WO2007092901A2 - Systems and methods of improving performance of transport protocols - Google Patents

Systems and methods of improving performance of transport protocols Download PDF

Info

Publication number
WO2007092901A2
WO2007092901A2 PCT/US2007/061798 US2007061798W WO2007092901A2 WO 2007092901 A2 WO2007092901 A2 WO 2007092901A2 US 2007061798 W US2007061798 W US 2007061798W WO 2007092901 A2 WO2007092901 A2 WO 2007092901A2
Authority
WO
WIPO (PCT)
Prior art keywords
packet
packets
tcp
state
block
Prior art date
Application number
PCT/US2007/061798
Other languages
French (fr)
Other versions
WO2007092901A3 (en
Inventor
Raghupathy Sivakumar
Aravind Velayutham
Original Assignee
Asankya Networks, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Asankya Networks, Inc. filed Critical Asankya Networks, Inc.
Priority to MX2008010122A priority Critical patent/MX2008010122A/en
Priority to JP2008554489A priority patent/JP2009526494A/en
Priority to EP07763595A priority patent/EP1987365A4/en
Priority to CA002642510A priority patent/CA2642510A1/en
Priority to AU2007212001A priority patent/AU2007212001A1/en
Publication of WO2007092901A2 publication Critical patent/WO2007092901A2/en
Publication of WO2007092901A3 publication Critical patent/WO2007092901A3/en
Priority to IL193323A priority patent/IL193323A0/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/27Evaluation or update of window size, e.g. using information derived from acknowledged [ACK] packets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/19Flow control; Congestion control at layers above the network layer
    • H04L47/193Flow control; Congestion control at layers above the network layer at the transport layer, e.g. TCP related
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/37Slow start

Definitions

  • the present disclosure relates to communication protocols, and more specifically, to transport-layer protocols.
  • TCP Transmission Control Protocol
  • TCP Transmission Control Protocol
  • the algorithms used by TCP were designed to promote stability, reliability, and fairness on the Internet, these same algorithms lead to reduced TCP performance in the presence of certain conditions along the end-to-end path between the communicating systems. These characteristics, which include large bandwidth, large delay, and/or significant loss- rate, are becoming more common in today's Internet.
  • the basic algorithms used by TCP have been modified over the years, significant change to these algorithms is unlikely, since there is such a large installed base of systems which use TCP. Therefore, a need exists for these and other problems to be addressed.
  • FIG. 1 is a block diagram of an environment in which one embodiment of a system and method for improving performance of transport protocols is located.
  • FIG. 2 is a block diagram of an environment in which another embodiment of a system and method for improving performance of transport protocols is located.
  • FIG. 3 is a block diagram of the logic for improving performance of transport protocols 160 from FIG. 1.
  • FIG. 4 is a data flow diagram showing the processing of packets by the logic for improving performance of transport protocols 160 of FIGs. 1 and 3.
  • FIG. 5 is a flowchart showing processing of a received acknowledgement by the connection terminator 350 of FIG. 3.
  • FIG. 6. is a flowchart showing processing of a TCP packet by the connection terminator 350 of FIG. 3.
  • FIG. 7 is a flowchart showing processing of the extended transport data, control, or acknowledgement packet by the core 370 of FIG. 3.
  • FIG. 8 is a flowchart showing processing of a received packet by the virtual connection manager 380 of FIG. 3.
  • FIG. 9 is a flow diagram of a flow control mechanism used by some embodiments of logic 160 of FIG. 3.
  • FIG. 10 is a state diagram of a congestion control mechanism used by some embodiments of logic 160 of FIG. 3.
  • FIG. 11 is a block diagram of a general-purpose computer than can be used to implement the systems and methods of improving performance of transport protocols disclosed herein.
  • One exemplary method includes: in a first state, non-linearly increasing a congestion window; in response to the congestion window exceeding a threshold value while in the first state, transitioning to a second state; and in the second state, linearly increasing the congestion window.
  • FIG. 1 is a block diagram of an environment in which one embodiment of a system and method for improving performance of transport protocols is located.
  • Endpoint devices 110 use a transport-layer (layer-4) protocol 120, and communicate with one another over a network 130.
  • layer-4 transport-layer
  • Routers 140 transport traffic across the network 130, which may involve the use of a network-layer (layer-3) protocol such as Internet Protocol (IP).
  • IP Internet Protocol
  • router 140 may take the form of a layer-3 switch instead.
  • Network devices 150 are located (logically) between endpoints 110 and routers 140. Each network device 150 includes logic for improving performance of transport protocols 160, which allows a network device 150 to communicate with a peer network device 150 using an extended transport protocol 165. Thus, a pair of endpoints 110 communicates with each other through a pair of network devices 150. Although a network device 150 appears between an endpoint 110 and a router 140 in FIG. 1 , this is a logical rather than a physical representation, indicating merely that packets pass through the network device 150. As will be explained below, some embodiments of the network device 150 are not actually placed inline between an endpoint 110 and a router 140, but instead operate as an offline device hanging off router 140.
  • Some embodiments of a network device 150 include an endpoint network interface 170 and a peer network interface 175, where the endpoint network interface 170 is coupled to an endpoint 110 through a link 180 and the peer network interface 175 is coupled to a router 140 through a link 185.
  • Other embodiments of a network device 150 include a single network interface coupled to the router 140. (A single interface embodiment can be used "offline" rather than inline, as will be described below.
  • the links in the network 130 exhibit different performance characteristics than the links to endpoints 110.
  • links to the endpoints 110 may provide a relatively high-speed wired connection (e.g., 100 Mbit Ethernet) while links in the network 130 may provide a lower-speed wired or wireless connection (e.g., T1 , WiFi).
  • the extended transport protocol 165 is designed for the performance characteristics of the links between network devices 150.
  • the extended transport protocol 165 is different than the transport protocol 120 used by the endpoints 110: the protocol used between an endpoint 110 and its corresponding network device 150 is the original transport protocol 120; the protocol used between peer network devices 150 is the extended transport protocol 165.
  • the network device 150 acts as a transport proxy for an endpoint 110.
  • the endpoint 110 is unaware that the endpoint 110 is using a different transport protocol, in which case the network device 150 is a transparent transport proxy for an endpoint 110.
  • the network device 150 maintains transparency by responding to packets sent by the TCP endpoints in such a way that the endpoints are aware of only the proxy as the other communicating endpoint and not the actual receiver.
  • extended transport packets will be used hereinafter when referring to packets used by the extended transport protocol 165.
  • a person of ordinary skill in the art should recognize that such a protocol typically includes packets that carry data (data packets), packets that acknowledge data (acknowledgement packets), and control packets that are used to setup teardown connections.
  • extended transport data packets and extended transport acknowledgment packets
  • extended transport control packets These packets correspond to, but are different than, the original transport protocol.
  • a TCP Data packet and an extended transport data packet both carry data, but the TCP Data packet originates from or is delivered to a TCP endpoint 110 while the extended transport data packet is conveyed between transport proxy peers 150.
  • the extended transport packets are formed by adding trailer fields to the original transport protocol packets.
  • a TCP data packet is translated to an extended transport data packet by appending a "protocol type" field of "extended transport data”
  • a TCP control packet is translated to an extended transport control packet by appending a "protocol type” field of "extended transport control”. This can be considered a form of encapsulation, but has the advantage of being transparent to the endpoints.
  • an extended transport packet is conveyed alone, without encapsulation.
  • the Protocol Type field in the IP header may be set to a special value indicating the presence of the extended transport protocol. That is, the extended transport protocol 165 is viewed by the IP, or network, layer as a protocol type like TCP or UDP.
  • the logic for improving performance of transport protocols 160 can be instantiated in several different ways.
  • One example implements the logic 160 in a standalone 150 device that sits between the TCP communication end-device and the access router 140.
  • Another instantiation of the logic 160 is within the endpoint 110, for example, as a kernel driver sitting between the TCP and IP layer of the kernel protocol stack.
  • the logic for improving performance of transport protocols 160 can replace TCP as a transport layer in the protocol stack of the endpoint 110.
  • FIG. 2 is a block diagram of an environment in which another embodiment of a system and method for improving performance of transport protocols is located.
  • a pair of endpoints 110 may include multiple connections 210, 220, 230 between the peers. Each of these connections (210-230) passes through improved network device 150A and 150B.
  • the network device 150 decides, on a connection-by-connection basis, whether to use the extended transport protocol 165 or the original transport protocol 120 for the leg of the connection between network devices 150.
  • connections 210 and 220 use the extended transport protocol 165 for the middle leg
  • connection 230 uses the original transport protocol 120.
  • a user decides which connections will use which transport protocol, and configures the network device 150 accordingly.
  • Several configuration examples are: all connections from a particular endpoint 110 use extended transport protocol 165; no connections from a particular endpoint 110 use extended transport protocol 165; those connections from a particular endpoint 110 identified by a specific combination of header fields use extended transport protocol 165; those connections from a particular endpoint 110 not identified by a specific combination of header fields do not use extended transport protocol 165.
  • a person of ordinary skill in the art should recognize that these are merely examples, and that many other techniques for determining which connections use the extended transport protocol 165 are also possible.
  • FIG. 3 is a block diagram of the logic for improving performance of transport protocols 160 from FIG. 1.
  • a connection manager 310 sets up connections to other network devices 150 in the network, and maintains general state information about other network devices 150.
  • the connection manager 310 may discover the presence of, and addresses of other network devices 150 through a configuration database (local or centralized), or through a dynamic learning process, or through any other appropriate mechanism known to a person of ordinary skill in the art.
  • connection manager 310 monitors for failure of a peer device 150. If a failure is discovered, the connection manager 310 notifies other components in the logic for improving performance of transport protocols 160 about the failure. Each component takes appropriate action in response to the peer failure. In some embodiments, recognition of peer failure is accomplished through a heartbeat signal between peer network devices 150. The connection manager component 310 transmits the heartbeat signal of its device 150, and also monitors the heartbeat of other peer devices 150. The absence of a heartbeat then signifies failure of a peer device 150.
  • a configuration and monitoring manager 320 allows the operation of the network device 150 to be tuned.
  • the configuration and monitoring manager 320 also monitors performance characteristics of both the network device 150.
  • the configuration and monitoring manager 320 also monitors performance characteristics of endpoint traffic flowing through device 150.
  • a traffic classifier 330 classifies network traffic entering the network device 150. Classification is based on an N-tuple formed by the headers on the incoming packer. In some embodiments, the N-tuple is the 4-tuple comprising sender IP address, destination IP address, sender TCP port, and destination TCP port. The traffic classifier 330 also performs deep inspection of the packets in order to identify special connection control packets (e.g., SYN, ACK, FIN, etc.). The traffic classifier 330 then notifies other logic components of these control packets.
  • special connection control packets e.g., SYN, ACK, FIN, etc.
  • the traffic classifier 330 decides whether to direct the packet through other components in logic 160, or through the default forwarding path. This decision is made in consultation with the configuration and monitoring manager 320 (described below), which maintains information about protocol improvement preferences (e.g., which connections the improvements are applied to, and which connections use the conventional protocol).
  • protocol improvement preferences e.g., which connections the improvements are applied to, and which connections use the conventional protocol.
  • the state manager 340 maintains state about those TCP connections to which improvements are applied.
  • the state manager 340 learns about the setup and teardown of TCP connections from the deep inspection data provided by the traffic classifier 330.
  • connections are hashed or indexed based on the N-tuple in the connection control packets, which facilitates faster connection lookups and packet identification.
  • the state manager 340 also maintains information about active connections that have been consistently sending/receiving packets, and those that have remained idle. This distinction helps to achieve fairness among the different TCP connections, and allows the logic 160 to penalize connections that have been getting more than their fair share of the capacity.
  • connection terminator 350 acts as the destination and source, respectively, to the source and destination of the endpoint TCP connections. Therefore, the connection terminator 350 includes the functionality of a TCP endpoint, such as connection management, packet sequencing, congestion control, flow control, acknowledgement transmissions, acknowledgement receipt processing, loss detection, and loss recovery.
  • the connection terminator 350 also acts as an adapter between the extended transport protocol 165 and the original transport protocol 120, propagating decisions to the TCP sender or receiver in a form understandable by these endpoints 110. For example, when the logic 160 makes a flow control decision "no more data to be transmitted", the connection terminator 350 conveys this decision to the TCP sender endpoint 110 through an advertised window size of zero.
  • the connection terminator 350 also maintains and manages data buffers to handle out-of-order delivery, packet losses, packet retransmissions, etc.
  • the transparency manager 360 works with the state manager 340 to ensure that the negotiated parameters between the two TCP end-systems (e.g., maximum transmission unit, the availability of the selective acknowledgment feature, etc.) are consistent with those required by the logic 160.
  • the traffic classifier 330 performs deep packet inspection and examines TCP control packets (e.g., SYN, ACK, FIN).
  • TCP control packets e.g., SYN, ACK, FIN.
  • the transparency manager 360 is notified of the parameters used in these SYN and SYN-ACK control packets. If the original default parameters themselves are compatible with the requirements of logic 160, such parameters are let through as-is. However, when the default parameters are not compatible, the transparency manager 360 modifies the connection control packets to use the alternate parameters.
  • the core 370 delivers data between peer network devices 150, implementing the extended transport protocol 165.
  • extended transport protocol 165 Several features of the extended transport protocol 165 will be described below.
  • network devices 150 perform their operations based on the addition and processing of trailers that are added to the packets received from the TCP endpoints.
  • the packets flowing between two network devices 150 are similar to the packets sent by the original communicating end-points. Since existing network components use headers to identify and process packets, this inventive feature (along with the bridge functionality described above) allows the extended transport protocol 165 to be transparent to other network components.
  • the virtual connection manager 380 maps TCP connections to multiple virtual connections between peer devices 150 and aggregates these virtual connections.
  • the aggregated virtual connections which form a virtual end-to-end path, are referred to herein as "pipes.”
  • An example of such an implementation is described in U.S. Serial No. 11/063,284, titled “Systems and Methods for Parallel Communication", which is entirely incorporated by reference herein.
  • the number of virtual connections is configurable and can be dynamically chosen by the logic 160.
  • FIG. 3 shows that packets are passed from one component to another for processing.
  • a zero-copy technique is used which increases the efficiency of the memory use.
  • Zero-copy packet processing uses a NumReferences field in the internal packet representation to track the number of components accessing the packet. Whenever a component processes a packet, it increases the NumReferences field. When the component is finished with processing, it decreases the num_references value. This avoids the need for a copy when passing packets between components.
  • FIG. 4 is a data flow diagram showing the processing of packets by the logic for improving performance of transport protocols 160 of FIGs. 1 and 3.
  • Processing of incoming packets begins with the traffic classifier 330, which uses the source IP address, destination IP address and protocol header fields to classify (410) the packet. If the protocol type field indicates that the packet is neither a TCP packet nor an extended transport packet, then the packet is forwarded, without modification, to a logical layer-2 bridge 420, which transmits the packet.
  • the bridge 420 has a single IP address and couples the endpoint network interface 170 and peer network interface 175 by maintaining a table of mappings between layer-3 (IP) addresses and layer-2 (MAC) addresses.
  • IP layer-3
  • MAC layer-2
  • the bridge 420 When given a packet for transmission, the bridge 420 examines the layer-3 address in the packet and determines which interface (endpoint network interface 170 and peer network interface 175) to transmit on, based on the address table. Therefore, in the discussion below, reference will be made to transmitting, sending, or forwarding a packet, without specifying which interface.
  • Bridge operation allows the network device 150 including logic for improving performance of transport protocols 160 to perform packet interception and processing without requiring a change to the routing tables on the TCP endpoints 110.
  • Bridge operation also allows the network device 150 to operate as an offline device, located off the router 140, instead of inline between the TCP endpoints 110 and the router 140.
  • the packet is classified (410) by the traffic classifier 330 as a TCP packet, then the packet is provided to the state manager 340.
  • the state manager 340 determines (430) the type of the TCP packet. If the TCP packet is a connection setup packet (e.g., SYN or SYNACK), then state manager 340 creates or updates the connection state, respectively, and hands off the packet to the transparency manager 360. As described earlier, the transparency manager 360 examines the connection options during setup, as conveyed in the TCP SYN and TCP SYNACK packets, and modifies these options as needed to insure compatibility with the extended transport protocol 165. The transparency manager 360 then forwards the TCP control packet.
  • a connection setup packet e.g., SYN or SYNACK
  • the state manager 340 determines (440) whether the connection exists (e.g., by consulting a connection hash table). If the connection exists, then the connection is deleted by the state manager 340 and the TCP control packet is forwarded. Returning to the determination 430 by the state manager 340, if the packet is a FIN packet and the connection exists, and then the connection state is updated. If a FIN has also been received by the local endpoint, then the connection is deleted. In either case, the state manager 340 requests the connection terminator 350 to send the TCP FIN packet, and then forwards the TCP FIN packet.
  • the state manager 340 determines whether the connection exists (e.g., by consulting a connection hash table). If the connection does not exist, then the state manager 340 forwards the TCP packet. If the connection does exist, then the state manager 340 updates state information hands off the packet to the connection terminator 350.
  • connection terminator 350 After receiving the TCP packet from the state manager 340, the connection terminator 350 classifies (450) the TCP packet. If the TCP packet is an ACK, the connection terminator 350 performs appropriate housekeeping as indicated by receipt of the acknowledgement, and discards or consumes the ACK.
  • connection terminator 350 begins processing the acknowledgement at block 510, where the acknowledged packets are removed from the TCP send buffer.
  • the in-sequence number is updated to reflect the acknowledgment.
  • the count of in-flight packets is updated at block 530.
  • processing continues at block 540, where the maximum allowed outstanding packets is updated.
  • block 550 is executed in an iteration loop while the in-flight count is less than the maximum allowed outstanding packets, where 550 sends the next packet in the TCP send buffer.
  • connection terminator 350 processes the packet further. This processing of TCP data packets by the connection terminator 350 will now be described in connection with the flowchart of FIG. 6.
  • the connection terminator 350 begins processing a packet at block 610, which compares the buffer size of the core component (370) to a threshold. If the buffer size meets the threshold, then block 620 sends a DUPACK for the next in- sequence packet. Next, the packet is discarded (block 630), and processing of the packet is complete. If the core component's buffer size does not meet the threshold, then processing continues at block 640. Block 640 determines whether the received packet is the next in-sequence packet. If No, then at block 645 the received packet is inserted into the TCP receive buffer, block 650 sends a DUPACK for the next in- sequence packet, and processing of this packet is complete. On the other hand, if block 640 determines that the received packet is the next in-sequence packet, then processing continues at block 655.
  • Block 655 updates the connection state.
  • the core component 370 is requested to send the packet.
  • Processing continues at block 665, which determines whether the TCP receive buffer is empty. If empty, then block 670 sends an acknowledgement for the received packet, and processing of the packet is finished. If the TCP receive buffer is not empty, then block 675 notifies the core component 370 that all in-sequence packets in the buffer are ready for transmit processing. Next, block 680 sends an acknowledgement for all the in-sequence packets that were just processed by block 675. Processing of the received TCP packet is now complete.
