A survey on methods to provide multipath transmission in wired packet networks

نویسندگان

  • Jerzy Domzal
  • Zbigniew Duliñski
  • Miroslaw Kantor
  • Jacek Rzasa
  • Rafal Stankiewicz
  • Krzysztof Wajda
  • Robert Wójcik
چکیده

IP networks were designed to provide general connectivity. At their advent, routing methods focused only on finding one optimal path between given endpoints. Although many solutions to sending traffic via multiple paths have appeared over time, the majority of current IP networks are still managed to support only single-path transmissions. This survey examines various approaches which can provide multipath transmissions in existing IP networks. Firstly, the most recognizable solutions are presented, and later, less well-known proposals are introduced. We show how it is possible to realize multipath transmission in source and hop-by-hop routing, multi-topology routing, bio-inspired routing solutions, Valiant’s routing, Multi-Protocol Label Switching, Software-Defined Networks, Flow-Aware Multi-Topology Adaptive Routing, Shortest-Path Bridging, Transparent Interconnection of Lots of Links, network virtualization, and Multipath TCP. Moreover, the mentioned approaches are compared, contrasted and subjectively assessed. The goal of the survey is to show that multipath transmissions can be achieved in the current IP networks and in many different ways. 2014 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks

Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...

متن کامل

A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

متن کامل

Opportunistic Access Schemes for Multiuser OFDM Wireless Networks

Bandwidth allocation in next generation broadband wireless networks (4G systems) is a challenging issue. The scheduling shall provide mobile multimedia transmission services with an adequate QoS. These new multimedia services with tight QoS constraints require increased system capacity together with high fairness. The past decades have witnessed intense research efforts on wireless communicatio...

متن کامل

An Energy-Efficient, Cross Layer Approach for Time-Critical Applications in Underwater Sensor Networks

The Ocean remains the least explored frontiers. Many oceanic and marine applications seen relatively slow in exploiting the state of the art info-communication technologies. Acoustic communications is the most promising mode of communication underwater. Because of high error rate and long propagation delay of the acoustic channel, it is difficult to provide energy efficient communication. We pr...

متن کامل

New CMT-SCTP with increased speed of data transmission

Communication protocols issues are one of the effective factors in communicated networks performance. One of challenging problem in CMT-SCTP which sends data by multipath concurrently is Receive Buffer Blocking. This problem has important role in data transmission speed in computer networks. In this paper, we propose a control method based on fuzzy logic so that can solve Receive Buffer Blockin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 77  شماره 

صفحات  -

تاریخ انتشار 2015