T Computer Networks II Delay Tolerant Networking (DTN)

Size: px
Start display at page:

Download "T Computer Networks II Delay Tolerant Networking (DTN)"

Transcription

1 T Computer Networks II Delay Tolerant Networking (DTN) Matti Siekkinen Large part based on slides by: Thomas Plagemann: Message Routing & Event Notification in Sparse Mobile Networks Mostafar Ammar: Keynote talk at Co-Next 2005 Joerg Ott: S slides 1

2 Outline What is Delay Tolerant Networking? Mobility DTN routing protocols Epidemic Routing Message Ferrying Applications of DTN 2

3 Traditional Wired Networks IP Link+PHY layers Application TCP / UDP IP Link+PHY layers endsystem (source) router endsystem (destination) Separation between endsystems and routers Routers responsible for finding stable path 3

4 Traditional Wired Networks Network is connected Cables link routers to each other There is a path from any source to any destination What if link goes down? E.g. cable cut or router crash Redundant paths with links to several routers (backup links) Routing protocols figure out a new route Usually short temporary disconnection at most 4

5 Store and Forward paradigm Store: receive whole packet before transmitting any bits Need to process it: error control, prefix lookup, Forward: transmit packet immediately after receiving and processing it All routers and switches usually behave in this way Implications Need some but limited amount of memory to buffer necessary amount of bits Routers forget about packets right away 5

6 Traditional Mobile Ad-hoc Wireless Networks (MANET) node = endsystem + router node (source) node (destination) No separation between endsystems and routers Nodes responsible for finding stable path 6

7 Traditional Mobile Ad-hoc Wireless Networks (MANET) node (source) node (destination) Application TCP / UDP Nodes may move Routing layer responsible for reconstructing (repairing) stable paths when movement occurs IP Link+PHY layers 7

8 Traditional MANET Paradigm Network is still connected There exists a (possibly multi-hop) path from any source to any destination The path exists for a long-enough period of time to allow meaningful communication If path is disrupted it can be repaired in short order E.g. node moves or dies MANET routing protocols take care of finding new path Store and forward is used here too Can disconnected networks also exist? 8

9 The Rise of Sparse Networks 9

10 Sparse Wireless Networks Disconnected By necessity By design (e.g. for power considerations) Mobile With enough mobility to allow for some connectivity over time Data paths may not exist at any one point in time but do exist over time 10

11 Mobility-Assisted Data Delivery: Store-Carry-Forward Mobility used for connectivity New Forwarding Paradigm Store Carry for a while Forward Special nodes: Transport entities that are not sources or destinations à Delay/Disruption Tolerant Networks (DTN) 11

12 Do DTNs use basic Internet protocols? TCP requires a connection State maintained at both ends Connection timed out Also basic IP assumes existing routes No route to host, Network unreachable Need new solutions at least for transport layer and above IP addressing can be used Alternatively, possible to add a layer between TCP/IP and applications IETF Bundle protocol and application-level support WWW phone..." SMTP HTTP SIP..." TCP UDP " " IP" " Eth PPP WiFi 3GPP " copper fiber radio OFDM FHSS..." 12

13 Building blocks of DTN Store-carry-forward packet switching Mobility Models are important here Routing protocols Different strategies can be used Depends a lot on mobility and resources available Security mechanisms New challenges for security Out of scope for this lecture 13

14 Outline What is Delay Tolerant Networking? Mobility DTN routing protocols Epidemic Routing Message Ferrying Applications of DTN 14

15 Role of mobility DTNs rely on some level of mobility Cannot form new connections in sparse networks otherwise There are many kinds of mobility People, vehicles, animals, robots, Urban, rural, Mobility models are useful Evaluate solutions and compare them using simulators Don t have to do field trials every time 15

16 Space vs. Space/Time path Space path: A multi-hop path where all the links are active at the same time Space/Time path: A multi-hop path that exists over time NOTE: S path is a special case of S/T path 16

17 Example S D Space Paths 17

18 Example S D No Path 18

19 Example S D Space Time Path 19

20 The Mobile Wireless Space High Relative mobility Hybrid environments Space/Time paths No paths Low Space paths High Node Density Low 20

