Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.

Size: px
Start display at page:

Download "Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo."

Transcription

1 Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density space Acknowledgement: Many transparencies are from Mustafar Ammar s keynote talk at Co-Next

2 Traditional Wired Networks endsystem (source) router endsystem (destination) separation between endsystems and routers routers responsible for finding stable path Traditional Mobile Ad-hoc Wireless Networks (MANET) node (source) node (destination) node = endsystem + router no separation between endsystems and routers nodes responsible for finding stable path 2

3 Traditional Mobile Ad-hoc Wireless Networks (MANET) node (source) node (destination) nodes may move routing layer responsible for reconstructing (repairing) stable paths when movement occurs The Traditional MANET Wireless Paradigm The Network is Connected There exists a (possibly multi-hop) path from any source to any destination The path exists for a long-enough period of time to allow meaningful communication If the path is disrupted it can be repaired in short order Looks like the Internet above the network layer 3

4 The Rise of Sparse Disconnected Networks Sparse Wireless Networks Disconnected By Necessity By Design (e.g. for power considerations) Mobile With enough mobility to allow for some connectivity over time Data paths may not exist at any one point in time but do exist over time 4

5 Mobility-Assisted Data Delivery: A New Communication Paradigm Mobility used for connectivity New Forwarding Paradigm Store Carry for a while forward Special nodes: Transport entities that are not sources or destinations Data Applications Nicely suitable for Message-Switching Delay tolerance but can work at multiple time scale (a.k.a. Delay Tolerant Networks ) 5

6 Some Delay-Tolerant Systems ZebraNet and SWIM Data MULE and Smart-Tags Vehicle-to-Vehicle Communication DakNet Epidemic Routing Message Ferrying SWIM 6

7 Vehicles on Highways Networks Destination Source Vehicles on Highways Networks Destination Source 7

8 Vehicles on Highways Networks Destination Source DakNet (Pentland, Fletcher, and Hasson) 8

9 Epidemic Routing Vahdat and Becker Utilize physical motion of devices to transport data Store-carry-forward paradigm Nodes buffer and carry data when disconnected Nodes exchange data when met data is replicated throughout the network Robust to disconnections Scalability and resource usage problems Epidemic Routing The Idea 9

10 Epidemic Routing The Idea Epidemic Routing The Idea 10

11 Epidemic Routing The Idea message is delivered Epidemic Routing Basic Elements Each node contains Message buffer Hash table Summary vector List of last seen nodes 11

12 Epidemic Routing The Protocol [Vahdat & Becker, TechReport 200] Epidemic Routing Multiple Hops Each message contains: Unique message ID Hop count Ack request (optional) Tradeoff buffer size vs. message delivery 12

13 Epidemic Routing Evaluation Implementation in ns-2 ERA ERA ERA ERA ERA Epidemic Routing Agent IMEP IMEP IMEP IMEP IMEP Internet MANET Encapsulation Protocol IEEE MAC protocol Model of radio propagation Model of node mobility 50 mobile nodes Area 1500m x 300m Random waypoint Speed 0 20 m/s (uniformly distributed) Message size 1 KB 45 message sources/sinks (each sends one message to the others) Each second 1 message Epidemic Routing Evaluation [Vahdat & Becker, TechReport 2000] 13

14 Epidemic Routing Evaluation [Vahdat & Becker, TechReport 200] Epidemic Routing Evaluation [Vahdat & Becker, TechReport 2000] 14

15 Epidemic Routing Evaluation [Vahdat & Becker, TechReport 2000] Epidemic Routing Evaluation [Vahdat & Becker, TechReport 2000] 15

16 The Trouble with ER Potentially high-failure rate Message duplication consumes nodal resources Some mobility patterns can cause disconnection Can be improved with contact probability information - Levine et al Message Ferrying GT Zhao and Ammar Exploit non-randomness in device movement to deliver data A set of nodes called ferries responsible for carrying data for all nodes in the network Store-carry-forward paradigm to accommodate disconnections Ferries act as a moving communication infrastructure for the network 16

17 Message Ferrying The Idea MF S M S MF M D D MF Variations Ferry Mobility Task-oriented, e.g., bus movement Messaging-oriented, e.g., robot movement Regular Node Mobility Stationary Mobile: task-oriented or messaging-oriented Number of ferries and level of coordination Level of regular node coordination Ferry designation Switching roles as ferry or regular node 17

