14 results on '"disruption-tolerant networks"'
Search Results
2. Combined Mobile Ad-Hoc and Delay/Disruption-Tolerant Routing
- Author
-
Raffelsberger, Christian, Hellwagner, Hermann, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Kobsa, Alfred, editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Weikum, Gerhard, editor, Guo, Song, editor, Lloret, Jaime, editor, Manzoni, Pietro, editor, and Ruehrup, Stefan, editor
- Published
- 2014
- Full Text
- View/download PDF
3. Information Centric Mobile Ad Hoc Communications
- Author
-
Lu, You
- Subjects
Computer science ,Content retrieval ,Disruption-tolerant networks ,Information-centric networks ,Mobile ad hoc networks - Abstract
Information-centric networks have recently been drawing increasing attention in academia as well as in industry. Information and content retrieval is a critical service for mobile ad-hoc networks. It relies on many resources and tools, such as internal storage, content searching and sharing, delay-tolerant delivery, etc. Previous studies have shown that conventional ICN interest query schemes and content searching architectures, if not properly designed, can cause significant performance degradation and energy consumption, especially for large scale mobile ad hoc networks. In this dissertation, we propose a content retrieval architecture for ICN MANETs that is structured according to social hierarchy and is highly scalable.
- Published
- 2015
4. Robust routing in deterministic delay-tolerant networks
- Author
-
Antoine Jouglet, Ronan Bocquillon, Heuristique et Diagnostic des Systèmes Complexes [Compiègne] (Heudiasyc), Université de Technologie de Compiègne (UTC)-Centre National de la Recherche Scientifique (CNRS), Laboratoire d'Excellence 'Maîtrise des Systèmes de Systèmes Technologiques' (Labex MS2T), Laboratoire d'Informatique Fondamentale et Appliquée de Tours (LIFAT), Centre National de la Recherche Scientifique (CNRS)-Université de Tours-Institut National des Sciences Appliquées - Centre Val de Loire (INSA CVL), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA), Conseil Régional de Picardie, Université de Tours (UT)-Institut National des Sciences Appliquées - Centre Val de Loire (INSA CVL), and Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Store-carry-and-forward routing ,Combinatorial optimization ,General Computer Science ,Computer science ,0211 other engineering and technologies ,Delay-tolerant networks DTNs ,02 engineering and technology ,Management Science and Operations Research ,Set (abstract data type) ,Transfer (computing) ,0202 electrical engineering, electronic engineering, information engineering ,Constraint programming ,Sequence ,021103 operations research ,business.industry ,Systems of systems ,[INFO.INFO-RO]Computer Science [cs]/Operations Research [cs.RO] ,Modeling and Simulation ,020201 artificial intelligence & image processing ,Disruption-tolerant networks ,Routing (electronic design automation) ,Robust optimization ,business ,Computer network - Abstract
International audience; A system of systems is a set of heterogeneous independent systems that share data in pursuit of a common goal. These systems form a delay-/disruption-tolerant network (DTN), where routing is based on the store-carry-and-forward paradigm. Systems can communicate whenever they are close enough to each other, in what are called contacts. We assume that the movements of these systems may be predicted in advance and we consider that a sequence of contacts is given at the outset. During a contact, a given emitting system can transfer to a given receiving system a fixed amount of data (termed datum unit) that it has in its possession. The dissemination problem is to find a transfer plan such that all the data can be transferred from a given subset of source systems to a given subset of recipient systems. In this paper we study the problem where communications may fail. We propose an algorithm for finding a robust transfer plan that minimizes the dissemination length.
- Published
- 2018
- Full Text
- View/download PDF
5. Design and Field Experimentation of an Energy-Efficient Architecture for DTN Throwboxes.
- Author
-
Banerjee, Nilanjan, Corner, Mark D., and Levine, Brian Neil
- Subjects
COMPUTER networks ,INFORMATION networks ,ENERGY management ,ENERGY consumption ,SOLAR energy ,DATA packeting ,DATA transmission systems - Abstract
Disruption-tolerant networks (DTNs) rely on intermittent contacts between mobile nodes to deliver packets using a store-carry-and-forward paradigm. We earlier proposed the use of throwbox nodes, which are stationary, battery-powered nodes with storage and processing, to enhance the capacity of DTNs. However, the use of throwboxes without efficient power management is minimally effective. If the nodes are too liberal with their energy consumption, they will fail prematurely. However, if they are too conservative, they may miss important transfer opportunities, hence increasing lifetime without improving performance. In this paper, we present a hardware and software architecture for energy-efficient throwboxes in DTNs. We propose a hardware platform that uses a multitiered, multiradio, scalable, solar-powered platform. The throwbox employs an approximate heuristic for solving the NP-hard problem of meeting an average power constraint while maximizing the number of bytes forwarded by the throwbox. We built and deployed prototype throwboxes in UMass DieselNet, a bus-based DTN testbed. Through extensive trace-driven simulations and prototype deployment, we show that a single throwbox with a 270-cm² solar panel can run perpetually while improving packet delivery by 37% and reducing message delivery latency by at least 10% in the network. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
6. MORA routing and capacity building in disruption-tolerant networks.
- Author
-
Burns, Brendan, Brock, Oliver, and Levine, Brian Neil
- Subjects
NETWORK routing protocols ,ROUTING (Computer network management) ,COMPUTER network protocols ,SYSTEMS engineering - Abstract
Abstract: Disruption-tolerant networks (DTNs) differ from other types of networks in that capacity is created by the movements of network participants. This implies that understanding and influencing the participants’ motions can have a significant impact on network performance. In this paper, we introduce the routing protocol MORA, which learns structure in the movement patterns of network participants and uses it to enable informed message passing. We also propose the introduction of autonomous agents as additional participants in DTNs. These agents adapt their movements in response to variations in network capacity and demand. We use multi-objective control methods from robotics to generate motions capable of optimizing multiple network performance metrics simultaneously. We present experimental evidence that these strategies, individually and in conjunction, result in significant performance improvements in DTNs. [Copyright &y& Elsevier]
- Published
- 2008
- Full Text
- View/download PDF
7. Demo: Application-Transparent Deployment of DTN via SmartNet.
- Author
-
Alt, Lance A., Rohrer, Justin P., and Xie, Geoffrey G.
- Subjects
DELAY-tolerant networks ,SOFTWARE frameworks ,TRANSPORT protocols (Computer network protocols) ,INTERNET protocols ,TCP/IP - Abstract
In this paper, we present the SmartNet architecture, an open and extensible software framework for experimenting with and deploying application-transparent network adaptation solutions. The framework fashions a plugin-based system architecture where each plugin implements a small set of application or transport protocol specific network adaptation requirements and can be chained with other plugins to form a packet processing pipeline. Multiple concurrent packet pipelines are configurable to enable selected traffic flows to dynamically switch between native IP, split-TCP, and DTN, based on observed network conditions. The end user is able to configure not only which flows should use split-TCP or DTN, but also the conditions under which each option should be used. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
8. Mobility as an Alternative Communication Channel: A Survey
- Author
-
Benjamin Baron, Prométhée Spathis, Mostafa H. Ammar, Yannis Viniotis, Marcelo Dias de Amorim, Networks and Performance Analysis (NPA), LIP6, Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS), Department of Electrical and Computer Engineering [NC State University], North Carolina State University [Raleigh] (NC State), University of North Carolina System (UNC)-University of North Carolina System (UNC), School of Electrical and Computer Engineering - Georgia Insitute of Technology (ECE GeorgiaTech), Georgia Institute of Technology [Atlanta], Networks and Performance Analysis ( NPA ), Laboratoire d'Informatique de Paris 6 ( LIP6 ), Université Pierre et Marie Curie - Paris 6 ( UPMC ) -Centre National de la Recherche Scientifique ( CNRS ) -Université Pierre et Marie Curie - Paris 6 ( UPMC ) -Centre National de la Recherche Scientifique ( CNRS ), Centre National de la Recherche Scientifique ( CNRS ), North Carolina State University [Raleigh] ( NCSU ), and School of Electrical and Computer Engineering - Georgia Insitute of Technology ( ECE GeorgiaTech )
- Subjects
Research literature ,FOS: Computer and information sciences ,Ad-Hoc Networks ,Bridging (networking) ,Wireless ad hoc network ,Computer science ,[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,02 engineering and technology ,Computer Science - Networking and Internet Architecture ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,Disruption-Tolerant Networks ,Data Transfers ,Networking and Internet Architecture (cs.NI) ,Mobility ,business.industry ,Offloading ,020206 networking & telecommunications ,Challenged Networks ,Software deployment ,020201 artificial intelligence & image processing ,Train ,The Internet ,business ,Computer network ,Data transmission - Abstract
International audience; —We review the research literature investigating systems in which mobile entities can carry data while they move. These entities can be either mobile by nature (e.g., human beings and animals) or mobile by design (e.g., trains, airplanes, and cars). The movements of such entities equipped with storage capabilities create a communication channel which can help overcome the limitations or the lack of conventional data networks. Common limitations include the mismatch between the capacity offered by these networks and the traffic demand or their limited deployment owing to environmental factors. Application scenarios include offloading traffic off legacy networks for capacity improvement, bridging connectivity gaps, or deploying ad hoc networks in challenging environments for coverage enhancement.
