Reducing Internet Latency: a Survey of Techniques and Their Merits

Total Page:16

File Type:pdf, Size:1020Kb

Reducing Internet Latency: a Survey of Techniques and Their Merits See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/264192993 Reducing Internet Latency: A Survey of Techniques and Their Merits Article in IEEE Communications Surveys & Tutorials · November 2014 DOI: 10.1109/COMST.2014.2375213 CITATIONS READS 104 2,180 10 authors, including: Bob Briscoe Anna Brunstrom Cable Television Laboratories, Inc. Karlstads Universitet 115 PUBLICATIONS 1,512 CITATIONS 229 PUBLICATIONS 1,760 CITATIONS SEE PROFILE SEE PROFILE Andreas Petlund David A. Hayes Simula Research Laboratory Simula Metropolitan Center for Digital Engineering 49 PUBLICATIONS 352 CITATIONS 31 PUBLICATIONS 394 CITATIONS SEE PROFILE SEE PROFILE Some of the authors of this publication are also working on these related projects: Inter-Network Quality of Service View project SCTP SmartSwitch – Smart Session Management for Multihomed SCTP View project All content following this page was uploaded by Bob Briscoe on 09 April 2016. The user has requested enhancement of the downloaded file. Preprint. To appear in IEEE Communications Surveys & Tutorials <http://www.comsoc.org/cst> Until published, please cite as: Briscoe, B., Brunstrom, A., Petlund, A., Hayes, D., Ros, D., Tsang, I.-J., Gjessing, S., Fairhurst, G., Griwodz, C. & Welzl, M., ”Reducing Internet Latency: A Survey of Techniques and their Merits,” IEEE Communications Surveys & Tutorials (2014) (To appear) c 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. 1 Reducing Internet Latency: A Survey of Techniques and their Merits Bob Briscoe1, Anna Brunstrom2, Andreas Petlund3, David Hayes4, David Ros5,3, Ing-Jyh Tsang6, Stein Gjessing4, Gorry Fairhurst7, Carsten Griwodz3, Michael Welzl4 1BT, UK 2Karlstad University, Sweden 3Simula Research Laboratory AS, Norway 4University of Oslo, Norway 5Institut Mines-Tel´ ecom´ / Tel´ ecom´ Bretagne, France 6Alcatel-Lucent Bell-Labs, Belgium 7University of Aberdeen, UK Latency is increasingly becoming a performance bottleneck for Internet Protocol (IP) networks, but historically networks have been designed with aims of maximizing throughput and utilization. This article offers a broad survey of techniques aimed at tackling latency in the literature up to August 2014, and their merits. A goal of this work is to be able to quantify and compare the merits of the different Internet latency reducing techniques, contrasting their gains in delay reduction versus the pain required to implement and deploy them. We found that classifying techniques according to the sources of delay they alleviate provided the best insight into the following issues: 1) the structural arrangement of a network, such as placement of servers and suboptimal routes, can contribute significantly to latency; 2) each interaction between communicating endpoints adds a Round Trip Time (RTT) to latency, especially significant for short flows; 3) in addition to base propagation delay, several sources of delay accumulate along transmission paths, today intermittently dominated by queuing delays; 4) it takes time to sense and use available capacity, with overuse inflicting latency on other flows sharing the capacity; and 5) within end systems delay sources include operating system buffering, head-of-line blocking, and hardware interaction. No single source of delay dominates in all cases, and many of these sources are spasmodic and highly variable. Solutions addressing these sources often both reduce the overall latency and make it more predictable. Index Terms—Data communication, networks, Internet, performance, protocols, algorithms, standards, cross-layer, comparative evaluation, taxonomy, congestion control, latency, queuing delay, bufferbloat I. INTRODUCTION between benefit and cost (‘gain vs. pain’). The benefits of any technique are highly scenario-dependent, so we carefully ANY, if not most, Internet Protocol (IP) networks and chose a set of scenario parameters that would be amenable to M protocols have traditionally been designed with opti- visual comparison across an otherwise complex space. mization of throughput or link utilization in mind. Such a focus on “bandwidth” may well be justified for bulk-data transfer, or more generally for applications that do not require timeliness A. Importance of latency to applications in their data delivery. However, nowadays the quality of experience delivered by many applications depends on the Latency is a measure of the responsiveness of an applica- delay to complete short data transfers or to conduct real-time tion; how instantaneous and interactive it feels, rather than conversations, for which adding bandwidth makes little or no sluggish and jerky. In contrast to bandwidth, which is the rate difference. As a result, latency in the current Internet has been at which bits can be delivered, latency is the time it takes for gaining visibility as a truly critical