Introduction to Delay Tolerant Networks Tzu-Chieh Tsai Department of Computer Science, National Cheng Chi University.

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Robin Kravets Tarek Abdelzaher Department of Computer Science University of Illinois The Phoenix Project.
Mobility Entropy and Message Routing in Community-Structured Delay Tolerant Networks Hideya Ochiai Hiroshi Esaki The University of Tokyo / NICT Asia Future.
高度情報化社会を支えるネットワーキング技術 (大阪大学 工学部説明会資料)
Thesis Presentation Supervisor: Prof. Jörg Ott Student: Junxi Yin Espoo,
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
Tor: The Second-Generation Onion Router
CMP206 – Introduction to Data Communication & Networks Lecture 1 - Networking Fundamentals.
Group #1: Protocols for Wireless Mobile Environments.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
University of Waterloo & UOIT & INRIA Lille Presenter: Rongxing Lu
James 1:5 If any of you lacks wisdom, he should ask God, who gives generously to all without finding fault, and it will be given to him.
DTNs Delay Tolerant Networks. Fall, Kevin. Intel Research, Berkeley. SIGCOMM 2003 Aug25, A Delay- Tolerant Network Architecture for Challenged Internets.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Wireless Communication Networks Tzu-Chieh Tsai Department of Computer Science National Cheng-Chi University.
William Stallings Data and Computer Communications 7th Edition
Delay Tolerant Networking Gareth Ferneyhough UNR CSE Department
1 Securing Information Transmission by Redundancy Jun LiPeter ReiherGerald Popek Computer Science Department UCLA NISS Conference October 21, 1999.
Term 2, 2011 Week 1. CONTENTS Network communications standards – Ethernet – TCP/IP Other network protocols – The standard – Wireless application.
Anonymity on the Web: A Brief Overview By: Nipun Arora uni-na2271.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
Data Communications and Networking
DELAY-TOLERANT NETWORKS Volodymyr Goncharov Freiburg Uni, WS 2009, Seminar Ad Hoc Netzwerke.
Potential-Based Entropy Adaptive Routing for Disruption Tolerant Networks Hideya Ochiai Hiroshi Esaki The University of Tokyo / NICT DTNRG, IETF 76 Hiroshima,
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Applying E-commerce in the Agribusiness. Next Generation Science / Common Core Standards Addressed CCSS. ELA Literacy.RST.11 ‐ 12.8 Evaluate the hypotheses,
Context-aware Adaptive Routing for Delay Tolerant Networking Mirco Musolesi Joint work with Cecilia Mascolo Department of Computer Science University College.
Networks QUME 185 Introduction to Computer Applications.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Delay and Disruption Tolerant Networks Mostafa Ammar College of Computing Georgia Institute of Technology Atlanta, GA In Collaboration: Ellen Zegura (GT),
Paper Group: 12 Data Transport in Challenged Networks Above papers are original works of respective authors, referenced here for academic purposes only.
Evgueni (Eugene) Khokhlov1 A Mobility-Centric Data Dissemination Algorithm for Vehicular Networks (MDDV) Evgueni (Eugene) Khokhlov.
Wireless Network Coding Martin Xu. Outline Introduction New Solutions – COPE – ANC Conclusions.
Today’s Topics Chapter 8: Networks Chapter 8: Networks HTML Introduction HTML Introduction.
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
Socially-aware pub-sub system for human networks Yaxiong Zhao Jie Wu Department of Computer and Information Sciences Temple University Philadelphia
1 Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay.
Data and Computer Communications Chapter 10 – Circuit Switching and Packet Switching (Wide Area Networks)
Sami Al-wakeel 1 Data Transmission and Computer Networks The Switching Networks.
Switching Techniques Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Computer Networks with Internet Technology William Stallings
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Research into the hybridization of the PRoPHET and ERP network routing algorithms George Mason University INFS 612 (Spring 2013) Project Group 4: Richard.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
William Stallings Data and Computer Communications
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Outline Introduction Existing solutions for ad hoc
MANET: Introduction Reference: “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”; S. Corson and J.
Introduction to Data Communication
Lecture # 03 Switching Course Instructor: Engr. Sana Ziafat.
Ad Hoc Network.
Event Based Routing In Delay Tolerant Networks Rohit Mullangi And Lakshmish Ramaswamy DTN is fundamentally an opportunistic network environment, where.
Dynamic Control of Coding for Progressive Packet Arrivals in DTNs.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
Ad-hoc Storage Overlay System (ASOS): A Delay-Tolerant Approach in MANETs Guang Yang 1, Ling-Jyh Chen 2, Tony Sun 1, Biao Zhou 1, Mario Gerla 1 1 University.
Computer Communication & Networks Lecture # 03 Circuit Switching, Packet Switching Nadeem Majeed Choudhary
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
Date: April. 13, Monday Evening.
IMPROVING OF WIRELESS MESH NETWORKS.
Delay-Tolerant Networks (DTNs)
DELAY TOLERANT NETWORK
Data Communication Networks
Presentation transcript:

Introduction to Delay Tolerant Networks Tzu-Chieh Tsai Department of Computer Science, National Cheng Chi University

Outline  Introduction  How does it works?  Key Properties of DTNs  Potential Applications  Summary

Future Wireless Internet Slide from “DTNs and Sensor Networks”, Myung-Ki Shin at Future Internet Camp, August 2007.

Introduction  Core function of communication network  Routing  Find a path from a source to some destinations  Traditional routing solutions  Assume that there exists an end-to-end path between communicating nodes  Delay/disruption tolerant networks  Communication is possible even if end-to-end connectivity is never achievable  Exploiting node’s mobility  Using store-carry-forward fashion

D S Data Traditional Routing How does it work?

D S R Store Carry Forward Store Forward Data How does it work? Carry

Bagel = Source Ants = Relay

 Fact 1: Wireless is everywhere !

 Fact 2: We need mobility!

 Fact 1: Wireless is everywhere !  Fact 2: We need mobility!  Fact 3: Storage is cheap and vast!

Opportunistic Networks

Opportunistic Networks vs Internet

Key Properties of DTNs  High Latency  Any two nodes may never meet each other.  Low Data Rate  Due to the long latency of data delivery.  Disconnection  It is hard to find an end-to-end path.  Long Queuing Delay  Because of the disconnection.  Short Range Contact  Only one-hop communication is guaranteed.  Dynamic Network Topology  Different types of user behavior will result in dramatically different network conditions.

Outline  Introduction  How does it works?  Key Properties of DTNs  Potential Applications  Summary

Potential Applications  Telemedicine for Developing Regions  DTN-based Social Network Service  Communication in the Presence of Oppressive Governments  File Sharing and Bulk Data Transfer  Share Air Minutes

Telemedicine for Developing Regions  Store-Carry-forward Voice-over-IP telemedicine system  Improve the possibility for doctors to give correct diagnose and prescribe treatment from remote location  Benefit  Can be used by those who lack computer skills.  Open source software is relatively cheap.  Can be deployed without fixed infrastructure  Challenge  Long delay would causes some disruption in voice quality. M. Chetty, W. Tucker, and E. Blake. Developing locally relevant applications for rural areas: A south african example. In SAICSIT, 2004.

DTN-based Social Network Service  DTN-based Short Message Service  Example: A farmer can send a advertisement message to his friends, and the friends can help to propagate the message through the social network.  Benefit  A more convenient way to find and exchange information than traditional face-to-face communication  Challenge  Need to find incentive mechanisms to convince end user to use the system B. E. Kolko, E. J. Rose, and E. J. Johnson. Communication as information-seeking: the case for mobile social software for developing regions. In Proc. of WWW ’07, 2007.

Communication in the Presence of Oppressive Governments  Anonymous Delay Tolerant Networks  Opportunistic forwarding message between people  Much more difficult for government agencies to track the communication.  Benefit  Using mobility and delay of transmission to increase anonymity.  Challenge  How to avoid rogue agents injecting fake acknowledgements to purge messages from the network? R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, August 2004.

File Sharing and Bulk Data Transfer  Use the cellular network to transmit the request for some content, and then use delay tolerant techniques to deliver the data to the mobile device.  It’s more beneficial if the data access patterns are somehow localized such that users in a certain area are more likely to request a certain data item.  Benefit  File data would rapidly be shared between a large part of population with less resource usage.  Challenge  Copyright and DRM issues N. Laoutaris, G. Smaragdakis, R. Sundaram, and P. Rodriguez. Delay-Tolerant Bulk Data Transfer on the Internet. In Proceedings of ACM SIGMETRICS 2009, Seattle, WA, June 2009.

Share Air Minutes  Allowing the contract users to share their excess air minutes to the prepaid card users.  The shared phone acting as the server then diverts the voice traffic to the cellular network via the phone’s cellular link.  Benefit  Contract users sell their unused minutes  Pre-pay users could still use the calling service  Operators can gain the value of the resold minutes.  Challenge  How to deal with the micro-payments? P. Hui, R. Mortier, K. Xu, J. Crowcroft, and V. O. Li. Sharing airtime with shair avoids wasting time and money. In Proc. of HotMobile 2009, February 2009.

Outline  Introduction  How does it works?  Key Properties of DTNs  Research Issues  Mobility Pattern Analysis  Routing Protocol Design  Potential Applications  Summary

Summary  Characteristics of DTN  No end-to-end path  Intermittent connectivity  Dynamic topology  Long delay  DTN routing  Flooding-based: redundancy  Forwarding-based: require topology information  Potential Application  Urban area: DTN-based Social Network Service  Developing region: Low cost communication solutions