• DocumentCode
    2804012
  • Title

    Testing aggressive TCP configurations

  • Author

    Konorski, Jerzy ; Lis, Janusz

  • Author_Institution
    Fac. of Electron., Telecommun. & Inf., Gdansk Univ. of Technol., Gdansk
  • fYear
    2008
  • fDate
    18-21 May 2008
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    It has been recognized in the past that selfish configuration of the TCP congestion avoidance mechanism can lead to aggressive usage of network resources by some packet flows at the cost of other flows. It can be imagined that with multiple selfishly configured TCP connections, a game similar to the prisonerspsila dilemma arises whose strategic equilibria may occur at various levels of network resource utilization, depending on the TCP version and traffic conditions. This paper focuses on the effects of selfish TCP configuration in realistic network environments. Of interest is the impact of selfish TCP configuration in large networks with multiple bottlenecks, and the possibility of configuring TCP so as to avoid being exploited by aggressive packet flows competing for the same resources. Quantitative results are presented based on a special-purpose simulator.
  • Keywords
    game theory; telecommunication congestion control; telecommunication traffic; transport protocols; TCP congestion avoidance mechanism; TCP traffic; TCP/IP suite; aggressive TCP configuration testing; aggressive packet flow; network resource utilization; prisoner dilemma game; realistic network environment; selfish TCP configuration; strategic equilibria; Analytical models; Bandwidth; Communication system traffic control; Costs; Electronic equipment testing; Resource management; TCPIP; Telecommunication traffic; Traffic control; Transport protocols;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Technology, 2008. IT 2008. 1st International Conference on
  • Conference_Location
    Gdansk
  • Print_ISBN
    978-1-4244-2244-9
  • Electronic_ISBN
    978-1-4244-2245-6
  • Type

    conf

  • DOI
    10.1109/INFTECH.2008.4621596
  • Filename
    4621596