725 research outputs found
Robust streaming in delay tolerant networks
Delay Tolerant Networks (DTN) do not provide any end to end connectivity guarantee. Thus, transporting data over such networks is a tough challenge as most of Internet applications assume a form of persistent end to end connection. While research in DTN has mainly addressed the problem of routing in various mobility contexts with the aim to improve bundle delay delivery and data delivery ratio, little attention has been paid to applications. This paper investigates the support of streaming-like applications over DTN. We identify how DTN characteristics impact on the overall performances of these applications and present Tetrys, a transport layer mechanism, which enables robust streaming over DTN. Tetrys is based on an
on the fly coding mechanism able to ensure full reliability without retransmission and fast in-order bundle delivery in comparison to classical erasure coding schemes. We evaluate our Tetrys prototype on real DTN connectivity traces captured from the Rollerblading tour in Paris. Simulations show that on average, Tetrys clearly outperforms all other reliability schemes in terms of bundles delivery service
Scalable Schedule-Aware Bundle Routing
This thesis introduces approaches providing scalable delay-/disruption-tolerant routing capabilities in scheduled space topologies. The solution is developed for the requirements derived from use cases built according to predictions for future space topology, like the future Mars communications architecture report from the interagency operations advisory group. A novel routing algorithm is depicted to provide optimized networking performance that discards the scalability issues inherent to state-of-the-art approaches. This thesis also proposes a new recommendation to render volume management concerns generic and easily exchangeable, including a new simple management technique increasing volume awareness accuracy while being adaptable to more particular use cases. Additionally, this thesis introduces a more robust and scalable approach for internetworking between subnetworks to increase the throughput, reduce delays, and ease configuration thanks to its high flexibility.:1 Introduction
1.1 Motivation
1.2 Problem statement
1.3 Objectives
1.4 Outline
2 Requirements
2.1 Use cases
2.2 Requirements
2.2.1 Requirement analysis
2.2.2 Requirements relative to the routing algorithm
2.2.3 Requirements relative to the volume management
2.2.4 Requirements relative to interregional routing
3 Fundamentals
3.1 Delay-/disruption-tolerant networking
3.1.1 Architecture
3.1.2 Opportunistic and deterministic DTNs
3.1.3 DTN routing
3.1.4 Contact plans
3.1.5 Volume management
3.1.6 Regions
3.2 Contact graph routing
3.2.1 A non-replication routing scheme
3.2.2 Route construction
3.2.3 Route selection
3.2.4 Enhancements and main features
3.3 Graph theory and DTN routing
3.3.1 Mapping with DTN objects
3.3.2 Shortest path algorithm
3.3.3 Edge and vertex contraction
3.4 Algorithmic determinism and predictability
4 Preliminary analysis
4.1 Node and contact graphs
4.2 Scenario
4.3 Route construction in ION-CGR
4.4 Alternative route search
4.4.1 Yenâs algorithm scalability
4.4.2 Blocking issues with Yen
4.4.3 Limiting contact approaches
4.5 CGR-multicast and shortest-path tree search
4.6 Volume management
4.6.1 Volume obstruction
4.6.2 Contact sink
4.6.3 Ghost queue
4.6.4 Data rate variations
4.7 Hierarchical interregional routing
4.8 Other potential issues
5 State-of-the-art and related work
5.1 Taxonomy
5.2 Opportunistic and probabilistic approaches
5.2.1 Flooding approaches
5.2.2 PROPHET
5.2.3 MaxProp
5.2.4 Issues
5.3 Deterministic approaches
5.3.1 Movement-aware routing over interplanetary networks
5.3.2 Delay-tolerant link state routing
5.3.3 DTN routing for quasi-deterministic networks
5.3.4 Issues
5.4 CGR variants and enhancements
5.4.1 CGR alternative routing table computation
5.4.2 CGR-multicast
5.4.3 CGR extensions
5.4.4 RUCoP and CGR-hop
5.4.5 Issues
5.5 Interregional routing
5.5.1 Border gateway protocol
5.5.2 Hierarchical interregional routing
5.5.3 Issues
5.6 Further approaches
5.6.1 Machine learning approaches
5.6.2 Tropical geometry
6 Scalable schedule-aware bundle routing
6.1 Overview
6.2 Shortest-path tree routing for space networks
6.2.1 Structure
6.2.2 Tree construction
6.2.3 Tree management
6.2.4 Tree caching
6.3 Contact segmentation
6.3.1 Volume management interface
6.3.2 Simple volume manager
6.3.3 Enhanced volume manager
6.4 Contact passageways
6.4.1 Regional border deïŹnition
6.4.2 Virtual nodes
6.4.3 PathïŹnding and administration
7 Evaluation
7.1 Methodology
7.1.1 Simulation tools
