Virtual Segment: Store-Carry-Forward Relay-Based Support for Wide-Area Non-Real-time Data Exchange

Size: px
Start display at page:

Download "Virtual Segment: Store-Carry-Forward Relay-Based Support for Wide-Area Non-Real-time Data Exchange"

Transcription

1 2009 International Conference on Intelligent Networking and Collaborative Systems Virtual Segment: Store-Carry-Forward Relay-Based Support for Wide-Area Non-Real-time Data Exchange Shinya Yamamura Akira Nagata Service Platform Architecture Research Center National Institute of Information and Communications Technology Tokyo, Japan Masato Tsuru Hitomi Tamura Network Design Research Center, Kyushu Institute of Technology Fukuoka, Japan Abstract In the Internet of the future, a flexible, dynamic combination of wireless and wired access networks is expected to be a key driver for enlarging the broadband communication service area. However, in general, the number of broadband wireless access points is limited due to their cost, and hence, they cannot cover the whole network. On the other hand, various message delivery schemes based on store-carry-forward routing with some extensions have been studied to support nonreal-time communication in sparse or intermittent networks. However, communication services based solely on the storecarry-forward schemes covering a large area are inefficient because the delay time for message delivery increases in proportion to the size of the service area. Therefore, to extend the communication service area with controllable performance in a cost-effective manner, the authors have proposed a concept of Virtual Segment (VS) in which global communication service is provided by combining a store-carry-forward scheme with broadband wireless/wired network infrastructures connected to the Internet to deploy the supplementary infrastructure. Along this line, in the present paper, the issues on the addressing and the message transfer methods in VS approach are considered which are essential for designing a practical framework for non-real-time, asynchronous data communication, especially for large-sized message transfer. A logical architecture for implementation is also presented. Finally, the message transmission methods are examined using computer simulation. Keywords-DTN; store-carry-forward routing schemes; wireless communication; addressing; retransmission; I. INTRODUCTION The Internet Research Task Force (IRTF) Disruption Tolerant Networks Research Group (DTNRG) and related research work have proposed different types of store-carryforwarding routing schemes. Epidemic routing [1][5] is the basic concept, where the Throw Box[2], Data Mules[3], and Message Ferry[4] are taken from currently available solutions for accelerating the store-carry-forwarding routing schemes. The authors have proposed a concept of Virtual Segment[7], based on an idea of combining broadband network infrastructures (connected to the Internet) that have a high data rate but a small coverage area with a storecarry-forward routing scheme that can roughly plug the gaps in broadband service areas. We are aiming to design and develop a practical framework that supports asynchronous Relay Node R1 Figure 1. IBN Virtual Segment «««««Virtual Segment 1 R1 Correspondent Node CN1 Core Network Egress Base Node Virtual Segment 2 «road Virtual Segment 3 Virtual Segment 4 A conceptual example of the proposed system large-sized data exchange among users or from/to the Internet by segmenting the entire communication area so as that a store-carry-forward routing scheme could be efficiently adopted within each segmented area. In particular, the possibility of building a new network infrastructure with vehicles that have wireless communication devices is considered. Figure 1 shows a conceptual example of the proposed system in our previous work[7]. The basic idea is to carefully divide the entire service area into a certain number of properly formed segments along the road and regard them as virtual hot-spots, which are denoted as virtual segments in Figure 1. These virtual segments are then persistently connected to wired/wireless networks to form a core network, as shown in Figure 1. The three types of communication nodes are: a correspondent node (CN) representing each stationary or mobile communication user; a relay node (RN) representing a vehicle that traverses roads and has the ability to store, carry, and forward messages from/to CNs; and a base node (BN) representing a stationary gateway that is normally located at the edge of a virtual segment and communicates with and controls the relay nodes passing R /09 $ IEEE DOI /INCOS

2 near the BN and also stores the messages to be collected and delivered. Each BN has two roles. The first role is as an Ingress BN that collects and distributes messages from the Internet to the CN and asks the relay nodes to carry the messages. The second role is as an Egress BN that collects the messages from relay nodes and may store them for retransmission. The proposed framework was evaluated using a simple computer simulation [7] and field trials, from which it was confirmed that the proposal could be scaled by making a trade-off between the cost and the allowable delivery delay time. We should note that the proposed framework aims at the supplementary infrastructure for non-real-time, asynchronous but global (i.e., Internet-wide) information services. For instance, the asynchronous RSS delivery to many CNs in many segments should be archived in our framework, involving a question how to efficiently and reliably exchange a number of variable-sized inter-dependent messages. Therefore, in contrast to a variety of existing store-carry-forward routing studies, which often focus on efficiency in simply exchanging a number of independent messages inside a closed region, more sophisticated message transmission methods are required, including the retransmission control and buffer management taking account of a unique structure composed of three distinct roles: BN, RN, and CN. For example, as BNs can cooperatively maintain a complete list of messages exchanged in the segment and mostly confirm the delivery in VS, unnecessary copy and forwarding of a message may be avoided. Note that it is necessary to combine dynamic detection (identification) in contacting with neighboring nodes, addressing, and message transmission scheduling with fairness among users (destinations). Mansy et al.[6] investigated a detailed retransmission mechanism with data fragmentation wherein messages were carried between two nodes along a road by a vehicle passing through the road. This mechanism can be used in transferring a message between a CN and a BN, but not directly be applied to in exchanging messages among multiple BNs and multiple CNs in a VS by relay nodes. We should tackle the following issues. (i) Arrangement of the segments (locations of BNs), (ii) Message transmission methods between BN and CN, as well as between CN and RN; (iii) Retransmission mechanisms for undelivered messages; (iv) Intersegment communication schemes (addressing and routing); and (v) Control of authentication, authorization, and accounting (or other security-related issues). This paper will consider the issues raised in points (ii), (iii), and (iv). For points (ii) and (iii), the message transmission methods will be examined with a particular emphasize on the efficiency in delivering messages to multiple CNs within a closed region using the store-carry-forward routing scheme. For (iii), an addressing scheme for nodes in virtual segments with a late binding approach is proposed. The rest of the paper is organized as follows. Section 2 presents the addressing method in the virtual segment, while Section 3 considers efficient transmission in the store-carryforward routing scheme and shows the evaluation result obtained from computer simulations. Section 4 presents the proposed implemental architecture. Finally, Section 5 presents the key conclusions of this paper. II. ADDRESSING A global DTN world in which each end-node (source and destination of messages) has a unique global identifier called End-point ID (EID) is assumed. Hence, each correspondent node can be identified by its EID. In the proposed virtual segment, two types of address resolution are needed. The first type of address resolution is addressing in a segment, which is needed so that the relay node may forward the message to the CN. This addressing is achieved by the segment management node (SMN), which maintains mapping information between the CN s EID and the IP address, as well as additional information necessary for the relay node to communicate with the CN. The second type of address resolution is addressing for message delivery among segments. This addressing is required to allow the SMN to forward a message to the CN in another segment. This is achieved by composing the system on the backbone core network to manage the mapping between the EID of the CN and the EID of the SMN that manages the segment consisting of the CN. Figure 2 shows the addressing and relation in VS, DTN region, and the Internet. BNs that belong to each virtual segment are managed by the SMN. The SMN manages the global identifier EID of the CN in the segment and its corresponding IP address. This mapping information is called Local Binding. The root node (root) manages the correspondence of the global identifier of the CN and the global identifier of the SMN of the virtual segment that consists of the CN. This mapping information is called Segment Binding. The root node is the most significant node in the hierarchical mapping in the proposed method, and it functions as a gateway to other regions. Similarly to Domain Name System (DNS) in the Internet, layering and load-balancing can be done on the basis of the topological structure of all of the segments. Due to the nature of storecarry-forward routing, the CN is not necessarily active when a message to the CN is sent. Therefore, the message that cannot be addressed at a given moment is kept by the root node for a certain period. The application gateway (AGW) is a node that becomes a gateway when the node communicates with existing Internet applications. Now, the detailed addressing mechanism of each node that exists in the segment is explained. The conventional IEEE Wireless LAN is assumed for communication among nodes. Relay node addressing The relay node operates as a client of wireless communications. The relay node is assumed to know the common 367