21 Mobility: What is on the move? Planet, satellite Vehicle Airplane, car, train, bus, ship, spaceship People Pedestrian, cyclist, passenger, driver Individually or in groups Animals Individually or in groups Robot 21

22 Mobility traces vs. models Mobility traces from the real world Cannot measure all possible scenarios, obviously Provide useful insights for building models Many challenges Technical issues People don t like to be tracked Mobility models Based on known or measured behavior Real world traces Possible to tune parameters to match desired scale and dimensions (e.g., #nodes) May be very complex to build very realistic models 22

23 Types of mobility models Mobility models Random Temporal dependency Geographic restriction Spatial dependency Random walk Gauss-Markov Pathway Reference point group model Random waypoint Smooth random Obstacle Pursue Random direction Column Other variations Community 23

24 Random mobility models All models consider fixed area (e.g. a room) Random walk, a.k.a. drunken sailor Erratic unpredictable movement Randomly choose direction and speed Move for fixed amount of time or distance Nodes won t make progress in distance Random waypoint Draw a random destination point Move to destination at randomly chosen speed Random direction Node picks a random direction and speed Stop at the border of area These (esp. waypoint) have been applied a lot Do they capture realistic scenarios..? e Time 24

25 Dependency models Temporal dependency Movement is affected by the history E.g., consider that nodes often do not change directions in completely random way change speed very abruptly Geographic restriction Movement is bounded by streets, freeways, obstacles Spatial dependency Preferred locations Nodes often move together (group models) Manhattan model 25

26 Predicting mobility Is it possible? Yes, in a scenario behaving according to known model Difficult in practice What s the point? Can improve a lot performance of DTN Don t forward messages to nodes that we know will not be able to deliver them 26

27 Outline What is Delay Tolerant Networking? Mobility DTN routing protocols Epidemic Routing Message Ferrying Applications of DTN 27

28 MANET routing Roughly two main approaches Proactive routing Like routing protocols in wired networks Exchange information with neighbors non-stop Continuously maintain routing table up to date Short delay but uses resources all the time (bandwidth, energy, CPU) Reactive routing On-demand routing Compute route when have data to send Longer delay but less resources consumed Cannot use either of these for DTNs Cannot compute a path to destination when space paths don t exist! 28

29 DTN routing protocols Problem: How to get packets from source to destination given that we have no pure space paths? Routing protocol (together with mobility) largely determines Resource consumption Message delivery probability and delay à Crucial component Many protocols have been proposed in literature We look at a few selected ones in detail Probably one-size-fits-all doesn t make sense Too diverse application scenarios 29

30 How would you design a DTN routing protocol? Take 5-10 mins to think about how to route packets in DTNs What kinds of strategies could be used? What are the different tradeoffs? Discuss with person(s) sitting next to you! 30

31 Classifying DTN routing protocols Replication vs. forwarding Some solutions rely on replicating packets to many neighbors E.g. Epidemic Routing and Spray and Wait Others maintain at most one copy of packet in the network Tradeoff between resource consumption and message delivery probability/delay Assisted vs. unassisted Some mobility is imperative in DTNs We can add mobility if none exists naturally E.g. Message Ferrying 31

32 Classifying DTN routing protocols Resource constraints Unlimited vs. finite storage, bandwidth, energy Some protocols explicitly consider finite resources E.g. RAPID Leverage mobility information Probabilistic (prediction) Historic meeting information E.g. MaxProb 32

33 Outline What is Delay Tolerant Networking? Mobility DTN routing protocols Epidemic Routing Message Ferrying Applications of DTN 33

34 Epidemic Routing By Vahdat and Becker in 2000 Representative simple example of replicating routing protocol Utilize natural physical movement of devices to transport data Store-carry-forward paradigm Nodes buffer and carry data when disconnected Nodes exchange data when met Data is replicated throughout the network 34

