Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (4): 1225-1234.DOI: 10.11772/j.issn.1001-9081.2021050722
• The 36 CCF National Conference of Computer Applications (CCF NCCA 2020) • Previous Articles
Hanguang LAI1, Qing LI2, Yong JIANG1()
Received:
2021-04-22
Revised:
2021-06-04
Accepted:
2021-06-08
Online:
2021-07-22
Published:
2022-04-10
Contact:
Yong JIANG
About author:
LAI Hanguang, born in 1995, M. S. candidate. His research interests include end-to-end intelligent transmission control.Supported by:
通讯作者:
江勇
作者简介:
赖涵光(1995—),男,福建泉州人,硕士研究生,主要研究方向:端到端智能传输控制基金资助:
CLC Number:
Hanguang LAI, Qing LI, Yong JIANG. Transmission control protocol congestion control switching scheme based on scenario change[J]. Journal of Computer Applications, 2022, 42(4): 1225-1234.
赖涵光, 李清, 江勇. 基于场景变化的传输控制协议拥塞控制切换方案[J]. 《计算机应用》唯一官方网站, 2022, 42(4): 1225-1234.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021050722
拥塞控制算法 | 平均吞吐量/(Mb·s-1) | 平均时延/ms |
---|---|---|
BBR | 4.87 | 132 |
PCC-Vivace | 4.49 | 113 |
Copa | 4.78 | 106 |
Cubic | 4.63 | 141 |
Tab. 1 Average throughput and average delay with network bandwidth of 5 Mb/s and network delay of 100 ms
拥塞控制算法 | 平均吞吐量/(Mb·s-1) | 平均时延/ms |
---|---|---|
BBR | 4.87 | 132 |
PCC-Vivace | 4.49 | 113 |
Copa | 4.78 | 106 |
Cubic | 4.63 | 141 |
链路带宽/(Mb·s-1) | 网络延迟/ms | 随机丢包率/% | 使用算法 |
---|---|---|---|
1~100 | 1 | 0 | Vivace |
10 | 0 | Copa | |
100 | 0 | BBR | |
500 | 0 | BBR、Copa | |
5 | 1 | 0.1~1 | Vivace |
10 | 0.1~1 | Copa | |
100 | 0.1~1 | BBR | |
500 | 0.1~1 | BBR、Copa |
Tab. 2 Optimal congestion control algorithm when focusing on throughput
链路带宽/(Mb·s-1) | 网络延迟/ms | 随机丢包率/% | 使用算法 |
---|---|---|---|
1~100 | 1 | 0 | Vivace |
10 | 0 | Copa | |
100 | 0 | BBR | |
500 | 0 | BBR、Copa | |
5 | 1 | 0.1~1 | Vivace |
10 | 0.1~1 | Copa | |
100 | 0.1~1 | BBR | |
500 | 0.1~1 | BBR、Copa |
链路带宽/(Mb·s-1) | 网络延迟/ms | 随机丢包率/% | 使用算法 |
---|---|---|---|
1~20 | 1 | 0 | Copa |
1 | 10 | 0 | Copa |
5 | 10 | 0 | Copa、Vivace |
20 | 10 | 0 | Vivace |
1 | 100 | 0 | Vivace |
100 | 0 | Copa | |
5~20 | 500 | 0 | Vivace |
500 | 0 | Copa | |
1 | 10 | 0.1 | Copa |
5 | 10 | 0.1 | Vivace |
20 | 10 | 0.1 | Vivace |
1 | 10 | 0.5~1 | Copa |
5 | 10 | 0.5~1 | Vivace |
20 | 10 | 0.5~1 | Copa |
Tab. 3 Optimal congestion control algorithm when focusing on delay
链路带宽/(Mb·s-1) | 网络延迟/ms | 随机丢包率/% | 使用算法 |
---|---|---|---|
1~20 | 1 | 0 | Copa |
1 | 10 | 0 | Copa |
5 | 10 | 0 | Copa、Vivace |
20 | 10 | 0 | Vivace |
1 | 100 | 0 | Vivace |
100 | 0 | Copa | |
5~20 | 500 | 0 | Vivace |
500 | 0 | Copa | |
1 | 10 | 0.1 | Copa |
5 | 10 | 0.1 | Vivace |
20 | 10 | 0.1 | Vivace |
1 | 10 | 0.5~1 | Copa |
5 | 10 | 0.5~1 | Vivace |
20 | 10 | 0.5~1 | Copa |
链路带宽/(Mb·s-1) | 网络延迟/ms | 随机丢包率/% | 使用算法 |
---|---|---|---|
1~100 | 100 | 0 | Vivace |
100 | 0.1~1 | Copa |
Tab. 4 Optimal congestion control algorithm when focusing on fairness
链路带宽/(Mb·s-1) | 网络延迟/ms | 随机丢包率/% | 使用算法 |
---|---|---|---|
1~100 | 100 | 0 | Vivace |
100 | 0.1~1 | Copa |
链路带宽/(Mb·s-1) | 网络延迟/ms | 随机丢包率/% | 使用算法 |
---|---|---|---|
1 | 1 | 0~1 | Copa |
5 | 1 | 0~0.5 | Vivace |
5 | 1 | 1 | BBR |
20 | 1 | 0~1 | BBR |
100 | 1 | 0~0.1 | BBR |
1 | 0.5~1 | Vivace |
Tab. 5 Optimal congestion control algorithm when focusing onTCP friendliness
