servicepiggycase

piggycase  时间:2021-03-23  阅读:()
ExplicitTransportErrorNotification(ETEN)forError-ProneWirelessandSatelliteNetworks–Summary_-ERajeshKrishnan,MarkAllman,CraigPartridge,andJamesP.
G.
SterbenzBBNTechnologiesWilliam.
IvancicGlennResearchCenterAbstract—ThispaperisasummaryoftheBBNTechnicalReportNo.
8333,"ExplicitTransportErrorNotificationforError-ProneWirelessandSatelliteNetworks.
"InthisstudywediscusstwotypesofExplicitTransportErrorNotification(ETEN)mechanisms:(i)per-packetmechanismsthatnotifyendpointsofeachdetectedcorruption;and(ii)cumulativemechanismsthatnotifyendpointsofaggregatecorruptionstatistics.
Wehaveimplementedtheproposedmechanismsinthens-2simulator.
WepresentsimulationresultsonperformancegainsachievableforTCPRenoandTCPSACK,usingETENmechanismsoverawiderangeofbiterrorratesandtrafficconditions.
WecompareTCPRenoandTCPSACKenhancedwithETENmechanismsagainstTCPWestwood,whichusesabandwidthestimationstrategyinplaceofthetraditionalAIMDcongestionavoidancealgorithm.
WediscusstwoissuesrelatedtothepracticaldeploymentofETENmechanisms:corruptiondetectionmechanisms(andtheirco-operationwithETEN-basedrecoveryinthetransportlayer)andsecurityaspects.
Weincluderecommendationsforfurtherwork.
IndexTerms—CongestionControl,ExplicitTransportErrorNotification,Internet,Protocols,Satellite,TCP/IPI.
BACKGROUNDNASAisworkingtoextendtheInternetintospaceinordertoimprovecommunications,enablenewsystemcapabilitiesandreduceoverallmissioncosts.
Assuch,NASAisinterestedinleveragingtechnologiesdevelopedbythecommercialcommunicationindustry.
Inparticular,NASAisinterestedinutilizingcommodityprotocols,theTCP/IPprotocolsuite,whereverpossible.
NASAcommissionedBBNTechnologiestoinvestigatethepotentialnetworkperformancebenefitsofETENandthepracticalissuesinvolvedinimplementinganddeployingETEN.
ThispaperisasummaryoftheBBNTechnicalReportNo.
8333,"ExplicitTransportErrorNotificationforError-ProneWirelessandSatelliteNetworks.
"II.
INTRODUCTIONOneobstacletogoodperformanceofinternetworkswithwirelessandsatellitecomponentsisnon-negligiblebit-errorrates(BER).
ThemostwidelyusedtransportprotocolintheTCP/IPsuite,thetransmissionControlProtocol(TCP)[1],guaranteesthatcorrupteddatawillberetransmittedbythedatasender,henceprovidingareliablebyte-streamtoapplications.
However,packetlossisalsousedbyTCPtodeterminethelevelofcongestioninthenetwork[2]–astraditionally,thebulkofpacketlossinnetworkscomesfromrouterqueueoverflow(i.
e.
congestion).
Therefore,toavoidcongestioncollapseTCPrespondstopacketlossbydecreasingthecongestionwindow[2][3],andthereforethesendingrate.
Thereductionofthecongestionwindowisnotneededtoprotectnetworkstabilityinthecasewhenlossesarecausedbycorruptionandthereforetheseneedlessreductionsinthesendingratehaveanegativeimpactonperformancewithlittleoverallbenefittothenetwork.
IftheTCPsendercandistinguishpacketslostduetocongestionfrompacketslostduetoerrors,betterperformancemaybeachieved.
TheperformancebenefitcanberealizedifTCPcanretransmitapacketlostduetocorruptionwithoutneedlesslyreducingthetransmissionrate,whilecontinuingtoprotectnetworkstabilitybydecreasingthesendingratewhenlossiscausedbynetworkcongestion.
TCPExplicitTransportErrorNotification(ETEN)istheconceptofnotifyingTCPthatpacketswerelostduetocorruption1.
ETENmechanismscanaidTCPindistinguishingpacketsthatarelostduetocongestionfromonesthatarelostduetocorruption.
Thepurposeofthisstudyistwo-fold:1.
ToestablishboundsontheperformanceimprovementsthatcanbeobtainedwiththeuseofidealETENmechanismsunderdifferentnetworkconditions–errorrates,capacities,delays,topologies,congestion–andtherebydeterminepromisingdirectionsforfutureresearch,ifany.
2.
ToconsiderissuesrelatedtopracticaldeploymentofETENmechanisms,toproposesuitablearchitecturesandmechanisms,toidentifysecurityvulnerabilities,andtoidentifyareasthatrequirefurtherstudybeforeanETENsystemisviable.
Throughsimulations,wehaveevaluatedpossibleenhancementstoTCPthatarebasedonETENnotificationsfromintermediateroutersand/orendsystems.
Emulationsinatestbedandlivetestingoverrealnetworkswereconsideredoutofscopeofthiseffort.
Thisstudyincludedthefollowingtasks:DetermineboundsonTCPgoodputimprovementspossiblefromETENwhenaTCPsenderispresentedwithidealinformationaboutthecauseofeachloss.
Evaluateviasimulations,actualperformanceachievableoverarangeofnetworktopologiesandtrafficconditionswithdifferentTCPvariantssuchasRenoandSACK.
DiscussandevaluatetheperformanceofspecificETENmechanismsthatfallinoneormoreofthefollowingbroadcategories:oForwardnotification–wherebyanynotificationaboutcorruptedpacketsissentinthedirectionofthedatapacketsandthenreturnedtothesenderinTCPacknowledgmentsegments.
oBackwardnotification–inwhichamessageissentfromthenode(end-hostorintermediaterouter)thatdetectsa1ETENissimlartoExplicitCongestionNotification(ECN).
InECN,TCPcanbeinformedoftheonsetofcongestionandadjustitstransmissionsaccordinglytherebyimprovingoverallperformance.
corruptedpackettothehostthatoriginatedthepacket.
Per-packetmechanismsthatattempttodeterminetherootcauseofeachlossexperienced.
AggregatenotificationschemeswheretheTCPsenderisprovidedwithaggregatestatisticsaboutthelosspatternsexperiencedinthenetworkpath.
DeterminehowTCPshouldbestreactuponreceivingETENnotification.
AssessthesecurityimplicationsofintroducingvariousETENmechanismsintotheInternetarchitecture.
Theseinclude:oPotentialvulnerabilitiesoftheproposedmechanismstodistributeddenial-of-serviceattacks.
oOperationoverencryptedtunnels,VPNs,andMPLSpaths,whereintermediatenodesmaynotbeabletodetermineactualsourceordestinationIPaddressesandports,makingETENnotificationeffectivelyimpossible.
oVulnerabilitiestomisbehavingreceiversthatattempttomaskcongestion-relatedlossesusingETENmechanismsinanattempttoobtainanunfairshareofnetworkresources.
III.
ERRORNOTIFICATIONANDRESPONSEMECHANISMSFortheETENmechanismsproposedinthisreportweassumeoneofthefollowingtwocasesholds:1.
ThesourceanddestinationIPaddresses,thesourceanddestinationTCPports,andtheTCPsequencenumbercanbecorrectlyobtainedfromthecorruptedpacket.
Inaddition,thepacketinquestionmustbepartofthesender'scurrentwindow;otherwise,theopportunitytomitigatetheperformanceproblemscausedbythecorruptedpacketislost.
Forthiscase,Oracle,BackwardandForwardETENwereconsideredwithOracleandBackwardETENsimulated.
2.
Thenodedetectingerrorscanonlycalculatecumulativeerrorratesforeachlink.
Inotherwords,theinformationintheheaderofacorruptedpacketisconsideredinaccurate.
BothForwardandBackwardCumulativeETENwereconsideredforthiscasewithonlyForwardCETEN(FCETEN)simulated.
IV.
