skip to main content
10.1145/2159576.2159590acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
research-article

A disruption-tolerant transmission protocol for practical mobile data offloading

Authors Info & Claims
Published:15 March 2012Publication History

ABSTRACT

The explosive popularity of smartphones and mobile devices drives massive growth in the wide-area mobile data communication. Unfortunately, the current or near-future 3G/4G networks are deemed insufficient to meet the increasing data transfer demand. While opportunistic offloading of mobile data through Wi-Fi is an attractive option, the existing transport layer would experience frequent disconnections due to mobility, making it hard to support seamlessly reliable data delivery. As a result, many mobile applications either depend on ad-hoc downloading resumption mechanisms or redundantly re-transfer the same content when disruptions happen.

In this paper, we present DTP, a disruption-tolerant, reliable transport layer protocol that masks the failures of the preferred network. Unlike previous disruption/delay-tolerant protocols, DTP provides the same semantics as TCP on an IP packet level when the mobile device is connected to a network while providing the illusion of continued connection even if the underlying physical network becomes unavailable. This would help the mobile application developers to focus on the application core rather than addressing the frequent network disruptions. It would also greatly reduce the phone network costs both to ISPs and end users. Our current implementation in UDP shows a comparable performance to that of TCP in network, and it greatly reduces the delay and power consumption when the mobile devices frequently switch from one network to another.

