diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc2309.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc2309.txt')
-rw-r--r-- | doc/rfc/rfc2309.txt | 955 |
1 files changed, 955 insertions, 0 deletions
diff --git a/doc/rfc/rfc2309.txt b/doc/rfc/rfc2309.txt new file mode 100644 index 0000000..2452da7 --- /dev/null +++ b/doc/rfc/rfc2309.txt @@ -0,0 +1,955 @@ + + + + + + +Network Working Group B. Braden, USC/ISI +Request for Comments: 2309 D. Clark, MIT LCS +Category: Informational J. Crowcroft, UCL + B. Davie, Cisco Systems + S. Deering, Cisco Systems + D. Estrin, USC + S. Floyd, LBNL + V. Jacobson, LBNL + G. Minshall, Fiberlane + C. Partridge, BBN + L. Peterson, University of Arizona + K. Ramakrishnan, ATT Labs Research + S. Shenker, Xerox PARC + J. Wroclawski, MIT LCS + L. Zhang, UCLA + April 1998 + + + + Recommendations on Queue Management and Congestion Avoidance + in the Internet + + + +Status of Memo + + This memo provides information for the Internet community. It + does not specify an Internet standard of any kind. Distribution + of this memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (1998). All Rights Reserved. + +Abstract + + This memo presents two recommendations to the Internet community + concerning measures to improve and preserve Internet performance. + It presents a strong recommendation for testing, standardization, + and widespread deployment of active queue management in routers, + to improve the performance of today's Internet. It also urges a + concerted effort of research, measurement, and ultimate deployment + of router mechanisms to protect the Internet from flows that are + not sufficiently responsive to congestion notification. + + + + + + + +Braden, et. al. Informational [Page 1] + +RFC 2309 Internet Performance Recommendations April 1998 + + +1. INTRODUCTION + + The Internet protocol architecture is based on a connectionless end- + to-end packet service using the IP protocol. The advantages of its + connectionless design, flexibility and robustness, have been amply + demonstrated. However, these advantages are not without cost: + careful design is required to provide good service under heavy load. + In fact, lack of attention to the dynamics of packet forwarding can + result in severe service degradation or "Internet meltdown". This + phenomenon was first observed during the early growth phase of the + Internet of the mid 1980s [Nagle84], and is technically called + "congestion collapse". + + The original fix for Internet meltdown was provided by Van Jacobson. + Beginning in 1986, Jacobson developed the congestion avoidance + mechanisms that are now required in TCP implementations [Jacobson88, + HostReq89]. These mechanisms operate in the hosts to cause TCP + connections to "back off" during congestion. We say that TCP flows + are "responsive" to congestion signals (i.e., dropped packets) from + the network. It is primarily these TCP congestion avoidance + algorithms that prevent the congestion collapse of today's Internet. + + However, that is not the end of the story. Considerable research has + been done on Internet dynamics since 1988, and the Internet has + grown. It has become clear that the TCP congestion avoidance + mechanisms [RFC2001], while necessary and powerful, are not + sufficient to provide good service in all circumstances. Basically, + there is a limit to how much control can be accomplished from the + edges of the network. Some mechanisms are needed in the routers to + complement the endpoint congestion avoidance mechanisms. + + It is useful to distinguish between two classes of router algorithms + related to congestion control: "queue management" versus "scheduling" + algorithms. To a rough approximation, queue management algorithms + manage the length of packet queues by dropping packets when necessary + or appropriate, while scheduling algorithms determine which packet to + send next and are used primarily to manage the allocation of + bandwidth among flows. While these two router mechanisms are closely + related, they address rather different performance issues. + + This memo highlights two router performance issues. The first issue + is the need for an advanced form of router queue management that we + call "active queue management." Section 2 summarizes the benefits + that active queue management can bring. Section 3 describes a + recommended active queue management mechanism, called Random Early + Detection or "RED". We expect that the RED algorithm can be used + with a wide variety of scheduling algorithms, can be implemented + relatively efficiently, and will provide significant Internet + + + +Braden, et. al. Informational [Page 2] + +RFC 2309 Internet Performance Recommendations April 1998 + + + performance improvement. + + The second issue, discussed in Section 4 of this memo, is the + potential for