IEEE Copyright Notice

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

ACM Copyright Notice

These are the authors' versions of the work. The copyright is with ACM. They are posted here by permission of ACM for your personal use. Not for redistribution. See individual publication details for information on the publication of the definitive versions.

Springer-Verlag LNCS Copyright Notice

The copyright of these contributions has been transferred to Springer-Verlag Berlin Heidelberg New York. The copyright transfer covers the exclusive right to reproduce and distribute the contribution, including reprints, translations, photographic reproductions, microform, electronic form (offline, online), or any other reproductions of similar nature. Online available from Springer-Verlag LNCS series.

Work that appeared before the 1st of September 2003 was published while the authors were with the Lehrstuhl Praktische Informatik IV at the University of Mannheim.

Unleashing Tor, BitTorrent & Co.: How to Relieve TCP Deficiencies in Overlays (Extended Version)

Author(s): Daniel Marks, Florian Tschorsch, Björn Scheuermann.
Title: Unleashing Tor, BitTorrent & Co.: How to Relieve TCP Deficiencies in Overlays (Extended Version)
Published: Technical Report TR-2010-001, Computer Science Department, Heinrich Heine University, Düsseldorf, Germany, August 2010
Abstract: Many overlay-based distributed applications employ TCP for the communication between peer nodes. Typically, the TCP connections of one peer will all share one physical Internet link. Using real-world network experiments, we demonstrate that this can lead to undesirable interactions between overlay links, resulting in oscillations and suboptimal throughput. Consequently, we argue that such effects should be taken into account in the design and deployment of overlay networks. In support of this case, we identify readily deployable countermeasures. In a first step, we show that simple traffic shaping mechanisms based on existing operating system QoS functionality can bring some relief. Yet, this alone is not fully effective if peers communicate bidirectionally, due to TCP ACK piggybacking. We thus suggest to set up the overlay's communication structure to avoid piggybacked ACKs, by separating bidirectional peer communication into two independent TCP connections. We demonstrate the effectiveness of this strategy and discuss viable migration paths for existing applications.
Bib entry: [XML] [BibTeX]
Download: [PDF]
Verantwortlich für den Inhalt: E-Mail sendenWE Informatik