SlideShare a Scribd company logo
Using Concurrent Multipath Transmission for
Transport Virtualization: Analyzing Path Selection
Thomas Zinner∗ , Kurt Tutschku† , Akihiro Nakao‡ , Phuoc Tran-Gia∗
∗ University

of Wuerzburg, Institute of Computer Science, Wuerzburg, Germany
eMail: [zinner|trangia]@informatik.uni-wuerzburg.de

† University

of Vienna, Professur "Future Communication",
Universitätsstrasse 10/T11, 1090 Wien, Austria. eMail: kurt.tutschku@univie.ac.at
‡ University

of Tokyo, Graduate School of Interdisciplinary Information Studies,
7-3-1, Hongo, Bunkyo-ku, Tokyo, 113-0033, Japan. eMail: nakao@iii.u-tokyo.ac.jp
Abstract—The concept of Transport Virtualization (TV) enhances the capabilities of future networks. TV enables transport
mechanisms with arbitrary resource usage independent of the
underlying transport system. The simplest form of TV can be
achieved by collecting multiple transport resources (even from
different virtual networks or providers) and selecting the best
resources for exclusive or concurrent use. However, the selection
and application of concurrent paths is complex and its impact
on the transmission is non-intuitive. Path length diversity of
different concurrent paths inevitably introduces out-of-order
packet delivery. We present and discuss a mathematical model for
the analysis of the fundamental behavior and influence factors for
packet re-ordering in concurrent multipath transmissions. Our
model facilitates the understanding of path selection algorithms
for multipath transport virtualization.

I. I NTRODUCTION
Nowadays, data transport is achieved mainly by the Internet Protocol (IP). Its routing feature achieves a scalable
connection of local subnets and end systems. IP assumes
that the interconnecting nodes (i.e. the routers) and the actual
transport resources (i.e. the links) are stable and change only
in case of failures. The Future Internet will consist of interconnected subnets and interconnecting nodes too. However,
the availability of these resources is expected to be provided
for a certain lifetime and their capabilities are highly variable,
cf. [1]. Networks that are based on the model of temporal
leasing of variable resources are referred to as federated
networks, and technologies that enable the safe sharing of such
network resources are denoted as Network Virtualization (NV)
mechanisms.
A major task when creating federated networks for data
transport is the selection of resources. The selection has to
consider the temporal availability of the resources. Therefore,
a measurement-based scheme for selecting these resources is
needed. This mechanism should adapt the federated transport
network to the variable demand for resources as well as to the
currently available resources. Of course, the selection scheme
has to scale sufficiently so that it can be applied in large
networks.
The concept of Transport Virtualization (TV) enhances
the capabilities of future networks. TV can be considered

as an alternative mode of Network Virtualization [2]. While
NV typically facilitates the sharing of resources, TV creates
virtual resources (e.g. virtual links) based on the aggregation
of resources [2]. The simplest form of TV is achieved by
collecting multiple transport resources (even from different
virtual networks or providers) and selecting the best resources
for exclusive or concurrent use. The type of the resources used
for aggregation does not matter; they can be either of physical
or of virtual nature.
The use of concurrent multipath (CMP) transmissions will
bring exceptional advantages to networks, such as higher
throughput and increased resilience. However, CMP will introduce additional complexity which has to be understood.
First, CMP transmission will inevitably introduce out-of-order
packets due to different stochastic packet delay characteristics
on the paths. The re-ordering can be compensated by buffering
at the destination, possibly leading to increased end-to-end
delay but still being transparent to the transport protocol.
Second, the different stochastic delay processes on the paths
can amplify each other in their negative effects on out-oforder packets. Third, the strength and occurrences of such
combination effects are highly non-intuitive.
We study these effects by an analytical model, which is
able to calculate the re-sequencing buffer occupancy probability distribution. This model will be verified by eventbased simulations. Originally, the model was introduced for
the investigation of a many-to-one transmission scenario of
parallel downloads for streaming applications, [3], [4]. In the
context of TV, the model is used for a one-to-one transmission
over multiple paths. By using the analytical model, "what-if"
scenarios and path selection strategies can be easily evaluated.
The paper is structured as follows. First, Section II outlines the idea of TV. Section III discusses work related to
the suggested TV. In Section IV we present the analytical
model for the analysis of the re-sequencing buffer occupancy
probability. Section V provides comprehensive discussions
towards a path selection strategy based on the investigation
of the re-sequencing buffer occupancy probability distribution.
Section VI concludes with a brief summary.
Routing
Overlay

used
path

Fig. 1: Selection of one path out of several possible paths

II. T RANSPORT V IRTUALIZATION
The idea of Transport Virtualization constitutes an abstraction concept for data transport resources. In TV, an abstract
data transport resource is combined from one or more physical
or overlay data transport resources. Such a resource can be,
e.g., a leased line, a wave length path, an overlay link, or an IP
forwarding capability to a certain destination. The resources
can be used preclusive or concurrently.
A. Path Selection and Resource Pooling
First let us consider ordinary path selection. In this case, a
single path out of a set of candidate paths is selected. This
is case is depicted in Figure 1. The path characteristic has
a direct impact on reliability, security or on QoS parameters
between the start point and the end point of the transmission.
Therefore, a selection function has to exist which enables the
appropriate choice of the used path. For instance, the different
resources (i.e. paths) could be classified by the path delay.
Moreover, the concurrent usage of different paths might
have appealing advantages. The reliability of the end-toend connection is increased and even the overall throughput
might be higher if concurrent paths are used for the data
transmission. This is illustrated in Figure 2. In this example
two paths are pooled and appear as one virtual link. However,
there has to be a mechanism distributing the data among
the used paths and which is selecting the appropriate set of
concurrent paths. This feature will be discussed in Section
IV. The set of used paths can consist of paths offered by
different Internet or overlay providers. So the data transport
is not bounded to one of these providers any more. It is even
possible to choose the cheapest or fastest resources and pool
them together to a high capacity pipe. The pooling of resources
out of different networks is shown in Figure 3.
TV achieves the pooling by a mechanism that is placed
on nodes that have access to multiple paths or networks,
e.g. end hosts which are multi-homed or routers running
exterior gateway protocols. At the origin of the transmission,
the mechanism decides which resources, i.e. which paths, are

Routing
Overlay
O
l

pooled
resources

Fig. 2: Selection of a couple of paths out of several possible paths

Fig. 3: Selection of a couple of paths out of several possible paths from
different overlays

selected, whether they are used preclusive or concurrently, and
how the data is distributed among these paths. If necessary, the
split data is recombined at the destination to a consistent flow.
Due to the ability to choose between different transmission
options, TV achieves an independence from a specific physical
transport resource.
Even if one of the used resources fails, TV using CMP
may be able to continue partly the transmission service.
Other advantages of CMP transmissions are higher capacity
due to parallelism, avoiding head-of-the-line blocking, spatial
separation of control and data connections, differentiations
between traffic types, and leveraging multiple processors in
routers [5]. On the downside, CMP transmissions require
additional overhead and memory for leveraging packet reordering.
B. Availability of Concurrent Paths
A major concern for the applicability of TV is the availability of different transport resources. Recent investigations
of tier 1 topologies [6] reveal that multiple paths between
many destinations readily exist [7]. Moreover, measurements
in PlanetLab [8] revealed that up to 25% of certain Internet
routes may violate the triangle inequality. That means a shorter
delay can be experienced when another path through an
intermediate node is used.
C. Selection of Pooled Resources
An important question for TV is the selection of pooled
resources, i.e. the choice of a potential set of paths. Typically,
a good path in the set has a short transmission delay [9].
Thus, the mean packet delay on a path is an initial candidate as
selection criteria. However, the interaction between concurrent
paths is expected to be complex. Though, the selection has
to be based on a more detail path description. This will be
evaluated in Section V. For that we will use the packet delay
distribution on a path as a main characterization for the path
behavior.
III. R ELATED W ORK
Multipath transmission mechanisms have been suggested
for IP networks a while. The Stream Control Transmission
Protocol (SCTP) [10] enables multi-homing but doesn’t facilitate CMP transfer and its advantages. As seen in [11] typical
problems with packet reordering occur. While [11] proposed
to enhance SCTP such that it can react to packet reordering
this paper presents a mechanism to suppress reordering as far
as possible. As a result transport protocols like SCTP or TCP
do not have to be modified. The pTCP [12] and the Multi-Path
TCP [13] proposals exploit concurrent transmissions, however,
they focus on flow control and the coordination among flows.
Our work complements these studies since we are aiming at
the selection of paths.
Path selection is often investigated on network layer in
context of multipath routing, e.g. [14]. We amend these works
by considering the transmission mechanism on transport layer.
A major work, which addresses the network and transport layer concurrently, is the DaVinci architecture [15]. In
DaVinci, the paths are selected such that the creation of bottlenecks is avoided. The investigation in our paper goes beyond
the results presented in the DaVinci architecture. The DaVinci
proposal considers mainly the mean path delay. However,
we will see in Section V that this assumption might be not
sufficient. Our paper discusses the fundamental performance
issues in selecting paths according to their detailed statistical
characteristics.
Finally, three efforts of IETF working groups (WGs) should be mentioned. The Application-Layer Traffic Optimization
(ALTO) WG [16] aims at providing P2P CDNs with information to perform better-than-random initial peer selection.
This selection protocol might be extended to path selection.
The Low Extra Delay Background Transport (LEDBAT) WG
[17] investigates multi-path TCP connections in order to better
saturate bottlenecks. At last, Transport Area WG discusses
currently the combination of BGP and Multi-path TCP [18].
IV. M ECHANISMS AND P ERFORMANCE M ODELS
TV can be facilitated using one-hop source routing overlays
[19]. Such an overlay is implemented by the SORA architecture [9] where a striping mechanism is used.
Besides the striping of the data to different paths, the TV
mechanism is selecting the pool of concurrent paths. The
candidate paths for pooling might be provided either by a
path oracle (e.g., [20] for operator supported oracles) or by
the start point of the multi-path connection, if this start point
measures the paths by itself.
Next, we will outline the performance model for the suggested striping mechanism. We will start with the mechanism
and then detail the analytical model of the re-sequencing
buffer occupancy. We assume a quasi-stationary case for the
path selection for the model. This means the analytical model
computes steady state probabilities under the assumption that
a certain set of paths is currently used. However, the set
can be changed by the selection mechanism when a used
path degrades or becomes unavailable during operation. The
adaption of the used set of path is of particular interest in
federated networks since here the resources are only available
for a certain lifetime and are variable in their performance.