18 MF for Networks with Mobile Nodes Nodes are mobile and limited in resources, e.g., buffer, energy Single ferry is used Not limited in buffer or energy Trajectory of the ferry is known to all nodes Data communication in messages Application layer data unit Message timeout Four Approaches Non-Proactive ( = Messaging-Specific) mobility Ferrying without Epidemic Routing Ferrying with Epidemic Routing Proactive Routing Schemes Node-Initiated MF(NIMF) Nodes move to meet ferry Ferry-Initiated MF (FIMF) Ferry moves to meet nodes 18

19 Node-Initiated Message Ferrying Meet the If no, keep OK working ferry? Working Node-Initiated Message Ferrying Go to Ferry 19

20 Node-Initiated Message Ferrying Send/Recv Go to Work Node-Initiated Message Ferrying Go to Work 20

21 Mode Transition WORKING GO TO FERRY Not planned Intentional GO TO WORK SEND/RECEIVE detour: whether the node is detouring; Node Operation in NIMF mode: which mode the node is in; 1. WORKING mode detour = FALSE; IF Trajectory Control indicates time to go to the ferry, detour = TRUE; mode = GO TO FERRY; On reception of a Hello message from the ferry: mode = SEND/RECV; 2. GO TO FERRY mode Calculate a shortest path to meet the ferry; Move toward the ferry; On reception of a Hello message from the ferry: mode = SEND/RECV; 3. SEND/RECV mode Exchange messages with the ferry; On finish of message exchange or the ferry is out of range: IF detour is TRUE, mode = GO TO WORK; ELSE mode = WORKING; 4. GO TO WORK mode Move back to node s location prior to the detour; On return to the prior location: mode = WORKING; On reception of a Hello message from the ferry: mode = SEND/RECV; [Zhao et al., MobiHoc04] 21

22 Ferry Operations in NIMF 1. Move according to a ferry route; 2. Broadcast Hello messages periodically; 3. On reception of an Echo message from a node: Exchange messages with the node; [Zhao et al., MobiHoc04] Node Trajectory Control Whether node should move to meet the ferry Goal: minimize message drops and reduce proactive movement Go to ferry if Work-time percentage > threshold and Estimated message drop percentage > threshold 22

23 Simulations Ns simulations using MAC and default energy model 40 nodes in 5km x 5km area 25 random (source, destination) pairs Node mobility random-waypoint with max speed 5m/s Message timeout: 8000 sec Single ferry with speed 15m/s Rectangle ferry route Performance Metrics Message delivery rate Message Delay Number of delivered messages per unit energy Only count transmission energy in regular nodes 23

24 Message Delivery Rate FIMF NIMF F w/er ER Mes s age delivery rate Epidemic Routing 0.2 E pidemic R outing (w/ ferry) NIMF 0.1 FIMF- NN FIMF- TA Node buffer size (messages) Message Delay FIMF NIMF F w/er ER Mes s age delay (s ec ) Epidemic Routing E pidemic R outing (w/ ferry) 500 NIMF FIMF- NN 0 FIMF- TA Node buffer size (messages) 24

25 Impact of Node Mobility Pattern Mobility Model Scheme Delivery Rate Delay (sec) Energy efficiency (KB/J) Random Waypoint Limited Random Waypoint NIMF FIMF ER(w/ ferry) ER NIMF FIMF ER(w/ ferry) ER Where Does MF Fit? Consider the space of wireless mobile networks Two Important Dimensions Relative Mobility Density 25

26 Some Terminology A Space Path: A multi-hop path where all the links are active at the same time A Space/Time Path: A multi-hop path that exists over time NOTE: S path is a special case of S/T path See Example A Space Paths Network 26

27 Example A No Path Network Example A Space Time Path 27

28 Example A Hybrid Network The Mobile Wireless Space High Relative Mobility Hybrid Environments Space/Time Paths Low Space Paths No (Space/Time) Paths High Node Density Low 28

29 Mapping Solutions to Space High Mobility MF is applicable for the entire space Hybrid Environments Space/Time Paths MF is necessary here Low Space Paths Traditional MANET solutions apply here No (Space/Time) Paths High Node Density Low MAC Layer Support for Delay Tolerant Video Transport in Disruptive MANETs Morten Lindeberg, Stein Kristiansen, Vera Goebel and omas Plagemann University of Oslo, Department of Informatics [mglindeb, steikr, goebel, 29