issue that impairs present- a single critical bit to reach the destination, measured from day applications, and that may hinder the deployment of new when it was first required. This definition may be stretched ones. It is therefore important to: (a) understand the root causes for different purposes depending on which bit is ‘critical’ for of latency, and (b) assess the availability of solutions, deployed different applications, the main categories being: or not, and their expected contribution to lowering end-to-end 1) Real-time interaction, where every ‘chunk’ of data pro- latency. This paper seeks to address these questions. We offer a duced by an end-point is unique and of equal importance broad survey of techniques aimed at tackling Internet latency and needs to be delivered as soon as possible, for example up to August 2014, classifying the techniques according to an on-line game, or an interactive video conference (the the sources of delay that they address, i.e. where delays ‘critical bit’ is therefore the last bit of each ‘chunk’). arise along the communications chain. To decide on the best 2) Start-up latency, where the time to begin a service is most classification system, we tried a number of alternative systems: important, as at the start of a video stream (the ‘critical classifying by sources of delay was the easiest to understand bit’ is the first bit of data). and led to the fewest gaps and least overlap. We also attempt 3) Message completion time, where the time to complete to quantify the merits of a selection of the most promising a whole (often small) transmission is most important, techniques. We decided to focus on reduction in delay and for example downloading Javascript code to start an ease of deployment, which loosely represent the main tradeoff application (the ‘critical bit’ is the last bit of the message). 2 Fig. 1. Waterfall diagram showing the timing of download of an apparently uncluttered example Web page (ieeexplore.ieee.org), actually comprising over one hundred objects, transferred over 23 connections needing 10 different DNS look-ups. The horizontal scale is in seconds. This access was from Stockholm, Sweden, over a 28ms RTT 5 Mb/s down 1 Mb/s up cable access link, using Internet Explorer v8 without any prior cache warming. Source: www.webpagetest.org An important characteristic of latency is that it is additive the artificially introduced delay was removed, it took a similar in nature and accumulates over the communication session or period to linearly regain the original demand. These results application task. Distributed systems involving machine to ma- were presented in a joint Microsoft-Google presentation on chine interactions, e.g. Web services, consist of long sequences the value of reducing Web delay [1]. Google’s VP for search of automated interactions in between each human intervention. pointed out that if Google’s experiment had been conducted on Therefore even slight unnecessary delay per transfer adds up to their whole customer base, losing 0.75% of their 2009 revenue considerable overall delay. For instance, Fig. 1 shows the con- would have lost them $75M for the year [2]. nections involved in downloading an apparently uncluttered Certain applications suffer more when there is a large varia- Web page (ieeexplore.ieee.org). This unremarkable example is tion in latency (jitter). This includes time-stepped applications fairly typical of many Web pages. Closer examination shows such as voice or applications with real-time interaction, such that the critical path of serial dependencies consists of about as on-line games [3]. In general, latency is characterized by its half a dozen short TCP connections, each starting with a 3-way distribution function, and the relative importance of the higher handshake and each preceded by a DNS look-up, adding up order moments is application dependent. to at least six back-and-forth messages each, and totalling nearly forty transfers in series. It might be considered that B. Scope delays up to say 50 ms are so close to the bounds of human perception that they are not worth removing. However, adding We restrict our scope to generic techniques that are each 40 × 50 ms would delay completion of this example page applicable to a wide range of ways the Internet could be by about 2 seconds. Experiencing such unnecessary delay on used in its role as a public network. Still, a few promising every click during a browsing session makes the experience techniques currently applicable only in private networks are unnecessarily intermittent and unnatural. included when we see that they may be adapted to, or inspire solutions for, the public Internet. We also draw a In 2009 a team from Microsoft found that artificially in- fairly arbitrary line to rule out more specialist techniques. For troducing 500 ms extra delay in the response from the Bing instance, we include the delay that certain applications (e.g. search engine translated to 1.2% less advertising revenue.
