TCP Timeout and Retransmission(5)

Destination Metrics

Repacketization

When TCP times out and retransmits, it does not have to retransmit the identi- cal segment.

Instead, TCP is allowed to perform repacketization, sending a bigger segment, which can increase performance. (Naturally, this bigger segment cannot exceed the MSS announced by the receiver and should not exceed the path MTU.)

This is allowed in the protocol because TCP identifies the data being sent and acknowledged by its byte number, not its segment (or packet) number.

Attacks Involving TCP Retransmission

There is a class of DoS attack called low-rate DoS attacks [KK03].

In such an attack, an attacker sends bursts of traffic to a gateway or host, causing the victim sys- tem to experience a retransmission timeout.

Given an ability to predict when the victim TCP will attempt to retransmit, the attacker generates a burst of traffic at each retransmission attempt.

As a consequence, the victim TCP perceives conges- tion in the network, throttles its sending rate to near zero, keeps backing off its RTO according to Karn’s algorithm, and effectively receives very little network throughput.

The proposed mechanism to deal with this type of attack is to add randomization to the RTO, making it difficult for the attacker to guess the precise times when a retransmission will take place.

Summary

原文地址:https://www.cnblogs.com/geeklove01/p/9747763.html

时间: 2024-07-30 00:28:18

TCP Timeout and Retransmission(5)的相关文章

TCP Timeout and Retransmission(2)

Retransmission Ambiguity and Karn's Algorithm A problem measuring an RTT sample can occur when a packet is retransmitted. Say a packet is transmitted, a timeout occurs, the packet is retransmitted, and an acknowledgment is received for it. Is the ACK

TCP Timeout and Retransmission(4)

Spurious Timeouts and Retransmissions Under a number of circumstances, TCP may initiate a retransmission even when no data has been lost. Such undesirable retransmissions are called spurious retrans- missions and are caused by spurious timeouts (time

TCP Timeout and Retransmission(3)

Example The first line of Figure 14-7 (number 40) indicates the first time ACK 23801 is received The window update at time 0.853 is an ACK with a duplicate sequence number (because no data is being carried) but contains a change to the TCP flow contr

tcp/ip协议listen函数中backlog参数的含义与php-fpm的502 Bad Gateway

To understand the backlog argument, we must realize that for a given listening socket, the kernel maintains two queues :要明白backlog参数的含义,我们必须明白对于一个listening socket,kernel维护者两个队列: 1.An incomplete connection queue, which contains an entry for each SYN t

TCP/IP Illustrated 第一章 Introduction

Introduction 在这一章节,作者大致地进行了 TCP/IP 的 whirlwind tour, 讲解了数据传输的四层, link layer, network layer, transport layer 和 application layer, 并且对其中的每一层进行了区分.同时,作者也讲述了这四层之间执行协同工作的方式,即 encapsulation 和 demultiplexinginternet 是众多 network 的集合,它们通过 IP address 和 port nu

(转)RTSP - RTP over TCP

Normally, RTSP provide streaming over UDP. By nature, UDP is a better choice as it provides robust streaming capability for media. However, it is unlikely to use UDP for streaming over the Internet. 通常来说,RTSP提供UDP方式发送RTP流.当然,发送流媒体时,UDP往往是更好的选择.但是,在互联

RTSP - RTP over TCP

Normally, RTSP provide streaming over UDP. By nature, UDP is a better choice as it provides robust streaming capability for media. However, it is unlikely to use UDP for streaming over the Internet. 通常来说,RTSP提供UDP方式发送RTP流.当然,发送流媒体时,UDP往往是更好的选择.但是,在互联

nginx tcp代理模块nginx_tcp_proxy_module

nginx tcp代理功能由nginx_tcp_proxy_module模块提供,同时监测后端主机状态.该模块包括的模块有: ngx_tcp_module, ngx_tcp_core_module, ngx_tcp_upstream_module, ngx_tcp_proxy_module, ngx_tcp_upstream_ip_hash_module. 安装 https://github.com/yaoweibin/nginx_tcp_proxy_module/archive/master.

Nginx Tcp反向代理

nginx tcp代理功能由nginx_tcp_proxy_module模块提供,同时监测后端主机状态.该模块包括的模块有: ngx_tcp_module, ngx_tcp_core_module, ngx_tcp_upstream_module, ngx_tcp_proxy_module, ngx_tcp_upstream_ip_hash_module. 1. 安装 # wget http://nginx.org/download/nginx-1.4.4.tar.gz # tar zxvf n