35 Epidemic Routing: The Idea 35

36 Epidemic Routing: The Idea 36

37 Epidemic Routing: The Idea 37

38 Epidemic Routing: The Idea message is delivered 38

39 Epidemic Routing protocol Epidemic Routing: Basic Elements Each message contains Unique message ID Hop count Ack request (optional) Each node has ID Message buffer Hash table indexing the message buffer Key is message ID Summary vector (SV) Bit vector, describes which entries in hash table are set List of last seen nodes Avoid unnecessary connections Tradeoff: buffer size vs. message delivery probability and latency 39

40 Epidemic Routing: Evaluation Implementation in ns-2 50 mobile nodes Area 1500m x 300m Random waypoint Speed 0 20 m/s (uniformly distributed) Message size 1 KB 45 message sources/sinks Each one sends one message to each other one Total of 45x44 = 1980 messages Each second 1 new message initiated All messages initiated after 1980 seconds 40

41 Epidemic Routing: Evaluation Range has a huge impact on delivery latency Need to wait for neighbors to come to range Messages take many hops If range too short, cannot deliver all messages No way to reach destination host Simulation time matters MANET routing no longer works (space-time paths) Infinite buffer size? [Vahdat & Becker, TechReport 2000] 41

42 Epidemic Routing: Evaluation Limiting max number of hops affects latency Dramatically longer delivery latency with less than 3 hops Why longer delay and not just less packets delivered? When hop count reaches 1, message only delivered to destination, not dropped 50m range Infinite buffer size Infinite buffer size [Vahdat & Becker, TechReport 2000] 42

43 Epidemic Routing: Evaluation Too small buffer size reduces message delivery probability a lot Longer delivery latency means more packets in the network More packets in network means higher probability for full buffers 5%-25% of originated messages is enough for good performance 50m range [Vahdat & Becker, TechReport 2000] 43

44 Summary of ER Simple scheme to cope with space-time paths Robust to disconnections Leverage natural mobility Limitations Potentially high-failure rate Message duplication consumes nodal resources Basic scheme can be improved with contact probability information Mobility models 44

45 Outline What is Delay Tolerant Networking? Mobility DTN routing protocols Epidemic Routing Message Ferrying Applications of DTN 45

46 Message Ferrying By Zhao, Ammar, Zegura in 2004 Captures general properties of assisted protocols Exploit non-randomness in device movement to deliver data A set of nodes called ferries responsible for carrying data for all nodes in the network Store-carry-forward paradigm to accommodate disconnections Ferries act as a moving communication infrastructure for the network 46

47 Message Ferrying The Idea MF S M S MF M D D 47

48 MF variations Ferry mobility Task-oriented, e.g., bus movement Trajectories are due to other tasks Messaging-oriented, e.g., robot movement Trajectories aim specifically to optimize message delivery Regular node mobility Stationary Mobile: task-oriented or messaging-oriented Number of ferries Level of coordination between Ferries Regular nodes Ferry designation Switching roles as ferry or regular node 48

49 MF example with mobile nodes Nodes are mobile and limited in resources, e.g., buffer, energy Single ferry is used Not limited in buffer or energy Trajectory of the ferry is known to all nodes Data communication in messages Application layer data unit Message timeout 49

50 Four approaches Non-Proactive ( = Messaging-Specific) mobility Only rely on inherent movement Nodes meet ferry by chance Ferrying without Epidemic Routing Ferrying with Epidemic Routing Regular nodes also replicate packets when meeting each other Proactive mobility Nodes modify their trajectories for communication purposes Node-Initiated MF(NIMF) Nodes move to meet ferry Ferry-Initiated MF (FIMF) Ferry moves to meet nodes 50

51 Node-Initiated Message Ferrying Meet the ferry? If no, keep OK working Working 51

52 Node-Initiated Message Ferrying Go to Ferry 52

53 Node-Initiated Message Ferrying Send/Recv Go to Work 53

54 Node-Initiated Message Ferrying Go to Work 54

55 Mode Transition WORKING GO TO FERRY Not planned Intentional GO TO WORK SEND/RECEIVE 55

56 Ferry Operations in NIMF 1. Move according to a ferry route; 2. Broadcast Hello messages periodically; 3. On reception of an Echo message from a node: Exchange messages with the node; 56