Data stream divided into segments
with m parts

p1,1

each overlay will offer a set si of parallel paths
(i = 1…v)

overlay 1
p1,s1

Assumption: use m
parallel paths on v
overlays

1
2

src

dst

m paths

m parts have
arrived

m

1

m-1
m
pv,1

m parts are sent in
parallel at time t
With k

v

overlay v
Pv,sv

Re-sequencing buffer
of size N
Reassemble data stream from
obtained parts

s paths

i 1 i

Fig. 4: Striping Mechanism

Since we are interested in a simple model which facilitates
path selection we assume a connectionless transmission between the end points. So the model can focus on the analysis
of different path delay distributions without the influence of
interfering control mechanisms like, e.g., the TCP control loop,
on the data transmission.
A. Striping Mechanism
Figure 4 shows a detailed model of the striping mechanism.
The data stream is divided at the source (src) into segments
which are split into m smaller parts. The parts are transmitted
in parallel on m different overlay paths. The destination (dst)
reassembles these parts. Due to different stochastically varying
delays on the paths, the parts can arrive at the destination outof-order. In the model we assume that the re-ordering of parts
can happen only between different paths while the order on a
path is maintained.
Part or packet re-ordering may have a severe impact on
the application performance. In order to level this behavior,
the destination maintains a finite re-sequencing buffer. A high
buffer occupancy stands for a high number of parts waiting
for other parts and implies unnecessary delay. Moreover, if the
buffer overflows, part loss will occur which leads either to data
loss or complex retransmission. In case of retransmissions, the
delay is increased even further, possibly leading to more part
loss and a corruption of the complete data transport. Therefore,
an important objective is to minimize the re-sequencing buffer
occupancy.
B. Analytical Model for Re-sequencing Buffer Occupancy
In literature initial analytical and approximative methods
exist for estimating the re-sequencing buffer occupancy in
case of multipath downloads or transmissions. We adopt the
analytical model [3] to our system and perform an analytical
performance evaluation upon it. The enhanced model enables
an appropriate parameter choice in case of a multitude of
possibilities.
The considered model assumes a continuous data stream
for the multipath transmissions over m concurrent paths. The
delay on the paths is described by discrete delay distributions
∞

m

P (B = k, sn = i, δi = x). (1)

P (B = k) =
i=1 x=0

The right hand side of the equation denotes the buffer occupancy probability for each path transmitting the mvp and
each possible value for the time passed since the last packet
transmitted over this path was received. As discussed in [4],
this yields to :
P (B = k, sn = i, δi = x)
δj = (m − 1)x + 1 − i − k,
j=1,j=i

δj < x∀j < i, δj ≤ x∀j > i)
i−1

Pi (x)

=
Si,x,k

m

Pj (lj )
j=1

0.06

confidence intervals
of the simulation

Probability

0.04
0.03
0.02
0.01

uniform
gaussian

0
0

10
20
30
40
Pathdelay d (time units)

0.04

0.02
analysis

50

0
0
10
20
30
40
50
Re−sequencing buffer occupancy (packets)

(a) Used path delay distributions (b) Influence of the delay on the resequencing buffer occupancy
Fig. 5: Comparison of analysis and simulations

With this formula we can compute the re-sequencing buffer
occupancy in case of a transmission over m paths with equal
transmission rate.
V. T OWARDS PATH SELECTION F OR E ND P OINTS
Next, we discuss towards the design of path selection
strategies of end points, i.e. of end host and routers which
are capable to choose the set of paths used for the CMP
transmission. A major aim of such a selection strategy is to
minimize the negative effects of CMP transmission, i.e. the
re-ordering of parts due to over-taking among different paths.
This behavior results from different path delay distributions.
As outlined before the re-sequencing buffer occupancy
characterizes the negative effects and is chosen as the main
performance criteria for the presented CMP mechanism.
Two main scenarios are considered for the discussions of
the performance of the CMP mechanism: scenario a) has
two concurrent paths and scenario b) three concurrent paths.
Scenario a) is sufficient to show the impact of the type of
different packet delay distributions on the buffer occupancy.
However, the complexity of path selection can be addressed in
a "three concurrent paths" scenario. This scenario allows for
the discussion of more complex "what-if" settings required for
path selection.
Before discussing the detailed performance evaluation we
validate the correctness of the analytical model by comparison
with a separately implemented, event-based simulation of the
presented mechanism.
A. Validation of the Analytical Model

m

= P(

0.05

Probability

with a resolution of one time unit. We further consider
paths with equal capacity, and that the transmission rate on
each path is equal to one packet per time unit. The delay
for different paths are independent and may follow different
delay distributions. A detailed explanation of the mathematical
model can be found in [3], [4]. Here we only present the
central ideas and adopt them to the given mechanism. The
used model ensures that no packet re-ordering on a single
path can occur. That means that packets send over one path
can not overtake each other. To facilitate the explanation, the
following notations are used:
The packets transmitted at time 0 over path 1, 2, ..., m are
packets 1, 2, ..., m respectively. After transmitting the first m
packets, the packets are appointed to the sources in a roundrobin manner. Thus, at time t packets 1 + mt, 2 + mt, ..., m +
mt are transmitted. We further use the term minimum valued
packet (mvp), as introduced in [3], denoting the lowest indexed
packet at time t that has not arrived at the destination by time
t. For instance, if packets 1 through 5 arrived, but packet 6
did not, packet 6 is the mvp. Thus, the resequencing buffer
occupancy at time t is exactly the number of packets indexed
higher than the mvp that have arrived by time t and no packet
stored in the re-sequencing buffer was transmitted via the path
of the mvp, since packets transmitted on every path arrive in
transmission order. We denote the index of the path of the
mvp by sn and δX,t as the time passed since the last packet
received via path X was transmitted at time t. For brevity we
refer to δX,t as δX in the following. With this notation the
re-sequencing buffer occupancy can be computed as:

Pj (lj )
j=i+1

(2)
where Si,x,k defines the delay configuration on path before
the arrival of the mvp:
Si,x,k = {l1 , ..., li−1 , li+1 , ..., lm : l1 < x, ..., li−1 < x,
m

li+1 ≤ x, ..., lm ≤ x,

lj = (m − 1)x + 1 − i − k}.
j=1,j=i

The simulation model used for the validation was outlined
in [7]. The correct simulation of the packet delay on a single
path is not trivial when requiring that packets do not overtake
each other. Therefore, a special technique for deriving the
appropriate packet delay distribution, as proposed in Section
IV.D of [7], was applied.
We consider for the validation a CMP mechanism with
two concurrent paths and verify the analytical model in two
cases: a) the packet delay on both paths follow a Gaussian
distribution (with mean path delay μ = E[D = d] = 25 and
standard deviation σ = 10) and b) the packet delay on both
paths is uniform distributed (in the range of [0, . . . , 50]). The
delay distributions are shown in Figure 5a). Figure 5b) shows
the re-sequencing buffer occupancy probability P (B = k) for
the investigated scenarios computed by the analytical model
μ = 50
μ = 100
μ = 150

Probability P(B=k)

0.06
0.05
0.04

c = 1, ν ≈ 2
v

0.03
0.02

μ = 50
μ = 100
μ = 150

0.01
0
0

50
100
150
200
250
300
Re−sequencing buffer occupancy k (packets)

Fig. 6: Buffer occupancy probability P (B = k) for distributions with same
coefficient of variation and different skewness

and measured in the event-based simulation. The analytically
computed distributions are depicted by the solid lines and the
probability values obtained from simulations are given by a
statistical confidence intervals for a level of 99%.
Figure 5b) shows that there is a very close match of
the buffer probabilities obtained by simulation and by the
analytical model. Consequently, we consider the analytical
model as trustworthy and use it in the reminder of this study.
B. Impact of Type of Delay Distribution
Next, we focus our attention to the impact of the type of
delay distribution on the CMP performance. We investigate
a scenario with two paths for making the effects clearly
identifiable.
Probability distributions are typically described by type,
mean and coefficient of variation cv . The asymmetry of a
probability distribution is described by the skewness of the
distribution ν = μ3 /σ 3 , where μ3 is the third moment about
the mean and σ is the standard deviation. A negative skewness
denotes that most of the probability mass is located at values
higher than the mean value. In case of a positive skewness
the mass of the distribution is concentrated on vales smaller
than the mean. Thus, the right tail is longer indicating that
delay values higher than the mean are located in a greater
distance from it. For the investigations, we consider the delay
distributions for both paths to be of either negative-binomial
(nbin) type or of poisson type. The poisson distribution was
selected since it may reveal a symmetrical behavior and
inherits a strong relationship to a Normal distribution, which is
often used for the approximation of path delay in the Internet
[21]. The negative-binomial distribution was chosen because
of its asymmetry, i.e. a high skewness, while being able to
set the variance. We use for both distributions a coefficient of
variation of cv = 1 and mean values of μ = [50|100|150].
The Figure 6 depicts the buffer occupancy probability
P (B = k) for two concurrent paths. Of course, the mean
of the path delay has remarkable impact. However, although
the means and coefficient of variations are fixed to the same
values for both distributions, Figure 6 shows that the type of
distribution, presented also by different skewness values, leads
to very different buffer fillings. The buffer occupancy is much
lower and the performance better when poisson-like paths are
used. In consequence, distributions with a high asymmetry
should be avoided when selecting paths.