ORACLEETENOracleETEN,illustratedinFigure1,isatheoreticalconstructthatassumessufficientknowledgeaboutthecorruptedpacket(senderanddestinationIPaddresses,senderanddestinationTCPportnumbers,andtheTCPsequencenumber)isavailabletotheintermediaterouterortheend-systemthatdetectscorruption.
Furthermore,thismechanismassumesthatthesourceoftheflowcanbeinstantaneouslynotifiedofthepacketcorruption.
OracleETENprovidesanupperboundontheperformanceimprovementachievablebyETENmechanismsthatnotifythesource.
WhiletheOracleETENmechanismisanimpossibilityintherealworld,itcanbeusedtodistinguishbetweencasesinwhichsomeETENmechanismwouldbeusefulandcaseswhennoETENschemewouldaidperformance.
Figure1-OracleETENV.
BACKWARDETENThebackwardETEN(BETEN)mechanism,illustratedinFigure2,isanalogoustobackwardexplicitcongestionnotificationschemes(e.
g.
,source-quench[4]).
Thismechanismassumesthattheintermediateroutercanextractorreconstruct(e.
g.
,usingFEC)sufficientknowledgeaboutthecorruptedpacketthatisrequiredtonotifythesender.
Figure2-BackwardETENVI.
FORWARDETENTheforwardETEN(FETEN)mechanismillustratedinFigure3isanalogoustoforwardexplicitcongestionnotificationschemes(e.
g.
,[6][7]).
Thismechanismalsoassumesthattheintermediateroutercanextract(orreconstructusingFEC)completeandcorrectknowledgeoftheIPaddresses,TCPports,andTCPsequencenumbercorrespondingtothecorruptedpacket.
Upondetectionofacorruptedpacket,theintermediateroutertransmitsaFETENmessagetothedestinationhost,whichthenconveystheinformationtothesenderonasubsequentacknowledgment.
Figure3-ForewardETENVII.
CUMULATIVEETENInpractice,wecannotalwaysaccuratelyretrievethesourceanddestinationIPaddress,sourceanddestinationTCPportnumbers,andTCPsequencenumberfromacorruptedpacketorlink-layerframe.
ForsuchcasesweconsiderETENmechanismsthatworkonthebasisofcumulativeerrorrates(forexample,errorratesthatareaveragedoveranintervaloftimeandacrossvariousflows),ratherthanattemptingtomakenotificationsonaper-packetbasis.
ThecumulativeETEN(CETEN)informationconveyedtotheend-hostscanbeinoneofseveraldifferentforms:Anabsolutebiterrorrate,byteerrorrate,orpacketerrorrateobservedwithinamovingwindowintime.
Theerrorratemaybequantizedintoasmallnumberofsteps(forexample,high,medium,andlow).
Abinaryfeedbackscheme[7](seealso[5][6])isaspecialcasethatprovidesindicationthatthebit/byte/packeterrorrateexceedssomethreshold.
Arelativeerrorratethatsimplyindicatesthatthequantizederrorratehasincreasedordecreasedfromthepreviousvalue.
Anestimateoftheprobabilitythatapacketsurvivescorruption.
CETENinformationcanbedeliveredtoasenderviaforwardorbackwardsignaling,analogoustoaFETEN-basedoraBETEN-basedstrategy.
Also,CETENcanbepiggybackedondataandacknowledgmentpackets,ratherthanusingadditionaldistinctmessages.
CETENinformationcanbecollectedonaper-hopbasisoraggregatedovertheend-to-endpath.
Duetothedifficultyincorrectlyassigningcorruptedpacketstotheircorrespondingflows,anyper-flowCETENinformationhastobeestimated,forexamplefromwhatisobservedacrossallflowsusingagivenlink.
CETENstrategiesthatrelypurelyonstatisticscollectedwithinthelifetimeofaparticularflowareoflimiteduseforshortflows.
Forexample,ashortflowmayhaveterminatedbeforeweobtainagoodestimateofthepacketcorruptionprobability.
VIII.
SENDERRESPONSETOETENThesender'sresponsetoanETENnotificationdependsonthetypeofthenotification.
IfthesenderreceivestimelyandreliableinformationaboutthecorruptedpacketthatidentifiestheTCPflowandthesequencenumberwithintheflow,thenthesendercanretransmitthecorruptedpacketwithoutadjustingthecongestionstate.
