Partially Reliable Concurrent Multipath Transfer (PR-CMT) Based on SCTP for Multi-homed Networks

Partially Reliable Concurrent Multipath Transfer (PR-CMT) Based on SCTP for Multi-homed Networks PDF Author: 郭吉豪
Publisher:
ISBN:
Category :
Languages : en
Pages : 40

Get Book Here

Book Description

Partially Reliable Concurrent Multipath Transfer (PR-CMT) Based on SCTP for Multi-homed Networks

Partially Reliable Concurrent Multipath Transfer (PR-CMT) Based on SCTP for Multi-homed Networks PDF Author: 郭吉豪
Publisher:
ISBN:
Category :
Languages : en
Pages : 40

Get Book Here

Book Description


Multihomed Communication with SCTP (Stream Control Transmission Protocol)

Multihomed Communication with SCTP (Stream Control Transmission Protocol) PDF Author: Victor C.M. Leung
Publisher: CRC Press
ISBN: 1466566981
Category : Computers
Languages : en
Pages : 244

Get Book Here

Book Description
Although multihomed communication is a rapidly emerging trend for next generation networks, no known book explores multihomed communication with the Stream Control Transmission Protocol (SCTP). Filling this void, Multihomed Communication with SCTP (Stream Control Transmission Protocol) explains this innovative feature that allows an endpoint to simultaneously maintain and use multiple points of connectivity to the network—making it possible for fixed and mobile users to connect to the Internet via multiple service providers or last hop technologies. Among the topics addressed, the book covers: Support of node mobility between networks Concurrent multipath transfer using SCTP multihoming Low delay communication and multimedia applications High performance computing using commodity hardware and software SCTP support in the INET framework and its analysis in the Wireshark packet analyzer SCTP application interface Ideal for researchers and programmers, this forward-looking reference describes SCTP multihoming concepts and implementation, applications of multihoming across different domains, and proposed extensions such as multipath transfer and mobility. Although the book is aimed at those with an advanced background, it also covers the fundamental concepts and mechanisms of SCTP multihoming to help anyone get up to speed on SCTP.

SCTP-based Concurrent Multipath Transfer in the Contexts of Multihop Wireless Networks and TCP-friendliness

SCTP-based Concurrent Multipath Transfer in the Contexts of Multihop Wireless Networks and TCP-friendliness PDF Author: Ilknur Aydin
Publisher:
ISBN: 9781124240435
Category : Stream Control Transmission Protocol (Computer network protocol)
Languages : en
Pages :

Get Book Here

Book Description
A multihome-capable transport layer protocol allows an application to transmit data via multiple (disjoint) paths simultaneously, a scheme termed concurrent multipath transfer (CMT). SCTP is an IETF-standardized transport layer protocol with built-in multihoming capability. In prior work, a CMT protocol using SCTP multihoming (termed SCTP-based CMT) was proposed and investigated for improving application throughput in wired networks. In that effort, SCTP-based CMT was studied in (bottleneck-independent) wired networking scenarios with ns-2 simulations. This dissertation studies SCTP-based CMT in two specific contexts using QualNet simulations: (i) CMT over Multihop Wireless Networks (MWNs), and (ii) TCP-friendliness of CMT in the Internet. CMT over MWNs: Given the recent advances in multiple-radio nodes, multichannel radios, and multi-path routing, more multihomed nodes are deployed in the wireless networks. This trend motivated us to study two specific issues in the context of CMT over MWNs. The first issue concerns the performance of CMT over MWNs, where we studied how the contention-induced losses and the wireless channel characteristics impact the performance of CMT. We found that similar to the wired cases, CMT over MWNs showed better performance than one single-homed SCTP association and even the ideal AppStripe application, when the receiver buffer (rBuf) was unconstrained. For the cases of constrained rBuf, we showed that considering the bandwidth limitations of multihop wireless networks compared to their wired counterparts, rBuf sizes bigger than 128 KB can be sufficiently enough not to restrain the CMT performance. Overall, we concluded that applications will benefit from using CMT in the MWNs context when they have sufficiently large rBuf. The second issue concerns the acknowledgment (ACK) mechanism of CMT, where we investigated different design choices for the ACK mechanism of CMT in MWN to mitigate the effects of contention-induced losses in the multihop wireless channels among data and ACK traffic. According to the ACK policy of the original CMT, an ACK packet is sent to the path where the latest DATA packet arrives from. Therefore, a CMT receiver may send ACKs packets to any one of the (return) paths. In this dissertation, we surveyed historical developments of the TCP-friendliness concept and argued that the original TCP-friendliness doctrine should be extended to incorporate multihoming and SCTP-based CMT. Since CMT is based on (single-homed) SCTP, as a first step, we investigated TCP-friendliness of single-homed SCTP. We discovered that although SCTP's congestion control mechanisms were intended to be "similar" to TCP's, being a newer protocol, SCTP specification has some of the proposed TCP enhancements already incorporated which results in SCTP performing better than TCP. Therefore, SCTP can obtain larger share of the bandwidth when competing with a TCP flavor that does not have similar enhancements. We concluded that SCTP is TCP-friendly but achieves higher throughput than TCP, due to SCTP's better loss recovery mechanisms just as TCPSACK or TCP-Reno performs better than TCP-Tahoe. Then, we designed an experimental framework to investigate the TCP-friendliness of CMT according to the traditional doctrine of TCP-friendliness. Via QualNet simulations, we measured the sending rate of one two-homed CMT flow (containing two CMT subflows) and two SCTP flows and the impact of CMT and two SCTP flows on the other TCP flows in the network while sharing a tight link. We found out that one two-homed CMT association has similar or worse performance (for smaller number of competing TCP flows) than the aggregated performance of two independent, single-homed SCTP associations while sharing the link with other TCP connections, for the reason that a CMT flow creates a burstier data traffic than independent SCTP flows. When compared to the aggregated performance of two-independent TCP connections, one two-homed CMT obtains higher share of the tight link bandwidth because of better loss recovery mechanisms in CMT (as CMT inherits all the built-in TCP enhancements in SCTP). (Abstract shortened by UMI.).