Recommended publications
  • Hotspot Download Torrent the Beginner’S Guide to Hotspot Shield Torrent VPN
    hotspot download torrent The Beginner’s Guide to Hotspot Shield Torrent VPN. In this article, you would see the role of VPN in torrents and their proliferation and the various solutions to help along the way. You might have heard of the term "torrent" online and wondered what it had to do with digital content distribution. Other than the nerdy ways computer scientists name things, the word "torrent" does have similarities with fast-moving streams, and services like Hotspot Shield Torrent VPN helps you navigate the technology. In its basic form, a torrent or torrent file is a computer file that holds the metadata to different information types. The peculiar thing about the technology is that it doesn't contain real data, only pointers and indexes. Then, specialized software (BitTorrent) would use these pointers to reach the actual data. In this article, you would see the role of VPN in torrents and their proliferation and the various solutions to help along the way. What is Hotspot Shield and Torrent? Hotspot Shield torrent VPN is a service that allows you to encrypt your connections as you torrent files on the internet. It also allows you to stream geo-restricted digital content without giving away location data. While Hotspot Shield torrent VPN is one of the many options on the market, it distinguishes itself in speed. It delivers enough speed. You need Hotspot Shield VPN for torrenting , so you don't have to deal with high latency when downloading or accessing a torrent file. There are other formidable options to Hotspot Shield torrent VPN as well, such as VPN Vault.
    [Show full text]
  • MECHA Controller C1 (MECHA) Works in Two Network Modes: Access Point to Force MECHA in AP Mode (When It Was Previously in Station Mode), During (AP) Or Station (STA)
    Web Control Interface and Firmware Update MECHA WWW WWW WWW Controller C1 WWW WWW WWW Firmware Server Reference Manual Support Forum: www.nodalninja.com/forum Video Tutorials: www.youtube.com/nodalninja URLs in the hyperlinks are listed in the Reference section in P7. Their QR codes are also shown. Each URL is EN [1] Version 0.1 (Aug 2019) indexed with a superscript number in a bracket, eg . Accessing the Web Control Interface and Firmware Update Access Point (AP) Mode Versus Station (STA) Mode MECHA Controller C1 (MECHA) works in two network modes: Access Point To force MECHA in AP mode (when it was previously in station mode), during (AP) or Station (STA). AP mode allows it to create its own network and have MECHA powering up, when LEDs show - = - = - = - = splitting lights, press up to 5 devices to connect to it. STA mode allows it to connect to a Wi-Fi button [1] for about 3 seconds until you hear a beep. network (eg one created by your wireless router), acting as a client. MECHA as a Station Out of box, MECHA works in AP mode. Since it does not have a wireless modem, it does not have Internet access. A device connected to it may also MECHA connects to an AP or a hotspot. The hotspot server or other stations lose Internet access. in the same network can connect to MECHA by using its IP, the sta_ip. If the hotspot has Internet access, all the connected stations gain Internet access. MECHA as an Access Point This is the recommended mode when the controlling device needs Internet Stations access.
    [Show full text]
  • 160+ 300+ 25+ 50% 20%
    20% 160+ 25+ + 60% 50% 300 ATTENDEES FROM ATTENDEES FROM UNIQUE COUNTRIES ATTENDEES CXO AND ATTENDEES TECHNOLOGY OPERATORS ORGANISATIONS REPRESENTED EXECUTIVE LEVEL PROVIDERS Next Gen Wi-Fi (Wi-Fi 6) for Carriers, Cities & Enterprise Outstanding User Experience with Next Gen Wi-Fi; the marriage of Wi-Fi 6 and PasspointTM Accelerating Adoption of Next Gen 22 - 23 MAY 2019 Wi-Fi in the Enterprise Market, for High Density Venues Wi-Fi Delivering a New Wave of Broadband and IoT Connectivity Options for Cities Ecosystem DIAMOND SPONSORS: ATLANTA MARRIOTT MARQUIS | ATLANTA, USA: 22 – 23 MAY 2019 “Very productive and wide-ranging conference. A “must” for “An excellent event to learn, influence, and meet anyone whose business is in wireless services.” - Accuris Networks professionals from the wireless industry.” - Google “An excellent networking opportunity with high quality professionals from the Wi-Fi ecosystem.” - Semtech “Privileged to be the part of Wi-Fi Revolution.” - C-DOT KEY HIGHLIGHTS Power of Wi-Fi in the 5G era RAN Convergence with Wi-Fi in the 5G Era - Will 5G eat Wi-Fi’s lunch? The answer is of course no – and we share - What are the key changes and impacts occurring in the wireless the reasons why ecosystem over the next 2-5 years - Exploring the massive opportunities for Wi-Fi and the immediate next - RAN convergence will lead to a better user experience and create new steps that should be considered business opportunities for both Wi-Fi and cellular providers - New capabilities and standards for Wi-Fi will drive engagement and
    [Show full text]
  • In the United States District Court for the District of Delaware
    Case 1:19-cv-00610-UNA Document 1 Filed 03/29/19 Page 1 of 17 PageID #: 1 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF DELAWARE WILMERDING COMMUNICATIONS LLC, Civil No. ________________ Plaintiff, v. CONNECTIFY, INC., Defendant. COMPLAINT FOR PATENT INFRINGEMENT Plaintiff Wilmerding Communications LLC (“Wilmerding”) files this Complaint against Defendant, Connectify, Inc. (“Connectify”), and alleges as follows: NATURE OF ACTION 1. This is a civil action for patent infringement arising under 35 U.S.C. §§ 1, et seq. Wilmerding seeks damages and injunctive relief as provided in 35 U.S.C. §§ 281, 283-285. THE PARTIES 2. Wilmerding is a limited liability company organized and existing under the laws of the State of Delaware, with its principal place of business at 9737 Great Hills Trail, Suite 260, Austin, Texas 78759. 3. On information and belief, Defendant Connectify, Inc., is a company organized under the laws of Delaware, with its principal place of business at 1429 Walnut St., Suite 201, Philadelphia, PA 19102. JURISDICTION AND VENUE 4. This Court has subject matter jurisdiction based on applicable statutory provisions, including 28 U.S.C. §§ 1331 and 1338(a), because this action arises under the patent Case 1:19-cv-00610-UNA Document 1 Filed 03/29/19 Page 2 of 17 PageID #: 2 laws of the United States, 35 U.S.C. §§ 1, et seq. 5. This Court has general and specific personal jurisdiction over Connectify. Connectify resides in this District and solicits and transacts business in this District on a regular basis. Furthermore, on information and belief, Connectify has committed and continues to commit acts of patent infringement in this District, as set forth below.
    [Show full text]
  • Connectify Corporate Backgrounder
    Press Contact Jessica Fitzgerald [email protected] (215) 285 8440 Connectify Corporate Backgrounder Connectify develops innovative consumer applications that let you do more with your Internet connections. In 2009, the Connectify founders were at a domestic Army base demonstrating that you could drive a full-sized Humvee from miles away using our proprietary wireless network. It was a fantastic demonstration, but the team spent the day passing USB thumb drives back- and-forth to transfer files because only one of us had a 3G card to connect to the Internet. After a hard day’s work, the team returned to the hotel to find that each one of the Connectify team members were being charged to access Wi-Fi and for each device connected to the hotel’s network. The frustration with the state of wireless networking finally boiled over, and Connectify Hotspot was born. With Connectify Hotspot, users can easily turn their PC into a real Wi-Fi hotspot, sharing any available Internet connection with smartphones, tablets, other laptops, and even with nearby friends. Since 2010, Connectify Hotspot software has had over 100 million downloads. Connectify Hotspot has become an essential app for people all over the world, and is increasingly vital for folks getting online in countries like Cuba, where Internet access is extremely limited and the crowded networks have unreliable connections. The Connectify team is passionate about making complex networking technology faster and more reliable. People all over the world are dependent on the Internet for nearly everything, which is why a slow or unreliable connection feels like a total nightmare.
