Abstract
While buffers on forwarding devices are required to handle bursty Internet traffic, overly large or badly sized buffers can interact with TCP in undesirable ways. This phenomenon is well understood and is often called “bufferbloat”. Although a number of previous studies have shown that buffering (particularly, in home) can delay packets by as much as a few seconds in the worst case, there is less empirical evidence of tangible impacts on end-users. In this paper, we develop a modified algorithm that can detect bufferbloat at individual end-hosts based on passive observations of traffic. We then apply this algorithm on packet traces collected at 55 end-hosts, and across different network environments. Our results show that 45 out of the 55 users we study experience bufferbloat at least once, 40% of these users experience bufferbloat more than once per hour. In 90% of cases, buffering more than doubles RTTs, but RTTs during bufferbloat are rarely over one second. We also show that web and interactive applications, which are particularly sensitive to delay, are the applications most often affected by bufferbloat.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Kreibich, C., Weaver, N., Nechaev, B., Paxson, V.: Netalyzr: illuminating the edge network. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, IMC 2010, pp. 246–259. ACM, New York (2010), http://doi.acm.org/10.1145/1879141.1879173
Gettys, J., Nichols, K.: Bufferbloat: dark buffers in the internet. Commun. ACM 55(1), 57–65 (2012), http://doi.acm.org/10.1145/2063176.2063196
Nichols, K., Jacobson, V.: Controlling queue delay. Queue 10(5), 20:20–20:34 (2012), http://doi.acm.org/10.1145/2208917.2209336
Sundaresan, S., de Donato, W., Feamster, N., Teixeira, R., Crawford, S., Pescapè, A.: Broadband internet performance: A view from the gateway. SIGCOMM Comput. Commun. Rev. 41(4), 134–145 (2011), http://doi.acm.org/10.1145/2043164.2018452
DiCioccio, L., Teixeira, R., May, M., Kreibich, C.: Probe and pray: Using UPnP for home network measurements. In: Taft, N., Ricciato, F. (eds.) PAM 2012. LNCS, vol. 7192, pp. 96–105. Springer, Heidelberg (2012)
Chirichella, C., Rossi, D.: To the moon and back: are internet bufferbloat delays really that large? In: TMA (2013)
Allman, M.: Comments on bufferbloat. SIGCOMM Comput. Commun. Rev. 43(1), 30–37 (2012), http://doi.acm.org/10.1145/2427036.2427041
Ghobadi, M., Cheng, Y., Jain, A., Mathis, M.: Trickle: rate limiting youtube video streaming. In: Proceedings of the 2012 USENIX Conference on Annual Technical Conference, USENIX ATC 2012, p. 17. USENIX Association, Berkeley (2012), http://dl.acm.org/citation.cfm?id=2342821.2342838
Jiang, H., Wang, Y., Lee, K., Rhee, I.: Tackling bufferbloat in 3g/4g networks. In: Proceedings of the 2012 ACM Conference on Internet Measurement Conference, IMC 2012, pp. 329–342. ACM, New York (2012), http://doi.acm.org/10.1145/2398776.2398810
Joumblatt, D., Teixeira, R., Chandrashekar, J., Taft, N.: Hostview: annotating end-host performance measurements with user feedback. SIGMETRICS Perform. Eval. Rev. 38(3), 43–48 (2011), http://doi.acm.org/10.1145/1925019.1925028
Ostermann, S.: tcptrace, http://www.tcptrace.org/
Gringoli, F., Salgarelli, L., Dusi, M., Cascarano, N., Risso, F., Claffy, K.C.: Gt: picking up the truth from the ground for internet traffic. SIGCOMM Comput. Commun. Rev. 39(5), 12–18 (2009), http://doi.acm.org/10.1145/1629607.1629610
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Wustner, S., Teixeira, R., Chandrashekar, J. (2014). Characterizing Bufferbloat and Its Impact at End-Hosts. In: Dainotti, A., Mahanti, A., Uhlig, S. (eds) Traffic Monitoring and Analysis. TMA 2014. Lecture Notes in Computer Science, vol 8406. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54999-1_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-54999-1_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54998-4
Online ISBN: 978-3-642-54999-1
eBook Packages: Computer ScienceComputer Science (R0)