Fault-Aware Resource Allocation for Heterogeneous Data Sources with Multipath Routing

,


Introduction
With the rapid development of cloud computing and big data, communication networks where a wide variety of devices can be connected are increasingly used in dataintensive applications, such as video surveillance, robots, industrial process control, and mobile entities [1].Various types of traffic generated from heterogeneous data sources have increasing growth in demand for efficient transmission services, for example, traditional data, audio, video, and multimedia delivery through the network [2].Different qualityof-service (QoS) requirements of these services are specified in the form of application performance metrics, which are not easy to be guaranteed in the homogeneous network service architecture.Therefore, communication networks are expected to support heterogeneous data sources with diverse QoS requirements supporting.
Most existing designs of communication networks are based on the assumption that each node is well behaved and cooperative; and packet loss that does occur is mainly due to contention or congestion.Built upon open transmission mediums, communication networks are vulnerable to channel impairments, failure, interference and fading, and so on [3,4].Misbehaving nodes always exist along the available paths between sources and destinations.All of these can cause unreliable data transmission, lower effective data rate received successfully at the destination node, and unfairness between different sources [5].The network performance is significantly degraded by misbehaving nodes particularly for data sources with tight quality-of-service requirements such as real-time provision in city-wide wireless network [6].How to maintain an acceptable level of network performance degradation for heterogeneous data sources still remains an open problem in the design of a communication network with the presence of misbehaving nodes.
The majority of antifault approaches make use of network redundancy.For example, reliable protocols may introduce multiple routing paths, different spectrums, or multiple wireless channels to curb the effects of malicious attacks or failures.In addition, multipath routing, which can be useful 2 Scientific Programming in enhancing the network performance, was actively studied in communication networks [7].In this paper, we guarantee the QoS requirements based on the use of multiple routing paths.For various applications, higher effective throughput and better fairness offer better QoS.To make efficient utilization of this routing diversity, however, heterogeneous data sources must be able to perform an intelligent traffic allocation along the available paths while considering the potential impact of faults on the effective throughput.
In order to characterize the effect of misbehaving nodes on throughput, each source must rely on direct knowledge of the impact of faulty nodes in various parts of the network.Unfortunately, it is not an easy job to collect information on misbehaving nodes directly, in a realistic environment.Few current works consider uncertainties and dynamics in the adversarial environment.Most of them assume that the misbehavior is fixed with time.In fact, the extent of misbehaviors at each network node depends on many unknown parameters, including malicious nodes' actions, schemes used by attackers, mobility patterns, and other unknown external/internal faults [8][9][10].Hence, the impact of faulty nodes is probabilistic from the perspective of the network.We estimate the impact of jamming and characterize the effect of faults as a random process.Each source performs traffic allocation based on statistical information at probabilistic faulty nodes.
To provide better traffic management on multiple paths, Optimal Flow Control (OFC) approach [11], which is regarded as the most successful result in the area of traffic allocation, optimizes the sum utility of homogeneous traffic.Wang et al. [12] have shown that if various applications are run over a network, the OFC approach usually leads to an unfair traffic allocation according to the utility performance for heterogeneous traffic.The objective of heterogeneous applications is no longer to solely maximize the sum utility of the sources.Instead, it is supposed to meet different QoS requirements related to heterogeneous applications.In order to support different traffic types, we model application performance as a generic utility function by relaxing the utility function conditions.Explicitly taking account of misbehaviors' effect, we generalize the OFC approach to obtain new problem formulations, namely, fault-aware utility flow control (FUFC), which can optimize relaxed utilities of lossy flows on multiple routing paths, having the ability to handle a number of heterogeneous traffic.
In this article, we investigate the problem of resource allocation in multiple-path routing strategies for heterogeneous data sources in the event of faulty behaviors.We first model the effect of misbehaviors at each node as a random process due to the misbehavior dynamic and mobility.Owing to traversing over the probabilistic faulty paths, the flow at the destination node must be studied using a stochastic framework and smaller than that from the source node.We formulate this rate allocation as a lossy flow optimization problem for multipath routing while considering the thinning feature of data flows across faulty paths.In order to support heterogeneous traffic, we relax the utility function conditions in our lossy optimization problem.Then we design a distributed rate control algorithm that allocates source rate so that the performance of heterogeneous data sources is guaranteed.Each source has the ability to compensate for misbehaviors in network performance degradation across multiple routing paths in terms of utilities, rather than performance degradation in terms of rates.In this way, our algorithm improves the utility performance of heterogeneous sources according to different QoS requirements resulting in overall improvement in system performance.
The main contributions of this paper are outlined as follows: (i) We formulate the problem of allocating traffic across multiple routing paths in the presence of faulty nodes as a network lossy flow optimization problem which can optimize relaxed utilities, having the ability to handle heterogeneous traffic.
(ii) We propose an approach which allows network nodes to locally characterize the impact of the nondeterministic and dynamic faulty behaviors and aggregate this information for the heterogeneous source nodes.Each source can introduce bias into rate allocation and routing decisions, leading to compensating for misbehaviors in network performance degradation in terms of utility return.
(iii) We provide a novel distributed algorithm, FUFC, to be friendly with heterogeneous applications and allocate the effective rate in lossy utility fair manner.
(iv) Through comprehensive performance comparisons, we demonstrate the considerable gains in network performance including higher effective throughput and better fairness among heterogeneous sources that can be achieved by our algorithm.
The rest of the paper is organized as follows.We depict our system model in Section 2. We propose methods that allow nodes to estimate the impact of misbehaviors and model the leaky-path flow in Section 3. In Section 4, we present the fault-aware utility flow control approach with multipath routing.The performance of our algorithm is evaluated in Section 5. Finally, we describe the related work in Section 6 and conclude the paper in Section 7.

System Model and Assumptions
2.1.Network Model.We consider a network with a set L={1, 2, . . ., } of links of capacity   ,  ∈ L, and a set V = {1, 2, . . ., } of nodes.We denote a link as a pair of nodes (, ), where  ∈ V is the transmitter of the link and  ∈ V is the receiver.The network is shared by a set S = {1, 2, . . ., } of sources, and S ⊆ V.Each source  ∈ S has   available paths or routes from the source to destination.Denote  × 1 vector R , the set of links used by source  ∈ S on its path  ∈ {1, 2, . . .,   }, whose th element is equal to 1 if and only if the path passes through link  and 0 otherwise.Then the set of all the available paths of source  is defined by and the whole set of paths in the network is defined by a × where  = be the corresponding vector of all path rates of all sources and let the   × 1 vector   = [ ,1 , . . .,  ,  ]  denote the set of all path rates of source . Figure 1 illustrates an example network of the sources  1 ,  2 ,  3 ,  4 .Each source consists of multiple routing paths: R  1 ,1 = {(, ) , (, ) , (, )} , For communication networks, usually, users focus on source rate and throughput at the destination node.However, since networks consist of various node types or modalities, as shown in Figure 1, there may exist different applications with diverse utility behaviors.Each application uses its utility as a measure of the QoS performance in terms of provided services.Regardless of the types of sources, we assume that utility   (  ) is achieved by the traffic as a function of its rate   .More generally, utilities of multiple applications can be categorized as follows in terms of performance goal perspectives [12]: (i) Elastic utility for traditional data services such as file transfer, mail, and ftp; (ii) Real-time utility for delay-sensitive services such as video surveillance, real-time monitoring, and teleconferencing; (iii) Rate-adaptive utility for real-time rate-adaptive services which are able to adjust their rates dynamically; (iv) Stepwise utility for other types of services such as audio and video delivery services via a layered encoding and transmission model.

Misbehaving Node Model.
In this article, we assume that the source nodes have no prior knowledge of the abnormal behaviors of nodes: failures of internal components, or some external attacks/interferences in the adversarial environment.
That is, we make no assumption about the strategy used by malicious nodes, mobility patterns, or misbehaviors' goals.Instead of basing on direct of knowledge of the misbehaviors, we suppose that the network nodes characterize the impact of faulty behaviors in terms of their direct impact on throughput.We assume that packet loss occurs not due to contention or congestion but misbehaving nodes, since the former can be managed by the provision of the underlying network protocols.With the existence of misbehaving nodes, the increased packet loss ratio of each node usually occurs, which is caused by the increased probability of collisions for the transmission mechanism.Network nodes can then incorporate the information to the decision of source nodes' optimal rate allocation and routing.