  • Processing of the received extended transport packet by the core 370 begins at block 710, which determines whether the received packet is extended transport data. If No, then processing continues at block 765 (FIG. 7B), which will be discussed below. If the received packet is extended transport data, then processing continue at block 715, which determines whether the received data packet is the next in- sequence packet. If No, then processing continues at block 720, where the packet is stored in the receive buffer. Next, block 725 sends a DUPACK for the next in- sequence packet. Processing of the extended transport data packet is then complete.
  • block 730 de-encapsulates the TCP packet from the extended transport data packet, and the TCP packet is handed off at block 735 the connection terminator component 350 for further processing.
  • the core component's receive buffer is checked at block 740. If the receive buffer is empty, then processing continues at block 745, where an acknowledgment for the received extended transport data packet is sent, and processing of the received extended transport data packet is complete. However, if the core component's receive buffer is not empty, then block 750 handles the receive buffer by de-encapsulating the TCP packets contained within the in-sequence extended transport data packets in the receive buffer. Next, at block 755, the TCP packets are handed off to the connection terminator component 350 for further processing. After connection terminator processing, block 760 sends acknowledgements for all the processed in-sequence packets in the core receive buffer, and processing is complete.
  • the packet is further classified at block 765 (FIG. 7B). If the packet is not an acknowledgment (e.g., an extended transport SYN, SYNACK, RESET or Heartbeat), then the packet is passed on at block 770 to the connection manager component 310 for further processing. On the other hand, if the packet is an extended transport acknowledgment, processing continues at block 775.
  • an acknowledgment e.g., an extended transport SYN, SYNACK, RESET or Heartbeat
  • the core 370 determines whether the acknowledgment is for the head-of-the-line packet. If No, then the packet is ignored and processing is complete. If Yes, then block 780 updates the next in-sequence number, number of in-flight packets, and number of outstanding packets allowed. After the statistics are updated, packets acknowledged by the received acknowledgement are removed from the receive buffer at block 785. In some embodiments, a "lazy free" technique is used to recapture the buffers. (The lazy free technique will be discussed below.) After buffer cleanup, the virtual connection manager 380 is queried, at block 790, to determine if the congestion window now allows new transmissions. If so, block 795 transmits new extended transport data packets until no more window space is available.
  • the lazy packet free mechanism delays freeing of acknowledged packets to a later point in the packet processing cycle. Specifically, when an acknowledgement arrives from the receiver notifying the receipt of multiple packets, the sender marks the list of acknowledged packets and defers the actual freeing of those packets for later. Then a specified number of packets are freed from the lazy buffer for every new packet that is transmitted by the sender. This amortizes the overhead of multiple packet memory free operations over multiple packet transmissions, and does not slow down the processing immediately after the receipt of acknowledgements.
  • FIG. 8 is a flowchart showing processing of a received extended transport packet by the virtual connection manager 380.
  • These received packets which include extended transport data packets and extended transport acknowledgement packets, are provided to the virtual connection manager 380 by the core 370.
  • Processing of received extended transport packet by the virtual connection manager 380 begins at block 805, which determines whether the extended transport packet is data or acknowledgement. If Data, then processing continues at block 810, which determines whether the received data packet is the next in-sequence packet. If No, then processing continues at block 815, where the sequence number of the received data packet is stored in an out-of-order list. Next, block 820 updates the selective acknowledgement (SACK) Scoreboard, and block 825 sends a DUPACK for the next in-sequence packet. Processing of the extended transport data packet is then complete.
  • SACK selective acknowledgement
  • block 830 examines the out-of-order list. If the list is empty, the block 835 sends an acknowledgement for the received packet, and processing is complete. If the list is non-empty, then block 840 removes the in- sequence numbers corresponding to the received packet from the out-of-order list. Next, at block 845, an acknowledgement for all the in-sequence packets is sent, and processing of the received packet is finished.
  • block 850 determines whether the acknowledgment is for the head-of-the-line packet. If No, then the packet is ignored and processing is complete. If Yes, then block 855 determines whether the core component is in the LOSS RECOVERY state.
  • the core component states include NORMAL, LOSS_RECOVERY, TIMEOUT, SYN_SENT, and SYN_RECVD. These states may vary according to the choice of transport protocol, as should be understood by a person of ordinary skill in the art.
  • the following statistics are updated at block 860: next in-sequence number; number of in-flight packets; and number of outstanding packets allowed.
  • the congestion control parameters are updated at block 865.
  • the congestion control parameters include the congestion window size and the threshold. Processing of the extended transport acknowledgement packet is then complete.
  • block 855 determines that the core component is in the loss recovery state, then processing continues at block 870, which determines whether the acknowledgment is for all the outstanding packets at the time of entering the LOSS_RECOVERY state. If Yes, then the core component state is updated to NORMAL. At block 875, the pipe parameters are updated at block 880, and processing of the packet is complete. If block 870 determines that the acknowledgment is for less than all outstanding packets, then the parameters for the pipe (virtual end-to-end path) are updated at block 885. In one embodiment, these parameters include a next in-sequence number, a number of in-flight packets, and a number of outstanding packets allowed. The received packet is retransmitted at block 890, and processing is then complete.
  • the extended transport protocol 165 is not required to share memory with other applications and services unlike TCP.
  • the entire memory of the device is can be dedicated for buffering packets of active connections. Further, this large buffer is shared flexibly among multiple active end-to-end connections without any fixed quotas for the connections.
  • TCP's performance is limited in networks with large bandwidth-delay product due to the limit imposed on the maximum outstanding packets in the network.
  • the extended transport protocol improves the performance of end-to-end connections in networks with large bandwidth delay product by eliminating the limitation of small windows and by achieving perfect sharing of the entire memory available to the system for buffering packets of active connections.
  • TCP's performance is limited in networks with large bandwidth-delay product due to the limit imposed on the maximum outstanding packets in the network.
  • the extended transport protocol improves the performance of end-to-end connections in networks with large BDP by eliminating the limitation of small windows and by achieving perfect sharing of the entire memory available to the system for buffering packets of active connections.
  • FIG. 9 is a flow diagram of the flow control mechanism used by the extended transport protocol 165.
  • endpoint 110A is the TCP sender
  • endpoint 110B is the TCP receiver.
  • the endpoint 110A sends TCP data messages 910 destined for the endpoint 11OB.
  • the network device 150A receives the TCP Data messages 910, encapsulates them into extended transport protocol data messages 920, and sends them on to the network device 150B.
  • the network device 150B receives the TCP Data messages 920, removes the TCP data message 910 encapsulated within, and sends the TCP data message 910 on to the endpoint 110B.
  • Flow control is used on all three legs of the connection.
  • the network device 150A closest to the endpoint 11OA, uses TCP flow control mechanisms to control the sending rate of the endpoint 110A. That is, the network device 150A manages its own endpoint-side receive buffers by sending TCP sliding window advertisement and/or freeze messages 930 back to the endpoint 110A. The endpoint 110A understands these TCP flow control messages 930 and throttles as indicated.
  • the endpoint 110B receiving TCP data from endpoint 110A, also uses TCP flow control messages 930 to throttle the network device 150B closest to it.
  • the network device 150B which expects flow control messages from the endpoint side to be TCP flow control messages 930, throttles as indicated.
  • network device 150B may in turn need to throttle the sending network device 150A. If so, the network device 150B sends extended transport flow control messages 940 to the network device 150A (different than the TCP flow control messages 930). This may in turn result in the router-side receive buffers within the network device 150B to fill up, at which point the network device 150B will throttle the endpoint 110A by sending TCP flow control messages 930.
  • the data rate of the sending endpoint 110A can be affected by flow control on all three legs of the connection.
  • a person of ordinary skill in the art should appreciate that when a network device 150 runs out of receive buffer space, this strategy provides a graceful back-pressure mechanism to slow down traffic on the network 130 between the network devices 150, and eventually back to the TCP sender endpoint 110A.
  • Some embodiments of the network device 150 include an additional level of flow control, is performed at the TCP connection level, which occurs when a single TCP connection exceeds a "fair share" of the receive buffer. Under this condition, the receiver network device 150 sends a TCP-freeze message for that specific TCP connection to the sender network device 150. In response, the sender network device 150 throttles the sending rate of the corresponding TCP connection on the remote side.
  • FIG. 10 is a state diagram illustrating a congestion control mechanism implemented by some embodiments of the network device 150.
  • the algorithm transitions between six states: SlowStart 1010; CongestionAvoidance 1015; Maintain 1020; ProportionalDecrease 1025; LossRecovery 1030; and InitializeWindow 1035.
  • the extended transport protocol 165 begins in the SlowStart state 1010. While in the SlowStart state 1010, the congestion window on a connection is periodically increased in a non-linear manner (1040). In one embodiment, this If the congestion window reaches a threshold (1045) while in the SlowStart state 1010, the sender transitions to the Congestion Avoidance state 1015. If instead the roundtrip time of the connection through the network 130 (as measured by a probe) reaches a threshold (1050), the sender transitions to the Maintain state 1020, which will be discussed below.
  • the Congestion Avoidance state 1015 reached from the SlowStart state 1010, is exited when an event indicating packet loss (1055 or 1057).
  • the Congestion Avoidance state 1015 may also be exited when the round-trip time of the connection through the network 130, as measured by a probe, increases beyond a threshold value (1060),
  • timeout event that indicates packet loss (1055)
  • the sender transitions to the InitializeWindow state 1035, where the congestion window is reset to an initial value, and the sender then returns to the SlowStart state 1010.
  • the sender transitions to the Proportional Decrease state 1025, discussed below.
  • the sender transitions to the Maintain state 1020.
  • the congestion window stays fixed at the last-computed value until packet loss occurs, as indicated by either a timeout (1065) or a duplicate acknowledgment (1070.
  • a timeout 1065 In the case of a timeout 1065, and the sender returns to the SlowStart state 1010.
  • a duplicate acknowledgement 1070 the sender transitions to the Proportional Decrease state 1025.
  • the sender reacts to the detection of congestion loss by throttling the rate by a value proportional to the number of lost packets, and then enters the Loss Recovery state 1030.
  • the congestion window is set to the number of outstanding packets at the time of the loss, reduced by an amount proportional to the number of packets lost in the network 130 during one round-trip time. This mechanism ensures that new packets are transmitted before lost packets during loss recovery. While in the Loss Recovery state 1030, data is sent for every acknowledgement (1075).
  • the sender Upon acknowledgement for all the outstanding packets at the time of entering the loss recovery (1080), the sender exits the Loss Recovery state 1030 and returns to the Congestion Avoidance state 1015. Upon a timeout indicating packet loss, the congestion window is reset to the original window size at the time of loss (in state 1035), and the sender returns to the SlowStart state 1010. [069]
  • TCP is designed such that any packet losses that occur during the connection progress are interpreted as a sign of network congestion, and TCP reacts by throttling the rate of the connection by half.
  • the proportional decrease mechanism used by the extended transport protocol 165 is more appropriate in environments (e.g., wireless data networks and private WANs) where provisioned bandwidth is available. Apart from achieving less aggressive congestion control, the proportional decrase mechanism employed by the extended transport protocol 165 is able to handle random packet losses better than the multiplicative decrease mechnanism used by TCP. Since the extended transport protocol 165 reduces the congestion window in proportion to the number of packet losses, the impact of random losses on congestion control is decreased.
  • the receiver network device 150 spreads these packet transmissions over future acknowledgments by limiting the number of new packet transmissions to two for every receipt of a new acknowledgment.
  • TCP uses a linear increase strategy for rate probing: if the available capacity is C units, and the current data rate of a TCP connection is C-X units, then TCP will take approximately X round-trip times to reach the ideal operating point for the connection data rate. Thus, TCP is slow in reacting to both the availability of new resources on the network 130, and to lower bitrate operations that resulted from previous reductions in the congestion window. When the round-trip time is large, TCP takes a long time to reach the ideal operating point. Short-lived connections such as SSL transactions can finish data transfer completely before reaching the ideal operating point.
  • the network device eliminates the start-up probing delay for these end-to-end connections. This is possible because of sharing of network information among end- to-end connections through the extended transport protocol connection through which they are multiplexed. This start-up delay reduction significantly improves the performance of transactional applications which have short lifetimes.
  • TCP has a tendency to induce losses even during routine congestion control operations, because the TCP congestion control process has only two phases; an increase phase and a decrease phase.
  • TCP continues to increase the connection data rate until congestion is induced in the network 130 and a loss occurs, whereupon the decrease phase kicks in and the rate is halved for a repetition of the congestion control cycle. This unnecessary cycle that involves forced decreases and slow increases further limits the performance of TCP connections.
  • the extended transport protocol 165 also features a loss detection mechanism which is more suitable for high-speed networks than conventional transport protocols. Instead of using high overhead timeouts to detect loss, the extended transport protocol 165 uses passive learning techniques based on the number of packets sent, number of packets received, and sequence numbers of packets sent at appropriate milestone events during loss detection. More specifically, the sender network device 150 uses a monotonically increasing sequence number called CONG_SEQ_NUM on all the packets it transmits. The receiver network device 150 reflects the CONG_SEQ_NUM on the received packets on the acknowledgements as the ACK_CONG_SEQ.
  • the sender network device 150 concludes that the retransmitted packet is lost and takes appropriate action to recover from that loss. Without this mechanism, the only way to determine whether a retransmitted packet is lost is using a timeout mechanism which is an inefficient use of precious network bandwidth.
  • the loss reporting mechanism used by the extended transport protocol 165 allows faster reporting than conventional techniques by accommodating a greater number of lost blocks, and incorporating a multi-level selective acknowledgment (SACK) mechanism.
  • SACK multi-level selective acknowledgment
  • the extended transport protocol 165 uses multiple levels of SACK to convey losses to the sender network device 150.
  • Each SACK block has both the start and end of the lost block of packets as well as the transmission cycle number of the loss recovery phase.
  • the transmission cycle number is identified by the number of retransmissions of the packets in the SACK block.
  • the sender network device 150 gives priority to the minimum transmission cycle number with respect to the retransmission process.
  • the network device 150 also uses coarse timeouts to handle cases where the network 130 is down for a long duration when no packets reach the receiver. Every time a new data packet is acknowledged by the receiver (indicated by an acknowledgment), the timer is reset. When the timer expires, it indicates that the head-of-line packet in the send buffer was not successfully delivered and hence should be retransmitted. These coarse timeouts are able to handle temporary network outages, while the CONG_SEQ_NUM-based loss detection and recovery mechanism described above works only when there are packets reaching the receiver and thus triggering acknowledgements to the sender.
  • the receiver network device 150 uses a NXT_SEQ_NUM field in the acknowledgement to communicate to the sender network device 150 the status of the receive buffer at the receiver network device 150.
  • the NXT_SEQ_NUM is the sequence number of the head-of-line packet in the receiver's out-of-order buffer.
  • the sender uses the NXT_SEQ_NUM value to determine whether the received acknowledgement is a "true partial acknowledgment" or a "false partial acknowledgment".
  • a true partial acknowledgment acknowledges the receipt of all packets less than the NXT_SEQ_NUM, though not all the packets outstanding at the time of loss.
  • a false partial acknowledgement does not acknowledge the receipt of all packets less than the NXT_SEQ_NUM, though it acknowledges the next in-sequence packet expected by the receiver.
  • the sender network device 150 increases the utilization of the network 130 even during loss recovery.
  • extended transport protocol 165 has no limit on the advertised (sliding) window size or the congestion window size.
  • extended transport protocol 165 do have a limit. Some of these embodiments have limits that are much larger than the limits used by conventional protocols.
  • FIG. 11 is a hardware block diagram of a network device 150 in accordance with the system and method for improving performance of transport protocols.
  • the network device 150 contains a number of components that are well known in the art of data communications, including a processor 1110, a local network interface 1120, a remote local interface 1130, memory 1140, and non-volatile storage 1150. Examples of non-volatile storage include, for example, a hard disk, flash RAM, flash ROM, EEPROM, etc. These components are coupled via bus 1160.
  • Memory 1140 contains logic for improving performance of transport protocols 160 from FIG. 1.
  • the network device 150 is shown with two network interfaces.
  • the local network interface 1120 is in communication with endpoint 110
  • the remote local interface 1130 is in communication with router 140.
  • networks interfaces may be of different types, support different medias and speeds, etc. Omitted from FIG. 11 are a number of conventional components, known to those skilled in the art, that are not necessary to explain the operation of the network device 150.
  • the systems and methods disclosed herein can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device.
  • instruction execution systems include any computer-based system, processor-containing system, or other system that can fetch and execute the instructions from the instruction execution system.
  • a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by, or in connection with, the instruction execution system.
  • the computer readable medium can be, for example but not limited to, a system or propagation medium that is based on electronic, magnetic, optical, electromagnetic, infrared, or semiconductor technology.
  • a computer-readable medium using electronic technology would include (but are not limited to) the following: an electrical connection (electronic) having one or more wires; a random access memory (RAM); a read-only memory (ROM); an erasable programmable read-only memory (EPROM or Flash memory).
  • RAM random access memory
  • ROM read-only memory
  • EPROM or Flash memory erasable programmable read-only memory
  • a specific example using magnetic technology includes (but is not limited to) a portable computer diskette.
  • Specific examples using optical technology include (but are not limited to) an optical fiber and a portable compact disk read-only memory (CD-ROM).

