servicepiggycase

piggycase  时间:2021-03-23  阅读:()
ExplicitTransportErrorNotification(ETEN)forError-ProneWirelessandSatelliteNetworks–Summary_-ERajeshKrishnan,MarkAllman,CraigPartridge,andJamesP.
G.
SterbenzBBNTechnologiesWilliam.
IvancicGlennResearchCenterAbstract—ThispaperisasummaryoftheBBNTechnicalReportNo.
8333,"ExplicitTransportErrorNotificationforError-ProneWirelessandSatelliteNetworks.
"InthisstudywediscusstwotypesofExplicitTransportErrorNotification(ETEN)mechanisms:(i)per-packetmechanismsthatnotifyendpointsofeachdetectedcorruption;and(ii)cumulativemechanismsthatnotifyendpointsofaggregatecorruptionstatistics.
Wehaveimplementedtheproposedmechanismsinthens-2simulator.
WepresentsimulationresultsonperformancegainsachievableforTCPRenoandTCPSACK,usingETENmechanismsoverawiderangeofbiterrorratesandtrafficconditions.
WecompareTCPRenoandTCPSACKenhancedwithETENmechanismsagainstTCPWestwood,whichusesabandwidthestimationstrategyinplaceofthetraditionalAIMDcongestionavoidancealgorithm.
WediscusstwoissuesrelatedtothepracticaldeploymentofETENmechanisms:corruptiondetectionmechanisms(andtheirco-operationwithETEN-basedrecoveryinthetransportlayer)andsecurityaspects.
Weincluderecommendationsforfurtherwork.
IndexTerms—CongestionControl,ExplicitTransportErrorNotification,Internet,Protocols,Satellite,TCP/IPI.
BACKGROUNDNASAisworkingtoextendtheInternetintospaceinordertoimprovecommunications,enablenewsystemcapabilitiesandreduceoverallmissioncosts.
Assuch,NASAisinterestedinleveragingtechnologiesdevelopedbythecommercialcommunicationindustry.
Inparticular,NASAisinterestedinutilizingcommodityprotocols,theTCP/IPprotocolsuite,whereverpossible.
NASAcommissionedBBNTechnologiestoinvestigatethepotentialnetworkperformancebenefitsofETENandthepracticalissuesinvolvedinimplementinganddeployingETEN.
ThispaperisasummaryoftheBBNTechnicalReportNo.
8333,"ExplicitTransportErrorNotificationforError-ProneWirelessandSatelliteNetworks.
"II.
INTRODUCTIONOneobstacletogoodperformanceofinternetworkswithwirelessandsatellitecomponentsisnon-negligiblebit-errorrates(BER).
ThemostwidelyusedtransportprotocolintheTCP/IPsuite,thetransmissionControlProtocol(TCP)[1],guaranteesthatcorrupteddatawillberetransmittedbythedatasender,henceprovidingareliablebyte-streamtoapplications.
However,packetlossisalsousedbyTCPtodeterminethelevelofcongestioninthenetwork[2]–astraditionally,thebulkofpacketlossinnetworkscomesfromrouterqueueoverflow(i.
e.
congestion).
Therefore,toavoidcongestioncollapseTCPrespondstopacketlossbydecreasingthecongestionwindow[2][3],andthereforethesendingrate.
Thereductionofthecongestionwindowisnotneededtoprotectnetworkstabilityinthecasewhenlossesarecausedbycorruptionandthereforetheseneedlessreductionsinthesendingratehaveanegativeimpactonperformancewithlittleoverallbenefittothenetwork.
IftheTCPsendercandistinguishpacketslostduetocongestionfrompacketslostduetoerrors,betterperformancemaybeachieved.
TheperformancebenefitcanberealizedifTCPcanretransmitapacketlostduetocorruptionwithoutneedlesslyreducingthetransmissionrate,whilecontinuingtoprotectnetworkstabilitybydecreasingthesendingratewhenlossiscausedbynetworkcongestion.
TCPExplicitTransportErrorNotification(ETEN)istheconceptofnotifyingTCPthatpacketswerelostduetocorruption1.
