SlideShare uma empresa Scribd logo
1 de 27
Seminar by
Anubhav Mahajan
06111502709
C.S.E. 7th Sem









Delay Tolerant Networks(DTNs) are promising new
development in network research field.
DTNs are those networks where instantaneous end-to-end
paths among nodes may not be possibly established or are
absent for a long period of time.
Purpose of this study was to survey DTN routing problem.
It includes study of DTN routing protocols each of which
aims at increasing the message delivery probability as well
as reducing , as much as possible, the overheads incurred
during the whole delivery process of the message.
Henceforth, performance of these routing protocols will be
evaluated using the ONE simulator which is designed
specifically to simulate these routing protocols.








Delay Tolerant Networks are wireless networks where
disconnections and delays may occur frequently due to
propagation phenomena such as node mobility, power
outages etc.
DTN comes into play when delays are observed due to nonexistence or long absence of instantaneous end-to-end
paths among nodes.
One of the main reasons behind these are untimely and
random movement of intermediate nodes (mobile hosts)
that have to carry data from any source to destination.
In order to achieve data delivery, a “store-and-forward”
approach is taken where data is incrementally moved and
stored throughout the network in “hopes” that it will
eventually reach its destination.


To survey DTN routing problem.



To study different DTN routing protocols.



To study ONE simulator.



Performance evaluation of DTN routing protocols using the
ONE simulator.




DTN comes into play when instantaneous end-to-end paths
among network nodes may not be possible to establish or
are absent for a very long time.
A “store-and-forward” approach is taken where data is
incrementally moved and stored throughout the network in
“hopes” that it will eventually reach its destination.








DTN can be rendered as a special case of Ad-hoc networks
where network partitions occurs very frequently and that
too for a long period of time.
Traditional Ad-hoc networking routing protocols requires an
pre-existing instantaneous end-to-end path between
source and destination nodes either directly or indirectly
through intermediate mobile nodes.
But if an instantaneous end-to-end connectivity is failed to
get established, these protocols fails along with them.
These failures also includes the cases where at the time of
origination of a message there was an instantaneous endto-end connectivity between source and destination which
may not be present at the time when the message is
travelling through the path and results in loss of message.


Interplanetary Internet.



Mobile posts around the planet including space stations or
posts on terrain such as Antarctica.



Deep sea communication.



Mobile military deployments across seas and desserts.


Routing protocols will be used to move messages end-toend across the network which is time varying as well as
whose dynamics are not known in advance.



Goals of a DTN routing protocol are to:

1.) maximize message delivery rate
2.) minimize message latency
3.) minimize the total resources consumed in message
delivery such as buffer sizes within mobile hosts(carriers)
devoted to store other host’s messages ,energy of the
host(carrier) consumed in storage and transmission of that
message etc.





A flooding based DTN routing protocol.
Simply based on random pair-wise exchanges of messages
that takes place among mobile hosts and among islands of
mobile hosts to ensure eventual message delivery.
Copies of a message will spread like some epidemic of a
disease in the network, ultimately reaching to its
destination.





SV : Summary vector
Summary vector of a mobile host is a brief summary of
messages that are currently present in the buffer of a
mobile host.
When two mobile hosts come into contact with each other,
they decide which messages are to be exchanged between
them by looking at other host’s summary vector.


A controlled flooding based DTN routing protocol but with
no random pair-wise exchanges.



Message exchanges are based on delivery predictability
which indicates how likely is that this node will be able to
deliver a message to its particular destination.



Delivery predictability is measured on the basis of the
number of times two hosts comes into contact or the
number of times a host has successfully delivered a
message to a particular destination through transitivity.



A message will be transferred from first node to second
node if and only if the second node have a higher value of
delivery predictability than the first node for the
destination of that message.








Not a flooding based technique.
It consists of two phases :Spray phase and Wait phase.
Spray phase: Source node will spray a limited number of
copies of the message into those nodes that have much
higher delivery predictability than the source node in hope
that one of the sprayed node is destination itself.
Wait phase : If the destination is not found in the spraying
phase, each of the nodes carrying a message copy tries to
performs direct transmission (i.e. will forward the message
only to its destination).
If still not successful then spraying phase will begin again
after waiting for some pre-specified time period.


Based on formation of social groups.



Assumes that nodes that are assigned to the same social
network (classroom, project team) will regularly interact
with members of that social group.



With these groups identified, consistent routes towards
particular destinations are identified based on the delivery
history of a group or node.



To deliver a message to a member or members of a
particular group , simply transfer the message to a node
which regularly interacts with any member of that group.



Rest, that member of the group will spread the message to
all the members of that group.




Simulation tool, developed in Java, used for processing of
DTN routing protocols.
It has been designed specifically for DTN routing protocols
and applications.
Provides interactive visualization and post-processing
tools.





First we write implementation of a DTN routing protocol in
the form of JAVA classes which are fed into ONE simulator,
which itself is a collection of java classes and packages.
ONE simulates the protocol as per our specifications.
As a result, it generates a detailed report on performance
evaluation of the protocol as per simulation.
Feeded Java Classes

Simulation Data

Specifications

Report


Performance of DTN routing protocols will be evaluated on
the basis of some specified parameters.



These are :
1.) Percent messages delivered using that protocol.
2.) Average latency of delivered messages.
3.) Total number of transmissions.
4.) Hop count per message.
5.) Average overhead per message.



After simulating a DTN protocol, as per our pre-specified
configurations, the report of performance of the protocol
will be generated in terms of these parameters.
First we provide a configuration to ONE over which these
protocols will be simulated turn by turn.
 This configuration includes :
1.) The map/scenario over which nodes will roam.
2.) The number of nodes in the scenario.
3.) The buffer size at each node.
 Then on the basis of following two criteria, performance of
each DTN routing protocol will be evaluated and
compared. These are :
1.) Parameter vs. Variable Buffer Size keeping number of
nodes fixed in the scenario.
2.) Parameter vs. Variable node count keeping buffer size
of each node fixed in the scenario.



Successful survey of DTN routing problem.



Successful study of different DTN routing protocols.



Successful study of the ONE simulator and its working.



Successful performance evaluation of DTN routing
protocols using the reports generated by the ONE
simulator.


Investigations for other forwarding strategies that can
enhance the performance of DTN further.



There is much scope for addition of more maturity to the
ONE simulator . This includes more functionalities such as
automatic comparisons among DTN protocols on the basis
of parameters rather than making us do manual
comparisons.



Standardization of data which is used for simulating DTN
protocols on the ONE simulator.


[1] A. Vahdat and D. Becker, “Epidemic routing for partially
connected adhoc networks,” Duke University, Tech. Rep.,
2000.



[2] Roy Cabaniss, Sanjay Madria, George Rush, Abbey Trotta
and Srinivasa S. Vulli Department of Computer Science,
“Dynamic Social Grouping Based Routing in a Mobile Ad-Hoc
Network”Missouri University of Science and Technology, Rolla,
Missouri 65401, School of Computing and
Engineering,University of Missouri, Kansas City, Missouri 64110



[3] Thrasyvoulos Spyropoulos, Konstantinos Psounis and
Cauligi S. Raghavendra, “Spray and Wait: An Efficient Routing
Scheme forIntermittently Connected Mobile Networks”



[4] Sushant Jain, Kevin Fall, Rabin Patra “Routing in a Delay
Tolerant Network”



[5] Anders Lindgren, Avri Doria, Olov Schel´en “Probabilistic
Routing in Intermittently Connected Networks”
[6] https://www.netlab.tkk.fi/tutkimus/dtn/theone/
[7] https://crawdad.cs.dartmouth.edu/data.php
[8] https://www.wikipedia.org
Routing in Delay Tolerant Networks

Mais conteúdo relacionado

Mais procurados

Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
eSAT Journals
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Waldir Moreira
 

Mais procurados (20)

Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
 
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
 
DTN
DTNDTN
DTN
 
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisMulticasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
 
ICICCE0367
ICICCE0367ICICCE0367
ICICCE0367
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
 
Csit54201
Csit54201Csit54201
Csit54201
 
Delay tolerant networking
Delay tolerant networkingDelay tolerant networking
Delay tolerant networking
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
 
E42062126
E42062126E42062126
E42062126
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
 
Fa25939942
Fa25939942Fa25939942
Fa25939942
 

Destaque

Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic Networking
Noorin Fatima
 
Social-aware Opportunistic Routing
Social-aware Opportunistic RoutingSocial-aware Opportunistic Routing
Social-aware Opportunistic Routing
Waldir Moreira
 
Introduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and ApplicationsIntroduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and Applications
Nasir Bhutta
 
Delay Tolerant Networking on Android Phones
Delay Tolerant Networking on Android PhonesDelay Tolerant Networking on Android Phones
Delay Tolerant Networking on Android Phones
Sharjeel Ahmed
 
Training report on airport authority of india(a
Training report on airport authority of india(aTraining report on airport authority of india(a
Training report on airport authority of india(a
UtkarshSingh UT
 

Destaque (19)

Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic Networking
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
 
Delay telerant network
Delay telerant networkDelay telerant network
Delay telerant network
 
Social-aware Opportunistic Routing
Social-aware Opportunistic RoutingSocial-aware Opportunistic Routing
Social-aware Opportunistic Routing
 
Introduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and ApplicationsIntroduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and Applications
 
Delay Tolerant Networking on Android Phones
Delay Tolerant Networking on Android PhonesDelay Tolerant Networking on Android Phones
Delay Tolerant Networking on Android Phones
 
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
 
Delay-tolerant Networking using Wi-Fi Direct - Droidcon 2013
Delay-tolerant Networking using Wi-Fi Direct - Droidcon 2013Delay-tolerant Networking using Wi-Fi Direct - Droidcon 2013
Delay-tolerant Networking using Wi-Fi Direct - Droidcon 2013
 
DTN ProphetX® - At a Glance
DTN ProphetX® - At a GlanceDTN ProphetX® - At a Glance
DTN ProphetX® - At a Glance
 
Opportunistic routing algorithm for relay node selection in wireless sensor n...
Opportunistic routing algorithm for relay node selection in wireless sensor n...Opportunistic routing algorithm for relay node selection in wireless sensor n...
Opportunistic routing algorithm for relay node selection in wireless sensor n...
 
Opportunistic routing algorithm for relay node
Opportunistic routing algorithm for relay nodeOpportunistic routing algorithm for relay node
Opportunistic routing algorithm for relay node
 
Delay and Disruption Tolerance and the Internet of Things
Delay and Disruption Tolerance and the Internet of ThingsDelay and Disruption Tolerance and the Internet of Things
Delay and Disruption Tolerance and the Internet of Things
 
Airports authority of india (aai) training report
Airports authority of india (aai) training reportAirports authority of india (aai) training report
Airports authority of india (aai) training report
 
Training report on airport authority of india(a
Training report on airport authority of india(aTraining report on airport authority of india(a
Training report on airport authority of india(a
 
Airports Authority of India Industrial Training Presentation
Airports Authority of India Industrial Training PresentationAirports Authority of India Industrial Training Presentation
Airports Authority of India Industrial Training Presentation
 
Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networks
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)
 

Semelhante a Routing in Delay Tolerant Networks

Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme via
Iaetsd Iaetsd
 
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networksBehavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks
Shakas Technologies
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
ijasuc
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
ijasuc
 

Semelhante a Routing in Delay Tolerant Networks (20)

dtn-180110112549.pdf
dtn-180110112549.pdfdtn-180110112549.pdf
dtn-180110112549.pdf
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant Networks
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
 
