“…Several techniques have been designed to (i) detect and rectify the adverse impact of spurious retransmissions in an ongoing TCP transfer [17], [18], [19], [20], [21], and (ii) detect losses using alternate mechanisms [22], [23], [24], [25], [26], [27]. Unfortunately, due to deployment hurdles, most of these techniques have not been widely deployed in TCP implementations.…”