A Transport Protocol to Exploit Multipath Diversity in Wireless Networks
Wireless networks (including wireless mesh networks) provide opportunities for using multiple paths. Multihoming of hosts, possibly using different technologies and providers, also makes it attractive for end-to-end transport connections to exploit multiple paths. In this paper, we propose a multipa...
Saved in:
Published in | IEEE/ACM transactions on networking Vol. 20; no. 4; pp. 1024 - 1039 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.08.2012
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1063-6692 1558-2566 |
DOI | 10.1109/TNET.2011.2181979 |
Cover
Loading…
Abstract | Wireless networks (including wireless mesh networks) provide opportunities for using multiple paths. Multihoming of hosts, possibly using different technologies and providers, also makes it attractive for end-to-end transport connections to exploit multiple paths. In this paper, we propose a multipath transport protocol, based on a carefully crafted set of enhancements to TCP, that effectively utilizes the available bandwidth and diversity provided by heterogeneous, lossy wireless paths. Our Multi-Path LOss-Tolerant (MPLOT) transport protocol can be used to obtain significant goodput gains in wireless networks, subject to bursty, correlated losses with average loss rates as high as 50%. MPLOT is built around the principle of separability of reliability and congestion control functions in an end-to-end transport protocol. Congestion control is performed separately on individual paths, and the reliability mechanism works over the aggregate set of paths available for an end-to-end session. MPLOT distinguishes between congestion and link losses through Explicit Congestion Notification (ECN), and uses Forward Error Correction (FEC) coding to recover from data losses. MPLOT uses a dynamic packet mapping based on the current path characteristics to choose a path for a packet. Use of erasure codes and block-level recovery ensures that in MPLOT the receiving transport entity can recover all data as long as a necessary number of packets in the block are received, irrespective of which packets are lost. We present a theoretical analysis of the different design choices of MPLOT and show that MPLOT chooses its policies and parameters such that a desirable tradeoff between goodput with data recovery delay is attained. We evaluate MPLOT, through simulations, under a variety of test scenarios and demonstrate that it effectively exploits path diversity in addition to efficiently aggregating path bandwidths while remaining fair to a conventional TCP flow on each path. |
---|---|
AbstractList | Wireless networks (including wireless mesh networks) provide opportunities for using multiple paths. Multihoming of hosts, possibly using different technologies and providers, also makes it attractive for end-to-end transport connections to exploit multiple paths. In this paper, we propose a multipath transport protocol, based on a carefully crafted set of enhancements to TCP, that effectively utilizes the available bandwidth and diversity provided by heterogeneous, lossy wireless paths. Our Multi-Path LOss-Tolerant (MPLOT) transport protocol can be used to obtain significant goodput gains in wireless networks, subject to bursty, correlated losses with average loss rates as high as 50%. MPLOT is built around the principle of separability of reliability and congestion control functions in an end-to-end transport protocol. Congestion control is performed separately on individual paths, and the reliability mechanism works over the aggregate set of paths available for an end-to-end session. MPLOT distinguishes between congestion and link losses through Explicit Congestion Notification (ECN), and uses Forward Error Correction (FEC) coding to recover from data losses. MPLOT uses a dynamic packet mapping based on the current path characteristics to choose a path for a packet. Use of erasure codes and block-level recovery ensures that in MPLOT the receiving transport entity can recover all data as long as a necessary number of packets in the block are received, irrespective of which packets are lost. We present a theoretical analysis of the different design choices of MPLOT and show that MPLOT chooses its policies and parameters such that a desirable tradeoff between goodput with data recovery delay is attained. We evaluate MPLOT, through simulations, under a variety of test scenarios and demonstrate that it effectively exploits path diversity in addition to efficiently aggregating path bandwidths while remaining fair to a conventional TCP flow on each path. |
Author | Sharma, Vicky Kar, Koushik Ramakrishnan, K. K. Kalyanaraman, Shivkumar |
Author_xml | – sequence: 1 givenname: Vicky surname: Sharma fullname: Sharma, Vicky organization: Department of Electrical and Computer Engineering, Rensselaer Polytechnic Institute, Troy, NY, USA – sequence: 2 givenname: Koushik surname: Kar fullname: Kar, Koushik organization: Department of Electrical and Computer Engineering, Rensselaer Polytechnic Institute, Troy, NY, USA – sequence: 3 givenname: K. K. surname: Ramakrishnan fullname: Ramakrishnan, K. K. organization: AT&T Labs Research, Florham Park, NJ, USA – sequence: 4 givenname: Shivkumar surname: Kalyanaraman fullname: Kalyanaraman, Shivkumar organization: IBM Research, India, Bangalore, India |
BookMark | eNp9kDFPAjEUgBuDiYD-AOPSxMXlsK-99q4jQRQTRAeM46WUXiwe17MtKv_eIxAHBqe-4fvea74e6tSuNghdAhkAEHk7n43nA0oABhRykJk8QV3gPE8oF6LTzkSwRAhJz1AvhBUhwAgVXTQZ4rlXdWicj_jFu-i0q3B0ePzTVM5G_LSpom1UfMd39sv4YOMW2xq_WW8qEwKemfjt_Ec4R6elqoK5OLx99Ho_no8myfT54XE0nCaaURETlmUMSmkU54QpujAauCzJIhPpMueQl0vKc610WsqWyEueLmRm0pRRyoFqwfroZr-38e5zY0Is1jZoU1WqNm4TChAZMMlBQIteH6Ert_F1-7sCCEtTCkLwloI9pb0LwZuyaLxdK79toWLXtti1LXZti0Pb1smOHG2jitbV0Stb_Wte7U1rjPm7JIC3AGW_vISHXA |
CODEN | IEANEP |
CitedBy_id | crossref_primary_10_1016_j_cja_2015_05_010 crossref_primary_10_1109_TNET_2017_2701153 crossref_primary_10_1109_JSAC_2016_2551483 crossref_primary_10_1109_TCSVT_2017_2695368 crossref_primary_10_1109_TVT_2015_2394431 crossref_primary_10_1186_1687_1499_2014_130 crossref_primary_10_1109_COMST_2016_2558818 crossref_primary_10_1109_JIOT_2018_2883736 crossref_primary_10_1109_ACCESS_2016_2624755 crossref_primary_10_1109_TCSVT_2016_2565902 crossref_primary_10_1109_TCOMM_2017_2785252 crossref_primary_10_1016_j_jnca_2016_09_005 crossref_primary_10_1007_s11277_021_08645_3 crossref_primary_10_1002_dac_2792 crossref_primary_10_1109_ACCESS_2019_2945357 crossref_primary_10_1109_TMC_2018_2836914 crossref_primary_10_1109_COMST_2016_2586112 crossref_primary_10_1109_TCSVT_2015_2441412 crossref_primary_10_1109_TMC_2015_2426710 crossref_primary_10_1109_TMC_2018_2876366 crossref_primary_10_1109_TCOMM_2016_2553138 crossref_primary_10_1109_TMC_2014_2364042 crossref_primary_10_1109_TMC_2017_2686379 crossref_primary_10_1109_TMC_2015_2497238 crossref_primary_10_1016_j_compeleceng_2015_01_007 crossref_primary_10_1109_TPDS_2014_2347031 crossref_primary_10_1016_j_adhoc_2018_07_003 crossref_primary_10_1186_1687_1499_2013_283 crossref_primary_10_1109_TWC_2015_2509063 crossref_primary_10_1109_TMM_2018_2879748 crossref_primary_10_1109_TMC_2017_2748592 crossref_primary_10_1109_TCOMM_2016_2607709 crossref_primary_10_1109_TCSVT_2016_2527398 crossref_primary_10_1016_j_comnet_2016_11_018 crossref_primary_10_1109_TMC_2016_2584049 |
