The present invention relates to communication data networks. More specifically, the present invention relates to systems and methods for increasing the throughput of data transmissions through a network as seen from the edge of the network.
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol suite. The TCP provides reliable, ordered delivery of a stream of bytes from one computer application to another computer application and provides the transport layer for many fundamental Internet applications such a web traffic, mail, and file transfer. TCP has been optimized for wired transmission. As such, packet loss is assumed to be the result of network congestion, and TCP has many mechanisms geared to deal with congestion that is triggered by packet loss. These mechanisms may be erroneously applied in a wireless networking scenario. Packet loss is more likely to have occurred due to some sporadic event such as interference or shading. If a computer application leveraging TCP for transport experiences packet loss in a wireless network, congestion control mechanisms actually lead to network underutilization.
In addition to the basic issues described above, some networks have additional challenges. Some networks may be bandwidth constrained, requiring minimization of bandwidth usage. Some networks, such as power-line, wireless or WIFI, are half-duplex such that each end uses the same frequency to transmit and receive. In this case, a handshake or other back-off/contention mechanism is required to ensure that each member of the half-duplex network can transmit without colliding with another end station. These collision avoidance mechanisms are generally optimized for larger packet sizes, which influence the setting of their retry and back-off timers. This is particularly problematic for TCP Acknowledgement (ACK) packets, which are sent often by a computer application as it is receiving data from another computer application. If such a constrained network is involved in the path of this data stream, the collision avoidance handshake is invoked often as data is acknowledged. Since the TCP ACKs are small, they violate the assumptions of the collision avoidance protocols leading to additional underutilization.
In accordance with one embodiment, a method of reducing the bandwidth usage of a network comprises intercepting traffic between a TCP server and a TCP client using TCP protocols that use client acknowledgements; identifying client acknowledgements from the TCP protocols; identifying the sequence number of a last received client acknowledgements from the intercepted traffic; identifying the sequence number of a last sent client acknowledgement from the intercepted traffic; calculating an unacknowledged byte value based on the difference between the last received client acknowledgement sequence number and the last sent client acknowledgement sequence number; comparing the calculated unacknowledged byte value with a predetermined threshold value, to determine whether the calculated unacknowledged byte value is at least as great as the predetermined threshold value; and transmitting the identified client acknowledgements into the network when the compared unacknowledged byte value is at least as great as the predetermined threshold value. In one implementation, the intercepting step is performed at an intercepting device located between a TCP server and at least one TCP client. The last sent client acknowledgement is preferably sent from at least one of the TCP clients.
In accordance with another embodiment, a system for reducing the bandwidth usage of a network, the method comprises a TCP server and a TCP client using TCP protocols that use client acknowledgements; and an intercepting network device located between the TCP server and the TCP client and adapted to receive the client acknowledgements flowing between the TCP server and the TCP client, and to transmit all the client acknowledgements into the network. In one implementation, the sequence numbers of a last received client acknowledgement and a last sent client acknowledgement sent from a client are identified at the intercepting network device, and an unacknowledged byte value based on the difference between the sequence numbers is compared to a predetermined threshold value. The client acknowledgements are preferably transmitted into the network from the intercepting device when the unacknowledged byte value is equal to or greater than the predetermined threshold value.
Embodiments of the present invention will now be described, by way of example only, with reference to the attached Figures, wherein:
Although the invention will be described in connection with certain preferred embodiments, it will be understood that the invention is not limited to those particular embodiments. On the contrary, the invention is intended to cover all alternatives, modifications, and equivalent arrangements as may be included within the spirit and scope of the invention as defined by the appended claims. The invention will be described in the context of a wireless network, but it will be understood that it applies to any bandwidth constrained networks or to half-duplex networks.
The Transmission Control Protocol (TCP) is one of the core Internet protocols providing reliable, ordered delivery of a stream of bytes from one computer application to another computer application.
The attributes of the network 20 are intentionally ambiguous. The only requirement is to ensure that TCP can work between the server 10 and the client 30. This means that the client 30 is able to determine the IP Address of the server 10, and the client 30 knows which TCP port on the server 10 is open for the client's application. Then, the network 20 needs to provide IP connectivity between the server 10 and the client 30.
In
TCP ACK messages are problematic in half-duplex wireless networks that require collision avoidance mechanisms to ensure reliable data transfer.
In this situation, an Intercepting Network Device (IND) can be added to the path book-ending the wireless LAN to improve network utilization. The system of
The decoder 630 receives encoded packets from the encoded interface 620 and produces standard packets for transmission to the client 30 by way of the native interface 600. The encoder 610, on the other hand, receives standard packets from the native interface 600 and produces encoded packets for transmission to the wireless client 50 by way of the encoded interface 620. The specific algorithms used by the encoder and decoder are optional and programmable. Several embodiments are described below.
In one implementation, the IND 60 and the IND 70 buffer ACKs from a TCP connection and summarize the information in a single ACK message for the connection. Since the ACK information in TCP messages is cumulative, the algorithm can be very simple.
To summarize the TCP ACKs for a connection, the encoders of the INDs (60 and 70) implement a state machine for each TCP connection. An embodiment of this state machine is illustrated in
When the ACK is summarized, the INDs (60 or 70) may have to deal with selective ACKs (or SACKs). This option is defined in RFC 2018 and allows the receiver to acknowledge discontinuous blocks of packets that were received correctly, in addition to the sequence number of the last contiguous byte received successively, as in the basic TCP acknowledgment. The acknowledgement can specify a number of SACK blocks, where each SACK block is conveyed by the starting and ending sequence numbers of a contiguous range that the receiver correctly received.
Note that the resulting encoded packet created by the IND 60 and the IND 70 is a standard TCP/IP packet. Therefore, no decoding of the packet is required, and the decoder function in the INDs (60 and 70) is NULL. Summarized TCP ACKs that arrive on the encoded interface of the IND 60 or the IND 70 can pass through unchanged. As well, no explicit signaling is required to create a connection between the INDs; they can proceed independently to improve network performance on the wireless LAN.
An implementation of this algorithm was used to measure the network utilization improvements leveraging a deployment similar to
As another embodiment, the timer 812 (
unAckedBytes=lastReceivedAck−prevSentAck,
wherein the lastReceivedAck refers to the sequence number of the last received ACK, and the prevSentAck refers to the sequence number of the last sent ACK.
Therefore, the query at step 1443 is based on the following algorithm: if unAckedBytes>=maxUnAckedBytes, go to send ACK state, otherwise go to PEND state, wherein maxUnAckedBytes refers to the maximum unAcked byte count threshold and is a function of the measured RTT and BDP.
The motivation for unacknowledged byte count is to optimize a TCP stack's sending rate. If there are too few summarizing ACKs out of the buffered ACKs, the sending rate of the TCP stack (that receives the ACKs) may be affected.
As another embodiment, summarizing ACKs can be delayed long enough that the cumulative ACK can be piggybacked with a data packet flowing in the reverse direction (all data packets carry the cumulative ACK number).
An alternate implementation of the INDs uses a method of aggregating the TCP ACK packets instead of summarizing them as described above.
Since functionality is required on the encoder of one end of the connection and the decoder of the other end of the connection, the IND 50 and the IND 60 must create an association with each other to provide the aggregation function. Signaling mechanisms as described in copending U.S. application Ser. No. 14/718,650, filed Mar. 5, 2010, and incorporated by reference herein, can be used to create this association. The only difference is the mechanism which is being signaled. Instead of signaling a session to improve network reliability, it is signaling a TCP ACK aggregation session.
