Study of TCP Packet Labeling to Alleviate Time-Out
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 4
Abstract
Many applications (e.g., cluster based storage and Map Reduce) in modern data centers require a high fan-in, many- to-one type of data communication (known as TCP in cast), which could cause severe in cast congestion in switches and result in TCP good put collapse, substantially degrading the application performance. The root cause of such a collapse is the long idle period of the Retransmission Timeout (RTO) that is triggered at one or more senders by packet losses in congested switches. In this paper We Study a packet labeling scheme PLATO, which improves the loss detection capabilities of New Reno using an innovative packet labeling system. Packets carrying this special label are preferentially en queued, at the switch. This allows TCP to detect packet loss using three duplicate acknowledgements, instead of the time expensive RTO; thus avoiding the good put col- lapse. PLATO makes minor modifications to New Reno and does not alter its congestion control mechanism. The implementation and simulations have been done in Network Simulator 3 (NS3). PLATO’s performance is significantly better than New Reno as well as state-of-art in cast solutions In cast Control TCP (ICTCP) and Data Center TCP (DCTCP). We also show that TCP PLATO can be implemented using commodity switches with Weighted Random Early Detection (WRED) function.
Authors and Affiliations
Vaishali R . Thakare , Prof. Aanand B. Deshmukh
Multi-Class Tweet Categorization Using Map Reduce Paradigm
Twitter is one of the most popular micro-blogging website in today's globalized world. Twitter messages can be mined to gain valuable information. Although Twitter provides a list of most popular topics people tweet abou...
A Survey of Machine Learning Algorithm in Network Traffic Classification
Network Traffic Classification is an emerging research area and now a day the research is widely used in various activities such as intrusion detection system and for security purpose. Many of the protocols and proposed...
Image Search Reranking
The existing methods for image search re ranking suffer from the unfaithfulness of the as sumptions under which the text-based images search result. The resulting images contain more irrelevant images. Hence the re ranki...
A Puzzle Based Authentication Scheme for Cloud Computing
This article presents puzzle based authentication scheme in which cloud user registers and solves the puzzle, puzzle solving time and sequence of image block is stored and validated by local server and the cloud user get...
Robust Watermarking Framework with DCT Based Encryption
Since several years,, the protection of multimedia data is becoming extremely important. The protection of the multimedia data might be performed with encryption or data hiding algorithms. To address the transmission tim...