The present invention relates to communication data networks. More specifically, the present invention relates to systems and methods for increasing the throughput of data transmissions through a network as seen from the edge of the network.
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol suite. The TCP provides reliable, ordered delivery of a stream of bytes from one computer application to another computer application and provides the transport layer for many fundamental Internet applications such a web traffic, mail, and file transfer. TCP has been optimized for wired transmission. As such, packet loss is assumed to be the result of network congestion, and TCP has many mechanisms geared to deal with congestion that is triggered by packet loss. These mechanisms may be erroneously applied in a wireless networking scenario. Packet loss is more likely to have occurred due to some sporadic event such as interference or shading. If a computer application leveraging TCP for transport experiences packet loss in a wireless network, congestion control mechanisms actually lead to network underutilization.
In addition to the basic issues described above, some networks have additional challenges. Some networks may be bandwidth constrained, requiring minimization of bandwidth usage. Some networks, such as power-line, wireless or WIFI, are half-duplex such that each end uses the same frequency to transmit and receive. In this case, a handshake or other back-off/contention mechanism is required to ensure that each member of the half-duplex network can transmit without colliding with another end station. These collision avoidance mechanisms are generally optimized for larger packet sizes, which influence the setting of their retry and back-off timers. This is particularly problematic for TCP Acknowledgement (ACK) packets, which are sent often by a computer application as it is receiving data from another computer application. If such a constrained network is involved in the path of this data stream, the collision avoidance handshake is invoked often as data is acknowledged. Since the TCP ACKs are small, they violate the assumptions of the collision avoidance protocols leading to additional underutilization.
In accordance with one embodiment, a method of reducing the bandwidth usage of a network comprises intercepting traffic between a TCP server and a TCP client using TCP protocols that use client acknowledgements; identifying client acknowledgements from the TCP protocols; identifying the sequence number of a last received client acknowledgements from the intercepted traffic; identifying the sequence number of a last sent client acknowledgement from the intercepted traffic; calculating an unacknowledged byte value based on the difference between the last received client acknowledgement sequence number and the last sent client acknowledgement sequence number; comparing the calculated unacknowledged byte value with a predetermined threshold value, to determine whether the calculated unacknowledged byte value is at least as great as the predetermined threshold value; and transmitting the identified client acknowledgements into the network when the compared unacknowledged byte value is at least as great as the predetermined threshold value. In one implementation, the intercepting step is performed at an intercepting device located between a TCP server and at least one TCP client. The last sent client acknowledgement is preferably sent from at least one of the TCP clients.
In accordance with another embodiment, a system for reducing the bandwidth usage of a network, the method comprises a TCP server and a TCP client using TCP protocols that use client acknowledgements; and an intercepting network device located between the TCP server and the TCP client and adapted to receive the client acknowledgements flowing between the TCP server and the TCP client, and to transmit all the client acknowledgements into the network. In one implementation, the sequence numbers of a last received client acknowledgement and a last sent client acknowledgement sent from a client are identified at the intercepting network device, and an unacknowledged byte value based on the difference between the sequence numbers is compared to a predetermined threshold value. The client acknowledgements are preferably transmitted into the network from the intercepting device when the unacknowledged byte value is equal to or greater than the predetermined threshold value.
Embodiments of the present invention will now be described, by way of example only, with reference to the attached Figures, wherein:
Although the invention will be described in connection with certain preferred embodiments, it will be understood that the invention is not limited to those particular embodiments. On the contrary, the invention is intended to cover all alternatives, modifications, and equivalent arrangements as may be included within the spirit and scope of the invention as defined by the appended claims. The invention will be described in the context of a wireless network, but it will be understood that it applies to any bandwidth constrained networks or to half-duplex networks.
The Transmission Control Protocol (TCP) is one of the core Internet protocols providing reliable, ordered delivery of a stream of bytes from one computer application to another computer application.
The attributes of the network 20 are intentionally ambiguous. The only requirement is to ensure that TCP can work between the server 10 and the client 30. This means that the client 30 is able to determine the IP Address of the server 10, and the client 30 knows which TCP port on the server 10 is open for the client's application. Then, the network 20 needs to provide IP connectivity between the server 10 and the client 30.
In
TCP ACK messages are problematic in half-duplex wireless networks that require collision avoidance mechanisms to ensure reliable data transfer.
In this situation, an Intercepting Network Device (IND) can be added to the path book-ending the wireless LAN to improve network utilization. The system of
The decoder 630 receives encoded packets from the encoded interface 620 and produces standard packets for transmission to the client 30 by way of the native interface 600. The encoder 610, on the other hand, receives standard packets from the native interface 600 and produces encoded packets for transmission to the wireless client 50 by way of the encoded interface 620. The specific algorithms used by the encoder and decoder are optional and programmable. Several embodiments are described below.
In one implementation, the IND 60 and the IND 70 buffer ACKs from a TCP connection and summarize the information in a single ACK message for the connection. Since the ACK information in TCP messages is cumulative, the algorithm can be very simple.
To summarize the TCP ACKs for a connection, the encoders of the INDs (60 and 70) implement a state machine for each TCP connection. An embodiment of this state machine is illustrated in
When the ACK is summarized, the INDs (60 or 70) may have to deal with selective ACKs (or SACKs). This option is defined in RFC 2018 and allows the receiver to acknowledge discontinuous blocks of packets that were received correctly, in addition to the sequence number of the last contiguous byte received successively, as in the basic TCP acknowledgment. The acknowledgement can specify a number of SACK blocks, where each SACK block is conveyed by the starting and ending sequence numbers of a contiguous range that the receiver correctly received.
Note that the resulting encoded packet created by the IND 60 and the IND 70 is a standard TCP/IP packet. Therefore, no decoding of the packet is required, and the decoder function in the INDs (60 and 70) is NULL. Summarized TCP ACKs that arrive on the encoded interface of the IND 60 or the IND 70 can pass through unchanged. As well, no explicit signaling is required to create a connection between the INDs; they can proceed independently to improve network performance on the wireless LAN.
An implementation of this algorithm was used to measure the network utilization improvements leveraging a deployment similar to
As another embodiment, the timer 812 (
unAckedBytes=lastReceivedAck−prevSentAck,
wherein the lastReceivedAck refers to the sequence number of the last received ACK, and the prevSentAck refers to the sequence number of the last sent ACK.
Therefore, the query at step 1443 is based on the following algorithm: if unAckedBytes>=maxUnAckedBytes, go to send ACK state, otherwise go to PEND state, wherein maxUnAckedBytes refers to the maximum unAcked byte count threshold and is a function of the measured RTT and BDP.
The motivation for unacknowledged byte count is to optimize a TCP stack's sending rate. If there are too few summarizing ACKs out of the buffered ACKs, the sending rate of the TCP stack (that receives the ACKs) may be affected.
As another embodiment, summarizing ACKs can be delayed long enough that the cumulative ACK can be piggybacked with a data packet flowing in the reverse direction (all data packets carry the cumulative ACK number).
An alternate implementation of the INDs uses a method of aggregating the TCP ACK packets instead of summarizing them as described above.
Since functionality is required on the encoder of one end of the connection and the decoder of the other end of the connection, the IND 50 and the IND 60 must create an association with each other to provide the aggregation function. Signaling mechanisms as described in copending U.S. application Ser. No. 12/718,650, filed Mar. 5, 2010, and incorporated by reference herein, can be used to create this association. The only difference is the mechanism which is being signaled. Instead of signaling a session to improve network reliability, it is signaling a TCP ACK aggregation session.
A state machine as shown in
How subsequent ACKs are handled by the state machine in the ACK Pending State 1702 is illustrated in
Upon entering the Send ACK state 1702, the state machine needs to determine how to finalize the aggregated packet. As illustrated in
This is one implementation of the aggregation of TCP ACKs. A variation of this algorithm is to aggregate TCP ACKs from multiple clients instead of a single client. This scenario is illustrated in
Another variation allows for the combination of summarization of TCP ACKs with the aggregation of TCP ACKs for multiple TCP connections.