链路带宽/(Mb·s-1) | 网络延迟/ms | 随机丢包率/% | 使用算法 |
---|---|---|---|
1 | 1 | 0~1 | Copa |
5 | 1 | 0~0.5 | Vivace |
5 | 1 | 1 | BBR |
20 | 1 | 0~1 | BBR |
100 | 1 | 0~0.1 | BBR |
1 | 0.5~1 | Vivace |
组别 | 时刻 | 变化时刻/s | 带宽/(Mb·s-1) | 延迟/ms |
---|---|---|---|---|
1 | t1 | 8 | 193 | 5 |
t2 | 243 | 45 | 17 | |
t3 | 364 | 7 | 91 | |
t4 | 445 | 5 | 40 | |
2 | t1 | 48 | 19 | 22 |
t2 | 178 | 2 | 16 | |
t3 | 285 | 275 | 1 | |
t4 | 438 | 2 | 7 | |
3 | t1 | 50 | 1 | 18 |
t2 | 139 | 172 | 47 | |
t3 | 368 | 2 | 13 | |
t4 | 447 | 82 | 2 |
Tab. 6 Randomly generated parameters in 3 sets of experiments
组别 | 时刻 | 变化时刻/s | 带宽/(Mb·s-1) | 延迟/ms |
---|---|---|---|---|
1 | t1 | 8 | 193 | 5 |
t2 | 243 | 45 | 17 | |
t3 | 364 | 7 | 91 | |
t4 | 445 | 5 | 40 | |
2 | t1 | 48 | 19 | 22 |
t2 | 178 | 2 | 16 | |
t3 | 285 | 275 | 1 | |
t4 | 438 | 2 | 7 | |
3 | t1 | 50 | 1 | 18 |
t2 | 139 | 172 | 47 | |
t3 | 368 | 2 | 13 | |
t4 | 447 | 82 | 2 |
时刻 | 第1组 | 第2组 | 第3组 | |||
---|---|---|---|---|---|---|
吞吐量 | 时延 | 吞吐量 | 时延 | 吞吐量 | 时延 | |
t1 | Copa | PCC-Vivace | BBR | PCC-Vivace | Copa | Copa |
t2 | BBR | Copa | BBR | Copa | BBR | Copa |
t3 | BBR | Copa | PCC-Vivace | Copa | Copa | Copa |
t4 | BBR | Copa | Copa | Copa | PCC-Vivace | Copa |
Tab. 7 Obtained congestion control algorithm based on environmental parameters at 4 random moments in 3 sets of experiments
时刻 | 第1组 | 第2组 | 第3组 | |||
---|---|---|---|---|---|---|
吞吐量 | 时延 | 吞吐量 | 时延 | 吞吐量 | 时延 | |
t1 | Copa | PCC-Vivace | BBR | PCC-Vivace | Copa | Copa |
t2 | BBR | Copa | BBR | Copa | BBR | Copa |
t3 | BBR | Copa | PCC-Vivace | Copa | Copa | Copa |
t4 | BBR | Copa | Copa | Copa | PCC-Vivace | Copa |
1 | ALLMAN M, PAXSON V, STEVENS W. TCP congestion control: RFC 2581 [S]. Reston, VA: Internet Society, 1999-04. |
2 | SIVARAMAN A, WINSTEIN K, THAKER P, et al. An experimental study of the learnability of congestion control[C]// Proceedings of 2014 ACM Conference on SIGCOMM. New York: ACM, 2014:479-490. 10.1145/2740070.2626324 |
3 | JAY N, ROTMAN N H, GODFREY P B, et al. A deep reinforcement learning perspective on internet congestion control[C]// Proceedings of the 36th International Conference on Machine Learning. New York: JMLR.org, 2019:3050-3059. |
4 | ABBASLOO S, YEN C Y, CHAO H J. Classic meets modern: a pragmatic learning-based congestion control for the internet[C]// Proceedings of the 2020 Annual Conference of the ACM Special Interest Group on Data Communication on the Applications, Technologies, Architectures, and Protocols for Computer Communication. New York: ACM, 2020:632-647. 10.1145/3387514.3405892 |
5 | CARDWELL N, CHENG Y, GUNN C S, et al. BBR: congestion-based congestion control[J]. Communications of the ACM, 2017, 60(2): 58-66. 10.1145/3009824 |
6 | DONG M, LI Q X, ZARCHY D, et al. PCC: re-architecting congestion control for consistent high performance[C]// Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation. Berkeley: USENIX Association, 2015:395-408. |
7 | ARUN V, BALAKRISHNAN H. Copa: congestion control combining objective optimization with window adjustments[C]// Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation. Berkeley: USENIX Association, 2018:329-342. 10.1145/3232755.3232783 |
