Title :
Testing aggressive TCP configurations
Author :
Konorski, Jerzy ; Lis, Janusz
Author_Institution :
Fac. of Electron., Telecommun. & Inf., Gdansk Univ. of Technol., Gdansk
Abstract :
It has been recognized in the past that selfish configuration of the TCP congestion avoidance mechanism can lead to aggressive usage of network resources by some packet flows at the cost of other flows. It can be imagined that with multiple selfishly configured TCP connections, a game similar to the prisonerspsila dilemma arises whose strategic equilibria may occur at various levels of network resource utilization, depending on the TCP version and traffic conditions. This paper focuses on the effects of selfish TCP configuration in realistic network environments. Of interest is the impact of selfish TCP configuration in large networks with multiple bottlenecks, and the possibility of configuring TCP so as to avoid being exploited by aggressive packet flows competing for the same resources. Quantitative results are presented based on a special-purpose simulator.
Keywords :
game theory; telecommunication congestion control; telecommunication traffic; transport protocols; TCP congestion avoidance mechanism; TCP traffic; TCP/IP suite; aggressive TCP configuration testing; aggressive packet flow; network resource utilization; prisoner dilemma game; realistic network environment; selfish TCP configuration; strategic equilibria; Analytical models; Bandwidth; Communication system traffic control; Costs; Electronic equipment testing; Resource management; TCPIP; Telecommunication traffic; Traffic control; Transport protocols;
Conference_Titel :
Information Technology, 2008. IT 2008. 1st International Conference on
Conference_Location :
Gdansk
Print_ISBN :
978-1-4244-2244-9
Electronic_ISBN :
978-1-4244-2245-6
DOI :
10.1109/INFTECH.2008.4621596