References

  1. SEO Updates. Mobile vs Desktop Internet Usage Stats 2011, 2011. http://www.seodailyupdates.com/2011/06/mobile-vs-desktop-internet-usage-stats.html.Google ScholarGoogle Scholar
  2. CISCO. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2010--2015. Technical report, 2011.Google ScholarGoogle Scholar
  3. J. M. Chapin and W. H. Lehr. Mobile Broadband Growth, Spectrum Scarcity, and Sustainable Competition. In Proceedings of The 39th Research Conference on Communication, Information and Internet Policy, 2011.Google ScholarGoogle Scholar
  4. J. Mitola III and G. Q. Maguire Jr. Cognitive Radio: Making Software Radios More Personal. IEEE Personal Communications, 6(4):13--18, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  5. A. Balasubramanian, R. Mahajan, and A. Venkataramani. Augmenting Mobile 3G Using WiFi. In Proceedings of ACM MobiSys, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. K. Lee, I. Rhee, J. Lee, S. Chong, and Y. Yi. Mobile Data Offloading: How Much Can WiFi Deliver? In Proceedings of ACM CoNEXT, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Scott, P. Hui, J. Crowcroft, and C. Diot. Haggle: A Networking Architecture Designed Around Mobile Users. In Proceedings of IFIP WONS, 2006.Google ScholarGoogle Scholar
  8. A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott. Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms. In Proceedings of IEEE INFOCOM, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  9. K. Fall. A Delay-Tolerant Network Architecture for Challenged Internets. In Proceedings of ACM SIGCOMM, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Podcast. http://www.apple.com/itunes/podcasts/.Google ScholarGoogle Scholar
  11. DoggCatcher. http://www.doggcatcher.com/.Google ScholarGoogle Scholar
  12. TubeMate. http://tubemate.tistory.com/.Google ScholarGoogle Scholar
  13. Dropbox. https://www.dropbox.com/.Google ScholarGoogle Scholar
  14. Google/Ipsos OTC MediaCT. The Mobile Movement Study, 2011.Google ScholarGoogle Scholar
  15. S. Burleigh, M. Ramadas, and S. Farrell. Licklider Transmission Protocol - Motivation. RFC 5325, IETF, 2008.Google ScholarGoogle Scholar
  16. M. Ramadas, S. Burleigh, and S. Farrell. Licklider Transmission Protocol - Specification. RFC 5326, IETF, 2008.Google ScholarGoogle Scholar
  17. S. Farrell, M. Ramadas, and S. Burleigh. Licklider Transmission Protocol - Security Extensions. RFC 5327, IETF, 2008.Google ScholarGoogle Scholar
  18. K. Scott and S. Burleigh. Bundle Protocol Specification. RFC 5050, IETF, 2007.Google ScholarGoogle Scholar
  19. KT. olleh WiFi zone Finder. http://zone.wifi.olleh.com/en/index.action.Google ScholarGoogle Scholar
  20. Android Market. https://market.android.com/.Google ScholarGoogle Scholar
  21. MapDroyd. http://www.mapdroyd.com/.Google ScholarGoogle Scholar
  22. Beyondpod. http://www.beyondpod.mobi/android/index.htm.Google ScholarGoogle Scholar
  23. Google Listen. https://market.android.com/details?id=com.google.android.apps.listen/.Google ScholarGoogle Scholar
  24. Winamp. http://www.winamp.com/android/.Google ScholarGoogle Scholar
  25. R. Braden. Requirements for Internet Hosts - Communication Layers. RFC 1122, IETF, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Michael E. Kounavis, Xiaozhu Kang, Ken Grewal, Mathew Eszenyi, Shay Gueron, and David Durham. Encrypting the internet. In Proceedings of ACM SIGCOMM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. K. Jang, S. Han, S. Han, S. Moon, and K. Park. SSLShader: Cheap SSL Acceleration with Commodity Processors. In Proceedings of USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. GNU wget. http://www.gnu.org/s/wget/.Google ScholarGoogle Scholar
  29. Y. Gu and R. L. Grossman. UDT: UDP-based Data Transfer for High-Speed Wide Area Networks. Computer Networks (Elsevier), 51(7), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. YouTube. http://www.youtube.com.Google ScholarGoogle Scholar
  31. Oasys Documentation Library. http://www.omgeo.com/page/productdocumentation/?var1=oasys/.Google ScholarGoogle Scholar
  32. R. Yanggratoke, A. Azfar, M. J. P. Marval, and S. Ahmed. Delay Tolerant Network on Android Phones: Implementation Issues and Performance Measurements. Journal of Communications, 6, 2011.Google ScholarGoogle Scholar
  33. V. Cerf, S. Burleigh, L. Torgerson, R.Durst, K. Scott, K. Fall, and H. Weiss. Delay-Tolerant Networking Architecture. RFC 4838, IETF, 2007.Google ScholarGoogle Scholar
  34. N. Balasubramanian, A. Balasubramanian, and A. Venkataramani. Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications. In Proceedings of ACM Internet Measurement Conference (IMC), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. A. Myles, D. Johnson, and C. Perkins. A mobile host protocol supporting route optimization and authentication. IEEE Journal on Selected Areas in Communications, 13(5), 1995.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. A. C. Snoeren and H. Balakrishnan. An end-to-end approach to host mobility. In Proceedings of ACM MOBICOM, pages 155--166, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet Indirection Infrastructure. 2002.Google ScholarGoogle Scholar
  38. R. Moskowitz and P. Nikander. Host Identity Protocol Architecture. RFC 4423, IETF, 2006.Google ScholarGoogle Scholar
  39. S. Farrell, V. Cahill, D. Geraghty, I. Humphreys, and P. McDonald. When TCP Breaks: Delay- and Disruption-Tolerant Networking. IEEE Internet Computing, 10(4), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Xiaohu Qie, Ruoming Pang, and Larry Peterson. Defensive Programming: Using an Annotation Toolkit to Build DOS-Resistant Software. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. R. E. Brown. Impact of Smart Grid on distribution system design. IEEE, Power and Energy Society general Meeting, 2008.Google ScholarGoogle Scholar

Index Terms

  1. A disruption-tolerant transmission protocol for practical mobile data offloading

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          MobiOpp '12: Proceedings of the third ACM international workshop on Mobile Opportunistic Networks
          March 2012
          106 pages
          ISBN:9781450312080
          DOI:10.1145/2159576

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 15 March 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Upcoming Conference

          MOBISYS '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader