Matthew Toseland wrote:
> Ok. No other protocol does coalesced ack's? It seems an obvious idea,
> for it not to be useful requires there to be a good reason not to. It's
> more of a problem for us because we have quite big minimum size packets,
> but there are other encrypted protocols..

Most protocols don't authenticate the transport layer, so the acks are 
pretty lightweight. For example TLS/SSL just uses a normal TCP 
connection - you can forge acks, but you still can't delete TLS records 
because they're numbered and the connection gets shut down if records 
time out or arrive out of order. So the worst you can do by forging acks 
is kill the  connection (and even then you need to be on the path 
between the peers).

> What do other protocols do? Why is it not possible to get useful data on
> this out of your simulations exactly?

It should be possible to get useful data when I get another chance to 
work on it - I'll compare coalesced acks with non-coalesced acks for a 
variety of loss and reordering rates.

Cheers,
Michael

Reply via email to