3 BN Figure 2. Local binding SMN Private address space RN segment CN Segment binding BN Root BN AGW Global address space «bone SMN Private address space RN segment CN BN Internet Addressing and relation in VS, DTN region, and the Internet Service Set Identifier (SSID) and security information of all wireless access points where the virtual segment is composed beforehand by negotiating a contract with the service provider. When the relay node accesses a wireless access point of the BN, the IP address is automatically distributed by the DHCP. The IP address space (subnet) needs neither to be global nor be specific to each segment. The BN and CN notify a global identifier and IP address as link information to the relay node when coming in contact with it. Note that the relay node receives some messages to be delivered within the segment from an Ingress BN when it enters the segment, and forwards all messages received from the CN to the Egress BN when it exits the segment. CN addressing The CN operates as a wireless access point and dynamically detects the relay node. No static link information is set beforehand at the CN, and the route table is set such that the CN may forward all messages to the relay node when the two come in contact. The CN transmits all messages to the relay node, regardless of the address of the actual message requested by the application. BN addressing The BN also operates as a wireless access point, and it recognizes the relay node on the basis of segment registration after establishing the communication link from the relay node. The BN returns the message to the CN as a response to the segment registration message. III. MESSAGE TRANSMISSION METHODS A. Message transmission mode of the store-carry-forward routing in the DTN2 implementation The DTN Research Group (DTNRG) of IRTF has opened the reference implementation (DTN2) for the store-carryforward routing scheme to the public. Flooding type and static-routing type are implemented as the basic message transmission modes. For instance, the transmission mode of flooding type is used in epidemic routing. This method transmits the copy of a message to all the nodes when a link is established. The buffered message is deleted when the timer expires. Since this method is not aware of the properties of messages, there is no chance to control priority or fairness based on a property (e.g., destination nodes on buffering the message to multiple nodes). Static routing type is used by which a message is transmitted based on its destination address when the interface link related to the send queue connects. Both of two types are insufficient to implement the transmission mechanisms for the VS nodes. B. Requirements of transmission methods in the Virtual Segment The requirements for message transmission by the two types of nodes are shown below. Ingress Base Node (IBN) The IBN should forward buffered messages bound for multiple CNs to an arbitrary relay node (RN) that is dynamically detected. After transmitting a message, the method may not delete the message from the buffer for retransmission. On the other hand, because the number of buffered messages increases with time, an appropriate replacement of the buffered messages is necessary to forward them to a RN during a limited contact time. Since the address information of the next RN is not known in advance, static routing cannot be applied. Relay Node The relay node looks for and contacts with CNs by switching the wireless link to each CN along with traversing the road. When multiple CNs are very closely located, the relay node should contact with and transmit messages to those CNs simultaneously. In such a case, there is a possibility that the transmission of the following messages to other CNs fails if a large-sized proceeding message to a certain CN is transmitted, leading to unfairness. C. Transmission methods for the Virtual Segment Neither simple flooding nor static routing is suitable for message transmission in the virtual segment, as explained in the previous section. Thus, three new methods that can be adapted to the virtual segment are proposed and evaluated for effectiveness using computer simulation. 1) Simple First In, First Out (SFIFO): In this method, when the message is transmitted to the next hop, the message is simply deleted from the buffer. The node has one send queue, and it monitors the link to the address of the head message of the send queue. If it is possible to communicate with the address, the node detaches the message from the head of the send queue and transmits the message to the link. When communication is interrupted before completing the transmission, the node attaches the remainder of the message to the head of the send queue. Next, when it encounters another node, the node restarts the transmission of the message from the breakpoint. 368

4 2) Periodical Queue Search (PQS): In this method, the node has one send queue, and it sequentially detaches the message from the queue head at a constant interval. If the link to the addresses of the detached message is active, the node transmits the message to the address. When the link is inactive, the node attaches the message to the tail of the send queue. When communication is interrupted, the node attaches the remainder of the message to the tail of the send queue. 3) Periodical Queue Search with Round Robin (PQSRR): In this method, the node has the send queue of each address, which can be dynamically changing, and a physical destination. The node refers to all the send queues in a round-robin manner and processes the message with FIFO in each queue. The PQSRR has a virtual queue for each address based on the node, unlike in PQS. The fairness of message sending can be expected to be better because it will change during processing to other nodes, even if there is a large-sized data message to a certain specific node. D. Outline of the simulation A computer simulation was performed to investigate and evaluate the three transmission methods. For simplicity, message loss is not considered at this stage. The outline of the simulation is as follows: The communication in one virtual segment is simulated. Each message arrives at a BN, and is delivered to a CN in the segment via RN, that is, the download scenario is examined. The simulation is time-driven and its unit time is one second. The transmission and reception processing of the message data at each node is executed within the range of the communication. The volume of the transmitted message is calculated from the transmission rate of wireless communication and the length of time during which the two nodes are within the communication range. The operation of the bundle layer conforms to the DTN2 implementation. The message loss rate is zero. The remainder of the message that is not completely delivered is received by an EBN and distributed to other BNs as IBN. Figure 3 shows the screen shot of the simulation visualization tool. A dotted circle shows the wireless communication range of the RN. A circle shows the wireless communication range of the CN or the BN. An arrow shows the message request from the BN to CN, and dotted arrow shows the physical message transmission form the RN to the CN. E. Evaluation of the transmission methods The three proposed transmission methods were simulated for different combinations of base nodes and relay nodes that forwarded to them using the conditions listed in Table I. BN_01 Figure 3. RN_02 CN_01 RN_01 segment length CN_02 distance from the road BN_02 The screen shot of the simulation visualization tool Figure 4. Comparison of the average delay time as a function of the number of transmission methods Each BN or CN can exchange 25 MB of data with a relay node during one contact. Thus, an encounter with one relay node is needed for delivering a 5-MB message, while at least four relay nodes are needed for a 100-MB message. Figure 4 shows the simulation result. From the simulation result, it can be inferred that the delay time increases when the relay node that uses the SFIFO transmission method. However, when both the base nodes and relay nodes implement SFIFO, the difference in delay time is no different from any other Figure 5. The average delay time variation as a function of the message size distribution 369