Concurrent Multipath Transfer

Concurrent Multipath Transfer PDF Author: Thomas Daniel Wallace
Publisher:
ISBN:
Category :
Languages : en
Pages : 300

Get Book Here

Book Description
Known as smartphones, multihomed devices like the iPhone and BlackBerry can simultaneously connect to Wi-Fi and 4G LTE networks. Unfortunately, due to the architectural constraints of standard transport layer protocols like the transmission control protocol (TCP), an Internet application (e.g., a file transfer) can use only one access network at a time. Due to recent developments, however, concurrent multipath transfer (CMT) using the stream control transmission protocol (SCTP) can enable multihomed devices to exploit additional network resources for transport layer communications. In this thesis we explore a variety of techniques aimed at CMT and multihomed devices, such as: packet scheduling, transport layer modelling, and resource management. Some of our accomplishments include, but are not limited to: enhanced performance of CMT under delay-based disparity, a tractable framework for modelling the throughput of CMT, a comparison of modelling techniques for SCTP, a new congestion window update policy for CMT, and efficient use of system resources through optimization. Since the demand for a better communications system is always on the horizon, it is our goal to further the research and inspire others to embrace CMT as a viable network architecture; in hopes that someday CMT will become a standard part of smartphone technology.

End-to-end Concurrent Multipath Transfer Using Transport Layer Multihoming

End-to-end Concurrent Multipath Transfer Using Transport Layer Multihoming PDF Author: Janardhan R. Iyengar
Publisher:
ISBN: 9780542720451
Category : Computer network protocols
Languages : en
Pages : 124

Get Book Here

Book Description
Transport layer multihoming binds a single transport layer association to multiple network addresses at each endpoint, thus allowing the two end hosts to communicate over multiple network paths. This dissertation investigates end-to-end Concurrent Multipath Transfer (CMT) using transport layer multihoming for increased application throughput. CMT is the simultaneous transfer of new data from a source host to a destination host via two or more end-to-end paths. We investigate and evaluate design considerations in implementing CMT at the transport layer using the Stream Control Transmission Protocol (SCTP) as an example of a multihome-capable transport layer protocol. Specifically, we explore (i) algorithms for CMT at the transport layer, (ii) retransmission policies for CMT, and (iii) performance implications of a bounded receive buffer on CMT. We identify three negative side-effects of reordering due to CMT that must be managed before the full performance gains of CMT's parallel transfer can be achieved. We propose three algorithms to eliminate these side-effects: the Split Fast Retransmit algorithm (SFR) to handle unnecessary fast retransmissions by a sender, the Cwnd Update for CMT algorithm (CUC) to counter overly conservative congestion window growth at a sender, and the Delayed Ack for CMT algorithm (DAC) to curb an increase in ack traffic due to fewer delayed acks by a receiver. These algorithms demonstrate that a single sequence space within a transport layer association is sufficient for CMT; separate sequence spaces per path are not required. We propose and evaluate five retransmission policies for CMT. Introducing these retransmission policies causes two side-effects: occurrence of spurious retransmissions and inaccurate congestion window estimation. We propose two protocol modifications to eliminate these side-effects. Using simulation, we evaluate CMT against AppStripe, a simulated idealized application that stripes data over multiple paths using multiple SCTP associations. The results of this evaluation demonstrate that CMT's sharing of sequence space across paths improves performance---an inherent benefit that load sharing at the transport layer has over that at the application layer. We study the performance of CMT in the presence of a bounded receive buffer (rbuf). Simulation results show that if two paths are used for CMT, the lower quality (i.e., higher loss rate) path degrades overall throughput of an rbuf-constrained CMT association by blocking the rbuf. (Abstract shortened by UMI.).

