{"title":"Testing aggressive TCP configurations","authors":"Jerzy Konorski, Janusz Lis","doi":"10.1109/INFTECH.2008.4621596","DOIUrl":null,"url":null,"abstract":"It has been recognized in the past that selfish configuration of the TCP congestion avoidance mechanism can lead to aggressive usage of network resources by some packet flows at the cost of other flows. It can be imagined that with multiple selfishly configured TCP connections, a game similar to the prisonerspsila dilemma arises whose strategic equilibria may occur at various levels of network resource utilization, depending on the TCP version and traffic conditions. This paper focuses on the effects of selfish TCP configuration in realistic network environments. Of interest is the impact of selfish TCP configuration in large networks with multiple bottlenecks, and the possibility of configuring TCP so as to avoid being exploited by aggressive packet flows competing for the same resources. Quantitative results are presented based on a special-purpose simulator.","PeriodicalId":247264,"journal":{"name":"2008 1st International Conference on Information Technology","volume":"235 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 1st International Conference on Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFTECH.2008.4621596","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
It has been recognized in the past that selfish configuration of the TCP congestion avoidance mechanism can lead to aggressive usage of network resources by some packet flows at the cost of other flows. It can be imagined that with multiple selfishly configured TCP connections, a game similar to the prisonerspsila dilemma arises whose strategic equilibria may occur at various levels of network resource utilization, depending on the TCP version and traffic conditions. This paper focuses on the effects of selfish TCP configuration in realistic network environments. Of interest is the impact of selfish TCP configuration in large networks with multiple bottlenecks, and the possibility of configuring TCP so as to avoid being exploited by aggressive packet flows competing for the same resources. Quantitative results are presented based on a special-purpose simulator.