5 Table I SIMULATION CONDITIONS Condition Segment length Simulation execution time Final message send time The number of correspondent nodes Traffic of vehicle Vehicle speed Average message interval for CN Message size Value 1000 (m) 7200 (s) 1800 (s) 10 (units) 100 (units/hour) 10 (m/s) 300 (s) mixedwith5mb(90%) and 100 MB (10%) Traffic intensity combination of transmission methods. As a result, it can be observed that the relay node should implement a transmission method other than SFIFO, although the transmission method implemented by IBN does not have a big impact on the average delay time. Thus, three combinations of the same transmission method were evaluated in greater detail using the same conditions except for message size. Figure 5 gives the comparative result for the variation in fixation, the Poisson distribution, and the exponential distribution of the message size when the average data size of the message to the CN is 30 MB. Figure6 shows the results as a function of the arrival rate of the message when the message size comes from an exponential distribution with a mean size of 30 MB. The average message interval value range is from 550 (sec) to 950 (sec). The average delay time for PQS and PQSRR is small, and as the data size increases, it is clear that the effect of PQS and PQSRR is quite noticeable when compared to SFIFO. There is a slight difference between PQS and PQSRR, in that when the message size range is wide, PQSRR is more effective. As for SFIFO, when the average message arrival rate increases, the average delay time increases considerably. As a result, it can be confirmed that a time-sharing approach, for example in a round-robin manner, is necessary for message delivery to multiple addresses in the virtual segment. The average communication delay time based on the variation of the message fragment size and the location distribution of the CNs was considered. A brief summary of the results follows. In general, it is effective to maximize the fragment size within a range such that fairness is not compromised. It should be noted that further research should be done to determine the optimum message size. As well, the average communication delay time increases when there are a considerable number of correspondent nodes in the segment. Thus, it was found that to realize efficient delivery scheduling of the message from the IBN to the relay node, the location of the CN along the road within the segment should be considered. Figure 6. The average delay time variation as a function of the average arrival rate of the message IV. LOGICAL ARCHITECTURE PROPOSAL This paper considered address resolution and a message transmission method in the virtual segment and carried out a preliminarily evaluation of the proposed method. On the basis of the evaluation results, a logical node architecture is suggested for the proposed method. Figure 7 shows the node architecture used in the virtual segment. The architecture is common for three types of nodes. The message decoder is a functional block where the message fragmented by SME is restored, and the ARQ/fragment manager is a functional block where retransmission is controlled and the message is fragmented. The received message is detached from the receiving queue of the bundle layer with FIFO, and if the message is addressed to the receiving node itself, the message is passed to the message decoder, and the ARQ/fragment manager reassembles the fragmented message. Otherwise, the node passes the message to the scheduler to forward it to other nodes. The logical send queue is the same as a virtual queue of the PQRSS transmission method. The scheduler decides the transmission schedule on the basis of the segment information notified from the segment manager, as in the example using segment information as described in the previous section. The logical send queue can function as a hash table during actual implementation, and it is likely to become more complex since it uses the ARQ method for retransmission, although a simple queue was used in the simulation conducted for the evaluation. The segment manager is a functional block for address resolution, and it dynamically sets the link and the route to the bundle layer by exchanging a pair of IP address and EID between nodes according to its role, as previously explained in this paper. It is necessary to enhance the information exchange for this address resolution of the segment manager for ARQ and achieve efficient transmission scheduling. For 370

6 SME Segment Management Extension Bundle layer receiving queue Application layer registration delivery Message decoder request queue reassemble queue segment information ARQ/Fragment manager Segment manager ack. vector segment information logical rend queue exchange Scheduler segment information physical send queue Router/Forwarder dynamic setting Transport layer [3] R. Shah, S. Roy, S. Jain, W. Brunette, Data MULEs: Modeling a Three-Tier Architecture for Sparse Sensor Networks., In Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp [4] W. Zhao, M. Ammar, Message Ferrying: Proactive Routing in Highly-partitioned Wireless Ad Hoc Networks., In Proceedings of Ninth IEEE Workshop on Future Trends., 2003, pp [5] T. Matsuda, T. Takine, (p,q)-epidemic Routing for Sparsely Populated Mobile Ad Hock Networks., Selected Areas in Communications, IEEE Journal, vol.28, 2008, pp [6] A. Mansy, M. Ammar, E. Zegura, Reliable roadside-toroadside data transfer using vehicle traffic., In Mobile Ad hoc Sensor Systems, MASS 2007, pp Figure 7. Node architecture in the Virtual Segment instance, the log of the heartbeat between the correspondent node and the relay node or vector-based ACK notification is considered as enhanced information. [7] S. Yamamura, A. Nagata, M. Uchida, and M. Tsuru, Virtual Segment: Segmentation Method for Store-carry-forward Routing Schemes., In Proceedings of the First Workshop on Wireless Broadband Access for Communities and Rural Developing Regions, 2008, pp V. CONCLUSIONS The issues on the addressing and the message transfer methods in Virtual Segment approach were discussed, for designing a practical framework for non-real-time, asynchronous, and large-sized data communication. We considered three transmission methods in which address resolution is combined with schedule management. They were evaluated through computer simulation by examining how suitable to store-carry-forward routing-based message delivery to multiple correspondent nodes that exist in a closed region, e.g., a virtual segment. Evaluation results gave us some insight for further designing. A logical node architecture for the virtual segment was also provided. Future work will consider more effective transmission methods with detailed implementations, which includes considering packet loss on the wireless link and retransmission to multiple correspondent nodes. We will also prepare real experiments using prototypical implementations of the three node types. ACKNOWLEDGMENT This work was supported in part by the Japan Society for the Promotion of Science, Grant-in-Aid for Scientific Research (S) (No ). REFERENCES [1] A. Vahdat and D. Becker, Epidemic routing for partially connected ad hoc networks., Technical Report CS , [2] W. Zhao, Y. Chen, M. Ammar, M. Corner, B. Levine, and E. Zegura, Capacity Enhancement using throwboxes in mobile tolerant network., SCS Technical report GIT-CSS-06-04,