The methods described above improve the wireless LAN network utilization by influencing the behavior of the client and server by manipulating the flow control algorithm. An alternate method influences the congestion control mechanisms provided by TCP. One option is to break-up an ACK transmitted by the client 30 into several ACKs. This stimulates the congestion window on the server through its additive increase/multiplicative decrease algorithm to increase the congestion window. TCP implementations increase the congestion window by a fraction of the TCP maximum segment size for every ACK that is received. By increasing the number of ACKs, the congestion window opens faster, putting more TCP segments in flight.
This encoding algorithm can increase bandwidth utilization from the client 30 to the server 10. Several parameters are defined to control the bandwidth used by the encoding algorithm. The first parameter is the MAXIMUM ACKs; which defines the maximum number of ACKs that can be generated from a single ACK. The MINIMUM SEGMENT SIZE determines the minimum difference between the sequence number of sequential ACKs. For example, MAXIMUM ACKs can be defined as 3 and MINIMUM SEGMENT SIZE can be defined as 500. If a packet arrives where the sequence difference between the current ACK and the previous ACK seen by the encoder is 2100 bytes, the encoder will produce 3 TCP ACKs each with a sequential difference of 700 bytes each. This encoding is limited by the MAXIMUM ACK parameter. If a TCP ACK arrives with a sequential difference of 400 bytes, this ACK is transmitted unchanged since it is less than the MINIMUM SEGMENT SIZE. Another method to control bandwidth is to define a duty cycle for the algorithm. This means that the encoding algorithm is enabled and disabled for defined periods. One method is to define these periods in terms of time defining a total period and a duty factor in percent. The duty factor defines the percentage of the period in which the encoding algorithm is operating. Another option is to define the periods in terms of packets. The total period is defined as PACKET_PERIOD. Within the PACKET_PERIOD, ENCODE_LIMIT defines the number of packets which are encoded.
The basic algorithm required to implement this function is provided in
The method for sending ACK in step 2307 is represented as a procedure because how this is handled is optional. In a wired environment, packets can be just enqueued directly on an interface for transmission. The increase of bandwidth by the splitting of ACKs may be easily handled by the bandwidth provided by wired LANs. Any loss can be handled by the natural assumptions of TCP operation. No decoding is required in this mode of operation since the encoded packets are still standard TCP/IP packets. However, if this method is used on its own in a half-duplex wireless environment, the increased number of packets can decrease wireless LAN utilization due to the collision avoidance algorithm running on the wireless LAN. To avoid this issue, the splitting up of a TCP ACK can be combined with the aggregation of TCP ACKs into a single packet sent across the wireless LAN. That way, the additional packets do not incur additional wireless transmission overhead to reach their goal. Therefore, the procedure in step 2307 in
A method of splitting up a TCP ACK is illustrated in
Now that the number of TCP ACKs and the sequence interval between the ACKs has been determined, the TCP ACK can be segments. This algorithm is illustrated in
Depending on the Wireless LAN technology, transmission rates over the LAN may be limited. For example, an 802.1b network has only an 11-Mbps transmission rate versus an 802.1g network which has a 54-Mbps rate. Detection of the LAN type can be estimated and shared among the associated INDs, which can influence the level of encoding selected by the INDs for a particular association. If the link is discerned to be limited in either transmission rate or in packets per second, the encoding rate may be increased. If the INDs are summarizing or aggregating TCP ACKs, the encoding may be increased by increasing MAX_ACKs or increasing the timeout period of the ACK Pending Timer.
To ensure that the TCP ACKs are sent in a timely fashion, all of the encoders, irrespective of the algorithm being used, can set the TOS/DSCP bits of the outgoing packets to ensure that are delivered in a timely fashion. When the encoded packet arrives at the wireless LAN, 802.11e can be employed to ensure that the TCP ACKs are delivered in a timely fashion. It can also be leveraged to reduce the overhead of the TCP ACK over the wireless LAN.