0.02

0.01

0
0

1

μ = 25, σ = 20,
ν = 1.55

Probability P(B ≤ k)

v

nbin
poisson

μ = 50, σ = 20,
ν = 0.75

100
200
Path delay d (time units)

300

0.8

case a)

0.6
0.4
0.2

case d)
case c)
case b)

0
0
50
100
150
200
250
Re−sequencing buffer occupancy k (packets)

(a) Used negative-binomial distri- (b) Impact of different path combibutions with equal standard devia- nations on the buffer occupancy for
tion and different mean values.
three paths
Fig. 7: Complexity of path selection

C. The Complexity of Path Selection
The complexity of path selection will be investigated by
a CMP setting applying three concurrent paths. The number
of three paths permits already the investigation of "what-if"
scenarios where two paths are already selected and a third
path will complement the other paths.
The used distributions for this setting are Negativ-binomial
distributions with mean μ = E[D] = [25|50], standard
deviation σ = 20 and skewness ν = [1.55|0.75]. It has to
be noted that the distribution with lower mean has a higher
skewness. The distributions are depicted in Figure 7a).
Naive Combination: First, we now consider four cases
of paths combinations: a) all three path delay distributions
have the same low mean delay μ = 25, b) all three delay
distributions have the same high mean μ = 50, c) two paths
have low mean delay μ = 25 and one a high mean μ = 50,
and d) one path has a low mean delay μ = 25 and two paths
have high mean of μ = 50. Figure 7b) shows the CDF of
the re-sequencing buffer occupancy for the four cases. The
figure reveals that case a) and b) have almost similar buffer
occupancy distributions. This indicates that the pure delay has
no impact on the buffer occupancy. The slight difference is the
result of the different skewness of the distributions, cf. [7].
For the cases c) and d) it is remarkable that case d) with two
high path delays performs better in terms of buffer occupancy
than case c). Intuitively more paths with lower delay should
result in a better performance, but this is obviously not true
as shown in case d).
Let us consider case c) in greater detail. Therefore, we
assume a single packet from the high delay path which is
much overdue. Until the arrival of this overdue packet, the
low delay paths can easily increase the occupancy of the resequencing buffer. Thus, the buffer is filled quickly by the
low delay paths. This example shows that the high delay
path becomes more dominant over low delays paths in terms
Mean re−sequencing buffer
occupancy E[B] (packets)

0.07

c = 1, ν ≈ 0.1

Probability P(D=d)

0.03

0.08

80 a) all path nbin; σ=20
60
40
b) all path nbin; σ=15
20 c) all path nbin or
normal; σ=10
0
30
40
50
60
70
Mean Delay of the third path (time units)

Fig. 8: Impact of the path characteristics of an arbitrary 3rd path on the mean
re-sequencing buffer occupancy
of buffer occupancy. The selection of the paths should level
the variation of the range of mean delays. Moreover, recent
measurement studies in Voice-over-IP systems confirm that a
constant high or low delay may have no significant impact on
the Quality of Experience of the application [22]. Thus it might
be better in CMP to choose a path with a higher mean delay
and lower delay variation in order to relieve the re-sequencing
buffer and avoid packet loss.
Influence of Mean Delay and Delay Variation: Now we
investigate the impact of the mean delay and of the delay
variation. In this setting we assume that two paths are already
selected. The selected paths are of negative-binomial type, one
with a low mean delay μ = 25 and one with a higher mean
delay of μ = 50. We consider three cases where these paths
have a standard deviation of σ = [10|15|20]. In case a), the
delay on the third path, which is completing the other two
paths, is distributed according to a Negativ-binomial distribution with σ = 20 and a mean in the range of [25, . . . , 75], in
case b)the delay distribution is also Negativ-binomial but with
σ = 15, and in case c) we use a Normal or a Negativ-binomial
distribution for all paths with low delay variance and σ = 10.
This case should compare the influence of the skewness, which
is much lower for the Gaussian distribution.
Figure 8 shows that the mean delay of the third path has
a significant impact on buffer occupancy. If the mean path
delay of the third path increases beyond the one with the
higher mean delay then the mean buffer occupancy increases
strongly. However, if the mean path delay of the third path
is between the other two means then even a minimum exists.
This effect is taking more shape when σ is low (case ba and
c). We also conclude that a high delay variance degrades the
CMP performance. Case c shows that the skewness has only
little impact on the mean re-sequencing buffer occupancy.
All-in-all, the above presented investigations show that a
path selection strategy should consider the second moment of
path delay. For a deeper analysis of the re-sequencing buffer
occupancy beyond a mean value analysis, the skewness might
have a significant impacts.
VI. C ONCLUSION
Our contribution is to present an analytical model for
concurrent multipath (CMP) transmissions for transport virtualization (TV). CMP transport has many appealing advantages
such as higher throughput and increased resilience. However,
its application increases also the complexity of the system.
In particular, the use of concurrent paths introduces inevitable
out-of-order packet delivery. This effect has to be leveled by
a re-sequencing buffer at the destination and careful selection
of paths. We discussed the impact of different path delay distributions on the re-sequencing buffer occupancy probability
distribution. Our model facilitates the understanding of path
selection algorithms for multiple-path TV. The obtained results
show that a path selection using the mean delay as sole criteria
is not sufficient. Further criteria like higher moments and even
the type of the delay distribution have to be considered. Since

the analytical model is rather simple it might be used as a first
step toward the on-line estimation of the quality of a certain
set of paths. Such an on-line estimation is of particular interest
in federated networks.
Further, future work should address the coordination of TV
and CMP mechanisms among different overlays. In addition,
the findings presented in this paper have to be validated by
real measurements. Another extension should be an analytical
approximation of the real end-to-end delay which is not yet
included in the presented model.
ACKNOWLEDGMENTS
The authors would like to thank Dirk Staehle and Tobias
Hoßfeld for the fruitful discussions and their support during
the course of this work. The sponsorship of this research by
the European FP7 Network of Excellence "Euro-NF" through
the Specific Joint Research Project "Multi-Next" is thankfully
acknowledged.
R EFERENCES
[1] Larry Peterson, Soner Sevinc, Jay Lepreau, Robert Ricci, John Wroclawski, Ted Gaber, and Stephen Schwab,
“Slice-Based Facility Architecture,” 2009, Information available at http://svn.planetlab.org/attachment/wiki/GeniWrapper/sfa.pdf.
[2] Thomas Zinner, Kurt Tutschku, Akihiro Nakao, and Phuoc Tran-Gia,
“Re-sequencing Buffer Occupancy of a Concurrent Multipath Transmission Mechanism for Transport System Virtualization,” in Proc. of
the 16. KiVS 2009, Kassel, Germany, Mar. 2009.
[3] Yoav Nebat and Moshe Sidi., “Resequencing Considerations in Parallel
Downloads,” in Proc. 21st Annual Joint Conference of the IEEE
Computer and Communications Societies (INFOCOM), 2002.
[4] Y. Nebat et al., “Parallel Downloads for Streaming Applications – a
Resequencing Analysis,” Performance Evaluation, vol. 63, no. 1, pp.
15–35, Jan. 2006.
[5] R. Penno, S. Raghunath, R. Woundy, V. Gurbani, and J. Touch,
“LEDBAT Practices and Recommendations draft-ietf-ledbat-practicesrecommendations-00.txt,” Mar. 2009.
[6] Michael Liljenstam, Jason Liu, and David Nichol, “Development of
an internet backbone topology for large-scale network simulation,” in
Proceedings of the 2003 Winter Simulation Conference, New Orleans,
December 2003.
[7] Thomas Zinner, Kurt Tutschku, Akihiro Nakao, and Phuoc Tran-Gia,
“Performance Evaluation of Packet Re-ordering on Concurrent Multipath Transmissions for Transport Virtualization,” to be published
in JCNDS Special Issue on: Network Virtualization - Concepts and
Performance Aspects, 2011.
[8] Suman Banerjee, Tomothy Griffin, and Marcelo Pias, “The Interdomain
Connectivity of PlanetLab Nodes,” in Proc. of the 5th Passive and Active
Measurement Workshop (PAM2004), Antibes Juan-les-Pins, France.,
Apr. 2004.
[9] John Russell Lane and Akihiro Nakao, “Best-Effort Network Layer
Packet Reordering in Support of Multipath Overlay Packet Dispersion,”
in Proc. of Globecom08, New Orleans, LA., Nov./Dec. 2008.
[10] L. Ong and J. Yoakum, “RFC 3286: An Introduction to the Stream
Control Transmission Protocol (SCTP),” May 2002.
[11] Janardhan R. Iyengar, Paul D. Amer, and Randall Stewart, “Concurrent
Multipath Transfer using SCTP Multihoming over Independent End-toEnd Paths,” IEEE/ACM Trans. Netw., vol. 14, no. 5, pp. 951–964, 2006.
[12] Hung-Yun Hsieh and Raghupathy Sivakumar, “pTCP: An End-to-End
Transport Layer Protocol for Striped Connections,” in Proceedings of
the 10th IEEE International Conference on Network Protocols, Paris, France, Nov. 2002.
[13] Huaizhong Han, Srinivas Shakkottai, Student Member, C. V. Hollot,
R. Srikant, and Don Towsley, “Multi-Path TCP: A Joint Congestion
Control and Routing Scheme to Exploit Path Diversity in the Internet,”
IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 1260–1271, Dec. 2006.
[14] Ivan Gojmerac, Peter Reichl, and LAsse Jansen, “Towards LowComplexity Internet Traffic Engineering: The Adaptive Multi-Path Algorithm,” Computer Networks, vol. 52, no. 15, pp. 2894–2907, Oct.
2008.
[15] Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford,
and Mung Chiang, “DaVinci: Dynamically Adaptive Virtual Networks
for a Customized Internet,” in Proc. 4th ACM International Conference
on emerging Networking EXperiments and Technologies (ACM CoNEXT
2008), Madrid, Spain, Dec. 2008.
[16] John Peterson, Vijay Gurbani, and Enrico Marocci, “Charter of the
Application-Layer Traffic Optimization (ALTO) Working Group,” Mar.
2009.
[17] Stanislav Shalunov and Murari Sridhavan, “Charter of the Low Extra
Delay Background Transport (LEDBAT) Working Group,” Mar. 2009.
[18] James Polk and Gorry Fairhurst, “Charter of the Transport Area Working

