1,005 research outputs found
Concurrent Multipath Transferring in IP Networks: Two IP-level solutions for TCP and UDP
Having multiple network interfaces or gateways available, the Internet users can transfer their data through multiple paths to achieve load balancing, fault-tolerance, and more aggregate bandwidth. However, transferring the packets of the same flow over multiple paths with diverse delays could introduce reordering among the received packets at the destination. In TCP, fast-retransmit/recovery might mistake reordered packets for lost packets and hence degrades the throughput. In UDP, we require larger buffers to keep out-of-order received packets. In this thesis, we propose two approaches at the IP layer to address the reordering problem of TCP and UDP. In the case of TCP, the key observation is that the interleaved reception of the packets at the destination does not trigger the fast-retransmit/recovery mechanism, even though the packets are received reordered. Therefore, the IP layer who is in charge of alternating the packets among the multipath available paths needs to linger on the slower path for at least the delay difference between the paths. In the case of UDP, the proposed approach schedules the packets at the source to have them received in-order at the destination
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
De-ossifying the Internet Transport Layer : A Survey and Future Perspectives
ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their useful suggestions and comments.Peer reviewedPublisher PD
A Performance Analysis Model of TCP over Multiple Heterogeneous Paths for 5G Mobile Services
Driven by the primary requirement of emerging 5G mobile services, the demand
for concurrent multipath transfer (CMT) is still prominent. Yet, multipath
transport protocols are not widely adopted and TCP-based CMT schemes will still
be in dominant position in 5G. However, the performance of TCP flow transferred
over multiple heterogeneous paths is prone to the link quality asymmetry, the
extent of which was revealed to be significant by our field investigation. In
this paper, we present a performance analysis model for TCP over multiple
heterogeneous paths in 5G scenarios, where both bandwidth and delay asymmetry
are taken into consideration. The evaluation adopting parameters from field
investigation shows that the proposed model can achieve high accuracy in
practical environments. Some interesting inferences can be drawn from the
proposed model, such as the dominant factor that affect the performance of TCP
over heterogeneous networks, and the criteria of determining the appropriate
number of links to be used under different circumstances of path heterogeneity.
Thus, the proposed model can provide a guidance to the design of TCP-based CMT
solutions for 5G mobile services
A Survey on Congestion Control and Scheduling for Multipath TCP: Machine Learning vs Classical Approaches
Multipath TCP (MPTCP) has been widely used as an efficient way for
communication in many applications. Data centers, smartphones, and network
operators use MPTCP to balance the traffic in a network efficiently. MPTCP is
an extension of TCP (Transmission Control Protocol), which provides multiple
paths, leading to higher throughput and low latency. Although MPTCP has shown
better performance than TCP in many applications, it has its own challenges.
The network can become congested due to heavy traffic in the multiple paths
(subflows) if the subflow rates are not determined correctly. Moreover,
communication latency can occur if the packets are not scheduled correctly
between the subflows. This paper reviews techniques to solve the
above-mentioned problems based on two main approaches; non data-driven
(classical) and data-driven (Machine Learning) approaches. This paper compares
these two approaches and highlights their strengths and weaknesses with a view
to motivating future researchers in this exciting area of machine learning for
communications. This paper also provides details on the simulation of MPTCP and
its implementations in real environments.Comment: 13 pages, 7 figure
Adaptive-Compression Based Congestion Control Technique for Wireless Sensor Networks
Congestion in a wireless sensor network causes an increase in the amount of data loss and delays in data transmission. In this paper, we propose a new congestion control technique (ACT, Adaptive Compression-based congestion control Technique) based on an adaptive compression scheme for packet reduction in case of congestion. The compression techniques used in the ACT are Discrete Wavelet Transform (DWT), Adaptive Differential Pulse Code Modulation (ADPCM), and Run-Length Coding (RLC). The ACT first transforms the data from the time domain to the frequency domain, reduces the range of data by using ADPCM, and then reduces the number of packets with the help of RLC before transferring the data to the source node. It introduces the DWT for priority-based congestion control because the DWT classifies the data into four groups with different frequencies. The ACT assigns priorities to these data groups in an inverse proportion to the respective frequencies of the data groups and defines the quantization step size of ADPCM in an inverse proportion to the priorities. RLC generates a smaller number of packets for a data group with a low priority. In the relaying node, the ACT reduces the amount of packets by increasing the quantization step size of ADPCM in case of congestion. Moreover, in order to facilitate the back pressure, the queue is controlled adaptively according to the congestion state. We experimentally demonstrate that the ACT increases the network efficiency and guarantees fairness to sensor nodes, as compared with the existing methods. Moreover, it exhibits a very high ratio of the available data in the sink
Robust QUIC: integrating practical coding in a low latency transport protocol
We introduce rQUIC, an integration of the QUIC protocol and a coding module. rQUIC has been designed to feature different coding/decoding schemes and is implemented in go language. We conducted an extensive measurement campaign to provide a thorough characterization of the proposed solution. We compared the performance of rQUIC with that of the original QUIC protocol for different underlying network conditions as well as different traffic patterns. Our results show that rQUIC not only yields a relevant performance gain (shorter delays), especially when network conditions worsen, but also ensures a more predictable behavior. For bulk transfer (long flows), the delay reduction almost reached 70% when the frame error rate was 5%, while under similar conditions, the gain for short flows (web navigation) was approximately 55%. In the case of video streaming, the QoE gain (p1203 metric) was, approximately, 50%.This work was supported in part by the Basque Government through the Elkartek Program under the Hodei-x Project under Agreement KK-2021/00049; in part by the Spanish Government through the Ministerio de EconomĂa y Competitividad, Fondo Europeo de Desarrollo Regional (FEDER) through the Future Internet Enabled Resilient smart CitiEs (FIERCE) under Grant RTI2018-093475-AI00; and in part by the Industrial Doctorates Program of the University of Cantabria under Grant Call 2019
- …