Integrated Buffer and Route Management in a DTN with Message Ferry

Integrated Buffer and Route Management in a DTN with Message Ferry Integrated Buffer and Route Management in a DTN with Message Ferry Mooi Choo Chuah Wen-Bin Ma chuah@cse.lehigh.edu wem2@.lehigh.edu Department of Computer Science and Engineering 19 Memorial Drive West,

More information

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze 80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that

More information

Store-and-Forward Performance in a DTN

Store-and-Forward Performance in a DTN Store-and-Forward Performance in a DTN Mooi-Choo Chuah, Peng Yang, Brian D. Davison, Liang Cheng Department of Computer Science and Engineering Lehigh University 19 Memorial Drive West, Bethlehem, PA 18015,

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

DTN-based Delivery of Word-of-Mouth Information with Priority and Deadline

DTN-based Delivery of Word-of-Mouth Information with Priority and Deadline DTN-based Delivery of Word-of-Mouth Information with Priority and Deadline Yasuhiro Ishimaru *, Weihua Sun *, Keiichi Yasumoto * and Minoru Ito * * Graduate School of Information Science, Nara Institute

More information

ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic. Message Ferrying

ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic. Message Ferrying ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic 1 Message Ferrying Group 9 Timbo Yuen (tty2@sfu.ca) Dan Hendry (danh@sfu.ca) Yazan Shehadeh (ysa5@sfu.ca)

More information

Routing in packet-switching networks

Routing in packet-switching networks Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call

More information

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo. Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density

More information

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks 27 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): 27 IEEE Infocom MiseNet Workshop Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

More information

Protocol for Tetherless Computing

Protocol for Tetherless Computing Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Delay-Differentiated Gossiping in Delay Tolerant Networks

Delay-Differentiated Gossiping in Delay Tolerant Networks Delay-Differentiated Gossiping in Delay Tolerant Networks Parameswaran Ramanathan and Aarti Singh Department of Electrical and Computer Engineering University of Wisconsin-Madison parmesh@ecewiscedu, singh@caewiscedu

More information

Epidemic Routing for Partially-Connected Ad Hoc Networks

Epidemic Routing for Partially-Connected Ad Hoc Networks Epidemic Routing for Partially-Connected Ad Hoc Networks Presented By- Kannan Chandrasekaran MS Computer Science, EECS, University of Kansas, Lawrence. Email: kannanc@ku.edu Amin Vahdat and David Becker,

More information

Store-and-Forward Performance in a DTN

Store-and-Forward Performance in a DTN Store-and-Forward Performance in a DTN Mooi-Choo Chuah, Peng Yang, Brian D. Davison, Liang Cheng Department of Computer Science and Engineering Lehigh University 19 Memorial Drive West, Bethlehem, PA 18015,

More information

Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms

Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms Wenrui Zhao, Mostafa Ammar and Ellen Zegura College of Computing, Georgia Institute of Technology, Atlanta, Georgia 3332

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

UAV ASSISTED DISRUPTION TOLERANT ROUTING

UAV ASSISTED DISRUPTION TOLERANT ROUTING UAV ASSISTED DISRUPTION TOLERANT ROUTING Michael Le, Joon-Sang Park, and Mario Gerla Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 Email: {mvleljsparklgerla} @cs.ucla.edu

More information

Custodial Multicast in Delay Tolerant Networks

Custodial Multicast in Delay Tolerant Networks Custodial Multicast in Delay Tolerant Networks Challenges and Approaches Susan Symington, Robert C. Durst, and Keith Scott The MITRE Corporation McLean, Virginia susan@mitre.org, durst@mitre.org, kscott@mitre.org

More information

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula

More information

Public Key Management Scheme with Certificate Management Node for Wireless Ad Hoc Networks

Public Key Management Scheme with Certificate Management Node for Wireless Ad Hoc Networks Proceedings of the International Multiconference on Computer Science and Information Technology pp. 445 451 ISSN 1896-7094 c 2006 PIPS Public Key Management Scheme with Certificate Management Node for

More information

Capacity-Aware Routing Using Throw-Boxes

Capacity-Aware Routing Using Throw-Boxes Capacity-Aware Routing Using Throw-Boxes Bo Gu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {bgu,hxy}@cs.ua.edu Abstract Deploying the static wireless devices

More information

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models 2016 7th International Conference on Intelligent Systems, Modelling and Simulation Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models Bhed Bahadur

More information

All Rights Reserved 2017 IJARCET

All Rights Reserved 2017 IJARCET END-TO-END DELAY WITH MARKOVIAN QUEUING BASED OPTIMUM ROUTE ALLOCATION FOR MANETs S. Sudha, Research Scholar Mrs. V.S.LAVANYA M.Sc(IT)., M.C.A., M.Phil., Assistant Professor, Department of Computer Science,

More information

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks Middle-East Journal of Scientific Research 23 (Sensing, Signal Processing and Security): 291-296, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.ssps.111 Buffer Aware Network

More information

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation

More information

Lecture 16: Network Layer Overview, Internet Protocol

Lecture 16: Network Layer Overview, Internet Protocol Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Routing Protocol Approaches in Delay Tolerant Networks

Routing Protocol Approaches in Delay Tolerant Networks Routing Protocol Approaches in Delay Tolerant Networks Shivi Shukla 1, Amit Munjal 2 and Y. N. Singh 2 AIM & ACT Dept., Banasthali Vidyapith, Rajasthan 1 EE Dept., Indian Institute of Technology, Kanpur

More information

DTN Interworking for Future Internet Presented by Chang, Dukhyun

DTN Interworking for Future Internet Presented by Chang, Dukhyun DTN Interworking for Future Internet 2008.02.20 Presented by Chang, Dukhyun Contents 1 2 3 4 Introduction Project Progress Future DTN Architecture Summary 2/29 DTN Introduction Delay and Disruption Tolerant

More information

I. INTRODUCTION. Keywords-disruption tolerant networks; custody transfer; route discovery; message ferry

I. INTRODUCTION. Keywords-disruption tolerant networks; custody transfer; route discovery; message ferry Performance Comparison of Unicast Routing Schemes in DTNs Mooi Choo Chuah, Peng Yang, Brian D. Davison, Liang Cheng {chuah, pey204, davison, cheng}@cse.lehigh.edu Lehigh University Abstract Delay and disruption

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2 , pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network A Genetic-Neural Approach for obility Assisted Routing in a obile Encounter Network Niko P. Kotilainen, Jani Kurhinen Abstract--obility assisted routing (AR) is a concept, where the mobility of a network

More information

ACICE-2013 ISSN: ; e-issn

ACICE-2013 ISSN: ; e-issn 1022 A Novel Ferry-Initiated Message Ferrying Approach for Data Delivery in Disconnected Mobile Ad Hoc Networks through Native Ferries K. MURALIDHAR 1, N. GEETHANJALI 2 1 Assistant Professor, Department

More information

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network This Lecture BUS0 - Computer Facilities Network Management Switching networks Circuit switching Packet switching gram approach Virtual circuit approach Routing in switching networks Faculty of Information

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

An Efficient DECT-Mobile IP Interworking for Mobile Computing

An Efficient DECT-Mobile IP Interworking for Mobile Computing An Efficient DECT-Mobile IP Interworking for Mobile Computing Anthony Lo *, Winston Seah * and Edwin Schreuder + * Centre for Wireless Communications 1, National University of Singapore, 20 Science Park

More information

Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case

Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case Pierre-Ugo Tournoux, Student Member, IEEE, Je re mie Leguay, Farid Benbadis, John Whitbeck, Student Member, IEEE, Vania Conan, and Marcelo

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Analyzation of Automatic Repeat Request (ARQ) Protocols

Analyzation of Automatic Repeat Request (ARQ) Protocols RESEARCH ARTICLE OPEN ACCESS Analyzation of Automatic Repeat Request (ARQ) Protocols 1 Jeshvina.S, 2 Sneha.P, 3 Saraanya.S Final year BCA, Dept of Computer Science New Horizon College Kasturinagar, Bangalore

More information

T Computer Networks II Delay Tolerant Networking (DTN)

T Computer Networks II Delay Tolerant Networking (DTN) T-110.5111 Computer Networks II Delay Tolerant Networking (DTN) 25.11.2013 Matti Siekkinen Large part based on slides by: Thomas Plagemann: Message Routing & Event Notification in Sparse Mobile Networks

More information

DTN Based Dominating Set Routing for MANET in Heterogeneous Wireless Networking

DTN Based Dominating Set Routing for MANET in Heterogeneous Wireless Networking Mobile Netw Appl (29) 14:154 164 DOI 1.17/s1136-8-131-8 DTN Based Dominating Set Routing for MANET in Heterogeneous Wireless Networking Hany Samuel Weihua Zhuang Bruno Preiss Published online: 19 January

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Intersession 2008 Last Name: First Name: Student ID: PLEASE

