{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T20:33:10Z","timestamp":1776889990173,"version":"3.51.2"},"reference-count":49,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T00:00:00Z","timestamp":1573171200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2019,11,8]]},"abstract":"<jats:p>The TCP Macroscopic Model will be completely obsolete soon. It was a closed form performance model for Van Jacobson's landmark congestion control algorithms presented at Sigcomm'88. Jacobson88 requires relatively large buffers to function as intended, while Moore's law is making them uneconomical.<\/jats:p>\n          <jats:p>BBR-TCP is a break from the past, unconstrained by many of the assumptions and principles defined in Jacobson88. It already out performs Reno and CUBIC TCP over large portions of the Internet, generally without creating queues of the sort needed by earlier congestion control algorithms. It offers the potential to scale better while using less queue buffer space than existing algorithms.<\/jats:p>\n          <jats:p>Because BBR-TCP is built on an entirely new set of principles, it has the potential to deprecate many things, including the Macroscopic Model. New research will be required to lay a solid foundation for an Internet built on BBR.<\/jats:p>","DOI":"10.1145\/3371934.3371956","type":"journal-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T20:27:58Z","timestamp":1573244878000},"page":"63-68","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Deprecating the TCP macroscopic model"],"prefix":"10.1145","volume":"49","author":[{"given":"Matt","family":"Mathis","sequence":"first","affiliation":[{"name":"Google, Inc"}]},{"given":"Jamshid","family":"Mahdavi","sequence":"additional","affiliation":[{"name":"WhatsApp, Inc"}]}],"member":"320","published-online":{"date-parts":[[2019,11,8]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/263932.264023"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52356"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/285237.285291"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC5681"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400105"},{"key":"e_1_2_1_8_1","unstructured":"Arie Van Praag. 1994. Introduction to the Hippi Specifications. Retrieved from http:\/\/hsi.web.cern.ch\/HSI\/hippi\/spec\/introduc.htm  Arie Van Praag. 1994. Introduction to the Hippi Specifications. Retrieved from http:\/\/hsi.web.cern.ch\/HSI\/hippi\/spec\/introduc.htm"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1103"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/6.694354"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2018"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3012426.3022184"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009824"},{"key":"e_1_2_1_14_1","unstructured":"T. P. Morgan. 2016. BROADCOM STRIKES 100G ETHERNET HARDER WITH TOMAHAWK-II. Retrieved from https:\/\/www.nextplatform.com\/2016\/10\/31\/broadcom-strikes-100g-ethernet-harder-tomahawk-ii\/  T. P. Morgan. 2016. BROADCOM STRIKES 100G ETHERNET HARDER WITH TOMAHAWK-II. Retrieved from https:\/\/www.nextplatform.com\/2016\/10\/31\/broadcom-strikes-100g-ethernet-harder-tomahawk-ii\/"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/205511.205520"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015499"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1517480.1517487"},{"key":"e_1_2_1_18_1","volume-title":"Workshop on Buffer Sizing (Dec. 2-3, 2019","author":"McKeown N.","year":"2019"},{"key":"e_1_2_1_19_1","first-page":"5","article-title":"Sizing router buffers (Redux)","volume":"49","author":"Appenzeller Guido","year":"2019","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063176.2063196"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190317"},{"key":"e_1_2_1_22_1","unstructured":"google\/bbr. 2019. GitHub repository retrieved https:\/\/github.com\/google\/bbr  google\/bbr. 2019. GitHub repository retrieved https:\/\/github.com\/google\/bbr"},{"key":"e_1_2_1_23_1","unstructured":"Eric Dumazet Yuchung Cheng. 2013. TSO fair queuing pacing: three's a charm. Presentation to IETF\/TCPM. Retrieved from https:\/\/www.ietf.org\/proceedings\/88\/slides\/slides-88-tcpm-9.pdf  Eric Dumazet Yuchung Cheng. 2013. TSO fair queuing pacing: three's a charm. Presentation to IETF\/TCPM. Retrieved from https:\/\/www.ietf.org\/proceedings\/88\/slides\/slides-88-tcpm-9.pdf"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098852"},{"key":"e_1_2_1_25_1","volume-title":"et. al","author":"Cardwell Neal","year":"2019"},{"key":"e_1_2_1_26_1","unstructured":"N. Cardwell and S. Yeganeh. 2019. TCP BBR Quick-Start: Building and Running TCP BBR on Google Compute Engine. Retrieved from https:\/\/github.com\/google\/bbr\/blob\/master\/Documentation\/bbr-quick-start.md  N. Cardwell and S. Yeganeh. 2019. TCP BBR Quick-Start: Building and Running TCP BBR on Google Compute Engine. Retrieved from https:\/\/github.com\/google\/bbr\/blob\/master\/Documentation\/bbr-quick-start.md"},{"key":"e_1_2_1_27_1","unstructured":"N. Cardwell. 