servicepiggycase
piggycase 时间:2021-03-23 阅读:(
)
ExplicitTransportErrorNotification(ETEN)forError-ProneWirelessandSatelliteNetworks–Summary_-ERajeshKrishnan,MarkAllman,CraigPartridge,andJamesP.
G.
SterbenzBBNTechnologiesWilliam.
IvancicGlennResearchCenterAbstract—ThispaperisasummaryoftheBBNTechnicalReportNo.
8333,"ExplicitTransportErrorNotificationforError-ProneWirelessandSatelliteNetworks.
"InthisstudywediscusstwotypesofExplicitTransportErrorNotification(ETEN)mechanisms:(i)per-packetmechanismsthatnotifyendpointsofeachdetectedcorruption;and(ii)cumulativemechanismsthatnotifyendpointsofaggregatecorruptionstatistics.
Wehaveimplementedtheproposedmechanismsinthens-2simulator.
WepresentsimulationresultsonperformancegainsachievableforTCPRenoandTCPSACK,usingETENmechanismsoverawiderangeofbiterrorratesandtrafficconditions.
WecompareTCPRenoandTCPSACKenhancedwithETENmechanismsagainstTCPWestwood,whichusesabandwidthestimationstrategyinplaceofthetraditionalAIMDcongestionavoidancealgorithm.
WediscusstwoissuesrelatedtothepracticaldeploymentofETENmechanisms:corruptiondetectionmechanisms(andtheirco-operationwithETEN-basedrecoveryinthetransportlayer)andsecurityaspects.
Weincluderecommendationsforfurtherwork.
IndexTerms—CongestionControl,ExplicitTransportErrorNotification,Internet,Protocols,Satellite,TCP/IPI.
BACKGROUNDNASAisworkingtoextendtheInternetintospaceinordertoimprovecommunications,enablenewsystemcapabilitiesandreduceoverallmissioncosts.
Assuch,NASAisinterestedinleveragingtechnologiesdevelopedbythecommercialcommunicationindustry.
Inparticular,NASAisinterestedinutilizingcommodityprotocols,theTCP/IPprotocolsuite,whereverpossible.
NASAcommissionedBBNTechnologiestoinvestigatethepotentialnetworkperformancebenefitsofETENandthepracticalissuesinvolvedinimplementinganddeployingETEN.
ThispaperisasummaryoftheBBNTechnicalReportNo.
8333,"ExplicitTransportErrorNotificationforError-ProneWirelessandSatelliteNetworks.
"II.
INTRODUCTIONOneobstacletogoodperformanceofinternetworkswithwirelessandsatellitecomponentsisnon-negligiblebit-errorrates(BER).
ThemostwidelyusedtransportprotocolintheTCP/IPsuite,thetransmissionControlProtocol(TCP)[1],guaranteesthatcorrupteddatawillberetransmittedbythedatasender,henceprovidingareliablebyte-streamtoapplications.
However,packetlossisalsousedbyTCPtodeterminethelevelofcongestioninthenetwork[2]–astraditionally,thebulkofpacketlossinnetworkscomesfromrouterqueueoverflow(i.
e.
congestion).
Therefore,toavoidcongestioncollapseTCPrespondstopacketlossbydecreasingthecongestionwindow[2][3],andthereforethesendingrate.
Thereductionofthecongestionwindowisnotneededtoprotectnetworkstabilityinthecasewhenlossesarecausedbycorruptionandthereforetheseneedlessreductionsinthesendingratehaveanegativeimpactonperformancewithlittleoverallbenefittothenetwork.
IftheTCPsendercandistinguishpacketslostduetocongestionfrompacketslostduetoerrors,betterperformancemaybeachieved.
TheperformancebenefitcanberealizedifTCPcanretransmitapacketlostduetocorruptionwithoutneedlesslyreducingthetransmissionrate,whilecontinuingtoprotectnetworkstabilitybydecreasingthesendingratewhenlossiscausedbynetworkcongestion.
TCPExplicitTransportErrorNotification(ETEN)istheconceptofnotifyingTCPthatpacketswerelostduetocorruption1.