8 | ALIZADEH M, GREENBERG A, MALTZ D A, et al. Data center TCP (DCTCP)[C]// Proceedings of the 2010 ACM SIGCOMM Conference. New York: ACM, 2010:63-74. 10.1145/1851182.1851192 |
9 | SIVARAMAN A, WINSTEIN K, SUBRAMANIAN S, et al. No silver bullet: extending SDN to the data plane[C]// Proceedings of 12th ACM Workshop on Hot Topics in Networks. New York: ACM, 2013:No.19. 10.1145/2535771.2535796 |
10 | DONG M, MENG T, ZARCHY D, et al. PCC Vivace: online-learning congestion control[C]// Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation. Berkeley: USENIX Association, 2018:343-356. |
11 | SCHAPIRA M, WINSTEIN K. Congestion-control throwdown[C]// Proceedings of the 16th ACM Workshop on Hot Topics in Networks. New York: ACM, 2017:122-128. 10.1145/3152434.3152446 |
12 | GETTYS J, NICHOLS K. Bufferbloat: dark buffers in the Internet[J]. Communications of the ACM, 2012, 55( 1):57-65. 10.1145/2063176.2063196 |
13 | HA S, RHEE I, XU L S. CUBIC: a new TCP-friendly high-speed TCP variant[J]. ACM SIGOPS Operating Systems Review, 2008, 42(5):64-74. 10.1145/1400097.1400105 |
14 | SCHWARZ M, SAUER C, DADUNA H, et al. M/M/1 Queueing systems with inventory[J]. Queueing Systems, 2006, 54(1): 55-78. 10.1007/s11134-006-8710-5 |
15 | WINSTEIN K, BALAKRISHNAN H. TCP ex Machina: computer-generated congestion control[C]// Proceedings of the 2013 ACM SIGCOMM Conference. New York: ACM, 2013:123-134. 10.1145/2486001.2486020 |
16 | FRANÇOIS-LAVET V, HENDERSON P, ISLAM R, et al. An introduction to deep reinforcement learning[J]. Foundations and Trends in Machine Learning, 2018, 11(3/4):219-354. 10.1561/2200000071 |
17 | OSBAND I, BLUNDELL C, PRITZEL A, et al. Deep exploration via bootstrapped DQN[C]// Proceedings of the 30th International Conference on Neural Information Processing Systems. Red Hook, NY: Curran Associates Inc., 2016:4033-4041. |
18 | LILLICRAP T P, HUNT J J, PRITZEL A, et al. Continuous control with deep reinforcement learning[EB/OL]. (2019-07-05) [2021-03-03]. . |
19 | LI Z B, LIU P, XU C C, et al. Reinforcement learning-based variable speed limit control strategy to reduce traffic congestion at freeway recurrent bottlenecks[J]. IEEE Transactions on Intelligent Transportation Systems, 2017, 18(11):3204-3217. 10.1109/tits.2017.2687620 |
20 | KONDA V R, TSITSIKLIS J N. Actor-critic algorithms[C]// Proceedings of the 1999 Annual Conference on Neural Information Processing Systems. Cambridge: MIT Press, 1999:1008-1014. |
21 | YAN F Y, MA J, HILL G D, et al. Pantheon: the training ground for Internet congestion-control research[C]// Proceedings of the 2018 USENIX Technical Conference. Berkeley: USENIX Association, 2018:731-743. |
22 | GIESSLER A, HÄNLE J, KÖNIG A, et al. Free buffer allocation — an investigation by simulation[J]. Computer Networks, 1978, 2(3):191-208. 10.1016/0376-5075(78)90028-4 |
23 | GAIL R, KLEINROCK L. An invariant property of computer network power[C]// Proceedings of the 1981 International Conference on Communications. Piscataway: IEEE, 1981:63.1.1-63.1.5. |
24 | SCHAUL T, QUAN J, ANTONOGLOU I, et al. Prioritized experience replay[EB/OL]. (2016-02-25) [2021-03-03].. |
25 | 沈耿彪,李清,江勇,等. 数据中心网络负载均衡问题研究[J]. 软件学报, 2020, 31(7):2221-2244. 10.13328/j.cnki.jos.006050 |