A state machine as shown in
How subsequent ACKs are handled by the state machine in the ACK Pending State 1702 is illustrated in
Upon entering the Send ACK state 1702, the state machine needs to determine how to finalize the aggregated packet. As illustrated in
This is one implementation of the aggregation of TCP ACKs. A variation of this algorithm is to aggregate TCP ACKs from multiple clients instead of a single client. This scenario is illustrated in
Another variation allows for the combination of summarization of TCP ACKs with the aggregation of TCP ACKs for multiple TCP connections.
The methods described above improve the wireless LAN network utilization by influencing the behavior of the client and server by manipulating the flow control algorithm. An alternate method influences the congestion control mechanisms provided by TCP. One option is to break-up an ACK transmitted by the client 30 into several ACKs. This stimulates the congestion window on the server through its additive increase/multiplicative decrease algorithm to increase the congestion window. TCP implementations increase the congestion window by a fraction of the TCP maximum segment size for every ACK that is received. By increasing the number of ACKs, the congestion window opens faster, putting more TCP segments in flight.
This encoding algorithm can increase bandwidth utilization from the client 30 to the server 10. Several parameters are defined to control the bandwidth used by the encoding algorithm. The first parameter is the MAXIMUM ACKs; which defines the maximum number of ACKs that can be generated from a single ACK. The MINIMUM SEGMENT SIZE determines the minimum difference between the sequence number of sequential ACKs. For example, MAXIMUM ACKs can be defined as 3 and MINIMUM SEGMENT SIZE can be defined as 500. If a packet arrives where the sequence difference between the current ACK and the previous ACK seen by the encoder is 2100 bytes, the encoder will produce 3 TCP ACKs each with a sequential difference of 700 bytes each. This encoding is limited by the MAXIMUM ACK parameter. If a TCP ACK arrives with a sequential difference of 400 bytes, this ACK is transmitted unchanged since it is less than the MINIMUM SEGMENT SIZE. Another method to control bandwidth is to define a duty cycle for the algorithm. This means that the encoding algorithm is enabled and disabled for defined periods. One method is to define these periods in terms of time defining a total period and a duty factor in percent. The duty factor defines the percentage of the period in which the encoding algorithm is operating. Another option is to define the periods in terms of packets. The total period is defined as PACKET_PERIOD. Within the PACKET_PERIOD, ENCODE_LIMIT defines the number of packets which are encoded.
The basic algorithm required to implement this function is provided in
The method for sending ACK in step 2307 is represented as a procedure because how this is handled is optional. In a wired environment, packets can be just enqueued directly on an interface for transmission. The increase of bandwidth by the splitting of ACKs may be easily handled by the bandwidth provided by wired LANs. Any loss can be handled by the natural assumptions of TCP operation. No decoding is required in this mode of operation since the encoded packets are still standard TCP/IP packets. However, if this method is used on its own in a half-duplex wireless environment, the increased number of packets can decrease wireless LAN utilization due to the collision avoidance algorithm running on the wireless LAN. To avoid this issue, the splitting up of a TCP ACK can be combined with the aggregation of TCP ACKs into a single packet sent across the wireless LAN. That way, the additional packets do not incur additional wireless transmission overhead to reach their goal. Therefore, the procedure in step 2307 in
A method of splitting up a TCP ACK is illustrated in
Now that the number of TCP ACKs and the sequence interval between the ACKs has been determined, the TCP ACK can be segments. This algorithm is illustrated in
Depending on the Wireless LAN technology, transmission rates over the LAN may be limited. For example, an 802.1b network has only an 11-Mbps transmission rate versus an 802.1g network which has a 54-Mbps rate. Detection of the LAN type can be estimated and shared among the associated INDs, which can influence the level of encoding selected by the INDs for a particular association. If the link is discerned to be limited in either transmission rate or in packets per second, the encoding rate may be increased. If the INDs are summarizing or aggregating TCP ACKs, the encoding may be increased by increasing MAX_ACKs or increasing the timeout period of the ACK Pending Timer.