30 Background and Motivation Emergency and rescue scenarios Video streaming services can improve communication and operational efforts E.g., firemen wearing head-mounted cameras Infrastructure destroyed or not existing Solution: Mobile ad hoc networks with possible disruptions 59 Target Scenario Mimic realistic scenario Enforce store-carry-forwarding 500 m Sr I 1 Sr - Source node I x - Intermediate node(s) Cr x- Carrier node(s) CCC - Command Control Center I 2 Cr 1 Cr 2 CCC 500 m I 3 Location of the accident I 5 I 4 Command and control center Distance=1750 m 60 30

31 Use existing technology? Video encoding: H.264 significantly reduce bandwidth requirements Transport: TCP does not work well Network: IP + MANET routing: OLSR Wireless: IEEE ad hoc mode 61 Transport: Overlay Solution A delay tolerant overlay Store-carry-forward paradigm Dts-Overlay Inspired by MOMENTUM [1] Messages are sent hop-by-hop Route through carrier nodes when no route exist Dts-Overlay <OverlayMessage> Dts-Overlay Problem: packet loss Rejected packets + Retransmission queue status [1] Cabrero, S., Paneda, X.G., Plagemann, T., Goebel, V.: Overlay solution for multimedia data over sparse MANETs. In: International Wireless Communications and Mobile Computing Conference, IWCMC (2009) Route UDP availability UDP + MAC address IP / OLSR /ARP status IP / OLSR MAC MAC (IEEE a/b) (IEEE a/b) PHY 62 PHY (IEEE a/b) (IEEE a/b) Node 1 Node 2 31

32 Packet loss OLSR routes with broken links In essence, lower layers are not delay tolerant Address Resolution Protocol (ARP) 1. ARP will loose packets if no nodes reply with matching MAC address to the broadcasted IP address IEEE MAC Packets silently dropped after final retransmission 2... or if queue exceeds limit 63 Solution ARP Support: Avoid packet loss by only forwarding when address is resolved MAC Support (IEEE b): MAC Return: Do not drop packet after final retransmission, hand it to Dts-Overlay Link Adapt: Do not forward if the MAC transmission queue is filling (link is probably down) Reduce non-meaningful re-transmissions (MAC re-transmission limit) 64 32

33 Implementation Implemented in ns-3 (network simulator) Workload: Foreman CIF resolution (352x288) 12 second duration on repeat H.264 baseline profile Target bitrate 256 kb/s Wireless model: IEEE b ad hoc mode DSSS modulation Friis propagation loss model Constant speed propagation delay model 65 Evaluation Metrics: 1. Packet reception (Rxv) 2. Buffered packets (Buf) 3. Packet loss (Pl) 4. Sum of bytes (video) at PHY layer (Txtot) Present average from five different runs 3600 s duration Main-Studies (3600 s duration): ER (custom scenario) Sparse MANET (1250 m x 1250 m, 20 nodes, random walk) Dense MANET (250 m x 250, 20 nodes and additional workload, random walk) 66 33

34 Results: Pre-Study Address Resolution Affect packet loss substantially! We achieve lowest packet loss with Dynamic ARP!.. wait for ARP resolution before using a link Default Static Dynamic Pl 39.3 % 31.7 % 19.5 % 67 Configurations C3 C4 C5 C6 C7 Re-trans MAC Return No No No Yes Yes Link Adapt No No Yes No Yes 68 34

35 100 % Lowering retransmission limit cause packet loss 90 % 80 % 70 % 60 % 50 % 40 % 30 % 20 % 10 % 0 % Deploying Link Adapt does not affect packet reception much MAC Return close to eliminates all Results: packet loss ER C3 C4 C5 C6 C7 Link Adapts improves further, even reduces total transmission ov by 4% Pl Buf Rx 69 MAC Return improves reception Results: Sparse MANET Tendencies are the same, high standard deviation (mobility) Switch to single run Packet count (#) Sent C3 C4 C5 C6 C7 Tx t (MB) C3 C4 C5 C6 C7 With even less transmissions than default configuration Time (s) Time (s) 70 35

36 Results: Dense MANET Not much loss really, although some duplicates for MAC Return TxTot (MB) C3 C4 C5 C6 C7 Link Adapt has strong effect on transmissions TxTot (MB) 71 Conclusion MAC Support Evaluation: MAC Return drastically reduce packet loss Allow us to lowering MAC retransmission limit Link Adapt lowers overhead of transmissions that are not meaningful Usability is strengthened through evaluation also in a dense MANET 72 36

