Routing Performance Analysis in Delay Tolerant Networks
|
|
- Thomasine Townsend
- 5 years ago
- Views:
Transcription
1 Routing Performance Analysis in Delay Tolerant Networks Presenter: Hao Liang Main References: [1] G. Resta and P. Santi, A framework for routing performance analysis in delay tolerant networks with application to noncooperative networks, IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 1, pp. 2-10, Jan (Conf. Ver.: IEEE SECON 09) [2] X. Zhang, G. Neglia, J. Kurose, and D. Towsley, Performance modeling of epidemic routing, Computer Networks, vol. 51, no. 10, pp , Jul BBCR VANET/DTN Subgroup Meeting
2 Outline Stochastic Coloring Process Based Method - System Model - Routing Analysis Framework - Preliminaries - Analysis of Epidemic Routing - Analysis of Two-Hops Routing Ordinary Differential Equations (ODEs) Based Method - A Brief Introduction Summary and Discussions 1
3 Stochastic Coloring Process Based Method [1] G. Resta and P. Santi, A framework for routing performance analysis in delay tolerant networks with application to noncooperative networks, IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 1, pp. 2-10, Jan
4 System Model Consider a delay-tolerant network composed of M nodes. Denote the set of nodes as Μ Among the M nodes, a node s is chosen uniformly at random as the packet source, and another node d s is chosen uniformly at random as the packet destination The goal is to analyze the performance of DTN routing protocols used to route the packet from s to d s d Μ 3
5 System Model Performance Metrics (Probability Distribution of ) Packet delivery delay: The time elapsing between the instant at which a packet is generated at s, and the instant at which a copy of the packet is first received by d Communication cost: The number of nodes holding at least one copy of the packet present in the network at the instant at which a copy of the packet is first received by d 4
6 System Model Assumptions Low load: network traffic is low, so that buffer capacity on the nodes is not an issue Transmission range: Two nodes can communicate (encounter) iff they are within distance r No contention (low node density): Any communicating pair of nodes does not interfere with any other pair communicating at the same time Fast transmissions: The duration of node encounters is always sufficient for the two nodes to exchange the content of their buffers 5
7 Routing Analysis Framework The routing analysis framework can be applied to any stateless, deterministic routing protocol for DTNs Stateless: Decisions about whether a copy of the packet should be delivered to an encountered node do not depend on a notion of state (such as history of past encounters and information related to social relationships between nodes) Deterministic: Routing decisions are not influenced by random choices ( Note: specifically, epidemic and two-hops (source spray-and-wait) routing protocols are considered in this work ) 6
8 Routing Analysis Framework The Stochastic Coloring Process Nodes in Μ \ {s,d} can be in one of the following states: Uncolored (U): nodes in this state have not yet received a copy of the packet Colored active (CA): nodes in this state have at least two copies of the packet; these nodes are allowed to deliver one or more copies of the packet to any uncolored node ( Note: copy of a packet = token of a packet (i.e., the number of allowed forwardings) ) Colored inactive (CI): nodes in this state have one copy of the packet; these nodes are allowed to delivery the only copy of the packet they have only to the final destination 7
9 Routing Analysis Framework The Stochastic Coloring Process (Cont d) Let L be the maximum number of copies of a packet (excluding possible copy delivered to the destination) allowed to circulate in the network by the routing protocol at hand The coloring process starts at time t 0 =0, when the source node is in state CA, and all other nodes are in state U The relevant events in the considered stochastic process are coloring events, representing the situation in which a node in CA state encounters a node in U state, or a node in CA/CI state encounters the destination The ith coloring event is denoted by E i, and occurs at time T i 8
10 Routing Analysis Framework The Stochastic Coloring Process (Cont d) ( Note: commonly referred to as the source spray-and-wait routing protocol ) An example: L = 4. Initially, only the source node is colored (and active) At time T 1, the first node is colored and transitions to state CI At time T 3, four copies of the packet are circulating in the network: the spray phase ends, and the wait phase starts At time T 4, the destination node is colored and the coloring process ends 9
