SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Network Coding in Disruption
Tolerant Network
Presented by- Faheema Monica (S20141501)
University of Science and Technology, Beijing
Contents
Fundamentals of
Disruption
Tolerant Network
• Introduction to DTN
• Working principles
• Bundle protocol
• DTN vs Classical networking
• Potential applications of DTN
• DTN’s applicability to NASA
Applications of
Network Coding
in DTN
• Random Linear Coding
• Coding benefits for Broadcast communication
• Coding benefits for Unicast applications
• Network Coding Improves Delay vs. Transmission Number Trade-
off
• Conclusion
DTN (Disruption Tolerant Network)
 A networking architecture provides communication
in unstable and stressed environments where the
network would face disruptions, high bit error.
 DTN provides:
 reliable data transfer without complete cotemporaneous end
to end path to destination,
 retransmission from closet relay node rather than sender,
 custody transfer and return receipt operations,
 DTN can reduce delay and increase throughput.
 Store-Carry-Forward
DTN routing adopts a so
called store-carry-forward
paradigm. Under this
paradigm, each node in the
network stores a packet that
has been forwarded to it by
another node, carries the
packet while moves around,
and forward it to other relay
nodes or to the destination
node when they come within
transmission range.
Working principles of DTN
Bundle Protocol
A different approach to TCP/IP: BP ;RFC 5050
DTN vs. Classical(Wireless) Networking
DTN
Classical
networking
DTN vs. Classical
Networking
Classical
networking
DTN
DTN vs. Classical
Networking
DTN
Classical
networking
DTN vs. Classical
Networking
DTN
Classical
networking
Potential applications of DTN:
1. Space Agencies:
2. Military and Intelligence:
3. Commercial:
4. Public Service and Safety:
5. Personal Use:
6. Environmental Monitoring:
 Space operations require
coordination of data
transfers across the space
link with the scheduled
ground contacts. This is done
manually by DTN.
 DTN enables the decoupling
of these two activities by
allowing onboard data to be
held in persistent storage
until a contact is available, at
which time it is
automatically sent to the
Command and Data
Handling (C&DH) for
downlink.
DTN’s applicability to NASA and International Space
Mission
Random Linear Network coding is a technique, which can be used to improve a
network's throughput, efficiency and scalability, . Instead of simply relaying the
packets of information they receive, the nodes of a network take several packets
and combine them together for transmission. This can be used to attain the
maximum possible information flow in a network.
In broadcast transmission schemes allows close to optimal throughput using a
decentralized algorithm. Nodes transmit random linear combinations of the
packets they receive, with coefficients chosen from a Galois field. If the field size is
enough large, the probability that the receiver(s) will obtain linearly independent
combinations (and therefore obtain innovative information) approaches 1. It
should however be noted that, although random network coding has excellent
throughput performance, if a receiver obtains an insufficient (or lost) number of
packets, it is extremely unlikely that they can recover any of the original packets.
This can be addressed by sending additional random linear combinations until the
receiver obtains the appropriate number of packets.
RANDOM LINEAR NETWORK CODING
Let see the Example of the butterfly network coding:
The butterfly network is often used to illustrate how
random linear network coding can outperform routing. Two
source nodes have information A and B that must be
transmitted to the two destination nodes (at the bottom),
which each want to know both A and B. Each edge can carry
only a single value (we can think of an edge transmitting a
bit in each time slot).
If only routing were allowed, then the central link would be
only able to carry A or B, but not both. Suppose we send A
through the center; then the left destination would receive
A twice and not know B at all. Sending B poses a similar
problem for the right destination. We say that routing is
insufficient because no routing scheme can transmit both A
and B simultaneously to both destinations. Using a simple
code, as shown (random linear network coding), A and B
can be transmitted to both destinations simultaneously by
sending the sum of the symbols through the center – in
other words, we encode A and B using the formula "A+B".
The left destination receives A and A + B, and can calculate
B by subtracting the two values. Similarly, the right
destination will receive B and A + B, and will also be able to
determine both A and B.
Theorem 1:
 We assume that all packets are of the same length with P bits
payload. When RLC is used in packet data networks, the payload
of each packet can be viewed as a vector over a finite field, Fq of
size q, more specifically, where the addition and multiplication
operations are over Fq .
 The coefficient α=(α1,...αk) is called the encoding vector, and the
resulting linear combination, x is an encoded message. We say
that two or more encoded messages are linearly independent if
their encoding vectors are linearly independent. Each original
packet, mi, can be viewed as a special combination with
coefficients αi = 1, and αj = 0, ∀j ≠i.
Control Signaling
Before presenting the benefits of RLC in DTN, let have a look to the different
existing control signaling:
Control Signaling
 Because of the ad hoc nature and dynamically changing topology of DTNs, nodes
perform beaconing in order to discover their neighbors (via broadcasting
periodic beacon packets), and/or exchange with neighbors information about
packets/coded packets they carried. Such control signaling is useful for nodes
to decide whether to transmit and what information to transmit. The following
different levels of control signaling have been considered:
 No Signaling: Under this most basic case no information about the
neighborhood is available. Nodes decide to transmit packets without knowing
whether there is a neighboring node or not.
 Normal Signaling: Under normal signaling, each node periodically transmits
beacon messages in order to discover neighboring node, nodes within its
transmission range. With normal signaling, a node typically only transmits
information when it detects at least one neighbor.
 Full Signaling: Under full signaling, each node not only performs periodic
beaconing to discover its neighbors, but also exchanges with its neighbors
information about what packets or coded packets are stored locally, the
sequence numbers of packets or the encoding vectors of coded packets. Based
on such information, a network node typically only transmits to its neighbors if
it has useful information for them.
Coding Benefits for Energy Efficiency:
Consider a network of N nodes, where each node has generated a packet to be broadcast to all the
other nodes. Assume nodes move according to the uniform at random mobility model, i.e., at each
time slot each node independently jumps to a new location in the terrain selected uniformly at
random. At each time slot, each node decides to turn off or on its radio respectively, with
probability p and 1-p. Assume there is no control signaling (no information about neighboring
nodes and the information they carry). In each time slot, each node that is turned on randomly
chooses a packet to transmit (under a non-coding scheme), or transmits a random linear
combination of its coded packets to its neighbors (under an RLC scheme). There are on average (1-
p) N transmissions in the network at each time slot.
Theorem 2: Broadcasting to all receivers can be achieved using on average the:
time slots, without using network coding;
time slots, using network coding with a large enough
field size, q.
Which one is better?
Of course Tnc is better with a small time slot than Tw.
Coding Benefits for Broadcast Network
Communication
Simulation results have
confirmed that the block
delivery delay under the RLC
scheme is very close to the
minimum block delivery delay,
as shown in FIG5-A, which
plots the empirical cumulative
distribution function (CDF) of
minimum block delivery delay,
and the block delivery delay
achieved by the RLC and the
non-coding scheme over 100
different simulation runs each
with a different random seed.
Coding Benefits for Unicast Network Communication
Figure 10.5: DTN with N=101 nodes,
homogeneous exponential inter-meeting
time with rate"=0.0049, bandwidth
constraint of b=1 packet per contact, and
unlimited buffer space.
The RLC scheme improves the delay versus number of transmission trade-offs
Simulation studies reported compared the block delivery delay versus
transmission number trade-off achieved by the non-coding scheme with
binary spray-and-wait applied to each of the K packets, the token- based RLC
scheme and the E-NCP scheme. Figure 10.7 plots the average block delivery
delay versus number of transmissions, for a block of K=10 packets, under
different token limits, for the cases both without buffer constraints (a) and
with buffer constraint of B = 2 (b). We observe that, with a similar number of
transmissions, the RLC schemes achieve smaller block delivery delay than
non-coding schemes, and the token-based RLC scheme outperforms the E-
NCP scheme, especially for small numbers of transmissions. The results for a
limited relay buffer case further establish the benefits of the RLC schemes in
reducing block delivery delay without increasing transmission overheads:
Network Coding Improves Delay vs. Transmission
Number Trade-off
Figure 10.7: Block delivery delay vs transmission number trade-off under the same
network setting as Fig. 10.5except for the bandwidth and buffer constraints.
Figure 10.9: Block delivery delay vs transmission number trade-off with full
signaling and normal signaling, the network setting is the same as that of fig 10.5
RLC and no coding scheme under different control signaling:
 In this presentation, at first we have introduced the DTN concept,
presented the opportunities offered by DTN, and shown how
DTN-based communication may represent an opportunity for
satellite networking.
 And then in later part, our main focus was to show the
performance evaluation of RLC based routing schemes both for
broadcast and unicast network communications, unicast network
communications and broadcast network communication having
been the object of a larger amount of research. We highlighted
both theoretic results and simulation studies findings. For both
communication models, the RLC based scheme provides better
trade-off between energy consumption and delivery performance.
Conclusion
Network Coding in Disruption Tolerant Network (DTN)

Weitere ähnliche Inhalte

Was ist angesagt?

Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...Sharif Hossen
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classificationShivi Shukla
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015vtunotesbysree
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...IJERA Editor
 
Practical Wireless Mesh Networks and Their Applications
Practical Wireless Mesh Networks and Their ApplicationsPractical Wireless Mesh Networks and Their Applications
Practical Wireless Mesh Networks and Their ApplicationsRaluca Musaloiu-E.
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant NetworksAnubhav Mahajan
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedDebesh Sadhukhan
 
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Mshari Alabdulkarim
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing TechonologiesKathirvel Ayyaswamy
 
Performance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackPerformance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackMehedi
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksKishan Patel
 

Was ist angesagt? (20)

Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sBlack Hole Detection in AODV Using Hexagonal Encryption in Manet’s
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’s
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Ns2 x graphs
Ns2 x graphsNs2 x graphs
Ns2 x graphs
 
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
 
Practical Wireless Mesh Networks and Their Applications
Practical Wireless Mesh Networks and Their ApplicationsPractical Wireless Mesh Networks and Their Applications
Practical Wireless Mesh Networks and Their Applications
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant Networks
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
 
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing Techonologies
 
Performance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackPerformance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attack
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 
Aodv
AodvAodv
Aodv
 

Andere mochten auch

Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksIGEEKS TECHNOLOGIES
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Dr. Mazlan Abbas
 
secure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networkssecure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networksSneha Joshi
 
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon RegionDTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon RegionWaldir Moreira
 
SocialDTN: a DTN Implementation for Digital and Social Inclusion
SocialDTN: a DTN Implementation for Digital and Social InclusionSocialDTN: a DTN Implementation for Digital and Social Inclusion
SocialDTN: a DTN Implementation for Digital and Social InclusionWaldir Moreira
 
How Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN RoutingHow Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN RoutingWaldir Moreira
 
Crowd Assisted Approach for Pervasive Opportunistic Sensing
Crowd Assisted Approach for Pervasive Opportunistic SensingCrowd Assisted Approach for Pervasive Opportunistic Sensing
Crowd Assisted Approach for Pervasive Opportunistic SensingWaldir Moreira
 
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...Social-aware Opportunistic Routing Protocol based on User's Interactions and ...
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...Waldir Moreira
 
Project
Project Project
Project J M
 
Always Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsAlways Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsDaniel Austin
 
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...Tokyo University of Science
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Waldir Moreira
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Nasir Bhutta
 
Steve Morgan - Our People - January 2015
Steve Morgan - Our People - January 2015Steve Morgan - Our People - January 2015
Steve Morgan - Our People - January 2015Steve Morgan
 
Evaluation Question 2
Evaluation Question 2Evaluation Question 2
Evaluation Question 2AnnaHester123
 
20150513151057242
2015051315105724220150513151057242
20150513151057242Elaine Karp
 
Evaluation Question 7
Evaluation Question 7 Evaluation Question 7
Evaluation Question 7 AnnaHester123
 

Andere mochten auch (20)

Secure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networksSecure data retrieval for decentralized disruption tolerant military networks
Secure data retrieval for decentralized disruption tolerant military networks
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
 
secure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networkssecure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networks
 
Wireless Body Area Network
Wireless Body Area NetworkWireless Body Area Network
Wireless Body Area Network
 
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon RegionDTN-Amazon: Digital/Social Inclusion in the Amazon Region
DTN-Amazon: Digital/Social Inclusion in the Amazon Region
 
SocialDTN: a DTN Implementation for Digital and Social Inclusion
SocialDTN: a DTN Implementation for Digital and Social InclusionSocialDTN: a DTN Implementation for Digital and Social Inclusion
SocialDTN: a DTN Implementation for Digital and Social Inclusion
 
How Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN RoutingHow Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN Routing
 
Crowd Assisted Approach for Pervasive Opportunistic Sensing
Crowd Assisted Approach for Pervasive Opportunistic SensingCrowd Assisted Approach for Pervasive Opportunistic Sensing
Crowd Assisted Approach for Pervasive Opportunistic Sensing
 
Alien Far Side 3 Moon
Alien Far Side 3 MoonAlien Far Side 3 Moon
Alien Far Side 3 Moon
 
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...Social-aware Opportunistic Routing Protocol based on User's Interactions and ...
Social-aware Opportunistic Routing Protocol based on User's Interactions and ...
 
Project
Project Project
Project
 
Always Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsAlways Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of Things
 
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
WiFi Direct with Delay-Optimized DTN is the Base Recipe for Applications in L...
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
 
Steve Morgan - Our People - January 2015
Steve Morgan - Our People - January 2015Steve Morgan - Our People - January 2015
Steve Morgan - Our People - January 2015
 
AbdulNasserSaleh Thabit CV ver 1.6-5-2015
AbdulNasserSaleh Thabit CV  ver 1.6-5-2015AbdulNasserSaleh Thabit CV  ver 1.6-5-2015
AbdulNasserSaleh Thabit CV ver 1.6-5-2015
 
Evaluation Question 2
Evaluation Question 2Evaluation Question 2
Evaluation Question 2
 
20150513151057242
2015051315105724220150513151057242
20150513151057242
 
Evaluation Question 7
Evaluation Question 7 Evaluation Question 7
Evaluation Question 7
 

Ähnlich wie Network Coding in Disruption Tolerant Network (DTN)

IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...IEEEGLOBALSOFTSTUDENTPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...IEEEFINALSEMSTUDENTSPROJECTS
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidancegraphhoc
 
Improving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingImproving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingDr. Amarjeet Singh
 
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...ambitlick
 
Distributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity SchemeDistributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd Iaetsd
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movementtharindanv
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer NetworkingRuchita Tomar
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioIffat Anjum
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Editor IJARCET
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Editor IJARCET
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...cscpconf
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdfmrcopyxerox
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksJPINFOTECH JAYAPRAKASH
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKA PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKIJCNCJournal
 

Ähnlich wie Network Coding in Disruption Tolerant Network (DTN) (20)

IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
 
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Improving QoS of VANET using Network Coding
Improving QoS of VANET using Network CodingImproving QoS of VANET using Network Coding
Improving QoS of VANET using Network Coding
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
 
Distributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity SchemeDistributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity Scheme
 
550 537-546
550 537-546550 537-546
550 537-546
 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer Networking
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKA PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
 

Kürzlich hochgeladen

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Kürzlich hochgeladen (20)

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 

Network Coding in Disruption Tolerant Network (DTN)

  • 1. Network Coding in Disruption Tolerant Network Presented by- Faheema Monica (S20141501) University of Science and Technology, Beijing
  • 2. Contents Fundamentals of Disruption Tolerant Network • Introduction to DTN • Working principles • Bundle protocol • DTN vs Classical networking • Potential applications of DTN • DTN’s applicability to NASA Applications of Network Coding in DTN • Random Linear Coding • Coding benefits for Broadcast communication • Coding benefits for Unicast applications • Network Coding Improves Delay vs. Transmission Number Trade- off • Conclusion
  • 3. DTN (Disruption Tolerant Network)  A networking architecture provides communication in unstable and stressed environments where the network would face disruptions, high bit error.  DTN provides:  reliable data transfer without complete cotemporaneous end to end path to destination,  retransmission from closet relay node rather than sender,  custody transfer and return receipt operations,  DTN can reduce delay and increase throughput.
  • 4.  Store-Carry-Forward DTN routing adopts a so called store-carry-forward paradigm. Under this paradigm, each node in the network stores a packet that has been forwarded to it by another node, carries the packet while moves around, and forward it to other relay nodes or to the destination node when they come within transmission range. Working principles of DTN
  • 5. Bundle Protocol A different approach to TCP/IP: BP ;RFC 5050
  • 6. DTN vs. Classical(Wireless) Networking DTN Classical networking
  • 10. Potential applications of DTN: 1. Space Agencies: 2. Military and Intelligence: 3. Commercial: 4. Public Service and Safety: 5. Personal Use: 6. Environmental Monitoring:
  • 11.  Space operations require coordination of data transfers across the space link with the scheduled ground contacts. This is done manually by DTN.  DTN enables the decoupling of these two activities by allowing onboard data to be held in persistent storage until a contact is available, at which time it is automatically sent to the Command and Data Handling (C&DH) for downlink. DTN’s applicability to NASA and International Space Mission
  • 12. Random Linear Network coding is a technique, which can be used to improve a network's throughput, efficiency and scalability, . Instead of simply relaying the packets of information they receive, the nodes of a network take several packets and combine them together for transmission. This can be used to attain the maximum possible information flow in a network. In broadcast transmission schemes allows close to optimal throughput using a decentralized algorithm. Nodes transmit random linear combinations of the packets they receive, with coefficients chosen from a Galois field. If the field size is enough large, the probability that the receiver(s) will obtain linearly independent combinations (and therefore obtain innovative information) approaches 1. It should however be noted that, although random network coding has excellent throughput performance, if a receiver obtains an insufficient (or lost) number of packets, it is extremely unlikely that they can recover any of the original packets. This can be addressed by sending additional random linear combinations until the receiver obtains the appropriate number of packets. RANDOM LINEAR NETWORK CODING
  • 13. Let see the Example of the butterfly network coding: The butterfly network is often used to illustrate how random linear network coding can outperform routing. Two source nodes have information A and B that must be transmitted to the two destination nodes (at the bottom), which each want to know both A and B. Each edge can carry only a single value (we can think of an edge transmitting a bit in each time slot). If only routing were allowed, then the central link would be only able to carry A or B, but not both. Suppose we send A through the center; then the left destination would receive A twice and not know B at all. Sending B poses a similar problem for the right destination. We say that routing is insufficient because no routing scheme can transmit both A and B simultaneously to both destinations. Using a simple code, as shown (random linear network coding), A and B can be transmitted to both destinations simultaneously by sending the sum of the symbols through the center – in other words, we encode A and B using the formula "A+B". The left destination receives A and A + B, and can calculate B by subtracting the two values. Similarly, the right destination will receive B and A + B, and will also be able to determine both A and B.
  • 14. Theorem 1:  We assume that all packets are of the same length with P bits payload. When RLC is used in packet data networks, the payload of each packet can be viewed as a vector over a finite field, Fq of size q, more specifically, where the addition and multiplication operations are over Fq .  The coefficient α=(α1,...αk) is called the encoding vector, and the resulting linear combination, x is an encoded message. We say that two or more encoded messages are linearly independent if their encoding vectors are linearly independent. Each original packet, mi, can be viewed as a special combination with coefficients αi = 1, and αj = 0, ∀j ≠i.
  • 15. Control Signaling Before presenting the benefits of RLC in DTN, let have a look to the different existing control signaling: Control Signaling  Because of the ad hoc nature and dynamically changing topology of DTNs, nodes perform beaconing in order to discover their neighbors (via broadcasting periodic beacon packets), and/or exchange with neighbors information about packets/coded packets they carried. Such control signaling is useful for nodes to decide whether to transmit and what information to transmit. The following different levels of control signaling have been considered:  No Signaling: Under this most basic case no information about the neighborhood is available. Nodes decide to transmit packets without knowing whether there is a neighboring node or not.  Normal Signaling: Under normal signaling, each node periodically transmits beacon messages in order to discover neighboring node, nodes within its transmission range. With normal signaling, a node typically only transmits information when it detects at least one neighbor.  Full Signaling: Under full signaling, each node not only performs periodic beaconing to discover its neighbors, but also exchanges with its neighbors information about what packets or coded packets are stored locally, the sequence numbers of packets or the encoding vectors of coded packets. Based on such information, a network node typically only transmits to its neighbors if it has useful information for them.
  • 16. Coding Benefits for Energy Efficiency: Consider a network of N nodes, where each node has generated a packet to be broadcast to all the other nodes. Assume nodes move according to the uniform at random mobility model, i.e., at each time slot each node independently jumps to a new location in the terrain selected uniformly at random. At each time slot, each node decides to turn off or on its radio respectively, with probability p and 1-p. Assume there is no control signaling (no information about neighboring nodes and the information they carry). In each time slot, each node that is turned on randomly chooses a packet to transmit (under a non-coding scheme), or transmits a random linear combination of its coded packets to its neighbors (under an RLC scheme). There are on average (1- p) N transmissions in the network at each time slot. Theorem 2: Broadcasting to all receivers can be achieved using on average the: time slots, without using network coding; time slots, using network coding with a large enough field size, q. Which one is better? Of course Tnc is better with a small time slot than Tw. Coding Benefits for Broadcast Network Communication
  • 17. Simulation results have confirmed that the block delivery delay under the RLC scheme is very close to the minimum block delivery delay, as shown in FIG5-A, which plots the empirical cumulative distribution function (CDF) of minimum block delivery delay, and the block delivery delay achieved by the RLC and the non-coding scheme over 100 different simulation runs each with a different random seed. Coding Benefits for Unicast Network Communication Figure 10.5: DTN with N=101 nodes, homogeneous exponential inter-meeting time with rate"=0.0049, bandwidth constraint of b=1 packet per contact, and unlimited buffer space.
  • 18. The RLC scheme improves the delay versus number of transmission trade-offs Simulation studies reported compared the block delivery delay versus transmission number trade-off achieved by the non-coding scheme with binary spray-and-wait applied to each of the K packets, the token- based RLC scheme and the E-NCP scheme. Figure 10.7 plots the average block delivery delay versus number of transmissions, for a block of K=10 packets, under different token limits, for the cases both without buffer constraints (a) and with buffer constraint of B = 2 (b). We observe that, with a similar number of transmissions, the RLC schemes achieve smaller block delivery delay than non-coding schemes, and the token-based RLC scheme outperforms the E- NCP scheme, especially for small numbers of transmissions. The results for a limited relay buffer case further establish the benefits of the RLC schemes in reducing block delivery delay without increasing transmission overheads: Network Coding Improves Delay vs. Transmission Number Trade-off
  • 19. Figure 10.7: Block delivery delay vs transmission number trade-off under the same network setting as Fig. 10.5except for the bandwidth and buffer constraints.
  • 20. Figure 10.9: Block delivery delay vs transmission number trade-off with full signaling and normal signaling, the network setting is the same as that of fig 10.5 RLC and no coding scheme under different control signaling:
  • 21.  In this presentation, at first we have introduced the DTN concept, presented the opportunities offered by DTN, and shown how DTN-based communication may represent an opportunity for satellite networking.  And then in later part, our main focus was to show the performance evaluation of RLC based routing schemes both for broadcast and unicast network communications, unicast network communications and broadcast network communication having been the object of a larger amount of research. We highlighted both theoretic results and simulation studies findings. For both communication models, the RLC based scheme provides better trade-off between energy consumption and delivery performance. Conclusion