- Published
- 2018
- Full Text
- View/download PDF
9. Building a Web of Things with Avatars: A comprehensive approach for concern management in WoT applications
- Author
-
El-Mehdi Khalfi, Nicolas Le Sommer, Lionel Médini, Philippe Capdepuy, Michael Mrissa, Jean-Paul Jamont, Michel Occello, Lionel Touseau, Mehdi Terdjimi, Traces, Web, Education, Adaptation, Knowledge (TWEAK), Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS), Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), Université de Lyon-Université de Lyon-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Centre National de la Recherche Scientifique (CNRS)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA), Laboratoire Informatique de l'Université de Pau et des Pays de l'Adour (LIUPPA), Université de Pau et des Pays de l'Adour (UPPA), Service Oriented Computing (SOC), Laboratoire de Conception et d'Intégration des Systèmes (LCIS), Université Pierre Mendès France - Grenoble 2 (UPMF)-Institut Polytechnique de Grenoble - Grenoble Institute of Technology, Disruption-Tolerant Networking & Computing (CASA), Université de Bretagne Sud (UBS)-RÉSEAUX, TÉLÉCOMMUNICATION ET SERVICES (IRISA-D2), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Université de Bretagne Sud (UBS)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-CentraleSupélec-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Université de Rennes (UNIV-RENNES)-CentraleSupélec-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-CentraleSupélec, HumaRobotics, Michael Sheng, Yongrui Qin, Lina Yao, and Boualem Benatallah, ANR-13- INFR-012,ASAWoO,Adaptive Supervision of Avatar/Object Links for the Web of Objects, Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-École Centrale de Lyon (ECL), Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Université Lumière - Lyon 2 (UL2), Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Université Grenoble Alpes [2016-2019] (UGA [2016-2019]), RÉSEAUX, TÉLÉCOMMUNICATION ET SERVICES (IRISA-D2), CentraleSupélec-Télécom Bretagne-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Rennes (ENS Rennes)-Université de Bretagne Sud (UBS)-Centre National de la Recherche Scientifique (CNRS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Télécom Bretagne-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA), ANR-13-INFR-0012,ASAWoO,Supervision Adaptative de Liens Avatar/Objet pour le Web des Objets(2013), Université de Lyon-Institut National des Sciences Appliquées de Lyon (INSA Lyon), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Lumière - Lyon 2 (UL2)-École Centrale de Lyon (ECL), Université de Lyon-Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), and Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Web standards ,Computer science ,Interoperability ,distributed robotics ,[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE] ,02 engineering and technology ,cyber-physical systems ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] ,[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing ,World Wide Web ,[INFO.INFO-MC]Computer Science [cs]/Mobile Computing ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Web of Things ,0202 electrical engineering, electronic engineering, information engineering ,[INFO.INFO-RB]Computer Science [cs]/Robotics [cs.RO] ,multi-agent systems ,Adaptation (computer science) ,contextual adaptation ,[INFO.INFO-WB]Computer Science [cs]/Web ,Cyber-physical system ,020206 networking & telecommunications ,Semantic interoperability ,semantic interoperability ,[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA] ,Software design ,Semantic technology ,disruption-tolerant networks ,[INFO.INFO-ES]Computer Science [cs]/Embedded Systems - Abstract
Domains (unavailable categories): Internet of Things, Web of Things; International audience; The Web of Things (WoT) relies on Web standards to enable interoperability between physical objects (things) and build applications using them. While most approaches (Cyber-Physical Systems, Internet of Things) require complex domain-driven software design that combines different disciplines such as electronics, networks and computing, we believe that generic solutions are needed to support WoT applications across the variety of things and application domains. To this end, we propose the notion of avatar as a Web-compliant software extension of a thing. Avatars achieve interoperability between things using semantic technologies and expose high-level functionalities as RESTful resources. They can collaborate with other avatars and form standard-compliant WoT applications that match end-users’ needs. We detail the notion of avatar and describe how avatar-based WoT infrastructures can improve the quality of Web of Things applications. We show how their architecture allows avatars to embed advances in different areas, and focus on contributions at different levels: tolerance to network disconnection, contextual adaptation and multi-agent negotiation.
