{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:32:31Z","timestamp":1759073551201,"version":"3.41.0"},"reference-count":52,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2015,12,14]],"date-time":"2015-12-14T00:00:00Z","timestamp":1450051200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2016,1,22]]},"abstract":"<jats:p>Communication networks are complex systems whose operation relies on a large number of components that work together to provide services to end users. As the quality of these services depends on different parameters, understanding how each of them impacts the final performance of a service is a challenging but important problem. However, intervening on individual factors to evaluate the impact of the different parameters is often impractical due to the high cost of intervention in a network. It is, therefore, desirable to adopt a formal approach to understand the role of the different parameters and to predict how a change in any of these parameters will impact performance.<\/jats:p><jats:p>The approach of causality pioneered by J. Pearl provides a powerful framework to investigate these questions. Most of the existing theory is non-parametric and does not make any assumption on the nature of the system under study. However, most of the implementations of causal model inference algorithms and most of the examples of usage of a causal model to predict intervention rely on assumptions such linearity, normality, or discrete data.<\/jats:p><jats:p>In this article, we present a methodology to overcome the challenges of working with real-world data and extend the application of causality to complex systems in the area of telecommunication networks, for which assumptions of normality, linearity and discrete data do no hold. Specifically, we study the performance of TCP, which is the prevalent protocol for reliable end-to-end transfer in the Internet. Analytical models of the performance of TCP exist, but they take into account the state of network only and disregard the impact of the application at the sender and the receiver, which often influences TCP performance. To address this point, we take as application the file transfer protocol (FTP), which uses TCP for reliable transfer. Studying a well-understood protocol such as TCP allows us to validate our approach and compare its results to previous studies.<\/jats:p><jats:p>We first present and evaluate our methodology using TCP traffic obtained via network emulation, which allows us to experimentally validate the prediction of an intervention. We then apply the methodology to real-world TCP traffic sent over the Internet. Throughout the article, we compare the causal approach for studying TCP performance to other approaches such as analytical modeling or simulation and and show how they can complement each other.<\/jats:p>","DOI":"10.1145\/2770878","type":"journal-article","created":{"date-parts":[[2015,12,15]],"date-time":"2015-12-15T13:24:43Z","timestamp":1450185883000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["A Causal Approach to the Study of TCP Performance"],"prefix":"10.1145","volume":"7","author":[{"given":"Hadrien","family":"Hours","sequence":"first","affiliation":[{"name":"EURECOM, Biot Sophia Antipolis cedex, France"}]},{"given":"Ernst","family":"Biersack","sequence":"additional","affiliation":[{"name":"EURECOM, Biot Sophia Antipolis cedex, France"}]},{"given":"Patrick","family":"Loiseau","sequence":"additional","affiliation":[{"name":"EURECOM, Biot Sophia Antipolis cedex, France"}]}],"member":"320","published-online":{"date-parts":[[2015,12,14]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-4076(01)00047-1"},{"volume-title":"An empirical study of NetEm network emulation functionalities","author":"Audrius J.","key":"e_1_2_2_2_1","unstructured":"J. Audrius , L. Jukka-Pekka , H. Matti , and W. Alf Inge . 2011. An empirical study of NetEm network emulation functionalities .. In ICCCN. IEEE , 1--6. J. Audrius, L. Jukka-Pekka, H. Matti, and W. Alf Inge. 2011. An empirical study of NetEm network emulation functionalities.. In ICCCN. IEEE, 1--6."},{"key":"e_1_2_2_3_1","unstructured":"G. Borboudakis and I. Tsamardinos. 2012. Incorporating causal prior knowledge as path-constraints in bayesian networks and maximal ancestral graphs. ArXiv e-prints (June 2012). G. Borboudakis and I. Tsamardinos. 2012. Incorporating causal prior knowledge as path-constraints in bayesian networks and maximal ancestral graphs. ArXiv e-prints (June 2012)."