ABSTRACT
The explosive popularity of smartphones and mobile devices drives massive growth in the wide-area mobile data communication. Unfortunately, the current or near-future 3G/4G networks are deemed insufficient to meet the increasing data transfer demand. While opportunistic offloading of mobile data through Wi-Fi is an attractive option, the existing transport layer would experience frequent disconnections due to mobility, making it hard to support seamlessly reliable data delivery. As a result, many mobile applications either depend on ad-hoc downloading resumption mechanisms or redundantly re-transfer the same content when disruptions happen.
In this paper, we present DTP, a disruption-tolerant, reliable transport layer protocol that masks the failures of the preferred network. Unlike previous disruption/delay-tolerant protocols, DTP provides the same semantics as TCP on an IP packet level when the mobile device is connected to a network while providing the illusion of continued connection even if the underlying physical network becomes unavailable. This would help the mobile application developers to focus on the application core rather than addressing the frequent network disruptions. It would also greatly reduce the phone network costs both to ISPs and end users. Our current implementation in UDP shows a comparable performance to that of TCP in network, and it greatly reduces the delay and power consumption when the mobile devices frequently switch from one network to another.
- SEO Updates. Mobile vs Desktop Internet Usage Stats 2011, 2011. http://www.seodailyupdates.com/2011/06/mobile-vs-desktop-internet-usage-stats.html.Google Scholar
- CISCO. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2010--2015. Technical report, 2011.Google Scholar
- J. M. Chapin and W. H. Lehr. Mobile Broadband Growth, Spectrum Scarcity, and Sustainable Competition. In Proceedings of The 39th Research Conference on Communication, Information and Internet Policy, 2011.Google Scholar
- J. Mitola III and G. Q. Maguire Jr. Cognitive Radio: Making Software Radios More Personal. IEEE Personal Communications, 6(4):13--18, 1999.Google ScholarCross Ref
- A. Balasubramanian, R. Mahajan, and A. Venkataramani. Augmenting Mobile 3G Using WiFi. In Proceedings of ACM MobiSys, 2010. Google ScholarDigital Library
- K. Lee, I. Rhee, J. Lee, S. Chong, and Y. Yi. Mobile Data Offloading: How Much Can WiFi Deliver? In Proceedings of ACM CoNEXT, 2010. Google ScholarDigital Library
- J. Scott, P. Hui, J. Crowcroft, and C. Diot. Haggle: A Networking Architecture Designed Around Mobile Users. In Proceedings of IFIP WONS, 2006.Google Scholar
- A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott. Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms. In Proceedings of IEEE INFOCOM, 2006.Google ScholarCross Ref
- K. Fall. A Delay-Tolerant Network Architecture for Challenged Internets. In Proceedings of ACM SIGCOMM, 2003. Google ScholarDigital Library
- Podcast. http://www.apple.com/itunes/podcasts/.Google Scholar
- DoggCatcher. http://www.doggcatcher.com/.Google Scholar
- TubeMate. http://tubemate.tistory.com/.Google Scholar
- Dropbox. https://www.dropbox.com/.Google Scholar
- Google/Ipsos OTC MediaCT. The Mobile Movement Study, 2011.Google Scholar
- S. Burleigh, M. Ramadas, and S. Farrell. Licklider Transmission Protocol - Motivation. RFC 5325, IETF, 2008.Google Scholar
- M. Ramadas, S. Burleigh, and S. Farrell. Licklider Transmission Protocol - Specification. RFC 5326, IETF, 2008.Google Scholar
- S. Farrell, M. Ramadas, and S. Burleigh. Licklider Transmission Protocol - Security Extensions. RFC 5327, IETF, 2008.Google Scholar
- K. Scott and S. Burleigh. Bundle Protocol Specification. RFC 5050, IETF, 2007.Google Scholar
- KT. olleh WiFi zone Finder. http://zone.wifi.olleh.com/en/index.action.Google Scholar
- Android Market. https://market.android.com/.Google Scholar
- MapDroyd. http://www.mapdroyd.com/.Google Scholar