NETWORKING 2010

NETWORKING 2010 PDF Author: Mark Crovella
Publisher: Springer Science & Business Media
ISBN: 3642129625
Category : Business & Economics
Languages : en
Pages : 424

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 9th International IFIP TC6 Networking Conference, NETWORKING 2010, held in Chennai, India, in May 2010. The 24 revised full papers and 9 work in progress papers were carefully reviewed and selected from 101 submissions for inclusion in the book. The papers cover a variety of research topics in the area of P2P and overlay networks; performance measurement; quality of service; ad hoc and sensor networks; wireless networks, addressing and routing; and applications and services.

Software Networks

Software Networks PDF Author: Guy Pujolle
Publisher: John Wiley & Sons
ISBN: 1786304589
Category : Technology & Engineering
Languages : en
Pages : 308

Get Book Here

Book Description
Software Networks describe new concepts for the Internets next generation. This architecture is based on virtual networking using Cloud and datacenter facilities. The main problems to be dealt with are the placement of virtual resources for opening a new network on the fly, and the urbanization of virtual resources implemented on physical network equipment. The digital architecture also deals with mechanisms capable of automatically controlling the placement of all virtual resources within the physical network. This book describes how to create and delete virtual networks on the fly. Indeed, the system is able to create any new network with any kind of virtual resource (e.g. switches, routers, LSRs, optical paths, firewalls, SIP-based servers, devices, servers, access points, etc.). Software Networks shows how this architecture is compatible with new advances in SDN (Software Defined Networking), new high-speed transport protocols such as TRILL (Transparent Interconnection of Lots of Links) and LISP (Locator/Identifier Separation Protocol), NGN, IMS, new generation Wi-Fi, and 4G/5G networks. Finally, the author introduces Clouds of security and the virtualization of secure elements (smartcards) that could certainly transform how to secure the Internet. For this second edition, the author addresses in five new chapters the importance of open source software for networks, mobile edge computing, fog networking, tactile internet – a network environment allowing remote access, and security – the use of Cloud of security, secure elements and the emergence of the blockchain.

Quality of Service and Resource Allocation in WiMAX

Quality of Service and Resource Allocation in WiMAX PDF Author: Roberto Hincapie
Publisher: BoD – Books on Demand
ISBN: 9533079568
Category : Technology & Engineering
Languages : en
Pages : 390

Get Book Here

Book Description
This book has been prepared to present state of the art on WiMAX Technology. It has been constructed with the support of many researchers around the world, working on resource allocation, quality of service and WiMAX applications. Such many different works on WiMAX, show the great worldwide importance of WiMAX as a wireless broadband access technology. This book is intended for readers interested in resource allocation and quality of service in wireless environments, which is known to be a complex problem. All chapters include both theoretical and technical information, which provides an in depth review of the most recent advances in the field for engineers and researchers, and other readers interested in WiMAX.

Innovations in Computational Intelligence and Computer Vision

Innovations in Computational Intelligence and Computer Vision PDF Author: Manoj Kumar Sharma
Publisher: Springer Nature
ISBN: 9811560676
Category : Technology & Engineering
Languages : en
Pages : 623

Get Book Here

Book Description
This book presents high-quality, peer-reviewed papers from the International Conference on “Innovations in Computational Intelligence and Computer Vision (ICICV 2020),” hosted by Manipal University Jaipur, Rajasthan, India, on January 17–19, 2020. Offering a collection of innovative ideas from researchers, scientists, academics, industry professionals and students, the book covers a variety of topics, such as artificial intelligence and computer vision, image processing and video analysis, applications and services of artificial intelligence and computer vision, interdisciplinary areas combining artificial intelligence and computer vision, and other innovative practices.

Modeling and Simulation of Computer Networks and Systems

Modeling and Simulation of Computer Networks and Systems PDF Author: Faouzi Zarai
Publisher: Morgan Kaufmann
ISBN: 0128011580
Category : Computers
Languages : en
Pages : 965

Get Book Here

Book Description
Modeling and Simulation of Computer Networks and Systems: Methodologies and Applications introduces you to a broad array of modeling and simulation issues related to computer networks and systems. It focuses on the theories, tools, applications and uses of modeling and simulation in order to effectively optimize networks. It describes methodologies for modeling and simulation of new generations of wireless and mobiles networks and cloud and grid computing systems. Drawing upon years of practical experience and using numerous examples and illustrative applications recognized experts in both academia and industry, discuss: Important and emerging topics in computer networks and systems including but not limited to; modeling, simulation, analysis and security of wireless and mobiles networks especially as they relate to next generation wireless networks Methodologies, strategies and tools, and strategies needed to build computer networks and systems modeling and simulation from the bottom up Different network performance metrics including, mobility, congestion, quality of service, security and more... Modeling and Simulation of Computer Networks and Systems is a must have resource for network architects, engineers and researchers who want to gain insight into optimizing network performance through the use of modeling and simulation. Discusses important and emerging topics in computer networks and Systems including but not limited to; modeling, simulation, analysis and security of wireless and mobiles networks especially as they relate to next generation wireless networks Provides the necessary methodologies, strategies and tools needed to build computer networks and systems modeling and simulation from the bottom up Includes comprehensive review and evaluation of simulation tools and methodologies and different network performance metrics including mobility, congestion, quality of service, security and more