an automated approach for improving mptcp using feedback path failure

Tulassi Devi.M,Naresh Kumar.A,Jessima.J

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 27 March,2017         Pages:1293-1302

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

I propose a novel path failure detection method referred to as feedback-based path failure (FPF) detection. In addition, I propose a new decision method called buffer blocking protection (BBP) to address the underperforming subflows for the MPTCP. Measurement results indicate that the FPF detection reduces transmission interruption time by the fast path failure decision, which can prevent duplicate transmission interruption events and unnecessary retransmissions. Furthermore, the FPF detection is sufficiently robust in terms of packet loss and the delay difference between paths. The results additionally show that the BBP method prevents goodput degradation due to underperforming subflows. Consequently, the MPTCP with the BBP method can at least achieve the throughput performance of a single Transmission Control Protocol (TCP), which uses the best path regardless of the delay difference between paths.

Kewords

buffer blocking protection, feedback-based path failure, MPTCP .

Reference

1 Li, Q and Cao, G 2012, Mitigating Routing Misbehavior in Disruption Tolerant Networks, IEEE Trans. Information Forensics and Security, vol. 7, no. 2, pp. 664-675. 2 Ren, Y, Chuah, MC, Yang, J, and Chen, Y 2010, Detecting Wormhole Attacks in Delay Tolerant Networks, IEEE Wireless Comm. Magazine, vol. 17, no. 5, pp. 36-42. 3 Zhu, H, Lin, X, Lu, R, Shen, XS, Xing, D, and Cao, Z 2010, An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNS, Proc. IEEE INFOCOM. 4 Q, Zhu, S, and Cao, G 2010, Routing in Socially Selfish Delay Tolerant Networks, Proc. IEEE INFOCOM. 5Gao, W and Cao, G 2010, On Exploiting Transient Contact Patterns for Forwarding in Delay Tolerant Networks, Proc. IEEE 18th Intl Conf. Networks Protocols (ICNP). 6 Nelson, SC, Bakht, M and Kravets, R 2009 Encounter-Based Routing in Dtns, Proc. IEEE INFOCOM, pp. 846-854. 7 Li, F, Srinivasan, A and Wu, J 2009, Thwarting Blackhole Attacks in Distruption-Tolerant Networks Using Encounter Tickets, Proc. IEEE INFOCOM. 8 Shevade, U, Song, H, Qiu, L and Zhang, Y 2008 Incentive-Aware Routing in DTNS, Proc. IEEE Intl Conf. Network Protocols (ICNP 08).