ETENmechanismscanaidTCPindistinguishingpacketsthatarelostduetocongestionfromonesthatarelostduetocorruption.
Thepurposeofthisstudyistwo-fold:1.
ToestablishboundsontheperformanceimprovementsthatcanbeobtainedwiththeuseofidealETENmechanismsunderdifferentnetworkconditions–errorrates,capacities,delays,topologies,congestion–andtherebydeterminepromisingdirectionsforfutureresearch,ifany.
2.
ToconsiderissuesrelatedtopracticaldeploymentofETENmechanisms,toproposesuitablearchitecturesandmechanisms,toidentifysecurityvulnerabilities,andtoidentifyareasthatrequirefurtherstudybeforeanETENsystemisviable.
Throughsimulations,wehaveevaluatedpossibleenhancementstoTCPthatarebasedonETENnotificationsfromintermediateroutersand/orendsystems.
Emulationsinatestbedandlivetestingoverrealnetworkswereconsideredoutofscopeofthiseffort.
Thisstudyincludedthefollowingtasks:DetermineboundsonTCPgoodputimprovementspossiblefromETENwhenaTCPsenderispresentedwithidealinformationaboutthecauseofeachloss.
Evaluateviasimulations,actualperformanceachievableoverarangeofnetworktopologiesandtrafficconditionswithdifferentTCPvariantssuchasRenoandSACK.
DiscussandevaluatetheperformanceofspecificETENmechanismsthatfallinoneormoreofthefollowingbroadcategories:oForwardnotification–wherebyanynotificationaboutcorruptedpacketsissentinthedirectionofthedatapacketsandthenreturnedtothesenderinTCPacknowledgmentsegments.
oBackwardnotification–inwhichamessageissentfromthenode(end-hostorintermediaterouter)thatdetectsa1ETENissimlartoExplicitCongestionNotification(ECN).
InECN,TCPcanbeinformedoftheonsetofcongestionandadjustitstransmissionsaccordinglytherebyimprovingoverallperformance.
corruptedpackettothehostthatoriginatedthepacket.
Per-packetmechanismsthatattempttodeterminetherootcauseofeachlossexperienced.
AggregatenotificationschemeswheretheTCPsenderisprovidedwithaggregatestatisticsaboutthelosspatternsexperiencedinthenetworkpath.
DeterminehowTCPshouldbestreactuponreceivingETENnotification.
AssessthesecurityimplicationsofintroducingvariousETENmechanismsintotheInternetarchitecture.
Theseinclude:oPotentialvulnerabilitiesoftheproposedmechanismstodistributeddenial-of-serviceattacks.
oOperationoverencryptedtunnels,VPNs,andMPLSpaths,whereintermediatenodesmaynotbeabletodetermineactualsourceordestinationIPaddressesandports,makingETENnotificationeffectivelyimpossible.
oVulnerabilitiestomisbehavingreceiversthatattempttomaskcongestion-relatedlossesusingETENmechanismsinanattempttoobtainanunfairshareofnetworkresources.
III.
ERRORNOTIFICATIONANDRESPONSEMECHANISMSFortheETENmechanismsproposedinthisreportweassumeoneofthefollowingtwocasesholds:1.
ThesourceanddestinationIPaddresses,thesourceanddestinationTCPports,andtheTCPsequencenumbercanbecorrectlyobtainedfromthecorruptedpacket.
Inaddition,thepacketinquestionmustbepartofthesender'scurrentwindow;otherwise,theopportunitytomitigatetheperformanceproblemscausedbythecorruptedpacketislost.
Forthiscase,Oracle,BackwardandForwardETENwereconsideredwithOracleandBackwardETENsimulated.
2.
Thenodedetectingerrorscanonlycalculatecumulativeerrorratesforeachlink.
Inotherwords,theinformationintheheaderofacorruptedpacketisconsideredinaccurate.
BothForwardandBackwardCumulativeETENwereconsideredforthiscasewithonlyForwardCETEN(FCETEN)simulated.
IV.
ORACLEETENOracleETEN,illustratedinFigure1,isatheoreticalconstructthatassumessufficientknowledgeaboutthecorruptedpacket(senderanddestinationIPaddresses,senderanddestinationTCPportnumbers,andtheTCPsequencenumber)isavailabletotheintermediaterouterortheend-systemthatdetectscorruption.
Furthermore,thismechanismassumesthatthesourceoftheflowcanbeinstantaneouslynotifiedofthepacketcorruption.
OracleETENprovidesanupperboundontheperformanceimprovementachievablebyETENmechanismsthatnotifythesource.
WhiletheOracleETENmechanismisanimpossibilityintherealworld,itcanbeusedtodistinguishbetweencasesinwhichsomeETENmechanismwouldbeusefulandcaseswhennoETENschemewouldaidperformance.
Figure1-OracleETENV.
BACKWARDETENThebackwardETEN(BETEN)mechanism,illustratedinFigure2,isanalogoustobackwardexplicitcongestionnotificationschemes(e.
g.
,source-quench[4]).
Thismechanismassumesthattheintermediateroutercanextractorreconstruct(e.
g.
,usingFEC)sufficientknowledgeaboutthecorruptedpacketthatisrequiredtonotifythesender.
Figure2-BackwardETENVI.
FORWARDETENTheforwardETEN(FETEN)mechanismillustratedinFigure3isanalogoustoforwardexplicitcongestionnotificationschemes(e.
g.
,[6][7]).
Thismechanismalsoassumesthattheintermediateroutercanextract(orreconstructusingFEC)completeandcorrectknowledgeoftheIPaddresses,TCPports,andTCPsequencenumbercorrespondingtothecorruptedpacket.
Upondetectionofacorruptedpacket,theintermediateroutertransmitsaFETENmessagetothedestinationhost,whichthenconveystheinformationtothesenderonasubsequentacknowledgment.
Figure3-ForewardETENVII.
CUMULATIVEETENInpractice,wecannotalwaysaccuratelyretrievethesourceanddestinationIPaddress,sourceanddestinationTCPportnumbers,andTCPsequencenumberfromacorruptedpacketorlink-layerframe.
ForsuchcasesweconsiderETENmechanismsthatworkonthebasisofcumulativeerrorrates(forexample,errorratesthatareaveragedoveranintervaloftimeandacrossvariousflows),ratherthanattemptingtomakenotificationsonaper-packetbasis.
ThecumulativeETEN(CETEN)informationconveyedtotheend-hostscanbeinoneofseveraldifferentforms:Anabsolutebiterrorrate,byteerrorrate,orpacketerrorrateobservedwithinamovingwindowintime.
Theerrorratemaybequantizedintoasmallnumberofsteps(forexample,high,medium,andlow).
Abinaryfeedbackscheme[7](seealso[5][6])isaspecialcasethatprovidesindicationthatthebit/byte/packeterrorrateexceedssomethreshold.
Arelativeerrorratethatsimplyindicatesthatthequantizederrorratehasincreasedordecreasedfromthepreviousvalue.
Anestimateoftheprobabilitythatapacketsurvivescorruption.
CETENinformationcanbedeliveredtoasenderviaforwardorbackwardsignaling,analogoustoaFETEN-basedoraBETEN-basedstrategy.
Also,CETENcanbepiggybackedondataandacknowledgmentpackets,ratherthanusingadditionaldistinctmessages.
CETENinformationcanbecollectedonaper-hopbasisoraggregatedovertheend-to-endpath.
Duetothedifficultyincorrectlyassigningcorruptedpacketstotheircorrespondingflows,anyper-flowCETENinformationhastobeestimated,forexamplefromwhatisobservedacrossallflowsusingagivenlink.
CETENstrategiesthatrelypurelyonstatisticscollectedwithinthelifetimeofaparticularflowareoflimiteduseforshortflows.
Forexample,ashortflowmayhaveterminatedbeforeweobtainagoodestimateofthepacketcorruptionprobability.
VIII.
SENDERRESPONSETOETENThesender'sresponsetoanETENnotificationdependsonthetypeofthenotification.