ETENmechanismscanaidTCPindistinguishingpacketsthatarelostduetocongestionfromonesthatarelostduetocorruption.
Thepurposeofthisstudyistwo-fold:1.
ToestablishboundsontheperformanceimprovementsthatcanbeobtainedwiththeuseofidealETENmechanismsunderdifferentnetworkconditions–errorrates,capacities,delays,topologies,congestion–andtherebydeterminepromisingdirectionsforfutureresearch,ifany.
2.
ToconsiderissuesrelatedtopracticaldeploymentofETENmechanisms,toproposesuitablearchitecturesandmechanisms,toidentifysecurityvulnerabilities,andtoidentifyareasthatrequirefurtherstudybeforeanETENsystemisviable.
Throughsimulations,wehaveevaluatedpossibleenhancementstoTCPthatarebasedonETENnotificationsfromintermediateroutersand/orendsystems.
Emulationsinatestbedandlivetestingoverrealnetworkswereconsideredoutofscopeofthiseffort.
Thisstudyincludedthefollowingtasks:DetermineboundsonTCPgoodputimprovementspossiblefromETENwhenaTCPsenderispresentedwithidealinformationaboutthecauseofeachloss.
Evaluateviasimulations,actualperformanceachievableoverarangeofnetworktopologiesandtrafficconditionswithdifferentTCPvariantssuchasRenoandSACK.
DiscussandevaluatetheperformanceofspecificETENmechanismsthatfallinoneormoreofthefollowingbroadcategories:oForwardnotification–wherebyanynotificationaboutcorruptedpacketsissentinthedirectionofthedatapacketsandthenreturnedtothesenderinTCPacknowledgmentsegments.
oBackwardnotification–inwhichamessageissentfromthenode(end-hostorintermediaterouter)thatdetectsa1ETENissimlartoExplicitCongestionNotification(ECN).
InECN,TCPcanbeinformedoftheonsetofcongestionandadjustitstransmissionsaccordinglytherebyimprovingoverallperformance.
corruptedpackettothehostthatoriginatedthepacket.
Per-packetmechanismsthatattempttodeterminetherootcauseofeachlossexperienced.
AggregatenotificationschemeswheretheTCPsenderisprovidedwithaggregatestatisticsaboutthelosspatternsexperiencedinthenetworkpath.
DeterminehowTCPshouldbestreactuponreceivingETENnotification.
AssessthesecurityimplicationsofintroducingvariousETENmechanismsintotheInternetarchitecture.
Theseinclude:oPotentialvulnerabilitiesoftheproposedmechanismstodistributeddenial-of-serviceattacks.
oOperationoverencryptedtunnels,VPNs,andMPLSpaths,whereintermediatenodesmaynotbeabletodetermineactualsourceordestinationIPaddressesandports,makingETENnotificationeffectivelyimpossible.
oVulnerabilitiestomisbehavingreceiversthatattempttomaskcongestion-relatedlossesusingETENmechanismsinanattempttoobtainanunfairshareofnetworkresources.
III.
ERRORNOTIFICATIONANDRESPONSEMECHANISMSFortheETENmechanismsproposedinthisreportweassumeoneofthefollowingtwocasesholds:1.
ThesourceanddestinationIPaddresses,thesourceanddestinationTCPports,andtheTCPsequencenumbercanbecorrectlyobtainedfromthecorruptedpacket.
Inaddition,thepacketinquestionmustbepartofthesender'scurrentwindow;otherwise,theopportunitytomitigatetheperformanceproblemscausedbythecorruptedpacketislost.
Forthiscase,Oracle,BackwardandForwardETENwereconsideredwithOracleandBackwardETENsimulated.
2.
Thenodedetectingerrorscanonlycalculatecumulativeerrorratesforeachlink.
Inotherwords,theinformationintheheaderofacorruptedpacketisconsideredinaccurate.
BothForwardandBackwardCumulativeETENwereconsideredforthiscasewithonlyForwardCETEN(FCETEN)simulated.
IV.
