In this paper we propose a fuzzy-based routing protocol for DTN networks, called
... algorithm and compared it with well known routing protocols: Epidemic, ...
select the next hop such that the delivery ratio is improved. We develop ... deliver- ing messages between disconnected partitions, similar to how the postal service ..... where the edge cost functions is determined with the available oracles.
Aug 22, 2009 - 1.1 THE CHALLENGES OF N4C APPLICATIONS DEVELOPMENT . ...... HTC Hero, Magic (Google 1 Phone): Operating s
Sep 24, 2010 - PROPHET can be applied to rout- ing in public transport systems but does not exploit their specific characteristics. MaxProp Routing [1] is ...
22 Aug 2012 ... schemes. In this paper, we first present an overview work containing eval-
uations of DTN routing protocols in the literature through a sur-.
The epidemic routing protocol [9]: Messages propagate through the network like an .... On the one hand as the best carriers (delegates) of the message.
Jan 10, 2013 - When a routing happens, the source node decides which node is the best one to carry the message according to the moving information stored ...
FORWARD. HOME. BACK .... called non-deliverable packet flooding floods data to non- existent .... packet forwarding process when the number of replicas of a.
Jun 17, 2009 - ever, the dynamic nature of vehicular network, such as vehicle density ..... to MRP, GeoDTN+Nav combines traditional ad hoc routing and DTN ...
Jun 25, 2015 - Master Control Station (MCS) is placed at tier 4. The. RWs are ... Department of Information Technology, Kalyani Government. Engineering ...
Routing protocols. Keywords. DTN, Routing Protocol, Neighborhood. 1.
INTRODUCTION. With the real possibility of ubiquitous communication, wireless
mobile ...
deliverance probability when varying the communication range for the Helsinki scenario. Figure 1. Comparison of Epidemic, Prophet and MaxProp routing ...
for fetching public keys or checking Certificate Revocation. Lists (CRL) may not be ... ios where DTNs are most vulnerable to such an attack. III. SYSTEM MODEL.
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November 2011 ... Faculty of Computer Science and Information system. University ...
Mar 31, 2009 - end-to-end TCP connections into shorter-length TCP connections. ... correctness and performance testing of our approach. In Sec- tion VI we ...
Korea: IEEE, 2009. [18] Pierre-Ugo Tournoux J´er´emie Leguay, Farid Benbadis, Vania Conan,. Marcelo Dias de Amorim, and John Whitbeck: The Accordion.
ABSTRACT. Many DTN routing protocols use a variety of mechanisms, .... To
ensure a fair comparison to other DTN protocols (that we did not deploy), we ...
most prominent routing protocols for Delay-Tolerant Networks,. Epidemic ... DTN
is the key technology to support future space com- munications, since the ...
review the routing protocol in delay tolerant networks and compare the routing
protocols that have been proposed specially for Vehicular Delay Tolerant ...
Sep 15, 2008 - We consider a Delay Tolerant Network (DTN) whose users. (nodes) are connected by ... cates, and as a side effect, the performance benefit of content re-routing that ... an Ubuntu distribution of Linux (version 7.10). User Mode.
Mar 13, 2016 - [1] is possible thanks to routing protocols, such as proac- tive, reactive, or their combination [2]. When the mobile nodes have high mobility ...
Xiaolan Zhang. Dept. of Computer and. Information Science. Fordham University. Bronx, NY [email protected]. Honggang Zhang. Dept. of Mathematics and.
13 Apr 2011 ... PRoPHET DTN Routing. PRoPHET =>. Probabilistic Routing Protocol using.
History of Encounters and Transitivity. Introduction and a Little ...
PRoPHET DTN Routing PRoPHET => Probabilistic Routing Protocol using History of Encounters and Transitivity
Introduction and a Little History! Concept invented by Avri Doria and Anders Lindgren for the SNC (Sámi Network Connectivity) project in 2002. Designed for DTNs where there is no fixed topology or schedule. All data forwarding happens at opportunistic encounters between nodes. Patterns in the mobility are used to improve the use of resources as compared with Epidemic Routing to which it is related. Developed and implemented during SNC and SNC+1, assisted by Samo Grašič who built the Prophet DTN infrastructure software used in N4C. Looking to have the latest version of the specification published as an Experimental RFC under the auspices of the IRTF DTN research group.