57 Node Trajectory Control When should node move to meet the ferry? Goal: minimize message drops and reduce proactive movement Msgs are dropped when regular node s buffer fills up or msgs time out à Have to go meet ferry frequently enough to prevent this Going to meet ferry requires node to move proactively à Reduces time node can work on assigned tasks (e.g. in emergency operation) Go to ferry if Work-time percentage > threshold and Estimated message drop percentage > threshold Msg drop rate can be estimated knowing generation rate, timeout, buffer size, ferry drop rate 57

58 Ferry-Initiated MF Ferry takes proactive movement to meet up with nodes Long range (lr) radio is used to transmit control messages Ferry tells about its location Nodes send service requests and location updates Short range (sr) radio is used to exchange messages Msg forwarding, device discovery, and msg drop computation is same as in NIMF 58

59 Ferry-initiated MF example (a) Ferry follows def. route, broadcasts its location (lr radio) Node sends service request (lr radio) with location Ferry Location N2 1: Ferry Location Ferry F Location 2: Service Location Request Update S default ferry route (a) F N1 default ferry route S (b) N2 N1 (b) Ferry moves to meet node Node guides ferry using location update (lr radio) default ferry route default ferry route F (c) Ferry and node exchange packets using sr radio when they are close enough N2 F message exchange S N1 N2 S N1 (d) Ferry goes back to its default route (c) (d) ferry route movement radio transmission ferry node before movement after movement 59

60 Heuristics for Ferry Control How does ferry decide its trajectories given many service requests? Goal: minimize msg drops Finding optimal trajectory is NP hard problem à Need to use heuristics: Nearest neighbor (NN) Always visit closest next node after finished meeting with a node Traffic aware (TA) Consider both location and known msg drop information 60

61 Evaluation Simulate using NS with MAC and default energy model 40 nodes in 5km x 5km area 25 random (source, destination) pairs Node mobility is random-waypoint with max speed 5m/s Message timeout: 8000 sec Single ferry with speed 15m/s and rectangle ferry route 61

62 Message Delivery Rate Ferry considerably improves delivery rate Further, proactive movement helps a lot Two reasons: MF improves connectivity MF reduces buffer contention problem caused by flooding in ER Mes s age delivery rate FIMF NIMF F w/er 0.3 ER Epidemic Routing E pidemic R outing (w/ ferry) 0.2 NIMF 0.1 FIMF- NN FIMF- TA Node buffer size (messages) 62

63 Message Delay Delay increases with buffer size in all schemes Nodes buffer longer before meeting with Ferry Delay much shorter with ER than MF MF explicitly delays packets by batching them in nodes and ferry ER w/ Ferry strikes middle ground Mes s age delay (s ec ) FIMF NIMF F w/er 1500 ER 1000 Epidemic Routing E pidemic R outing (w/ ferry) NIMF 500 FIMF- NN FIMF- TA Node buffer size (messages) 63

64 Impact of node mobility pattern Mobility Model Scheme Delivery Rate Delay (sec) Energy efficiency (KB/J) Random Waypoint Limited Random Waypoint NIMF FIMF ER(w/ ferry) ER NIMF FIMF ER(w/ ferry) ER Node mobility pattern has much smaller impact on MF (with proactive mobility) than ER performance Logical since ER relies purely on natural movement of nodes MF uses proactive movement à less affected by natural movement 64

65 Where Does MF Fit? High MF is applicable for the entire space Space/Time Paths MF is necessary here Mobility Hybrid Environments Low Space Paths Traditional MANET solutions apply here No (Space/Time) Paths High Node Density Low 65

66 Outline What is Delay Tolerant Networking? Mobility DTN routing protocols Epidemic Routing Message Ferrying Applications of DTN 66

67 SWIM: Shared Wireless Infostation Model SWIM infostation Biological information acquisition system Tracking and studying whales E.g., learn behavior and response to human disturbances When whales surface, they Exchange data with each other (kind of epidemic routing) Offload data to SWIM station when getting close Alternative to systems that rely on satellite communication 67

68 Vehicles on Highways Networks Destination Source 68

69 Vehicles on Highways Networks Destination Source 69

70 Vehicles on Highways Networks Destination Source 70

71 DakNet MIT project, 2004 Commercial: First Mile Solutions, later United Villages, Inc. Leverage existing transportation infrastructure to provide rural connectivity Kind of message ferrying approach Voice mail, , other elastic applications Much cheaper compared to wireless cellular infrastructure or landline service 71

72 Summary DTNs are solutions for disconnected networks Basic components Store-carry-forward Mobility Routing protocols Security Lots of different routing protocols exist No one size fits all Suitability highly dependent on target scenario Many application scenarios exist Mostly niche applications, obviously 72

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo. Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density

More information

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo. Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density

More information

A Message Ferrying Approach for Data Delivery. How to deliver data in sparse networks

A Message Ferrying Approach for Data Delivery. How to deliver data in sparse networks A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Wenrui Zhao, Mostafa Ammar, and Ellen Zegura College of Computing, Georgia Institute of Technology MobiHoc 2004 Presented

More information

A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks

A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Wenrui Zhao, Mostafa Ammar and Ellen Zegura College of Computing, Georgia Institute of Technology, Atlanta, Georgia 3332 {wrzhao,

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Social-Aware Routing in Delay Tolerant Networks

Social-Aware Routing in Delay Tolerant Networks Social-Aware Routing in Delay Tolerant Networks Jie Wu Dept. of Computer and Info. Sciences Temple University Challenged Networks Assumptions in the TCP/IP model are violated DTNs Delay-Tolerant Networks

More information

ACICE-2013 ISSN: ; e-issn

ACICE-2013 ISSN: ; e-issn 1022 A Novel Ferry-Initiated Message Ferrying Approach for Data Delivery in Disconnected Mobile Ad Hoc Networks through Native Ferries K. MURALIDHAR 1, N. GEETHANJALI 2 1 Assistant Professor, Department

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Epidemic Routing for Partially-Connected Ad Hoc Networks

Epidemic Routing for Partially-Connected Ad Hoc Networks Epidemic Routing for Partially-Connected Ad Hoc Networks Presented By- Kannan Chandrasekaran MS Computer Science, EECS, University of Kansas, Lawrence. Email: kannanc@ku.edu Amin Vahdat and David Becker,

More information

Advanced Internet Architectures

Advanced Internet Architectures Advanced Internet Architectures Carlos Borrego Iglesias Carlos.Borrego@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Tecnologies avançades d

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Chapter 1. Computer Networks and the Internet

Chapter 1. Computer Networks and the Internet Chapter 1 Computer Networks and the Internet Internet traffic What s the Internet? (hardware) PC server wireless laptop cellular handheld wired links millions of connected computing devices: hosts = end

More information

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Delay Tolerant Networks

Delay Tolerant Networks Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

A Cooperative ARQ for Delay-Tolerant Vehicular Networks

A Cooperative ARQ for Delay-Tolerant Vehicular Networks The 28th International Conference on Distributed Computing Systems Workshops A Cooperative ARQ for Delay-Tolerant Vehicular Networks Julián Morillo-Pozo, Oscar Trullols, Jose M. Barceló, Jorge García-Vidal

More information

ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic. Message Ferrying

ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic. Message Ferrying ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic 1 Message Ferrying Group 9 Timbo Yuen (tty2@sfu.ca) Dan Hendry (danh@sfu.ca) Yazan Shehadeh (ysa5@sfu.ca)

More information

CS 204: Advanced Computer Networks

CS 204: Advanced Computer Networks CS 204: Advanced Computer Networks Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Why Networks? Supports the applications

More information

Application of Graph Theory in DTN Routing

Application of Graph Theory in DTN Routing Application of Graph Theory in DTN Routing Madan H. T. 1, Shabana Sultana 2 1 M. Tech. (CNE), NIE, Mysuru 2 Associate Professor, Dept. of Computer Science & Eng., NIE, Mysuru Abstract: Delay tolerant network

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Opportunistic Routing Algorithms in Delay Tolerant Networks

Opportunistic Routing Algorithms in Delay Tolerant Networks Opportunistic Routing Algorithms in Delay Tolerant Networks Eyuphan Bulut Rensselaer Polytechnic Institute Department of Computer Science and Network Science and Technology (NeST) Center PhD Thesis Defense

More information

Wireless TCP Performance Issues

Wireless TCP Performance Issues Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the

More information

FFRDV: Fastest-Ferry Routing in DTN-enabled Vehicular Ad Hoc Networks

FFRDV: Fastest-Ferry Routing in DTN-enabled Vehicular Ad Hoc Networks FFRDV: Fastest-Ferry Routing in DTN-enabled Vehicular Ad Hoc Networks Danlei Yu and Young-Bae Ko School of Information and Computer Engineering, Ajou University, Suwon, Republic of Korea yudanlei@uns.ajou.ac.kr,

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 30, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala October 30, 2018 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

Buffer Management in Delay Tolerant Networks

Buffer Management in Delay Tolerant Networks Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Some Routing Challenges in Dynamic Networks

Some Routing Challenges in Dynamic Networks Some Routing Challenges in Dynamic Networks Jie Wu Dept. of Computer and Information Sciences Temple University Overview 1. Current State of Networking More Wireless Mobile and Opportunistic Applications

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

IT 352 : Lecture 1. Network Basics Review. Najwa AlGhamdi, MSc 2012 /1433

IT 352 : Lecture 1. Network Basics Review. Najwa AlGhamdi, MSc 2012 /1433 IT 352 : Lecture 1 Network Basics Review Najwa AlGhamdi, MSc 2012 /1433 Outline 1. OSI Reference Model. 2. IP, UDP, TCP. 3. Directory Service. 4. Replicated Service. 5. Packet Switches. 6. Destination

More information

GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS

GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS A.Robertsingh 1, Suganya A 2 1 Asst.Prof, CSE, Kalasalingam University, Krishnankoil, India 2 Asst.Prof, CSE, Kalasalingam University,

More information

Mobility-Aware Real-Time Scheduling for Low-Power Wireless Networks

Mobility-Aware Real-Time Scheduling for Low-Power Wireless Networks IEEE 35 th International Conference on Computer Communications (INFOCOM 16) 10-15 April 2016 San Francisco,, USA Mobility-Aware Real-Time Scheduling for Low-Power Wireless Networks Behnam Dezfouli Marjan

More information

Switching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1

Switching Networks (Fall 2010) EE 586 Communication and. August 27, Lecture 2. (modified by Cheung for EE586; based on K&R original) 1-1 EE 586 Communication and Switching Networks (Fall 2010) Lecture 2 August 27, 2010 (modified by Cheung for EE586; based on K&R original) 1-1 Announcements Read Chapter 1 First homework is due 9/3 In Blackboard

More information

Lecture 16: Wireless Networks

Lecture 16: Wireless Networks &6( *UDGXDWH1HWZRUNLQJ :LQWHU Lecture 16: Wireless Networks Geoffrey M. Voelker :LUHOHVV1HWZRUNLQJ Many topics in wireless networking Transport optimizations, ad hoc routing, MAC algorithms, QoS, mobility,

More information

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy

More information

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2 , pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

Part 1: Introduction. Goal: Review of how the Internet works Overview

Part 1: Introduction. Goal: Review of how the Internet works Overview Part 1: Introduction Goal: Review of how the Internet works Overview Get context Get overview, feel of the Internet Application layer protocols and addressing Network layer / Routing Link layer / Example

More information

T Computer Networks II Introduction

T Computer Networks II Introduction 23.9.20 T-110.5111 Computer Networks II Introduction 17.09.2012 Matti Siekkinen Contents Motivation and substance Why do we teach what we teach? What are the focus areas and how they relate to the big

More information

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula

More information

Chapter-4. Simulation Design and Implementation

Chapter-4. Simulation Design and Implementation Chapter-4 Simulation Design and Implementation In this chapter, the design parameters of system and the various metrics measured for performance evaluation of the routing protocols are presented. An overview