ORACLEETENOracleETEN,illustratedinFigure1,isatheoreticalconstructthatassumessufficientknowledgeaboutthecorruptedpacket(senderanddestinationIPaddresses,senderanddestinationTCPportnumbers,andtheTCPsequencenumber)isavailabletotheintermediaterouterortheend-systemthatdetectscorruption.
Furthermore,thismechanismassumesthatthesourceoftheflowcanbeinstantaneouslynotifiedofthepacketcorruption.
OracleETENprovidesanupperboundontheperformanceimprovementachievablebyETENmechanismsthatnotifythesource.
WhiletheOracleETENmechanismisanimpossibilityintherealworld,itcanbeusedtodistinguishbetweencasesinwhichsomeETENmechanismwouldbeusefulandcaseswhennoETENschemewouldaidperformance.
Figure1-OracleETENV.
BACKWARDETENThebackwardETEN(BETEN)mechanism,illustratedinFigure2,isanalogoustobackwardexplicitcongestionnotificationschemes(e.
g.
,source-quench[4]).
Thismechanismassumesthattheintermediateroutercanextractorreconstruct(e.
g.
,usingFEC)sufficientknowledgeaboutthecorruptedpacketthatisrequiredtonotifythesender.
Figure2-BackwardETENVI.
FORWARDETENTheforwardETEN(FETEN)mechanismillustratedinFigure3isanalogoustoforwardexplicitcongestionnotificationschemes(e.
g.
,[6][7]).
Thismechanismalsoassumesthattheintermediateroutercanextract(orreconstructusingFEC)completeandcorrectknowledgeoftheIPaddresses,TCPports,andTCPsequencenumbercorrespondingtothecorruptedpacket.
Upondetectionofacorruptedpacket,theintermediateroutertransmitsaFETENmessagetothedestinationhost,whichthenconveystheinformationtothesenderonasubsequentacknowledgment.
Figure3-ForewardETENVII.
CUMULATIVEETENInpractice,wecannotalwaysaccuratelyretrievethesourceanddestinationIPaddress,sourceanddestinationTCPportnumbers,andTCPsequencenumberfromacorruptedpacketorlink-layerframe.
ForsuchcasesweconsiderETENmechanismsthatworkonthebasisofcumulativeerrorrates(forexample,errorratesthatareaveragedoveranintervaloftimeandacrossvariousflows),ratherthanattemptingtomakenotificationsonaper-packetbasis.
ThecumulativeETEN(CETEN)informationconveyedtotheend-hostscanbeinoneofseveraldifferentforms:Anabsolutebiterrorrate,byteerrorrate,orpacketerrorrateobservedwithinamovingwindowintime.
Theerrorratemaybequantizedintoasmallnumberofsteps(forexample,high,medium,andlow).
Abinaryfeedbackscheme[7](seealso[5][6])isaspecialcasethatprovidesindicationthatthebit/byte/packeterrorrateexceedssomethreshold.
Arelativeerrorratethatsimplyindicatesthatthequantizederrorratehasincreasedordecreasedfromthepreviousvalue.
Anestimateoftheprobabilitythatapacketsurvivescorruption.
CETENinformationcanbedeliveredtoasenderviaforwardorbackwardsignaling,analogoustoaFETEN-basedoraBETEN-basedstrategy.
Also,CETENcanbepiggybackedondataandacknowledgmentpackets,ratherthanusingadditionaldistinctmessages.
CETENinformationcanbecollectedonaper-hopbasisoraggregatedovertheend-to-endpath.
Duetothedifficultyincorrectlyassigningcorruptedpacketstotheircorrespondingflows,anyper-flowCETENinformationhastobeestimated,forexamplefromwhatisobservedacrossallflowsusingagivenlink.
CETENstrategiesthatrelypurelyonstatisticscollectedwithinthelifetimeofaparticularflowareoflimiteduseforshortflows.
Forexample,ashortflowmayhaveterminatedbeforeweobtainagoodestimateofthepacketcorruptionprobability.
VIII.
SENDERRESPONSETOETENThesender'sresponsetoanETENnotificationdependsonthetypeofthenotification.