37 Summary Background, motivation, overview Epidemic routing Message ferrying Mobility/density space Acknowledgement: Many transparencies are from Mustafar Ammar s keynote talk at Co-Next

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo. Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density

More information

T Computer Networks II Delay Tolerant Networking (DTN)

T Computer Networks II Delay Tolerant Networking (DTN) T-110.5111 Computer Networks II Delay Tolerant Networking (DTN) 25.11.2013 Matti Siekkinen Large part based on slides by: Thomas Plagemann: Message Routing & Event Notification in Sparse Mobile Networks

More information

A Message Ferrying Approach for Data Delivery. How to deliver data in sparse networks

A Message Ferrying Approach for Data Delivery. How to deliver data in sparse networks A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Wenrui Zhao, Mostafa Ammar, and Ellen Zegura College of Computing, Georgia Institute of Technology MobiHoc 2004 Presented

More information

UNIVERSITY OF OSLO Department of Informatics. Dynamic Selection of Message Carriers in a Sparse and Disruptive MANET.

UNIVERSITY OF OSLO Department of Informatics. Dynamic Selection of Message Carriers in a Sparse and Disruptive MANET. UNIVERSITY OF OSLO Department of Informatics Dynamic Selection of Message Carriers in a Sparse and Disruptive MANET Jan Erik Haavet November 7, 211 Acknowledgement I would really like to thank my supervisors:

More information

A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks

A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Wenrui Zhao, Mostafa Ammar and Ellen Zegura College of Computing, Georgia Institute of Technology, Atlanta, Georgia 3332 {wrzhao,

More information

ACICE-2013 ISSN: ; e-issn

ACICE-2013 ISSN: ; e-issn 1022 A Novel Ferry-Initiated Message Ferrying Approach for Data Delivery in Disconnected Mobile Ad Hoc Networks through Native Ferries K. MURALIDHAR 1, N. GEETHANJALI 2 1 Assistant Professor, Department

More information

Epidemic Routing for Partially-Connected Ad Hoc Networks

Epidemic Routing for Partially-Connected Ad Hoc Networks Epidemic Routing for Partially-Connected Ad Hoc Networks Presented By- Kannan Chandrasekaran MS Computer Science, EECS, University of Kansas, Lawrence. Email: kannanc@ku.edu Amin Vahdat and David Becker,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob

More information

Delay Tolerant Networks

Delay Tolerant Networks Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected

More information

Analysis of TCP and UDP Traffic in MANETs. Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio

Analysis of TCP and UDP Traffic in MANETs. Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio Analysis of TCP and UDP Traffic in MANETs Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio MANET Routing Protocols Proactive protocols Maintain routes to all nodes Distance vector, link

More information

ITTC A Geographical Routing Protocol for Highly-Dynamic Aeronautical Networks

ITTC A Geographical Routing Protocol for Highly-Dynamic Aeronautical Networks A Geographical Routing Protocol for Highly-Dynamic Aeronautical Networks Kevin Peters, Abdul Jabbar, Egemen K. Çetinkaya, James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Dimitri Marandin 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" 27.-28. July 2004 www.ifn.et.tu-dresden.de/tk/

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

UNIVERSITETET I OSLO Institutt for informatikk. Broad An Extensive Network Simulation Visualization Tool. Cristobal Emilio Dabed

UNIVERSITETET I OSLO Institutt for informatikk. Broad An Extensive Network Simulation Visualization Tool. Cristobal Emilio Dabed UNIVERSITETET I OSLO Institutt for informatikk Broad An Extensive Network Simulation Visualization Tool Cristobal Emilio Dabed 15. februar 2012 Abstract Wireless technology and relative powerful mobile

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR) IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 06, Issue 11 (November. 2016), V1 PP 25-29 www.iosrjen.org Performance Comparison of Mobility Generator and MOVE using

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

DTN Interworking for Future Internet Presented by Chang, Dukhyun

DTN Interworking for Future Internet Presented by Chang, Dukhyun DTN Interworking for Future Internet 2008.02.20 Presented by Chang, Dukhyun Contents 1 2 3 4 Introduction Project Progress Future DTN Architecture Summary 2/29 DTN Introduction Delay and Disruption Tolerant

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

The Performance of MANET Routing Protocols for Scalable Video Communication

The Performance of MANET Routing Protocols for Scalable Video Communication Communications and Network, 23, 5, 9-25 http://dx.doi.org/.4236/cn.23.522 Published Online May 23 (http://www.scirp.org/journal/cn) The Performance of MANET Routing Protocols for Scalable Video Communication

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK

COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK COMPARE AND CONTRAST OF AODV ROUTING PROTOCOL WITH E-AODV FOR WIRELESS MOBILE ADHOC NETWORK 1 Ranjana Kukkar, 2 Kulbhushan Rassewatt, 3 Rahul Malhotra GTB KHALSA INSTITUTE OF ENGINEERING AND TECHNOLOGY,

More information

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network Author manuscript, published in "ITCom 6 - next generation and sensor networks, Boston : United States (26)" DOI :.7/2.68625 Performance evaluation of reactive and proactive routing protocol in IEEE 82.