Embodiments of the invention may be implemented in a network having endpoints, such as servers or other computing devices, and associated encoding components. The encoding components, and the described methods, can be implemented in hardware, software or a combination thereof. Those portions that are implemented in software can represented as a software product stored in a machine-readable medium (also referred to as a computer-readable medium, a processor-readable medium, or a computer usable medium having a computer readable program code embodied therein). The machine-readable medium may be any suitable tangible medium, including magnetic, optical, or electrical storage medium including a diskette, compact disk read only memory (CD-ROM), memory device (volatile or non-volatile), or similar storage mechanism. The machine-readable medium may contain various sets of instructions, code sequences, configuration information, or other data, which, when executed, cause a processor to perform steps in a method according to an embodiment of the invention. Those of ordinary skill in the art will appreciate that other instructions and operations necessary to implement the described invention may also be stored on the machine-readable medium. Software running from the machine readable medium may interface with circuitry to perform the described tasks.
While particular embodiments and applications of the present invention have been illustrated and described, it is to be understood that the invention is not limited to the precise construction and compositions disclosed herein and that various modifications, changes, and variations may be apparent from the foregoing descriptions without departing from the spirit and scope of the invention as defined in the appended claims.
This application is a continuation of, and claims priority to, U.S. patent application Ser. No. 14/606,834, filed Jan. 27, 2015, now allowed, which is a continuation-in-part of U.S. patent application Ser. No. 14/219,151, filed Mar. 19, 2014, now allowed, which is a continuation of U.S. patent application Ser. No. 13/022,073, filed Feb. 7, 2011, now U.S. Pat. No. 8,717,900, each of which is hereby incorporated by reference herein in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4908827 | Gates | Mar 1990 | A |
5600663 | Ayanoglu | Feb 1997 | A |
5677918 | Tran | Oct 1997 | A |
5751970 | Bournas | May 1998 | A |
5857072 | Crowle | Jan 1999 | A |
6000053 | Levine | Dec 1999 | A |
6012159 | Fischer | Jan 2000 | A |
6126310 | Osthoff | Oct 2000 | A |
6172972 | Birdwell | Jan 2001 | B1 |
6272148 | Takagi | Aug 2001 | B1 |
6272658 | Steele | Aug 2001 | B1 |
6278716 | Rubenstein | Aug 2001 | B1 |
6336200 | Wolfgang | Jan 2002 | B1 |
6421387 | Rhee | Jul 2002 | B1 |
6421805 | McAuliffe | Jul 2002 | B1 |
6438108 | Kanljung | Aug 2002 | B1 |
6445717 | Gibson | Sep 2002 | B1 |
6449251 | Awadallah | Sep 2002 | B1 |
6529552 | Tsai | Mar 2003 | B1 |
6570843 | Wolfgang | May 2003 | B1 |
6606723 | Wolfgang | Aug 2003 | B2 |
6609223 | Wolfgang | Aug 2003 | B1 |
6728924 | Lou | Apr 2004 | B1 |
6744766 | Alapuranen | Jun 2004 | B2 |
6868083 | Apostolopoulos | Mar 2005 | B2 |
6876669 | Shalom | Apr 2005 | B2 |
6901051 | Hou | May 2005 | B1 |
7016409 | Unger | Mar 2006 | B2 |
7024609 | Wolfgang | Apr 2006 | B2 |
7035217 | Vicisano | Apr 2006 | B1 |