IfthesenderreceivestimelyandreliableinformationaboutthecorruptedpacketthatidentifiestheTCPflowandthesequencenumberwithintheflow,thenthesendercanretransmitthecorruptedpacketwithoutadjustingthecongestionstate.
However,iftheinformationcontainedintheETENnotificationisonlypartiallyreliable,orifonlyacumulativeerrorrateisavailable,thenthesenderhastoapplyaheuristictodeterminewhatactionisappropriate.
Whenatransportendpointinfersapacketloss,itcannotexactlydeterminefromtheCETENinformationifthepacketlossoccurredduetocorruptionorcongestion.
Atbest,theCETENinformationprovidesarecentestimateofthefractionofthelossesthatareduetocorruption.
Thedecisiontobemadebythesenderincludeswhetheranoutstandingsegmentshouldberetransmittedandwhetherthecongestionstateshouldbealteredinresponse.
SincemostlinkleveltechnologiesrequirecorruptedpacketstobediscardedevenbeforeitreachestheIPlayer,per-packetETENmechanisms(attheIPandTCPlayers)cannotseethecorruptedpackets.
Althoughthesenderresponsetoper-packetETENismorestraightforwardthantheresponsetoCETEN,itmustbenotedthatthecorruptionlinklayercountersoferrorsarereadilyavailable;thesecounterscanbeusedtogenerateCETEN.
IX.
PERFORMANCEOFETENMECHANISMSInthissection,wedescriberesultsofsimulationsontheperformanceofOracleETEN,BETENandFCETEN.
Varioustypesoflinks(e.
g.
,terrestrialLAN,WAN,andsatellite),modeledbytheirrespectivelatencies,aresimulatedoverawiderangeofbiterrorrates.
ETENperformanceiscomparedagainstconventionalReno[2]andSACK[8]variantsofTCP.
EachsimulationconsistsofabulkTCPflow(FTPapplication)of120secondsdurationwithunlimiteddatatosend.
TheactualvaluesandvariablerangesusedinthestudyarelistedinTable1.
Allsimulationswereperformedusingthens-2simulator[9](version2.
1b7a)withextensions.
Table1-ParametersValuesOracleETENrepresentstheideal,yetimpossible,baselinethatprovidesanupperboundontheperformanceachievablebyanypracticalper-packetETENscheme.
OnedesigngoalisthattheadditionofanyETENscheme(toanygivenTCPcongestionavoidancestrategy)shouldnotmaketheperformanceworse;therefore,thecasewithnoETENisexpectedtoprovideausefullowerbound(and,thisisshowninoursimulationresults).
TheBETENstrategyrepresentsanimplementableper-packetETENstrategy(assumingthatwecanextractsufficientinformationfromcorruptedpackets).
Intheabsenceofcongestion,wecanexpectthatthegoodputwhenusingBETENwillliebetweenthegoodputsusingOracleETENandnoETEN.
TheCETENstrategyrepresentsanimplementablecumulativeETENstrategythatispotentiallymorerobustintermsofsecuritythanper-packetETENstrategies,buttheoreticallyprovideslessperformancegains.
InourstrategytheCETENflowsintheforwarddirectionandgetscopiedoverontotheacknowledgmentsgoingback.
Weconsidereightsetsofsimulations,asfollows:A.
Baseline–nocrosstrafficoverasingle-hoptopologyThissetofsimulationsisaimedatevaluatingthegainspossibleoverasingleuncongestedlinkusingOracleETENandBETENwithTCPRenoandTCPSACK.
B.
Multi-hoptopologywithnocross-trafficInthissetofsimulations,weusea3-hoplineartopologyofidenticallinks,whilevaryingtheotherparametersoutlinedabove.
Thesesimulationsservethepurposeofvalidatingourimplementationinamorecomplextopologywithmultiplelinksandrouters.
Theresultsareexpectedtomatchthoseofthefirstset.
C.
Multi-hoptopologywithcompetingUDPflows:Inthissetofsimulations,weusea3-hoplineartopologytoprovideinsightintotheperformanceofETENmechanismsinthefaceofcongestionfromconstant-bit-rateUDPtraffic.
Theintensityofcross-trafficisvariedacrosssimulationruns.
Thecompetingtrafficinthesesimulationsdoesnotuseacongestionavoidancestrategy.
D.
Multi-hoptopologywithcompetingTCPflows:ThissetofsimulationsofferscompetingTCPtraffic(insteadofUDPtraffic)andisotherwiseidenticaltothethirdset.
ThisprovidesinsightintotheperformanceofETENwhenthecompetingtrafficflowsalsouseacongestionavoidancestrategy.
E.
ComparisonofETENtoTCPWestwood:ThissetofsimulationsprovidesperformancecomparisonofourETENmechanismswithTCPWestwood[10]intheabsenceofcrosstraffic.
RecentlyproposedmodificationstoTCPcongestionavoidanceincludeusingbandwidthestimationtechniques.
TCPWestwood[10]isarepresentativecongestionavoidancestrategybasedonbandwidthestimation.
TCPWestwoodhasbeenshowntoperformwellunderhigherrorratesinsimulatedcomparisonstoTCPRenoandSACKTCP.
Here,wecompareviasimulationstheperformanceofETENwithRenoandSACKagainstTCPWestwood.
F.
ComparisonofETENtoTCPWestwoodwithUDPcross-traffic:ThissetofsimulationsprovidesperformancecomparisonofourETENmechanismswithTCPWestwood[10]inthepresenceofcrosstraffic.
G.
CumulativeETENperformancewithUDPcrosstraffic:Inthissetofsimulations,weusea3-hoplineartopologyofidenticallinks.
TheperformanceofCETENisevaluatedinthepresenceofUDPcrosstraffic.
H.
CumulativeETENperformancewithTCPcrosstrafficInthissetofsimulations,weusea3-hoplineartopologyofidenticallinks.
TheperformanceofCETENisevaluatedinthepresenceofTCPcrosstraffic.
X.
PERFORMANCEThefollowingarethreesampleresultsofthevariousteststhatwereperformedinthisstudy.
Foradetaileddescriptionofallthetestsandresults,refertothecompleteBBNreport.
A.
BaslineInthebaselinesetofsimulations,weinvestigateasingleTCPflowoverasinglelinkwithchannelerrorsthatresultinpacketcorruption.
Inthissetofsimulations,thereisnocross-trafficcompetingwiththeTCPflow.
ExaminingETENinisolationprovidesanempiricalupperboundonthegaininTCPgoodputthatisachievableusingETENmechanisms.
ThebaselineforthesimulationsistheperformanceofTCPRenoandSACKundervariouserrorrates.
Weconsidertwonear-idealconditionsfortheerrordetectionandnotification:1.
OracleETEN–completeknowledgeofthecorruptedpacketandinstantaneousnotificationtothesource.
2.
BETEN–completeknowledgeofthecorruptedpacketwithrealBETENmessagespropagatingbacktothesource.
TheresultsinFigure4showthegoodputusingRenowithOracleETENoveralong-thinnetwork(ataBERof10-5)isalmostseventimesthebaselinegoodputusingRenoalone.
ThegoodputusingBETENwithSACKismorethanthreetimestheSACKbaseline,andthegoodputusingBETENwithRenoisabouttwoandonehalftimestheRenobaseline.
ThefigurealsoillustratesthatwhentheerrorsarenotasprevalentonthelinktheETENmechanismshavearelativelysmallimpactbecauseerrorshaveonlyasmallimpactonstockTCP.
Fromthesimplesimulationspresentedinthissectionwecanderiveseveralconclusions:TheperformanceusingBETENwithSACKisclosetothatofOracleETENatlowerrorrates.
AstheBERincreases,thechancesoflosinganotificationalsoincreasesandweseethatgainsfromBETENbegintodiminish.
UsingBETENwithSACKoutperformsBETENwithReno;thismaybebecausetheabilityofSACKtocorrectmultiplelossescomplementsETEN.
Ingeneral,TCPSACKperformsbetterthanTCPRenoduetotheabilityofTCPSACKtomostlydecouplelossrecoveryfromcongestioncontrol.
Figure4-TCPwithETENoveranuncongestedlongthinnetwork(LTN)B.
TCPWestwoodversusSACKBETENForthesimulationresultsinfigure5,wecomparetheperformanceofTCPWestwoodwhenbothcongestionandcorruptionlossesarepresent.
Figure5showstheperformanceofTCPWestwoodandBETENovera3-hoplineartopologywith1.
5Mb/slinkseachwithaone-waydelayof320ms.
WeusecompetingUDPtrafficforthesesimulations.
Theplotshowsthatathigherrorratesandmoderatecongestion,BETEN'sabilitytodistinguishbetweencorruptionandcongestionlossesprovidesperformanceimprovementsovertheTCPWestwoodstrategythatreliesonintelligentbandwidthestimationalone.
TheWestwoodstrategy,however,showsanadvantageunderheavycongestion(_competingflows)withlowtomoderateerrorrates.
Figure5-TCPWestwoodversusSACKTCPwithETENoveralongthinnetwork(LTN)Figure6-CETENPerformancewithTCPRenoandTCPcrosstrafficC.
CumulativeETENversusTCPRENOThesimulationresultsinfigure6showCETENwithTCPcrosstraffic2.
Theresultsindicatethatunderallcongestionlevels,CETENoffersmoderategoodputgainsoverTCPReno,exceptathighBER(10-5).
TheCETENsimulationsweconductedaspartofthisinvestigationshowCETENtobeapromisingapproachinsomesituations.
Inothersituations,CETENoffersworseperformancethanTCPReno.
WefeelthatfurtherinvestigationintoadditionalCETENmechanismsiswarrantedbeforemakingconclusionsonthefeasibilityofCETENingeneral.
Forinstance,aninvestigation2ItisimportanttonotethatthecompetingtrafficinoursimulationdidnotuseanyETENmechanism.
Thus,thecompetingtrafficneedlesslyreducetheirtransmissionrateswhentheyexperiencecorruptionlosses.
Thisallowstheflowofinteresttousemoreofthebottleneckbandwidth.
intohowwelltheendsystemcanestimatethetotallossrateandusethatfordeterminingthefractionoflossescausedbycongestionmayshedadditionallightonCETEN(andmakeitmorefeasibletodeploy).
XI.
SECURITYCONSIDERATIONSETENtechniques(suchasBETEN,forexample)thatrequireout-of-bandmessagesarevulnerabletodistributeddenialofservice(DDOS)attacksbecausenetworksthatplantousethisformofETENwillhavetoallowsuchmessagestoenterorleavetheirnetworks.
ThismakesitpossibleforanadversarytolaunchaDOSattackbybombardingahost(oranetwork)withETENmessages.
Thiscanminimallyoverwhelmthevictimhost,butiflaunchedasadistributeddenialofserviceattackfromalargenumberofhosts(thathavebeencompromisedbyanInternetworm,forinstance),anattackcanoverwhelmthecapacityofentirenetworks[11].
ETENmechanismsmaybevulnerabletoanothermoresubtleandindirectattack.
Amaliciousadversarycansendfalsenotificationscorrespondingtopacketsthatareeithernotdroppedorweredroppedduetocongestion.
Thiscaninducethesenderintoretransmittingpacketsunnecessarilyorintobypassingcongestionavoidanceandcontinuetransmittingatahigherratethanappropriateforthegivennetworkconditions.
Thisattackinisolation(onasingleflow)cancauselimiteddamage.
However,ifacoordinatedattackwerelaunchedonmanyTCPflowsonaheavilyloadednetwork,theattackcanpotentiallydrivethenetworkintocongestioncollapse[12].
Theuseofencryptioncanpreventdeepheaderinspection.
Forexample,IPsec[13]hidesTCPportinformation;IPsectunnelsalsohidetheoriginalsourceaddress.
ThismakesitdifficultforintermediaterouterstodeterminethecorrectTCPendpointstowhichETENmessagesshouldbedelivered.
XII.
