On 11/6/2010 4:52 PM, George Bonser wrote:

That is also somewhat mitigated in that it operates in two modes.  The
first mode is what I would call "passive" mode and only comes into play
once a black hole is detected.  It does not change the operation of TCP
until a packet disappears.  The second method is the "active" mode where
it actively probes with increasing packet sizes until it hits a black
hole or gets an ICMP response.


While it reads well, what implementations are actually in use? As with most protocols, it is useless if it doesn't have a high penetration.

Jack

Reply via email to