},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1968.1054142"},{"key":"e_1_2_2_5_1","doi-asserted-by":"crossref","unstructured":"A. C. Davison and D.V. Hinkley. 1997. Bootstrap Methods and their Application. Cambridge University Press. A. C. Davison and D.V. Hinkley. 1997. Bootstrap Methods and their Application. Cambridge University Press.","DOI":"10.1017\/CBO9780511802843"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452523"},{"key":"e_1_2_2_7_1","doi-asserted-by":"crossref","unstructured":"T. En-Najjary and G. Urvoy-Keller. 2006. PPrate: A passive capacity estimation tool. In E2EMON. 82--89. T. En-Najjary and G. Urvoy-Keller. 2006. PPrate: A passive capacity estimation tool. In E2EMON. 82--89.","DOI":"10.1109\/E2EMON.2006.1651283"},{"key":"e_1_2_2_8_1","first-page":"988","article-title":"Method for automatic tuning of TCP receive window. (Aug. 15 2002)","volume":"09","author":"Ford P.","year":"2002","unstructured":"P. Ford , A. Shelest , and N. Srinivas . 2002 . Method for automatic tuning of TCP receive window. (Aug. 15 2002) . US Patent App. 09\/736 , 988 . P. Ford, A. Shelest, and N. Srinivas. 2002. Method for automatic tuning of TCP receive window. (Aug. 15 2002). US Patent App. 09\/736,988.","journal-title":"US Patent App."},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2004.07.016"},{"key":"e_1_2_2_10_1","unstructured":"FreeBSD. 2009. FreeBSD File Formats Manual. Retrieved from http:\/\/www.freebsd.org\/cgi\/man.cgi?query&equals;tar. FreeBSD. 2009. FreeBSD File Formats Manual. Retrieved from http:\/\/www.freebsd.org\/cgi\/man.cgi?query&equals;tar."},{"key":"e_1_2_2_11_1","unstructured":"A. Gretton K. Fukumizu C. H. Teo L. Song B. Sch\u00f6lkopf and A. J. Smola. 2007. A kernel statistical test of independence. In NIPS. Curran Associates Inc. A. Gretton K. Fukumizu C. H. Teo L. Song B. Sch\u00f6lkopf and A. J. Smola. 2007. A kernel statistical test of independence. In NIPS. Curran Associates Inc."},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413206"},{"key":"e_1_2_2_13_1","doi-asserted-by":"crossref","unstructured":"H. Hours E. Biersack and P. Loiseau. 2014a. A causal study of an emulated network. In 10\u00e8me Atelier en Evaluation de Performances. H. Hours E. Biersack and P. Loiseau. 2014a. A causal study of an emulated network. In 10\u00e8me Atelier en Evaluation de Performances.","DOI":"10.1109\/ITC.2015.9"},{"key":"e_1_2_2_14_1","volume-title":"ALGOTEL","author":"Hours H.","year":"2014","unstructured":"H. Hours , E. Biersack , and P. Loiseau . 2014b. Causal study of network performance . In ALGOTEL 2014 , 16\u00e8mes Rencontres Francophones sur les Aspects Algorithmiques des T\u00e9l\u00e9communications. H. Hours, E. Biersack, and P. Loiseau. 2014b. Causal study of network performance. In ALGOTEL 2014, 16\u00e8mes Rencontres Francophones sur les Aspects Algorithmiques des T\u00e9l\u00e9communications."},{"volume-title":"Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence (UAI\u201909)","author":"Hoyer P. O.","key":"e_1_2_2_15_1","unstructured":"P. O. Hoyer and A. Hyttinen . 2009. Bayesian discovery of linear acyclic causal models . In Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence (UAI\u201909) . AUAI Press, Arlington, Virginia, 240--248. P. O. Hoyer and A. Hyttinen. 2009. Bayesian discovery of linear acyclic causal models. In Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence (UAI\u201909). AUAI Press, Arlington, Virginia, 240--248."},{"key":"e_1_2_2_16_1","doi-asserted-by":"crossref","unstructured":"P. Jaworski F. Durante W. K. H\u00e4rdle and T. Rychlik. 2010. Copula Theory and Its Applications. Springer. P. Jaworski F. Durante W. K. H\u00e4rdle and T. Rychlik. 2010. Copula Theory and Its Applications. Springer.","DOI":"10.1007\/978-3-642-12465-5"},{"key":"e_1_2_2_17_1","volume-title":"Teletraffic Science and Engineering","volume":"4","author":"Kaj I.","unstructured":"I. Kaj and J. Ols\u00e9n . 2001. Throughput modeling and simulation for single connection TCP-Tahoe. In ITC-I7 . Teletraffic Science and Engineering , Vol. 4 . Elsevier, 705--718. I. Kaj and J. Ols\u00e9n. 2001. Throughput modeling and simulation for single connection TCP-Tahoe. In ITC-I7. Teletraffic Science and Engineering, Vol. 4. Elsevier, 705--718."},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v047.i11"},{"key":"e_1_2_2_19_1","unstructured":"M. Koivisto. 2006. Advances in exact Bayesian structure discovery in Bayesian networks. In UAI. M. Koivisto. 2006. Advances in exact Bayesian structure discovery in Bayesian networks. In UAI."},{"key":"e_1_2_2_20_1","article-title":"Exact Bayesian structure discovery in Bayesian networks","author":"Koivisto M.","year":"2004","unstructured":"M. Koivisto and K. Sood . 2004 . Exact Bayesian structure discovery in Bayesian networks . Journal of Machine Learning Research 5 ( Dec. 2004), 549--573. M. Koivisto and K. Sood. 2004. Exact Bayesian structure discovery in Bayesian networks. Journal of Machine Learning Research 5 (Dec. 2004), 549--573.","journal-title":"Journal of Machine Learning Research 5"},{"key":"e_1_2_2_21_1","volume-title":"Computer Networking: A Top-Down Approach","author":"Kurose J. F.","year":"2009","unstructured":"J. F. Kurose and K. W. Ross . 2009 . Computer Networking: A Top-Down Approach ( 5 th ed.). Addison-Wesley . J. F. Kurose and K. W. Ross. 2009. Computer Networking: A Top-Down Approach (5th ed.). Addison-Wesley.","edition":"5"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2010.08.016"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.957002"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1162\/153244302760200696"},{"key":"e_1_2_2_26_1","volume-title":"Proceedings of the 11th Conference on Uncertainty in Artificial Intelligence (UAI\u201995)","author":"Meek C.","year":"1995","unstructured":"C. Meek . 1995 . Causal inference and causal explanation with background knowledge . In Proceedings of the 11th Conference on Uncertainty in Artificial Intelligence (UAI\u201995) . Morgan Kaufmann, San Francisco, CA, 403--410. C. Meek. 1995. Causal inference and causal explanation with background knowledge. In Proceedings of the 11th Conference on Uncertainty in Artificial Intelligence (UAI\u201995). Morgan Kaufmann, San Francisco, CA, 403--410."},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.06.026"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254894"},{"key":"e_1_2_2_29_1","first-page":"2001","article-title":"The Bayes net toolbox for MATLAB","volume":"33","author":"Murphy K. P.","year":"2001","unstructured":"K. P. Murphy . 2001 . The Bayes net toolbox for MATLAB . Computing Science and Statistics 33 (2001), 2001 . K. P. Murphy. 2001. The Bayes net toolbox for MATLAB. Computing Science and Statistics 33 (2001), 2001.","journal-title":"Computing Science and Statistics"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1080\/03610920903480890"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/285243.285291"},{"volume-title":"Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann","author":"Pearl J.","key":"e_1_2_2_32_1","unstructured":"J. Pearl . 1988. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann , San Francisco, CA . J. Pearl. 1988. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, San Francisco, CA."},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1642718"},{"key":"e_1_2_2_34_1","volume-title":"Direct and indirect effects. CoRR abs\/1301.2300","author":"Pearl J.","year":"2013","unstructured":"J. Pearl . 2013. Direct and indirect effects. CoRR abs\/1301.2300 ( 2013 ). J. Pearl. 2013. Direct and indirect effects. CoRR abs\/1301.2300 (2013)."},{"key":"e_1_2_2_35_1","volume-title":"A scalable conditional independence test for nonlinear, non-Gaussian data. CoRR abs\/1401.5031","author":"Ramsey J.","year":"2014","unstructured":"J. Ramsey . 2014. A scalable conditional independence test for nonlinear, non-Gaussian data. CoRR abs\/1401.5031 ( 2014 ). J. Ramsey. 2014. A scalable conditional independence test for nonlinear, non-Gaussian data. CoRR abs\/1401.5031 (2014)."},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2009.08.065"},{"volume-title":"Proceedings of the International Conference on Emerging Technologies (ICET\u201907)","author":"Shah S. M. H.","key":"e_1_2_2_37_1","unstructured":"S. M. H. Shah , A. u. Rehman , A. N. Khan , and M. A. Shah . 2007. TCP throughput estimation: A new neural networks model . In Proceedings of the International Conference on Emerging Technologies (ICET\u201907) . 94--98. S. M. H. Shah, A. u. Rehman, A. N. Khan, and M. A. Shah. 2007. TCP throughput estimation: A new neural networks model. In Proceedings of the International Conference on Emerging Technologies (ICET\u201907). 94--98."},{"key":"e_1_2_2_38_1","doi-asserted-by":"crossref","unstructured":"M. Siekkinen E. W. Biersack G. Urvoy-Keller V. Goebel and T. Plagemann. 2005. InTraBase: Integrated traffic analysis based on a database management system. In E2EMON. IEEE 32--46. M. Siekkinen E. W. Biersack G. Urvoy-Keller V. Goebel and T. Plagemann. 