T Computer Networks II Delay Tolerant Networking (DTN)
|
|
- Kenneth Griffith
- 6 years ago
- Views:
Transcription
1 T Computer Networks II Delay Tolerant Networking (DTN) Matti Siekkinen Large part based on slides by: Thomas Plagemann: Message Routing & Event Notification in Sparse Mobile Networks Mostafar Ammar: Keynote talk at Co-Next 2005 Joerg Ott: S slides 1
2 Outline What is Delay Tolerant Networking? Mobility DTN routing protocols Epidemic Routing Message Ferrying Applications of DTN 2
3 Traditional Wired Networks IP Link+PHY layers Application TCP / UDP IP Link+PHY layers endsystem (source) router endsystem (destination) Separation between endsystems and routers Routers responsible for finding stable path 3
4 Traditional Wired Networks Network is connected Cables link routers to each other There is a path from any source to any destination What if link goes down? E.g. cable cut or router crash Redundant paths with links to several routers (backup links) Routing protocols figure out a new route Usually short temporary disconnection at most 4
5 Store and Forward paradigm Store: receive whole packet before transmitting any bits Need to process it: error control, prefix lookup, Forward: transmit packet immediately after receiving and processing it All routers and switches usually behave in this way Implications Need some but limited amount of memory to buffer necessary amount of bits Routers forget about packets right away 5
6 Traditional Mobile Ad-hoc Wireless Networks (MANET) node = endsystem + router node (source) node (destination) No separation between endsystems and routers Nodes responsible for finding stable path 6
7 Traditional Mobile Ad-hoc Wireless Networks (MANET) node (source) node (destination) Application TCP / UDP Nodes may move Routing layer responsible for reconstructing (repairing) stable paths when movement occurs IP Link+PHY layers 7
8 Traditional MANET Paradigm Network is still connected There exists a (possibly multi-hop) path from any source to any destination The path exists for a long-enough period of time to allow meaningful communication If path is disrupted it can be repaired in short order E.g. node moves or dies MANET routing protocols take care of finding new path Store and forward is used here too Can disconnected networks also exist? 8
9 The Rise of Sparse Networks 9
10 Sparse Wireless Networks Disconnected By necessity By design (e.g. for power considerations) Mobile With enough mobility to allow for some connectivity over time Data paths may not exist at any one point in time but do exist over time 10
11 Mobility-Assisted Data Delivery: Store-Carry-Forward Mobility used for connectivity New Forwarding Paradigm Store Carry for a while Forward Special nodes: Transport entities that are not sources or destinations à Delay/Disruption Tolerant Networks (DTN) 11
12 Do DTNs use basic Internet protocols? TCP requires a connection State maintained at both ends Connection timed out Also basic IP assumes existing routes No route to host, Network unreachable Need new solutions at least for transport layer and above IP addressing can be used Alternatively, possible to add a layer between TCP/IP and applications IETF Bundle protocol and application-level support WWW phone..." SMTP HTTP SIP..." TCP UDP " " IP" " Eth PPP WiFi 3GPP " copper fiber radio OFDM FHSS..." 12
13 Building blocks of DTN Store-carry-forward packet switching Mobility Models are important here Routing protocols Different strategies can be used Depends a lot on mobility and resources available Security mechanisms New challenges for security Out of scope for this lecture 13
14 Outline What is Delay Tolerant Networking? Mobility DTN routing protocols Epidemic Routing Message Ferrying Applications of DTN 14
15 Role of mobility DTNs rely on some level of mobility Cannot form new connections in sparse networks otherwise There are many kinds of mobility People, vehicles, animals, robots, Urban, rural, Mobility models are useful Evaluate solutions and compare them using simulators Don t have to do field trials every time 15
16 Space vs. Space/Time path Space path: A multi-hop path where all the links are active at the same time Space/Time path: A multi-hop path that exists over time NOTE: S path is a special case of S/T path 16
17 Example S D Space Paths 17
18 Example S D No Path 18
19 Example S D Space Time Path 19
20 The Mobile Wireless Space High Relative mobility Hybrid environments Space/Time paths No paths Low Space paths High Node Density Low 20
21 Mobility: What is on the move? Planet, satellite Vehicle Airplane, car, train, bus, ship, spaceship People Pedestrian, cyclist, passenger, driver Individually or in groups Animals Individually or in groups Robot 21
