Probing TCP Implementations

نویسندگان

  • Douglas Comer
  • John C. Lin
چکیده

In this paper, we demonstrate a technique called active probing used to study TCP implementations. Active probing treats a TCP implementation as a black box, and uses a set of procedures to probe the black box. By studying the way TCP responds to the probes, one can deduce several characteristics of the implementation. The technique is particularly useful if TCP source code is unavailable. To demonstrate the technique, the paper shows example probe procedures that examine three aspects of TCP. The results are informative: they reveal implementation flaws, protocol violations, and the details of design decisions in five vendor-supported TCP implementations. The results of our experiment suggest that active probing can be used to test TCP implementations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TCP Congestion Control Identification

Transmission Control Protocol (TCP) carries most of the traffic on the Internet these days. There are several implementations of TCP, and the most important difference among them is their mechanism for controlling congestion. One of the methods for determining type of a TCP is active probing. Active probing considers a TCP implementation as a black box, sends different streams of data to the ap...

متن کامل

Behavior of TCP-Probing with Hand-offs

Performance of standard TCP is significantly degraded during hand-off periods of mobile communications. We show here that carefully designed probing mechanisms can cancel this incompetent behavior of TCP for a wide range of hand-off periods. We compare TCP Tahoe and Reno with TCP Probing under various scenarios of hand-off duration, propagation delay and mobility conditions of the user. We meas...

متن کامل

Improving TCP performance over networks with wireless components using "probing devices"

TCP error control mechanism lacks the ability to detect with precision the nature of potential errors during communication. It is only capable of detecting the results of the errors, namely, that segments are dropped. As a result, the protocol lacks the ability to implement an appropriate error recovery strategy cognizant of current network conditions and responsive to the distinctive error cha...

متن کامل

Deterministic Fault Injection of Distributed Systems

Ensuring that a system meets its prescribed speciication is a growing challenge that confronts software developers and system engineers. Meeting this challenge is particularly important for distributed systems with strict dependability and timeliness constraints. This paper presents a technique, called script-driven probing and fault injection, for the evaluation and validation of dependable pr...

متن کامل

To maximize throughput via multi-pathing and Parallel TCP on each path

Parallel TCP, which opens multiple TCP connections over a single path, and Multi-Pathing, which concurrently uses multiple paths to transfer data, have both been proved to be effective methods to improve end-to-end throughput. How much throughput can we ultimately achieve between a source and a destination if we use multiple overlay paths and open multiple TCP connections on each used path? In ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994