To ensure that the TCP ACKs are sent in a timely fashion, all of the encoders, irrespective of the algorithm being used, can set the TOS/DSCP bits of the outgoing packets to ensure that are delivered in a timely fashion. When the encoded packet arrives at the wireless LAN, 802.1 le can be employed to ensure that the TCP ACKs are delivered in a timely fashion. It can also be leveraged to reduce the overhead of the TCP ACK over the wireless LAN.
Embodiments of the invention may be implemented in a network having endpoints, such as servers or other computing devices, and associated encoding components. The encoding components, and the described methods, can be implemented in hardware, software or a combination thereof. Those portions that are implemented in software can represented as a software product stored in a machine-readable medium (also referred to as a computer-readable medium, a processor-readable medium, or a computer usable medium having a computer readable program code embodied therein). The machine-readable medium may be any suitable tangible medium, including magnetic, optical, or electrical storage medium including a diskette, compact disk read only memory (CD-ROM), memory device (volatile or non-volatile), or similar storage mechanism. The machine-readable medium may contain various sets of instructions, code sequences, configuration information, or other data, which, when executed, cause a processor to perform steps in a method according to an embodiment of the invention. Those of ordinary skill in the art will appreciate that other instructions and operations necessary to implement the described invention may also be stored on the machine-readable medium. Software running from the machine readable medium may interface with circuitry to perform the described tasks.
While particular embodiments and applications of the present invention have been illustrated and described, it is to be understood that the invention is not limited to the precise construction and compositions disclosed herein and that various modifications, changes, and variations may be apparent from the foregoing descriptions without departing from the spirit and scope of the invention as defined in the appended claims.
This application is a continuation of, and claims priority to, U.S. patent application Ser. No. 16/829,308, filed Mar. 25, 2020, now U.S. Pat. No. 11,671,377, which is a continuation of, and claims priority to, U.S. patent application Ser. No. 16/044,695, filed Jul. 25, 2018, now U.S. Pat. No. 10,645,012, which is a continuation of, and claims priority to, U.S. patent application Ser. No. 15/413,485, filed Jan. 24, 2017, now U.S. Pat. No. 10,057,178, which is a continuation of, and claims priority to, U.S. patent application Ser. No. 14/606,834, filed Jan. 27, 2015, now U.S. Pat. No. 9,590,913, which is a continuation-in-part of U.S. patent application Ser. No. 14/219,151, filed Mar. 19, 2014, now U.S. Pat. No. 9,647,945, which is a continuation of U.S. patent application Ser. No. 13/022,073, filed Feb. 7, 2011, now U.S. Pat. No. 8,717,900, each of which is hereby incorporated by reference herein in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4908827 | Gates | Mar 1990 | A |
