Steps to Reducing Unwanted Traffic on the Internet Workshop Abstract
Pp. 2530 of the Proceedings
Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic
Zhenhai Duan and Kartik Gopalan, Florida State University; Yingfei Dong, University of Hawaii
In this paper we argue that the difficulties in controlling unwanted
Internet traffic, such as email SPAM, stem from the fact that many Internet
applications are fundamentally sender-driven and distinctly lack receiver control over traffic delivery. However, since only receivers know
what they want to receive, receiver-driven approaches may often have clear
advantages in restraining unwanted traffic. In this paper, we re-examine the
implications of the two common traffic delivery models: sender-push
and receiver-pull. In the sender-push model, a sender can deliver
traffic at will to a receiver, who can only passively accept the traffic,
such as in the SMTP-based email delivery system. In contrast, in the
receiver-pull model, receivers can regulate if and when they wish to
retrieve data, such as the HTTP-based web access system. We argue that the
problem of unwanted Internet traffic can be mitigated to a great extent if
the receiver-pull model is employed by Internet applications, whenever
appropriate. Using three popular applications - email, mobile text messages,
and asynchronous voice messages - as examples, we demonstrate that
asynchronous communication protocols can be easily designed using the
receiver-pull communication model to suppress unwanted Internet traffic.
- View the full text of this paper in HTML and PDF, or the talk slides in PDF.
Until July 2006, you will need your USENIX membership identification in order to access the full papers. The Proceedings are published as a collective work, © 2005 by the USENIX Association. All Rights Reserved. Rights to individual papers remain with the author or the author's employer. Permission is granted for the noncommercial reproduction of the complete work for educational or research purposes. USENIX acknowledges all trademarks within this paper.
- If you need the latest Adobe Acrobat Reader, you can download it from Adobe's site.