- Published
- 2017
- Full Text
- View/download PDF
10. Effective C2 Comms to the Tactical Edge in Challenged, Disrupted, and Denied Environments
- Author
-
Rohrer, Justin P., Monahan, Michael K., Naval Postgraduate School, Naval Research Program, and Computer Science (CS)
- Subjects
DTN ,RFC5050 ,bundle protocol ,disruption-tolerant networks ,BPA - Abstract
Native IP networks are ill-equipped to handle the communication challenges found in wireless comms environments, resulting in communications outages that degrade C2 data flow and subject the user to disconnection, timeouts, and repeated login requests. We counter these limitations by integrating DTN (Disruption-Tolerant Networking) technology into the IP network using software+hardware or software-only solutions as appropriate. This work evaluates the tradeoffs between the currently available DTN software implementations and seeks to identify the one with the highest technical readiness level, as well as any barriers to adoption that may be present. We find that no current implementation is fully ready, and that each have particular pros and cons to adoption. Naval Research Program Prepared for Topic Sponsor: Maj Jeffrey Sykes, USMC, HQMC Aviation; Research Sponsor HQMC Aviation; Research POC Name: Maj Scott Cuomo N16-M343-C
- Published
- 2016
11. Demo
- Author
-
Lance Alt, Justin P. Rohrer, Geoffrey G. Xie, and Computer Science (CS)
- Subjects
middleboxes ,business.industry ,Computer science ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Packet processing ,computer.software_genre ,Pipeline (software) ,Software framework ,Software deployment ,Systems architecture ,Plug-in ,Disruption-tolerant networks ,transparent gateways ,business ,Protocol (object-oriented programming) ,computer ,split-TCP ,Computer network - Abstract
The article of record as published may be located at http://dx.doi.org/ 10.1145/2645672.2645688 CHANTS’14, 07–11 September, 2014, Maui, Hawaii USA. In this paper, we present the SmartNet architecture, an open and extensible software framework for experimenting with and deploying application-transparent network adaptation solutions. The framework fashions a plugin-based system architecture where each plugin implements a small set of application or transport protocol speci c network adapta- tion requirements and can be chained with other plugins to form a packet processing pipeline. Multiple concurrent packet pipelines are con gurable to enable selected tra c ows to dynamically switch between native IP, split-TCP, and DTN, based on observed network conditions. The end user is able to con gure not only which ows should use split-TCP or DTN, but also the conditions under which each option should be used.
- Published
- 2014
- Full Text
- View/download PDF
12. The Strength of Vicinity Annexation in Opportunistic Networking
- Author
-
Vania Conan, Tiphaine Phe-Neau, Marcelo Dias de Amorim, Laboratory of Information, Network and Communication Sciences (LINCS), Université Pierre et Marie Curie - Paris 6 (UPMC)-Institut National de Recherche en Informatique et en Automatique (Inria)-Institut Mines-Télécom [Paris] (IMT), Networks and Performance Analysis (NPA), Laboratoire d'Informatique de Paris 6 (LIP6), Université Pierre et Marie Curie - Paris 6 (UPMC)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre et Marie Curie - Paris 6 (UPMC)-Centre National de la Recherche Scientifique (CNRS), Thales Communications [Colombes], THALES, and THALES [France]
- Subjects
Mobile radio ,vicinity ,Computer science ,Distributed computing ,Automatic repeat request ,Control (management) ,02 engineering and technology ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,0203 mechanical engineering ,Opportunistic networks ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,020203 distributed computing ,Focus (computing) ,business.industry ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,020302 automobile design & engineering ,IEEE ,Transmission (telecommunications) ,intercontact ,disruption-tolerant networks ,Routing (electronic design automation) ,business ,contact ,Computer network - Abstract
International audience; Most disruption-tolerant networking protocols available have focused on mere contact and intercontact characteristics to make forwarding decisions. We propose to relax such a simplistic approach and include multi-hop opportunities by annexing a node's vicinity to its network vision. We investigate how the vicinity of a node evolves through time and whether such information is useful when routing data. By analyzing a modified version of the pure WAIT forwarding strategy, we observe a clear tradeoff between routing performance and cost for monitoring the neighborhood. By observing a vicinity-aware WAIT strategy, we emphasize how the pure WAIT misses interesting end-to-end transmission opportunities through nearby nodes. Our analyses also suggest that limiting a node's neighborhood view to four hops is enough to improve forwarding efficiency while keeping control overhead low.