CONCLUSIONSOurconclusionsfromthisstudyare:Per-packetETENmechanismsoffersubstantialgainsinbulkTCPgoodputintheabsenceofcongestion;however,inthepresenceofcongestionTCPcongestionavoidancemechanismsdominateresultingininsignificantgainsfromETEN.
Theproposedper-packetmechanismsprovideusefulupperboundsonperformancethatcanbeusedtoevaluatefutureproposalsofper-packetandcumulativeETENtechniques.
Per-packetmechanismspresentsignificantchallengestopracticalimplementationbyprovidinganewopportunitytoexploitInternetsecurityvulnerabilitiesandbyrequiringintermediatenodestoreliablyextractinformationfromtheheadersofcorruptedpacketsCumulativeETENtechniquesaremoreattractivetoimplementation;however,theparticularmechanismweevaluateddidnotrealizethepotentialgainsofper-packettechniquesSecurityvulnerabilitiesincludenotonlydenial-of-serviceattacksbutalsomoresubtleattackswitheffectsrangingfromunfairbandwidthsharingtototalcongestioncollapseofthenetwork.
FutureworkinthisareashouldfocusonalternativecumulativeETENmechanisms,accuratelossinferenceatendpointstoavoidtrackingcongestionlossesateveryhop,interactionswithforwarderrorcorrection,andcross-layerco-operationforETEN.
XIII.
RECOMMENDATIONSFORFUTUREWORKTheresultsofthisinitialbroadstudyareintriguing;theyleadustorecommendfurtherworkfocusedonspecificaspectsofETEN.
Ontheonehand,ourworkdemonstratestremendouspotentialfromETENifreliableinformationextractionfromheaderswerepossibleandcongestioncansomehowbecontrolled.
Ontheotherhand,ituncoversanumberofpracticalchallengescoupledwithachievingonlylimitedsuccesswiththeparticularcumulativeETENschemeweimplemented.
TheprimarythrustthatwerecommendistoexplorecumulativeETENalternativesthatdonotrelyoncongestionfeedbackfromintermediaterouters(sincethiswouldimplicitlydemandglobaldeploymentandrendertheschemelesspractical).
WebelievethatthebiggestchallengetorealizingCETENschemesistheinabilityofaTCPendpointtoaccuratelyestimatethetotallossatafineresolution(ofafewpackets)andinatimelymanner(withinanRTTtoenablequickrecovery).
Researchisneededtodevelopthiscapability.
Giventhiscapability,werecommendthatourproposedcumulativeETENschemeshouldberefinedtomakeuseofitandthenre-evaluated.
TheinteractionsofECNwiththerefinedcumulativeETENschemealsoremaintobestudiedinthiscontext.
OurcurrenteffortfocusedonquantifyingthroughputimprovementsachievableusingETENandwasthereforelimitedtolong-livedTCPflows.
FurtherworkisneededtoisolatetheeffectsoflossduringtheslowstartphaseandquantifythebenefitsofETENforshort-livedflows.
Wealsorecommendthatthemechanismsbeevaluatedusingrealnetworktopologiesandtraffictracesincludingotherworkloads,forexample,HTTPtransactions.
Underhigherrorrates,TCPconnectionestablishmentcanbedelayedorcanfailcompletely.
WebelievethatincreasingtheconnectionestablishmentrateunderhigherrorratescouldbeakeybenefitofETEN.
Werecommendthatfutureworkaddressthisissue.
REFERENCES[1]J.
Postel(editor),"TransmissionControlProtocol,"RequestforComments:793,September1981.
[2]V.
Jacobson,"CongestionAvoidanceandControl,"ProceedingsofACMSIGCOMM'88,Stanford,CA,USA,August1988.
[3]M.
Allman,V.
Paxson,andW.
Stevens,"TCPCongestionControl,"RequestforComments:2581,April1999.
[4]ISI,"InternetControlMessageProtocol,"RequestforComments:792,September1981.
[5]K.
Ramakrishnan,andS.
Floyd,"AProposaltoaddExplicitCongestionNotification(ECN)toIP,"RequestforComments:2481,January1999.
[6]K.
Ramakrishnan,S.
Floyd,andD.