5600663 | Ayanoglu et al. | Feb 1997 | A |
5677918 | Tran et al. | Oct 1997 | A |
5751970 | Bournas | May 1998 | A |
5857072 | Crowle | Jan 1999 | A |
6000053 | Levine et al. | Dec 1999 | A |
6012159 | Fischer et al. | Jan 2000 | A |
6126310 | Osthoff et al. | Oct 2000 | A |
6172972 | Birdwell et al. | Jan 2001 | B1 |
6272148 | Takagi et al. | Aug 2001 | B1 |
6272658 | Steele et al. | Aug 2001 | B1 |
6278716 | Rubenstein et al. | Aug 2001 | B1 |
6301249 | Mansfield et al. | Oct 2001 | B1 |
6336200 | Wolfgang | Jan 2002 | B1 |
6421387 | Rhee | Jul 2002 | B1 |
6421805 | McAuliffe | Jul 2002 | B1 |
6438108 | Kanljung | Aug 2002 | B1 |
6445717 | Gibson et al. | Sep 2002 | B1 |
6449251 | Awadallah et al. | Sep 2002 | B1 |
6529552 | Tsai et al. | Mar 2003 | B1 |
6570843 | Wolfgang | May 2003 | B1 |
6606723 | Wolfgang | Aug 2003 | B2 |
6609223 | Wolfgang | Aug 2003 | B1 |
6728924 | Lou et al. | Apr 2004 | B1 |
6744766 | Alapuranen | Jun 2004 | B2 |
6868083 | Aspotolopoulos et al. | Mar 2005 | B2 |
6876669 | Shalom | Apr 2005 | B2 |
6901051 | Hou et al. | May 2005 | B1 |
7016409 | Unger | Mar 2006 | B2 |
7035217 | Vicisano et al. | Apr 2006 | B1 |
7024609 | Wolfgang et al. | May 2006 | B2 |
7050396 | Cohen et al. | May 2006 | B1 |
7065482 | Shorey et al. | Jun 2006 | B2 |
7075936 | Hathawa et al. | Jul 2006 | B2 |
7089478 | Commings et al. | Aug 2006 | B2 |
7133407 | Jinzaki et al. | Nov 2006 | B2 |
7167704 | Chang et al. | Jan 2007 | B2 |
7215683 | Burkert et al. | May 2007 | B2 |
7236481 | Kim | Jun 2007 | B2 |
7310670 | Walbeck et al. | Dec 2007 | B1 |
7319701 | Guven et al. | Jan 2008 | B2 |
7369498 | Ma et al. | May 2008 | B1 |
7522606 | Swndrovitz | Apr 2009 | B1 |
7609716 | Brown et al. | Oct 2009 | B2 |
7720063 | Maiorana et al. | May 2010 | B2 |
7739398 | Shabtay | Jun 2010 | B1 |
7742501 | Williams | Jun 2010 | B2 |
7801044 | Moutarlier | Sep 2010 | B2 |
7821937 | Guo | Oct 2010 | B1 |
7889654 | Ramakrishnan et al. | Feb 2011 | B2 |
7936785 | Ehret et al. | May 2011 | B2 |
7953114 | Williams et al. | May 2011 | B2 |
8009969 | Williams et al. | Aug 2011 | B2 |
8045563 | Lee | Oct 2011 | B2 |
8437370 | Williams et al. | May 2013 | B2 |
8780705 | Robin et al. | Jul 2014 | B2 |
20010009547 | Jinzaki et al. | Jan 2001 | A |
20010040883 | Chang et al. | Nov 2001 | A1 |
20020061059 | Ginesi | May 2002 | A1 |
20020141448 | Marsunaga | Oct 2002 | A1 |
20020146016 | Liu et al. | Oct 2002 | A1 |
20020154631 | Makansi et al. | Oct 2002 | A1 |
20020159396 | Carlson et al. | Oct 2002 | A1 |
20020163888 | Grinfeld | Nov 2002 | A1 |
20020164024 | Arakawa et al. | Nov 2002 | A1 |
20030002499 | Cummings et al. | Jan 2003 | A1 |
20030018793 | Mora | Jan 2003 | A1 |
20030035440 | Casaccia et al. | Feb 2003 | A1 |
20030053461 | Ross | Mar 2003 | A1 |
20030105997 | Mitlin et al. | Jun 2003 | A1 |
20030108044 | Hendel | Jun 2003 | A1 |
20030152058 | Cimini, Jr. et al. | Aug 2003 | A1 |
20030219034 | Lotter et al. | Nov 2003 | A1 |
20040010736 | Alapuranen | Jan 2004 | A1 |