Group (TSVWG),” Mar. 2009.
[19] Krishna P. Gummadi and Harsh V. Madhyastha, “Improving the
reliability of internet paths with one-hop source routing,” in Proc.
OSDI’04, San Francisco, Ca., USA, Dec. 2004.
[20] Christian Scheideler Vinay Aggarwal, Anja Feldmann, “Can ISPs and
P2P Systems Co-operate for Improved Performance?,” ACM SIGCOMM
CCR, vol. 37, no. 3, Jul. 2007.
[21] Tamas Elteto and Sandor Molnar, “On the Distribution of Round-trip
Delays in TCP/IP Networks,” in Proceedings 26th Conference on Local
Computer Networks (LCN’99), Lowell, Oct. 1999.
[22] Tobias Hoßfeld, David Hock, Phuoc Tran-Gia, Kurt Tutschku, and
Markus Fiedler, “Testing the IQX Hypothesis for Exponential Interdependency between QoS and QoE of Voice Codecs iLBC and G.711,”
in 18th ITC Specialist Seminar on Quality of Experience, Karlskrona,
Sweden, May 2008.

More Related Content

What's hot

Al35218220
Al35218220Al35218220
Al35218220
IJERA Editor
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
TELKOMNIKA JOURNAL
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
cscpconf
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
ijmnct
 
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
ijwmn
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networks
Abir Hossain
 
Transferring quantum information through the
Transferring quantum information through theTransferring quantum information through the
Transferring quantum information through the
ijngnjournal
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
ijasuc
 
A way of managing data center networks
A way of managing data center networksA way of managing data center networks
A way of managing data center networks
IOSR Journals
 
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
ijwmn
 
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYMESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
ijwmn
 
O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routing
ijwmn
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review ppt
AAKASH S
 
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferImproved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Eswar Publications
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
IJCNCJournal
 
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
IJCNCJournal
 

What's hot (18)

Al35218220
Al35218220Al35218220
Al35218220
 
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...Performance analysis of multilayer multicast MANET CRN based on steiner minim...
Performance analysis of multilayer multicast MANET CRN based on steiner minim...
 
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
A CRITICAL REVIEW OF THE ROUTING PROTOCOLS FOR COGNITIVE RADIO NETWORKS AND A...
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
 
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...
 
A survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networksA survey on mac strategies for cognitive radio networks
A survey on mac strategies for cognitive radio networks
 
Transferring quantum information through the
Transferring quantum information through theTransferring quantum information through the
Transferring quantum information through the
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
 
A way of managing data center networks
A way of managing data center networksA way of managing data center networks
A way of managing data center networks
 
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...
 
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYMESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGY
 
Fy3111571162
Fy3111571162Fy3111571162
Fy3111571162
 
O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routing
 
40520130101003
4052013010100340520130101003
40520130101003
 
Qo s oriented distributed routing protocols : anna university 2nd review ppt
Qo s   oriented  distributed routing  protocols : anna university 2nd review pptQo s   oriented  distributed routing  protocols : anna university 2nd review ppt
Qo s oriented distributed routing protocols : anna university 2nd review ppt
 
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferImproved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
A NOVEL HYBRID OPPORTUNISTIC SCALABLE ENERGY EFFICIENT ROUTING DESIGN FOR LOW...
 

Viewers also liked

Build Your 2008R2 2-Node Cluster
Build Your 2008R2 2-Node ClusterBuild Your 2008R2 2-Node Cluster
Build Your 2008R2 2-Node Cluster
Vision Concepts Infrastructure Services Solution
 
GuideIT High Level Consulting Framework
GuideIT High Level Consulting FrameworkGuideIT High Level Consulting Framework
GuideIT High Level Consulting Framework
Vision Concepts Infrastructure Services Solution
 
Security Testing Using Infrastructure-As-Code
Security Testing Using Infrastructure-As-CodeSecurity Testing Using Infrastructure-As-Code
Security Testing Using Infrastructure-As-Code
Vision Concepts Infrastructure Services Solution
 
GuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria GuideGuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria Guide
Vision Concepts Infrastructure Services Solution
 
GuideIT - Virtual Economies of Scale
GuideIT - Virtual Economies of Scale GuideIT - Virtual Economies of Scale
GuideIT - Virtual Economies of Scale
Vision Concepts Infrastructure Services Solution
 
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
Vision Concepts Infrastructure Services Solution
 
NetApp To Offer Integrated Storage Array And Virtualization Software
NetApp To Offer Integrated Storage Array And Virtualization SoftwareNetApp To Offer Integrated Storage Array And Virtualization Software
NetApp To Offer Integrated Storage Array And Virtualization Software
Vision Concepts Infrastructure Services Solution
 

Viewers also liked (7)

Build Your 2008R2 2-Node Cluster
Build Your 2008R2 2-Node ClusterBuild Your 2008R2 2-Node Cluster
Build Your 2008R2 2-Node Cluster
 
GuideIT High Level Consulting Framework
GuideIT High Level Consulting FrameworkGuideIT High Level Consulting Framework
GuideIT High Level Consulting Framework
 
Security Testing Using Infrastructure-As-Code
Security Testing Using Infrastructure-As-CodeSecurity Testing Using Infrastructure-As-Code
Security Testing Using Infrastructure-As-Code
 
GuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria GuideGuideIT Customer Success Criteria Guide
GuideIT Customer Success Criteria Guide
 
GuideIT - Virtual Economies of Scale
GuideIT - Virtual Economies of Scale GuideIT - Virtual Economies of Scale
GuideIT - Virtual Economies of Scale
 
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
Citrix and Samsung Deliver Android Enterprise Security on Latest Samsung Gala...
 
NetApp To Offer Integrated Storage Array And Virtualization Software
NetApp To Offer Integrated Storage Array And Virtualization SoftwareNetApp To Offer Integrated Storage Array And Virtualization Software
NetApp To Offer Integrated Storage Array And Virtualization Software
 

Similar to Using Concurrent Multipath Transmission for Transport Virtualization

Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...
redpel dot com
 
Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...
ijmnct
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
ijasuc
 
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
1crore projects
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
IJCSIS Research Publications
 
Multi hop distributed coordination in
Multi hop distributed coordination inMulti hop distributed coordination in
Multi hop distributed coordination in
IJCNCJournal
 
Mobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applicationsMobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applications
ijwmn
 
Elsevier paper
Elsevier paperElsevier paper
A New Multi-Path Routing Methodology Based On Logit-Type Probability Assignment
A New Multi-Path Routing Methodology Based On Logit-Type Probability AssignmentA New Multi-Path Routing Methodology Based On Logit-Type Probability Assignment
A New Multi-Path Routing Methodology Based On Logit-Type Probability Assignment
Carrie Tran
 
A Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc NetworkA Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc Network
International Journal of Engineering Inventions www.ijeijournal.com
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
IJCNCJournal
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
IJCNCJournal
 
A017210110
A017210110A017210110
A017210110
IOSR Journals
 
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
IOSR Journals
 
Cm chou 20050124
Cm chou 20050124Cm chou 20050124
Cm chou 20050124hinalala
 
On minimizing data forwarding schedule in multi transmit receive wireless mes...
On minimizing data forwarding schedule in multi transmit receive wireless mes...On minimizing data forwarding schedule in multi transmit receive wireless mes...
On minimizing data forwarding schedule in multi transmit receive wireless mes...
redpel dot com
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ijcsit
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
AIRCC Publishing Corporation
 
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONRASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
AIRCC Publishing Corporation
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
AIRCC Publishing Corporation
 

Similar to Using Concurrent Multipath Transmission for Transport Virtualization (20)

Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...
 
Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...Performance improvement of vehicular delay tolerant networks using public tra...
Performance improvement of vehicular delay tolerant networks using public tra...
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
 
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
Multi hop distributed coordination in
Multi hop distributed coordination inMulti hop distributed coordination in
Multi hop distributed coordination in
 
Mobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applicationsMobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applications
 
Elsevier paper
Elsevier paperElsevier paper
Elsevier paper
 
A New Multi-Path Routing Methodology Based On Logit-Type Probability Assignment
A New Multi-Path Routing Methodology Based On Logit-Type Probability AssignmentA New Multi-Path Routing Methodology Based On Logit-Type Probability Assignment
A New Multi-Path Routing Methodology Based On Logit-Type Probability Assignment
 
A Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc NetworkA Systematic Review of Congestion Control in Ad Hoc Network
A Systematic Review of Congestion Control in Ad Hoc Network
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
A017210110
A017210110A017210110
A017210110
 
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
Multihop Multi-Channel Distributed QOS Scheduling MAC Scheme for Wireless Sen...
 
Cm chou 20050124
Cm chou 20050124Cm chou 20050124
Cm chou 20050124
 
On minimizing data forwarding schedule in multi transmit receive wireless mes...
On minimizing data forwarding schedule in multi transmit receive wireless mes...On minimizing data forwarding schedule in multi transmit receive wireless mes...
On minimizing data forwarding schedule in multi transmit receive wireless mes...
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONRASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 

More from Vision Concepts Infrastructure Services Solution

Palo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
Palo Alto Networks VM-Series firewall now available on NetScaler SDX PlatformPalo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
Palo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
Vision Concepts Infrastructure Services Solution
 
Citrix Application Lifecycle Management
Citrix Application Lifecycle ManagementCitrix Application Lifecycle Management
Citrix Application Lifecycle Management
Vision Concepts Infrastructure Services Solution
 
Could Google end sweatshop labor?
Could Google end sweatshop labor?Could Google end sweatshop labor?
Could Google end sweatshop labor?
Vision Concepts Infrastructure Services Solution
 
How to Change the IT Architect Hiring Practice
How to Change the IT Architect Hiring PracticeHow to Change the IT Architect Hiring Practice
How to Change the IT Architect Hiring Practice
Vision Concepts Infrastructure Services Solution
 
Big Data - Security Concerns
Big Data - Security ConcernsBig Data - Security Concerns
Apple adding hundreds of new engineers and operations staff in China to speed...
Apple adding hundreds of new engineers and operations staff in China to speed...Apple adding hundreds of new engineers and operations staff in China to speed...
Apple adding hundreds of new engineers and operations staff in China to speed...
Vision Concepts Infrastructure Services Solution
 
Data Analytics and the Ubiquitous Internet of Things
Data Analytics and the Ubiquitous Internet of ThingsData Analytics and the Ubiquitous Internet of Things
Data Analytics and the Ubiquitous Internet of Things
Vision Concepts Infrastructure Services Solution
 
Citrix UniPrint NetGain Case Study
Citrix UniPrint NetGain Case StudyCitrix UniPrint NetGain Case Study
Citrix UniPrint NetGain Case Study
Vision Concepts Infrastructure Services Solution
 
Uniprint Infinity Citrix Printing Solution
Uniprint Infinity Citrix Printing SolutionUniprint Infinity Citrix Printing Solution
Uniprint Infinity Citrix Printing Solution
Vision Concepts Infrastructure Services Solution
 
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
Vision Concepts Infrastructure Services Solution
 
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
Vision Concepts Infrastructure Services Solution
 
VDI - Zero Client Printing Solution
VDI - Zero Client Printing SolutionVDI - Zero Client Printing Solution
VDI - Zero Client Printing Solution
Vision Concepts Infrastructure Services Solution
 
GuideIT Storage Requirements Template
GuideIT Storage Requirements TemplateGuideIT Storage Requirements Template
GuideIT Storage Requirements Template
Vision Concepts Infrastructure Services Solution
 
GuideIT Delivery Design - Netscaler
GuideIT Delivery Design - NetscalerGuideIT Delivery Design - Netscaler
GuideIT Delivery Design - Netscaler
Vision Concepts Infrastructure Services Solution
 
GuideIT Delivery Design - File Shares
GuideIT Delivery Design - File SharesGuideIT Delivery Design - File Shares
GuideIT Delivery Design - File Shares
Vision Concepts Infrastructure Services Solution
 
Guide IT Delivery Design - Security
Guide IT Delivery Design - SecurityGuide IT Delivery Design - Security
Guide IT Delivery Design - Security
Vision Concepts Infrastructure Services Solution
 

More from Vision Concepts Infrastructure Services Solution (20)

Palo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
Palo Alto Networks VM-Series firewall now available on NetScaler SDX PlatformPalo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
Palo Alto Networks VM-Series firewall now available on NetScaler SDX Platform
 
Citrix Application Lifecycle Management
Citrix Application Lifecycle ManagementCitrix Application Lifecycle Management
Citrix Application Lifecycle Management
 
Using Windows Azure as a SharePoint Disaster Recovery Environment
Using Windows Azure as a SharePoint Disaster Recovery EnvironmentUsing Windows Azure as a SharePoint Disaster Recovery Environment
Using Windows Azure as a SharePoint Disaster Recovery Environment
 
Delivery-on-Demand Company Raises $16 Million, Questions About Safety and Out...
Delivery-on-Demand Company Raises $16 Million, Questions About Safety and Out...Delivery-on-Demand Company Raises $16 Million, Questions About Safety and Out...
Delivery-on-Demand Company Raises $16 Million, Questions About Safety and Out...
 
Could Google end sweatshop labor?
Could Google end sweatshop labor?Could Google end sweatshop labor?
Could Google end sweatshop labor?
 
How to Change the IT Architect Hiring Practice
How to Change the IT Architect Hiring PracticeHow to Change the IT Architect Hiring Practice
How to Change the IT Architect Hiring Practice
 
Big Data - Security Concerns
Big Data - Security ConcernsBig Data - Security Concerns
Big Data - Security Concerns
 
Apple adding hundreds of new engineers and operations staff in China to speed...
Apple adding hundreds of new engineers and operations staff in China to speed...Apple adding hundreds of new engineers and operations staff in China to speed...
Apple adding hundreds of new engineers and operations staff in China to speed...
 
Data Analytics and the Ubiquitous Internet of Things
Data Analytics and the Ubiquitous Internet of ThingsData Analytics and the Ubiquitous Internet of Things
Data Analytics and the Ubiquitous Internet of Things
 
Citrix UniPrint NetGain Case Study
Citrix UniPrint NetGain Case StudyCitrix UniPrint NetGain Case Study
Citrix UniPrint NetGain Case Study
 
Uniprint Infinity Citrix Printing Solution
Uniprint Infinity Citrix Printing SolutionUniprint Infinity Citrix Printing Solution
Uniprint Infinity Citrix Printing Solution
 
The CIO Pocket MBA
The CIO Pocket MBAThe CIO Pocket MBA
The CIO Pocket MBA
 
Citrix Top 10 Trends
Citrix Top 10 Trends Citrix Top 10 Trends
Citrix Top 10 Trends
 
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
Learn KVM and Receive Exclusive Invitation to Linux Foundation Collaboration ...
 
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
How to Change the IT Architect Hiring Practice so Companies and End-Users Win...
 
VDI - Zero Client Printing Solution
VDI - Zero Client Printing SolutionVDI - Zero Client Printing Solution
VDI - Zero Client Printing Solution
 
GuideIT Storage Requirements Template
GuideIT Storage Requirements TemplateGuideIT Storage Requirements Template
GuideIT Storage Requirements Template
 
GuideIT Delivery Design - Netscaler
GuideIT Delivery Design - NetscalerGuideIT Delivery Design - Netscaler
GuideIT Delivery Design - Netscaler
 
GuideIT Delivery Design - File Shares
GuideIT Delivery Design - File SharesGuideIT Delivery Design - File Shares
GuideIT Delivery Design - File Shares
 
Guide IT Delivery Design - Security
Guide IT Delivery Design - SecurityGuide IT Delivery Design - Security
Guide IT Delivery Design - Security
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