However,iftheinformationcontainedintheETENnotificationisonlypartiallyreliable,orifonlyacumulativeerrorrateisavailable,thenthesenderhastoapplyaheuristictodeterminewhatactionisappropriate.
Whenatransportendpointinfersapacketloss,itcannotexactlydeterminefromtheCETENinformationifthepacketlossoccurredduetocorruptionorcongestion.
Atbest,theCETENinformationprovidesarecentestimateofthefractionofthelossesthatareduetocorruption.
Thedecisiontobemadebythesenderincludeswhetheranoutstandingsegmentshouldberetransmittedandwhetherthecongestionstateshouldbealteredinresponse.
SincemostlinkleveltechnologiesrequirecorruptedpacketstobediscardedevenbeforeitreachestheIPlayer,per-packetETENmechanisms(attheIPandTCPlayers)cannotseethecorruptedpackets.
Althoughthesenderresponsetoper-packetETENismorestraightforwardthantheresponsetoCETEN,itmustbenotedthatthecorruptionlinklayercountersoferrorsarereadilyavailable;thesecounterscanbeusedtogenerateCETEN.
IX.
PERFORMANCEOFETENMECHANISMSInthissection,wedescriberesultsofsimulationsontheperformanceofOracleETEN,BETENandFCETEN.
Varioustypesoflinks(e.
g.
,terrestrialLAN,WAN,andsatellite),modeledbytheirrespectivelatencies,aresimulatedoverawiderangeofbiterrorrates.
ETENperformanceiscomparedagainstconventionalReno[2]andSACK[8]variantsofTCP.
EachsimulationconsistsofabulkTCPflow(FTPapplication)of120secondsdurationwithunlimiteddatatosend.
TheactualvaluesandvariablerangesusedinthestudyarelistedinTable1.
Allsimulationswereperformedusingthens-2simulator[9](version2.
1b7a)withextensions.
Table1-ParametersValuesOracleETENrepresentstheideal,yetimpossible,baselinethatprovidesanupperboundontheperformanceachievablebyanypracticalper-packetETENscheme.
OnedesigngoalisthattheadditionofanyETENscheme(toanygivenTCPcongestionavoidancestrategy)shouldnotmaketheperformanceworse;therefore,thecasewithnoETENisexpectedtoprovideausefullowerbound(and,thisisshowninoursimulationresults).
TheBETENstrategyrepresentsanimplementableper-packetETENstrategy(assumingthatwecanextractsufficientinformationfromcorruptedpackets).
Intheabsenceofcongestion,wecanexpectthatthegoodputwhenusingBETENwillliebetweenthegoodputsusingOracleETENandnoETEN.
TheCETENstrategyrepresentsanimplementablecumulativeETENstrategythatispotentiallymorerobustintermsofsecuritythanper-packetETENstrategies,buttheoreticallyprovideslessperformancegains.
InourstrategytheCETENflowsintheforwarddirectionandgetscopiedoverontotheacknowledgmentsgoingback.
Weconsidereightsetsofsimulations,asfollows:A.
Baseline–nocrosstrafficoverasingle-hoptopologyThissetofsimulationsisaimedatevaluatingthegainspossibleoverasingleuncongestedlinkusingOracleETENandBETENwithTCPRenoandTCPSACK.
B.
Multi-hoptopologywithnocross-trafficInthissetofsimulations,weusea3-hoplineartopologyofidenticallinks,whilevaryingtheotherparametersoutlinedabove.
Thesesimulationsservethepurposeofvalidatingourimplementationinamorecomplextopologywithmultiplelinksandrouters.
Theresultsareexpectedtomatchthoseofthefirstset.
C.
Multi-hoptopologywithcompetingUDPflows:Inthissetofsimulations,weusea3-hoplineartopologytoprovideinsightintotheperformanceofETENmechanismsinthefaceofcongestionfromconstant-bit-rateUDPtraffic.
Theintensityofcross-trafficisvariedacrosssimulationruns.
Thecompetingtrafficinthesesimulationsdoesnotuseacongestionavoidancestrategy.