Estimating the Impact of Misbehaviors and Models for Leaky-Path Flows
In this section, we provide methods for the network node to estimate and characterize the impact of misbehaviors and for a source node to obtain misbehavior information.Before incorporating the impact into traffic allocation and routing, each node  must estimate the effect of misbehaviors on transmissions over link (V, ) and relay it to source .In the presence of misbehaving nodes, the increased probability of collisions usually leads to the increased packet loss ratio of each link for the transmission mechanism.Due to the impact of misbehaviors, network links are lossy in nature.Consequently, the flow rate turns into lower and lower across its routing path called leaky-path, and the effective data rate received successfully at the destination node is lower than the transmission rate at the source.To study this, we present the models for lossy links and leaky-path flows in the following.

Estimating the Impact of Misbehaviors.
In this paper, we assume that packet loss or corruption occurs only due to faulty nodes since contention or congestion can be controlled by the provision of the underlying network protocols.Although a faulty node may perform various malicious behaviors, any good node exhibits the same behavior: delivering packets correctly.During the updated period represented by the time interval [ − , ], each node  can record the number of packets received over link and the number of valid packets which pass an error detection check.As the network has no knowledge of the misbehaving nodes actions, the impact of fault is uncertain and probabilistic from the perspective of the network.The behavior of node V is formulated as a random variable (V).The outcomes of (V) are defined as follows: The packet delivery ratio over each link (V, ) can be formulated as a random variable using statistics from node V. Due to the packet loss in faulty links, the data rate of a flow becomes thinner and thinner along its routing path.For a routing path, the behavior of a path  = [V 1 , V 2 , . . ., V  ] can also be formulated as a random variable ().The outcomes of () are defined as follows: Then, the packet delivery ratio over node  can itself be characterized as ℎ  = Pr{() = 1}, a random variable using statistics from past network communication, due to the network's uncertainty in the faulty node's action.
In order to reduce significant variation, and to include memory of misbehaviors history, we update the estimation through the previous estimate ĥ ( − ) as where  ∈ [0, 1] is a constant weight representing the relative preference between recent and historic samples.The constant time interval  influences the quality of the estimate process.If the interval is too large, the estimate result will be outdated and cost more time.Otherwise, the dynamics of misbehaviors can not be captured, and the result of ĥ is not accurate enough.Hence, the choice of  depends on the application scenarios.We use a similar estimation procedure to update the variance ] 2  : where  ∈ [0, 1] is a constant weight and   is the sample variance of packet delivery ratios computed using (7)  Given the packet delivery ratio estimates ĥ () for the links (, ) in the routing path R , , the source  needs to estimate the effective end-to-end packet delivery probability.The end-to-end packet success ratio R , for the path can be formulated as which is also a random variable due to the randomness in variable ℎ  .We let ĝ, denote as the mean of random variable  , which is equal to the product of estimations ĥ : Let R  , denote the subpath of R , from source  to the intermediate node  and R  , denote the subpath of R , from the intermediate node  to the destination node of R , .The estimated packet delivery ratio of subpath R  , can be computed using (10): The covariance   , is similar given by