More information

ITTC A Geographical Routing Protocol for Highly-Dynamic Aeronautical Networks

ITTC A Geographical Routing Protocol for Highly-Dynamic Aeronautical Networks A Geographical Routing Protocol for Highly-Dynamic Aeronautical Networks Kevin Peters, Abdul Jabbar, Egemen K. Çetinkaya, James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information

More information

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS

CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 130 CHAPTER 5 CONCLUSION AND SCOPE FOR FUTURE EXTENSIONS 5.1 INTRODUCTION The feasibility of direct and wireless multi-hop V2V communication based on WLAN technologies, and the importance of position based

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing This is an authors' version of the manuscript. Final version published in Proc. 13th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW '14). Springer LNCS 8487, pp. 1-14, 2014. The final

More information

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network Simulation of, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network 1 Monika Aneja, 2 Vishal Garg 1 (P.G. Student JMIT, Radaur, Yamunanagar) 2 (Assistant Professor JMIT Radaur Yamunanagar)

More information

Adaptive Applications

Adaptive Applications Towards More Adaptive Voice Applications Jörg Ott Md. Tarikul Islam, Cheng Luo Nagasai Panchakarla, Anssi Turkulainen 13 October 2011 ISOLA 2010 2011 Jörg Ott 1 Adaptive Applications

More information

UNIVERSITY OF OSLO Department of Informatics. Dynamic Selection of Message Carriers in a Sparse and Disruptive MANET.

UNIVERSITY OF OSLO Department of Informatics. Dynamic Selection of Message Carriers in a Sparse and Disruptive MANET. UNIVERSITY OF OSLO Department of Informatics Dynamic Selection of Message Carriers in a Sparse and Disruptive MANET Jan Erik Haavet November 7, 211 Acknowledgement I would really like to thank my supervisors:

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Multihop Mobile and Vehicular Networks

Multihop Mobile and Vehicular Networks Multihop Mobile and Vehicular Networks Ľubomír Doboš lubomir.dobos@tuke.sk Technical University of Košice Faculty of Electrical Engineering and Informatics Dept. of Electronics and Multimedia Communications

More information

Delay-Differentiated Gossiping in Delay Tolerant Networks

Delay-Differentiated Gossiping in Delay Tolerant Networks Delay-Differentiated Gossiping in Delay Tolerant Networks Parameswaran Ramanathan and Aarti Singh Department of Electrical and Computer Engineering University of Wisconsin-Madison parmesh@ecewiscedu, singh@caewiscedu

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

MobilityFirst GSTAR: Generalized Storage Aware Routing

MobilityFirst GSTAR: Generalized Storage Aware Routing MobilityFirst GSTAR: Generalized Storage Aware Routing Samuel Nelson MobilityFirst Design Goals Design a future internet architecture that supports: Host and network mobility Diverse communication devices/entities/paradigms

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

Aanchal Walia #1, Pushparaj Pal *2

Aanchal Walia #1, Pushparaj Pal *2 An Implemented approach of VANET using Location Information based Technique for safe city and vehicle Aanchal Walia #1, Pushparaj Pal *2 #1. M.Tech Scholor,ECE,Krukshetra University, *2. A.P.ECE Department,

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Integrated Buffer and Route Management in a DTN with Message Ferry

Integrated Buffer and Route Management in a DTN with Message Ferry Integrated Buffer and Route Management in a DTN with Message Ferry Mooi Choo Chuah Wen-Bin Ma chuah@cse.lehigh.edu wem2@.lehigh.edu Department of Computer Science and Engineering 19 Memorial Drive West,

More information

Design Considerations : Computer Networking. Outline

Design Considerations : Computer Networking. Outline Design Considerations 15-744: Computer Networking L-2 Design Considerations How to determine split of functionality Across protocol layers Across network nodes Assigned Reading [SRC84] End-to-end Arguments

More information

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit) CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking

Wireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Design and Evaluation of a new MAC Protocol for Long- Distance Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005

Design and Evaluation of a new MAC Protocol for Long- Distance Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005 Design and Evaluation of a new MAC Protocol for Long- Distance 802.11 Mesh Networks by Bhaskaran Raman & Kameswari Chebrolu ACM Mobicom 2005 Reviewed by Anupama Guha Thakurta CS525M - Mobile and Ubiquitous