2005. InTraBase: Integrated traffic analysis based on a database management system. In E2EMON. IEEE 32--46.","DOI":"10.1109\/E2EMON.2005.1564467"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.03.005"},{"volume-title":"Proceedings of the IEEE GLOBECOM. 25--29","author":"Sikdar B.","key":"e_1_2_2_40_1","unstructured":"B. Sikdar , S. Kalyanaraman , and K. S. Vastola . 2001. Analytic models for the latency and steady-state throughput of TCP Tahoe, Reno and SACK . In Proceedings of the IEEE GLOBECOM. 25--29 . B. Sikdar, S. Kalyanaraman, and K. S. Vastola. 2001. Analytic models for the latency and steady-state throughput of TCP Tahoe, Reno and SACK. In Proceedings of the IEEE GLOBECOM. 25--29."},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/089443939100900106"},{"key":"e_1_2_2_42_1","doi-asserted-by":"crossref","unstructured":"P. Spirtes C. Glymour and R. Scheines. 2001. Causation Prediction and Search (second ed.). MIT Press Cambridge MA USA. P. Spirtes C. Glymour and R. Scheines. 2001. Causation Prediction and Search (second ed.). MIT Press Cambridge MA USA.","DOI":"10.7551\/mitpress\/1754.001.0001"},{"volume-title":"Proceedings of 11th Conference on Uncertainty in Artificial Intelligence. Morgan Kaufmann, 499--506","author":"Spirtes P.","key":"e_1_2_2_43_1","unstructured":"P. Spirtes , C. Meek , and T. Richardson . 1995. Causal inference in the presence of latent variables and selection bias . In Proceedings of 11th Conference on Uncertainty in Artificial Intelligence. Morgan Kaufmann, 499--506 . P. Spirtes, C. Meek, and T. Richardson. 1995. Causal inference in the presence of latent variables and selection bias. In Proceedings of 11th Conference on Uncertainty in Artificial Intelligence. Morgan Kaufmann, 499--506."},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658972"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402971"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2380656.2380673"},{"key":"e_1_2_2_47_1","unstructured":"R. Tillman A. Gretton and P. Spirtes. 2009. Nonlinear directed acyclic structure learning with weakly additive noise models. In Advances in Neural Information Processing Systems (NIPS). R. Tillman A. Gretton and P. Spirtes. 2009. Nonlinear directed acyclic structure learning with weakly additive noise models. In Advances in Neural Information Processing Systems (NIPS)."},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1162\/15324430152748236"},{"volume-title":"Proceedings of the FLAIRS Conference. AAAI Press, 690--695","author":"Voortman M.","key":"e_1_2_2_49_1","unstructured":"M. Voortman and M. J. Druzdzel . 2008. Insensitivity of constraint-based causal discovery algorithms to violations of the assumption of multivariate normality . In Proceedings of the FLAIRS Conference. AAAI Press, 690--695 . M. Voortman and M. J. Druzdzel. 2008. Insensitivity of constraint-based causal discovery algorithms to violations of the assumption of multivariate normality. In Proceedings of the FLAIRS Conference. AAAI Press, 690--695."},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486020"},{"key":"e_1_2_2_51_1","unstructured":"K. Zhang J. Peters D. Janzing and B. Sch\u00f6lkopf. 2012. Kernel-based conditional independence test and application in causal discovery. CoRR abs\/1202.3775 (2012). K. Zhang J. Peters D. Janzing and B. Sch\u00f6lkopf. 2012. Kernel-based conditional independence test and application in causal discovery. CoRR abs\/1202.3775 (2012)."},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633055"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2770878","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2770878","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:56:12Z","timestamp":1750272972000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2770878"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,14]]},"references-count":52,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,1,22]]}},"alternative-id":["10.1145\/2770878"],"URL":"https:\/\/doi.org\/10.1145\/2770878","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"type":"print","value":"2157-6904"},{"type":"electronic","value":"2157-6912"}],"subject":[],"published":{"date-parts":[[2015,12,14]]},"assertion":[{"value":"2015-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-05-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-12-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}