Leaky-Path Flow Model.
Due to misbehaviors at nodes along the path, the effective rate is potentially reduced at each intermediate receiving node since data packets are lost.At a link (, ) in the routing path R , with transmission source rate  , , data is only received correctly on ĝ ,  , .We define the goodput   , of a flow as the effective data rate received successfully at its destination node [13].For a flow from source  traversing multiple hops, the goodput received at the destination node is given by where  , is the transmission rate at the source and R , is the set of links along the route.It can be seen that the data rate of a flow declines every hop along its routing path, and it is in this sense that we call it a leaky-path flow.
To define a set of constraints for the multipath rate allocation problem, we must consider the resource constraints and the reduction of data flow due to misbehaviors at intermediate nodes.The resource constraint in necessary conditions of network utility maximization was that the average data rate should be no more than average capacity of each link.We next generate the stochastic constraint through incorporating the fault statistics into the link capacity constraint.For a communication network under probabilistic misbehaviors, the data flow rate is reduced along each path with increased the hops from source .Hence, if the data flow rate at the source  is chosen without considering the packet loss by misbehaviors, the actual aggregate rate ∑    , may not be tightly bounded by the average capacity, where   =  ∈ ((, )) ∧ R , ∈ R  ∧ (, ) ∈ R , .Thus at the node  of path R  , , the goodput is given by   ,  , .The stochastic constraint is thus imposed by the capacity constraint on the total traffic traversing a link (, ) which can be given as follows: In order to compensate for the randomness in (15), we use the expected value and variance to replace the packet delivery ratio   , .The mean ĝ , and variance   , of   , can be computed using ( 12) and ( 13 A principal objective in optimal flow control problem formulation is to maximize the overall effective network utility of all flows from different sources: or where   (  ) is the associated utility as a measure of performance (or equivalently QoS).
We generalize the OFC approach to obtain new problem formulations, namely, utility optimal flow control (UFC), which replace the conventional utility function with pseudo utility   (  ).
The demand for different QoS utilities also motivates a new concept of the utility max-min fairness [14].Definition 1.A source rate allocation X * = [ * 1 ,  * 2 , . . .,  *  ]  is utility max-min fair, if it is feasible and for each source , the utility   ( *  ) cannot be increased while maintaining feasibility, without decreasing the utility    ( *   ) for some source   with a lower utility    ( *   ) ≤   ( *  ).The definition shows that we should design rate control protocols that try to achieve fairness in terms of utilities, rather than fairness in terms of rates.For heterogeneous sources, the utilities, rather than source rates, are meaningful metrics of QoS for the applications.
To apply the UFC in fault-aware wireless networks, one needs to specify the resource constraints as in (19).Due to the faulty nodes existence on the routing path, the traffic rate is potentially decreased at each receiver as faulty nodes are lossy.Then the UFC operates over faulty links as follows: at each link, the link resource constraint is calculated as in (19), but using the total actual received rate at the link, not the sum of the original rates; and the source node updates the flow rate according to the feedback parameter of resource constraints along its route.This straightforward application of the UFC framework takes account of the faulty links, but only in the way the feedback parameters are computed.The lossy nature of the routing path is not considered in the objective function in the UFC problem itself.In the following section, we will propose the fault-aware utility flow control algorithm, which takes account of the lossy nature of the faulty paths in the objective function and constraints, to achieve lossy utility-based fairness for heterogeneous sources and study the properties in detail.

Fault-Aware Utility Flow Control Algorithm with Multiple Paths.
Since the optimization framework of utility flow control is primarily developed for fault-free network environments, it cannot be directly applied to adversarial environments.In order to guarantee the network performance in the presence of misbehaving nodes, we provide the lossy optimization framework of utility flow control based on leaky-path model.The objective in this problem formulation is to maximize the overall pseudo utility of all effective flows, subject to the link capacity including expected packet loss due to misbehaviors.Then we have the following optimization problem: The Lagrangian function can be defined as In terms of the Arrow-Hurwicz gradient method [15], we can obtain where  is a small step size and   , () is the path price, which is composed of the link prices  (,) () along the particular route.Then the objective function of the dual problem is then min {,,}  (, , ) . ( The Lagrangian multipliers for the dual can be computed by the gradient method, as follows: We present our design of distributed algorithm based on proximal optimization steps for solving the utility max-min fair flow control with multiple paths problem.The FUFC algorithm for heterogeneous sources with multiple routing paths can be summarized in Algorithm 1. For each source  with multiple paths, the property of updating formulations can easily lead to the oscillations in the Lagrangian algorithm.Since this kind of oscillation is detrimental to network control, we introduce an augmented variable  , to solve the oscillation problem.The following modified objective function is used to replace the objective function of formulation (20): Denoting  * , as the optimal value of ( 20), the optimal value of the utility maximization problem with objective function ( 28 for all its paths  , ,  = 1, . . ., k  ; (2) Updates the path rate  , ( + 1) using formula (23) and source rate   ( + 1) = ∑   =1  , ( + 1); (3) Communicates the upper and lower bound price  and  for the next step, according to ( 26) and ( 27); (4) Communicates the new flow rate  , ( + 1) to all the links which are contained in path  , .