22 Mobility traces vs. models Mobility traces from the real world Cannot measure all possible scenarios, obviously Provide useful insights for building models Many challenges Technical issues People don t like to be tracked Mobility models Based on known or measured behavior Real world traces Possible to tune parameters to match desired scale and dimensions (e.g., #nodes) May be very complex to build very realistic models 22
23 Types of mobility models Mobility models Random Temporal dependency Geographic restriction Spatial dependency Random walk Gauss-Markov Pathway Reference point group model Random waypoint Smooth random Obstacle Pursue Random direction Column Other variations Community 23
24 Random mobility models All models consider fixed area (e.g. a room) Random walk, a.k.a. drunken sailor Erratic unpredictable movement Randomly choose direction and speed Move for fixed amount of time or distance Nodes won t make progress in distance Random waypoint Draw a random destination point Move to destination at randomly chosen speed Random direction Node picks a random direction and speed Stop at the border of area These (esp. waypoint) have been applied a lot Do they capture realistic scenarios..? e Time 24
25 Dependency models Temporal dependency Movement is affected by the history E.g., consider that nodes often do not change directions in completely random way change speed very abruptly Geographic restriction Movement is bounded by streets, freeways, obstacles Spatial dependency Preferred locations Nodes often move together (group models) Manhattan model 25
26 Predicting mobility Is it possible? Yes, in a scenario behaving according to known model Difficult in practice What s the point? Can improve a lot performance of DTN Don t forward messages to nodes that we know will not be able to deliver them 26
27 Outline What is Delay Tolerant Networking? Mobility DTN routing protocols Epidemic Routing Message Ferrying Applications of DTN 27
28 MANET routing Roughly two main approaches Proactive routing Like routing protocols in wired networks Exchange information with neighbors non-stop Continuously maintain routing table up to date Short delay but uses resources all the time (bandwidth, energy, CPU) Reactive routing On-demand routing Compute route when have data to send Longer delay but less resources consumed Cannot use either of these for DTNs Cannot compute a path to destination when space paths don t exist! 28
29 DTN routing protocols Problem: How to get packets from source to destination given that we have no pure space paths? Routing protocol (together with mobility) largely determines Resource consumption Message delivery probability and delay à Crucial component Many protocols have been proposed in literature We look at a few selected ones in detail Probably one-size-fits-all doesn t make sense Too diverse application scenarios 29
30 How would you design a DTN routing protocol? Take 5-10 mins to think about how to route packets in DTNs What kinds of strategies could be used? What are the different tradeoffs? Discuss with person(s) sitting next to you! 30
31 Classifying DTN routing protocols Replication vs. forwarding Some solutions rely on replicating packets to many neighbors E.g. Epidemic Routing and Spray and Wait Others maintain at most one copy of packet in the network Tradeoff between resource consumption and message delivery probability/delay Assisted vs. unassisted Some mobility is imperative in DTNs We can add mobility if none exists naturally E.g. Message Ferrying 31
32 Classifying DTN routing protocols Resource constraints Unlimited vs. finite storage, bandwidth, energy Some protocols explicitly consider finite resources E.g. RAPID Leverage mobility information Probabilistic (prediction) Historic meeting information E.g. MaxProb 32
33 Outline What is Delay Tolerant Networking? Mobility DTN routing protocols Epidemic Routing Message Ferrying Applications of DTN 33
34 Epidemic Routing By Vahdat and Becker in 2000 Representative simple example of replicating routing protocol Utilize natural physical movement of devices to transport data Store-carry-forward paradigm Nodes buffer and carry data when disconnected Nodes exchange data when met Data is replicated throughout the network 34
35 Epidemic Routing: The Idea 35
36 Epidemic Routing: The Idea 36
37 Epidemic Routing: The Idea 37
38 Epidemic Routing: The Idea message is delivered 38
