[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Multipath Bandwidth Scavenging in the Internet of Things

  • Conference paper
  • First Online:
Internet of Things. User-Centric IoT (IoT360 2014)

Abstract

In order to achieve the capacity and geographic scope required by IoT applications, service providers should explore mutually-beneficial modes of collaboration such as through cooperative packet forwarding by IoT nodes and cooperative gatewaying through fixed backhauls. To promote such resource pooling while minimizing negative impact on collaborating providers, we developed a transport-layer approach that combines multipath techniques with less-than-best effort (LBE) congestion control methods to enable IoT nodes to opportunistically scavenge for idle bandwidth across multiple paths. Initial tests using TCP-LP and LEDBAT congestion control algorithms on scavenging secondary flows show that this desired functionality can be achieved, while our use of standard TCP congestion control on primary flows ensures that IoT nodes are guaranteed at least one flow that can compete for fair share of the network capacity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Adhari, H., Werner, S., Dreibholz, T., Rathgeb, E.P: LEDBAT-MP on the application of lower-than-best-effort for concurrent multipath transfer. In: Proceedings of the 4th International Workshop on Protocols and Applications with Multi-Homing Support (PAMS), Victoria, British Columbia/Canada, May 2014. ISBN 978-1-4799-2652-7

    Google Scholar 

  2. BeWifi, Accessed on 30 June 2014. http://www.bewifi.es

  3. Cable WiFi : Internet access brought to consumers through a collaboration among U.S. Internet Service Providers, Accessed on 30 June 2014. http://www.cablewifi.com

  4. Chebrolu, K., Raman, B., Rao, R.R.: A network layer approach to enable TCP over multiple interfaces. Wirel. Netw. 11(5), 637–650 (2005)

    Article  Google Scholar 

  5. Evensen, K., Kaspar, D., Engelstad, P., Hansen, A.F., Griwodz, C., Halvorsen, P: A network-layer proxy for bandwidth aggregation and reduction of ip packet reordering. In: IEEE 34th Conference on Local Computer Networks. LCN 2009, pp. 585–592. IEEE (2009)

    Google Scholar 

  6. Ford, A., Raiciu, C., Handley, M., Barre, S., Inyegar, J.: Architectural Guidelines for Multipath TCP Development. RFC 6182, RFC Editor, March 2011

    Google Scholar 

  7. Habak, K., Youssef, M., Harras, K.A.: DBAS: a deployable bandwidth aggregation system. In: 2012 5th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–6, May 2012

    Google Scholar 

  8. Jin,T., Huu, T.V., Blass, E.-O., Noubir, G.: BaPu: efficient and practical bunching of access point uplinks. CoRR, abs/1301.5928, 2013

    Google Scholar 

  9. Kuzmanovic, A., Knightly, E.W.: TCP-LP: low-priority service via end-point congestion control. IEEE/ACM Trans. Netw. 14(4), 739–752 (2006)

    Article  Google Scholar 

  10. Li, M., Lukyanenko, A., Tarkoma, S., Cui, Y., Yl-Jski, A.: Tolerating path heterogeneity in multipath TCP with bounded receive buffers. Comput. Netw. 64, 1–14 (2014)

    Article  Google Scholar 

  11. Google Code Project. Multipath-TCP: Implement Multipath TCP on NS-2, Accessed on 30 June 2014. http://code.google.com/p/multipath-tcp

  12. Shalunov, S., Hazel, G., Iyengar, J., Kuehlewind, M.: Low Extra Delay Background Transport (LEDBAT). RFC 6817, RFC Editor, December 2012

    Google Scholar 

  13. Strickland, J.W., Freeh, V.W., Ma, X., Vazhkudai, S.S.: Governor: autonomic throttling for aggressive idle resource scavenging. In: Second International Conference on Autonomic Computing, ICAC 2005. Proceedings, pp. 64–75. IEEE (2005)

    Google Scholar 

  14. Welzl, M., Ros, D.: A Survey of Lower-than-Best-Effort Transport Protocol. RFC 6297, RFC Editor, June 2011

    Google Scholar 

  15. Wischik, D., Raiciu, C., Greenhalgh, A., Handley, M.: Design, implementation and evaluation of congestion control for multipath TCP. NSDI 11, 8–8 (2011)

    Google Scholar 

  16. Zinner, T., Tutschku, K., Nakao, A., Tran-Gia, P.: Using concurrent multipath transmission for transport virtualization: analyzing path selection. In: 2010 22nd International, Teletraffic Congress (ITC), pp. 1–7, Sept 2010

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Isabel Montes .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Montes, I., Parmis, R., Ocampo, R., Festin, C. (2015). Multipath Bandwidth Scavenging in the Internet of Things. In: Giaffreda, R., et al. Internet of Things. User-Centric IoT. IoT360 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 150. Springer, Cham. https://doi.org/10.1007/978-3-319-19656-5_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19656-5_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19655-8

  • Online ISBN: 978-3-319-19656-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics