Probing TCP Implementations
نویسندگان
چکیده
In this paper, we demonstrate a technique called active probing used to study TCP implementations. Active probing treats a TCP implementation as a black box, and uses a set of procedures to probe the black box. By studying the way TCP responds to the probes, one can deduce several characteristics of the implementation. The technique is particularly useful if TCP source code is unavailable. To demonstrate the technique, the paper shows example probe procedures that examine three aspects of TCP. The results are informative: they reveal implementation flaws, protocol violations, and the details of design decisions in five vendor-supported TCP implementations. The results of our experiment suggest that active probing can be used to test TCP implementations.
منابع مشابه
TCP Congestion Control Identification
Transmission Control Protocol (TCP) carries most of the traffic on the Internet these days. There are several implementations of TCP, and the most important difference among them is their mechanism for controlling congestion. One of the methods for determining type of a TCP is active probing. Active probing considers a TCP implementation as a black box, sends different streams of data to the ap...
متن کاملBehavior of TCP-Probing with Hand-offs
Performance of standard TCP is significantly degraded during hand-off periods of mobile communications. We show here that carefully designed probing mechanisms can cancel this incompetent behavior of TCP for a wide range of hand-off periods. We compare TCP Tahoe and Reno with TCP Probing under various scenarios of hand-off duration, propagation delay and mobility conditions of the user. We meas...
متن کاملImproving TCP performance over networks with wireless components using "probing devices"
TCP error control mechanism lacks the ability to detect with precision the nature of potential errors during communication. It is only capable of detecting the results of the errors, namely, that segments are dropped. As a result, the protocol lacks the ability to implement an appropriate error recovery strategy cognizant of current network conditions and responsive to the distinctive error cha...
متن کاملDeterministic Fault Injection of Distributed Systems
Ensuring that a system meets its prescribed speciication is a growing challenge that confronts software developers and system engineers. Meeting this challenge is particularly important for distributed systems with strict dependability and timeliness constraints. This paper presents a technique, called script-driven probing and fault injection, for the evaluation and validation of dependable pr...
متن کاملTo maximize throughput via multi-pathing and Parallel TCP on each path
Parallel TCP, which opens multiple TCP connections over a single path, and Multi-Pathing, which concurrently uses multiple paths to transfer data, have both been proved to be effective methods to improve end-to-end throughput. How much throughput can we ultimately achieve between a source and a destination if we use multiple overlay paths and open multiple TCP connections on each used path? In ...
متن کامل