Cites_doi | 10.1109/TWC.2003.821207 10.2307/2684925 10.1109/90.720869 10.1109/VETECS.2007.185 10.1109/MILCOM.2006.302199 10.1109/INFCOM.2007.102 10.1109/VETECS.2003.1207875 10.1145/1096536.1096539 10.1145/938985.938987 10.1109/ICC.2004.1313306 10.1145/381677.381704 10.1109/TWC.2004.825355 10.1109/TMM.2006.888017 10.1145/285243.285258 10.1145/1030194.1015482 10.1109/49.840210 10.1109/WOWMOM.2005.42 10.1109/TMC.2006.1599407 10.1109/JCN.2002.6596897 10.17487/rfc3168 10.17487/rfc6356 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Aug 2012 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Aug 2012 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
DOI | 10.1109/TNET.2011.2181979 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
DatabaseTitleList | Technology Research Database Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-2566 |
EndPage | 1039 |
ExternalDocumentID | 2740345101 10_1109_TNET_2011_2181979 6152182 |
Genre | orig-research |
GroupedDBID | -DZ -~X .DC 0R~ 29I 4.4 5GY 5VS 6IK 85S 8US 97E 9M8 AAJGR AAKMM AALFJ AARMG AASAJ AAWTH AAWTV ABAZT ABPPZ ABQJQ ABVLG ACGFS ACGOD ACIWK ACM ADBCU ADL AEBYY AEFXT AEJOY AENSD AETEA AETIX AFWIH AFWXC AGQYO AGSQL AHBIQ AI. AIBXA AIKLT AKJIK AKQYR AKRVB ALLEH ALMA_UNASSIGNED_HOLDINGS ATWAV BDXCO BEFXN BFFAM BGNUA BKEBE BPEOZ CCLIF CS3 D0L EBS EJD FEDTE GUFHI HF~ HGAVV HZ~ H~9 I07 ICLAB IEDLZ IES IFIPE IFJZH IPLJI JAVBF LAI LHSKQ M43 MVM O9- OCL P1C P2P PQQKQ RIA RIE RNS ROL TN5 UPT UQL VH1 XOL YR2 ZCA AAYOK AAYXX CITATION RIG 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
ID | FETCH-LOGICAL-c326t-37731f9ea5503a2bec159f0b764d8518fd258cac4f95508f54b97e44322512c63 |
IEDL.DBID | RIE |
ISSN | 1063-6692 |
IngestDate | Fri Jul 11 00:55:00 EDT 2025 Mon Jun 30 04:49:16 EDT 2025 Thu Apr 24 22:54:56 EDT 2025 Tue Jul 01 01:49:16 EDT 2025 Wed Aug 27 02:55:06 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c326t-37731f9ea5503a2bec159f0b764d8518fd258cac4f95508f54b97e44322512c63 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
PQID | 1034421665 |
PQPubID | 32020 |
PageCount | 16 |
ParticipantIDs | ieee_primary_6152182 crossref_citationtrail_10_1109_TNET_2011_2181979 crossref_primary_10_1109_TNET_2011_2181979 proquest_journals_1034421665 proquest_miscellaneous_1671395161 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2012-08-01 |
PublicationDateYYYYMMDD | 2012-08-01 |
PublicationDate_xml | – month: 08 year: 2012 text: 2012-08-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE/ACM transactions on networking |
PublicationTitleAbbrev | TNET |
PublicationYear | 2012 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 vergetis (ref23) 2006 ref15 rizzo (ref11) 0 ref30 ref2 ref1 ref16 ref19 ref18 miu (ref24) 2005 nguyen (ref28) 2002 ref26 hsieh (ref7) 2002 ref25 byers (ref12) 1998 ref20 ref22 chen (ref10) 2004 anker (ref14) 2004 ref27 ref29 ref8 ref9 ref4 zhang (ref17) 2005 ref3 ref6 ref5 vergetis (ref21) 2005 |
References_xml | – start-page: 16 year: 2005 ident: ref24 article-title: Improving loss resilience with multi-radio diversity in wireless networks publication-title: Proc ACM MobiCom – start-page: 62 year: 2006 ident: ref23 article-title: Packet-level diversity-From theory to practice: An 802.11-based experimental investigation publication-title: Proc ACM MobiCom – ident: ref19 doi: 10.1109/TWC.2003.821207 – year: 2004 ident: ref14 publication-title: Transport layer end-to-end error correcting – year: 2005 ident: ref17 publication-title: Understanding Internet routing anomalies and building robust transport layer protocols – ident: ref5 doi: 10.2307/2684925 – year: 2002 ident: ref28 article-title: Distributed video streaming with forward error correction publication-title: Packet Video Workshop – ident: ref13 doi: 10.1109/90.720869 – ident: ref3 doi: 10.1109/VETECS.2007.185 – year: 0 ident: ref11 publication-title: On the feasibility of software FEC – ident: ref8 doi: 10.1109/MILCOM.2006.302199 – ident: ref29 doi: 10.1109/INFCOM.2007.102 – ident: ref2 doi: 10.1109/VETECS.2003.1207875 – ident: ref22 doi: 10.1145/1096536.1096539 – ident: ref18 doi: 10.1145/938985.938987 – ident: ref15 doi: 10.1109/ICC.2004.1313306 – ident: ref16 doi: 10.1145/381677.381704 – start-page: 83 year: 2002 ident: ref7 article-title: A transport layer approach for achieving aggregate bandwidths on multi-homed mobile hosts publication-title: Proc ACM MobiCom – ident: ref20 doi: 10.1109/TWC.2004.825355 – year: 2004 ident: ref10 article-title: Multipath TCP in lossy wireless environment publication-title: IFIP 3rd Annu Med-Hoc-Net – ident: ref26 doi: 10.1109/TMM.2006.888017 – start-page: 56 year: 1998 ident: ref12 article-title: A digital fountain approach to reliable distribution of bulk data publication-title: Proc ACM Sigcomm doi: 10.1145/285243.285258 – year: 2005 ident: ref21 article-title: Improving performance through channel diversity in the presence of bursty losses publication-title: ITC-11 – ident: ref1 doi: 10.1145/1030194.1015482 – ident: ref6 doi: 10.1109/49.840210 – ident: ref25 doi: 10.1109/WOWMOM.2005.42 – ident: ref27 doi: 10.1109/TMC.2006.1599407 – ident: ref9 doi: 10.1109/JCN.2002.6596897 – ident: ref4 doi: 10.17487/rfc3168 – ident: ref30 doi: 10.17487/rfc6356 |
SSID | ssj0013026 |
Score | 2.2606328 |
Snippet | Wireless networks (including wireless mesh networks) provide opportunities for using multiple paths. Multihoming of hosts, possibly using different... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1024 |
SubjectTerms | Aggregates Bandwidth Blocking Congestion Diversity gain Encoding Forward error correction lossy environments multihop wireless networks multipath Networks Packets (communication) Receiving Reliability Studies TCP TCP (protocol) Transport Transport protocols Wireless networks |
Title | A Transport Protocol to Exploit Multipath Diversity in Wireless Networks |
URI | https://ieeexplore.ieee.org/document/6152182 https://www.proquest.com/docview/1034421665 https://www.proquest.com/docview/1671395161 |
Volume | 20 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8QwEA7qSQ--xdVVIngSuzZpmjZH8cEi7OJhBW8laScgSiu73Yu_3knarYuKeCt02obMZB6db2YIOeeRtEZyEbAkhEAUwAMjdBqAZUWCEgQ2csXJo7EcPomH5_h5hVx2tTAA4MFnMHCXPpdfVPnc_Sq7ks7YpKhwVzFwa2q1vjIGoR-thhFOFEipeJvBZKG6mozvJk2zTmfPlENtLdkgP1Tlhyb25uV-i4wWC2tQJa-DeW0G-ce3no3_Xfk22Wz9THrdCMYOWYFyl2wsdR_cI8Nr2rU2p4_Tqq5QKGhdUY_Le6mpL851I4vp7QK9QV9K6gCzb6gg6biBkM_2ydP93eRmGLSDFYIcvbUalUoSMatAY3gSaY5sRKfGhiaRokAPLLUFj9Nc58IqpEhtLIxKQAh3-BnPZXRA1sqqhENCRayAAWjJjRHM6tT5D5FOtOFK8zzukXCx1Vnedh13wy_eMh99hCpz3Mkcd7KWOz1y0T3y3rTc-It4z-12R9hudI_0F_zM2kM5w5dEQnAmJa7qrLuNx8nlSHQJ1RxpJEbt6HVKdvT7m4_JOn6fNxjAPlmrp3M4Qb-kNqdeID8BBg_doA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT9wwEB6t4ND2AC206vJojdQTapbYcZz4iCirbcuuelgkbpGdjCUESirIXvj1jJ1sQLSqeosUxxp5xvPIfDMD8EUkylklZMSzGCNZoYisNHmEjlcZSRC6xBcnzxdqdil_XKVXI_g61MIgYgCf4cQ_hlx-1ZQr_6vsRHljk5PC3SS7n_KuWuspZxCH4WoU4ySRUlr0OUwe65Pl4nzZtev0Fk173NYzKxTGqvyhi4OBmW7DfE1ahyu5maxaOykfXnRt_F_a38JW72my00403sEI6x1486z_4C7MTtnQ3Jz9umvahsSCtQ0LyLzrloXyXD-0mH1b4zfYdc08ZPaWVCRbdCDy-_dwOT1fns2ifrRCVJK_1pJayRLuNBoKUBIjiJHk1rjYZkpW5IPlrhJpXppSOk0rcpdKqzOU0l9_LkqVfICNuqnxIzCZauSIRglrJXcm9x5EYjJjhTaiTMcQr4-6KPu-4378xW0R4o9YF547hedO0XNnDMfDJ7-7phv_WrzrT3tY2B_0GA7W_Cz6a3lPmyRSCq4UUXU0vKYL5bMkpsZmRWsUxe3kdyq-9_edP8Or2XJ-UVx8X_zch9dEi-gQgQew0d6t8JC8lNZ-CsL5CL-r4Ok |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Transport+Protocol+to+Exploit+Multipath+Diversity+in+Wireless+Networks&rft.jtitle=IEEE%2FACM+transactions+on+networking&rft.au=Sharma%2C+Vicky&rft.au=Kar%2C+Koushik&rft.au=Ramakrishnan%2C+K.+K&rft.au=Kalyanaraman%2C+Shivkumar&rft.date=2012-08-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=1063-6692&rft.eissn=1558-2566&rft.volume=20&rft.issue=4&rft.spage=1024&rft_id=info:doi/10.1109%2FTNET.2011.2181979&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=2740345101 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1063-6692&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1063-6692&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1063-6692&client=summon |