Abstract

Systems and methods of improving transport protocol performance are disclosed. One exemplary method includes: in a first state, non-linearly increasing a congestion window; in response to the congestion window exceeding a threshold value while in the first state, transitioning to a second state; and in the second state, linearly increasing the congestion window.

Description

SYSTEMS AND METHODS OF IMPROVING PERFORMANCE OF TRANSPORT
PROTOCOLS
CROSS REFERENCE TO RELATED APPLICATIONS
[001] This application claims the benefit of U.S. Provisional Application No.
60/765,787, filed February 7, 2006, and hereby incorporated by reference herein.
FIELD OF THE DISCLOSURE
[002] The present disclosure relates to communication protocols, and more specifically, to transport-layer protocols.
BACKGROUND
[003] The transport protocol known as Transmission Control Protocol (TCP) has been performing well for the past two decades as the de-facto transport protocol for reliable data delivery over the Internet. Although the algorithms used by TCP were designed to promote stability, reliability, and fairness on the Internet, these same algorithms lead to reduced TCP performance in the presence of certain conditions along the end-to-end path between the communicating systems. These characteristics, which include large bandwidth, large delay, and/or significant loss- rate, are becoming more common in today's Internet. Although the basic algorithms used by TCP have been modified over the years, significant change to these algorithms is unlikely, since there is such a large installed base of systems which use TCP. Therefore, a need exists for these and other problems to be addressed.
BRIEF DESCRIPTION OF THE DRAWINGS
[004] Many aspects of the disclosure can be better understood with reference to the following drawings. The components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure.
[005] FIG. 1 is a block diagram of an environment in which one embodiment of a system and method for improving performance of transport protocols is located. [006] FIG. 2 is a block diagram of an environment in which another embodiment of a system and method for improving performance of transport protocols is located.
[007] FIG. 3 is a block diagram of the logic for improving performance of transport protocols 160 from FIG. 1.
[008] FIG. 4 is a data flow diagram showing the processing of packets by the logic for improving performance of transport protocols 160 of FIGs. 1 and 3.
[009] FIG. 5 is a flowchart showing processing of a received acknowledgement by the connection terminator 350 of FIG. 3.
[010] FIG. 6. is a flowchart showing processing of a TCP packet by the connection terminator 350 of FIG. 3.
[011] FIG. 7 is a flowchart showing processing of the extended transport data, control, or acknowledgement packet by the core 370 of FIG. 3.
[012] FIG. 8 is a flowchart showing processing of a received packet by the virtual connection manager 380 of FIG. 3.
[013] FIG. 9 is a flow diagram of a flow control mechanism used by some embodiments of logic 160 of FIG. 3.
[014] FIG. 10 is a state diagram of a congestion control mechanism used by some embodiments of logic 160 of FIG. 3.
[015] FIG. 11 is a block diagram of a general-purpose computer than can be used to implement the systems and methods of improving performance of transport protocols disclosed herein.
SUMMARY
[016] Systems and methods of improving transport protocol performance are disclosed. One exemplary method includes: in a first state, non-linearly increasing a congestion window; in response to the congestion window exceeding a threshold value while in the first state, transitioning to a second state; and in the second state, linearly increasing the congestion window.
DETAILED DESCRIPTION
[017] FIG. 1 is a block diagram of an environment in which one embodiment of a system and method for improving performance of transport protocols is located. Endpoint devices 110 use a transport-layer (layer-4) protocol 120, and communicate with one another over a network 130. Although this disclosure discusses TCP as an exemplary transport-layer protocol, a person of ordinary skill in the art should recognize that the principles disclosed herein for improving performance of transport protocols also apply to other transport-layer protocols. Routers 140 transport traffic across the network 130, which may involve the use of a network-layer (layer-3) protocol such as Internet Protocol (IP). Although the term "router" is used herein, a person of ordinary skill in the art should recognize that router 140 may take the form of a layer-3 switch instead.
[018] Network devices 150 are located (logically) between endpoints 110 and routers 140. Each network device 150 includes logic for improving performance of transport protocols 160, which allows a network device 150 to communicate with a peer network device 150 using an extended transport protocol 165. Thus, a pair of endpoints 110 communicates with each other through a pair of network devices 150. Although a network device 150 appears between an endpoint 110 and a router 140 in FIG. 1 , this is a logical rather than a physical representation, indicating merely that packets pass through the network device 150. As will be explained below, some embodiments of the network device 150 are not actually placed inline between an endpoint 110 and a router 140, but instead operate as an offline device hanging off router 140.
[019] Some embodiments of a network device 150 include an endpoint network interface 170 and a peer network interface 175, where the endpoint network interface 170 is coupled to an endpoint 110 through a link 180 and the peer network interface 175 is coupled to a router 140 through a link 185. Other embodiments of a network device 150 include a single network interface coupled to the router 140. (A single interface embodiment can be used "offline" rather than inline, as will be described below.
[020] In some embodiments, the links in the network 130 exhibit different performance characteristics than the links to endpoints 110. For example, links to the endpoints 110 may provide a relatively high-speed wired connection (e.g., 100 Mbit Ethernet) while links in the network 130 may provide a lower-speed wired or wireless connection (e.g., T1 , WiFi). The extended transport protocol 165 is designed for the performance characteristics of the links between network devices 150.
[021] In some embodiments of the network device 150, the extended transport protocol 165 is different than the transport protocol 120 used by the endpoints 110: the protocol used between an endpoint 110 and its corresponding network device 150 is the original transport protocol 120; the protocol used between peer network devices 150 is the extended transport protocol 165. In such embodiments, the network device 150 acts as a transport proxy for an endpoint 110. In some proxy embodiments, the endpoint 110 is unaware that the endpoint 110 is using a different transport protocol, in which case the network device 150 is a transparent transport proxy for an endpoint 110. As will be described in further detail below, the network device 150 maintains transparency by responding to packets sent by the TCP endpoints in such a way that the endpoints are aware of only the proxy as the other communicating endpoint and not the actual receiver.
[022] The term "extended transport packets" will be used hereinafter when referring to packets used by the extended transport protocol 165. A person of ordinary skill in the art should recognize that such a protocol typically includes packets that carry data (data packets), packets that acknowledge data (acknowledgement packets), and control packets that are used to setup teardown connections. Thus, reference will be made herein to "extended transport data packets" and "extended transport acknowledgment packets" and "extended transport control packets". These packets correspond to, but are different than, the original transport protocol. For example, a TCP Data packet and an extended transport data packet both carry data, but the TCP Data packet originates from or is delivered to a TCP endpoint 110 while the extended transport data packet is conveyed between transport proxy peers 150. In some embodiments, the extended transport packets are formed by adding trailer fields to the original transport protocol packets. For example, a TCP data packet is translated to an extended transport data packet by appending a "protocol type" field of "extended transport data", while a TCP control packet is translated to an extended transport control packet by appending a "protocol type" field of "extended transport control". This can be considered a form of encapsulation, but has the advantage of being transparent to the endpoints. In some cases, an extended transport packet is conveyed alone, without encapsulation. In these cases, the Protocol Type field in the IP header may be set to a special value indicating the presence of the extended transport protocol. That is, the extended transport protocol 165 is viewed by the IP, or network, layer as a protocol type like TCP or UDP.
[023] A person of ordinary skill in the art should appreciate that the logic for improving performance of transport protocols 160 can be instantiated in several different ways. One example implements the logic 160 in a standalone 150 device that sits between the TCP communication end-device and the access router 140. Another instantiation of the logic 160 is within the endpoint 110, for example, as a kernel driver sitting between the TCP and IP layer of the kernel protocol stack. As yet another example, the logic for improving performance of transport protocols 160 can replace TCP as a transport layer in the protocol stack of the endpoint 110. Although only the standalone network device 150 is discussed herein, all such instantiations are intended to be within the scope of this disclosure.
[024] FIG. 2 is a block diagram of an environment in which another embodiment of a system and method for improving performance of transport protocols is located. In this environment, a pair of endpoints 110 may include multiple connections 210, 220, 230 between the peers. Each of these connections (210-230) passes through improved network device 150A and 150B. In this embodiment, the network device 150 decides, on a connection-by-connection basis, whether to use the extended transport protocol 165 or the original transport protocol 120 for the leg of the connection between network devices 150. In the example of FIG. 2, connections 210 and 220 use the extended transport protocol 165 for the middle leg, and connection 230 uses the original transport protocol 120.
[025] In some embodiments, a user (e.g., a system administrator) decides which connections will use which transport protocol, and configures the network device 150 accordingly. Several configuration examples are: all connections from a particular endpoint 110 use extended transport protocol 165; no connections from a particular endpoint 110 use extended transport protocol 165; those connections from a particular endpoint 110 identified by a specific combination of header fields use extended transport protocol 165; those connections from a particular endpoint 110 not identified by a specific combination of header fields do not use extended transport protocol 165. A person of ordinary skill in the art should recognize that these are merely examples, and that many other techniques for determining which connections use the extended transport protocol 165 are also possible.
[026] FIG. 3 is a block diagram of the logic for improving performance of transport protocols 160 from FIG. 1. A connection manager 310 sets up connections to other network devices 150 in the network, and maintains general state information about other network devices 150. The connection manager 310 may discover the presence of, and addresses of other network devices 150 through a configuration database (local or centralized), or through a dynamic learning process, or through any other appropriate mechanism known to a person of ordinary skill in the art.
[027] Once a peer device 150 is discovered, the connection manager 310 monitors for failure of a peer device 150. If a failure is discovered, the connection manager 310 notifies other components in the logic for improving performance of transport protocols 160 about the failure. Each component takes appropriate action in response to the peer failure. In some embodiments, recognition of peer failure is accomplished through a heartbeat signal between peer network devices 150. The connection manager component 310 transmits the heartbeat signal of its device 150, and also monitors the heartbeat of other peer devices 150. The absence of a heartbeat then signifies failure of a peer device 150.
[028] A configuration and monitoring manager 320 allows the operation of the network device 150 to be tuned. The configuration and monitoring manager 320 also monitors performance characteristics of both the network device 150. In some embodiments, the configuration and monitoring manager 320 also monitors performance characteristics of endpoint traffic flowing through device 150.
[029] A traffic classifier 330 classifies network traffic entering the network device 150. Classification is based on an N-tuple formed by the headers on the incoming packer. In some embodiments, the N-tuple is the 4-tuple comprising sender IP address, destination IP address, sender TCP port, and destination TCP port. The traffic classifier 330 also performs deep inspection of the packets in order to identify special connection control packets (e.g., SYN, ACK, FIN, etc.). The traffic classifier 330 then notifies other logic components of these control packets.
[030] After classifying, the traffic classifier 330 decides whether to direct the packet through other components in logic 160, or through the default forwarding path. This decision is made in consultation with the configuration and monitoring manager 320 (described below), which maintains information about protocol improvement preferences (e.g., which connections the improvements are applied to, and which connections use the conventional protocol).
[031] The state manager 340 maintains state about those TCP connections to which improvements are applied. The state manager 340 learns about the setup and teardown of TCP connections from the deep inspection data provided by the traffic classifier 330. In some embodiments, connections are hashed or indexed based on the N-tuple in the connection control packets, which facilitates faster connection lookups and packet identification. The state manager 340 also maintains information about active connections that have been consistently sending/receiving packets, and those that have remained idle. This distinction helps to achieve fairness among the different TCP connections, and allows the logic 160 to penalize connections that have been getting more than their fair share of the capacity.
[032] The connection terminator 350 acts as the destination and source, respectively, to the source and destination of the endpoint TCP connections. Therefore, the connection terminator 350 includes the functionality of a TCP endpoint, such as connection management, packet sequencing, congestion control, flow control, acknowledgement transmissions, acknowledgement receipt processing, loss detection, and loss recovery. The connection terminator 350 also acts as an adapter between the extended transport protocol 165 and the original transport protocol 120, propagating decisions to the TCP sender or receiver in a form understandable by these endpoints 110. For example, when the logic 160 makes a flow control decision "no more data to be transmitted", the connection terminator 350 conveys this decision to the TCP sender endpoint 110 through an advertised window size of zero. The connection terminator 350 also maintains and manages data buffers to handle out-of-order delivery, packet losses, packet retransmissions, etc. [033] The transparency manager 360 works with the state manager 340 to ensure that the negotiated parameters between the two TCP end-systems (e.g., maximum transmission unit, the availability of the selective acknowledgment feature, etc.) are consistent with those required by the logic 160. As described earlier, the traffic classifier 330 performs deep packet inspection and examines TCP control packets (e.g., SYN, ACK, FIN). The transparency manager 360 is notified of the parameters used in these SYN and SYN-ACK control packets. If the original default parameters themselves are compatible with the requirements of logic 160, such parameters are let through as-is. However, when the default parameters are not compatible, the transparency manager 360 modifies the connection control packets to use the alternate parameters.
[034] The core 370 delivers data between peer network devices 150, implementing the extended transport protocol 165. Several features of the extended transport protocol 165 will be described below. In transparent transport proxy embodiments, network devices 150 perform their operations based on the addition and processing of trailers that are added to the packets received from the TCP endpoints. Thus, the packets flowing between two network devices 150 are similar to the packets sent by the original communicating end-points. Since existing network components use headers to identify and process packets, this inventive feature (along with the bridge functionality described above) allows the extended transport protocol 165 to be transparent to other network components.