future congestion collapse of the Internet due to flows + that are unresponsive, or not sufficiently responsive, to congestion + indications. Unfortunately, there is no consensus solution to + controlling congestion caused by such aggressive flows; significant + research and engineering will be required before any solution will be + available. It is imperative that this work be energetically pursued, + to ensure the future stability of the Internet. + + Section 5 concludes the memo with a set of recommendations to the + IETF concerning these topics. + + The discussion in this memo applies to "best-effort" traffic. The + Internet integrated services architecture, which provides a mechanism + for protecting individual flows from congestion, introduces its own + queue management and scheduling algorithms [Shenker96, Wroclawski96]. + Similarly, the discussion of queue management and congestion control + requirements for differential services is a separate issue. However, + we do not expect the deployment of integrated services and + differential services to significantly diminish the importance of the + best-effort traffic issues discussed in this memo. + + Preparation of this memo resulted from past discussions of end-to-end + performance, Internet congestion, and RED in the End-to-End Research + Group of the Internet Research Task Force (IRTF). + +2. THE NEED FOR ACTIVE QUEUE MANAGEMENT + + The traditional technique for managing router queue lengths is to set + a maximum length (in terms of packets) for each queue, accept packets + for the queue until the maximum length is reached, then reject (drop) + subsequent incoming packets until the queue decreases because a + packet from the queue has been transmitted. This technique is known + as "tail drop", since the packet that arrived most recently (i.e., + the one on the tail of the queue) is dropped when the queue is full. + This method has served the Internet well for years, but it has two + important drawbacks. + + 1. Lock-Out + + In some situations tail drop allows a single connection or a few + flows to monopolize queue space, preventing other connections + from getting room in the queue. This "lock-out" phenomenon is + often the result of synchronization or other timing effects. + + + + + +Braden, et. al. Informational [Page 3] + +RFC 2309 Internet Performance Recommendations April 1998 + + + 2. Full Queues + + The tail drop discipline allows queues to maintain a full (or, + almost full) status for long periods of time, since tail drop + signals congestion (via a packet drop) only when the queue has + become full. It is important to reduce the steady-state queue + size, and this is perhaps queue management's most important + goal. + + The naive assumption might be that there is a simple tradeoff + between delay and throughput, and that the recommendation that + queues be maintained in a "non-full" state essentially + translates to a recommendation that low end-to-end delay is more + important than high throughput. However, this does not take + into account the critical role that packet bursts play in + Internet performance. Even though TCP constrains a flow's + window size, packets often arrive at routers in bursts + [Leland94]. If the queue is full or almost full, an arriving + burst will cause multiple packets to be dropped. This can + result in a global synchronization of flows throttling back, + followed by a sustained period of lowered link utilization, + reducing overall throughput. + + The point of buffering in the network is to absorb data bursts + and to transmit them during the (hopefully) ensuing bursts of + silence. This is essential to permit the transmission of bursty + data. It should be clear why we would like to have normally- + small queues in routers: we want to have queue capacity to + absorb the bursts. The counter-intuitive result is that + maintaining normally-small queues can result in higher + throughput as well as lower end-to-end delay. In short, queue + limits should not reflect the steady state queues we want + maintained in the network; instead, they should reflect the size + of bursts we need to absorb. + + Besides tail drop, two alternative queue disciplines that can be + applied when the queue becomes full are "random drop on full" or + "drop front on full". Under the random drop on full discipline, a + router drops a randomly selected packet from the queue (which can be + an expensive operation, since it naively requires an O(N) walk + through the packet queue) when the queue is full and a new packet + arrives. Under the "drop front on full" discipline [Lakshman96], the + router drops the packet at the front of the queue when the queue is + full and a new packet arrives. Both of these solve the lock-out + problem, but neither solves the full-queues problem described above. + + + + + + +Braden, et. al. Informational [Page 4] + +RFC 2309 Internet Performance Recommendations April 1998 + + + We know in general how to solve the full-queues problem for + "responsive" flows, i.e., those flows that throttle back in response + to congestion notification. In the current Internet, dropped packets + serve as a critical mechanism of congestion notification to end + nodes. The solution to the full-queues problem is for routers to + drop packets before a queue becomes full, so that end nodes can + respond to congestion before buffers overflow. We call such a + proactive approach "active queue management". By dropping packets + before buffers overflow, active queue management allows routers to + control when and how many packets to drop. The next section + introduces RED, an active queue management mechanism that solves both + problems listed above (given responsive flows). + + In summary, an active queue management mechanism can provide the + following advantages for responsive flows. + + 1. Reduce number of packets dropped in routers + + Packet bursts are an unavoidable aspect of packet networks + [Willinger95]. If all the queue space in a router is already + committed to "steady state" traffic or if the buffer space is + inadequate, then the router will have no ability to buffer + bursts. By keeping the average queue size small, active queue + management will provide greater capacity to absorb naturally- + occurring bursts without dropping packets. + + Furthermore, without active queue management, more packets will + be dropped when a queue does overflow. This is undesirable for + several reasons. First, with a shared queue and the tail drop + discipline, an unnecessary global synchronization of flows + cutting back can result in lowered average link utilization, and + hence lowered network throughput. Second, TCP recovers with + more difficulty from a burst of packet drops than from a single + packet drop. Third, unnecessary packet drops represent a + possible waste of bandwidth on the way to the drop point. + + We note that while RED can manage queue lengths and reduce end- + to-end latency even in the absence of end-to-end congestion + control, RED will be able to reduce packet dropping only in an + environment that continues to be dominated by end-to-end + congestion control. + + 2. Provide lower-delay interactive service + + By keeping the average queue size small, queue management will + reduce the delays seen by flows. This is particularly important + for interactive applications such as short Web transfers, Telnet + traffic, or interactive audio-video sessions, whose subjective + + + +Braden, et. al. Informational [Page 5] + +RFC 2309 Internet Performance Recommendations April 1998 + + + (and objective) performance is better when the end-to-end delay + is low. + + 3. Avoid lock-out behavior + + Active queue management can prevent lock-out behavior by + ensuring that there will almost always be a buffer available for + an incoming packet. For the same reason, active queue + management can prevent a router bias against low bandwidth but + highly bursty flows. + + It is clear that lock-out is undesirable because it constitutes + a gross unfairness among groups of flows. However, we stop + short of calling this benefit "increased fairness", because + general fairness among flows requires per-flow state, which is + not provided by queue management. For example, in a router + using queue management but only FIFO scheduling, two TCP flows + may receive very different bandwidths simply because they have + different round-trip times [Floyd91], and a flow that does not + use congestion control may receive more bandwidth than a flow + that does. Per-flow state to achieve general fairness might be + maintained by a per-flow scheduling algorithm such as Fair + Queueing (FQ) [Demers90], or a class-based scheduling algorithm + such as CBQ [Floyd95], for example. + + On the other hand, active queue management is needed even for + routers that use per-flow scheduling algorithms such as FQ or + class-based scheduling algorithms such as CBQ. This is because + per-flow scheduling algorithms by themselves do nothing to + control the overall queue size or the size of individual queues. + Active queue management is needed to control the overall average + queue sizes, so that arriving bursts can be accommodated without + dropping packets. In addition, active queue management should + be used to control the queue size for each individual flow or + class, so that they do not experience unnecessarily high delays. + Therefore, active queue management should be applied across the + classes or flows as well as within each class or flow. + + In short, scheduling algorithms and queue management should be + seen as complementary, not as replacements for each other. In + particular, there have been