Bufferbloat: Dark Buffers in the Internet
Sign in to YouTube
Sign in to YouTube
Sign in to YouTube
Uploaded on Jun 1, 2011
Google Tech Talk (more info below)
April 26, 3011
Presented by Jim Gettys.
VOIP and teleconferencing often perform much more poorly on today's Internet than the Internet of a decade ago, despite great gains in bandwidth. Lots of fiber, cheap memory, smart hardware, variability of wireless thoughput, changes in web browser behaviour, changes in TCP implementations, and a focus on benchmarking Internet performance solely by bandwidth, and engineer's natural reluctance to drop packets have conspired to encourage papering over problems by adding buffers; each of which may introduce latency when filled.
Buffering mistakes have been made in all technologies: operating
systems, home routers both wired and wireless, broadband equipment, corporate networks, 3G networks and parts of the core Internet itself. The mistaken quest to never drop packets has destroyed interactivity under load, and often results in actual higher packet loss, as TCP's congestion avoidance algorithms have been defeated by these buffers. The lessons of the "RED manifesto" of 1997 have been forgotten or never learned by a new generation of engineers.
Full solutions require careful queue management, and that management should be everywhere; we no longer have the luxury to think that this is a problem solely of Internet routers. I will describe some of the mitigations and solutions to this problem, and how you can at least make your home network and systems behave the way they should.
More info at www.bufferbloat.net
Slides available at http://mirrors.bufferbloat.net/Talks/...
Speaker Info: Jim Gettys, Bell Labs
Jim Gettys is well-known as one of the original developers of the X Window System, and has long been active in open source and internet standards. His recent experiences with immersive telepresence applications exposed systemic implementation errors
in many Internet buffer and queue designs. He describes the journey of discovery in this talk.
Blog at http://gettys.wordpress.com/
Standard YouTube License
- 1:13:54 Common Darknet Weaknessesby Adrian CrenshawFeatured 17,198
- 1:29:54 Think faster focus better and remember moreRewiring our brain to stay younger...by GoogleTechTalks 399,295 views
- 1:03:43 The Quantum Conspiracy: What Popularizers of QM Don't Want You to Knowby GoogleTechTalks 297,494 views
- 1:18:41 How to Write Clean, Testable Codeby GoogleTechTalks 68,674 views
- 40:40 Is Nuclear Waste Really Waste?by GoogleTechTalks 25,763 views
- 1:16:29 GTAC 2011: Keynote - How Hackers See Bugsby GoogleTechTalks 16,968 views
- 52:38 A JVM Does That?by GoogleTechTalks 43,675 views
- 1:21:53 Security Now 359: CODLing Our Buffersby twit 2,501 views
- 36:10 Building a More Efficient Ruby Interpreterby GoogleTechTalks 17,667 views
- 56:36 So You Want To Be A Programming Rock Star?by GoogleTechTalks 55,661 views
- 8:10 History Of The Internet (HD)by Jack Binns 30,222 views
- 1:28:56 The Net Delusion: The Dark Side of Internet Freedomby Open Society Foundations 1,143 views
- 1:30:11 Google Internet Summit 2009: Wireless and Sensor Technologyby GoogleTechTalks 62,037 views
- 56:59 Near-Optimal Parallel Join Processing in MapReduceby GoogleTechTalks 3,261 views
- 58:35 Engineering Data Analysis (with R and ggplot2)by GoogleTechTalks 28,576 views
- 46:19 Self-Publishing: A Googler's Journeyby GoogleTechTalks 5,402 views
- 1:00:47 Large-scale Image Classification: ImageNet and ObjectBankby GoogleTechTalks 4,907 views
- 57:51 "All Questions Answered" by Donald Knuthby GoogleTechTalks 43,571 views
- 1:00:50 Video Games and the Future of Learning (Jan Plass and Bruce Homer)by GoogleTechTalks 9,486 views
- Loading more suggestions...