39 Epidemic Routing protocol Epidemic Routing: Basic Elements Each message contains Unique message ID Hop count Ack request (optional) Each node has ID Message buffer Hash table indexing the message buffer Key is message ID Summary vector (SV) Bit vector, describes which entries in hash table are set List of last seen nodes Avoid unnecessary connections Tradeoff: buffer size vs. message delivery probability and latency 39
40 Epidemic Routing: Evaluation Implementation in ns-2 50 mobile nodes Area 1500m x 300m Random waypoint Speed 0 20 m/s (uniformly distributed) Message size 1 KB 45 message sources/sinks Each one sends one message to each other one Total of 45x44 = 1980 messages Each second 1 new message initiated All messages initiated after 1980 seconds 40
41 Epidemic Routing: Evaluation Range has a huge impact on delivery latency Need to wait for neighbors to come to range Messages take many hops If range too short, cannot deliver all messages No way to reach destination host Simulation time matters MANET routing no longer works (space-time paths) Infinite buffer size? [Vahdat & Becker, TechReport 2000] 41
42 Epidemic Routing: Evaluation Limiting max number of hops affects latency Dramatically longer delivery latency with less than 3 hops Why longer delay and not just less packets delivered? When hop count reaches 1, message only delivered to destination, not dropped 50m range Infinite buffer size Infinite buffer size [Vahdat & Becker, TechReport 2000] 42
43 Epidemic Routing: Evaluation Too small buffer size reduces message delivery probability a lot Longer delivery latency means more packets in the network More packets in network means higher probability for full buffers 5%-25% of originated messages is enough for good performance 50m range [Vahdat & Becker, TechReport 2000] 43
44 Summary of ER Simple scheme to cope with space-time paths Robust to disconnections Leverage natural mobility Limitations Potentially high-failure rate Message duplication consumes nodal resources Basic scheme can be improved with contact probability information Mobility models 44
45 Outline What is Delay Tolerant Networking? Mobility DTN routing protocols Epidemic Routing Message Ferrying Applications of DTN 45
46 Message Ferrying By Zhao, Ammar, Zegura in 2004 Captures general properties of assisted protocols Exploit non-randomness in device movement to deliver data A set of nodes called ferries responsible for carrying data for all nodes in the network Store-carry-forward paradigm to accommodate disconnections Ferries act as a moving communication infrastructure for the network 46
47 Message Ferrying The Idea MF S M S MF M D D 47
48 MF variations Ferry mobility Task-oriented, e.g., bus movement Trajectories are due to other tasks Messaging-oriented, e.g., robot movement Trajectories aim specifically to optimize message delivery Regular node mobility Stationary Mobile: task-oriented or messaging-oriented Number of ferries Level of coordination between Ferries Regular nodes Ferry designation Switching roles as ferry or regular node 48
49 MF example with mobile nodes Nodes are mobile and limited in resources, e.g., buffer, energy Single ferry is used Not limited in buffer or energy Trajectory of the ferry is known to all nodes Data communication in messages Application layer data unit Message timeout 49
50 Four approaches Non-Proactive ( = Messaging-Specific) mobility Only rely on inherent movement Nodes meet ferry by chance Ferrying without Epidemic Routing Ferrying with Epidemic Routing Regular nodes also replicate packets when meeting each other Proactive mobility Nodes modify their trajectories for communication purposes Node-Initiated MF(NIMF) Nodes move to meet ferry Ferry-Initiated MF (FIMF) Ferry moves to meet nodes 50
51 Node-Initiated Message Ferrying Meet the ferry? If no, keep OK working Working 51
52 Node-Initiated Message Ferrying Go to Ferry 52
53 Node-Initiated Message Ferrying Send/Recv Go to Work 53
54 Node-Initiated Message Ferrying Go to Work 54
55 Mode Transition WORKING GO TO FERRY Not planned Intentional GO TO WORK SEND/RECEIVE 55
56 Ferry Operations in NIMF 1. Move according to a ferry route; 2. Broadcast Hello messages periodically; 3. On reception of an Echo message from a node: Exchange messages with the node; 56
57 Node Trajectory Control When should node move to meet the ferry? Goal: minimize message drops and reduce proactive movement Msgs are dropped when regular node s buffer fills up or msgs time out à Have to go meet ferry frequently enough to prevent this Going to meet ferry requires node to move proactively à Reduces time node can work on assigned tasks (e.g. in emergency operation) Go to ferry if Work-time percentage > threshold and Estimated message drop percentage > threshold Msg drop rate can be estimated knowing generation rate, timeout, buffer size, ferry drop rate 57
58 Ferry-Initiated MF Ferry takes proactive movement to meet up with nodes Long range (lr) radio is used to transmit control messages Ferry tells about its location Nodes send service requests and location updates Short range (sr) radio is used to exchange messages Msg forwarding, device discovery, and msg drop computation is same as in NIMF 58
59 Ferry-initiated MF example (a) Ferry follows def. route, broadcasts its location (lr radio) Node sends service request (lr radio) with location Ferry Location N2 1: Ferry Location Ferry F Location 2: Service Location Request Update S default ferry route (a) F N1 default ferry route S (b) N2 N1 (b) Ferry moves to meet node Node guides ferry using location update (lr radio) default ferry route default ferry route F (c) Ferry and node exchange packets using sr radio when they are close enough N2 F message exchange S N1 N2 S N1 (d) Ferry goes back to its default route (c) (d) ferry route movement radio transmission ferry node before movement after movement 59
60 Heuristics for Ferry Control How does ferry decide its trajectories given many service requests? Goal: minimize msg drops Finding optimal trajectory is NP hard problem à Need to use heuristics: Nearest neighbor (NN) Always visit closest next node after finished meeting with a node Traffic aware (TA) Consider both location and known msg drop information 60
61 Evaluation Simulate using NS with MAC and default energy model 40 nodes in 5km x 5km area 25 random (source, destination) pairs Node mobility is random-waypoint with max speed 5m/s Message timeout: 8000 sec Single ferry with speed 15m/s and rectangle ferry route 61
62 Message Delivery Rate Ferry considerably improves delivery rate Further, proactive movement helps a lot Two reasons: MF improves connectivity MF reduces buffer contention problem caused by flooding in ER Mes s age delivery rate FIMF NIMF F w/er 0.3 ER Epidemic Routing E pidemic R outing (w/ ferry) 0.2 NIMF 0.1 FIMF- NN FIMF- TA Node buffer size (messages) 62
63 Message Delay Delay increases with buffer size in all schemes Nodes buffer longer before meeting with Ferry Delay much shorter with ER than MF MF explicitly delays packets by batching them in nodes and ferry ER w/ Ferry strikes middle ground Mes s age delay (s ec ) FIMF NIMF F w/er 1500 ER 1000 Epidemic Routing E pidemic R outing (w/ ferry) NIMF 500 FIMF- NN FIMF- TA Node buffer size (messages) 63
64 Impact of node mobility pattern Mobility Model Scheme Delivery Rate Delay (sec) Energy efficiency (KB/J) Random Waypoint Limited Random Waypoint NIMF FIMF ER(w/ ferry) ER NIMF FIMF ER(w/ ferry) ER Node mobility pattern has much smaller impact on MF (with proactive mobility) than ER performance Logical since ER relies purely on natural movement of nodes MF uses proactive movement à less affected by natural movement 64
65 Where Does MF Fit? High MF is applicable for the entire space Space/Time Paths MF is necessary here Mobility Hybrid Environments Low Space Paths Traditional MANET solutions apply here No (Space/Time) Paths High Node Density Low 65
66 Outline What is Delay Tolerant Networking? Mobility DTN routing protocols Epidemic Routing Message Ferrying Applications of DTN 66
67 SWIM: Shared Wireless Infostation Model SWIM infostation Biological information acquisition system Tracking and studying whales E.g., learn behavior and response to human disturbances When whales surface, they Exchange data with each other (kind of epidemic routing) Offload data to SWIM station when getting close Alternative to systems that rely on satellite communication 67
68 Vehicles on Highways Networks Destination Source 68
69 Vehicles on Highways Networks Destination Source 69
70 Vehicles on Highways Networks Destination Source 70
71 DakNet MIT project, 2004 Commercial: First Mile Solutions, later United Villages, Inc. Leverage existing transportation infrastructure to provide rural connectivity Kind of message ferrying approach Voice mail, , other elastic applications Much cheaper compared to wireless cellular infrastructure or landline service 71
72 Summary DTNs are solutions for disconnected networks Basic components Store-carry-forward Mobility Routing protocols Security Lots of different routing protocols exist No one size fits all Suitability highly dependent on target scenario Many application scenarios exist Mostly niche applications, obviously 72
Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.
Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density
More informationDelay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.
Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density
More informationA Message Ferrying Approach for Data Delivery. How to deliver data in sparse networks
A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Wenrui Zhao, Mostafa Ammar, and Ellen Zegura College of Computing, Georgia Institute of Technology MobiHoc 2004 Presented
More informationA Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks
A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Wenrui Zhao, Mostafa Ammar and Ellen Zegura College of Computing, Georgia Institute of Technology, Atlanta, Georgia 3332 {wrzhao,
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationSocial-Aware Routing in Delay Tolerant Networks
Social-Aware Routing in Delay Tolerant Networks Jie Wu Dept. of Computer and Info. Sciences Temple University Challenged Networks Assumptions in the TCP/IP model are violated DTNs Delay-Tolerant Networks
More informationACICE-2013 ISSN: ; e-issn
1022 A Novel Ferry-Initiated Message Ferrying Approach for Data Delivery in Disconnected Mobile Ad Hoc Networks through Native Ferries K. MURALIDHAR 1, N. GEETHANJALI 2 1 Assistant Professor, Department
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationEpidemic Routing for Partially-Connected Ad Hoc Networks
Epidemic Routing for Partially-Connected Ad Hoc Networks Presented By- Kannan Chandrasekaran MS Computer Science, EECS, University of Kansas, Lawrence. Email: kannanc@ku.edu Amin Vahdat and David Becker,
More informationAdvanced Internet Architectures
Advanced Internet Architectures Carlos Borrego Iglesias Carlos.Borrego@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Tecnologies avançades d
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationChapter 1. Computer Networks and the Internet
Chapter 1 Computer Networks and the Internet Internet traffic What s the Internet? (hardware) PC server wireless laptop cellular handheld wired links millions of connected computing devices: hosts = end
More informationArchna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India
Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation
More informationMobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo
Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad
More informationCS551 Ad-hoc Routing
CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationDelay Tolerant Networks
Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationA Cooperative ARQ for Delay-Tolerant Vehicular Networks
The 28th International Conference on Distributed Computing Systems Workshops A Cooperative ARQ for Delay-Tolerant Vehicular Networks Julián Morillo-Pozo, Oscar Trullols, Jose M. Barceló, Jorge García-Vidal
More informationENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic. Message Ferrying
ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic 1 Message Ferrying Group 9 Timbo Yuen (tty2@sfu.ca) Dan Hendry (danh@sfu.ca) Yazan Shehadeh (ysa5@sfu.ca)
More informationCS 204: Advanced Computer Networks
CS 204: Advanced Computer Networks Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Why Networks? Supports the applications
More informationApplication of Graph Theory in DTN Routing
Application of Graph Theory in DTN Routing Madan H. T. 1, Shabana Sultana 2 1 M. Tech. (CNE), NIE, Mysuru 2 Associate Professor, Dept. of Computer Science & Eng., NIE, Mysuru Abstract: Delay tolerant network
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationOpportunistic Routing Algorithms in Delay Tolerant Networks
Opportunistic Routing Algorithms in Delay Tolerant Networks Eyuphan Bulut Rensselaer Polytechnic Institute Department of Computer Science and Network Science and Technology (NeST) Center PhD Thesis Defense
More informationWireless TCP Performance Issues
Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the
More informationFFRDV: Fastest-Ferry Routing in DTN-enabled Vehicular Ad Hoc Networks
FFRDV: Fastest-Ferry Routing in DTN-enabled Vehicular Ad Hoc Networks Danlei Yu and Young-Bae Ko School of Information and Computer Engineering, Ajou University, Suwon, Republic of Korea yudanlei@uns.ajou.ac.kr,
More informationAd Hoc Networks: Issues and Routing
Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationCMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018
CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 30, 2018 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,
More informationIntroduction to computer networking
edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing
More informationPerformance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model
Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationBuffer Management in Delay Tolerant Networks
Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)
More informationImpact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationMobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading
Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationSome Routing Challenges in Dynamic Networks
Some Routing Challenges in Dynamic Networks Jie Wu Dept. of Computer and Information Sciences Temple University Overview 1. Current State of Networking More Wireless Mobile and Opportunistic Applications
More informationPerformance Evaluation of MANET through NS2 Simulation
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation
More informationIT 352 : Lecture 1. Network Basics Review. Najwa AlGhamdi, MSc 2012 /1433
IT 352 : Lecture 1 Network Basics Review Najwa AlGhamdi, MSc 2012 /1433 Outline 1. OSI Reference Model. 2. IP, UDP, TCP. 3. Directory Service. 4. Replicated Service. 5. Packet Switches. 6. Destination
More informationGLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS A.Robertsingh 1, Suganya A 2 1 Asst.Prof, CSE, Kalasalingam University, Krishnankoil, India 2 Asst.Prof, CSE, Kalasalingam University,
More informationMobility-Aware Real-Time Scheduling for Low-Power Wireless Networks
IEEE 35 th International Conference on Computer Communications (INFOCOM 16) 10-15 April 2016 San Francisco,, USA Mobility-Aware Real-Time Scheduling for Low-Power Wireless Networks Behnam Dezfouli Marjan
More informationSwitching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1
EE 586 Communication and Switching Networks (Fall 2010) Lecture 2 August 27, 2010 (modified by Cheung for EE586; based on K&R original) 1-1 Announcements Read Chapter 1 First homework is due 9/3 In Blackboard
More informationLecture 16: Wireless Networks
&6( *UDGXDWH1HWZRUNLQJ :LQWHU Lecture 16: Wireless Networks Geoffrey M. Voelker :LUHOHVV1HWZRUNLQJ Many topics in wireless networking Transport optimizations, ad hoc routing, MAC algorithms, QoS, mobility,
More informationDesign and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network
IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy
More informationPerformance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2
, pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless
More informationPart 1: Introduction. Goal: Review of how the Internet works Overview
Part 1: Introduction Goal: Review of how the Internet works Overview Get context Get overview, feel of the Internet Application layer protocols and addressing Network layer / Routing Link layer / Example
More informationT Computer Networks II Introduction
23.9.20 T-110.5111 Computer Networks II Introduction 17.09.2012 Matti Siekkinen Contents Motivation and substance Why do we teach what we teach? What are the focus areas and how they relate to the big
More informationComparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay
Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula
More informationChapter-4. Simulation Design and Implementation
Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview
More informationITTC A Geographical Routing Protocol for Highly-Dynamic Aeronautical Networks
A Geographical Routing Protocol for Highly-Dynamic Aeronautical Networks Kevin Peters, Abdul Jabbar, Egemen K. Çetinkaya, James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information
More informationCHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS
130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based
More informationSIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks
SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric
More informationZone-based Proactive Source Routing Protocol for Ad-hoc Networks
2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath
More informationCombined Mobile Ad-hoc and Delay/Disruption-tolerant Routing
This is an authors' version of the manuscript. Final version published in Proc. 13th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW '14). Springer LNCS 8487, pp. 1-14, 2014. The final
More informationSimulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network
Simulation of, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network 1 Monika Aneja, 2 Vishal Garg 1 (P.G. Student JMIT, Radaur, Yamunanagar) 2 (Assistant Professor JMIT Radaur Yamunanagar)
More informationAdaptive Applications
Towards More Adaptive Voice Applications Jörg Ott Md. Tarikul Islam, Cheng Luo Nagasai Panchakarla, Anssi Turkulainen 13 October 2011 ISOLA 2010 2011 Jörg Ott 1 Adaptive Applications
More informationUNIVERSITY OF OSLO Department of Informatics. Dynamic Selection of Message Carriers in a Sparse and Disruptive MANET.
UNIVERSITY OF OSLO Department of Informatics Dynamic Selection of Message Carriers in a Sparse and Disruptive MANET Jan Erik Haavet November 7, 211 Acknowledgement I would really like to thank my supervisors:
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationMultihop Mobile and Vehicular Networks
Multihop Mobile and Vehicular Networks Ľubomír Doboš lubomir.dobos@tuke.sk Technical University of Košice Faculty of Electrical Engineering and Informatics Dept. of Electronics and Multimedia Communications
More informationDelay-Differentiated Gossiping in Delay Tolerant Networks
Delay-Differentiated Gossiping in Delay Tolerant Networks Parameswaran Ramanathan and Aarti Singh Department of Electrical and Computer Engineering University of Wisconsin-Madison parmesh@ecewiscedu, singh@caewiscedu
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationMobilityFirst GSTAR: Generalized Storage Aware Routing
MobilityFirst GSTAR: Generalized Storage Aware Routing Samuel Nelson MobilityFirst Design Goals Design a future internet architecture that supports: Host and network mobility Diverse communication devices/entities/paradigms
More informationECE 650 Systems Programming & Engineering. Spring 2018
ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:
More informationAanchal Walia #1, Pushparaj Pal *2
An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,
More informationFigure 1: Ad-Hoc routing protocols.
Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca
More informationLocation Awareness in Ad Hoc Wireless Mobile Neworks
Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationIntegrated Buffer and Route Management in a DTN with Message Ferry
Integrated Buffer and Route Management in a DTN with Message Ferry Mooi Choo Chuah Wen-Bin Ma chuah@cse.lehigh.edu wem2@.lehigh.edu Department of Computer Science and Engineering 19 Memorial Drive West,
More informationDesign Considerations : Computer Networking. Outline
Design Considerations 15-744: Computer Networking L-2 Design Considerations How to determine split of functionality Across protocol layers Across network nodes Assigned Reading [SRC84] End-to-end Arguments
More informationCS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)
CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to
More informationPerformance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power
, pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria
More informationECE 158A: Lecture 13. Fall 2015
ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationMobile Communications. Ad-hoc and Mesh Networks
Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between
More information2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)
2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing
More informationDesign and Evaluation of a new MAC Protocol for Long- Distance Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005
Design and Evaluation of a new MAC Protocol for Long- Distance 802.11 Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005 Reviewed by Anupama Guha Thakurta CS525M - Mobile and Ubiquitous
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationDTN Interworking for Future Internet Presented by Chang, Dukhyun
DTN Interworking for Future Internet 2008.02.20 Presented by Chang, Dukhyun Contents 1 2 3 4 Introduction Project Progress Future DTN Architecture Summary 2/29 DTN Introduction Delay and Disruption Tolerant
More informationAd Hoc Routing Protocols and Issues
Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are
More informationUNIT 1 Questions & Solutions
UNIT 1 Questions & Solutions 1. Give any 5 differences between cellular wireless networks and ADHOC wireless network. Ans: The following table shows the difference between cellular networks and Adhoc wireless
More informationTRANSMISSION CONTROL PROTOCOL
COMP 635: WIRELESS & MOBILE COMMUNICATIONS TRANSMISSION CONTROL PROTOCOL Jasleen Kaur Fall 2017 1 Impact of Wireless on Protocol Layers Application layer Transport layer Network layer Data link layer Physical
More informationMOBILITY MODELS FOR NEXT WIRELESS NETWORKS GENERATION WILEY AD HOC, VEHICULAR AND MESH NETWORKS. Paolo Santi
MOBILITY MODELS FOR NEXT GENERATION WIRELESS NETWORKS AD HOC, VEHICULAR AND MESH NETWORKS Paolo Santi Istituto di Informatica e Telematica del CNR, Italy WILEY A John Wiley & Sons, Ltd., Publication Contents
More informationOpportunistic Networks: A Review
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. III (Mar-Apr. 2016), PP 20-26 www.iosrjournals.org Opportunistic Networks: A Review Navneet
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More informationE-Commerce. Infrastructure I: Computer Networks
E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.
More informationExperimental Evaluation of Gateway Based Interdomain Routing Scheme for DTN
Lehigh University Lehigh Preserve Theses and Dissertations 2011 Experimental Evaluation of Gateway Based Interdomain Routing Scheme for DTN Dongli Li Lehigh University Follow this and additional works
More informationRouting Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network
Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Ankur Upadhyay Department of Computer Science & Engineering School of Engineering & Technology, IFTM
More informationI. INTRODUCTION. Keywords-disruption tolerant networks; custody transfer; route discovery; message ferry
Performance Comparison of Unicast Routing Schemes in DTNs Mooi Choo Chuah, Peng Yang, Brian D. Davison, Liang Cheng {chuah, pey204, davison, cheng}@cse.lehigh.edu Lehigh University Abstract Delay and disruption
More informationSimulation and Analysis of Opportunistic Routing Protocols
Simulation and Analysis of Opportunistic Routing Protocols 1 The Purpose The purpose of this assignment is to gain familiarity with a network simulation tool and to get experience in basic data analysis.
More informationUDP, TCP, IP multicast
UDP, TCP, IP multicast Dan Williams In this lecture UDP (user datagram protocol) Unreliable, packet-based TCP (transmission control protocol) Reliable, connection oriented, stream-based IP multicast Process-to-Process
More informationTransport layer issues
Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc
More informationTHE INTERNET PROTOCOL INTERFACES
THE INTERNET PROTOCOL The Internet Protocol Stefan D. Bruda Winter 2018 A (connectionless) network protocol Designed for use in interconnected systems of packet-switched computer communication networks
More informationMobile Wireless Networking Mobility and Location Management
Mobile Wireless Networking The University of Kansas EECS 882 Mobility and James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications Research
More information