implementations of queue management + added to FQ, and work is in progress to add RED queue management + to CBQ. + + + + + + + + +Braden, et. al. Informational [Page 6] + +RFC 2309 Internet Performance Recommendations April 1998 + + +3. THE QUEUE MANAGEMENT ALGORITHM "RED" + + Random Early Detection, or RED, is an active queue management + algorithm for routers that will provide the Internet performance + advantages cited in the previous section [RED93]. In contrast to + traditional queue management algorithms, which drop packets only when + the buffer is full, the RED algorithm drops arriving packets + probabilistically. The probability of drop increases as the + estimated average queue size grows. Note that RED responds to a + time-averaged queue length, not an instantaneous one. Thus, if the + queue has been mostly empty in the "recent past", RED won't tend to + drop packets (unless the queue overflows, of course!). On the other + hand, if the queue has recently been relatively full, indicating + persistent congestion, newly arriving packets are more likely to be + dropped. + + The RED algorithm itself consists of two main parts: estimation of + the average queue size and the decision of whether or not to drop an + incoming packet. + + + (a) Estimation of Average Queue Size + + RED estimates the average queue size, either in the forwarding + path using a simple exponentially weighted moving average (such + as presented in Appendix A of [Jacobson88]), or in the + background (i.e., not in the forwarding path) using a similar + mechanism. + + Note: The queue size can be measured either in units of + packets or of bytes. This issue is discussed briefly in + [RED93] in the "Future Work" section. + + Note: when the average queue size is computed in the + forwarding path, there is a special case when a packet + arrives and the queue is empty. In this case, the + computation of the average queue size must take into account + how much time has passed since the queue went empty. This is + discussed further in [RED93]. + + + (b) Packet Drop Decision + + In the second portion of the algorithm, RED decides whether or + not to drop an incoming packet. It is RED's particular + algorithm for dropping that results in performance improvement + for responsive flows. Two RED parameters, minth (minimum + threshold) and maxth (maximum threshold), figure prominently in + + + +Braden, et. al. Informational [Page 7] + +RFC 2309 Internet Performance Recommendations April 1998 + + + this decision process. Minth specifies the average queue size + *below which* no packets will be dropped, while maxth specifies + the average queue size *above which* all packets will be + dropped. As the average queue size varies from minth to maxth, + packets will be dropped with a probability that varies linearly + from 0 to maxp. + + Note: a simplistic method of implementing this would be to + calculate a new random number at each packet arrival, then + compare that number with the above probability which varies + from 0 to maxp. A more efficient implementation, described + in [RED93], computes a random number *once* for each dropped + packet. + + Note: the decision whether or not to drop an incoming packet + can be made in "packet mode", ignoring packet sizes, or in + "byte mode", taking into account the size of the incoming + packet. The performance implications of the choice between + packet mode or byte mode is discussed further in [Floyd97]. + + RED effectively controls the average queue size while still + accommodating bursts of packets without loss. RED's use of + randomness breaks up synchronized processes that lead to lock-out + phenomena. + + There have been several implementations of RED in routers, and papers + have been published reporting on experience with these + implementations ([Villamizar94], [Gaynor96]). Additional reports of + implementation experience would be welcome, and will be posted on the + RED web page [REDWWW]. + + All available empirical evidence shows that the deployment of active + queue management mechanisms in the Internet would have substantial + performance benefits. There are seemingly no disadvantages to using + the RED algorithm, and numerous advantages. Consequently, we believe + that the RED active queue management algorithm should be widely + deployed. + + We should note that there are some extreme scenarios for which RED + will not be a cure, although it won't hurt and may still help. An + example of such a scenario would be a very large number of flows, + each so tiny that its fair share would be less than a single packet + per RTT. + + + + + + + + +Braden, et. al. Informational [Page 8] + +RFC 2309 Internet Performance Recommendations April 1998 + + +4. MANAGING AGGRESSIVE FLOWS + + One of the keys to the success of the Internet has been the + congestion avoidance mechanisms of