More information

IMPROVING QoS IN DELAY TOLERANT MOBILE AD HOC NETWORK USING MULTIPLE MESSAGE FERRIES

IMPROVING QoS IN DELAY TOLERANT MOBILE AD HOC NETWORK USING MULTIPLE MESSAGE FERRIES IMPROVING QoS IN DELAY TOLERANT MOBILE AD HOC NETWORK USING MULTIPLE MESSAGE FERRIES R. C. Suganthe Professor Department of Computer Science and Engineering Kongu Engineering College, Perundurai-638 052,

More information

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information

Application of Graph Theory in DTN Routing

Application of Graph Theory in DTN Routing Application of Graph Theory in DTN Routing Madan H. T. 1, Shabana Sultana 2 1 M. Tech. (CNE), NIE, Mysuru 2 Associate Professor, Dept. of Computer Science & Eng., NIE, Mysuru Abstract: Delay tolerant network

More information

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Social-Aware Routing in Delay Tolerant Networks

Social-Aware Routing in Delay Tolerant Networks Social-Aware Routing in Delay Tolerant Networks Jie Wu Dept. of Computer and Info. Sciences Temple University Challenged Networks Assumptions in the TCP/IP model are violated DTNs Delay-Tolerant Networks

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

The Open System Interconnect model

The Open System Interconnect model The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually

More information

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Sangheon Pack, Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul, Korea

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question

More information

Stream Control Transmission Protocol (SCTP)

Stream Control Transmission Protocol (SCTP) Stream Control Transmission Protocol (SCTP) Definition Stream control transmission protocol (SCTP) is an end-to-end, connectionoriented protocol that transports data in independent sequenced streams. SCTP

More information

Appeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan

Appeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan Appeal Decision Appeal No. 2014-5131 USA Appellant ALCATEL-LUCENT USA LTD. Tokyo, Japan Patent Attorney OKABE, Yuzuru Tokyo, Japan Patent Attorney YOSHIZAWA, Hiroshi The case of appeal against the examiner's

More information

Table of Contents. Cisco Introduction to EIGRP

Table of Contents. Cisco Introduction to EIGRP Table of Contents Introduction to EIGRP...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 What is IGRP?...2 What is EIGRP?...2 How Does EIGRP Work?...2 EIGRP

More information

Informal Quiz #01: SOLUTIONS

Informal Quiz #01: SOLUTIONS ECSE-6600: Internet Protocols Informal Quiz #01: SOLUTIONS : GOOGLE: Shiv RPI shivkuma@ecse.rpi.edu 1 Review of Networking Concepts (I): Informal Quiz SOLUTIONS For each T/F question: Replace the appropriate

More information

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Bhed Bahadur Bista Faculty of Software and Information Science Iwate Prefectural University Takizawa

More information

RD-TCP: Reorder Detecting TCP

RD-TCP: Reorder Detecting TCP RD-TCP: Reorder Detecting TCP Arjuna Sathiaseelan and Tomasz Radzik Department of Computer Science, King s College London, Strand, London WC2R 2LS {arjuna,radzik}@dcs.kcl.ac.uk Abstract. Numerous studies

More information

Max-Pivot Routing for Opportunistic Networks

Max-Pivot Routing for Opportunistic Networks Max-Pivot Routing for Opportunistic Networks Tamer Dag Computer Engineering Department Kadir Has University Istanbul, Turkey tamer.dag@khas.edu.tr Abstract Opportunistic networks are challenging types

More information

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism

Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Ankur Upadhyay Department of Computer Science & Engineering School of Engineering & Technology, IFTM

More information

On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees Mobile Nodes

On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees Mobile Nodes On Information Sharing Scheme for Automatic Evacuation Guiding System Using Evacuees Mobile Nodes Nobuhisa Komatsu, Masahiro Sasabe, and Shoji Kasahara Graduate School of Information Science, Nara Institute

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

A Message Ferrying Approach for Data Delivery. How to deliver data in sparse networks

A Message Ferrying Approach for Data Delivery. How to deliver data in sparse networks A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Wenrui Zhao, Mostafa Ammar, and Ellen Zegura College of Computing, Georgia Institute of Technology MobiHoc 2004 Presented

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

A Dynamic TDMA Protocol Utilizing Channel Sense

A Dynamic TDMA Protocol Utilizing Channel Sense International Conference on Electromechanical Control Technology and Transportation (ICECTT 2015) A Dynamic TDMA Protocol Utilizing Channel Sense ZHOU De-min 1, a, LIU Yun-jiang 2,b and LI Man 3,c 1 2

More information

A Delay-Tolerant Network Architecture for Challenged Internets

A Delay-Tolerant Network Architecture for Challenged Internets A Delay-Tolerant Network Architecture for Challenged Internets Kevin Fall Intel Research Berkeley, CA kfall@intel.com http://www.intel-research.net Aug 26, 2003 SIGCOMM Karlsruhe, Germany Berkeley Unstated

More information

Performance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks

Performance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks Performance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks Izhak Rubin and Runhe Zhang Abstract We introduce Unmanned Vehicles (UVs) to aid the operation of the mobile

