NETBLT: a high throughput transport protocol
SIGCOMM '87 Proceedings of the ACM workshop on Frontiers in computer communications technology
Improving the start-up behavior of a congestion control scheme for TCP
Conference proceedings on Applications, technologies, architectures, and protocols for computer communications
Dynamics of random early detection
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Automated packet trace analysis of TCP implementations
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
The macroscopic behavior of the TCP congestion avoidance algorithm
ACM SIGCOMM Computer Communication Review
Modeling the performance of HTTP over several transport protocols
IEEE/ACM Transactions on Networking (TON)
A comparison of mechanisms for improving TCP performance over wireless links
IEEE/ACM Transactions on Networking (TON)
WTCP: a reliable transport protocol for wireless wide-area networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Dynamics of IP traffic: a study of the role of variability and the impact of control
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Modeling TCP Reno performance: a simple model and its empirical validation
IEEE/ACM Transactions on Networking (TON)
Equation-based congestion control for unicast applications
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
MSWIM '01 Proceedings of the 4th ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems
Dynamic behavior of slowly-responsive congestion control algorithms
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
TCP congestion control with a misbehaving receiver
ACM SIGCOMM Computer Communication Review
Controlling high bandwidth aggregates in the network
ACM SIGCOMM Computer Communication Review
On the long-run behavior of equation-based rate control
Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications
TCP-Real: receiver-oriented congestion control
Computer Networks: The International Journal of Computer and Telecommunications Networking
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Controlling High-Bandwidth Flows at the Congested Router
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
The War between Mice and Elephants
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
General AIMD Congestion Control
General AIMD Congestion Control
A receiver-centric transport protocol for mobile hosts with heterogeneous wireless interfaces
Proceedings of the 9th annual international conference on Mobile computing and networking
Upgrading transport protocols using untrusted mobile code
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols
ICNP '04 Proceedings of the 12th IEEE International Conference on Network Protocols
Improving the reliability of internet paths with one-hop source routing
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
TCP/IP performance over satellite links
IEEE Network: The Magazine of Global Internetworking
Transport-layer issues in information centric networks
Proceedings of the second edition of the ICN workshop on Information-centric networking
Supporting the Web with an information centric network that routes by name
Computer Networks: The International Journal of Computer and Telecommunications Networking
From content delivery today to information centric networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency and throughput in diverse scenarios ranging from wireless access links to wireline and wireless web browsing. Unfortunately, in contrast to today's sender-driven protocols, receiver-driven congestion control introduces an incentive for misbehavior. Namely, the primary beneficiary of a flow (the receiver of data) has both the means and incentive to manipulate the congestion control algorithm in order to obtain higher throughput or reduced latency. In this paper, we study the deployability of receiver-driven TCP in environments with untrusted receivers which may tamper with the congestion control algorithm for their own benefit. Using analytical modeling and extensive simulation experiments, we show that deployment of receiver-driven TCP must strike a balance between enforcement mechanisms, which can limit performance, and complete trust of endpoints, which results in vulnerability to cheaters and even DoS attackers.