D0441722
D0441722D0441722
D0441722
 
Network software
Network softwareNetwork software
Network software
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme via
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networksBehavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks
 
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networksBehavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks
 
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
E010322531
E010322531E010322531
E010322531
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Routing in Delay Tolerant Networks

  • 2.      Delay Tolerant Networks(DTNs) are promising new development in network research field. DTNs are those networks where instantaneous end-to-end paths among nodes may not be possibly established or are absent for a long period of time. Purpose of this study was to survey DTN routing problem. It includes study of DTN routing protocols each of which aims at increasing the message delivery probability as well as reducing , as much as possible, the overheads incurred during the whole delivery process of the message. Henceforth, performance of these routing protocols will be evaluated using the ONE simulator which is designed specifically to simulate these routing protocols.
  • 3.     Delay Tolerant Networks are wireless networks where disconnections and delays may occur frequently due to propagation phenomena such as node mobility, power outages etc. DTN comes into play when delays are observed due to nonexistence or long absence of instantaneous end-to-end paths among nodes. One of the main reasons behind these are untimely and random movement of intermediate nodes (mobile hosts) that have to carry data from any source to destination. In order to achieve data delivery, a “store-and-forward” approach is taken where data is incrementally moved and stored throughout the network in “hopes” that it will eventually reach its destination.
  • 4.  To survey DTN routing problem.  To study different DTN routing protocols.  To study ONE simulator.  Performance evaluation of DTN routing protocols using the ONE simulator.
  • 5.
  • 6.   DTN comes into play when instantaneous end-to-end paths among network nodes may not be possible to establish or are absent for a very long time. A “store-and-forward” approach is taken where data is incrementally moved and stored throughout the network in “hopes” that it will eventually reach its destination.
  • 7.     DTN can be rendered as a special case of Ad-hoc networks where network partitions occurs very frequently and that too for a long period of time. Traditional Ad-hoc networking routing protocols requires an pre-existing instantaneous end-to-end path between source and destination nodes either directly or indirectly through intermediate mobile nodes. But if an instantaneous end-to-end connectivity is failed to get established, these protocols fails along with them. These failures also includes the cases where at the time of origination of a message there was an instantaneous endto-end connectivity between source and destination which may not be present at the time when the message is travelling through the path and results in loss of message.
  • 8.  Interplanetary Internet.  Mobile posts around the planet including space stations or posts on terrain such as Antarctica.  Deep sea communication.  Mobile military deployments across seas and desserts.
  • 9.  Routing protocols will be used to move messages end-toend across the network which is time varying as well as whose dynamics are not known in advance.  Goals of a DTN routing protocol are to: 1.) maximize message delivery rate 2.) minimize message latency 3.) minimize the total resources consumed in message delivery such as buffer sizes within mobile hosts(carriers) devoted to store other host’s messages ,energy of the host(carrier) consumed in storage and transmission of that message etc.
  • 10.    A flooding based DTN routing protocol. Simply based on random pair-wise exchanges of messages that takes place among mobile hosts and among islands of mobile hosts to ensure eventual message delivery. Copies of a message will spread like some epidemic of a disease in the network, ultimately reaching to its destination.
  • 11.    SV : Summary vector Summary vector of a mobile host is a brief summary of messages that are currently present in the buffer of a mobile host. When two mobile hosts come into contact with each other, they decide which messages are to be exchanged between them by looking at other host’s summary vector.