[035] Finally, the virtual connection manager 380 maps TCP connections to multiple virtual connections between peer devices 150 and aggregates these virtual connections. The aggregated virtual connections, which form a virtual end-to-end path, are referred to herein as "pipes." An example of such an implementation is described in U.S. Serial No. 11/063,284, titled "Systems and Methods for Parallel Communication", which is entirely incorporated by reference herein. In some of these embodiments, the number of virtual connections is configurable and can be dynamically chosen by the logic 160.
[036] FIG. 3 shows that packets are passed from one component to another for processing. In some embodiments, a zero-copy technique is used which increases the efficiency of the memory use. Zero-copy packet processing uses a NumReferences field in the internal packet representation to track the number of components accessing the packet. Whenever a component processes a packet, it increases the NumReferences field. When the component is finished with processing, it decreases the num_references value. This avoids the need for a copy when passing packets between components.
[037] FIG. 4 is a data flow diagram showing the processing of packets by the logic for improving performance of transport protocols 160 of FIGs. 1 and 3. Processing of incoming packets begins with the traffic classifier 330, which uses the source IP address, destination IP address and protocol header fields to classify (410) the packet. If the protocol type field indicates that the packet is neither a TCP packet nor an extended transport packet, then the packet is forwarded, without modification, to a logical layer-2 bridge 420, which transmits the packet. As should be understood by a person of ordinary skill in the art the bridge 420 has a single IP address and couples the endpoint network interface 170 and peer network interface 175 by maintaining a table of mappings between layer-3 (IP) addresses and layer-2 (MAC) addresses. When given a packet for transmission, the bridge 420 examines the layer-3 address in the packet and determines which interface (endpoint network interface 170 and peer network interface 175) to transmit on, based on the address table. Therefore, in the discussion below, reference will be made to transmitting, sending, or forwarding a packet, without specifying which interface.
[038] Operating as a bridge allows the network device 150 including logic for improving performance of transport protocols 160 to perform packet interception and processing without requiring a change to the routing tables on the TCP endpoints 110. Bridge operation also allows the network device 150 to operate as an offline device, located off the router 140, instead of inline between the TCP endpoints 110 and the router 140.
[039] If the packet is classified (410) by the traffic classifier 330 as a TCP packet, then the packet is provided to the state manager 340. The state manager 340 determines (430) the type of the TCP packet. If the TCP packet is a connection setup packet (e.g., SYN or SYNACK), then state manager 340 creates or updates the connection state, respectively, and hands off the packet to the transparency manager 360. As described earlier, the transparency manager 360 examines the connection options during setup, as conveyed in the TCP SYN and TCP SYNACK packets, and modifies these options as needed to insure compatibility with the extended transport protocol 165. The transparency manager 360 then forwards the TCP control packet.
[040] If the state manager 340 determines (430) that the TCP packet is a RST packet, then the state manager 340 determines (440) whether the connection exists (e.g., by consulting a connection hash table). If the connection exists, then the connection is deleted by the state manager 340 and the TCP control packet is forwarded. Returning to the determination 430 by the state manager 340, if the packet is a FIN packet and the connection exists, and then the connection state is updated. If a FIN has also been received by the local endpoint, then the connection is deleted. In either case, the state manager 340 requests the connection terminator 350 to send the TCP FIN packet, and then forwards the TCP FIN packet.
[041] Returning again to the determination 430 by the state manager 340, if the TCP packet is an ACK or a TCP data packet, then the state manager 340 determines whether the connection exists (e.g., by consulting a connection hash table). If the connection does not exist, then the state manager 340 forwards the TCP packet. If the connection does exist, then the state manager 340 updates state information hands off the packet to the connection terminator 350.
[042] After receiving the TCP packet from the state manager 340, the connection terminator 350 classifies (450) the TCP packet. If the TCP packet is an ACK, the connection terminator 350 performs appropriate housekeeping as indicated by receipt of the acknowledgement, and discards or consumes the ACK.
[043] The housekeeping performed by the connection terminator 350 will now be described in connection with the flowchart of FIG. 5. The connection terminator 350 begins processing the acknowledgement at block 510, where the acknowledged packets are removed from the TCP send buffer. Next, at block 520, the in-sequence number is updated to reflect the acknowledgment. Then the count of in-flight packets is updated at block 530. Processing continues at block 540, where the maximum allowed outstanding packets is updated. Finally, block 550 is executed in an iteration loop while the in-flight count is less than the maximum allowed outstanding packets, where 550 sends the next packet in the TCP send buffer.
[044] Returning now to the classification (450) by the connection terminator 350 in FIG. 4, if the TCP packet is data rather than a control packet, then the connection terminator 350 processes the packet further. This processing of TCP data packets by the connection terminator 350 will now be described in connection with the flowchart of FIG. 6.
[045] The connection terminator 350 begins processing a packet at block 610, which compares the buffer size of the core component (370) to a threshold. If the buffer size meets the threshold, then block 620 sends a DUPACK for the next in- sequence packet. Next, the packet is discarded (block 630), and processing of the packet is complete. If the core component's buffer size does not meet the threshold, then processing continues at block 640. Block 640 determines whether the received packet is the next in-sequence packet. If No, then at block 645 the received packet is inserted into the TCP receive buffer, block 650 sends a DUPACK for the next in- sequence packet, and processing of this packet is complete. On the other hand, if block 640 determines that the received packet is the next in-sequence packet, then processing continues at block 655.
[046] Block 655 updates the connection state. Next, at block 660 the core component 370 is requested to send the packet. Processing continues at block 665, which determines whether the TCP receive buffer is empty. If empty, then block 670 sends an acknowledgement for the received packet, and processing of the packet is finished. If the TCP receive buffer is not empty, then block 675 notifies the core component 370 that all in-sequence packets in the buffer are ready for transmit processing. Next, block 680 sends an acknowledgement for all the in-sequence packets that were just processed by block 675. Processing of the received TCP packet is now complete.
[047] The processing of TCP packets by logic 160 has been described in conjunction with the main data flow diagram of FIG. 4, along with the flow charts of FIGs. 5 and 6. Returning now to the main data flow diagram of FIG. 4, if the packet is classified (410) as an extended transport packet rather than a TCP packet, then the packet is provided to the core 370. The core 370 determines (460) whether the packet is an extended transport data packet (470) or an extended transport control or acknowledgement packet (480).
[048] Further processing of the extended transport data, control, or acknowledgement packet by the core 370 will now be described in connection with the flowchart of FIG. 7.
[049] Processing of the received extended transport packet by the core 370 begins at block 710, which determines whether the received packet is extended transport data. If No, then processing continues at block 765 (FIG. 7B), which will be discussed below. If the received packet is extended transport data, then processing continue at block 715, which determines whether the received data packet is the next in- sequence packet. If No, then processing continues at block 720, where the packet is stored in the receive buffer. Next, block 725 sends a DUPACK for the next in- sequence packet. Processing of the extended transport data packet is then complete.
[050] Returning to block 715, if it is determined that the received data packet is not the next in-sequence packet , then block 730 de-encapsulates the TCP packet from the extended transport data packet, and the TCP packet is handed off at block 735 the connection terminator component 350 for further processing. After connection terminator processing, the core component's receive buffer is checked at block 740. If the receive buffer is empty, then processing continues at block 745, where an acknowledgment for the received extended transport data packet is sent, and processing of the received extended transport data packet is complete. However, if the core component's receive buffer is not empty, then block 750 handles the receive buffer by de-encapsulating the TCP packets contained within the in-sequence extended transport data packets in the receive buffer. Next, at block 755, the TCP packets are handed off to the connection terminator component 350 for further processing. After connection terminator processing, block 760 sends acknowledgements for all the processed in-sequence packets in the core receive buffer, and processing is complete.
[051] Returning to block 710, if the received packet is not an extended transport data packet, the packet is further classified at block 765 (FIG. 7B). If the packet is not an acknowledgment (e.g., an extended transport SYN, SYNACK, RESET or Heartbeat), then the packet is passed on at block 770 to the connection manager component 310 for further processing. On the other hand, if the packet is an extended transport acknowledgment, processing continues at block 775.
[052] At block 775, the core 370 determines whether the acknowledgment is for the head-of-the-line packet. If No, then the packet is ignored and processing is complete. If Yes, then block 780 updates the next in-sequence number, number of in-flight packets, and number of outstanding packets allowed. After the statistics are updated, packets acknowledged by the received acknowledgement are removed from the receive buffer at block 785. In some embodiments, a "lazy free" technique is used to recapture the buffers. (The lazy free technique will be discussed below.) After buffer cleanup, the virtual connection manager 380 is queried, at block 790, to determine if the congestion window now allows new transmissions. If so, block 795 transmits new extended transport data packets until no more window space is available.
[053] The lazy packet free mechanism, implemented by some embodiments of the core 370, delays freeing of acknowledged packets to a later point in the packet processing cycle. Specifically, when an acknowledgement arrives from the receiver notifying the receipt of multiple packets, the sender marks the list of acknowledged packets and defers the actual freeing of those packets for later. Then a specified number of packets are freed from the lazy buffer for every new packet that is transmitted by the sender. This amortizes the overhead of multiple packet memory free operations over multiple packet transmissions, and does not slow down the processing immediately after the receipt of acknowledgements.
[054] FIG. 8 is a flowchart showing processing of a received extended transport packet by the virtual connection manager 380. These received packets, which include extended transport data packets and extended transport acknowledgement packets, are provided to the virtual connection manager 380 by the core 370. Processing of received extended transport packet by the virtual connection manager 380 begins at block 805, which determines whether the extended transport packet is data or acknowledgement. If Data, then processing continues at block 810, which determines whether the received data packet is the next in-sequence packet. If No, then processing continues at block 815, where the sequence number of the received data packet is stored in an out-of-order list. Next, block 820 updates the selective acknowledgement (SACK) Scoreboard, and block 825 sends a DUPACK for the next in-sequence packet. Processing of the extended transport data packet is then complete.
[055] Returning to block 810, if it is determined that the received data packet is the next in-sequence packet, then block 830 examines the out-of-order list. If the list is empty, the block 835 sends an acknowledgement for the received packet, and processing is complete. If the list is non-empty, then block 840 removes the in- sequence numbers corresponding to the received packet from the out-of-order list. Next, at block 845, an acknowledgement for all the in-sequence packets is sent, and processing of the received packet is finished.
[056] Returning to the classification of the received packet at block 805, if the packet is an extended transport acknowledgment packet, then block 850 determines whether the acknowledgment is for the head-of-the-line packet. If No, then the packet is ignored and processing is complete. If Yes, then block 855 determines whether the core component is in the LOSS RECOVERY state. In one embodiment, the core component states include NORMAL, LOSS_RECOVERY, TIMEOUT, SYN_SENT, and SYN_RECVD. These states may vary according to the choice of transport protocol, as should be understood by a person of ordinary skill in the art.
[057] If not in the loss recovery state, then the following statistics are updated at block 860: next in-sequence number; number of in-flight packets; and number of outstanding packets allowed. After the statistics are updated, the congestion control parameters are updated at block 865. In one embodiment, the congestion control parameters include the congestion window size and the threshold. Processing of the extended transport acknowledgement packet is then complete.
[058] If block 855 determines that the core component is in the loss recovery state, then processing continues at block 870, which determines whether the acknowledgment is for all the outstanding packets at the time of entering the LOSS_RECOVERY state. If Yes, then the core component state is updated to NORMAL. At block 875, the pipe parameters are updated at block 880, and processing of the packet is complete. If block 870 determines that the acknowledgment is for less than all outstanding packets, then the parameters for the pipe (virtual end-to-end path) are updated at block 885. In one embodiment, these parameters include a next in-sequence number, a number of in-flight packets, and a number of outstanding packets allowed. The received packet is retransmitted at block 890, and processing is then complete.
[059] Having described the overall operation of the logic 160 which implements the extended transport protocol 165, several features of this protocol will now be described. A person of ordinary skill in the art should understand that these features are generally independent of each other, so that a specific embodiment of the extended transport protocol 165 may include some combination of these features. The extended transport protocol 165 is not required to share memory with other applications and services unlike TCP. The entire memory of the device is can be dedicated for buffering packets of active connections. Further, this large buffer is shared flexibly among multiple active end-to-end connections without any fixed quotas for the connections. TCP's performance is limited in networks with large bandwidth-delay product due to the limit imposed on the maximum outstanding packets in the network. The extended transport protocol improves the performance of end-to-end connections in networks with large bandwidth delay product by eliminating the limitation of small windows and by achieving perfect sharing of the entire memory available to the system for buffering packets of active connections.
[060] TCP's performance is limited in networks with large bandwidth-delay product due to the limit imposed on the maximum outstanding packets in the network. The extended transport protocol improves the performance of end-to-end connections in networks with large BDP by eliminating the limitation of small windows and by achieving perfect sharing of the entire memory available to the system for buffering packets of active connections.
