Bufferbloat: Dark Buffers in the Internet

Gettys, Jim
May 2011
IEEE Internet Computing;05/01/2011, Vol. 15 Issue 3, p96
Academic Journal
Bufferbloat is the existence of excessively large (bloated) buffers into systems, particularly network communication systems. Systems suffering from bufferbloat will have bad latency under load under some or all circumstances, depending on if and where the bottleneck in the communication's path exists. Bufferbloat encourages network congestion; it destroys congestion avoidance in transport protocols such as HTTP, TCP, Bittorrent, and so on. Network congestion-avoidance algorithms depend on timely packet drops or ECN; bloated buffers invalidate this design presumption. Without active queue management, these bloated buffers will fill, and stay full. Bufferbloat is an endemic disease in today's Internet.


Related Articles

  • Using XGBoost to Discover Infected Hosts Based on HTTP Traffic. Niu, Weina; Li, Ting; Zhang, Xiaosong; Hu, Teng; Jiang, Tianyu; Wu, Heng // Security & Communication Networks;11/6/2019, p1 

    In recent years, the number of malware and infected hosts has increased exponentially, which causes great losses to governments, enterprises, and individuals. However, traditional technologies are difficult to timely detect malware that has been deformed, confused, or modified since they usually...

  • WebDAV secures collaboration. Dusseault, Lisa // Network World;4/7/2003, Vol. 20 Issue 14, p37 

    Provides information on Web-based Distributed Authoring and Versioning (WebDAV), an extension of the HTTP computer network protocol that lets users collaborate via the Internet. Examples of Web servers in which WebDAV can be found; Capabilities of WebDAV; Scenarios that WebDAV was built to address.

  • The Internet, the World Wide Web, Library Web Browsers, and Library Web Servers. Jian-Zhong Zhou // Information Technology & Libraries;Mar2000, Vol. 19 Issue 1, p50 

    Informs on information technology subjects. Difference between the Internet and the World Wide Web; Relationship between the Web's protocol HTTP and other high-level Internet protocols; Brief history of web development; Mechanism in which a Web browser `talks' to a Web server on the Internet;...

  • Mean Response Time Approximation for HTTP Transactions over Transport Protocols. Lee, Y.-J. // International Journal of Computer Network & Information Security;Dec2014, Vol. 7 Issue 1, p24 

    This paper addresses mean response time that end-users experience when using the Internet. HTTP (Hyper Text Transfer Protocol) is a widely used transfer protocol to retrieve web objects in the Internet. Generally, HTTP uses TCP (Transmission Control Protocol) in a transport layer. But it is...

  • Compressing the Data Densely by New Geflochtener to Accelerate Web. Saini, Hemant Kumar; Kushwaha, Satpal Singh; Krishna, C. Rama // International Journal of Computer Applications;May2014, Vol. 94, p12 

    At the present scenario of the internet, there exist many optimization techniques to improve the Web speed but almost expensive in terms of bandwidth. So after a long investigation on different techniques to compress the data without any loss, a new algorithm is proposed based on LZ77 family...

  • USING COMBINED MARKOV CHAINS TO PREDICT WWW NAVIGATION PATHS. Hafri, Y. // Proceedings of the IADIS International Conference on WWW/Interne;Jan2003, p635 

    The Internet network provides access to several hundreds of million sites and expands at a rate of a million pages a day. Yet, given the rapid and anarchical nature of its evolution, Internet remains an information network lacking in both organization and structure, thus making effective...

  • Analysing TCP for Bursty Traffic. Biswas, Israfil; Sathiaseelan, Arjuna; Secchi, Raffaello; Fairhurst, Gorry // International Journal of Communications, Network & System Scienc;Jul2010, Vol. 3 Issue 7, p585 

    The Transmission Control Protocol has been designed to support interactive and bulk applications, with performance tuned to support bulk applications that desire to continuously send data. In contrast, this paper analyses TCP performance for a class of applications that do not wish to send...

  • Taxonomy of SSL/TLS Attacks. K., Keerthi Vasan; P., Arun Raj Kumar // International Journal of Computer Network & Information Security;Feb2016, Vol. 8 Issue 2, p15 

    Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web...

  • Enterprise Buses Roll Ahead. Udell, Jon // InfoWorld;5/5/2003, Vol. 25 Issue 18, p42 

    Deals with the emergence of service-oriented architecture (SOA) and its implications for the information technology industry as of May 2003. Reason behind the success of computer protocols such as HTTP and SMTP; Essence of SOA.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics