Multipath Bandwidth Scavenging in the Internet of Things

نویسندگان

  • Isabel Montes
  • Romel Parmis
  • Roel Ocampo
  • Cedric Angelo M. Festin
چکیده

To meet the infrastructure coverage and capacity needed by future IoT applications, service providers may engage in mutually-beneficial modes of collaboration such as cooperative packet forwarding and gatewaying through fixed backhauls and Internet uplinks. In an effort to enable these modes of resource pooling while minimizing negative impact on collaborating providers, we developed a transport-layer approach that would enable IoT nodes to opportunistically scavenge for idle bandwidth across multiple paths. Our approach combines multipath techniques with less-than-best effort (LBE) congestion control methods. Initial tests using the TCP-LP and LEDBAT LBE algorithms on scavenging secondary flows show that this desired functionality can be achieved. To ensure however that IoT nodes are guaranteed at least one flow that fairly competes for fair share of network capacity, one flow called the primary flow uses standard TCP congestion control.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

شناسایی و رتبه بندی خدمات اینترنت اشیا در حوزه سلامت

Introduction: The Internet of Things is a system of connected physical objects that are accessible through the internet. It has been widely applied to connect available medical resources and provide reliable, effective and smart healthcare services to people. Therefore, the aim of this paper was to identify and rank the internet of things in healthcare services. Methods: In this applied resear...

متن کامل

A Novel Trust Management Model in the Social Internet of Things

The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...

متن کامل

Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

In recent years, routing has been the most focused area in ad hoc networks research. On-demand routing in particular, is widely developed in bandwidth constrained mobile wireless ad hoc networks because of its effectiveness and efficiency. Most proposed on-demand routing protocols are built and relied on single route for each data session. Whenever there is a link disconnection on the active ro...

متن کامل

A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

متن کامل

Investigating the Effect of Internet of Things on Human Resource Development and Training in the Organization (Case Study: State Airlines)

The Internet of Things is a new phenomenon that has changed the way we interact with our environment and affects all areas of life and the workplace. The purpose of this study is to investigate the effect of Internet of Things on the development and training of human resources in the organization. The present research is one of the applied researches and is considered as a descriptive-survey re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014