1992
DOI: 10.1109/65.145159
|View full text |Cite
|
Sign up to set email alerts
|

SEAL detects cell misordering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

1993
1993
2008
2008

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 2 publications
0
11
0
Order By: Relevance
“…Although this simplifies the design [16], it can introduce limitations. In MPE, these buffers are associated with 'active' PIDs, leading to a common constraint on the number of MPE reassembly buffers (corresponding to PIDs) that may be used in parallel [13].…”
Section: Fragmentation and Paddingmentioning
confidence: 97%
“…Although this simplifies the design [16], it can introduce limitations. In MPE, these buffers are associated with 'active' PIDs, leading to a common constraint on the number of MPE reassembly buffers (corresponding to PIDs) that may be used in parallel [13].…”
Section: Fragmentation and Paddingmentioning
confidence: 97%
“…Wang and Crowcroft showed that CRC-32 was effective at catching certain types of data reordering [15]. In a simulation of network file transfers using IP over ATM with real file system data, Stone et al [14] showed that CRC-32 caught a wide range of packet splices in which ATM cells from different packets were combined, but that the Internet checksum detected cell erasures at a rate of only 1 in 2 10 .…”
Section: Prior Workmentioning
confidence: 97%
“…Probably the strongest message of this study is that the networking hardware is often trashing the packets which are entrusted to it. A tremendous 5 Since there are 2 1 6 unordered pairs (x, 1 − x) which are congruent to 1, and each pair can appear in either order in the original, this specific case will be caught at a rate of 1 in 2 15 , assuming uniformly-distributed input. 6 If a damaged ACK somehow becomes the first to ack some data, then either (a) the data was indeed received, in which case the ack has done no harm; or (b) the data was lost, in which case the ack will cause the connection endpoints to become inconsistent and the connection will eventually fail.…”
Section: Don't Trust Hardwarementioning
confidence: 99%
“…T HE behavior of checksum and cyclic redundancy check (CRC) algorithms have historically been studied under the assumption that the data fed to the algorithms was uniformly distributed (see, for instance, the work on Fletcher's checksum [2] and the AAL5 CRC [4] and [12]). If one assumes random data drawn from a uniform distribution one can show a number of nice error detection properties for various checksums and CRC's.…”
Section: Introductionmentioning
confidence: 99%