International Conference on Networking and Services (ICNS '07) 2007
DOI: 10.1109/icns.2007.78
|View full text |Cite
|
Sign up to set email alerts
|

Keeping Order: Determining the Effect of TCP Packet Reordering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…This leads to more out-of-order packets in the receive buffer, which adds an additional re-ordering overhead. TCP misinterprets these out-of-order packets as congestion and reduces its window size, further reducing throughput [6].…”
Section: General Challengesmentioning
confidence: 99%
“…This leads to more out-of-order packets in the receive buffer, which adds an additional re-ordering overhead. TCP misinterprets these out-of-order packets as congestion and reduces its window size, further reducing throughput [6].…”
Section: General Challengesmentioning
confidence: 99%
“…Besides, a higher value of d and α will reveal the existence of the prevention technique as well as force it to be beyond the range of naturally occurring out-of-order packets. We chose not to go beyond a constant factor of what was measured by other researchers as in [3], [4], [6], [15], [25]. The value selected for α ranged from 0.1% to 5%.…”
Section: Effectiveness Of Prevention Mechanismmentioning
confidence: 99%
“…Therefore, our channel is independent from the packets' payloads and not very sensitive to inter-packet jitter, which means that our proposed method goes well beyond previous works that used packet payload to hide the secret messages. The proposed mechanism consists of 1) a code selection mechanism that applies coding theory to carefully select permutation patterns that will enhance robustness and error-resistance, 2) a traffic imitation component that calculates the codeword distribution in order to evade detection, 3) an encoder component at the sender-side as well as 4) a decoder technique for retrieving the sent secret codes at the receiver end.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, also the video flow quality would be extremely bad due to the high jitter [4]. It should also be noted that this kind of load distributing among the links will also cause extensive reordering which might tremendously decrease the TCP performance [6].…”
Section: Introductionmentioning
confidence: 99%