IfthesenderreceivestimelyandreliableinformationaboutthecorruptedpacketthatidentifiestheTCPflowandthesequencenumberwithintheflow,thenthesendercanretransmitthecorruptedpacketwithoutadjustingthecongestionstate.
However,iftheinformationcontainedintheETENnotificationisonlypartiallyreliable,orifonlyacumulativeerrorrateisavailable,thenthesenderhastoapplyaheuristictodeterminewhatactionisappropriate.
Whenatransportendpointinfersapacketloss,itcannotexactlydeterminefromtheCETENinformationifthepacketlossoccurredduetocorruptionorcongestion.
Atbest,theCETENinformationprovidesarecentestimateofthefractionofthelossesthatareduetocorruption.
Thedecisiontobemadebythesenderincludeswhetheranoutstandingsegmentshouldberetransmittedandwhetherthecongestionstateshouldbealteredinresponse.
SincemostlinkleveltechnologiesrequirecorruptedpacketstobediscardedevenbeforeitreachestheIPlayer,per-packetETENmechanisms(attheIPandTCPlayers)cannotseethecorruptedpackets.
Althoughthesenderresponsetoper-packetETENismorestraightforwardthantheresponsetoCETEN,itmustbenotedthatthecorruptionlinklayercountersoferrorsarereadilyavailable;thesecounterscanbeusedtogenerateCETEN.
IX.
PERFORMANCEOFETENMECHANISMSInthissection,wedescriberesultsofsimulationsontheperformanceofOracleETEN,BETENandFCETEN.
Varioustypesoflinks(e.
g.
,terrestrialLAN,WAN,andsatellite),modeledbytheirrespectivelatencies,aresimulatedoverawiderangeofbiterrorrates.
ETENperformanceiscomparedagainstconventionalReno[2]andSACK[8]variantsofTCP.
EachsimulationconsistsofabulkTCPflow(FTPapplication)of120secondsdurationwithunlimiteddatatosend.
TheactualvaluesandvariablerangesusedinthestudyarelistedinTable1.
Allsimulationswereperformedusingthens-2simulator[9](version2.
1b7a)withextensions.
Table1-ParametersValuesOracleETENrepresentstheideal,yetimpossible,baselinethatprovidesanupperboundontheperformanceachievablebyanypracticalper-packetETENscheme.
OnedesigngoalisthattheadditionofanyETENscheme(toanygivenTCPcongestionavoidancestrategy)shouldnotmaketheperformanceworse;therefore,thecasewithnoETENisexpectedtoprovideausefullowerbound(and,thisisshowninoursimulationresults).
TheBETENstrategyrepresentsanimplementableper-packetETENstrategy(assumingthatwecanextractsufficientinformationfromcorruptedpackets).
Intheabsenceofcongestion,wecanexpectthatthegoodputwhenusingBETENwillliebetweenthegoodputsusingOracleETENandnoETEN.
TheCETENstrategyrepresentsanimplementablecumulativeETENstrategythatispotentiallymorerobustintermsofsecuritythanper-packetETENstrategies,buttheoreticallyprovideslessperformancegains.
InourstrategytheCETENflowsintheforwarddirectionandgetscopiedoverontotheacknowledgmentsgoingback.
Weconsidereightsetsofsimulations,asfollows:A.
Baseline–nocrosstrafficoverasingle-hoptopologyThissetofsimulationsisaimedatevaluatingthegainspossibleoverasingleuncongestedlinkusingOracleETENandBETENwithTCPRenoandTCPSACK.
B.
Multi-hoptopologywithnocross-trafficInthissetofsimulations,weusea3-hoplineartopologyofidenticallinks,whilevaryingtheotherparametersoutlinedabove.
Thesesimulationsservethepurposeofvalidatingourimplementationinamorecomplextopologywithmultiplelinksandrouters.
Theresultsareexpectedtomatchthoseofthefirstset.
C.
Multi-hoptopologywithcompetingUDPflows:Inthissetofsimulations,weusea3-hoplineartopologytoprovideinsightintotheperformanceofETENmechanismsinthefaceofcongestionfromconstant-bit-rateUDPtraffic.
Theintensityofcross-trafficisvariedacrosssimulationruns.