Lossy Utility Max-Min Fairness.
Based on the assumption of nonadversarial environments, each node in the network is well-behaved and ℎ  = 1.Our distributed algorithm with ℎ  = 1 can allocate rates to achieve the utility max-min fairness among sources.The path rate algorithm of ( 23) simplifies to We can obtain that 1/  (∑   =1  , ()) =   , () or  , ( + 1) = 0 at convergence.In steady state, nodes attain a normal utility  *  = 1/  *  .Let   denote the set of nodes which have at least one path rate by the link price .Let us first consider the highest link price  0 ; all the sources  ∈   0 get the smallest utility   = 1/ 0 .They are feasible and no source utility can be increased without decreasing another source utility that has the maximum price  0 .So for these flows with price  0 , they are utility max-min fair.
Then we consider the second highest link price  1 .All the sources  ∈   1 attain the same utility   = 1/ 1 .No source utility can be increased without decreasing another source utility of   ∈   0 ∪   1 having a lower utility   <    .All other flows traversing this link will be assigned a price of  1 and equally share the remaining utility, which is also a utility max-min fair allocation.
Let us keep selecting all the link prices in the order  0 ,  1 , . . .,  −1 ,   ; it is concluded that the algorithm with ℎ  = 0 allocates source rate in utility max-min fair manner and that the global fairness is achieved.
When ℎ = 1, the source rate in our algorithm can achieve utility max-min fairness, while the source rate can achieve lossy utility max-min fairness with ℎ < 1.The following corollary establishes that utility max-min fair solutions also have the convergence property as loss ratios tend to zero.
The continuity of solutions can be proved using standard techniques in convergence analysis of Pompeiu-Hausdorff distance [13].For the sake of limited space, we omit the proof here.
With the rapid process of Internet of Things and smart cities, the nature of the network is gradually evolving heterogeneously.There are various types of nodes, such as camera, robots, and mobile entities, in distributed heterogeneous systems.Our approach caters for a variety of service performance metrics related to heterogeneous sources.The network performance and QoS requirements are guaranteed through providing both effective throughput and fairness among various sources.We show the numerical results of our proposed algorithm in the following section.