Using Concurrent Multipath Transmission for Transport Virtualization

  • 1. Using Concurrent Multipath Transmission for Transport Virtualization: Analyzing Path Selection Thomas Zinner∗ , Kurt Tutschku† , Akihiro Nakao‡ , Phuoc Tran-Gia∗ ∗ University of Wuerzburg, Institute of Computer Science, Wuerzburg, Germany eMail: [zinner|trangia]@informatik.uni-wuerzburg.de † University of Vienna, Professur "Future Communication", Universitätsstrasse 10/T11, 1090 Wien, Austria. eMail: kurt.tutschku@univie.ac.at ‡ University of Tokyo, Graduate School of Interdisciplinary Information Studies, 7-3-1, Hongo, Bunkyo-ku, Tokyo, 113-0033, Japan. eMail: nakao@iii.u-tokyo.ac.jp Abstract—The concept of Transport Virtualization (TV) enhances the capabilities of future networks. TV enables transport mechanisms with arbitrary resource usage independent of the underlying transport system. The simplest form of TV can be achieved by collecting multiple transport resources (even from different virtual networks or providers) and selecting the best resources for exclusive or concurrent use. However, the selection and application of concurrent paths is complex and its impact on the transmission is non-intuitive. Path length diversity of different concurrent paths inevitably introduces out-of-order packet delivery. We present and discuss a mathematical model for the analysis of the fundamental behavior and influence factors for packet re-ordering in concurrent multipath transmissions. Our model facilitates the understanding of path selection algorithms for multipath transport virtualization. I. I NTRODUCTION Nowadays, data transport is achieved mainly by the Internet Protocol (IP). Its routing feature achieves a scalable connection of local subnets and end systems. IP assumes that the interconnecting nodes (i.e. the routers) and the actual transport resources (i.e. the links) are stable and change only in case of failures. The Future Internet will consist of interconnected subnets and interconnecting nodes too. However, the availability of these resources is expected to be provided for a certain lifetime and their capabilities are highly variable, cf. [1]. Networks that are based on the model of temporal leasing of variable resources are referred to as federated networks, and technologies that enable the safe sharing of such network resources are denoted as Network Virtualization (NV) mechanisms. A major task when creating federated networks for data transport is the selection of resources. The selection has to consider the temporal availability of the resources. Therefore, a measurement-based scheme for selecting these resources is needed. This mechanism should adapt the federated transport network to the variable demand for resources as well as to the currently available resources. Of course, the selection scheme has to scale sufficiently so that it can be applied in large networks. The concept of Transport Virtualization (TV) enhances the capabilities of future networks. TV can be considered as an alternative mode of Network Virtualization [2]. While NV typically facilitates the sharing of resources, TV creates virtual resources (e.g. virtual links) based on the aggregation of resources [2]. The simplest form of TV is achieved by collecting multiple transport resources (even from different virtual networks or providers) and selecting the best resources for exclusive or concurrent use. The type of the resources used for aggregation does not matter; they can be either of physical or of virtual nature. The use of concurrent multipath (CMP) transmissions will bring exceptional advantages to networks, such as higher throughput and increased resilience. However, CMP will introduce additional complexity which has to be understood. First, CMP transmission will inevitably introduce out-of-order packets due to different stochastic packet delay characteristics on the paths. The re-ordering can be compensated by buffering at the destination, possibly leading to increased end-to-end delay but still being transparent to the transport protocol. Second, the different stochastic delay processes on the paths can amplify each other in their negative effects on out-oforder packets. Third, the strength and occurrences of such combination effects are highly non-intuitive. We study these effects by an analytical model, which is able to calculate the re-sequencing buffer occupancy probability distribution. This model will be verified by eventbased simulations. Originally, the model was introduced for the investigation of a many-to-one transmission scenario of parallel downloads for streaming applications, [3], [4]. In the context of TV, the model is used for a one-to-one transmission over multiple paths. By using the analytical model, "what-if" scenarios and path selection strategies can be easily evaluated. The paper is structured as follows. First, Section II outlines the idea of TV. Section III discusses work related to the suggested TV. In Section IV we present the analytical model for the analysis of the re-sequencing buffer occupancy probability. Section V provides comprehensive discussions towards a path selection strategy based on the investigation of the re-sequencing buffer occupancy probability distribution. Section VI concludes with a brief summary.
  • 2. Routing Overlay used path Fig. 1: Selection of one path out of several possible paths II. T RANSPORT V IRTUALIZATION The idea of Transport Virtualization constitutes an abstraction concept for data transport resources. In TV, an abstract data transport resource is combined from one or more physical or overlay data transport resources. Such a resource can be, e.g., a leased line, a wave length path, an overlay link, or an IP forwarding capability to a certain destination. The resources can be used preclusive or concurrently. A. Path Selection and Resource Pooling First let us consider ordinary path selection. In this case, a single path out of a set of candidate paths is selected. This is case is depicted in Figure 1. The path characteristic has a direct impact on reliability, security or on QoS parameters between the start point and the end point of the transmission. Therefore, a selection function has to exist which enables the appropriate choice of the used path. For instance, the different resources (i.e. paths) could be classified by the path delay. Moreover, the concurrent usage of different paths might have appealing advantages. The reliability of the end-toend connection is increased and even the overall throughput might be higher if concurrent paths are used for the data transmission. This is illustrated in Figure 2. In this example two paths are pooled and appear as one virtual link. However, there has to be a mechanism distributing the data among the used paths and which is selecting the appropriate set of concurrent paths. This feature will be discussed in Section IV. The set of used paths can consist of paths offered by different Internet or overlay providers. So the data transport is not bounded to one of these providers any more. It is even possible to choose the cheapest or fastest resources and pool them together to a high capacity pipe. The pooling of resources out of different networks is shown in Figure 3. TV achieves the pooling by a mechanism that is placed on nodes that have access to multiple paths or networks, e.g. end hosts which are multi-homed or routers running exterior gateway protocols. At the origin of the transmission, the mechanism decides which resources, i.e. which paths, are Routing Overlay O l pooled resources Fig. 2: Selection of a couple of paths out of several possible paths Fig. 3: Selection of a couple of paths out of several possible paths from different overlays selected, whether they are used preclusive or concurrently, and how the data is distributed among these paths. If necessary, the split data is recombined at the destination to a consistent flow. Due to the ability to choose between different transmission options, TV achieves an independence from a specific physical transport resource. Even if one of the used resources fails, TV using CMP may be able to continue partly the transmission service. Other advantages of CMP transmissions are higher capacity due to parallelism, avoiding head-of-the-line blocking, spatial separation of control and data connections, differentiations between traffic types, and leveraging multiple processors in routers [5]. On the downside, CMP transmissions require additional overhead and memory for leveraging packet reordering. B. Availability of Concurrent Paths A major concern for the applicability of TV is the availability of different transport resources. Recent investigations of tier 1 topologies [6] reveal that multiple paths between many destinations readily exist [7]. Moreover, measurements in PlanetLab [8] revealed that up to 25% of certain Internet routes may violate the triangle inequality. That means a shorter delay can be experienced when another path through an intermediate node is used. C. Selection of Pooled Resources An important question for TV is the selection of pooled resources, i.e. the choice of a potential set of paths. Typically, a good path in the set has a short transmission delay [9]. Thus, the mean packet delay on a path is an initial candidate as selection criteria. However, the interaction between concurrent paths is expected to be complex. Though, the selection has to be based on a more detail path description. This will be evaluated in Section V. For that we will use the packet delay distribution on a path as a main characterization for the path behavior. III. R ELATED W ORK Multipath transmission mechanisms have been suggested for IP networks a while. The Stream Control Transmission
  • 3. Protocol (SCTP) [10] enables multi-homing but doesn’t facilitate CMP transfer and its advantages. As seen in [11] typical problems with packet reordering occur. While [11] proposed to enhance SCTP such that it can react to packet reordering this paper presents a mechanism to suppress reordering as far as possible. As a result transport protocols like SCTP or TCP do not have to be modified. The pTCP [12] and the Multi-Path TCP [13] proposals exploit concurrent transmissions, however, they focus on flow control and the coordination among flows. Our work complements these studies since we are aiming at the selection of paths. Path selection is often investigated on network layer in context of multipath routing, e.g. [14]. We amend these works by considering the transmission mechanism on transport layer. A major work, which addresses the network and transport layer concurrently, is the DaVinci architecture [15]. In DaVinci, the paths are selected such that the creation of bottlenecks is avoided. The investigation in our paper goes beyond the results presented in the DaVinci architecture. The DaVinci proposal considers mainly the mean path delay. However, we will see in Section V that this assumption might be not sufficient. Our paper discusses the fundamental performance issues in selecting paths according to their detailed statistical characteristics. Finally, three efforts of IETF working groups (WGs) should be mentioned. The Application-Layer Traffic Optimization (ALTO) WG [16] aims at providing P2P CDNs with information to perform better-than-random initial peer selection. This selection protocol might be extended to path selection. The Low Extra Delay Background Transport (LEDBAT) WG [17] investigates multi-path TCP connections in order to better saturate bottlenecks. At last, Transport Area WG discusses currently the combination of BGP and Multi-path TCP [18]. IV. M ECHANISMS AND P ERFORMANCE M ODELS TV can be facilitated using one-hop source routing overlays [19]. Such an overlay is implemented by the SORA architecture [9] where a striping mechanism is used. Besides the striping of the data to different paths, the TV mechanism is selecting the pool of concurrent paths. The candidate paths for pooling might be provided either by a path oracle (e.g., [20] for operator supported oracles) or by the start point of the multi-path connection, if this start point measures the paths by itself. Next, we will outline the performance model for the suggested striping mechanism. We will start with the mechanism and then detail the analytical model of the re-sequencing buffer occupancy. We assume a quasi-stationary case for the path selection for the model. This means the analytical model computes steady state probabilities under the assumption that a certain set of paths is currently used. However, the set can be changed by the selection mechanism when a used path degrades or becomes unavailable during operation. The adaption of the used set of path is of particular interest in federated networks since here the resources are only available for a certain lifetime and are variable in their performance. Data stream divided into segments with m parts p1,1 each overlay will offer a set si of parallel paths (i = 1…v) overlay 1 p1,s1 Assumption: use m parallel paths on v overlays 1 2 src dst m paths m parts have arrived m 1 m-1 m pv,1 m parts are sent in parallel at time t With k v overlay v Pv,sv Re-sequencing buffer of size N Reassemble data stream from obtained parts s paths i 1 i Fig. 4: Striping Mechanism Since we are interested in a simple model which facilitates path selection we assume a connectionless transmission between the end points. So the model can focus on the analysis of different path delay distributions without the influence of interfering control mechanisms like, e.g., the TCP control loop, on the data transmission. A. Striping Mechanism Figure 4 shows a detailed model of the striping mechanism. The data stream is divided at the source (src) into segments which are split into m smaller parts. The parts are transmitted in parallel on m different overlay paths. The destination (dst) reassembles these parts. Due to different stochastically varying delays on the paths, the parts can arrive at the destination outof-order. In the model we assume that the re-ordering of parts can happen only between different paths while the order on a path is maintained. Part or packet re-ordering may have a severe impact on the application performance. In order to level this behavior, the destination maintains a finite re-sequencing buffer. A high buffer occupancy stands for a high number of parts waiting for other parts and implies unnecessary delay. Moreover, if the buffer overflows, part loss will occur which leads either to data loss or complex retransmission. In case of retransmissions, the delay is increased even further, possibly leading to more part loss and a corruption of the complete data transport. Therefore, an important objective is to minimize the re-sequencing buffer occupancy. B. Analytical Model for Re-sequencing Buffer Occupancy In literature initial analytical and approximative methods exist for estimating the re-sequencing buffer occupancy in case of multipath downloads or transmissions. We adopt the analytical model [3] to our system and perform an analytical performance evaluation upon it. The enhanced model enables an appropriate parameter choice in case of a multitude of possibilities. The considered model assumes a continuous data stream for the multipath transmissions over m concurrent paths. The delay on the paths is described by discrete delay distributions
  • 4. ∞ m P (B = k, sn = i, δi = x). (1) P (B = k) = i=1 x=0 The right hand side of the equation denotes the buffer occupancy probability for each path transmitting the mvp and each possible value for the time passed since the last packet transmitted over this path was received. As discussed in [4], this yields to : P (B = k, sn = i, δi = x) δj = (m − 1)x + 1 − i − k, j=1,j=i δj < x∀j < i, δj ≤ x∀j > i) i−1 Pi (x) = Si,x,k m Pj (lj ) j=1 0.06 confidence intervals of the simulation Probability 0.04 0.03 0.02 0.01 uniform gaussian 0 0 10 20 30 40 Pathdelay d (time units) 0.04 0.02 analysis 50 0 0 10 20 30 40 50 Re−sequencing buffer occupancy (packets) (a) Used path delay distributions (b) Influence of the delay on the resequencing buffer occupancy Fig. 5: Comparison of analysis and simulations With this formula we can compute the re-sequencing buffer occupancy in case of a transmission over m paths with equal transmission rate. V. T OWARDS PATH SELECTION F OR E ND P OINTS Next, we discuss towards the design of path selection strategies of end points, i.e. of end host and routers which are capable to choose the set of paths used for the CMP transmission. A major aim of such a selection strategy is to minimize the negative effects of CMP transmission, i.e. the re-ordering of parts due to over-taking among different paths. This behavior results from different path delay distributions. As outlined before the re-sequencing buffer occupancy characterizes the negative effects and is chosen as the main performance criteria for the presented CMP mechanism. Two main scenarios are considered for the discussions of the performance of the CMP mechanism: scenario a) has two concurrent paths and scenario b) three concurrent paths. Scenario a) is sufficient to show the impact of the type of different packet delay distributions on the buffer occupancy. However, the complexity of path selection can be addressed in a "three concurrent paths" scenario. This scenario allows for the discussion of more complex "what-if" settings required for path selection. Before discussing the detailed performance evaluation we validate the correctness of the analytical model by comparison with a separately implemented, event-based simulation of the presented mechanism. A. Validation of the Analytical Model m = P( 0.05 Probability with a resolution of one time unit. We further consider paths with equal capacity, and that the transmission rate on each path is equal to one packet per time unit. The delay for different paths are independent and may follow different delay distributions. A detailed explanation of the mathematical model can be found in [3], [4]. Here we only present the central ideas and adopt them to the given mechanism. The used model ensures that no packet re-ordering on a single path can occur. That means that packets send over one path can not overtake each other. To facilitate the explanation, the following notations are used: The packets transmitted at time 0 over path 1, 2, ..., m are packets 1, 2, ..., m respectively. After transmitting the first m packets, the packets are appointed to the sources in a roundrobin manner. Thus, at time t packets 1 + mt, 2 + mt, ..., m + mt are transmitted. We further use the term minimum valued packet (mvp), as introduced in [3], denoting the lowest indexed packet at time t that has not arrived at the destination by time t. For instance, if packets 1 through 5 arrived, but packet 6 did not, packet 6 is the mvp. Thus, the resequencing buffer occupancy at time t is exactly the number of packets indexed higher than the mvp that have arrived by time t and no packet stored in the re-sequencing buffer was transmitted via the path of the mvp, since packets transmitted on every path arrive in transmission order. We denote the index of the path of the mvp by sn and δX,t as the time passed since the last packet received via path X was transmitted at time t. For brevity we refer to δX,t as δX in the following. With this notation the re-sequencing buffer occupancy can be computed as: Pj (lj ) j=i+1 (2) where Si,x,k defines the delay configuration on path before the arrival of the mvp: Si,x,k = {l1 , ..., li−1 , li+1 , ..., lm : l1 < x, ..., li−1 < x, m li+1 ≤ x, ..., lm ≤ x, lj = (m − 1)x + 1 − i − k}. j=1,j=i The simulation model used for the validation was outlined in [7]. The correct simulation of the packet delay on a single path is not trivial when requiring that packets do not overtake each other. Therefore, a special technique for deriving the appropriate packet delay distribution, as proposed in Section IV.D of [7], was applied. We consider for the validation a CMP mechanism with two concurrent paths and verify the analytical model in two cases: a) the packet delay on both paths follow a Gaussian distribution (with mean path delay μ = E[D = d] = 25 and standard deviation σ = 10) and b) the packet delay on both paths is uniform distributed (in the range of [0, . . . , 50]). The delay distributions are shown in Figure 5a). Figure 5b) shows the re-sequencing buffer occupancy probability P (B = k) for the investigated scenarios computed by the analytical model
  • 5. μ = 50 μ = 100 μ = 150 Probability P(B=k) 0.06 0.05 0.04 c = 1, ν ≈ 2 v 0.03 0.02 μ = 50 μ = 100 μ = 150 0.01 0 0 50 100 150 200 250 300 Re−sequencing buffer occupancy k (packets) Fig. 6: Buffer occupancy probability P (B = k) for distributions with same coefficient of variation and different skewness and measured in the event-based simulation. The analytically computed distributions are depicted by the solid lines and the probability values obtained from simulations are given by a statistical confidence intervals for a level of 99%. Figure 5b) shows that there is a very close match of the buffer probabilities obtained by simulation and by the analytical model. Consequently, we consider the analytical model as trustworthy and use it in the reminder of this study. B. Impact of Type of Delay Distribution Next, we focus our attention to the impact of the type of delay distribution on the CMP performance. We investigate a scenario with two paths for making the effects clearly identifiable. Probability distributions are typically described by type, mean and coefficient of variation cv . The asymmetry of a probability distribution is described by the skewness of the distribution ν = μ3 /σ 3 , where μ3 is the third moment about the mean and σ is the standard deviation. A negative skewness denotes that most of the probability mass is located at values higher than the mean value. In case of a positive skewness the mass of the distribution is concentrated on vales smaller than the mean. Thus, the right tail is longer indicating that delay values higher than the mean are located in a greater distance from it. For the investigations, we consider the delay distributions for both paths to be of either negative-binomial (nbin) type or of poisson type. The poisson distribution was selected since it may reveal a symmetrical behavior and inherits a strong relationship to a Normal distribution, which is often used for the approximation of path delay in the Internet [21]. The negative-binomial distribution was chosen because of its asymmetry, i.e. a high skewness, while being able to set the variance. We use for both distributions a coefficient of variation of cv = 1 and mean values of μ = [50|100|150]. The Figure 6 depicts the buffer occupancy probability P (B = k) for two concurrent paths. Of course, the mean of the path delay has remarkable impact. However, although the means and coefficient of variations are fixed to the same values for both distributions, Figure 6 shows that the type of distribution, presented also by different skewness values, leads to very different buffer fillings. The buffer occupancy is much lower and the performance better when poisson-like paths are used. In consequence, distributions with a high asymmetry should be avoided when selecting paths. 