- Published
- 2013
- Full Text
- View/download PDF
13. Improving performance and incentives in disruption-tolerant networks
- Author
-
Shevade, Upendra
- Subjects
- Wireless networks, Computer networks, Disruption-tolerant networks
- Abstract
The recent proliferation of personal wireless devices has led to the emergence of disruption-tolerant networks (DTNs), which are characterized by intermittent connectivity among some or all participating nodes and a consequent lack of contemporaneous end-to-end paths between the source and consumer of information. However, the success of DTNs as a communication paradigm is critically dependent on the following challenges being addressed: (1) How to enable popular but demanding applications, such as video-on-demand, to operate in such constrained network settings, and (2) How to incentivize individual devices to cooperate when network operation is only possible under, or greatly benefits from cooperation. In this dissertation, we present a novel set of protocols and develop real systems that effectively meet the above challenges. We make the following contributions: First, we design and implement a novel system for enabling high bandwidth content distribution in vehicular DTNs by leveraging infrastructure access points (APs). We predict which APs will soon be visited by a vehicular node and then proactively push content-of-interest to those APs. Our replication schemes optimize content delivery by exploiting Internet connectivity, local wireless connectivity, node relay connectivity and mesh connectivity among APs. We demonstrate the effectiveness of our system through trace-driven simulation and Emulab emulation using real taxi and bus traces. We further deploy our system in two vehicular networks: a fourteen AP 802.11b network and a four AP 802.11n network with smartphones and laptops as clients. Second, we propose an incentive-aware routing protocol for DTNs. In DTNs, routing takes place in a store-and-forward fashion with the help of relay nodes. If the nodes in a DTN are controlled by rational entities, such as people or organizations, the nodes can be expected to behave selfishly by attempting to maximize their utilities and conserve their resources. Since routing is inherently a cooperative activity, system operation will be critically impaired unless cooperation is incentivized. We propose the use of pair-wise tit-for-tat (TFT) as a simple, robust and practical incentive mechanism for DTNs. We then develop an incentive-aware routing protocol that allows selfish nodes to maximize their own performance while conforming to TFT constraints.
- Published
- 2010
14. Routing in large-scale buses ad hoc networks
- Author
-
Wei Shu, Minglu Li, Xu Li, M. Sede, Min-You Wu, and Da Li
- Subjects
Routing protocol ,Dynamic Source Routing ,Computer science ,Wireless ad hoc network ,Distributed computing ,Wireless Routing Protocol ,Bus network ,Ad hoc On-Demand Distance Vector Routing ,Destination-Sequenced Distance Vector routing ,Busnet ,Disruption-Tolerant Networks ,Hierarchical routing ,Triangular routing ,Static routing ,Vehicular ad hoc network ,Adaptive quality of service multi-hop routing ,business.industry ,Network packet ,Policy-based routing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Deterministic routing ,Optimized Link State Routing Protocol ,Routing domain ,Link-state routing protocol ,routing ,Multipath routing ,Hazy Sighted Link State Routing Protocol ,vehicular ad hoc networks ,business ,Computer network - Abstract
A disruption-tolerant network (DTN) attempts to route packets between nodes that are temporarily connected. Difficulty in such networks is that nodes have no information about the network status and contact opportunities. The situation is different in public bus networks because the movement of buses exhibits some regularity so that routing in a deterministic way is possible. Many algorithms use a contacts oracle that provides the exact meeting times and durations between all nodes. However, in a real vehicular environment, an oracle is not always accurate, and deterministic routing gives poor results. In this paper, we present BLER, a routing algorithm that achieves effective routing in a buses environment. BLER, compared to other algorithms, performs routing at bus line level instead of bus level; it uses specific bus lines information to achieve good performances. We evaluate BLER on real traces of the bus network of Shanghai, and compare it to other routing algorithms. Performances provide good results for this kind of DTNs.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.