Performance Evaluations
In this section, we evaluate through simulations the performance of our proposed rate control algorithm with multiple routing paths in two case studies.In the first case, we apply our flow control algorithm to a specific multipath communication network and demonstrate the dynamics of behaviors.We use numerical examples to illustrate the advantage of the FUFC over the UFC approach without considering the impact of faulty nodes.In the second case, we extend the scale of network topology in order to observe the performance trends and shows the convergence of utility fair flow control solutions established in Section 4.
We consider two network cases with four heterogeneous sources  1 ,  2 ,  3 , and  4 which support multiple services with different QoS requirements.Therefore, we set utility functions consisting of heterogeneous traffic.The utility function of each source node with source rate   is given as ) ), and  4 ( 4 ) = 0.1 3 .The linear utility function represents that the satisfaction of an application increases linearly.The logarithmic utility function corresponds to the real-time application which the sigmoidal function approximates.Each fault parameter ℎ  is modeled as an independent beta random variable with parameters (  ,   ) as ℎ  =   /(  +   ).For example, ℎ  = 0.9 has corresponding parameters   = 39.6 and   = 4.4.Other simulation parameters are summarized in Table 1.
We denote that  is the data rate of one flow at the source node, and   as the goodput at the destination node.Note the time scale in all the relevant figures is in terms of number of iterations.In the UFC approach, we use the algorithm in Problem (19) calculated based on the flow rate on each link and link price on each path.Figure 3 shows the utility of flow rates  at four source nodes using the UFC approach.Two utilities  1 of  1 and  3 of  3 converge to 0.9876, while  2 of  2 and  4 of  4 converge to 0.6381.Without considering the effect of faulty links, the algorithm computes  1 and  3 to share the bottleneck resource with an equal utility.The UFC approach provides a utility max-min fair resource allocation in which  1 is equal to  3 , and  2 is equal to  4 of their source rates .In fact, the effective utilities of four flows cannot maintain the utility fairness at their destination node after traveling along the leaky-paths.The effective utilities of goodput for four sources in the UFC approach are depicted in Figure 4.The effective utilities decrease to 0.9099, 0.5756, 0.8075, and 0.6023 among four sources.For FUFC, the effective rates in Algorithm 1 are shown in Figure 5.It can be seen that FUFC yields higher effective utilities (0.987, 0.6381, 0.9883, and 0.6381) for four sources than UFC.We take a closer look at utility allocation among flows and effective flows in Figures 4 and 5.In Figure 3, four flows share a max-min fair utility allocation of source rate that  1 of  1 is equal to  3 of  3 , and  2 of  2 is equal to  4 of  4 .However, the utility fairness is broken due to different faulty effects on four paths by faulty links. 3 of   3 and  2 of   2 are lower than  1 of   1 and  4 of    4 , respectively, in Figure 4.In Figure 5, the effective utilities  1 of   1 and  3 of   3 in FUFC are closer to each other than those in the UFC approach.The same situation happens in  2 of   2 and  4 of   4 .It demonstrates that better utility fairness is attained among effective flow rates by FUFC.
Figures 6 and 7 report the goodput at the destination node of UFC and FUFC, respectively.It can be seen that FUFC yields higher effective rates (6.185, 3.619, 8.196, and 6.381) for flows than UFC with goodput (5.156, 2.976, 6.717, and 6.023).This is because in our algorithm, multiple source nodes allocate traffic across multiple routing paths adaptively to compensate for faulty nodes, whose effects on throughput are taken into account in utility functions and constraints.Thus the network performance in presence of faulty nodes is improved through higher effective utility, higher effective throughput, and better utility fairness among effective flows by our algorithm FUFC.

Case 2.
We investigate the performance while increasing  faulty links from 1 to 8 between  and ,  and ,  and , and  and  in the network of Case 1.Consider a wireless network given in Figure 8 where each flow travels multiple hops.
With an increasing number of links, the equilibrium utilities  2 and  4 of effective flow over the above paths of four sources for both UFC and FUFC are plotted in Figure 9.As the number of links increases, the effective utilities of goodput in both UFC and FUFC decline.Clearly, the effective utility of FUFC can be significantly higher than that of UFC.Meanwhile, the effective utilities of the flows in FUFC are closer to each other than those in the UFC approach, indicating that better fairness among effective utilities is achieved by FUFC.The gain of FUFC over UFC increases as the number of hops increases.Each source increases its flow rate adaptively to compensate for the higher data loss as the number of hops increases.
We can see from Figure 10 that, with decreasing the number of faulty links, the rate allocation is convergent to the rate allocation in wireless lossless condition.As discussed in Section 4, the rate region in our algorithm converges to the rate region in the corresponding lossless network while a sequence of link loss rate converges to zero (the number of faulty links converges to zero).The lossy utility max-min fairness can be achieved in our algorithm and converges to the corresponding lossless fairness with a sequence of loss rates converging to 0 in Figure 11.Figures 10 and 11 show the trends of rate region and utility fairness of four sources.