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Buffer Aware Routing in Interplanetary Ad Hoc Network

Buffer Aware Routing in Interplanetary Ad Hoc Network Buffer Aware Routing in Interplanetary Ad Hoc Network Kamal Mistry (Wipro Technologies, Bangalore) Sanjay Srivastava (DA-IICT, Gandhinagar) R. B. Lenin (DA-IICT, Gandhinagar) January 8, 2009 Buffer Aware

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

CHAPTER 7 COMPARISON OF DIFFERENT ROUTING SCHEMES

CHAPTER 7 COMPARISON OF DIFFERENT ROUTING SCHEMES 80 CHAPTER 7 COMPARISON OF DIFFERENT ROUTING SCHEMES 7.1 PERFORMANCE METRICS In the preceding chapters data delivery rate, buffer space, node density and message delay, average hop count, average buffer

More information

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM 2004 Presented by Xun Gong Outline Delay Tolerant Networks Routing Problem in DTNs Multiple-copy Approach Flooding and

More information

William Stallings Data and Computer Communications. Chapter 10 Packet Switching

William Stallings Data and Computer Communications. Chapter 10 Packet Switching William Stallings Data and Computer Communications Chapter 10 Packet Switching Principles Circuit switching designed for voice Resources dedicated to a particular call Much of the time a data connection

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Routing in Delay Tolerant Networks (DTN)

Routing in Delay Tolerant Networks (DTN) Int. J. Communications, Network and System Sciences, 2011, 4, 53-58 doi:10.4236/ijcns.2011.41006 Published Online January 2011 (http://www.scirp.org/journal/ijcns) Routing in Delay Tolerant Networks (DTN)

More information

MobilityFirst GSTAR: Generalized Storage Aware Routing

MobilityFirst GSTAR: Generalized Storage Aware Routing MobilityFirst GSTAR: Generalized Storage Aware Routing Samuel Nelson MobilityFirst Design Goals Design a future internet architecture that supports: Host and network mobility Diverse communication devices/entities/paradigms

More information

BIG-IQ Centralized Management: ADC. Version 5.0

BIG-IQ Centralized Management: ADC. Version 5.0 BIG-IQ Centralized Management: ADC Version 5.0 Table of Contents Table of Contents BIG-IQ Application Delivery Controller: Overview...5 What is Application Delivery Controller?...5 Managing Device Resources...7

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Lecture 9: Bridging & Switching"

Lecture 9: Bridging & Switching Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link

More information

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst

EITF25 Internet Techniques and Applications L7: Internet. Stefan Höst EITF25 Internet Techniques and Applications L7: Internet Stefan Höst What is Internet? Internet consists of a number of networks that exchange data according to traffic agreements. All networks in Internet

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent W. S. Wong and Victor C. M. Leung Department of Electrical and Computer Engineering The University of British

More information

Subnet Multicast for Delivery of One-to-Many Multicast Applications

Subnet Multicast for Delivery of One-to-Many Multicast Applications Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting

More information

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Proposal of cooperative operation framework for M2M systems

Proposal of cooperative operation framework for M2M systems Proposal of cooperative operation framework for M2M systems Fumihito Sugihara, Katsuhiro Naito, Hidekazu Suzuki, Akira Watanabe, Kazuo Mori, Hideo Kobayashi Department of Electrical and Electronic Engineering,

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

ERASURE-CODING DEPENDENT STORAGE AWARE ROUTING

ERASURE-CODING DEPENDENT STORAGE AWARE ROUTING International Journal of Mechanical Engineering and Technology (IJMET) Volume 9 Issue 11 November 2018 pp.2226 2231 Article ID: IJMET_09_11_235 Available online at http://www.ia aeme.com/ijmet/issues.asp?jtype=ijmet&vtype=

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

Reliable Routing In VANET Using Cross Layer Approach

Reliable Routing In VANET Using Cross Layer Approach Reliable Routing In VANET Using Cross Layer Approach 1 Mr. Bhagirath Patel, 2 Ms. Khushbu Shah 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 er.bhagirath@gmail.com,

More information

DEPARTMENT of. Computer & Information Science & Engineering

DEPARTMENT of. Computer & Information Science & Engineering CIS-6930: Distributed Multimedia Systems Enhancing aggregate QoS for video streaming Authors: Chung wei Lee, Randy Chow, Jonathan C.L. Liu Aditi Malviya Presented By: Anubha DEPARTMENT of Computer & Information

More information

A Cooperative ARQ for Delay-Tolerant Vehicular Networks

A Cooperative ARQ for Delay-Tolerant Vehicular Networks The 28th International Conference on Distributed Computing Systems Workshops A Cooperative ARQ for Delay-Tolerant Vehicular Networks Julián Morillo-Pozo, Oscar Trullols, Jose M. Barceló, Jorge García-Vidal

More information

Buffer Management in Delay Tolerant Networks

Buffer Management in Delay Tolerant Networks Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)

More information