DocumentCode
2804012
Title
Testing aggressive TCP configurations
Author
Konorski, Jerzy ; Lis, Janusz
Author_Institution
Fac. of Electron., Telecommun. & Inf., Gdansk Univ. of Technol., Gdansk
fYear
2008
fDate
18-21 May 2008
Firstpage
1
Lastpage
4
Abstract
It has been recognized in the past that selfish configuration of the TCP congestion avoidance mechanism can lead to aggressive usage of network resources by some packet flows at the cost of other flows. It can be imagined that with multiple selfishly configured TCP connections, a game similar to the prisonerspsila dilemma arises whose strategic equilibria may occur at various levels of network resource utilization, depending on the TCP version and traffic conditions. This paper focuses on the effects of selfish TCP configuration in realistic network environments. Of interest is the impact of selfish TCP configuration in large networks with multiple bottlenecks, and the possibility of configuring TCP so as to avoid being exploited by aggressive packet flows competing for the same resources. Quantitative results are presented based on a special-purpose simulator.
Keywords
game theory; telecommunication congestion control; telecommunication traffic; transport protocols; TCP congestion avoidance mechanism; TCP traffic; TCP/IP suite; aggressive TCP configuration testing; aggressive packet flow; network resource utilization; prisoner dilemma game; realistic network environment; selfish TCP configuration; strategic equilibria; Analytical models; Bandwidth; Communication system traffic control; Costs; Electronic equipment testing; Resource management; TCPIP; Telecommunication traffic; Traffic control; Transport protocols;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Technology, 2008. IT 2008. 1st International Conference on
Conference_Location
Gdansk
Print_ISBN
978-1-4244-2244-9
Electronic_ISBN
978-1-4244-2245-6
Type
conf
DOI
10.1109/INFTECH.2008.4621596
Filename
4621596
Link To Document