On effectively exploiting multiple wireless interfaces in mobile hosts
Proceedings of the 5th international conference on Emerging networking experiments and technologies
ACM SIGCOMM Computer Communication Review
Mobile data offloading: how much can WiFi deliver?
Proceedings of the ACM SIGCOMM 2010 conference
Intentional networking: opportunistic exploitation of mobile network diversity
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Design, implementation and evaluation of congestion control for multipath TCP
Proceedings of the 8th USENIX conference on Networked systems design and implementation
Characterizing and modeling internet traffic dynamics of cellular devices
Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems
Cellular Traffic Offloading through WiFi Networks
MASS '11 Proceedings of the 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems
Desirable trends in mobile communication
ACM SIGMOBILE Mobile Computing and Communications Review
Making use of all the networks around us: a case study in android
Proceedings of the 2012 ACM SIGCOMM workshop on Cellular networks: operations, challenges, and future design
Casting doubts on the viability of WiFi offloading
Proceedings of the 2012 ACM SIGCOMM workshop on Cellular networks: operations, challenges, and future design
Exploring mobile/WiFi handover with multipath TCP
Proceedings of the 2012 ACM SIGCOMM workshop on Cellular networks: operations, challenges, and future design
Hi-index | 0.00 |
Multi-access connectivity in wireless networks is becoming widely available. Most handsets on the market today support connectivity to multiple access technologies such as HSPA, LTE or WiFi and can make use of some of them in parallel. By offering multiple access options, the available bandwidth and robustness of the connectivity can be increased. There is a large design space to take advantage of multiple connectivity. Various solutions and protocols at different layers and locations in the network exist, originating from different viewpoints and problem statements. They range from static low-layer tunneling approaches like IWLAN or Mobile-IP to dynamic transport layer approaches like multipath TCP up to highly sophisticated application-layer specific protocols. Focusing on the network layer and above, we review a variety of these protocols and solutions by categorizing them, exhibiting their properties, reasoning about their potential behavior in the presence of Internet traffic and take a glimpse on their impact on the network.