11 Routing Analysis Framework Delay Analysis Let E d denote the event destination is colored, which occurs at time T d The goal is to characterize the probability distribution of random variable T d, i.e., for any given t > 0 10
12 Routing Analysis Framework Delay Analysis (Cont d) Denote by E d,i the event destination is the ith colored node. It is immediate to see that the E d,i s are mutually disjoint events, and Two subproblems: 1) Computing the distribution of r.v. T i, conditioned on E d,i 2) Computing the probability of event E d,i Computing probabilities P(E d,i ) is exactly what is needed to derive the communication cost distribution, which is then a byproduct of 2) 11
13 Delay Analysis (Cont d) Routing Analysis Framework Observe that T i can be expressed as a sum of random variables τ 1,..., τ i, where r.v. τ 1 =T 1 - t 0, and τ j =T j T j-1 for 1 < j i. Then The distribution of τ j random variables depends on the features of the mobility pattern!! Assumption: nodes move according to an arbitrary mobility model with exponentially distributed meeting time with rate 1/emt between arbitrary node pairs, where emt is the expected meeting time between arbitrary node pairs 12
14 Preliminaries Exponential Random Variable Use notation f(λ,x) and F(λ,x) to denote the PDF and CDF of an exponential random variable of parameter λ 13
15 Preliminaries Order Statistic of Random Variables Consider n i.i.d. continuous random variables X 1,..., X n, and let X 1,..., X n be a realization of the n random variables Now order the values of the realization in increasing order, starting from the smallest, and denote with X (1),..., X (n) the ordered values. Each of the X (i), for i = 1,..., n, can be considered as a realization of a random variable X (i), which is known as the ith order statistic of random variables X 1,..., X n Note that X (1) = min{x 1,..., X n }, X (n) = max{x 1,..., X n } 14
16 Preliminaries Order Statistic of Random Variables (Cont d) Denoting by ψ(x) and Ψ(x) the PDF and CDF, respectively, of each of the X i, the PDF of the ith order statistic of random variables X 1,..., X n is In the following, we denote by Ord(n, i, λ, x) the PDF of the ith order statistic of a set of n i.i.d. exponential random variables of parameter λ 15
17 Preliminaries 16
18 Analysis of Epidemic Routing 17
19 Analysis of Two-Hops Routing General Expression of Delay According to the analysis framework, the packet delivery delay distribution can be computed as 18
20 Analysis of Two-Hops Routing First Term The first term in the summation corresponds to the situation in which the destination is the first colored node, and the spray phase does not even start. Then, we have CDF of an exponential random variable with parameter (M-1)/emt 19
21 Analysis of Two-Hops Routing The Last Term (i.e., when i = L) When i = L, the spraying process is finished (i.e., (L 1) nodes have been colored by the source), and coloring of the destination occurs during the wait phase Note that in the wait phase the coloring process is symmetric, hence any of the L nodes currently holding a copy of the packet can color the destination Denote by S i the random variable corresponding to the first time source node s meets node i after packet generation, for i = 1,..., M 1 20
22 Analysis of Two-Hops Routing The Last Term (i.e., when i = L) (Cont d) It is easy to see that the starting time of the wait phase is random variable S (L 1), i.e., the (L 1)th order statistic of random variables S (1),..., S (M 1), whose PDF is Ord(M 1, L 1, 1/emt, x) 21
23 Analysis of Two-Hops Routing The Last Term (i.e., when i = L) (Cont d) Should be (t-x)? Conditioned on S (L 1) = x, the probability of delivering the packet to destination within time t is given by the CDF at time (TTL x) of an exponential random variable with rate L/emt, which represents the time at which the first amongst the L colored nodes meets the destination The value of P(E d,l ) is computed as 22
24 Analysis of Two-Hops Routing When 1 < i < L Event E d,i can be divided into mutually disjoint events and, corresponding to the situation in which the destination is colored by the source s or by a non-source node Conditioned on, the probability of delivering the packet to the destination within time t can be computed observing that the destination is the ith node encountered by s, and that the random time of this encounter corresponds to the ith order statistic of random variables S 1,..., S M 1 23
25 When 1 < i < L (Cont d) Analysis of Two-Hops Routing We now compute, from which can be trivially derived Use random variables to denote the time at which node h (which has been colored at time S h ) first meets the destination Conditioned on a specific value of has exponential distribution of rate 1/emt, for h = 1,..., i 1 Should be -x? 24
26 When 1 < i < L (Cont d) Analysis of Two-Hops Routing Subdivide into disjoint events, k = 1,..., i 1, where is the event the destination is colored by the k-th nonsource node The above event occurs if and only if for each h = 1,..., i 1 (with h k) and 25
27 When 1 < i < L (Cont d) Analysis of Two-Hops Routing where is the PDF of random variable, which is the sum of two independent random variables with different (and nontrivial) distributions. To circumvent this problem, we use the approximation The approximation is very accurate as long as the ratio L/M is around 0.1 or below 26
28 Analysis of Two-Hops Routing When 1 < i < L (Cont d) Then, we have Note that in the above equation we assume that pairs of events, with h h, are mutually independent, which is not true in general. By observing that the probability that the ith node met by the source is the destination is 1/(M (i 1)), we have 27
29 Analysis of Two-Hops Routing When 1 < i < L (Cont d) Should be (t-x)? In the above equation, we have used the fact that, conditioned on event, the PDF of random variable is closely approximated by the PDF of an exponential random variable of parameter (M i)/emt, corresponding to the first encounter (which, conditioned on, we know is with the kth relay node) between the destination and one of the i nodes (including the source) currently holding a copy of the packet 28
30 Analysis of Two-Hops Routing Performance Metric - Packet Delivery Delay (1 < i < L) Derived from Approximation based on an exponential random variable of parameter (M i)/emt Approximation by assuming independency Approximation based on S h S 1 29
31 Analysis of Two-Hops Routing Performance Metric - Communication Cost Only consider the event that the destination is colored by source s Correct?? 30
32 Numerical Results (Two-Hops Routing) Analysis of Two-Hops Routing M = 30 nodes are initially distributed uniformly at random in a square area of 10 km side. Nodes have a transmission range of 250 m, and move according to the random waypoint (RWP) mobility model with no pause time More accurate for smaller L/M 31
33 Analysis of Two-Hops Routing Numerical Results (Epidemic Routing) More accurate than [2] 32
34 Ordinary Differential Equations (ODEs) Based Method [2] X. Zhang, G. Neglia, J. Kurose, and D. Towsley, Performance modeling of epidemic routing, Computer Networks, vol. 51, no. 10, pp , Jul
35 ODEs Based Method Foundation: Markov Model Given n I (t), the number of infected nodes at time t, the transition rate from state n I to state n I + 1 is where N is the total number of nodes in the network (excluding the destination), and β is the pairwise meeting rate As N increases, the fraction of infected nodes (n I /N) converges asymptotically to the solution of the following equation 34
36 ODEs Based Method Delay Under Epidemic Routing Denote the CDF by P N (t) = Prob(T d < t). We have 35
37 ODEs Based Method Delay Under Epidemic Routing (Cont d) As N increases, E[n I (t)/n] converges to i(t), and P N (t) converges to the solution of 36
38 Summary and Discussions 37
39 Summary and Discussions Stochastic Coloring Process Based Method - Better estimation of packet delivery delay PDF - Complicated with lots of approximations, more accurate for smaller L/M ODEs Based Method - Simpler - Less accurate estimation of packet delivery delay PDF Limitations (Potential Improvement) - Exponentially distributed meeting time - Only for stateless routing protocols 38
A Joint Replication-Migration-based Routing in Delay Tolerant Networks
A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West
More informationOptimal Buffer Management Policies for Delay Tolerant Networks
Optimal Buffer Management Policies for Delay Tolerant Networks Chadi BARAKAT INRIA Sophia Antipolis, France Planète research group Joint work with Amir Krifa and Thrasyvoulos Spyropoulos Email: Chadi.Barakat@sophia.inria.fr
More informationA Multi-Copy Delegation Forwarding Based On Short-term and Long-Term Speed in DTNs
A Multi-Copy Delegation Forwarding Based On Short-term and Long-Term Speed in DTNs En Wang, 1,2 Yongjian Yang, 1 Jie Wu, 2 and Wenbin Liu 3 1 Department of Computer Science and Technology, Jilin University,
More informationImpact of Source Counter on Routing Performance in Resource Constrained DTNs
Impact of Source Counter on Routing Performance in Resource Constrained DTNs Xiaolan Zhang a,, Honggang Zhang b, Yu Gu c a Dept. of Computer and Information Sciences, Fordham University b Dept. of Mathematics