7.1.2 Simulator extensions
7.1.3 Algorithms and scenarios
7.2 OïŹine analysis
7.3 Eliminatory processing pressures
7.4 Networking performance
7.4.1 Intraregional unicast routing tests
7.4.2 Intraregional multicast tests
7.4.3 Interregional routing tests
7.4.4 Behavior with congestion
7.5 Requirement fulïŹllment
8 Summary and Outlook
8.1 Conclusion
8.2 Future works
8.2.1 Next development steps
8.2.2 Contact graph routin
The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions
In recent years, the current Internet has experienced an unexpected paradigm
shift in the usage model, which has pushed researchers towards the design of
the Information-Centric Networking (ICN) paradigm as a possible replacement of
the existing architecture. Even though both Academia and Industry have
investigated the feasibility and effectiveness of ICN, achieving the complete
replacement of the Internet Protocol (IP) is a challenging task.
Some research groups have already addressed the coexistence by designing
their own architectures, but none of those is the final solution to move
towards the future Internet considering the unaltered state of the networking.
To design such architecture, the research community needs now a comprehensive
overview of the existing solutions that have so far addressed the coexistence.
The purpose of this paper is to reach this goal by providing the first
comprehensive survey and classification of the coexistence architectures
according to their features (i.e., deployment approach, deployment scenarios,
addressed coexistence requirements and architecture or technology used) and
evaluation parameters (i.e., challenges emerging during the deployment and the
runtime behaviour of an architecture). We believe that this paper will finally
fill the gap required for moving towards the design of the final coexistence
architecture.Comment: 23 pages, 16 figures, 3 table
FastM: Design and Evaluation of a Fast Mobility Mechanism for Wireless Mesh Networks
Although there is a large volume of work in the literature in terms of mobility approaches for Wireless Mesh Networks, usually these approaches introduce high latency in the handover process and do not support realtime services and applications. Moreover, mobility is decoupled from routing, which leads to inefficiency to both mobility and routing approaches with respect to mobility. In this paper we present a new extension to proactive routing protocols using a fast mobility extension, FastM, with the purpose of increasing handover performance in Wireless Mesh Networks. With this new extension, a new concept is created to integrate information between neighbor wireless mesh routers, managing locations of clients associated to wireless mesh routers in a certain neighborhood, and avoiding packet loss during handover. The proposed mobility approach is able to optimize the handover process without imposing any modifications to the current IEE 802.11 MAC protocol and use unmodified clients. Results show the improved efficiency of the proposed scheme: metrics such as disconnection time, throughput, packet loss and control overhead are largely improved when compared to previous approaches. Moreover, these conclusions apply to mobility scenarios, although mobility decreases the performance of the handover approach, as expected
Resilient networking in wireless sensor networks
This report deals with security in wireless sensor networks (WSNs),
especially in network layer. Multiple secure routing protocols have been
proposed in the literature. However, they often use the cryptography to secure
routing functionalities. The cryptography alone is not enough to defend against
multiple attacks due to the node compromise. Therefore, we need more
algorithmic solutions. In this report, we focus on the behavior of routing
protocols to determine which properties make them more resilient to attacks.
Our aim is to find some answers to the following questions. Are there any
existing protocols, not designed initially for security, but which already
contain some inherently resilient properties against attacks under which some
portion of the network nodes is compromised? If yes, which specific behaviors
are making these protocols more resilient? We propose in this report an
overview of security strategies for WSNs in general, including existing attacks
and defensive measures. In this report we focus at the network layer in
particular, and an analysis of the behavior of four particular routing
protocols is provided to determine their inherent resiliency to insider
attacks. The protocols considered are: Dynamic Source Routing (DSR),
Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing
(RWR)
- âŠ