D.
Multi-hoptopologywithcompetingTCPflows:ThissetofsimulationsofferscompetingTCPtraffic(insteadofUDPtraffic)andisotherwiseidenticaltothethirdset.
ThisprovidesinsightintotheperformanceofETENwhenthecompetingtrafficflowsalsouseacongestionavoidancestrategy.
E.
ComparisonofETENtoTCPWestwood:ThissetofsimulationsprovidesperformancecomparisonofourETENmechanismswithTCPWestwood[10]intheabsenceofcrosstraffic.
RecentlyproposedmodificationstoTCPcongestionavoidanceincludeusingbandwidthestimationtechniques.
TCPWestwood[10]isarepresentativecongestionavoidancestrategybasedonbandwidthestimation.
TCPWestwoodhasbeenshowntoperformwellunderhigherrorratesinsimulatedcomparisonstoTCPRenoandSACKTCP.
Here,wecompareviasimulationstheperformanceofETENwithRenoandSACKagainstTCPWestwood.
F.
ComparisonofETENtoTCPWestwoodwithUDPcross-traffic:ThissetofsimulationsprovidesperformancecomparisonofourETENmechanismswithTCPWestwood[10]inthepresenceofcrosstraffic.
G.
CumulativeETENperformancewithUDPcrosstraffic:Inthissetofsimulations,weusea3-hoplineartopologyofidenticallinks.
TheperformanceofCETENisevaluatedinthepresenceofUDPcrosstraffic.
H.
CumulativeETENperformancewithTCPcrosstrafficInthissetofsimulations,weusea3-hoplineartopologyofidenticallinks.
TheperformanceofCETENisevaluatedinthepresenceofTCPcrosstraffic.
X.
PERFORMANCEThefollowingarethreesampleresultsofthevariousteststhatwereperformedinthisstudy.
Foradetaileddescriptionofallthetestsandresults,refertothecompleteBBNreport.
A.
BaslineInthebaselinesetofsimulations,weinvestigateasingleTCPflowoverasinglelinkwithchannelerrorsthatresultinpacketcorruption.
Inthissetofsimulations,thereisnocross-trafficcompetingwiththeTCPflow.
ExaminingETENinisolationprovidesanempiricalupperboundonthegaininTCPgoodputthatisachievableusingETENmechanisms.
ThebaselineforthesimulationsistheperformanceofTCPRenoandSACKundervariouserrorrates.
Weconsidertwonear-idealconditionsfortheerrordetectionandnotification:1.
OracleETEN–completeknowledgeofthecorruptedpacketandinstantaneousnotificationtothesource.
2.
BETEN–completeknowledgeofthecorruptedpacketwithrealBETENmessagespropagatingbacktothesource.
TheresultsinFigure4showthegoodputusingRenowithOracleETENoveralong-thinnetwork(ataBERof10-5)isalmostseventimesthebaselinegoodputusingRenoalone.
ThegoodputusingBETENwithSACKismorethanthreetimestheSACKbaseline,andthegoodputusingBETENwithRenoisabouttwoandonehalftimestheRenobaseline.
ThefigurealsoillustratesthatwhentheerrorsarenotasprevalentonthelinktheETENmechanismshavearelativelysmallimpactbecauseerrorshaveonlyasmallimpactonstockTCP.
Fromthesimplesimulationspresentedinthissectionwecanderiveseveralconclusions:TheperformanceusingBETENwithSACKisclosetothatofOracleETENatlowerrorrates.
AstheBERincreases,thechancesoflosinganotificationalsoincreasesandweseethatgainsfromBETENbegintodiminish.
UsingBETENwithSACKoutperformsBETENwithReno;thismaybebecausetheabilityofSACKtocorrectmultiplelossescomplementsETEN.
Ingeneral,TCPSACKperformsbetterthanTCPRenoduetotheabilityofTCPSACKtomostlydecouplelossrecoveryfromcongestioncontrol.
Figure4-TCPwithETENoveranuncongestedlongthinnetwork(LTN)B.
