A Comparison of TCP Behaviour at High Speeds Using ns-2 and Linux

Martin Bateman, Saleem Noel Bhatti, Greg Bigwood, Devan Rehunathan, Colin Allison, Tristan Henderson, Dimitrios Miras

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Citations (Scopus)

Abstract

There is a growing interest in the use of variants of the Transmission Control Protocol (TCP) in high-speed networks. ns-2 has implementations of many of these high-speed TCP variants, as does Linux. ns-2, through an extension, permits the incorporation of Linux TCP code within ns-2 simulations. As these TCP variants become more widely used, users are concerned about how these different variants of TCP might interact in a real network environment - how fair are these protocol variants to each other (in their use of the available capacity) when sharing the same network. Typically, the answer to this question might be sought through simulation and/or by use of an experimental testbed. So, we compare with TCP NewReno the fairness of the congestion control algorithms for 5 high-speed TCP variants - BIC, Cubic, Scalable, High-Speed and Hamilton - on both ns-2 and on an experimental testbed running Linux. In both cases, we use the same TCP code from Linux. We observe some differences between the behaviour of these TCP variants when comparing the testbed results to the results from ns-2, but also note that there is generally good agreement.
Original languageEnglish
Title of host publicationProceedings of the 11th Communications and Networking Simulation Symposium, CNS'08
PublisherACM
Pages30-37
ISBN (Print)1-56555-318-7
DOIs
Publication statusPublished - Apr 2008
Event11th Communications and Networking Simulation Symposium, CNS'08 - Ottawa, Canada
Duration: 14 Apr 200817 Apr 2008

Conference

Conference11th Communications and Networking Simulation Symposium, CNS'08
Country/TerritoryCanada
CityOttawa
Period14/04/0817/04/08

Fingerprint

Dive into the research topics of 'A Comparison of TCP Behaviour at High Speeds Using ns-2 and Linux'. Together they form a unique fingerprint.

Cite this