Thecompetingtrafficinthesesimulationsdoesnotuseacongestionavoidancestrategy.
D.
Multi-hoptopologywithcompetingTCPflows:ThissetofsimulationsofferscompetingTCPtraffic(insteadofUDPtraffic)andisotherwiseidenticaltothethirdset.
ThisprovidesinsightintotheperformanceofETENwhenthecompetingtrafficflowsalsouseacongestionavoidancestrategy.
E.
ComparisonofETENtoTCPWestwood:ThissetofsimulationsprovidesperformancecomparisonofourETENmechanismswithTCPWestwood[10]intheabsenceofcrosstraffic.
RecentlyproposedmodificationstoTCPcongestionavoidanceincludeusingbandwidthestimationtechniques.
TCPWestwood[10]isarepresentativecongestionavoidancestrategybasedonbandwidthestimation.
TCPWestwoodhasbeenshowntoperformwellunderhigherrorratesinsimulatedcomparisonstoTCPRenoandSACKTCP.
Here,wecompareviasimulationstheperformanceofETENwithRenoandSACKagainstTCPWestwood.
F.
ComparisonofETENtoTCPWestwoodwithUDPcross-traffic:ThissetofsimulationsprovidesperformancecomparisonofourETENmechanismswithTCPWestwood[10]inthepresenceofcrosstraffic.
G.
CumulativeETENperformancewithUDPcrosstraffic:Inthissetofsimulations,weusea3-hoplineartopologyofidenticallinks.
TheperformanceofCETENisevaluatedinthepresenceofUDPcrosstraffic.
H.
CumulativeETENperformancewithTCPcrosstrafficInthissetofsimulations,weusea3-hoplineartopologyofidenticallinks.
TheperformanceofCETENisevaluatedinthepresenceofTCPcrosstraffic.
X.
PERFORMANCEThefollowingarethreesampleresultsofthevariousteststhatwereperformedinthisstudy.
Foradetaileddescriptionofallthetestsandresults,refertothecompleteBBNreport.
A.
BaslineInthebaselinesetofsimulations,weinvestigateasingleTCPflowoverasinglelinkwithchannelerrorsthatresultinpacketcorruption.
Inthissetofsimulations,thereisnocross-trafficcompetingwiththeTCPflow.
ExaminingETENinisolationprovidesanempiricalupperboundonthegaininTCPgoodputthatisachievableusingETENmechanisms.
ThebaselineforthesimulationsistheperformanceofTCPRenoandSACKundervariouserrorrates.
Weconsidertwonear-idealconditionsfortheerrordetectionandnotification:1.
OracleETEN–completeknowledgeofthecorruptedpacketandinstantaneousnotificationtothesource.
2.
BETEN–completeknowledgeofthecorruptedpacketwithrealBETENmessagespropagatingbacktothesource.
TheresultsinFigure4showthegoodputusingRenowithOracleETENoveralong-thinnetwork(ataBERof10-5)isalmostseventimesthebaselinegoodputusingRenoalone.
ThegoodputusingBETENwithSACKismorethanthreetimestheSACKbaseline,andthegoodputusingBETENwithRenoisabouttwoandonehalftimestheRenobaseline.
ThefigurealsoillustratesthatwhentheerrorsarenotasprevalentonthelinktheETENmechanismshavearelativelysmallimpactbecauseerrorshaveonlyasmallimpactonstockTCP.
Fromthesimplesimulationspresentedinthissectionwecanderiveseveralconclusions:TheperformanceusingBETENwithSACKisclosetothatofOracleETENatlowerrorrates.
AstheBERincreases,thechancesoflosinganotificationalsoincreasesandweseethatgainsfromBETENbegintodiminish.
UsingBETENwithSACKoutperformsBETENwithReno;thismaybebecausetheabilityofSACKtocorrectmultiplelossescomplementsETEN.
Ingeneral,TCPSACKperformsbetterthanTCPRenoduetotheabilityofTCPSACKtomostlydecouplelossrecoveryfromcongestioncontrol.
Figure4-TCPwithETENoveranuncongestedlongthinnetwork(LTN)B.
