Misbehaviors in SACK Generation

نویسندگان

  • Nasif Ekiz
  • Abuthahir Habeeb Rahman
  • Paul D. Amer
چکیده

While analyzing CAIDA Internet traces of TCP traffic to detect instances of data reneging, we frequently observed four misbehaviors in the generation of SACKs. These misbehaviors could result in the data sender mistakenly thinking data reneging occurred. Further testing detected two additional SACK generation misbehaviors which in the worst case could result in a data sender receiving a SACK for data that was never received. This paper reports the results of testing a wide range of operating systems using TBIT to document which ones misbehave in each of the six ways. One can conclude that the handling of SACKs while simple in concept is complex to implement. KeywordsSACK; Selective Acknowledgement; TCP; TBIT

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Classroom Misbehavior in the Eyes of Students: A Qualitative Study

Using individual interviews, this study investigated perceptions of classroom misbehaviors among secondary school students in Hong Kong (N = 18). Nineteen categories of classroom misbehaviors were identified, with talking out of turn, disrespecting teacher, and doing something in private being most frequently mentioned. Findings revealed that students tended to perceive misbehaviors as those ac...

متن کامل

RSIC Generation: A Solution for Logic BIST

High defect coverage requires good coverage of different fault types. In this paper, we present a comprehensive test vector generation technique for BIST, called Random Single Input Change (RSIC) generation, that can be used to generate tests for many arbitrary misbehaviors that can occur in digital systems, thus providing a single on-chip test generation solution. By proving the effectiveness ...

متن کامل

A unified security framework with three key management schemes for wireless sensor networks

Pervasive computing environments find their practical manifestations through wireless sensor networks, which sense a relationship amongst themselves and the environment. Currently the proposed keying schemes for ensuring security, in wireless sensor networks, may be classified into public and private keying schemes, or their hybrid. However, an investigation in peer work underpins the fact that...

متن کامل

Random Adjacent Sequences: An Efficient Solution for Logic BIST

High defect coverage requires good coverage of different fault types. In this paper, we present a comprehensive test vector generation technique for BIST, called Random Single Input Change (RSIC) generation, that can be used to generate tests for many arbitrary misbehaviors that can occur in digital systems, thus providing a single on-chip test generation solution. By proving the effectiveness ...

متن کامل

Ranking major and minor research misbehaviors: results from a survey among participants of four World Conferences on Research Integrity.

Background Codes of conduct mainly focus on research misconduct that takes the form of fabrication, falsification, and plagiarism. However, at the aggregate level, lesser forms of research misbehavior may be more important due to their much higher prevalence. Little is known about what the most frequent research misbehaviors are and what their impact is if they occur. Methods A survey was con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010