TCP. Because TCP "backs off" + during congestion, a large number of TCP connections can share a + single, congested link in such a way that bandwidth is shared + reasonably equitably among similarly situated flows. The equitable + sharing of bandwidth among flows depends on the fact that all flows + are running basically the same congestion avoidance algorithms, + conformant with the current TCP specification [HostReq89]. + + We introduce the term "TCP-compatible" for a flow that behaves under + congestion like a flow produced by a conformant TCP. A TCP- + compatible flow is responsive to congestion notification, and in + steady-state it uses no more bandwidth than a conformant TCP running + under comparable conditions (drop rate, RTT, MTU, etc.) + + It is convenient to divide flows into three classes: (1) TCP- + compatible flows, (2) unresponsive flows, i.e., flows that do not + slow down when congestion occurs, and (3) flows that are responsive + but are not TCP-compatible. The last two classes contain more + aggressive flows that pose significant threats to Internet + performance, as we will now discuss. + + o Non-Responsive Flows + + There is a growing set of UDP-based applications whose + congestion avoidance algorithms are inadequate or nonexistent + (i.e, the flow does not throttle back upon receipt of congestion + notification). Such UDP applications include streaming + applications like packet voice and video, and also multicast + bulk data transport [SRM96]. If no action is taken, such + unresponsive flows could lead to a new congestion collapse. + + In general, all UDP-based streaming applications should + incorporate effective congestion avoidance mechanisms. For + example, recent research has shown the possibility of + incorporating congestion avoidance mechanisms such as Receiver- + driven Layered Multicast (RLM) within UDP-based streaming + applications such as packet video [McCanne96; Bolot94]. Further + research and development on ways to accomplish congestion + avoidance for streaming applications will be very important. + + However, it will also be important for the network to be able to + protect itself against unresponsive flows, and mechanisms to + accomplish this must be developed and deployed. Deployment of + such mechanisms would provide incentive for every streaming + application to become responsive by incorporating its own + + + +Braden, et. al. Informational [Page 9] + +RFC 2309 Internet Performance Recommendations April 1998 + + + congestion control. + + o Non-TCP-Compatible Transport Protocols + + The second threat is posed by transport protocol implementations + that are responsive to congestion notification but, either + deliberately or through faulty implementations, are not TCP- + compatible. Such applications can grab an unfair share of the + network bandwidth. + + For example, the popularity of the Internet has caused a + proliferation in the number of TCP implementations. Some of + these may fail to implement the TCP congestion avoidance + mechanisms correctly because of poor implementation. Others may + deliberately be implemented with congestion avoidance algorithms + that are more aggressive in their use of bandwidth than other + TCP implementations; this would allow a vendor to claim to have + a "faster TCP". The logical consequence of such implementations + would be a spiral of increasingly aggressive TCP + implementations, leading back to the point where there is + effectively no congestion avoidance and the Internet is + chronically congested. + + Note that there is a well-known way to achieve more aggressive + TCP performance without even changing TCP: open multiple + connections to the same place, as has been done in some Web + browsers. + + The projected increase in more aggressive flows of both these + classes, as a fraction of total Internet traffic, clearly poses a + threat to the future Internet. There is an urgent need for + measurements of current conditions and for further research into the + various ways of managing such flows. There are many difficult issues + in identifying and isolating unresponsive or non-TCP-compatible flows + at an acceptable router overhead cost. Finally, there is little + measurement or simulation evidence available about the rate at which + these threats are likely to be realized, or about the expected + benefit of router algorithms for managing such flows. + + There is an issue about the appropriate granularity of a "flow". + There are a few "natural" answers: 1) a TCP or UDP connection (source + address/port, destination address/port); 2) a source/destination host + pair; 3) a given source host or a given destination host. We would + guess that the source/destination host pair gives the most + appropriate granularity in many circumstances. However, it is + possible that different vendors/providers