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks

Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks 2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Performance Evaluation of Routing Protocols for Mobile Ad Hoc Networks Hina Tariq 1, Urfa Suhaib

More information

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,

More information

Some Routing Challenges in Dynamic Networks

Some Routing Challenges in Dynamic Networks Some Routing Challenges in Dynamic Networks Jie Wu Dept. of Computer and Information Sciences Temple University Overview 1. Current State of Networking More Wireless Mobile and Opportunistic Applications

More information

Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms

Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms Wenrui Zhao, Mostafa Ammar and Ellen Zegura College of Computing, Georgia Institute of Technology, Atlanta, Georgia 3332

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems

ECE 598HH: Special Topics in Wireless Networks and Mobile Systems ECE 598HH: Special Topics in Wireless Networks and Mobile Systems Lecture 21: Opportunistic Routing Haitham Hassanieh *These slides are courtesy of Dina Katabi 1 Lecture Outline Single Path Routing Opportunistic

More information

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Literature survey on Improving AODV protocol through cross layer design in MANET A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

I. INTRODUCTION. Keywords-disruption tolerant networks; custody transfer; route discovery; message ferry

I. INTRODUCTION. Keywords-disruption tolerant networks; custody transfer; route discovery; message ferry Performance Comparison of Unicast Routing Schemes in DTNs Mooi Choo Chuah, Peng Yang, Brian D. Davison, Liang Cheng {chuah, pey204, davison, cheng}@cse.lehigh.edu Lehigh University Abstract Delay and disruption

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks Middle-East Journal of Scientific Research 23 (Sensing, Signal Processing and Security): 291-296, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.ssps.111 Buffer Aware Network

More information

Performance Evaluations of Various Message Ferry Scheduling Schemes with Two Traffic Classes Mooi Choo Chuah

Performance Evaluations of Various Message Ferry Scheduling Schemes with Two Traffic Classes Mooi Choo Chuah Performance Evaluations of Various Message Ferry Scheduling Schemes with Two Traffic Classes Mooi Choo Chuah Peng Yang Department of Computer Science and Engineering Department of Computer Science and

More information

CHAPTER 7 COMPARISON OF DIFFERENT ROUTING SCHEMES

CHAPTER 7 COMPARISON OF DIFFERENT ROUTING SCHEMES 80 CHAPTER 7 COMPARISON OF DIFFERENT ROUTING SCHEMES 7.1 PERFORMANCE METRICS In the preceding chapters data delivery rate, buffer space, node density and message delay, average hop count, average buffer

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8] 192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer

More information

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios Contemporary Engineering Sciences, Vol. 7, 2014, no. 12, 559-567 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4436 Evaluation of Ad-hoc Routing Protocols with Different Mobility Models

More information

Integrated Buffer and Route Management in a DTN with Message Ferry

Integrated Buffer and Route Management in a DTN with Message Ferry Integrated Buffer and Route Management in a DTN with Message Ferry Mooi Choo Chuah Wen-Bin Ma chuah@cse.lehigh.edu wem2@.lehigh.edu Department of Computer Science and Engineering 19 Memorial Drive West,

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

Evaluation of Information Dissemination Characteristics in a PTS VANET

Evaluation of Information Dissemination Characteristics in a PTS VANET Evaluation of Information Dissemination Characteristics in a PTS VANET Holger Kuprian 1, Marek Meyer 2, Miguel Rios 3 1) Technische Universität Darmstadt, Multimedia Communications Lab Holger.Kuprian@KOM.tu-darmstadt.de

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE)

Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Synthesizing Adaptive Protocols by Selective Enumeration (SYNAPSE) Problem Definition Solution Approach Benefits to End User Talk Overview Metrics Summary of Results to Date Lessons Learned & Future Work

More information

FFRDV: Fastest-Ferry Routing in DTN-enabled Vehicular Ad Hoc Networks

FFRDV: Fastest-Ferry Routing in DTN-enabled Vehicular Ad Hoc Networks FFRDV: Fastest-Ferry Routing in DTN-enabled Vehicular Ad Hoc Networks Danlei Yu and Young-Bae Ko School of Information and Computer Engineering, Ajou University, Suwon, Republic of Korea yudanlei@uns.ajou.ac.kr,

More information

Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR

Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on Mr. Nirav Bhatt, Dr. Dhaval Kathiriya Reaserch Scholar, School of Computer Science, RK University, Rajkot Director IT,

More information

Distributed System Chapter 16 Issues in ch 17, ch 18

Distributed System Chapter 16 Issues in ch 17, ch 18 Distributed System Chapter 16 Issues in ch 17, ch 18 1 Chapter 16: Distributed System Structures! Motivation! Types of Network-Based Operating Systems! Network Structure! Network Topology! Communication

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

Opportunistic Routing Algorithms in Delay Tolerant Networks

Opportunistic Routing Algorithms in Delay Tolerant Networks Opportunistic Routing Algorithms in Delay Tolerant Networks Eyuphan Bulut Rensselaer Polytechnic Institute Department of Computer Science and Network Science and Technology (NeST) Center PhD Thesis Defense

More information

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP

Outline. Connecting to the access network: DHCP and mobile IP, LTE. Transport layer: UDP and TCP Outline Connecting to the access network: DHCP and mobile IP, LTE Transport layer: UDP and TCP IETF TCP/IP protocol suite User application, e.g., http with Mozilla Communication for each process on computer

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

On-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density

On-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density On-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density Presented by Wei-Cheng Xiao Advisor: David B. Johnson 2015/03/30 Wireless Network Infrastructure Mode Internet access point

More information

IMPROVING QoS IN DELAY TOLERANT MOBILE AD HOC NETWORK USING MULTIPLE MESSAGE FERRIES

IMPROVING QoS IN DELAY TOLERANT MOBILE AD HOC NETWORK USING MULTIPLE MESSAGE FERRIES IMPROVING QoS IN DELAY TOLERANT MOBILE AD HOC NETWORK USING MULTIPLE MESSAGE FERRIES R. C. Suganthe Professor Department of Computer Science and Engineering Kongu Engineering College, Perundurai-638 052,

More information

Module 16: Distributed System Structures

Module 16: Distributed System Structures Chapter 16: Distributed System Structures Module 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Analysis and Design of Effective and Low-Overhead Transmission Power Control for VANETs

Analysis and Design of Effective and Low-Overhead Transmission Power Control for VANETs Analysis and Design of Effective and Low-Overhead Transmission Power Control for VANETs, Felix Schmidt-Eisenlohr, Moritz Killat, Jérôme Härri, Hannes Hartenstein Decentralized Systems and Network Services

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse

More information

Secure Routing and Transmission Protocols for Ad Hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks

More information

Module 16: Distributed System Structures. Operating System Concepts 8 th Edition,

Module 16: Distributed System Structures. Operating System Concepts 8 th Edition, Module 16: Distributed System Structures, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Routing in Delay Tolerant Networks (DTN)

Routing in Delay Tolerant Networks (DTN) Int. J. Communications, Network and System Sciences, 2011, 4, 53-58 doi:10.4236/ijcns.2011.41006 Published Online January 2011 (http://www.scirp.org/journal/ijcns) Routing in Delay Tolerant Networks (DTN)

More information

SELECTION OF METRICS (CONT) Gaia Maselli

SELECTION OF METRICS (CONT) Gaia Maselli SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual

More information

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014 Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department

More information

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based

More information

CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK

CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK CROSS LAYER USING END-TO-END DELAY ASSESSMENT FOR ROUTING PROTOCOL IN VEHICULAR AD HOC NETWORK Le Van Minh a,b, Yang MingChuan a, and Guo Qing a a Communication research center, Harbin Institute of Technology,

More information

IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching

IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching IP Packet Switching CS 375: Computer Networks Dr. Thomas C. Bressoud Goals of Todayʼs Lecture Connectivity Links and nodes Circuit switching Packet switching IP service model Best-effort packet delivery

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

Makidis Michael.

Makidis Michael. Makidis Michael mmakidis05@aueb.gr RLC protocol overview procedures Simulation setup Performance of applications without contention Performance of applications with contention Performance of CBR Media

More information