- Beyondpod. http://www.beyondpod.mobi/android/index.htm.Google Scholar
- Google Listen. https://market.android.com/details?id=com.google.android.apps.listen/.Google Scholar
- Winamp. http://www.winamp.com/android/.Google Scholar
- R. Braden. Requirements for Internet Hosts - Communication Layers. RFC 1122, IETF, 1989. Google ScholarDigital Library
- Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mathew Eszenyi, Shay Gueron, and David Durham. Encrypting the internet. In Proceedings of ACM SIGCOMM, 2010. Google ScholarDigital Library
- K. Jang, S. Han, S. Han, S. Moon, and K. Park. SSLShader: Cheap SSL Acceleration with Commodity Processors. In Proceedings of USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2011. Google ScholarDigital Library
- GNU wget. http://www.gnu.org/s/wget/.Google Scholar
- Y. Gu and R. L. Grossman. UDT: UDP-based Data Transfer for High-Speed Wide Area Networks. Computer Networks (Elsevier), 51(7), 2007. Google ScholarDigital Library
- YouTube. http://www.youtube.com.Google Scholar
- Oasys Documentation Library. http://www.omgeo.com/page/productdocumentation/?var1=oasys/.Google Scholar
- R. Yanggratoke, A. Azfar, M. J. P. Marval, and S. Ahmed. Delay Tolerant Network on Android Phones: Implementation Issues and Performance Measurements. Journal of Communications, 6, 2011.Google Scholar
- V. Cerf, S. Burleigh, L. Torgerson, R.Durst, K. Scott, K. Fall, and H. Weiss. Delay-Tolerant Networking Architecture. RFC 4838, IETF, 2007.Google Scholar
- N. Balasubramanian, A. Balasubramanian, and A. Venkataramani. Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications. In Proceedings of ACM Internet Measurement Conference (IMC), 2009. Google ScholarDigital Library
- A. Myles, D. Johnson, and C. Perkins. A mobile host protocol supporting route optimization and authentication. IEEE Journal on Selected Areas in Communications, 13(5), 1995.Google ScholarDigital Library
- A. C. Snoeren and H. Balakrishnan. An end-to-end approach to host mobility. In Proceedings of ACM MOBICOM, pages 155--166, 2000. Google ScholarDigital Library
- I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet Indirection Infrastructure. 2002.Google Scholar
- R. Moskowitz and P. Nikander. Host Identity Protocol Architecture. RFC 4423, IETF, 2006.Google Scholar
- S. Farrell, V. Cahill, D. Geraghty, I. Humphreys, and P. McDonald. When TCP Breaks: Delay- and Disruption-Tolerant Networking. IEEE Internet Computing, 10(4), 2006. Google ScholarDigital Library
- Xiaohu Qie, Ruoming Pang, and Larry Peterson. Defensive Programming: Using an Annotation Toolkit to Build DOS-Resistant Software. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2002. Google ScholarDigital Library
- R. E. Brown. Impact of Smart Grid on distribution system design. IEEE, Power and Energy Society general Meeting, 2008.Google Scholar
Index Terms
- A disruption-tolerant transmission protocol for practical mobile data offloading
Recommendations
Practicalizing Delay-Tolerant Mobile Apps with Cedos
MobiSys '15: Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and ServicesDelay-tolerant Wi-Fi offloading is known to improve overall mobile network bandwidth at low delay and low cost. Yet, in reality, we rarely find mobile apps that fully support opportunistic Wi-Fi access. This is mainly because it is still challenging to ...
Improving TCP performance over mobile networks
Transmission Control Protocol (TCP) is the most commonly used transport protocol on the Internet. All indications assure that mobile computers and their wireless communication links will be an integral part of the future internetworks. In this paper, we ...
The handover control mechanism for multi-path transmission using Stream Control Transmission Protocol (SCTP)
With the rapid advance of wireless networking technologies, end-host networking devices have been equipped with various network interfaces. Thus, it becomes possible for a wireless mobile host to improve its transmission efficiency by transmitting data ...
Comments