More informationOn Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University Outline Introduction
More informationDouble-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs
Double-Loop Receiver-Initiated MAC for Cooperative Data Dissemination via Roadside WLANs Presented by: Hao Liang Broadband Communications Research (BBCR) Lab 2012.7.6 Outline Introduction and Related Work
More informationCHAPTER 7 COMPARISON OF DIFFERENT ROUTING SCHEMES
80 CHAPTER 7 COMPARISON OF DIFFERENT ROUTING SCHEMES 7.1 PERFORMANCE METRICS In the preceding chapters data delivery rate, buffer space, node density and message delay, average hop count, average buffer
More informationSpray and Dynamic: Advanced Routing in Delay Tolerant Networks
Int. J. Communications, Network and System Sciences, 2012, 5, 98-104 http://dx.doi.org/10.4236/ijcns.2012.52013 Published Online February 2012 (http://www.scirp.org/journal/ijcns) Spray and Dynamic: Advanced
More informationPresenter: Wei Chang4
Quan Yuan1, Ionut Cardei2, Jing Chen3, and Jie Wu4 Presenter: Wei Chang4 University of Texas-Permian Basin1, Florida Atlantic University2 Wuhan University3,Temple University4 } Background } Motivation
More informationRead Chapter 4 of Kurose-Ross
CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures
More informationPeculiarities of Delay Tolerant Networks
On the Effects of Cooperation in DTNs Antonis Panagakis, Athanasios Vaios, Ioannis Stavrakakis E-mail: {apan{ apan, avaios, ioannis}@di.uoa.gr Reference: http://cgi.di.uoa.gr cgi.di.uoa.gr/~ioannis/publications/2007comsware.pvs.pdf
More informationDensity-Aware Routing in Highly Dynamic DTNs: The RollerNet Case
Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case Pierre-Ugo Tournoux, Student Member, IEEE, Je re mie Leguay, Farid Benbadis, John Whitbeck, Student Member, IEEE, Vania Conan, and Marcelo
More informationCenter for Networked Computing
Concept of mobile social networks (MSNs): People walk around with smartphones and communicate with each other via Bluetooth or Wi-Fi when they are within transmission range of each other. Characters: No
More informationApplication-Oriented Multimedia Streaming over Wireless Multihop Networks
Application-Oriented Multimedia Streaming over Wireless Multihop Networks Luan, Hao (Tom) BBCR Lab, ECE Department University of Waterloo May 11, 2009 1 / 21 Multimedia Streaming Display of audio-visual
More informationHeterogeneous Community-based Routing in Opportunistic Mobile Social Networks
Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Yunsheng Wang Kettering University Jie Wu Temple University Mingjun Xiao University of Science and Tech. of China Daqiang Zhang
More informationQueuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks
Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu
More informationPerformance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2
, pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department
More informationExploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach
Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach 7 th Annual IEEE Communication Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 10)
More informationThe Capacity of Wireless Networks
The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of
More informationPerformance Modeling of Epidemic Routing
Performance Modeling of Epidemic Routing Xiaolan Zhang 1, Giovanni Neglia 2, Jim Kurose 1, Don Towsley 1 1 University of Massachusetts, Amherst MA 12, USA, {ellenz,kurose,towsley}@cs.umass.edu, 2 Università
More informationSocial-Aware Forwarding Improves Routing Performance in Pocket Switched Networks
Social-Aware Forwarding Improves Routing Performance in Pocket Switched Networks Josep Díaz 1, Alberto Marchetti-Spaccamela 2, Dieter Mitsche 1, Paolo Santi 3 and Julinda Stefa 2 1 Univ. Politècnica de
More informationROUTING IN MOBILE DTNS: PERFORMANCE MODELING, NETWORK CODING BENEFIT, AND MOBILITY TRACE MODELING
ROUTING IN MOBILE DTNS: PERFORMANCE MODELING, NETWORK CODING BENEFIT, AND MOBILITY TRACE MODELING A Dissertation Presented by XIAOLAN ZHANG Submitted to the Graduate School of the University of Massachusetts
More informationScheduling Algorithms to Minimize Session Delays
Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of
More informationConnection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information
Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information Javad Ghaderi, Tianxiong Ji and R. Srikant Coordinated Science Laboratory and Department of Electrical and Computer Engineering
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationA ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China
More informationTimely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks
27 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): 27 IEEE Infocom MiseNet Workshop Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks
More informationModeling Redundancy-based Routing in Delay Tolerant Networks
Modeling Redundancy-based Routing in Delay Tolerant Networks Yong Liao, Kun Tan, Zhensheng Zhang, Lixin Gao Dep. of Electrical & Computer Eng. Microsoft Research Asia San Diego Research Center University
More informationA Generalization of a TCP Model: Multiple Source-Destination Case. with Arbitrary LAN as the Access Network
A Generalization of a TCP Model: Multiple Source-Destination Case with Arbitrary LAN as the Access Network Oleg Gusak and Tu rul Dayar Department of Computer Engineering and Information Science Bilkent
More informationPerformance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]
Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China
More informationDelay Tolerant Networks
Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected
More informationOptimal Control for Epidemic Routing of Two Files with Different Priorities in Delay Tolerant Networks
Optimal Control for Epidemic Routing of Two Files with Different Priorities in Delay Tolerant Networks Shangxing Wang, MHR. Khouzani 2, Bhaskar Krishnamachari and Fan Bai 3 Abstract We consider the problem
More informationBenefits of Network Coding for Unicast Application in Disruption Tolerant Networks
SUBMITTED TO IEEE/ACM TRANSACTIONS ON NETWORKING Benefits of Network Coding for Unicast Application in Disruption Tolerant Networks Xiaolan Zhang, Member IEEE, Giovanni Neglia, Member IEEE, Jim Kurose,
More informationPerformance Evaluations of Data-Centric Information Retrieval Schemes for DTNs
Computer Networks Vol x, Issue y 1 Performance Evaluations of Data-Centric Information Retrieval Schemes for DTNs P. Yang, Member, IEEE M. Chuah 1, Senior Member, IEEE Abstract Mobile nodes in some challenging
More information1. INTRODUCTION. Saravanan.A 1 and Dr.Sunitha Abburu 2
www.ijcsi.org 365 Computing Conditional Intermeeting Time in Conditional Shortest Path Routing Saravanan.A 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application,
More informationComparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay
Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula
More informationOPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005
OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in
More informationChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks
ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks Douglas McGeehan Dan Lin Sanjay Madria Department of Computer Science Missouri University of Science and Technology Rolla,
More informationINTERMITTENTLY connected mobile networks (ICMN)
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008 63 Efficient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case Thrasyvoulos Spyropoulos, Student Member, IEEE,
More informationDELAY-TOLERANT networks (DTNs) [1] are wireless
1530 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 5, OCTOBER 2010 Cost-Effective Multiperiod Spraying for Routing in Delay-Tolerant Networks Eyuphan Bulut, Member, IEEE, Zijian Wang, and Boleslaw
More informationCOMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS
COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS Chintan B. Desai PG Student, Electronics and Communication Department, Charotar University of Science & Technology, Changa,
More informationAnalysing Delay-tolerant Networks with Correlated Mobility
Analysing Delay-tolerant Networks with Correlated Mobility Mikael Asplund, Simin Nadjm-Tehrani Department of Computer and Information Science Linköping University {mikael.asplund,simin-nadjm.tehrani}@liu.se
More informationDTN Interworking for Future Internet Presented by Chang, Dukhyun
DTN Interworking for Future Internet 2008.02.20 Presented by Chang, Dukhyun Contents 1 2 3 4 Introduction Project Progress Future DTN Architecture Summary 2/29 DTN Introduction Delay and Disruption Tolerant
More informationApplication of Graph Theory in DTN Routing
Application of Graph Theory in DTN Routing Madan H. T. 1, Shabana Sultana 2 1 M. Tech. (CNE), NIE, Mysuru 2 Associate Professor, Dept. of Computer Science & Eng., NIE, Mysuru Abstract: Delay tolerant network
More informationWei Gao, Qinghua Li, Bo Zhao and Guohong Cao The Pennsylvania State University From: MobiHoc Presentor: Mingyuan Yan Advisor: Dr.
Wei Gao, Qinghua Li, Bo Zhao and Guohong Cao The Pennsylvania State University From: MobiHoc 2009 Presentor: Mingyuan Yan Advisor: Dr. Yingshu Li 1 2 3 4 5 Introduction Problem definition Single-data multicast
More informationRouting in Delay Tolerant Networks (DTN)
Int. J. Communications, Network and System Sciences, 2011, 4, 53-58 doi:10.4236/ijcns.2011.41006 Published Online January 2011 (http://www.scirp.org/journal/ijcns) Routing in Delay Tolerant Networks (DTN)
More informationCommunity-Aware Opportunistic Routing in Mobile Social Networks
1682 IEEE TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 7, JULY 2014 Community-Aware Opportunistic Routing in Mobile Social Networks Mingjun Xiao, Member, IEEE, Jie Wu, Fellow, IEEE, and Liusheng Huang, Member,
More informationCONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS
CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department
More informationOpportunistic Routing Algorithms in Delay Tolerant Networks
Opportunistic Routing Algorithms in Delay Tolerant Networks Eyuphan Bulut Rensselaer Polytechnic Institute Department of Computer Science and Network Science and Technology (NeST) Center PhD Thesis Defense
More informationCommunity-home-based Multi-copy Routing in Mobile Social Networks
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL:PP NO:99 YEAR 204 Community-home-based Multi-copy Routing in Mobile Social Networks Mingjun Xiao, Member, IEEE, Jie Wu, Fellow, IEEE, and Liusheng
More informationSpray and forward: Efficient routing based on the Markov location prediction model for DTNs
. RESEARCH PAPER. SCIENCE CHINA Information Sciences February 2012 Vol. 55 No. 2: 433 440 doi: 10.1007/s11432-011-4345-1 Spray and forward: Efficient routing based on the Markov location prediction model
More informationAutomated Routing Protocol Selection in Mobile Ad Hoc Networks
Automated Routing Protocol Selection in Mobile Ad Hoc Networks Taesoo Jun and Christine Julien March 13, 2007 Presented by Taesoo Jun The Mobile and Pervasive Computing Group Electrical and Computer Engineering
More informationDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,
More informationA DTN Packet Forwarding Scheme Inspired by Thermodynamics
A DTN Packet Forwarding Scheme Inspired by Thermodynamics Mehdi Kalantari and Richard J. La Department of Electrical and Computer Engineering University of Maryland {mehkalan, hyongla}@umd.edu Abstract
More informationPerformance Analysis of WLANs Under Sporadic Traffic
Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs
More informationWorkload Characterization Techniques
Workload Characterization Techniques Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse567-08/
More informationMOBILITY MODELS FOR NEXT WIRELESS NETWORKS GENERATION WILEY AD HOC, VEHICULAR AND MESH NETWORKS. Paolo Santi
MOBILITY MODELS FOR NEXT GENERATION WIRELESS NETWORKS AD HOC, VEHICULAR AND MESH NETWORKS Paolo Santi Istituto di Informatica e Telematica del CNR, Italy WILEY A John Wiley & Sons, Ltd., Publication Contents
More informationSELECTION OF METRICS (CONT) Gaia Maselli
SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual
More informationPerformance Modeling of Epidemic Routing
Performance Modeling of Epidemic outing Ellen(Xiaolan) Zhang, Giovanni Neglia, Jim Kurose, Don Towsley Dept. of omputer Science niversità degli Studi di Palermo niversity of Massachusetts, Amherst giovanni.neglia@tti.unipa.it
More informationModelling the Duration of Multihop Paths in Mobile Ad Hoc Networks
Modelling the Duration of Multihop Paths in Mobile Ad Hoc Networks Gonçalo Jacinto, Nelson Antunes and António Pacheco Abstract Mobile ad hoc networks are characterized by having nodes that are cooperative
More informationPerformance Modeling for Two-hop Relay with Node Selfishness in Delay Tolerant Networks
Performance Modeling for Two-hop Relay with Node Selfishness in Delay Tolerant Networks 211 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in
More informationComputer Communications
Computer Communications xxx (28) xxx xxx Contents lists available at ScienceDirect Computer Communications journal homepage: www.elsevier.com/locate/comcom An encounter-based multicast scheme for disruption
More informationDiversity of Forwarding Paths in Pocket Switched Networks. Boston University Boston, MA Paris, France. BUCS TR , Spring 2007
[ Diversity of Forwarding Paths in Pocket Switched Networks Vijay Erramilli (), Augustin Chaintreau (2), Mark Crovella (), Christophe Diot (2) () Department of Computer Science Boston University Boston,
More informationIN DELAY Tolerant Networks (DTNs) [1], mobile devices
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 25, NO. 5, OCTOER 2017 2829 Transient Community Detection and Its Application to Data Forwarding in Delay Tolerant Networks Xiaomei Zhang, Member, IEEE, and Guohong
More informationQueuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012
Queuing Systems Queuing theory establishes a powerful tool in modeling and performance analysis of many complex systems, such as computer networks, telecommunication systems, call centers, manufacturing
More informationRouting in a Delay Tolerant Network
Routing in a Delay Tolerant Network Vladislav Marinov Jacobs University Bremen March 31st, 2008 Vladislav Marinov Routing in a Delay Tolerant Network 1 Internet for a Remote Village Dial-up connection
More informationRouting Protocol Approaches in Delay Tolerant Networks
Routing Protocol Approaches in Delay Tolerant Networks Shivi Shukla 1, Amit Munjal 2 and Y. N. Singh 2 AIM & ACT Dept., Banasthali Vidyapith, Rajasthan 1 EE Dept., Indian Institute of Technology, Kanpur
More informationACENTRAL question in the study of multihop networks
1118 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 4, AUGUST 2009 The Achievable Rate Region of 80211-Scheduled Multihop Networks Apoorva Jindal, Member, IEEE, and Konstantinos Psounis, Senior Member,
More informationThe 2-core of a Non-homogeneous Hypergraph
July 16, 2012 k-cores A Hypergraph G on vertex set V is a collection E of subsets of V. E is the set of hyperedges. For ordinary graphs, e = 2 for all e E. The k-core of a (hyper)graph is the maximal subgraph
More informationDelay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective
Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Ness Shroff School of Electrical and Computer Engineering Purdue University West Lafayette, IN
More informationChapter 2 Delay Tolerant Routing and Applications
Chapter 2 Delay Tolerant Routing and Applications The fundamental goal of any communication network is to have the data/ packets/messages delivered to their corresponding destinations. With nontrivial
More informationSocial-Aware Routing in Delay Tolerant Networks
Social-Aware Routing in Delay Tolerant Networks Jie Wu Dept. of Computer and Info. Sciences Temple University Challenged Networks Assumptions in the TCP/IP model are violated DTNs Delay-Tolerant Networks
More informationBUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks
1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms
More informationNetwork Coding Efficiency In The Presence Of An Intermittent Backhaul Network
IEEE ICC 2016 - Wireless Communications Symposium Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network Stefan Achleitner, Thomas La Porta Computer Science and Engineering The Pennsylvania
More informationTELCOM 2130 Queueing Theory. David Tipper Associate Professor Graduate Telecommunications and Networking Program. University of Pittsburgh
TELCOM 2130 Queueing Theory David Tipper Associate Professor Graduate Telecommunications and Networking Program University of Pittsburgh Learning Objective To develop the modeling and mathematical skills
More informationAnalysis of Replication Control Protocols
Analysis of Replication Control Protocols Darrell D. E. Long University of California, Santa Cruz darrell@cis.ucsc.edu June 22, 2003 Abstract In recent years many replication control protocols have been
More informationOptimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks
Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,
More informationRouting in Large-Scale Buses Ad Hoc Networks
1 Routing in Large-Scale Buses Ad Hoc Networks Michel Sede, Xu Li *, Da Li *, Min-You Wu * Laboratory for Computer Communications and Applications, EPFL, Switzerland * Department of Computer Science and
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationCLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS
CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS CHAPTER 4 CLASSIFICATION WITH RADIAL BASIS AND PROBABILISTIC NEURAL NETWORKS 4.1 Introduction Optical character recognition is one of
More informationA simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability
A Simple Performance Analysis of a Core Node in an Optical Burst Switched Network Mohamed H. S. Morsy, student member, Mohamad Y. S. Sowailem, student member, and Hossam M. H. Shalaby, Senior member, IEEE
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationWireless Contention in Mobile Multi-hop Networks
Wireless Contention in Mobile Multi-hop etworks Apoorva Jindal, Konstantinos Psounis University of Southern California E-mail: apoorvaj, kpsounis@uscedu Abstract Wireless contention is the most important
More informationCombined Mobile Ad-hoc and Delay/Disruption-tolerant Routing
This is an authors' version of the manuscript. Final version published in Proc. 13th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW '14). Springer LNCS 8487, pp. 1-14, 2014. The final
More informationEpidemic theory based H + 1 hop forwarding for intermittently connected mobile ad hoc networks
RESEARCH Open Access Epidemic theory based H + hop forwarding for intermittently connected mobile ad hoc networks Xin Guan *, Min Chen 2,3 and Tomoaki Ohtsuki Abstract In intermittently connected mobile
More informationTopology basics. Constraints and measures. Butterfly networks.
