Autor: |
Paul D. Amer, Abuthahir Habeeb Rahman, Nasif Ekiz |
Rok vydání: |
2011 |
Předmět: |
|
Zdroj: |
ACM SIGCOMM Computer Communication Review. 41:16-23 |
ISSN: |
0146-4833 |
DOI: |
10.1145/1971162.1971165 |
Popis: |
While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed seven misbehaviors in the generation of SACKs. These misbehaviors could result in a data sender mistakenly thinking data reneging occurred. With one misbehavior, the worst case could result in a data sender receiving a SACK for data that was transmitted but never received. This paper presents a methodology and its application to test a wide range of operating systems using TBIT to fingerprint which ones misbehave in each of the seven ways. Measuring the performance loss due to these misbehaviors is outside the scope of this study; the goal is to document the misbehaviors so they may be corrected. One can conclude that the handling of SACKs while simple in concept is complex to implement. |
Databáze: |
OpenAIRE |
Externí odkaz: |
|