skip to main content
research-article

A Causal Approach to the Study of TCP Performance

Published: 14 December 2015 Publication History

Abstract

Communication networks are complex systems whose operation relies on a large number of components that work together to provide services to end users. As the quality of these services depends on different parameters, understanding how each of them impacts the final performance of a service is a challenging but important problem. However, intervening on individual factors to evaluate the impact of the different parameters is often impractical due to the high cost of intervention in a network. It is, therefore, desirable to adopt a formal approach to understand the role of the different parameters and to predict how a change in any of these parameters will impact performance.
The approach of causality pioneered by J. Pearl provides a powerful framework to investigate these questions. Most of the existing theory is non-parametric and does not make any assumption on the nature of the system under study. However, most of the implementations of causal model inference algorithms and most of the examples of usage of a causal model to predict intervention rely on assumptions such linearity, normality, or discrete data.
In this article, we present a methodology to overcome the challenges of working with real-world data and extend the application of causality to complex systems in the area of telecommunication networks, for which assumptions of normality, linearity and discrete data do no hold. Specifically, we study the performance of TCP, which is the prevalent protocol for reliable end-to-end transfer in the Internet. Analytical models of the performance of TCP exist, but they take into account the state of network only and disregard the impact of the application at the sender and the receiver, which often influences TCP performance. To address this point, we take as application the file transfer protocol (FTP), which uses TCP for reliable transfer. Studying a well-understood protocol such as TCP allows us to validate our approach and compare its results to previous studies.
We first present and evaluate our methodology using TCP traffic obtained via network emulation, which allows us to experimentally validate the prediction of an intervention. We then apply the methodology to real-world TCP traffic sent over the Internet. Throughout the article, we compare the causal approach for studying TCP performance to other approaches such as analytical modeling or simulation and and show how they can complement each other.

Supplementary Material

a25-hours-apndx.pdf (hours.zip)
Supplemental movie, appendix, image and software files for, A Causal Approach to the Study of TCP Performance

References

[1]
D. W. K. Andrews and M. Buchinsky. 2001. Evaluation of a three-step method for choosing the number of bootstrap repetitions. Journal of Econometrics 103, 1--2 (July 2001), 345--386.
[2]
J. Audrius, L. Jukka-Pekka, H. Matti, and W. Alf Inge. 2011. An empirical study of NetEm network emulation functionalities. In ICCCN. IEEE, 1--6.
[3]
G. Borboudakis and I. Tsamardinos. 2012. Incorporating causal prior knowledge as path-constraints in bayesian networks and maximal ancestral graphs. ArXiv e-prints (June 2012).
[4]
C. Chow and C. Liu. 1968. Approximating discrete probability distributions with dependence trees. IEEE Transactions on Information Theory 14, 3 (May 1968), 462--467.
[5]
A. C. Davison and D.V. Hinkley. 1997. Bootstrap Methods and their Application. Cambridge University Press.
[6]
M. Dischinger, A. Mislove, A. Haeberlen, and K. P. Gummadi. 2008. Detecting bittorrent blocking. In Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement (IMC’08). ACM, 3--8.
[7]
T. En-Najjary and G. Urvoy-Keller. 2006. PPrate: A passive capacity estimation tool. In E2EMON. 82--89.
[8]
P. Ford, A. Shelest, and N. Srinivas. 2002. Method for automatic tuning of TCP receive window. (Aug. 15 2002). US Patent App. 09/736,988.
[9]
S. Fortin-Parisi and B. Sericola. 2004. A Markov model of TCP throughput, goodput and slow start. Performance Evaluation 58, 2+3 (Nov. 2004), 89--108.
[10]
FreeBSD. 2009. FreeBSD File Formats Manual. Retrieved from http://www.freebsd.org/cgi/man.cgi?query=tar.
[11]
A. Gretton, K. Fukumizu, C. H. Teo, L. Song, B. Schölkopf, and A. J. Smola. 2007. A kernel statistical test of independence. In NIPS. Curran Associates, Inc.
[12]
N. Handigol, B. Heller, V. Jeyakumar, B. Lantz, and N. McKeown. 2012. Reproducible network experiments using container-based emulation. In CoNEXT’12. ACM, New York, NY, 253--264.
[13]
H. Hours, E. Biersack, and P. Loiseau. 2014a. A causal study of an emulated network. In 10ème Atelier en Evaluation de Performances.
[14]
H. Hours, E. Biersack, and P. Loiseau. 2014b. Causal study of network performance. In ALGOTEL 2014, 16èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications.
[15]
P. O. Hoyer and A. Hyttinen. 2009. Bayesian discovery of linear acyclic causal models. In Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence (UAI’09). AUAI Press, Arlington, Virginia, 240--248.
[16]
P. Jaworski, F. Durante, W. K. Härdle, and T. Rychlik. 2010. Copula Theory and Its Applications. Springer.
[17]
I. Kaj and J. Olsén. 2001. Throughput modeling and simulation for single connection TCP-Tahoe. In ITC-I7. Teletraffic Science and Engineering, Vol. 4. Elsevier, 705--718.
[18]
M. Kalisch, M. Mächler, D. Colombo, M. H. Maathuis, and P. Bühlmann. 2012. Causal inference using graphical models with the R package pcalg. Journal of Statistical Software 47, 11 (2012), 1--26.
[19]
M. Koivisto. 2006. Advances in exact Bayesian structure discovery in Bayesian networks. In UAI.
[20]
M. Koivisto and K. Sood. 2004. Exact Bayesian structure discovery in Bayesian networks. Journal of Machine Learning Research 5 (Dec. 2004), 549--573.
[21]
J. F. Kurose and K. W. Ross. 2009. Computer Networking: A Top-Down Approach (5th ed.). Addison-Wesley.
[22]
B. Lantz, B. Heller, and N. McKeown. 2010. A network in a laptop: Rapid prototyping for software-defined networks. In Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks (Hotnets-IX). ACM, New York, NY, Article 19, 6 pages.
[23]
P. Loiseau, P. Gonçalves, J. Barral, and P. Vicat-Blanc Primet. 2010. Modeling TCP throughput: An elaborated large-deviations-based model and its empirical validation. In Proceedings of IFIP Performance.
[24]
M. Mathis, J. Heffner, and R. Reddy. 2003. Web100: Extended TCP instrumentation for research, education and diagnosis. Computer Communication Review 33, 3 (2003), 69--79.
[25]
D. C. Maxwell. 2002. Learning equivalence classes of Bayesian-network structures. Journal of Machine Learning Research 2 (March 2002), 445--498.
[26]
C. Meek. 1995. Causal inference and causal explanation with background knowledge. In Proceedings of the 11th Conference on Uncertainty in Artificial Intelligence (UAI’95). Morgan Kaufmann, San Francisco, CA, 403--410.
[27]
M. Mellia, R. Lo Cigno, and F. Neri. 2005. Measuring IP and TCP behavior on edge nodes with Tstat. Computer Networks 47, 1 (Jan. 2005), 1--21.
[28]
M. Mirza, J. Sommers, P. Barford, and X. Zhu. 2007. A machine learning approach to TCP throughput prediction. In SIGMETRICS’07. ACM, New York, NY, 97--108.
[29]
K. P. Murphy. 2001. The Bayes net toolbox for MATLAB. Computing Science and Statistics 33 (2001), 2001.
[30]
M. Nagode and M. Fajdiga. 2011. The REBMIX algorithm for the univariate finite mixture estimation. Communications in Statistics - Theory and Methods 40, 5 (2011), 876--892.
[31]
J. Padhye, V. Firoiu, D. Towsley, and J. Kurose. 1998. Modeling TCP throughput: A simple model and its empirical validation. SIGCOMM Computer Communication Review 28, 4 (Oct. 1998), 303--314.
[32]
J. Pearl. 1988. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, San Francisco, CA.
[33]
J. Pearl. 2009. Causality: Models, Reasoning and Inference. Cambridge University Press, New York, NY, USA.
[34]
J. Pearl. 2013. Direct and indirect effects. CoRR abs/1301.2300 (2013).
[35]
J. Ramsey. 2014. A scalable conditional independence test for nonlinear, non-Gaussian data. CoRR abs/1401.5031 (2014).
[36]
J. D. Ramsey, S. J. Hanson, C. Hanson, Y. O. Halchenko, R. A. Poldrack, and C. Glymour. 2010. Six problems for causal inference from fMRI. Neuroimage 49, 2 (2010), 1545--1558.
[37]
S. M. H. Shah, A. u. Rehman, A. N. Khan, and M. A. Shah. 2007. TCP throughput estimation: A new neural networks model. In Proceedings of the International Conference on Emerging Technologies (ICET’07). 94--98.
[38]
M. Siekkinen, E. W. Biersack, G. Urvoy-Keller, V. Goebel, and T. Plagemann. 2005. InTraBase: Integrated traffic analysis based on a database management system. In E2EMON. IEEE, 32--46.
[39]
M. Siekkinen, G. Urvoy-Keller, E. W. Biersack, and D. Collange. 2008. A root cause analysis toolkit for TCP. Computer Networks 52, 9 (2008), 56.
[40]
B. Sikdar, S. Kalyanaraman, and K. S. Vastola. 2001. Analytic models for the latency and steady-state throughput of TCP Tahoe, Reno and SACK. In Proceedings of the IEEE GLOBECOM. 25--29.
[41]
P. Spirtes and C. Glymour. 1991. An algorithm for fast recovery of sparse causal graphs. Social Science Computer Review 9, 1 (1991), 62--72.
[42]
P. Spirtes, C. Glymour, and R. Scheines. 2001. Causation, Prediction, and Search (second ed.). MIT Press, Cambridge, MA, USA.
[43]
P. Spirtes, C. Meek, and T. Richardson. 1995. Causal inference in the presence of latent variables and selection bias. In Proceedings of 11th Conference on Uncertainty in Artificial Intelligence. Morgan Kaufmann, 499--506.
[44]
M. Tariq, M. Motiwala, N. Feamster, and M. Ammar. 2009. Detecting network neutrality violations with causal inference. In CoNEXT. ACM, 289--300.
[45]
M. Tariq, A. Zeitoun, V. Valancius, N. Feamster, and M. Ammar. 2008. Answering what-if deployment and configuration questions with wise. In SIGCOMM’08. ACM, New York, NY, USA, 99--110.
[46]
B. Thomas, R. Jurdak, and I. Atkinson. 2012. SPDYing up the web. Commun. ACM 55, 12 (Dec. 2012), 64--73.
[47]
R. Tillman, A. Gretton, and P. Spirtes. 2009. Nonlinear directed acyclic structure learning with weakly additive noise models. In Advances in Neural Information Processing Systems (NIPS).
[48]
M. E. Tipping. 2001. Sparse bayesian learning and the relevance vector machine. Journal of Machine Learning Research 1 (2001), 211--244.
[49]
M. Voortman and M. J. Druzdzel. 2008. Insensitivity of constraint-based causal discovery algorithms to violations of the assumption of multivariate normality. In Proceedings of the FLAIRS Conference. AAAI Press, 690--695.
[50]
K. Winstein and H. Balakrishnan. 2013. Tcp ex machina: Computer-generated congestion control. In ACM SIGCOMM Computer Communication Review, Vol. 43. 123--134.
[51]
K. Zhang, J. Peters, D. Janzing, and B. Schölkopf. 2012. Kernel-based conditional independence test and application in causal discovery. CoRR abs/1202.3775 (2012).
[52]
Y. Zhang, L Breslau, V. Paxson, and S. Shenker. 2002. On the characteristics and origins of internet flow rates. In Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM’02). ACM, 309--322.

Cited By

View all
  • (2024)Causal AI for XRPL/GossipSub network configuration2024 20th International Conference on Network and Service Management (CNSM)10.23919/CNSM62983.2024.10814382(1-5)Online publication date: 28-Oct-2024
  • (2023)Veritas: Answering Causal Queries from Video Streaming TracesProceedings of the ACM SIGCOMM 2023 Conference10.1145/3603269.3604828(738-753)Online publication date: 10-Sep-2023
  • (2020)Conceptual Framework for Performance Analysis of TCP Implementation on Various Platforms2020 IEEE 7th International Conference on Engineering Technologies and Applied Sciences (ICETAS)10.1109/ICETAS51660.2020.9484276(1-3)Online publication date: 18-Dec-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Intelligent Systems and Technology
ACM Transactions on Intelligent Systems and Technology  Volume 7, Issue 2
Special Issue on Causal Discovery and Inference
January 2016
270 pages
ISSN:2157-6904
EISSN:2157-6912
DOI:10.1145/2850424
  • Editor:
  • Yu Zheng
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 December 2015
Accepted: 01 May 2015
Revised: 01 April 2015
Received: 01 January 2015
Published in TIST Volume 7, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. TCP
  2. Telecommunication networks

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Causal AI for XRPL/GossipSub network configuration2024 20th International Conference on Network and Service Management (CNSM)10.23919/CNSM62983.2024.10814382(1-5)Online publication date: 28-Oct-2024
  • (2023)Veritas: Answering Causal Queries from Video Streaming TracesProceedings of the ACM SIGCOMM 2023 Conference10.1145/3603269.3604828(738-753)Online publication date: 10-Sep-2023
  • (2020)Conceptual Framework for Performance Analysis of TCP Implementation on Various Platforms2020 IEEE 7th International Conference on Engineering Technologies and Applied Sciences (ICETAS)10.1109/ICETAS51660.2020.9484276(1-3)Online publication date: 18-Dec-2020
  • (2019)DeepComNetPerformance Evaluation10.1016/j.peva.2018.12.003130:C(1-16)Online publication date: 1-Apr-2019
  • (2018)A fine-grained response time analysis technique in heterogeneous environmentsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2017.11.006130:C(16-33)Online publication date: 15-Jan-2018
  • (2017)Performance Evaluation of Network Topologies using Graph-Based Deep LearningProceedings of the 11th EAI International Conference on Performance Evaluation Methodologies and Tools10.1145/3150928.3150941(20-27)Online publication date: 5-Dec-2017
  • (2016)Towards automatic performance optimization of networks using machine learning2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks)10.1109/NETWKS.2016.7751147(19-24)Online publication date: Sep-2016
  • (2016)A study of the impact of DNS resolvers on CDN performance using a causal approachComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2016.06.023109:P2(200-210)Online publication date: 9-Nov-2016

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media