EE48: Advanced Computer Organization Lecture # Interconnection Networks Architecture and Design Stanford University Topology basics. Constraints and measures. Butterfly networks. Lecture #: Monday, 7 April
More informationON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFERENT MOBILITY MODELS
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFERENT MOBILITY MODELS Natarajan Meghanathan 1 and Sireesha Gorla 1, Jackson State University, 1400 Lynch St, Jackson, MS, USA
More informationModeling Spatial Node Density in Waypoint Mobility
Modeling Spatial Node Density in Waypoint Mobility Bruno A. A. Nunes 1 and Katia Obraczka Department of Computer Engineering, Baskin School of Engineering University of California, Santa Cruz, CA, USA
More informationOn-Line Routing in WDM-TDM Switched Optical Mesh Networks
On-Line Routing in WDM-TDM Switched Optical Mesh Networks Arun Vishwanath and Weifa Liang Department of Computer Science The Australian National University Canberra, ACT-0200, Australia Email: {arunv,wliang}@cs.anu.edu.au
More informationSimulation and Analysis of Opportunistic Routing Protocols
Simulation and Analysis of Opportunistic Routing Protocols 1 The Purpose The purpose of this assignment is to gain familiarity with a network simulation tool and to get experience in basic data analysis.
More informationSMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks
SMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks Kang Chen and Haiying Shen Department of Electrical and Computer Engineering Clemson University, Clemson, SC 9631 Email:
More informationPAPER Analysis of Block Delivery Delay in Network Coding-Based Delay Tolerant Networks
IEICE TRANS. COMMUN., VOL.E96 B, NO.1 JANUARY 2013 135 PAPER Analysis of Block Delivery Delay in Network Coding-Based Delay Tolerant Networks Juhua PU a), Member, XingwuLIU, Nima TORABKHANI, Faramarz FEKRI,
More informationHoming Spread: Community Home-based Multi-copy Routing in Mobile Social Networks
TEMPLE UNIVERSITY Homing Spread: Community Home-based Multi-copy Routing in Mobile Social Networks Jie Wu a, Mingjun Xiao a,b, Liusheng Huang b a Temple University b University of Science and Technology
More informationArchna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India
Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation
More informationImpact of Social Networks in Delay Tolerant Routing
Impact of Social Networks in Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic
More informationA Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,
More informationPrediction-based Routing with Packet Scheduling under Temporal Constraint in Delay Tolerant Networks
Prediction-based Routing with Packet Scheduling under Temporal Constraint in Delay Tolerant Networks Guoliang Liu, Janani Krishnamani, Rajshekhar Sunderraman, Yingshu Li Department of Computer Science
More informationOptimal Transmission and Scheduling in Delay Tolerant Network
Optimal Transmission and Scheduling in Delay Tolerant Network 1 C.Bhanu Prakash, 2 K.sireesha 3 K.Suma Latha 1 Assistant Professor, AITS College, JNTUA, Tirupati, AP, India, 2 M.Tech student, Dept of CSE,
More informationThis formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go
Chapter 3 Problem 2 In Figure 3.43 of the text every node transmits R bps, and we assume that both network partitions consist of 1 N nodes. So the total traffic generated by the nodes 2 of each Ethernet
More informationPerformance Analysis of Cell Switching Management Scheme in Wireless Packet Communications
Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical
More information