  • 12.  A controlled flooding based DTN routing protocol but with no random pair-wise exchanges.  Message exchanges are based on delivery predictability which indicates how likely is that this node will be able to deliver a message to its particular destination.  Delivery predictability is measured on the basis of the number of times two hosts comes into contact or the number of times a host has successfully delivered a message to a particular destination through transitivity.  A message will be transferred from first node to second node if and only if the second node have a higher value of delivery predictability than the first node for the destination of that message.
  • 13.
  • 14.      Not a flooding based technique. It consists of two phases :Spray phase and Wait phase. Spray phase: Source node will spray a limited number of copies of the message into those nodes that have much higher delivery predictability than the source node in hope that one of the sprayed node is destination itself. Wait phase : If the destination is not found in the spraying phase, each of the nodes carrying a message copy tries to performs direct transmission (i.e. will forward the message only to its destination). If still not successful then spraying phase will begin again after waiting for some pre-specified time period.
  • 15.  Based on formation of social groups.  Assumes that nodes that are assigned to the same social network (classroom, project team) will regularly interact with members of that social group.  With these groups identified, consistent routes towards particular destinations are identified based on the delivery history of a group or node.  To deliver a message to a member or members of a particular group , simply transfer the message to a node which regularly interacts with any member of that group.  Rest, that member of the group will spread the message to all the members of that group.
  • 16.
  • 17.    Simulation tool, developed in Java, used for processing of DTN routing protocols. It has been designed specifically for DTN routing protocols and applications. Provides interactive visualization and post-processing tools.
  • 18.    First we write implementation of a DTN routing protocol in the form of JAVA classes which are fed into ONE simulator, which itself is a collection of java classes and packages. ONE simulates the protocol as per our specifications. As a result, it generates a detailed report on performance evaluation of the protocol as per simulation.
  • 19. Feeded Java Classes Simulation Data Specifications Report
  • 20.
  • 21.  Performance of DTN routing protocols will be evaluated on the basis of some specified parameters.  These are : 1.) Percent messages delivered using that protocol. 2.) Average latency of delivered messages. 3.) Total number of transmissions. 4.) Hop count per message. 5.) Average overhead per message.  After simulating a DTN protocol, as per our pre-specified configurations, the report of performance of the protocol will be generated in terms of these parameters.
  • 22. First we provide a configuration to ONE over which these protocols will be simulated turn by turn.  This configuration includes : 1.) The map/scenario over which nodes will roam. 2.) The number of nodes in the scenario. 3.) The buffer size at each node.  Then on the basis of following two criteria, performance of each DTN routing protocol will be evaluated and compared. These are : 1.) Parameter vs. Variable Buffer Size keeping number of nodes fixed in the scenario. 2.) Parameter vs. Variable node count keeping buffer size of each node fixed in the scenario. 
  • 23.  Successful survey of DTN routing problem.  Successful study of different DTN routing protocols.  Successful study of the ONE simulator and its working.  Successful performance evaluation of DTN routing protocols using the reports generated by the ONE simulator.
  • 24.  Investigations for other forwarding strategies that can enhance the performance of DTN further.  There is much scope for addition of more maturity to the ONE simulator . This includes more functionalities such as automatic comparisons among DTN protocols on the basis of parameters rather than making us do manual comparisons.  Standardization of data which is used for simulating DTN protocols on the ONE simulator.
  • 25.  [1] A. Vahdat and D. Becker, “Epidemic routing for partially connected adhoc networks,” Duke University, Tech. Rep., 2000.  [2] Roy Cabaniss, Sanjay Madria, George Rush, Abbey Trotta and Srinivasa S. Vulli Department of Computer Science, “Dynamic Social Grouping Based Routing in a Mobile Ad-Hoc Network”Missouri University of Science and Technology, Rolla, Missouri 65401, School of Computing and Engineering,University of Missouri, Kansas City, Missouri 64110  [3] Thrasyvoulos Spyropoulos, Konstantinos Psounis and Cauligi S. Raghavendra, “Spray and Wait: An Efficient Routing Scheme forIntermittently Connected Mobile Networks”  [4] Sushant Jain, Kevin Fall, Rabin Patra “Routing in a Delay Tolerant Network”  [5] Anders Lindgren, Avri Doria, Olov Schel´en “Probabilistic Routing in Intermittently Connected Networks”