7050396 | Cohen | May 2006 | B1 |
7065482 | Shorey | Jun 2006 | B2 |
7075936 | Hathaway | Jul 2006 | B2 |
7089478 | Cummings | Aug 2006 | B2 |
7133407 | Jinzaki | Nov 2006 | B2 |
7167704 | Chang | Jan 2007 | B2 |
7215683 | Burkert | May 2007 | B2 |
7236481 | Kim | Jun 2007 | B2 |
7310670 | Walbeck | Dec 2007 | B1 |
7319701 | Guven | Jan 2008 | B2 |
7522606 | Sendrovitz | Apr 2009 | B1 |
7609716 | Brown | Oct 2009 | B2 |
7720063 | Maiorana | May 2010 | B2 |
7739398 | Shabtay | Jun 2010 | B1 |
7742501 | Williams | Jun 2010 | B2 |
7801044 | Moutarlier | Sep 2010 | B2 |
7821937 | Guo | Oct 2010 | B1 |
7889654 | Ramakrishnan | Feb 2011 | B2 |
7936785 | Ehret | May 2011 | B2 |
7953114 | Williams | May 2011 | B2 |
8009696 | Williams | Aug 2011 | B2 |
8045563 | Lee | Oct 2011 | B2 |
8437370 | Williams | May 2013 | B2 |
20010009547 | Jinzaki | Jul 2001 | A1 |
20010040883 | Chang | Nov 2001 | A1 |
20020061059 | Ginesi | May 2002 | A1 |
20020141448 | Matsunaga | Oct 2002 | A1 |
20020146016 | Liu | Oct 2002 | A1 |
20020154631 | Makansi | Oct 2002 | A1 |
20020164024 | Arakawa | Nov 2002 | A1 |
20030002499 | Cummings | Jan 2003 | A1 |
20030018793 | Mora | Jan 2003 | A1 |
20030035440 | Casaccia | Feb 2003 | A1 |
20030053461 | Ross | Mar 2003 | A1 |
20030105997 | Mitlin | Jun 2003 | A1 |
20030108044 | Hendel | Jun 2003 | A1 |
20030152058 | Cimini, Jr. | Aug 2003 | A1 |
20030219034 | Lotter | Nov 2003 | A1 |
20040010736 | Alapuranen | Jan 2004 | A1 |
20040015686 | Connor | Jan 2004 | A1 |
20040039827 | Thomas | Feb 2004 | A1 |
20040095885 | Yang | May 2004 | A1 |
20040160943 | Cain | Aug 2004 | A1 |
20040196785 | Janakiraman | Oct 2004 | A1 |
20040213197 | Zimmerman | Oct 2004 | A1 |
20040264396 | Ginzburg | Dec 2004 | A1 |
20040267945 | Reiss | Dec 2004 | A1 |
20050025185 | Brown | Feb 2005 | A1 |
20050053002 | Chan | Mar 2005 | A1 |
20050130646 | Frank | Jun 2005 | A1 |
20050195859 | Mahany | Sep 2005 | A1 |
20050213586 | Cyganski | Sep 2005 | A1 |
20050259577 | Sin | Nov 2005 | A1 |
20060018315 | Baratakke | Jan 2006 | A1 |
20060029101 | Williams | Feb 2006 | A1 |
20060031518 | Jennings, III | Feb 2006 | A1 |
20060031847 | MacDonald | Feb 2006 | A1 |
20060106598 | Trombetta | May 2006 | A1 |
20060165163 | Burazerovic | Jul 2006 | A1 |
20060178143 | Chang | Aug 2006 | A1 |
20060210037 | Olafsson | Sep 2006 | A1 |
20060245384 | Talukdar | Nov 2006 | A1 |
20060268717 | Kanterakis | Nov 2006 | A1 |
20070011321 | Huntington | Jan 2007 | A1 |
20070076680 | Amram | Apr 2007 | A1 |
20070116052 | Yu | May 2007 | A1 |
20070157060 | Ganga | Jul 2007 | A1 |
20070177739 | Ganguly | Aug 2007 | A1 |
20080089268 | Kinder | Apr 2008 | A1 |
20080095247 | Ohno | Apr 2008 | A1 |
20080151776 | Kure | Jun 2008 | A1 |
20080151823 | Quigley | Jun 2008 | A1 |
20080240108 | Hyldgaard | Oct 2008 | A1 |
20080304483 | Williams | Dec 2008 | A1 |
20090006920 | Munson | Jan 2009 | A1 |
20090049189 | Zhu | Feb 2009 | A1 |
20090116487 | Read | May 2009 | A1 |
20090135950 | Hoffman | May 2009 | A1 |
20090268742 | Hama | Oct 2009 | A1 |
20090268747 | Kurata | Oct 2009 | A1 |
20100005177 | Cagenius | Jan 2010 | A1 |
20100023842 | Rahrer | Jan 2010 | A1 |
20100080167 | Cordeiro | Apr 2010 | A1 |
20100161741 | Jiang | Jun 2010 | A1 |
20100272122 | Williams | Oct 2010 | A1 |
20110044338 | Stahl | Feb 2011 | A1 |
20110103388 | Williams | May 2011 | A1 |