    [Show full text]
  • The Wireless Data Drain of Users, Apps, & Platforms
    The wireless data drain of users, apps, & platforms Ardalan Amiri Saniy, Zhiyong Tany, Peter Washingtony, Mira Cheny, Sharad Agarwalz, Lin Zhongy, Ming Zhangz yRice University, zMicrosoft Research yfardalan, zt1, pyw1, sc25, [email protected], zfsagarwal, [email protected] Cellular data consumption is an important issue for users and network operators. However, little is understood about data consumption differences between similar apps, smartphone platforms, and different classes of users. We examine data consumption behavior in the lab, comparing different apps of the same category, comparing the same top apps across different platforms, and comparing network APIs that apps use across different platforms. We also collect data from 387 Android users in India, where users pay for cellular data consumed, with little prevalence of unlimited data plans. Our findings can inform users on how their choice of platform and apps has a drastic impact on their data bill. Our findings can also inform operators on how to use incentives to induce desired data consumption. I. Introduction compare different apps and different smartphone plat- On cellular networks, smartphone data usage can eas- forms. We examine top apps that provide the same ily outstrip available capacity. Cellular operators tend functionality (weather forecasts). We examine pop- to deal with this problem by applying economic pres- ular apps written by professional developers that are sure on users. Unlimited data plans are being replaced available on all of the three major smartphone plat- with either tiered data plans or “unlimited” plans that forms. We exercise individual network APIs on these throttle data rates beyond a certain usage limit, both three platforms.
    [Show full text]
  • Wifi Direct Access Point App
    Wifi Direct Access Point App Possible and stand-by Fergus kittling some screens so dubitatively! Kenny seen his conchie medicated skippingly or north after Courtney andalloy sexualizes and prettify her enormously, unlikelihoods. gluttonous and halftone. Chauncey often Jacobinising inexplicably when unequable Tobias tooth notedly Start with the wifi direct access card by any networking infrastructure mode in the harmony express app for the router was the tv Can't reach internet via wifi when wifi-direct printer is. Minecraft is unusual but today, digital files across the wifi direct access point app that. The Wi-Fi peer-to-peer P2P APIs allow applications to listen to nearby devices without needing to connect back a stall or hotspot. What is WiFi Direct in Windows 10 SoftwareKeep. I think strong-ap might be cold to mind all my uses if both ends support it Wi-Fi Direct MultiChat aka Pigeon Messenger is a demo Android's application that. Win10 How you enable WiFi Direct and tile the password. You only text one WiFi adapter so long only can either aim to a hotspot or. Roku Direct Wifi Password Nerudova. At no mode do you side to bash your Wi-Fi passphrase into our remote down as the connection process happens automatically Other Uses for. How is Connect a Wireless Printer PCMag. Connecting Directly Access edit Mode Canon MF746Cx. For the purposes of no peer-to-peer app service discovery is likely useful. Wi-Fi Direct require a function that connects Wi-Fi devices directly without a wireless LAN router access point When does use the Wi-Fi Direct-compatible BRAVIA TV.