SHEN G B, LI Q, JIANG Y, et al. Research on load balancing in data center networks[J]. Journal of Software, 2020, 31(7):2221-2244. 10.13328/j.cnki.jos.006050 |
[1] | Wei LI, Yaochi FAN, Qiaoyong JIANG, Lei WANG, Qingzheng XU. Variable convolutional autoencoder method based on teaching-learning-based optimization for medical image classification [J]. Journal of Computer Applications, 2022, 42(2): 592-598. |
[2] | WU Kaifan, YIN Xinchun. Lightweight anonymous mutual authentication protocol based on random operators for radio frequency identification system [J]. Journal of Computer Applications, 2021, 41(6): 1621-1630. |
[3] | SHI Yangxiao, ZHANG Jun, CHEN Peng, WANG Bing. Classification of steel surface defects based on lightweight network [J]. Journal of Computer Applications, 2021, 41(6): 1836-1841. |
[4] | ZHU Yongjin, YIN Fei, DOU Longlong, WU Kun, ZHANG Zhiwei, QIAN Zhuzhong. Adaptive network transmission mechanism based on forward error correction [J]. Journal of Computer Applications, 2021, 41(3): 825-832. |
[5] | ZHU Yi, NING Zhenhu, ZHOU Yihua. Lightweight detection technology of typosquatting based on visual features [J]. Journal of Computer Applications, 2020, 40(8): 2279-2285. |
[6] | QIANG Baohua, ZHAI Yijie, CHEN Jinlong, XIE Wu, ZHENG Hong, WANG Xuewen, ZHANG Shihao. Lightweight human skeleton key point detection model based on improved convolutional pose machines and SqueezeNet [J]. Journal of Computer Applications, 2020, 40(6): 1806-1811. |
[7] | DENG Xiong, WANG Hongchun. Face liveness detection algorithm based on deep learning and feature fusion [J]. Journal of Computer Applications, 2020, 40(4): 1009-1015. |
[8] | ZHAO Yulong, NIU Baoning, LI Peng, FAN Xing. Blockchain enhanced lightweight node model [J]. Journal of Computer Applications, 2020, 40(4): 942-946. |
[9] | GONG Rui, DING Sheng, ZHANG Chaohua, SU Hao. Lightweight and multi-pose face recognition method based on deep learning [J]. Journal of Computer Applications, 2020, 40(3): 704-709. |
[10] | CHEN Li, DING Shifei, YU Wenjia. Lightweight convolutional neural network based on cross-channel fusion and cross-module connection [J]. Journal of Computer Applications, 2020, 40(12): 3451-3457. |
[11] | PI Jiatian, YANG Jiezhi, YANG Linxi, PENG Mingjie, DENG Xiong, ZHAO Lijun, TANG Wanmei, WU Zhiyou. Lightweight face liveness detection method based on multi-modal feature fusion [J]. Journal of Computer Applications, 2020, 40(12): 3658-3665. |
[12] | CHEN Fang, LIU Xiaorui, YANG Mingye. Face recognition security system based on liveness detection and authentication [J]. Journal of Computer Applications, 2020, 40(12): 3666-3672. |
[13] | LIU Zongfu, YUAN Zheng, ZHAO Chenxi, ZHU Liang. Integral attack on PICO algorithm based on division property [J]. Journal of Computer Applications, 2020, 40(10): 2967-2972. |
[14] | ZHENG Zhuoran, ZHENG Xiangwei, TIAN Jie. Energy-saving method for wireless body area network based on synchronous prediction with penalty error matrix [J]. Journal of Computer Applications, 2019, 39(2): 513-517. |
[15] | WANG Zhanjun, MA Haiying, WANG Jinhua, LI Yan. Revocable identity-based encryption scheme with outsourcing decryption and member revocation [J]. Journal of Computer Applications, 2019, 39(12): 3563-3568. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||