could set different + granularities for defining a flow (as a way of "distinguishing" + themselves from one another), or that different granularities could + + + +Braden, et. al. Informational [Page 10] + +RFC 2309 Internet Performance Recommendations April 1998 + + + be chosen for different places in the network. It may be the case + that the granularity is less important than the fact that we are + dealing with more unresponsive flows at *some* granularity. The + granularity of flows for congestion management is, at least in part, + a policy question that needs to be addressed in the wider IETF + community. + +5. CONCLUSIONS AND RECOMMENDATIONS + + This discussion leads us to make the following recommendations to the + IETF and to the Internet community as a whole. + + o RECOMMENDATION 1: + + Internet routers should implement some active queue management + mechanism to manage queue lengths, reduce end-to-end latency, + reduce packet dropping, and avoid lock-out phenomena within the + Internet. + + The default mechanism for managing queue lengths to meet these + goals in FIFO queues is Random Early Detection (RED) [RED93]. + Unless a developer has reasons to provide another equivalent + mechanism, we recommend that RED be used. + + o RECOMMENDATION 2: + + It is urgent to begin or continue research, engineering, and + measurement efforts contributing to the design of mechanisms to + deal with flows that are unresponsive to congestion notification + or are responsive but more aggressive than TCP. + + Although there has already been some limited deployment of RED in the + Internet, we may expect that widespread implementation and deployment + of RED in accordance with Recommendation 1 will expose a number of + engineering issues. For example, such issues may include: + implementation questions for Gigabit routers, the use of RED in layer + 2 switches, and the possible use of additional considerations, such + as priority, in deciding which packets to drop. + + We again emphasize that the widespread implementation and deployment + of RED would not, in and of itself, achieve the goals of + Recommendation 2. + + Widespread implementation and deployment of RED will also enable the + introduction of other new functionality into the Internet. One + example of an enabled functionality would be the addition of explicit + congestion notification [Ramakrishnan97] to the Internet + architecture, as a mechanism for congestion notification in addition + + + +Braden, et. al. Informational [Page 11] + +RFC 2309 Internet Performance Recommendations April 1998 + + + to packet drops. A second example of new functionality would be + implementation of queues with packets of different drop priorities; + packets would be transmitted in the order in which they arrived, but + during times of congestion packets of the lower drop priority would + be preferentially dropped. + +6. References + + [Bolot94] Bolot, J.-C., Turletti, T., and Wakeman, I., Scalable + Feedback Control for Multicast Video Distribution in the Internet, + ACM SIGCOMM '94, Sept. 1994. + + [Demers90] Demers, A., Keshav, S., and Shenker, S., Analysis and + Simulation of a Fair Queueing Algorithm, Internetworking: Research + and Experience, Vol. 1, 1990, pp. 3-26. + + [Floyd91] Floyd, S., Connections with Multiple Congested Gateways in + Packet-Switched Networks Part 1: One-way Traffic. Computer + Communications Review, Vol.21, No.5, October 1991, pp. 30-47. URL + http://ftp.ee.lbl.gov/floyd/. + + [Floyd95] Floyd, S., and Jacobson, V., Link-sharing and Resource + Management Models for Packet Networks. IEEE/ACM Transactions on + Networking, Vol. 3 No. 4, pp. 365-386, August 1995. + + [Floyd97] Floyd, S., RED: Discussions of Byte and Packet Modes, March + 1997 email, http://www-nrg.ee.lbl.gov/floyd/REDaveraging.txt. + + [Gaynor96] Gaynor, M., Proactive Packet Dropping Methods for TCP + Gateways, October 1996, URL http://www.eecs.harvard.edu/~gaynor/ + final.ps. + + [HostReq89] Braden, R., Ed., "Requirements for Internet Hosts -- + Communication Layers", STD 3, RFC 1122, October 1989. + + [Jacobson88] V. Jacobson, Congestion Avoidance and Control, ACM + SIGCOMM '88, August 1988. + + [Lakshman96] T. V. Lakshman, Arnie Neidhardt, Teunis Ott, The Drop + From Front Strategy in TCP Over ATM and Its Interworking with Other + Control Features, Infocom 96, MA28.1. + + [Leland94] W. Leland, M. Taqqu, W. Willinger, and D. Wilson, On the + Self-Similar Nature of Ethernet Traffic (Extended Version), IEEE/ACM + Transactions on Networking, 2(1), pp. 1-15, February 1994. + + + + + + +Braden, et. al. Informational [Page 12] + +RFC 2309 Internet Performance Recommendations April 1998 + + + [McCanne96] McCanne, S., Jacobson, V., and M. Vetterli, Receiver- + driven Layered Multicast, ACM SIGCOMM + + [Nagle84] Nagle, J., "Congestion Control in IP/TCP", RFC 