[061] FIG. 9 is a flow diagram of the flow control mechanism used by the extended transport protocol 165. In this example, endpoint 110A is the TCP sender, and endpoint 110B is the TCP receiver. The endpoint 110A sends TCP data messages 910 destined for the endpoint 11OB. The network device 150A receives the TCP Data messages 910, encapsulates them into extended transport protocol data messages 920, and sends them on to the network device 150B. The network device 150B receives the TCP Data messages 920, removes the TCP data message 910 encapsulated within, and sends the TCP data message 910 on to the endpoint 110B.
[062] Flow control is used on all three legs of the connection. The network device 150A, closest to the endpoint 11OA, uses TCP flow control mechanisms to control the sending rate of the endpoint 110A. That is, the network device 150A manages its own endpoint-side receive buffers by sending TCP sliding window advertisement and/or freeze messages 930 back to the endpoint 110A. The endpoint 110A understands these TCP flow control messages 930 and throttles as indicated.
[063] The endpoint 110B, receiving TCP data from endpoint 110A, also uses TCP flow control messages 930 to throttle the network device 150B closest to it. The network device 150B, which expects flow control messages from the endpoint side to be TCP flow control messages 930, throttles as indicated. When the network device 150B reduces the data rate as instructed by the endpoint 110B, network device 150B may in turn need to throttle the sending network device 150A. If so, the network device 150B sends extended transport flow control messages 940 to the network device 150A (different than the TCP flow control messages 930). This may in turn result in the router-side receive buffers within the network device 150B to fill up, at which point the network device 150B will throttle the endpoint 110A by sending TCP flow control messages 930. Thus, the data rate of the sending endpoint 110A can be affected by flow control on all three legs of the connection. A person of ordinary skill in the art should appreciate that when a network device 150 runs out of receive buffer space, this strategy provides a graceful back-pressure mechanism to slow down traffic on the network 130 between the network devices 150, and eventually back to the TCP sender endpoint 110A.
[064] Some embodiments of the network device 150 include an additional level of flow control, is performed at the TCP connection level, which occurs when a single TCP connection exceeds a "fair share" of the receive buffer. Under this condition, the receiver network device 150 sends a TCP-freeze message for that specific TCP connection to the sender network device 150. In response, the sender network device 150 throttles the sending rate of the corresponding TCP connection on the remote side.
[065] FIG. 10 is a state diagram illustrating a congestion control mechanism implemented by some embodiments of the network device 150. The algorithm transitions between six states: SlowStart 1010; CongestionAvoidance 1015; Maintain 1020; ProportionalDecrease 1025; LossRecovery 1030; and InitializeWindow 1035. The extended transport protocol 165 begins in the SlowStart state 1010. While in the SlowStart state 1010, the congestion window on a connection is periodically increased in a non-linear manner (1040). In one embodiment, this If the congestion window reaches a threshold (1045) while in the SlowStart state 1010, the sender transitions to the Congestion Avoidance state 1015. If instead the roundtrip time of the connection through the network 130 (as measured by a probe) reaches a threshold (1050), the sender transitions to the Maintain state 1020, which will be discussed below.
[066] The Congestion Avoidance state 1015, reached from the SlowStart state 1010, is exited when an event indicating packet loss (1055 or 1057). The Congestion Avoidance state 1015 may also be exited when the round-trip time of the connection through the network 130, as measured by a probe, increases beyond a threshold value (1060), In the case of timeout event that indicates packet loss (1055), the sender transitions to the InitializeWindow state 1035, where the congestion window is reset to an initial value, and the sender then returns to the SlowStart state 1010. In the case of duplicate acknowledgement event that indicates packet loss (1057), the sender transitions to the Proportional Decrease state 1025, discussed below. In the case of roundtrip time reaching a threshold (1060) from the Congestion Avoidance state 1015, the sender transitions to the Maintain state 1020.
[067] While in the Maintain state 1020, the congestion window stays fixed at the last-computed value until packet loss occurs, as indicated by either a timeout (1065) or a duplicate acknowledgment (1070. In the case of a timeout 1065, and the sender returns to the SlowStart state 1010. In the case of a duplicate acknowledgement 1070, the sender transitions to the Proportional Decrease state 1025.
[068] In the Proportional Decrease state 1025, the sender reacts to the detection of congestion loss by throttling the rate by a value proportional to the number of lost packets, and then enters the Loss Recovery state 1030. On entering the Loss Recovery state 1030, the congestion window is set to the number of outstanding packets at the time of the loss, reduced by an amount proportional to the number of packets lost in the network 130 during one round-trip time. This mechanism ensures that new packets are transmitted before lost packets during loss recovery. While in the Loss Recovery state 1030, data is sent for every acknowledgement (1075). Upon acknowledgement for all the outstanding packets at the time of entering the loss recovery (1080), the sender exits the Loss Recovery state 1030 and returns to the Congestion Avoidance state 1015. Upon a timeout indicating packet loss, the congestion window is reset to the original window size at the time of loss (in state 1035), and the sender returns to the SlowStart state 1010. [069] A person of ordinary skill in the art should appreciate that this loss recovery mechanism is a less aggressive method as compared to TCP. TCP is designed such that any packet losses that occur during the connection progress are interpreted as a sign of network congestion, and TCP reacts by throttling the rate of the connection by half. The proportional decrease mechanism used by the extended transport protocol 165 is more appropriate in environments (e.g., wireless data networks and private WANs) where provisioned bandwidth is available. Apart from achieving less aggressive congestion control, the proportional decrase mechanism employed by the extended transport protocol 165 is able to handle random packet losses better than the multiplicative decrease mechnanism used by TCP. Since the extended transport protocol 165 reduces the congestion window in proportion to the number of packet losses, the impact of random losses on congestion control is decreased.
[070] A person of ordinary skill in the art should also recognize that the above adjustment of the congestion window can result in a scenario where the updated congestion window allows for a large number of packet transmissions at the exit of the loss recovery state. In some embodiments of the extended transport protocol 165, the receiver network device 150 spreads these packet transmissions over future acknowledgments by limiting the number of new packet transmissions to two for every receipt of a new acknowledgment.
[071] A person of ordinary skill in the art should appreciate the differences between the congestion algorithm of FIG. 10 and that used by conventional transport protocols, such as TCP. TCP uses a linear increase strategy for rate probing: if the available capacity is C units, and the current data rate of a TCP connection is C-X units, then TCP will take approximately X round-trip times to reach the ideal operating point for the connection data rate. Thus, TCP is slow in reacting to both the availability of new resources on the network 130, and to lower bitrate operations that resulted from previous reductions in the congestion window. When the round-trip time is large, TCP takes a long time to reach the ideal operating point. Short-lived connections such as SSL transactions can finish data transfer completely before reaching the ideal operating point. Further due to the multiplexing of multiple end-to- end connections into already established extended transport protocol connections, the network device eliminates the start-up probing delay for these end-to-end connections. This is possible because of sharing of network information among end- to-end connections through the extended transport protocol connection through which they are multiplexed. This start-up delay reduction significantly improves the performance of transactional applications which have short lifetimes.
[072] Furthermore, TCP has a tendency to induce losses even during routine congestion control operations, because the TCP congestion control process has only two phases; an increase phase and a decrease phase. Even without external congestion in the network 130, TCP continues to increase the connection data rate until congestion is induced in the network 130 and a loss occurs, whereupon the decrease phase kicks in and the rate is halved for a repetition of the congestion control cycle. This unnecessary cycle that involves forced decreases and slow increases further limits the performance of TCP connections.
[073] The extended transport protocol 165 also features a loss detection mechanism which is more suitable for high-speed networks than conventional transport protocols. Instead of using high overhead timeouts to detect loss, the extended transport protocol 165 uses passive learning techniques based on the number of packets sent, number of packets received, and sequence numbers of packets sent at appropriate milestone events during loss detection. More specifically, the sender network device 150 uses a monotonically increasing sequence number called CONG_SEQ_NUM on all the packets it transmits. The receiver network device 150 reflects the CONG_SEQ_NUM on the received packets on the acknowledgements as the ACK_CONG_SEQ. When the ACK_CONG_SEQ is greater then the CONG_SEQ_NUM on a corresponding retransmitted packet, the sender network device 150 concludes that the retransmitted packet is lost and takes appropriate action to recover from that loss. Without this mechanism, the only way to determine whether a retransmitted packet is lost is using a timeout mechanism which is an inefficient use of precious network bandwidth.
[074] The loss reporting mechanism used by the extended transport protocol 165 allows faster reporting than conventional techniques by accommodating a greater number of lost blocks, and incorporating a multi-level selective acknowledgment (SACK) mechanism. Unlike the single-tiered SACK mechanism used by conventional TCP, the extended transport protocol 165 uses multiple levels of SACK to convey losses to the sender network device 150. Each SACK block has both the start and end of the lost block of packets as well as the transmission cycle number of the loss recovery phase. The transmission cycle number is identified by the number of retransmissions of the packets in the SACK block. The sender network device 150 gives priority to the minimum transmission cycle number with respect to the retransmission process.
[075] The network device 150 also uses coarse timeouts to handle cases where the network 130 is down for a long duration when no packets reach the receiver. Every time a new data packet is acknowledged by the receiver (indicated by an acknowledgment), the timer is reset. When the timer expires, it indicates that the head-of-line packet in the send buffer was not successfully delivered and hence should be retransmitted. These coarse timeouts are able to handle temporary network outages, while the CONG_SEQ_NUM-based loss detection and recovery mechanism described above works only when there are packets reaching the receiver and thus triggering acknowledgements to the sender.
[076] Yet another feature of the extended transport protocol 165 increases reliability by using sequence numbers differently than conventional transport protocols. The receiver network device 150 uses a NXT_SEQ_NUM field in the acknowledgement to communicate to the sender network device 150 the status of the receive buffer at the receiver network device 150. The NXT_SEQ_NUM is the sequence number of the head-of-line packet in the receiver's out-of-order buffer. The sender uses the NXT_SEQ_NUM value to determine whether the received acknowledgement is a "true partial acknowledgment" or a "false partial acknowledgment". A true partial acknowledgment acknowledges the receipt of all packets less than the NXT_SEQ_NUM, though not all the packets outstanding at the time of loss. A false partial acknowledgement does not acknowledge the receipt of all packets less than the NXT_SEQ_NUM, though it acknowledges the next in-sequence packet expected by the receiver. By using the NXT_SEQ_NUM field to differentiate between true and false partial acknowledgments, the sender network device 150 increases the utilization of the network 130 even during loss recovery.
[077] Yet another difference between the extended transport protocol 165 and conventional transport protocols, such as TCP, is that some embodiments of the extended transport protocol 165 have no limit on the advertised (sliding) window size or the congestion window size. Other embodiments of the extended transport protocol 165 do have a limit. Some of these embodiments have limits that are much larger than the limits used by conventional protocols.
[078] FIG. 11 is a hardware block diagram of a network device 150 in accordance with the system and method for improving performance of transport protocols. The network device 150 contains a number of components that are well known in the art of data communications, including a processor 1110, a local network interface 1120, a remote local interface 1130, memory 1140, and non-volatile storage 1150. Examples of non-volatile storage include, for example, a hard disk, flash RAM, flash ROM, EEPROM, etc. These components are coupled via bus 1160. Memory 1140 contains logic for improving performance of transport protocols 160 from FIG. 1. [079] The network device 150 is shown with two network interfaces. The local network interface 1120 is in communication with endpoint 110, and the remote local interface 1130 is in communication with router 140. A person of ordinary skill in the art should understand that the networks interfaces may be of different types, support different medias and speeds, etc. Omitted from FIG. 11 are a number of conventional components, known to those skilled in the art, that are not necessary to explain the operation of the network device 150.
[080] Any process descriptions or blocks in flowcharts should be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps in the process. As would be understood by those of ordinary skill in the art of the software development, alternate implementations are also included within the scope of the disclosure. In these alternate implementations, functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved.
[081] The systems and methods disclosed herein can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device. Such instruction execution systems include any computer-based system, processor-containing system, or other system that can fetch and execute the instructions from the instruction execution system. In the context of this disclosure, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by, or in connection with, the instruction execution system. The computer readable medium can be, for example but not limited to, a system or propagation medium that is based on electronic, magnetic, optical, electromagnetic, infrared, or semiconductor technology.
[082] Specific examples of a computer-readable medium using electronic technology would include (but are not limited to) the following: an electrical connection (electronic) having one or more wires; a random access memory (RAM); a read-only memory (ROM); an erasable programmable read-only memory (EPROM or Flash memory). A specific example using magnetic technology includes (but is not limited to) a portable computer diskette. Specific examples using optical technology include (but are not limited to) an optical fiber and a portable compact disk read-only memory (CD-ROM).
[083] The foregoing description has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the disclosure to the precise forms disclosed. Obvious modifications or variations are possible in light of the above teachings. The implementations discussed, however, were chosen and described to illustrate the principles of the disclosure and its practical application to thereby enable one of ordinary skill in the art to utilize the disclosure in various implementations and with various modifications as are suited to the particular use contemplated. All such modifications and variation are within the scope of the disclosure as determined by the appended claims when interpreted in accordance with the breadth to which they are fairly and legally entitled.

