How to Network Delay-Sensitive Applications

Pavel Chuprikov, Kirill Kogan

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    In this paper we study design principles of congestion control supporting low-latency applications. In this regard, we show the attractiveness of a bounded-delay model satisfying latency constraints instead of optimizing them. Under this model, we propose two transformations automatically generating policies with finite buffers from policies with infinite buffers while keeping performance guarantees. These transformations allow us to reconsider design principles of congestion control, in particular, avoiding delivery of unnecessary traffic. We study the impact of different policy properties on required buffer sizing and at the extreme case define potential ways to build reliable transports without retransmissions. In addition, we build a taxonomy of management policies for various types of extra knowledge and propose another transformation kind constructing policies that optimize weighted goodput from policies optimizing throughput while keeping performance guarantees. Our analytic results are supported by extensive evaluations demonstrating attractiveness of the proposed design principles.

    Original languageEnglish
    Title of host publication2021 IFIP Networking Conference, IFIP Networking 2021
    PublisherInstitute of Electrical and Electronics Engineers
    ISBN (Electronic)9783903176393
    DOIs
    StatePublished - 21 Jun 2021
    Event20th Annual IFIP Networking Conference, IFIP Networking 2021 - Virtual, Espoo, Finland
    Duration: 21 Jun 202124 Jun 2021

    Publication series

    Name2021 IFIP Networking Conference, IFIP Networking 2021

    Conference

    Conference20th Annual IFIP Networking Conference, IFIP Networking 2021
    Country/TerritoryFinland
    CityVirtual, Espoo
    Period21/06/2124/06/21

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Computer Science Applications
    • Information Systems and Management
    • Hardware and Architecture

    Fingerprint

    Dive into the research topics of 'How to Network Delay-Sensitive Applications'. Together they form a unique fingerprint.

    Cite this