20110185073 | Jagadeeswaran | Jul 2011 | A1 |
20110206043 | Williams | Aug 2011 | A1 |
20120201136 | Williams | Aug 2012 | A1 |
20120203893 | Williams | Aug 2012 | A1 |
20120213232 | Williams | Aug 2012 | A1 |
20120287806 | Williams | Nov 2012 | A1 |
20130124682 | Williams | May 2013 | A1 |
Number | Date | Country |
---|---|---|
2450563 | Dec 2002 | CA |
1343410 | Apr 2002 | CN |
1049299 | Nov 2000 | EP |
1755248 | Feb 2007 | EP |
10-119426 | May 1998 | JP |
10-174069 | Jun 1998 | JP |
11-225161 | Aug 1999 | JP |
2000-151623 | May 2000 | JP |
2001-119426 | Apr 2001 | JP |
2001-345854 | Dec 2001 | JP |
2002-077258 | Mar 2002 | JP |
2002-290459 | Oct 2002 | JP |
2003-196618 | Jul 2003 | JP |
2003-198618 | Jul 2003 | JP |
2003-298560 | Oct 2003 | JP |
2004-187286 | Jul 2004 | JP |
2005-287016 | Oct 2005 | JP |
2007-184836 | Jul 2007 | JP |
2008-509580 | Mar 2008 | JP |
2008-153778 | Jul 2008 | JP |
WO 9820511 | May 1998 | WO |
WO 0048366 | Aug 2000 | WO |
WO 2009020876 | Feb 2009 | WO |
Entry |
---|
Barakat, C.: Simulation-Based Study of link level Hybrid FEC/ARQ-SR for Wireless Links and Long-Lived TCP Traffic, INRIA Research Report RR-4752: Feb. 2003 (8 pages). |
Border, J. “Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations.” Network Working Group—Category: Informational. Jun. 1, 2001 (46 pages). |
European Patent Application No. 09167948.0 Search Report, dated Nov. 26, 2009 (5 pages). |
European Patent Application No, 12181248.1 Search Report, dated Sep. 10, 2012 (6 pages). |
European Search Report dated Sep. 2, 2013 which issued in European Patent Application No. 13177433.3 (5 pages). |
Extended European Search Report dated Jun. 26, 2014 which issued in European Patent Application No. 12744550.0 (5 pages). |
Extended European Search Report dated May 14, 2014 which issued in European Patent Application No. 14150050.4 (7 pages). |
International Search Report, PCT/CA2005/001206, dated Jun. 22, 2011 (2 pages). |
International Search Report, PCT/IB2011/050917, dated Jun. 22, 2011 (3 pages). |
International Search Report, PCT/IB2012/050429, dated Apr. 26, 2012 (4 pages). |
International Search Report, PCT/IB2012/050473, dated Aug. 24, 2012 (3 pages). |
International Written Opinion, PCT/CA2005/001206, dated Jun. 22, 2011 (6 pages). |
International Written Opinion, PCT/IB2011/050917, dated Jun. 22, 2011 (4 pages). |
International Written Opinion, PCT/IB2012/050429, dated Apr. 26, 2012 (5 pages). |
International Written Opinion, PCT/IB2012/050473, dated Aug. 24, 2012 (6 pages). |
Japanese Patent Application No. 2007-524146, Office Action dated Sep. 28, 2010 (9 pages). |
Mahy, R. “Traversal Using Relays Around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN).” Internet Engineering Task Force (IETF)—Category: Standards Track. Apr. 29, 2010 (68 pages). |
Notice of Allowance issued in U.S. Appl. No. 10/912,200, dated Mar. 1, 2010 (4 pages). |
Pfaffenberger, B. “Central Processing Unit.” Webster's New World Computer Dictionary, Ninth Edition. New York: Hungry Minds, Inc., 2001 (2 pages). |
Number | Date | Country | |
---|---|---|---|
20170134293 A1 | May 2017 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14606834 | Jan 2015 | US |
Child | 15413485 | US | |
Parent | 13022073 | Feb 2011 | US |
Child | 14219151 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14219151 | Mar 2014 | US |
Child | 14606834 | US |