Claims

CLAIMSWhat I claim is:
1. A method of controlling congestion in a network between a first device and a peer second device, the method comprising the steps of: in a first state, non-linearly increasing a congestion window; in response to the congestion window exceeding a threshold value while in the first state, transitioning to a second state; and in the second state, linearly increasing the congestion window.
2. The method of claim 1 , further comprising the steps of: transitioning to a third state upon receiving a duplicate acknowledgment indicating loss of a number of packets; and in the third state, decreasing the congestion window in proportion to the number of packets lost.
3. The method of claim 1 , further comprising the steps of: transmitting a first series of packets, each including an increasing sequence number; receiving a second series of packets, each including an acknowledged sequence number; and if one of the acknowledged sequence numbers is greater than the increasing sequence number of a corresponding one of the first series of packets, indicating loss of a packet.
4. The method of claim 1 , further comprising the steps of transmitting a selective acknowledgment containing a start sequence number, an end sequence number and a transmission cycle number.
5. The method of claim 1 , further comprising the steps of: detecting a loss of packets; upon detecting the loss of packets, recording a number of unacknowledged packets at the time of loss detection; receiving an acknowledgment containing a sequence number of the next packet in an out-of-order buffer of a peer receiver; and determining whether the received sequence number indicates acknowledgment of all packets that are unacknowledged at the time of loss detection.
PCT/US2007/061798 2006-02-07 2007-02-07 Systems and methods of improving performance of transport protocols WO2007092901A2 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
MX2008010122A MX2008010122A (en) 2006-02-07 2007-02-07 Systems and methods of improving performance of transport protocols.
JP2008554489A JP2009526494A (en) 2006-02-07 2007-02-07 System and method for improving transport protocol performance
EP07763595A EP1987365A4 (en) 2006-02-07 2007-02-07 Systems and methods of improving performance of transport protocols
CA002642510A CA2642510A1 (en) 2006-02-07 2007-02-07 Systems and methods of improving performance of transport protocols
AU2007212001A AU2007212001A1 (en) 2006-02-07 2007-02-07 Systems and methods of improving performance of transport protocols
IL193323A IL193323A0 (en) 2006-02-07 2008-08-07 Systems and methods of improving performance of transport protocols