Hinweis der Redaktion

  1. Abbreviated as DTN, Disruption Tolerant Networking is a networking architecture that is designed to provide communications in the most unstable and stressed environments, where the network would normally be subject to frequent and long lasting disruptions and high bit error rates that could severely degrade normal communications. It is an experimental protocol developed by the Delay & Disruption Tolerant Networking Research Group, which operates under the Internet Research Task Force.
  2. The internet depends on end to end continuous connectivity to work. Reliability requires end to end acknowledgement. Nature and accidents can easily break the end to end model. Packets that can’t make it through are simply discarded. DTN uses routing nodes with storage to preserve data when links are down. Data bundles are stored until the next hop is restored, then they are forwarded on.. This means end destinations need not to be continuously connected. DTN enables automatic data comm management in short range mobile applications.
  3. The figure above (top) illustrates the bundle-protocol overlay and (bottom) compares the Internet protocol stack (left) with a DTN protocol stack (right). DTN is based on a new protocol named Bundle Protocol (BP; RFC 5050). Bundle protocol operates as an overlay protocol that links together multiple subnets (such as Ethernet-based LANs) into a single network. The bundle protocol ties together the lower-lower protocols so that application programs can communicate across the same or different sets of lower-lower protocols under conditions that involve long network delays or disruptions. The bundle-protocol agent stores and forwards entire bundles (or bundle fragments) between nodes. A single bundle protocol is used throughout a DTN. By contrast, the lower-lower protocols below the bundle protocol are chosen to suit the characteristics of each communication environment.
  4. For ordinary networking, mobility is a challenge. In DTN, mobility is exploited.
  5. Ordinary networking: Link failures are handled are accidents. DTN: Failing links are considered are normal.
  6. Ordinary: Routing through space. DTN: Routing through space and time!
  7. Ordinary: Standard DTN: The superset of ordinary networking!
  8. IBR-DTN has been ported to Android Phones.
  9. In the United States, between 2004 and 2009, DARPA funded a disruption-tolerant networking program, with a focus on scenarios where links suffered frequent but usually short disruptions rather than the long light trip times (LTTs) involved in deep space. The Office of Space Communications and Navigation (SCaN) at NASA Headquarters leads the Delay Tolerant Networking (DTN) investigation with the goal of advancing the maturity and heritage (space flight use) of the DTN communication protocols. Goddard Space Flight Center successfully demonstrated an on-obit DTN node using the EO-1 satellite on December 8-10 2010 and February 8-10, 2011 as part of a multi-phase demonstration activity sponsored in part by the Delay Tolerant Readiness Project, NASA HQ. The EO-1 spacecraft is an Earth imaging observatory with a multispectral land imaging instrument onboard that is a significant improvement over the Landsat 7 ETM+ instrument. At the end of its science mission, NASA Headquarters approved a plan for an Extended Mission operations phase, where new technologies could be validated. Current EO-1 operations require coordination of data transfers across the space link with the scheduled ground contacts. This is done manually. DTN enables the decoupling of these two activities by allowing onboard data to be held in persistent storage until a contact is available, at which time it is automatically sent to the Command and Data Handling (C&DH) for downlink. Because of the large volume of hyperspectral data, it is typically down linked at very high rates. The data are stored at the ground station for future transmission to the user via terrestrial links, or in some cases, physical media. Using DTN at the ground station,data can autonomously flow to the user as the link permits, removing the need for manual intervention. On the forward link, data to be uplinked can be sent to the ground station at any time and remain in the ground network until the forward link becomes available.