2019. TCP BBR v2 Alpha\/Preview Release. Retrieved from https:\/\/github.com\/google\/bbr\/blob\/v2alpha\/README.md  N. Cardwell. 2019. TCP BBR v2 Alpha\/Preview Release. Retrieved from https:\/\/github.com\/google\/bbr\/blob\/v2alpha\/README.md"},{"key":"e_1_2_1_28_1","unstructured":"BBR Development. 2019. Google Group. Retrieved from https:\/\/groups.google.com\/forum\/#!forum\/bbr-dev Email address: bbr-dev@googlegroups.com  BBR Development. 2019. Google Group. Retrieved from https:\/\/groups.google.com\/forum\/#!forum\/bbr-dev Email address: bbr-dev@googlegroups.com"},{"key":"e_1_2_1_29_1","unstructured":"QUIC\/BBR sources for chromium. 2019. Chromium source code repository. Retrieved from https:\/\/cs.chromium.org\/chromium\/src\/net\/third_party\/quiche\/src\/quic\/core\/congestion_control\/  QUIC\/BBR sources for chromium. 2019. Chromium source code repository. Retrieved from https:\/\/cs.chromium.org\/chromium\/src\/net\/third_party\/quiche\/src\/quic\/core\/congestion_control\/"},{"key":"e_1_2_1_30_1","volume-title":"et. al","author":"Cardwell Neal","year":"2019"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITC30.2018.00040"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2017.8117540"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20798-3_25"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787510"},{"key":"e_1_2_1_35_1","volume-title":"Proc. of Int'l Wkshp on Protocols for Future, Large-scale & Diverse Network Transports (PFLDNeT'10)","author":"Kuhlewind M.","year":"2010"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851192"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486020"},{"key":"e_1_2_1_38_1","unstructured":"Chris Ritzo. 2018. Modernizing the M-Lab Platform. Retrieved from https:\/\/www.measurementlab.net\/blog\/modernizing-mlab\/  Chris Ritzo. 2018. Modernizing the M-Lab Platform. Retrieved from https:\/\/www.measurementlab.net\/blog\/modernizing-mlab\/"},{"key":"e_1_2_1_39_1","unstructured":"Measurement Lab. 2019. NDT (Network Diagnostic Tool). Retrieved from https:\/\/www.measurementlab.net\/tests\/ndt\/  Measurement Lab. 2019. NDT (Network Diagnostic Tool). Retrieved from https:\/\/www.measurementlab.net\/tests\/ndt\/"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.1994.386597"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064240"},{"key":"e_1_2_1_42_1","volume-title":"Internetworking: Research and Experience","author":"Floyd S.","year":"1992"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/115992.116006"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.554723"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.282603"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371934.3371940"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064240"},{"key":"e_1_2_1_48_1","unstructured":"Apple Inc. 2018. iOS Security. Retrieved from https:\/\/www.apple.com\/ca\/business\/resources\/docs\/iOS_Security_Guide.pdf  Apple Inc. 2018. iOS Security. Retrieved from https:\/\/www.apple.com\/ca\/business\/resources\/docs\/iOS_Security_Guide.pdf"},{"key":"e_1_2_1_49_1","doi-asserted-by":"crossref","unstructured":"K. Cohn-Gordon C. Cremers B. Dowling L. Garratt D. Stebila. 2017 A Formal Security Analysis of the Signal Messaging Protocol Retrieved from https:\/\/eprint.iacr.org\/2016\/1013.pdf  K. Cohn-Gordon C. Cremers B. Dowling L. Garratt D. Stebila. 2017 A Formal Security Analysis of the Signal Messaging Protocol Retrieved from https:\/\/eprint.iacr.org\/2016\/1013.pdf","DOI":"10.1109\/EuroSP.2017.27"},{"key":"e_1_2_1_50_1","unstructured":"WhatsApp Inc. 2017. WhatsApp Encryption Overview. Retrieved from https:\/\/www.whatsapp.com\/security\/WhatsApp-Security-Whitepaper.pdf  WhatsApp Inc. 2017. WhatsApp Encryption Overview. Retrieved from https:\/\/www.whatsapp.com\/security\/WhatsApp-Security-Whitepaper.pdf"},{"key":"e_1_2_1_51_1","unstructured":"E. Omara B. Beurdouche E. Rescorla S. Inguva A. Kwon A. Duric. 2019 The Messaging Layer Security (MLS) Architecture. Retrieved from https:\/\/www.ietf.org\/id\/draft-ietf-mls-architecture-02.txt  E. Omara B. Beurdouche E. Rescorla S. Inguva A. Kwon A. Duric. 2019 The Messaging Layer Security (MLS) Architecture. Retrieved from https:\/\/www.ietf.org\/id\/draft-ietf-mls-architecture-02.txt"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371934.3371956","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371934.3371956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:19Z","timestamp":1750203859000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371934.3371956"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,8]]},"references-count":49,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,11,8]]}},"alternative-id":["10.1145\/3371934.3371956"],"URL":"https:\/\/doi.org\/10.1145\/3371934.3371956","relation":{},"ISSN":["0146-4833"],"issn-type":[{"value":"0146-4833","type":"print"}],"subject":[],"published":{"date-parts":[[2019,11,8]]},"assertion":[{"value":"2019-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}