20040015686 | Connor et al. | Jan 2004 | A1 |
20040039827 | Thomas et al. | Feb 2004 | A1 |
20040076680 | Soltes et al. | Apr 2004 | A1 |
20040095885 | Yang | May 2004 | A1 |
20040160943 | Cain | Aug 2004 | A1 |
20040196785 | Janakiraman et al. | Oct 2004 | A1 |
20040213197 | Zimmerman et al. | Oct 2004 | A1 |
20040264396 | Ginzburg et al. | Dec 2004 | A1 |
20040267945 | Reiss | Dec 2004 | A1 |
20050025185 | Brown et al. | Feb 2005 | A1 |
20050053002 | Chan et al. | Mar 2005 | A1 |
20050130646 | Frank et al. | Jun 2005 | A1 |
20050195859 | Mahany | Sep 2005 | A1 |
20050213586 | Cyganski et al. | Sep 2005 | A1 |
20050259577 | Sin | Nov 2005 | A1 |
20060018315 | Baratakke et al. | Jan 2006 | A1 |
20060029101 | Williams | Feb 2006 | A1 |
20060031518 | Jennings, III | Feb 2006 | A1 |
20060031849 | Macdonald et al. | Feb 2006 | A1 |
20060106598 | Trombetta et al. | May 2006 | A1 |
20060165163 | Burazerovic et al. | Jul 2006 | A1 |
20060178143 | Chang et al. | Aug 2006 | A1 |
20060210037 | Olafsson et al. | Sep 2006 | A1 |
20060245384 | Talukdar et al. | Nov 2006 | A1 |
20060268717 | Kanterakis | Nov 2006 | A1 |
20070011321 | Huntington et al. | Jan 2007 | A1 |
20070116052 | Yu et al. | May 2007 | A1 |
20070157060 | Ganga et al. | Jul 2007 | A1 |
20070177739 | Ganguly et al. | Aug 2007 | A1 |
20080089228 | Lin et al. | Apr 2008 | A1 |
20080089268 | Kinder et al. | Apr 2008 | A1 |
20080095247 | Ohno et al. | Apr 2008 | A1 |
20080151776 | Kure | Jun 2008 | A1 |
20080151823 | Quigley et al. | Jun 2008 | A1 |
20080240108 | Hyldgaard | Oct 2008 | A1 |
20080304483 | Williams et al. | Dec 2008 | A1 |
20090006920 | Munson et al. | Jan 2009 | A1 |
20090049189 | Zhu et al. | Feb 2009 | A1 |
20090116487 | Read | May 2009 | A1 |
20090135950 | Hoffmann | May 2009 | A1 |
20090268747 | Kurata et al. | Oct 2009 | A1 |
20100005177 | Cagenius | Jan 2010 | A1 |
20100023842 | Rahrer et al. | Jan 2010 | A1 |
20100080167 | Cordeiro et al. | Apr 2010 | A1 |
20100161741 | Jiang | Jun 2010 | A1 |
20100272122 | Williams et al. | Oct 2010 | A1 |
20100299753 | Yoo | Nov 2010 | A1 |
20110044338 | Stahl et al. | Feb 2011 | A1 |
20110103388 | Williams et al. | May 2011 | A1 |
20110185073 | Jagadeeswaran et al. | Jul 2011 | A1 |
20110206043 | Williams et al. | Aug 2011 | A1 |
20120173719 | Hong | Jul 2012 | A1 |
20120179796 | Nagaraj et al. | Jul 2012 | A1 |
20120201136 | Williams et al. | Aug 2012 | A1 |
20120203893 | Williams et al. | Aug 2012 | A1 |
20120213232 | Williams et al. | Aug 2012 | A1 |
20120287806 | Williams | Nov 2012 | A1 |
20130124682 | Williams et al. | May 2013 | A1 |
Number | Date | Country | |
---|---|---|---|
20230246973 A1 | Aug 2023 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16829308 | Mar 2020 | US |
Child | 18131046 | US | |
Parent | 16044695 | Jul 2018 | US |
Child | 16829308 | US | |
Parent | 15413485 | Jan 2017 | US |
Child | 16044695 | US | |
Parent | 14606834 | Jan 2015 | US |
Child | 15413485 | US | |
Parent | 13022073 | Feb 2011 | US |
Child | 14219151 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14219151 | Mar 2014 | US |
Child | 14606834 | US |