TCPWestwoodversusSACKBETENForthesimulationresultsinfigure5,wecomparetheperformanceofTCPWestwoodwhenbothcongestionandcorruptionlossesarepresent.
Figure5showstheperformanceofTCPWestwoodandBETENovera3-hoplineartopologywith1.
5Mb/slinkseachwithaone-waydelayof320ms.
WeusecompetingUDPtrafficforthesesimulations.
Theplotshowsthatathigherrorratesandmoderatecongestion,BETEN'sabilitytodistinguishbetweencorruptionandcongestionlossesprovidesperformanceimprovementsovertheTCPWestwoodstrategythatreliesonintelligentbandwidthestimationalone.
TheWestwoodstrategy,however,showsanadvantageunderheavycongestion(_competingflows)withlowtomoderateerrorrates.
Figure5-TCPWestwoodversusSACKTCPwithETENoveralongthinnetwork(LTN)Figure6-CETENPerformancewithTCPRenoandTCPcrosstrafficC.
CumulativeETENversusTCPRENOThesimulationresultsinfigure6showCETENwithTCPcrosstraffic2.
Theresultsindicatethatunderallcongestionlevels,CETENoffersmoderategoodputgainsoverTCPReno,exceptathighBER(10-5).
TheCETENsimulationsweconductedaspartofthisinvestigationshowCETENtobeapromisingapproachinsomesituations.
Inothersituations,CETENoffersworseperformancethanTCPReno.
WefeelthatfurtherinvestigationintoadditionalCETENmechanismsiswarrantedbeforemakingconclusionsonthefeasibilityofCETENingeneral.
Forinstance,aninvestigation2ItisimportanttonotethatthecompetingtrafficinoursimulationdidnotuseanyETENmechanism.
Thus,thecompetingtrafficneedlesslyreducetheirtransmissionrateswhentheyexperiencecorruptionlosses.
Thisallowstheflowofinteresttousemoreofthebottleneckbandwidth.
intohowwelltheendsystemcanestimatethetotallossrateandusethatfordeterminingthefractionoflossescausedbycongestionmayshedadditionallightonCETEN(andmakeitmorefeasibletodeploy).
XI.
SECURITYCONSIDERATIONSETENtechniques(suchasBETEN,forexample)thatrequireout-of-bandmessagesarevulnerabletodistributeddenialofservice(DDOS)attacksbecausenetworksthatplantousethisformofETENwillhavetoallowsuchmessagestoenterorleavetheirnetworks.
ThismakesitpossibleforanadversarytolaunchaDOSattackbybombardingahost(oranetwork)withETENmessages.
Thiscanminimallyoverwhelmthevictimhost,butiflaunchedasadistributeddenialofserviceattackfromalargenumberofhosts(thathavebeencompromisedbyanInternetworm,forinstance),anattackcanoverwhelmthecapacityofentirenetworks[11].
ETENmechanismsmaybevulnerabletoanothermoresubtleandindirectattack.
Amaliciousadversarycansendfalsenotificationscorrespondingtopacketsthatareeithernotdroppedorweredroppedduetocongestion.
Thiscaninducethesenderintoretransmittingpacketsunnecessarilyorintobypassingcongestionavoidanceandcontinuetransmittingatahigherratethanappropriateforthegivennetworkconditions.
Thisattackinisolation(onasingleflow)cancauselimiteddamage.
However,ifacoordinatedattackwerelaunchedonmanyTCPflowsonaheavilyloadednetwork,theattackcanpotentiallydrivethenetworkintocongestioncollapse[12].
Theuseofencryptioncanpreventdeepheaderinspection.
Forexample,IPsec[13]hidesTCPportinformation;IPsectunnelsalsohidetheoriginalsourceaddress.
ThismakesitdifficultforintermediaterouterstodeterminethecorrectTCPendpointstowhichETENmessagesshouldbedelivered.
XII.
CONCLUSIONSOurconclusionsfromthisstudyare:Per-packetETENmechanismsoffersubstantialgainsinbulkTCPgoodputintheabsenceofcongestion;however,inthepresenceofcongestionTCPcongestionavoidancemechanismsdominateresultingininsignificantgainsfromETEN.
Theproposedper-packetmechanismsprovideusefulupperboundsonperformancethatcanbeusedtoevaluatefutureproposalsofper-packetandcumulativeETENtechniques.
Per-packetmechanismspresentsignificantchallengestopracticalimplementationbyprovidinganewopportunitytoexploitInternetsecurityvulnerabilitiesandbyrequiringintermediatenodestoreliablyextractinformationfromtheheadersofcorruptedpacketsCumulativeETENtechniquesaremoreattractivetoimplementation;however,theparticularmechanismweevaluateddidnotrealizethepotentialgainsofper-packettechniquesSecurityvulnerabilitiesincludenotonlydenial-of-serviceattacksbutalsomoresubtleattackswitheffectsrangingfromunfairbandwidthsharingtototalcongestioncollapseofthenetwork.
FutureworkinthisareashouldfocusonalternativecumulativeETENmechanisms,accuratelossinferenceatendpointstoavoidtrackingcongestionlossesateveryhop,interactionswithforwarderrorcorrection,andcross-layerco-operationforETEN.
XIII.
RECOMMENDATIONSFORFUTUREWORKTheresultsofthisinitialbroadstudyareintriguing;theyleadustorecommendfurtherworkfocusedonspecificaspectsofETEN.
Ontheonehand,ourworkdemonstratestremendouspotentialfromETENifreliableinformationextractionfromheaderswerepossibleandcongestioncansomehowbecontrolled.
Ontheotherhand,ituncoversanumberofpracticalchallengescoupledwithachievingonlylimitedsuccesswiththeparticularcumulativeETENschemeweimplemented.
TheprimarythrustthatwerecommendistoexplorecumulativeETENalternativesthatdonotrelyoncongestionfeedbackfromintermediaterouters(sincethiswouldimplicitlydemandglobaldeploymentandrendertheschemelesspractical).
WebelievethatthebiggestchallengetorealizingCETENschemesistheinabilityofaTCPendpointtoaccuratelyestimatethetotallossatafineresolution(ofafewpackets)andinatimelymanner(withinanRTTtoenablequickrecovery).
Researchisneededtodevelopthiscapability.
Giventhiscapability,werecommendthatourproposedcumulativeETENschemeshouldberefinedtomakeuseofitandthenre-evaluated.
TheinteractionsofECNwiththerefinedcumulativeETENschemealsoremaintobestudiedinthiscontext.
OurcurrenteffortfocusedonquantifyingthroughputimprovementsachievableusingETENandwasthereforelimitedtolong-livedTCPflows.
FurtherworkisneededtoisolatetheeffectsoflossduringtheslowstartphaseandquantifythebenefitsofETENforshort-livedflows.
Wealsorecommendthatthemechanismsbeevaluatedusingrealnetworktopologiesandtraffictracesincludingotherworkloads,forexample,HTTPtransactions.
Underhigherrorrates,TCPconnectionestablishmentcanbedelayedorcanfailcompletely.
WebelievethatincreasingtheconnectionestablishmentrateunderhigherrorratescouldbeakeybenefitofETEN.
Werecommendthatfutureworkaddressthisissue.
REFERENCES[1]J.
Postel(editor),"TransmissionControlProtocol,"RequestforComments:793,September1981.
[2]V.
Jacobson,"CongestionAvoidanceandControl,"ProceedingsofACMSIGCOMM'88,Stanford,CA,USA,August1988.
[3]M.
Allman,V.
Paxson,andW.
Stevens,"TCPCongestionControl,"RequestforComments:2581,April1999.
[4]ISI,"InternetControlMessageProtocol,"RequestforComments:792,September1981.
[5]K.
Ramakrishnan,andS.
Floyd,"AProposaltoaddExplicitCongestionNotification(ECN)toIP,"RequestforComments:2481,January1999.
[6]K.
Ramakrishnan,S.
Floyd,andD.
Black,"TheAdditionofExplicitCongestionNotification(ECN)toIP,"RequestforComments:3168,September2001.
[7]K.
K.
Ramakrishnan,andR.
Jain,"ABinaryFeedbackSchemeforCongestionAvoidance,"ACMTransactionsonComputerSystems,Volume8,Number2,May1990,pp.
158–181.
[8]M.
Mathis,J.
Mahdavi,S.
Floyd,andA.
Romanow,"TCPSelectiveAcknowledgmentOptions,"RequestforComments:2018,October1996.
[9]ns-2simulator,http://www.
isi.
edu/nsnam/ns/index.
html[10]S.
Mascolo,C.
Casetti,M.
Gerla,M.
Sanadidi,andR.
Wang,"TCPWestwood:End-to-endBandwidthEstimationforEfficientTransportoverWiredandWirelessNetworks,"ProceedingsofMOBICOM2001,Rome,Italy,July2001.
[11]S.
Gibson,"TheStrangeTaleoftheAttacksAgainstGRC.
COM,"http://grc.
com/dos/grcdos.
htm.
[12]S.
Floyd,andK.
Fall,"PromotingtheUseofEnd-to-EndCongestionControlintheInternet,"IEEE/ACMTransactionsonNetworking,August1999,pp.
458–472.
[13]S.
Kent,andR.
Atkinson,"SecurityArchitecturefortheInternetProtocol,"RequestforComments:2401,November1998.

Contabo美国独立日促销,独立服7月€3.99/月

Contabo自4月份在新加坡增设数据中心以后,这才短短的过去不到3个月,现在同时新增了美国纽约和西雅图数据中心。可见Contabo加速了全球布局,目前可选的数据中心包括:德国本土、美国东部(纽约)、美国西部(西雅图)、美国中部(圣路易斯)和亚洲的新加坡数据中心。为了庆祝美国独立日和新增数据中心,自7月4日开始,购买美国地区的VPS、VDS和独立服务器均免设置费。Contabo是德国的老牌服务商,...

virmach:3.23美元用6个月,10G硬盘/VirMach1核6个月Virmach

virmach这是第二波出这种一次性周期的VPS了,只需要缴费1一次即可,用完即抛,也不允许你在后面续费。本次促销的是美国西海岸的圣何塞和美国东海岸的水牛城,周期为6个月,过后VPS会被自动且是强制性取消。需要临时玩玩的,又不想多花钱的用户,可以考虑下!官方网站:https://www.virmach.comTemporary Length Service Specials圣何塞VPS-一次性6个...

cloudcone:特价便宜VPS补货通知贴,SAS或SSD低价有磁盘阵列,SAS或SSD raid10 硬盘

cloudcone经常性有特价促销VPS放出来,每次的数量都是相当有限的,为了方便、及时帮助大家,主机测评这里就做这个cloudcone特价VPS补货专题吧,以后每次放货我会在这里更新一下日期,方便大家秒杀!官方网站:https://cloudcone.com/预交费模式,需要充值之后方可使用,系统自动扣费!信用卡、PayPal、支付宝,均可付款购买!为什么说cloudcone值得买?cloudc...

piggycase为你推荐
编程小学生惊库克少儿编程,编程小将的班值得报吗?云爆发云联惠是什么来的Baby被问婚变绯闻黄晓明婚礼上说baby碰他哪里最兴奋百度商城百度知道一般一天能挣多少钱?mathplayer比较word,TeX,MathML中的数学公式处理方式的异同点,尽量详细哦,分数不是问题,谢谢哈,会加分的。mathplayerjavascript 如何判断document.body.innerHTML是否为空地陷裂口造成地陷都有哪些原因?冯媛甑冯媛甄 康熙来了rawtools照片上面的RAW是什么意思,为什么不能到PS中去编辑porndao单词prondao的汉语是什么
美元争夺战 免费cdn加速 双12活动 lighttpd 免费个人网站申请 idc资讯 网通服务器托管 视频服务器是什么 web应用服务器 中国联通宽带测速 购买空间 江苏徐州移动 腾讯数据库 北京主机托管 双11促销 windowsserver2012r2 cpu使用率过高怎么办 e-mail 删除域名 认证机构 更多