Workshop on ns-3

Research Article

An Implementation of Scalable, Vegas, Veno, and YeAH Congestion Control Algorithms in ns-3

  • @INPROCEEDINGS{10.1145/2915371.2915386,
        author={Truc Anh N. Nguyen and Siddharth Gangadhar and Md Moshfequr Rahman and James P.G. Sterbenz},
        title={An Implementation of Scalable, Vegas, Veno, and YeAH Congestion Control Algorithms in ns-3},
        proceedings={Workshop on ns-3},
        publisher={ACM},
        proceedings_a={WNS3},
        year={2016},
        month={7},
        keywords={TCP Vegas NewReno Veno YeAH Scalable transport protocols ns-3 network simulator performance evaluation congestion control loss-based delay-based hybrid Future Internet},
        doi={10.1145/2915371.2915386}
    }
    
  • Truc Anh N. Nguyen
    Siddharth Gangadhar
    Md Moshfequr Rahman
    James P.G. Sterbenz
    Year: 2016
    An Implementation of Scalable, Vegas, Veno, and YeAH Congestion Control Algorithms in ns-3
    WNS3
    ACM
    DOI: 10.1145/2915371.2915386
Truc Anh N. Nguyen1, Siddharth Gangadhar1, Md Moshfequr Rahman1, James P.G. Sterbenz1
  • 1: Information and Telecommunication Technology Center, Department of Electrical Engineering and Computer Science, The University of Kansas, Lawrence, KS 66045, USA

Abstract

Despite the modern advancements in networking, TCP congestion control is still one of the key mechanisms that ensure the stability of the Internet. Given its principal role, it is a popular research topic revisited every time TCP and its variants are studied. Open-source network simulators such as ns-3 are important tools used by the research community to gain valuable insight into existing TCP congestion control algorithms and to develop new variants. However, the current TCP infrastructure in ns-3 supports only a few congestion control algorithms. As part of the ongoing effort to extend TCP functionalities in the simulator, we implement Scalable, Vegas, Veno, and YeAH based on the original literature and their implementations in the Linux kernel; this paper presents our implementation details. The paper also discusses our validation of the added models against the theories to demonstrate their correctness. Through our evaluation, we highlight the key features of each algorithm that we study.