0.02 0.01 0 0 1 μ = 25, σ = 20, ν = 1.55 Probability P(B ≤ k) v nbin poisson μ = 50, σ = 20, ν = 0.75 100 200 Path delay d (time units) 300 0.8 case a) 0.6 0.4 0.2 case d) case c) case b) 0 0 50 100 150 200 250 Re−sequencing buffer occupancy k (packets) (a) Used negative-binomial distri- (b) Impact of different path combibutions with equal standard devia- nations on the buffer occupancy for tion and different mean values. three paths Fig. 7: Complexity of path selection C. The Complexity of Path Selection The complexity of path selection will be investigated by a CMP setting applying three concurrent paths. The number of three paths permits already the investigation of "what-if" scenarios where two paths are already selected and a third path will complement the other paths. The used distributions for this setting are Negativ-binomial distributions with mean μ = E[D] = [25|50], standard deviation σ = 20 and skewness ν = [1.55|0.75]. It has to be noted that the distribution with lower mean has a higher skewness. The distributions are depicted in Figure 7a). Naive Combination: First, we now consider four cases of paths combinations: a) all three path delay distributions have the same low mean delay μ = 25, b) all three delay distributions have the same high mean μ = 50, c) two paths have low mean delay μ = 25 and one a high mean μ = 50, and d) one path has a low mean delay μ = 25 and two paths have high mean of μ = 50. Figure 7b) shows the CDF of the re-sequencing buffer occupancy for the four cases. The figure reveals that case a) and b) have almost similar buffer occupancy distributions. This indicates that the pure delay has no impact on the buffer occupancy. The slight difference is the result of the different skewness of the distributions, cf. [7]. For the cases c) and d) it is remarkable that case d) with two high path delays performs better in terms of buffer occupancy than case c). Intuitively more paths with lower delay should result in a better performance, but this is obviously not true as shown in case d). Let us consider case c) in greater detail. Therefore, we assume a single packet from the high delay path which is much overdue. Until the arrival of this overdue packet, the low delay paths can easily increase the occupancy of the resequencing buffer. Thus, the buffer is filled quickly by the low delay paths. This example shows that the high delay path becomes more dominant over low delays paths in terms Mean re−sequencing buffer occupancy E[B] (packets) 0.07 c = 1, ν ≈ 0.1 Probability P(D=d) 0.03 0.08 80 a) all path nbin; σ=20 60 40 b) all path nbin; σ=15 20 c) all path nbin or normal; σ=10 0 30 40 50 60 70 Mean Delay of the third path (time units) Fig. 8: Impact of the path characteristics of an arbitrary 3rd path on the mean re-sequencing buffer occupancy
  • 6. of buffer occupancy. The selection of the paths should level the variation of the range of mean delays. Moreover, recent measurement studies in Voice-over-IP systems confirm that a constant high or low delay may have no significant impact on the Quality of Experience of the application [22]. Thus it might be better in CMP to choose a path with a higher mean delay and lower delay variation in order to relieve the re-sequencing buffer and avoid packet loss. Influence of Mean Delay and Delay Variation: Now we investigate the impact of the mean delay and of the delay variation. In this setting we assume that two paths are already selected. The selected paths are of negative-binomial type, one with a low mean delay μ = 25 and one with a higher mean delay of μ = 50. We consider three cases where these paths have a standard deviation of σ = [10|15|20]. In case a), the delay on the third path, which is completing the other two paths, is distributed according to a Negativ-binomial distribution with σ = 20 and a mean in the range of [25, . . . , 75], in case b)the delay distribution is also Negativ-binomial but with σ = 15, and in case c) we use a Normal or a Negativ-binomial distribution for all paths with low delay variance and σ = 10. This case should compare the influence of the skewness, which is much lower for the Gaussian distribution. Figure 8 shows that the mean delay of the third path has a significant impact on buffer occupancy. If the mean path delay of the third path increases beyond the one with the higher mean delay then the mean buffer occupancy increases strongly. However, if the mean path delay of the third path is between the other two means then even a minimum exists. This effect is taking more shape when σ is low (case ba and c). We also conclude that a high delay variance degrades the CMP performance. Case c shows that the skewness has only little impact on the mean re-sequencing buffer occupancy. All-in-all, the above presented investigations show that a path selection strategy should consider the second moment of path delay. For a deeper analysis of the re-sequencing buffer occupancy beyond a mean value analysis, the skewness might have a significant impacts. VI. C ONCLUSION Our contribution is to present an analytical model for concurrent multipath (CMP) transmissions for transport virtualization (TV). CMP transport has many appealing advantages such as higher throughput and increased resilience. However, its application increases also the complexity of the system. In particular, the use of concurrent paths introduces inevitable out-of-order packet delivery. This effect has to be leveled by a re-sequencing buffer at the destination and careful selection of paths. We discussed the impact of different path delay distributions on the re-sequencing buffer occupancy probability distribution. Our model facilitates the understanding of path selection algorithms for multiple-path TV. The obtained results show that a path selection using the mean delay as sole criteria is not sufficient. Further criteria like higher moments and even the type of the delay distribution have to be considered. Since the analytical model is rather simple it might be used as a first step toward the on-line estimation of the quality of a certain set of paths. Such an on-line estimation is of particular interest in federated networks. Further, future work should address the coordination of TV and CMP mechanisms among different overlays. In addition, the findings presented in this paper have to be validated by real measurements. Another extension should be an analytical approximation of the real end-to-end delay which is not yet included in the presented model. ACKNOWLEDGMENTS The authors would like to thank Dirk Staehle and Tobias Hoßfeld for the fruitful discussions and their support during the course of this work. The sponsorship of this research by the European FP7 Network of Excellence "Euro-NF" through the Specific Joint Research Project "Multi-Next" is thankfully acknowledged. R EFERENCES [1] Larry Peterson, Soner Sevinc, Jay Lepreau, Robert Ricci, John Wroclawski, Ted Gaber, and Stephen Schwab, “Slice-Based Facility Architecture,” 2009, Information available at http://svn.planetlab.org/attachment/wiki/GeniWrapper/sfa.pdf. [2] Thomas Zinner, Kurt Tutschku, Akihiro Nakao, and Phuoc Tran-Gia, “Re-sequencing Buffer Occupancy of a Concurrent Multipath Transmission Mechanism for Transport System Virtualization,” in Proc. of the 16. KiVS 2009, Kassel, Germany, Mar. 2009. [3] Yoav Nebat and Moshe Sidi., “Resequencing Considerations in Parallel Downloads,” in Proc. 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 2002. [4] Y. Nebat et al., “Parallel Downloads for Streaming Applications – a Resequencing Analysis,” Performance Evaluation, vol. 63, no. 1, pp. 15–35, Jan. 2006. [5] R. Penno, S. Raghunath, R. Woundy, V. Gurbani, and J. Touch, “LEDBAT Practices and Recommendations draft-ietf-ledbat-practicesrecommendations-00.txt,” Mar. 2009. [6] Michael Liljenstam, Jason Liu, and David Nichol, “Development of an internet backbone topology for large-scale network simulation,” in Proceedings of the 2003 Winter Simulation Conference, New Orleans, December 2003. [7] Thomas Zinner, Kurt Tutschku, Akihiro Nakao, and Phuoc Tran-Gia, “Performance Evaluation of Packet Re-ordering on Concurrent Multipath Transmissions for Transport Virtualization,” to be published in JCNDS Special Issue on: Network Virtualization - Concepts and Performance Aspects, 2011. [8] Suman Banerjee, Tomothy Griffin, and Marcelo Pias, “The Interdomain Connectivity of PlanetLab Nodes,” in Proc. of the 5th Passive and Active Measurement Workshop (PAM2004), Antibes Juan-les-Pins, France., Apr. 2004. [9] John Russell Lane and Akihiro Nakao, “Best-Effort Network Layer Packet Reordering in Support of Multipath Overlay Packet Dispersion,” in Proc. of Globecom08, New Orleans, LA., Nov./Dec. 2008. [10] L. Ong and J. Yoakum, “RFC 3286: An Introduction to the Stream Control Transmission Protocol (SCTP),” May 2002. [11] Janardhan R. Iyengar, Paul D. Amer, and Randall Stewart, “Concurrent Multipath Transfer using SCTP Multihoming over Independent End-toEnd Paths,” IEEE/ACM Trans. Netw., vol. 14, no. 5, pp. 951–964, 2006. [12] Hung-Yun Hsieh and Raghupathy Sivakumar, “pTCP: An End-to-End Transport Layer Protocol for Striped Connections,” in Proceedings of the 10th IEEE International Conference on Network Protocols, Paris, France, Nov. 2002. [13] Huaizhong Han, Srinivas Shakkottai, Student Member, C. V. Hollot, R. Srikant, and Don Towsley, “Multi-Path TCP: A Joint Congestion Control and Routing Scheme to Exploit Path Diversity in the Internet,” IEEE/ACM Transactions on Networking, vol. 14, no. 6, pp. 1260–1271, Dec. 2006.
  • 7. [14] Ivan Gojmerac, Peter Reichl, and LAsse Jansen, “Towards LowComplexity Internet Traffic Engineering: The Adaptive Multi-Path Algorithm,” Computer Networks, vol. 52, no. 15, pp. 2894–2907, Oct. 2008. [15] Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, and Mung Chiang, “DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet,” in Proc. 4th ACM International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT 2008), Madrid, Spain, Dec. 2008. [16] John Peterson, Vijay Gurbani, and Enrico Marocci, “Charter of the Application-Layer Traffic Optimization (ALTO) Working Group,” Mar. 2009. [17] Stanislav Shalunov and Murari Sridhavan, “Charter of the Low Extra Delay Background Transport (LEDBAT) Working Group,” Mar. 2009. [18] James Polk and Gorry Fairhurst, “Charter of the Transport Area Working Group (TSVWG),” Mar. 2009. [19] Krishna P. Gummadi and Harsh V. Madhyastha, “Improving the reliability of internet paths with one-hop source routing,” in Proc. OSDI’04, San Francisco, Ca., USA, Dec. 2004. [20] Christian Scheideler Vinay Aggarwal, Anja Feldmann, “Can ISPs and P2P Systems Co-operate for Improved Performance?,” ACM SIGCOMM CCR, vol. 37, no. 3, Jul. 2007. [21] Tamas Elteto and Sandor Molnar, “On the Distribution of Round-trip Delays in TCP/IP Networks,” in Proceedings 26th Conference on Local Computer Networks (LCN’99), Lowell, Oct. 1999. [22] Tobias Hoßfeld, David Hock, Phuoc Tran-Gia, Kurt Tutschku, and Markus Fiedler, “Testing the IQX Hypothesis for Exponential Interdependency between QoS and QoE of Voice Codecs iLBC and G.711,” in 18th ITC Specialist Seminar on Quality of Experience, Karlskrona, Sweden, May 2008.