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

DTN Interworking for Future Internet Presented by Chang, Dukhyun

DTN Interworking for Future Internet Presented by Chang, Dukhyun DTN Interworking for Future Internet 2008.02.20 Presented by Chang, Dukhyun Contents 1 2 3 4 Introduction Project Progress Future DTN Architecture Summary 2/29 DTN Introduction Delay and Disruption Tolerant

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are

More information

UNIT 1 Questions & Solutions

UNIT 1 Questions & Solutions UNIT 1 Questions & Solutions 1. Give any 5 differences between cellular wireless networks and ADHOC wireless network. Ans: The following table shows the difference between cellular networks and Adhoc wireless

More information

TRANSMISSION CONTROL PROTOCOL

TRANSMISSION CONTROL PROTOCOL COMP 635: WIRELESS & MOBILE COMMUNICATIONS TRANSMISSION CONTROL PROTOCOL Jasleen Kaur Fall 2017 1 Impact of Wireless on Protocol Layers Application layer Transport layer Network layer Data link layer Physical

More information

MOBILITY MODELS FOR NEXT WIRELESS NETWORKS GENERATION WILEY AD HOC, VEHICULAR AND MESH NETWORKS. Paolo Santi

MOBILITY MODELS FOR NEXT WIRELESS NETWORKS GENERATION WILEY AD HOC, VEHICULAR AND MESH NETWORKS. Paolo Santi MOBILITY MODELS FOR NEXT GENERATION WIRELESS NETWORKS AD HOC, VEHICULAR AND MESH NETWORKS Paolo Santi Istituto di Informatica e Telematica del CNR, Italy WILEY A John Wiley & Sons, Ltd., Publication Contents

More information

Opportunistic Networks: A Review

Opportunistic Networks: A Review IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. III (Mar-Apr. 2016), PP 20-26 www.iosrjournals.org Opportunistic Networks: A Review Navneet

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

Experimental Evaluation of Gateway Based Interdomain Routing Scheme for DTN

Experimental Evaluation of Gateway Based Interdomain Routing Scheme for DTN Lehigh University Lehigh Preserve Theses and Dissertations 2011 Experimental Evaluation of Gateway Based Interdomain Routing Scheme for DTN Dongli Li Lehigh University Follow this and additional works

More information

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Ankur Upadhyay Department of Computer Science & Engineering School of Engineering & Technology, IFTM

More information

I. INTRODUCTION. Keywords-disruption tolerant networks; custody transfer; route discovery; message ferry

I. INTRODUCTION. Keywords-disruption tolerant networks; custody transfer; route discovery; message ferry Performance Comparison of Unicast Routing Schemes in DTNs Mooi Choo Chuah, Peng Yang, Brian D. Davison, Liang Cheng {chuah, pey204, davison, cheng}@cse.lehigh.edu Lehigh University Abstract Delay and disruption

More information

Simulation and Analysis of Opportunistic Routing Protocols

Simulation and Analysis of Opportunistic Routing Protocols Simulation and Analysis of Opportunistic Routing Protocols 1 The Purpose The purpose of this assignment is to gain familiarity with a network simulation tool and to get experience in basic data analysis.

More information

UDP, TCP, IP multicast

UDP, TCP, IP multicast UDP, TCP, IP multicast Dan Williams In this lecture UDP (user datagram protocol) Unreliable, packet-based TCP (transmission control protocol) Reliable, connection oriented, stream-based IP multicast Process-to-Process

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

THE INTERNET PROTOCOL INTERFACES

THE INTERNET PROTOCOL INTERFACES THE INTERNET PROTOCOL The Internet Protocol Stefan D. Bruda Winter 2018 A (connectionless) network protocol Designed for use in interconnected systems of packet-switched computer communication networks

More information

Mobile Wireless Networking Mobility and Location Management

Mobile Wireless Networking Mobility and Location Management Mobile Wireless Networking The University of Kansas EECS 882 Mobility and James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications Research

More information