Related Work
There has been much work on resource allocation approaches for providing reliable transmissions (see, e.g., [16][17][18]).Some of these approaches are obtained as distributed solutions to an optimization problem first motivated by Kelly et al. in [11], with setting fixed reliability constraints.Saad et al. focus on effective rate allocation by maximizing the network utility with quality-of-service (QoS) constraints [18].Hosseinabadi and Vaidya allocate data rates using a cross-layer approach with the presence of misbehavior nodes [16].To ensure secure communication, [17] formulate resource allocation as an optimization problem considering QoS metrics and artificial noises.Their work, however, is unable to adjust the effective rate and fairness adaptively in terms of the actual receiveresource at destination nodes.In our work, we define effective utility function associated with the effective rate at receivers and make the fairness objectives involve in optimization problem.Thus, our flow control approach could maintain an acceptable level of network performance degradation through getting better fairness and more effective utility in the presence of misbehaving nodes.
Existing techniques for secure communication under misbehaving nodes provide methods for reaction to misbehaviors by classifying each receiving node as either faulty or regular.For example, the authors of [19] provide a technique to divide the network links into reliable and unreliable ones and route around the region of the network being faulty, and the authors of [20] propose an approach to detect misbehaving nodes and perform coordinated channelhopping.However, the state of being faulty at each node is uncertain under random attacks, smart attacks, or stochastic software/hardware failures.Our approach incorporates the impact of potential dynamic faults into the traffic allocation and routing protocol and provides sufficient protection from stationary failures, mobile interferences, and the uncertain losses from the various environments.
Rate control stack design has been studied for the Internet in the 90s.Recently, rate control mechanisms for wireless networks are studied in [21][22][23].The basic idea is that each application attains concave utility function and, thus, is appropriate only for homogeneous traffic.Further, Lee et al. [24] show that instability may be caused by heterogeneous traffic without appropriate rate controllers.Wang et al. [12] have provided a rate control framework that is able to deal with various types of traffic, such that the resulting utility is proportional fair.All these results are based on the assumption of nonadversarial environments where each wireless node is cooperative and well-behaved.

Conclusion
In this paper, we studied the problem of traffic allocation across multiple routing paths for heterogeneous data sources in the presence of misbehaving nodes whose effects can be characterized statistically.We have presented methods for each network node to estimate the impact of misbehaving nodes and for data sources to these estimates into our traffic allocation and routing algorithm.We formulated multiplepath traffic allocation as a lossy network flow optimization problem based on leaky-path model.In order to handle heterogeneous traffic, we extended the concept of solving the lossy network flow optimization problem which maximizes effective relaxed utility function and proposed a FUFC algorithm to allocate the effective rate in lossy utility fair manner.We showed that considerable gains in effective network utility and utility fairness among heterogeneous sources are achieved by the FUFC approach.

Figure 1 :
Figure 1: An example network with heterogeneous sources.

Figure 2 :
Figure 2: The network topology of Case 1.

Figure 3 :Figure 4 :
Figure 3: The utility of flow rates at four source nodes.

Figure 11 :
Figure 11: The trend of utility.

4. Fault-Aware Utility Flow Control with Multipath Routing
for practical use.Since the source with high demand may receive a low resource, this results in applications receiving low utility.In big-data communication networks, sources with different traffic types offer various valuable information regarding the environment.In order to support numerous applications with different utility demands, the flow control strategy should have the ability to allocate traffic rates properly in order to balance the performance for different applications.When considering different QoS requirements of heterogeneous sources, it can not meet the practical demand to allocate source rate simply in terms of conventional fairness criteria.Therefore, we design a utility framework of fair flow control, which allocates source rate according to the different QoS utilities.In this framework, each source  attains a utility   ( s ), where   is the source rate.The utility function   (⋅) is assumed to be continuous, strictly increasing, and bounded in the interval [  ,   ].We define a "pseudo utility"   (  ) as   (  ) = ∫ 4.1.Utility Framework for Fair Flow Control.Even though the optimal flow control approach has made a success in dealing with resource allocation, it also processes serious limitations when different types of traffic exist in the network.If each source selects different utility functions with different QoS requirements, OFC may cause utility unfairness among contending users    , ≤  (,) ) is  , =  * , ,  , =  * , .Therefore, (23) is slightly modified by applying the new objective function: Link (, )'s algorithm At each time  = 1, 2, ..., each link (, ):(1) Aggregates flow rates  , () for all paths  , that contain link (, );(2) Computes a new link price by formula (25);(3) Communicates the new price  (,) ( + 1) to all sources whose paths  , contain link (, ).

Table 1 :
Parameter values in simulations.