Black,"TheAdditionofExplicitCongestionNotification(ECN)toIP,"RequestforComments:3168,September2001.
[7]K.
K.
Ramakrishnan,andR.
Jain,"ABinaryFeedbackSchemeforCongestionAvoidance,"ACMTransactionsonComputerSystems,Volume8,Number2,May1990,pp.
158–181.
[8]M.
Mathis,J.
Mahdavi,S.
Floyd,andA.
Romanow,"TCPSelectiveAcknowledgmentOptions,"RequestforComments:2018,October1996.
[9]ns-2simulator,http://www.
isi.
edu/nsnam/ns/index.
html[10]S.
Mascolo,C.
Casetti,M.
Gerla,M.
Sanadidi,andR.
Wang,"TCPWestwood:End-to-endBandwidthEstimationforEfficientTransportoverWiredandWirelessNetworks,"ProceedingsofMOBICOM2001,Rome,Italy,July2001.
[11]S.
Gibson,"TheStrangeTaleoftheAttacksAgainstGRC.
COM,"http://grc.
com/dos/grcdos.
htm.
[12]S.
Floyd,andK.
Fall,"PromotingtheUseofEnd-to-EndCongestionControlintheInternet,"IEEE/ACMTransactionsonNetworking,August1999,pp.
458–472.
[13]S.
Kent,andR.
Atkinson,"SecurityArchitecturefortheInternetProtocol,"RequestforComments:2401,November1998.
恒创科技也有暑期的活动,其中香港服务器也有一定折扣,当然是针对新用户的,如果我们还没有注册过或者可以有办法注册到新用户的,可以买他们家的香港服务器活动价格,2M带宽香港云服务器317元。对于一般用途还是够用的。 活动链接:恒创暑期活动爆款活动均是针对新用户的。1、云服务器仅限首次购买恒创科技产品的新用户。1 核 1G 实例规格,单个账户限购 1台;其他活动机型,单个账户限购 3 台(必须在一个订单...
搬瓦工vps(bandwagonhost)现在面向中国大陆有3条顶级线路:美国 cn2 gia,香港 cn2 gia,日本软银(softbank)。详细带宽是:美国cn2 gia、日本软银,都是2.5Gbps~10Gbps带宽,香港 cn2 gia为1Gbps带宽,搬瓦工是目前为止,全球所有提供这三种带宽的VPS(云服务器)商家里面带宽最大的,成本最高的,没有第二家了! 官方网站:https...
DiyVM是一家成立于2009年的国人主机商,提供的产品包括VPS主机、独立服务器租用等,产品数据中心包括中国香港、日本大阪和美国洛杉矶等,其中VPS主机基于XEN架构,支持异地备份与自定义镜像,VPS和独立服务器均可提供内网IP功能。商家VPS主机均2GB内存起步,三个地区机房可选,使用优惠码后每月69元起;独立服务器开设在香港沙田电信机房,CN2线路,自动化开通上架,最低499元/月起。下面以...
piggycase为你推荐
网罗设计网络设计, 计算机德尔,哪个好,哪个能赚钱?.cn域名cn域名和com域名有什么不同?哪个更好?好在哪里?地图应用看卫星地图哪个手机软件最好。access数据库ACCESS数据库有什么用18comic.fun黑色禁药http://www.lovecomic.cn/attachment/Fid_18/18_4_00d3b0cb502ea74.jpg这幅画名字叫什么?关键字关键字和一般标识符的区别7788k.com以前有个网站是7788MP3.com后来改成KK130现在又改网站域名了。有知道现在是什么域名么?蒋存祺蒋存祺的主要事迹罗伦佐娜罗拉芳娜 (西班牙小姐)谁可以简单的介绍以下丑福晋爱新觉罗.允禄真正的福晋是谁?他真的是一个残酷,噬血但很专情的一个人吗?
独享100m 128m内存 免费名片模板 创宇云 泉州电信 东莞数据中心 服务器干什么用的 gtt paypal注册教程 便宜空间 789 丽萨 免费的asp空间 lick 游戏服务器出租 免费网络空间 好看的空间 服务器托管价格 512内存 沈阳idc 更多