896, January + 1984. + + [Ramakrishnan97] Ramakrishnan, K. K., and S. Floyd, "A Proposal to + add Explicit Congestion Notification (ECN) to IPv6 and to TCP", Work + in Progress. + + [RED93] Floyd, S., and Jacobson, V., Random Early Detection gateways + for Congestion Avoidance, IEEE/ACM Transactions on Networking, V.1 + N.4, August 1993, pp. 397-413. Also available from + http://ftp.ee.lbl.gov/floyd/red.html. + + [REDWWW] Floyd, S., The RED Web Page, 1997, URL + http://ftp.ee.lbl.gov/floyd/red.html. + + [RFC 2001] Stevens, W., "TCP Slow Start, Congestion Avoidance, Fast + Retransmit, and Fast Recovery Algorithms", RFC 2001, January 1997. + + [Shenker96] Shenker, S., Partridge, C., and R. Guerin, "Specification + of Guaranteed Quality of Service", Work in Progress. + + [SRM96] Floyd. S., Jacobson, V., McCanne, S., Liu, C., and L. Zhang, + A Reliable Multicast Framework for Light-weight Sessions and + Application Level Framing. ACM SIGCOMM '96, pp 342-355. + + [Villamizar94] Villamizar, C., and Song, C., High Performance TCP in + ANSNET. Computer Communications Review, V. 24 N. 5, October 1994, pp. + 45-60. URL http://ftp.ans.net/pub/papers/tcp-performance.ps. + + [Willinger95] W. Willinger, M. S. Taqqu, R. Sherman, D. V. Wilson, + Self-Similarity Through High-Variability: Statistical Analysis of + Ethernet LAN Traffic at the Source Level, ACM SIGCOMM '95, pp. 100- + 113, August 1995. + + [Wroclawski96] Wroclawski, J., "Specification of the Controlled-Load + Network Element Service", Work in Progress. + + + + + + + + + + + + +Braden, et. al. Informational [Page 13] + +RFC 2309 Internet Performance Recommendations April 1998 + + +Security Considerations + + While security is a very important issue, it is largely orthogonal to + the performance issues discussed in this memo. We note, however, + that denial-of-service attacks may create unresponsive traffic flows + that are indistinguishable from flows from normal high-bandwidth + isochronous applications, and the mechanism suggested in + Recommendation 2 will be equally applicable to such attacks. + +Authors' Addresses + + Bob Braden + USC Information Sciences Institute + 4676 Admiralty Way + Marina del Rey, CA 90292 + + Phone: 310-822-1511 + EMail: Braden@ISI.EDU + + David D. Clark + MIT Laboratory for Computer Science + 545 Technology Sq. + Cambridge, MA 02139 + + Phone: 617-253-6003 + EMail: DDC@lcs.mit.edu + + Jon Crowcroft + University College London + Department of Computer Science + Gower Street + London, WC1E 6BT + ENGLAND + + Phone: +44 171 380 7296 + EMail: Jon.Crowcroft@cs.ucl.ac.uk + + Bruce Davie + Cisco Systems, Inc. + 250 Apollo Drive + Chelmsford, MA 01824 + + Phone: + EMail: bdavie@cisco.com + + + + + + + +Braden, et. al. Informational [Page 14] + +RFC 2309 Internet Performance Recommendations April 1998 + + + Steve Deering + Cisco Systems, Inc. + 170 West Tasman Drive + San Jose, CA 95134-1706 + + Phone: 408-527-8213 + EMail: deering@cisco.com + + Deborah Estrin + USC Information Sciences Institute + 4676 Admiralty Way + Marina del Rey, CA 90292 + + Phone: 310-822-1511 + EMail: Estrin@usc.edu + + Sally Floyd + Lawrence Berkeley National Laboratory, + MS 50B-2239, + One Cyclotron Road, + Berkeley CA 94720 + + Phone: 510-486-7518 + EMail: Floyd@ee.lbl.gov + + Van Jacobson + Lawrence Berkeley National Laboratory, + MS 46A, + One Cyclotron Road, + Berkeley CA 94720 + + Phone: 510-486-7519 + EMail: Van@ee.lbl.gov + + Greg Minshall + Fiberlane Communications + 1399 Charleston Road + Mountain View, CA 94043 + + Phone: +1 650 237 3164 + EMail: Minshall@fiberlane.com + + + + + + + + + + +Braden, et. al. Informational [Page 15] + +RFC 2309 Internet Performance Recommendations April 1998 + + + Craig Partridge + BBN Technologies + 10 Moulton St. + Cambridge MA 02138 + + Phone: 510-558-8675 + EMail: craig@bbn.com + + Larry Peterson + Department of Computer Science + University of Arizona + Tucson, AZ 85721 + + Phone: 520-621-4231 + EMail: LLP@cs.arizona.edu + + K. K. Ramakrishnan + AT&T Labs. Research + Rm. A155 + 180 Park Avenue + Florham Park, N.J. 07932 + + Phone: 973-360-8766 + EMail: KKRama@research.att.com + + Scott Shenker + Xerox PARC + 3333 Coyote Hill Road + Palo Alto, CA 94304 + + Phone: 415-812-4840 + EMail: Shenker@parc.xerox.com + + John Wroclawski + MIT Laboratory for Computer Science + 545 Technology Sq. + Cambridge, MA 02139 + + Phone: 617-253-7885 + EMail: JTW@lcs.mit.edu + + Lixia Zhang + UCLA + 4531G Boelter Hall + Los Angeles, CA 90024 + + Phone: 310-825-2695 + EMail: Lixia@cs.ucla.edu + + + +Braden, et. al. Informational [Page 16] + +RFC 2309 Internet Performance Recommendations April 1998 + + +Full Copyright Statement + + Copyright (C) The Internet Society (1998). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + + + + + + + + + + + + + + + + + + + + + + + + +Braden, et. al. Informational [Page 17] + |