Architectural Guidelines for Multipath TCP Development

Hosts are often connected by multiple paths, but TCP restricts communications to a single path per transport connection. Resource usage within the network would be more efficient were these multiple paths able to be used concurrently. This should enhance user experience through improved resilience to network failure and higher throughput. This document outlines architectural guidelines for the development of a Multipath Transport Protocol, with references to how these architectural components come together in the development of a Multipath TCP protocol. This document lists certain high level design decisions that provide foundations for the design of the MPTCP protocol, based upon these architectural requirements.

[1]  Janardhan R. Iyengar,et al.  Breaking Up the Transport Logjam , 2008, HotNets.

[2]  Alan Ford,et al.  MPTCP Application Interface Considerations , 2010 .

[3]  Randall R. Stewart,et al.  Stream Control Transmission Protocol , 2000, RFC.

[4]  Matt Mathis,et al.  TCP Extended Statistics MIB , 2007, RFC.

[5]  Sally Floyd,et al.  TCP Selective Acknowledgment Options , 1996, RFC.

[6]  Mark Handley,et al.  Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.

[7]  Bogdan M. Wilamowski,et al.  The Transmission Control Protocol , 2005, The Industrial Information Technology Handbook.

[8]  Mark Handley,et al.  TCP Extensions for Multipath Operation with Multiple Addresses , 2020, RFC.

[9]  Rajiv Raghunarayan,et al.  Management Information Base for the Transmission Control Protocol (TCP) , 2005, Request for Comments.

[10]  Scott O. Bradner,et al.  Key words for use in RFCs to Indicate Requirement Levels , 1997, RFC.

[11]  Brian E. Carpenter,et al.  Middleboxes: Taxonomy and Issues , 2002, RFC.

[12]  Mark Handley,et al.  The resource pooling principle , 2008, CCRV.

[13]  Christian E. Hopps,et al.  Analysis of an Equal-Cost Multi-Path Algorithm , 2000, RFC.

[14]  Brian E. Carpenter,et al.  Internet Transparency , 2000, RFC.

[15]  Wesley M. Eddy,et al.  TCP SYN Flooding Attacks and Common Mitigations , 2007, RFC.

[16]  Fernando Gont,et al.  On the Implementation of the TCP Urgent Mechanism , 2011, RFC.

[17]  Randall R. Stewart,et al.  Improving TCP's Robustness to Blind In-Window Attacks , 2010, RFC.

[18]  Ned Freed,et al.  Behavior of and Requirements for Internet Firewalls , 2000, RFC.

[19]  Pyda Srisuresh,et al.  Traditional IP Network Address Translator (Traditional NAT) , 2001, RFC.

[20]  Mark Handley,et al.  Coupled Congestion Control for Multipath Transport Protocols , 2011, RFC.

[21]  Marcelo Bagnulo,et al.  Threat Analysis for TCP Extensions for Multipath Operation with Multiple Addresses , 2011, RFC.

[22]  Gabriel Montenegro,et al.  Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations , 2001, RFC.