TCPWestwoodversusSACKBETENForthesimulationresultsinfigure5,wecomparetheperformanceofTCPWestwoodwhenbothcongestionandcorruptionlossesarepresent.
Figure5showstheperformanceofTCPWestwoodandBETENovera3-hoplineartopologywith1.
5Mb/slinkseachwithaone-waydelayof320ms.
WeusecompetingUDPtrafficforthesesimulations.
Theplotshowsthatathigherrorratesandmoderatecongestion,BETEN'sabilitytodistinguishbetweencorruptionandcongestionlossesprovidesperformanceimprovementsovertheTCPWestwoodstrategythatreliesonintelligentbandwidthestimationalone.
TheWestwoodstrategy,however,showsanadvantageunderheavycongestion(_competingflows)withlowtomoderateerrorrates.
Figure5-TCPWestwoodversusSACKTCPwithETENoveralongthinnetwork(LTN)Figure6-CETENPerformancewithTCPRenoandTCPcrosstrafficC.
CumulativeETENversusTCPRENOThesimulationresultsinfigure6showCETENwithTCPcrosstraffic2.
Theresultsindicatethatunderallcongestionlevels,CETENoffersmoderategoodputgainsoverTCPReno,exceptathighBER(10-5).
TheCETENsimulationsweconductedaspartofthisinvestigationshowCETENtobeapromisingapproachinsomesituations.
Inothersituations,CETENoffersworseperformancethanTCPReno.
WefeelthatfurtherinvestigationintoadditionalCETENmechanismsiswarrantedbeforemakingconclusionsonthefeasibilityofCETENingeneral.
Forinstance,aninvestigation2ItisimportanttonotethatthecompetingtrafficinoursimulationdidnotuseanyETENmechanism.
Thus,thecompetingtrafficneedlesslyreducetheirtransmissionrateswhentheyexperiencecorruptionlosses.
Thisallowstheflowofinteresttousemoreofthebottleneckbandwidth.
intohowwelltheendsystemcanestimatethetotallossrateandusethatfordeterminingthefractionoflossescausedbycongestionmayshedadditionallightonCETEN(andmakeitmorefeasibletodeploy).
XI.
SECURITYCONSIDERATIONSETENtechniques(suchasBETEN,forexample)thatrequireout-of-bandmessagesarevulnerabletodistributeddenialofservice(DDOS)attacksbecausenetworksthatplantousethisformofETENwillhavetoallowsuchmessagestoenterorleavetheirnetworks.
ThismakesitpossibleforanadversarytolaunchaDOSattackbybombardingahost(oranetwork)withETENmessages.
Thiscanminimallyoverwhelmthevictimhost,butiflaunchedasadistributeddenialofserviceattackfromalargenumberofhosts(thathavebeencompromisedbyanInternetworm,forinstance),anattackcanoverwhelmthecapacityofentirenetworks[11].
ETENmechanismsmaybevulnerabletoanothermoresubtleandindirectattack.
Amaliciousadversarycansendfalsenotificationscorrespondingtopacketsthatareeithernotdroppedorweredroppedduetocongestion.
Thiscaninducethesenderintoretransmittingpacketsunnecessarilyorintobypassingcongestionavoidanceandcontinuetransmittingatahigherratethanappropriateforthegivennetworkconditions.
Thisattackinisolation(onasingleflow)cancauselimiteddamage.
However,ifacoordinatedattackwerelaunchedonmanyTCPflowsonaheavilyloadednetwork,theattackcanpotentiallydrivethenetworkintocongestioncollapse[12].
Theuseofencryptioncanpreventdeepheaderinspection.
Forexample,IPsec[13]hidesTCPportinformation;IPsectunnelsalsohidetheoriginalsourceaddress.
ThismakesitdifficultforintermediaterouterstodeterminethecorrectTCPendpointstowhichETENmessagesshouldbedelivered.
XII.
CONCLUSIONSOurconclusionsfromthisstudyare:Per-packetETENmechanismsoffersubstantialgainsinbulkTCPgoodputintheabsenceofcongestion;however,inthepresenceofcongestionTCPcongestionavoidancemechanismsdominateresultingininsignificantgainsfromETEN.
Theproposedper-packetmechanismsprovideusefulupperboundsonperformancethatcanbeusedtoevaluatefutureproposalsofper-packetandcumulativeETENtechniques.
Per-packetmechanismspresentsignificantchallengestopracticalimplementationbyprovidinganewopportunitytoexploitInternetsecurityvulnerabilitiesandbyrequiringintermediatenodestoreliablyextractinformationfromtheheadersofcorruptedpacketsCumulativeETENtechniquesaremoreattractivetoimplementation;however,theparticularmechanismweevaluateddidnotrealizethepotentialgainsofper-packettechniquesSecurityvulnerabilitiesincludenotonlydenial-of-serviceattacksbutalsomoresubtleattackswitheffectsrangingfromunfairbandwidthsharingtototalcongestioncollapseofthenetwork.
FutureworkinthisareashouldfocusonalternativecumulativeETENmechanisms,accuratelossinferenceatendpointstoavoidtrackingcongestionlossesateveryhop,interactionswithforwarderrorcorrection,andcross-layerco-operationforETEN.
XIII.
RECOMMENDATIONSFORFUTUREWORKTheresultsofthisinitialbroadstudyareintriguing;theyleadustorecommendfurtherworkfocusedonspecificaspectsofETEN.
Ontheonehand,ourworkdemonstratestremendouspotentialfromETENifreliableinformationextractionfromheaderswerepossibleandcongestioncansomehowbecontrolled.
Ontheotherhand,ituncoversanumberofpracticalchallengescoupledwithachievingonlylimitedsuccesswiththeparticularcumulativeETENschemeweimplemented.
TheprimarythrustthatwerecommendistoexplorecumulativeETENalternativesthatdonotrelyoncongestionfeedbackfromintermediaterouters(sincethiswouldimplicitlydemandglobaldeploymentandrendertheschemelesspractical).
WebelievethatthebiggestchallengetorealizingCETENschemesistheinabilityofaTCPendpointtoaccuratelyestimatethetotallossatafineresolution(ofafewpackets)andinatimelymanner(withinanRTTtoenablequickrecovery).
Researchisneededtodevelopthiscapability.
Giventhiscapability,werecommendthatourproposedcumulativeETENschemeshouldberefinedtomakeuseofitandthenre-evaluated.
TheinteractionsofECNwiththerefinedcumulativeETENschemealsoremaintobestudiedinthiscontext.
OurcurrenteffortfocusedonquantifyingthroughputimprovementsachievableusingETENandwasthereforelimitedtolong-livedTCPflows.
FurtherworkisneededtoisolatetheeffectsoflossduringtheslowstartphaseandquantifythebenefitsofETENforshort-livedflows.
Wealsorecommendthatthemechanismsbeevaluatedusingrealnetworktopologiesandtraffictracesincludingotherworkloads,forexample,HTTPtransactions.
Underhigherrorrates,TCPconnectionestablishmentcanbedelayedorcanfailcompletely.
WebelievethatincreasingtheconnectionestablishmentrateunderhigherrorratescouldbeakeybenefitofETEN.
Werecommendthatfutureworkaddressthisissue.
REFERENCES[1]J.
Postel(editor),"TransmissionControlProtocol,"RequestforComments:793,September1981.
[2]V.
Jacobson,"CongestionAvoidanceandControl,"ProceedingsofACMSIGCOMM'88,Stanford,CA,USA,August1988.
[3]M.
Allman,V.
Paxson,andW.
Stevens,"TCPCongestionControl,"RequestforComments:2581,April1999.
[4]ISI,"InternetControlMessageProtocol,"RequestforComments:792,September1981.
[5]K.
Ramakrishnan,andS.
Floyd,"AProposaltoaddExplicitCongestionNotification(ECN)toIP,"RequestforComments:2481,January1999.
[6]K.
Ramakrishnan,S.
Floyd,andD.
Black,"TheAdditionofExplicitCongestionNotification(ECN)toIP,"RequestforComments:3168,September2001.
[7]K.
K.
Ramakrishnan,andR.
Jain,"ABinaryFeedbackSchemeforCongestionAvoidance,"ACMTransactionsonComputerSystems,Volume8,Number2,May1990,pp.
158–181.
[8]M.
Mathis,J.
Mahdavi,S.
Floyd,andA.
Romanow,"TCPSelectiveAcknowledgmentOptions,"RequestforComments:2018,October1996.
[9]ns-2simulator,http://www.
isi.
edu/nsnam/ns/index.
html[10]S.
Mascolo,C.
Casetti,M.
Gerla,M.
Sanadidi,andR.
Wang,"TCPWestwood:End-to-endBandwidthEstimationforEfficientTransportoverWiredandWirelessNetworks,"ProceedingsofMOBICOM2001,Rome,Italy,July2001.
[11]S.
Gibson,"TheStrangeTaleoftheAttacksAgainstGRC.
COM,"http://grc.
com/dos/grcdos.
htm.
[12]S.
Floyd,andK.
Fall,"PromotingtheUseofEnd-to-EndCongestionControlintheInternet,"IEEE/ACMTransactionsonNetworking,August1999,pp.
458–472.
[13]S.
Kent,andR.
Atkinson,"SecurityArchitecturefortheInternetProtocol,"RequestforComments:2401,November1998.

HostYun(月18元),CN2直连香港大带宽VPS 50M带宽起

对于如今的云服务商的竞争着实很激烈,我们可以看到国内国外服务商的各种内卷,使得我们很多个人服务商压力还是比较大的。我们看到这几年的服务商变动还是比较大的,很多新服务商坚持不超过三个月,有的是多个品牌同步进行然后分别的跑路赚一波走人。对于我们用户来说,便宜的服务商固然可以试试,但是如果是不确定的,建议月付或者主力业务尽量的还是注意备份。HostYun 最近几个月还是比较活跃的,在前面也有多次介绍到商...

TTcloud(月$70)E3-1270V3 8GB内存 10Mbps带宽 ,日本独立服务器

关于TTCLOUD服务商在今年初的时候有介绍过一次,而且对于他们家的美国圣何塞服务器有过简单的测评,这个服务商主要是提供独立服务器业务的。目前托管硬件已经达到5000台服务器或节点,主要经营圣何塞,洛杉矶以及日本东京三个地区的数据中心业务。这次看到商家有推出了新上架的日本独立服务器促销活动,价格 $70/月起,季付送10Mbps带宽。也可以跟进客户的需求进行各种DIY定制。内存CPU硬盘流量带宽价...

物语云-VPS-美国洛杉矶VPS无限流量云windows大带宽100M不限流量 26/月起

物语云计算怎么样?物语云计算(MonogatariCloud)是一家成立于2016年的老牌国人商家,主营国内游戏高防独服业务,拥有多家机房资源,产品质量过硬,颇有一定口碑。本次带来的是特惠活动为美国洛杉矶Cera机房的不限流量大带宽VPS,去程直连回程4837,支持免费安装Windows系统。值得注意的是,物语云采用的虚拟化技术为Hyper-v,因此并不会超售超开。一、物语云官网点击此处进入物语云...

piggycase为你推荐
急救知识纳入考试100%的大学生有学习现场急救知识的欲望吗特朗普取消访问丹麦特朗普首次出访为什么选择梵蒂冈对对塔为什么不能玩天天擂台?(对对塔)地图应用哪个手机定位软件最好用?广东GDP破10万亿在已披露的2017年GDP经济数据中,以下哪个省份GDP总量排名第一?刘祚天你们知道21世纪的DJ分为几种类型吗?(答对者重赏)同ip域名同IP网站具体是什么意思,能换独立的吗同ip域名两个网站同一个IP怎么绑定两个域名seo优化工具SEO优化工具哪个好用点啊?百度关键词分析百度关键字分析是什么意思?
西安虚拟主机 东莞服务器租用 如何注销域名备案 外贸主机 免费cdn加速 免费网站监控 嘟牛 空间出租 国外代理服务器软件 1g内存 亚马逊香港官网 中国电信宽带测速网 hkt 英国伦敦 游戏服务器出租 hdroad google搜索打不开 第八届中美互联网论坛 海外加速 删除域名 更多