    [Show full text]
  • Combine and Improve Internet Connections on Linux and Raspberry Pi with Speedify
    Combine and Improve Internet Connections on Linux and Raspberry Pi with Speedify PHILADELPHIA, August 8, 2019 — Connectify, Inc. is excited to announce version 8 of Speedify, the company’s flagship bonding VPN service. Unlike other VPNs, Speedify combines two or more Internet connections at once on your computer and mobile device. It’s the perfect tool for live streamers, online gamers, reporters, travelers, and anybody who needs a reliable, fast, and secure Internet connection. Speedify 8 brings support for Linux, including a wide variety of devices, from computers to the hot new Raspberry Pi 4 Model B. Previously available only for internal testing purposes and limited beta testing, Speedify for Linux now fully supports any Debian based operating system, including Ubuntu, Linux Mint, and Raspbian Linux. Speedify for Linux also includes scripts to easily share a bonded VPN connection from your Linux machine to your other devices. You get stable, fast and secure Internet anywhere - at home, while traveling, or on the go. “We listened to our users’ feedback and created the perfect tool for bonding Internet connections on Linux machines. Everyone using the Internet for streaming, gaming, or trading on the go can now add weightless bonding router capabilities on Raspberry Pi or other Linux based machines in their backpack,” says Alex Gizis, CEO. “There’s no need to buy expensive multi-thousand dollars bonding hardware now, when you can get Speedify at only a fraction of the cost.” And that’s not all, Speedify 8 is also accompanied by a brand new Python API available on GitHub. This lets Windows, macOS, and Linux users interact and control Speedify from their programs and scripts.
    [Show full text]
  • How to Turn Your Laptop Into a Wi-Fi Hotspot
    HANDSON How To Turn Your Laptop Into A Wi-Fi Hotspot There are ways to create an ad-hoc network from your laptop when connected to the internet, but they usually involve multiple steps. We present a one-click solution to convert your laptop into a WiFi hotspot and bring data connectivity to all your devices! — Srinivasan Viswanathan hile most smartphones nowadays offer the capability to tether their 3G data connection to other devices, laptops need extensive Wsetup through the Windows control panel to share their data connection. But fret not! Connectify Hotspot is here to save the day. Connectify is a free software that runs in the taskbar, and can be set up in just a few minutes, and can configure and launch a Wi-Fi hotspot really fast! Here is a short tutorial on how to set it up: 1) Download Connectify Lite Version Download the free version of Connectify for initial setup from http://bit.ly/YVoFIn. There is a pro version as well, which starts from a 1-year subscription at Rs 1,717. The pro version has some useful features, such as the sharing of 3G/4G from a mobile broadband card, and wirelessly “flinging” files from one system to another. 2) Install Connectify Lite Version You can install the software within a couple of seconds with the typical “next-next-next” setup process. 3) Set Up Connectify Connectify will run in the Windows toolbar once it is running. There are some ads at the bottom, but we did can manage and view devices that are connected to your not find them intrusive as such.
    [Show full text]
  • Connectify Hotspot Max Lifetime Crack
    Connectify Hotspot Max Lifetime Crack Connectify Hotspot Max Lifetime Crack 1 / 3 2 / 3 Connectify Hotspot Pro Crack Lifetime Free With Product Keys: Connectify Hotspot Pro Crack 2020 With [100% Working] License Key.. Connectify pro edition can simulate the data to MAX, transform, joint the Wi-Fi, and 4G internet connections. Connectify Hotspot Pro 2020 a .... (Connectify hotspot PRO or Max 2017 Crack). ... download for windows 10 2017 7 with crack filehippo .exe 8 license key and dispatch 64 bit 32 + lifetime bundle .... Finding Connectify Hotspot Pro Crack? If yes then you are in the correct place you will be get download link of Connectify Hotspot Crack Pro.. With Connectify Hotspot, you can transform your PC. ... Connectify Hotspot 2020 Crack ... Get PRO or MAX to unlock unlimited file flings.. Feb 7, 2019 - Connectify Hotspot Pro Crack is the best facility to connect your further devices to same internet service source for use.. Learn more about Connectify Hotspot's great premium features including, 3G/4G Sharing, WiFi Repeater Mode, ... Upgrade to Hotspot PRO or MAX Lifetime.. Connectify Hotspot Crack + License Key Free Download [Updated] ... Share your internet connection using wifi-hotspot Hotspot Shield Lifetime Crack. ... Connectify Hotspot Pro 2020 MAX is the only true Wi-Fi Repeater .... [FULL VERSION]. Get a fully functional version of Connectify Hotspot completely free. No need to deal with cracks, torrents, and adware. This is the .... Connectify Hotspot 2015 Crack is very famous and well known application available which work as a virtual router for your computer and other devices.. Connectify Hotspot Pro 2016 License Key + Full Crack Free Download Connectify… ..
    [Show full text]