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US76578706P 2006-02-07 2006-02-07
US60/765,787 2006-02-07
US11/672,390 2007-02-07
US11/672,390 US7839783B2 (en) 2006-02-07 2007-02-07 Systems and methods of improving performance of transport protocols

Publications (2)

Publication Number Publication Date
WO2007092901A2 true WO2007092901A2 (en) 2007-08-16
WO2007092901A3 WO2007092901A3 (en) 2007-12-21

Family

ID=38345945

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/061798 WO2007092901A2 (en) 2006-02-07 2007-02-07 Systems and methods of improving performance of transport protocols

Country Status (9)

Country Link
US (2) US7839783B2 (en)
EP (1) EP1987365A4 (en)
JP (1) JP2009526494A (en)
KR (1) KR20090014334A (en)
AU (1) AU2007212001A1 (en)
CA (1) CA2642510A1 (en)
IL (1) IL193323A0 (en)
MX (1) MX2008010122A (en)
WO (1) WO2007092901A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013125096A1 (en) 2012-02-24 2013-08-29 株式会社日立製作所 Communication device

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001253613A1 (en) 2000-04-17 2001-10-30 Circadence Corporation System and method for shifting functionality between multiple web servers
US8898340B2 (en) 2000-04-17 2014-11-25 Circadence Corporation Dynamic network link acceleration for network including wireless communication devices
US20110128972A1 (en) 2000-04-17 2011-06-02 Randy Thornton Peer to peer dynamic network link acceleration
US8065399B2 (en) 2000-04-17 2011-11-22 Circadence Corporation Automated network infrastructure test and diagnostic system and method therefor
US8024481B2 (en) 2000-04-17 2011-09-20 Circadence Corporation System and method for reducing traffic and congestion on distributed interactive simulation networks
US8195823B2 (en) 2000-04-17 2012-06-05 Circadence Corporation Dynamic network link acceleration
US8510468B2 (en) 2000-04-17 2013-08-13 Ciradence Corporation Route aware network link acceleration
US8996705B2 (en) 2000-04-17 2015-03-31 Circadence Corporation Optimization of enhanced network links
IES20050376A2 (en) * 2005-06-03 2006-08-09 Asavie R & D Ltd Secure network communication system and method
US8427951B2 (en) * 2007-08-30 2013-04-23 International Business Machines Corporation Method, system, and apparatus for reliable data packet recovery in a link layer of a data center ethernet network
EP2245537B1 (en) * 2008-01-17 2018-02-21 Qualcomm Incorporated Network message management device and methods thereof
US8015313B2 (en) * 2008-03-04 2011-09-06 Sony Corporation Method and apparatus for managing transmission of TCP data segments
US7920569B1 (en) * 2008-05-05 2011-04-05 Juniper Networks, Inc. Multi-link transport protocol translation
CN102171664B (en) * 2008-08-06 2014-12-03 莫维克网络公司 Content caching in the radio access network (RAN)
WO2010075426A1 (en) * 2008-12-23 2010-07-01 Movik Networks Transparent interaction with multi-layer protocols via selective bridging and proxying
US9043467B2 (en) * 2009-01-30 2015-05-26 Movik Networks Adaptive chunked and content-aware pacing of multi-media delivery over HTTP transport and network controlled bit rate selection
US8717890B2 (en) * 2009-01-30 2014-05-06 Movik Networks Application, usage and radio link aware transport network scheduler
US8553547B2 (en) * 2009-03-30 2013-10-08 Broadcom Corporation Systems and methods for retransmitting packets over a network of communication channels
US8159939B1 (en) * 2009-05-08 2012-04-17 Adobe Systems Incorporated Dynamic network congestion control
KR101568288B1 (en) * 2009-09-21 2015-11-12 삼성전자주식회사 Apparatus and method for receiving peer-to-peer data
US8799480B2 (en) 2010-07-19 2014-08-05 Movik Networks Content pre-fetching and CDN assist methods in a wireless mobile network
US8452888B2 (en) * 2010-07-22 2013-05-28 International Business Machines Corporation Flow control for reliable message passing
US8565076B2 (en) 2010-09-24 2013-10-22 Movik Networks Destination learning and mobility detection in transit network device in LTE and UMTS radio access networks
JP5625748B2 (en) * 2010-10-28 2014-11-19 ソニー株式会社 COMMUNICATION DEVICE, COMMUNICATION SYSTEM, PROGRAM, AND COMMUNICATION METHOD
SG189825A1 (en) * 2010-11-16 2013-06-28 Hitachi Ltd Communication device and communication system
US9591069B2 (en) 2011-10-31 2017-03-07 Adobe Systems Incorporated Peer-to-peer assist for live media streaming
US20140025823A1 (en) * 2012-02-20 2014-01-23 F5 Networks, Inc. Methods for managing contended resource utilization in a multiprocessor architecture and devices thereof
JP6051832B2 (en) * 2012-12-17 2016-12-27 富士通株式会社 COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION PROGRAM
US9432458B2 (en) * 2013-01-09 2016-08-30 Dell Products, Lp System and method for enhancing server media throughput in mismatched networks
US10178431B2 (en) 2014-07-28 2019-01-08 Adobe Inc. Hybrid stream delivery
CN104243342A (en) * 2014-09-19 2014-12-24 深圳市优视技术有限公司 Data transmission control method and system
US10491525B2 (en) * 2015-03-10 2019-11-26 Huawei Technologies Co., Ltd. Traffic engineering feeder for packet switched networks
US10834065B1 (en) 2015-03-31 2020-11-10 F5 Networks, Inc. Methods for SSL protected NTLM re-authentication and devices thereof
JP2016208315A (en) * 2015-04-23 2016-12-08 富士通株式会社 Communication device, communication processing method, and communication program
US10516892B2 (en) * 2015-09-28 2019-12-24 Cybrook Inc. Initial bandwidth estimation for real-time video transmission
CN106788911A (en) * 2015-11-25 2017-05-31 华为技术有限公司 A kind of method and apparatus of message retransmission
US10404698B1 (en) 2016-01-15 2019-09-03 F5 Networks, Inc. Methods for adaptive organization of web application access points in webtops and devices thereof
CN105915469A (en) * 2016-06-30 2016-08-31 广东睿江云计算股份有限公司 Data processing method and device based on cloud host system of QOS
US11057501B2 (en) * 2018-12-31 2021-07-06 Fortinet, Inc. Increasing throughput density of TCP traffic on a hybrid data network having both wired and wireless connections by modifying TCP layer behavior over the wireless connection while maintaining TCP protocol
US10999206B2 (en) * 2019-06-27 2021-05-04 Google Llc Congestion control for low latency datacenter networks
US11050587B1 (en) 2020-02-04 2021-06-29 360 It, Uab Multi-part TCP connection over VPN
US11394582B2 (en) 2020-02-04 2022-07-19 360 It, Uab Multi-part TCP connection over VPN
CN114615235A (en) 2020-12-04 2022-06-10 伊姆西Ip控股有限责任公司 Method, device and computer program product for managing addresses of devices in a network
US11743193B2 (en) 2021-11-01 2023-08-29 Seagate Technology Llc Sliding window protocol for communication among more than two participants

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6252851B1 (en) * 1997-03-27 2001-06-26 Massachusetts Institute Of Technology Method for regulating TCP flow over heterogeneous networks
EP0948168A1 (en) * 1998-03-31 1999-10-06 TELEFONAKTIEBOLAGET L M ERICSSON (publ) Method and device for data flow control
US7130268B2 (en) * 2000-10-17 2006-10-31 Saverio Mascolo End-to-end bandwidth estimation for congestion control in packet switching networks
US6744730B2 (en) * 2001-11-30 2004-06-01 Nokia Corporation Throughput enhancement after interruption
KR100526187B1 (en) * 2003-10-18 2005-11-03 삼성전자주식회사 Method of obtaining the optimum rate control in mobile ad hoc network circumstance
JP4005974B2 (en) * 2004-01-09 2007-11-14 株式会社東芝 COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION SYSTEM
US8416694B2 (en) * 2004-06-22 2013-04-09 Telefonaktiebolaget Lm Ericsson (Publ) Network feedback method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of EP1987365A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013125096A1 (en) 2012-02-24 2013-08-29 株式会社日立製作所 Communication device
US9231829B2 (en) 2012-02-24 2016-01-05 Hitachi, Ltd. Communication device

Also Published As

Publication number Publication date
JP2009526494A (en) 2009-07-16
EP1987365A2 (en) 2008-11-05
KR20090014334A (en) 2009-02-10
US7839783B2 (en) 2010-11-23
IL193323A0 (en) 2009-08-03
CA2642510A1 (en) 2007-08-16
MX2008010122A (en) 2009-01-07
AU2007212001A1 (en) 2007-08-16
US20110116380A1 (en) 2011-05-19
US8605590B2 (en) 2013-12-10
EP1987365A4 (en) 2012-12-05
WO2007092901A3 (en) 2007-12-21
US20070223379A1 (en) 2007-09-27

Similar Documents

Publication Publication Date Title
US7839783B2 (en) Systems and methods of improving performance of transport protocols
CN110661723B (en) Data transmission method, computing device, network device and data transmission system
US8576875B2 (en) Systems and methods of improving performance of transport protocols in a multi-path environment
EP2387837B1 (en) Maximizing bandwidth utilization in networks with high latencies and packet drops using transmission control protocol
US9008100B2 (en) Wavefront detection and disambiguation of acknowledgments
US8462630B2 (en) Early generation of acknowledgements for flow control
US8310928B2 (en) Flow control system architecture
WO2018210117A1 (en) Congestion control method, network device, and network interface controller thereof
US8072898B2 (en) Method for managing a transmission of data streams on a transport channel of a tunnel, corresponding tunnel end-point and computer-readable storage medium
EP1698087B1 (en) Transparent optimization for tcp flow control
WO2002049254A2 (en) A system and method for data transfer acceleration in a tcp network environment
KR20070011315A (en) Systems and methods for parallel communication
EP1652087B1 (en) Flow control architecture
Altahir et al. Performance evaluation of TCP congestion control mechanisms using NS-2
Molia et al. A conceptual exploration of TCP variants
KR20010045532A (en) Method of improving the retransmission algorithm of tcp

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 2008554489

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 193323

Country of ref document: IL

Ref document number: 2642510

Country of ref document: CA

Ref document number: MX/A/2008/010122

Country of ref document: MX

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2007763595

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2007212001

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 7560/DELNP/2008

Country of ref document: IN

Ref document number: 1020087021822

Country of ref document: KR

ENP Entry into the national phase

Ref document number: 2007212001

Country of ref document: AU

Date of ref document: 20070207

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 200780012050.X

Country of ref document: CN