Introductionmentioning
confidence: 99%
“…This has been a very successful heuristic for restless bandits, which, while suboptimal in general, is provably optimal in an asymptotic sense [26], [27] and has good empirical performance. It and its variants have been used extensively in logistical and engineering applications, some recent instances of the latter in communications and control being for sensor scheduling [19], multi-UAV coordination [20], congestion control [3], [4], [13], channel allocation in wireless networks [14], cognitive radio [17] and real-time wireless multicast [23]. Book length treatments of indexable restless bandits appear in [12], [24].…”
Section: Introductionmentioning
confidence: 99%
“…Transport Control Protocol (TCP) [1] has been widely used in the current Internet for reliable end-to-end transmission of data. As time goes, several variations of the basic congestion control mechanism of TCP have been proposed during the last several years for efficient transmission of data over high-speed long-distance networks.…”
Section: Introductionmentioning
confidence: 99%