13 April 2011
1/9
Folly Consulting
Epidemic Routing Simple but resource expensive scheme for getting DTN bundles to every encountered node – and hence necessarily to the intended destination – eventually, provided that bundle lifetime is adequate Algorithm: Whenever an opportunistic encounter occurs exchange any bundles with the encountered node that the node doesn’t already possess – Result: If all goes well both nodes have the union of the sets of bundles they both had before the encounter
Advantage: Guaranteed to find the optimum path… .. because it tries every path Disadvantages: – This is all very well if nodes have infinite storage capacity – Practical encounters may not last long enough to complete the exchange .. And it would be good to prioritize transfers that expedite delivery
13 April 2011
2/9
Folly Consulting
PRoPHET improves Epidemic In a real network involving human activity, where mobile nodes are controlled or carried by humans: – Mobility is not truly random as in the sense of ‘white noise’ – Human activity imposes patterns on the mobility – The mobility has a characteristic time interval that depends on the sort of activity we are talking about • Typically this is much longer than the sort of delays that are normally found in the connected Internet • On the order of hours or days in many circumstances such as N4C’s test beds
PRoPHET extracts the essence of the mobility pattern of nodes – abstracts ‘History of Encounters’ into delivery predictability parameter – parameter is used to prune the Epidemic routing paths – aim to avoid sending bundles only on paths that have a low probability of reaching the bundle’s destination
13 April 2011
3/9
Folly Consulting
Delivering a Bundle This sequence of diagrams shows how a set of Wi-Fi equipped nodes moving in an area that is much bigger than the range of Wi-Fi might deliver a bundle Time t: A sends message for D
Time t+dt: A meets B – good path
D
D
Time t+2dt: B meets E – bad path C
D
B B
C A
E
Time t+5dt: C meets D – delivery!
C A
E
A
E
Message passed from A to B
Message not exchanged
Time t+4dt: B meets A – good path
Time t+3dt: B meets C – good path
D
E
B
D
C
D
C B
C
A
B
A
B
Message passed from C to D
No exchange – both have message Node with Wi-Fi range
13 April 2011
A
E
A
Message from A to D 4/9
E
Message passed from B to C Copy of message
Folly Consulting
Modelling the Mobility Pattern Every node maintains a set of Delivery Predictabilities (DPs) for nodes it has encountered (reasonably) recently –
DP for node B stored in node A: PA(B)
–
DP before/after encounter: PA(B)old / PA(B)new
The DPs evolve over time as nodes encounter each other, thus… Basic DP Evolution Equations in node A when it meets node B 1. Direct encounter: DP for encountered node increases at each encounter •
PA(B)new = 0.5 [on first encounter – when PA(B)old is 0] •
•
don’t know whether there will be more meetings so ‘hedge our bets’..
1. Decay over time: All DPs are decreased if the node hasn’t been encountered •
PA(B)new = PA(B)old * γK [K is number of time units since last decay] •
If PA(B) gets very small, set it to 0 and treat next encounter (if any) as first
1. Transitive rule: If B is a good path to C and A meets B frequently then nodes that meet A might want to give messages for C to node A •
PA(C)new = max(PA(C)old, PB(C), * PA(B)new * β) [β is a constant] •
Encountered node (B) sends its set of DPs to A for use in the Transitive Rule
Folly Consulting
The real world is a bit more complicated (Pencounter is not a constant) 13 April 2011
5/9
PRoPHET Protocol Manages encounters between pairs of nodes. – Effectively a point-to-point protocol
Stage 1: detect a new neighbor – Mechanism depends on link layer and separate discovery protocol – For example, DTN2 has IP and Bluetooth based mechanisms
Stage 2: execute PRoPHET Hello protocol to confirm PRoPHET support – Agree first/second roles between connected pair; exchange identities
Stage 3: information exchange – details on next slide – On completion both nodes have sent and received some bundles according to relative values of updated DPs in the two nodes
Stage 4: extra bundle exchange – If new bundles arrive due to local applications or new encounters determine if they should be sent to connected node(s)
Stage 5: periodically repeat complete information exchange Neighbor disappears: break off connection – may happen at any stage
13 April 2011
6/9
Folly Consulting
PRoPHET Information Exchange PRoPHET Information exchange stage: – Both nodes apply decay equation (2) to own DP sets – Nodes send these sets of DPs to the encountered neighbor – Nodes apply direct encounter and transitive equations combining its own DPs and the set of DPs received from the encountered neighbor – In each node, compare updated local DPs with DPs received from encountered neighbor: • According to policy and current DPs determine if any bundles held by this node should be offered to the encountered node
– Each node sends offers to other node • Node receiving offers decides which bundles to accept according to local policy e.g., will the bundle fit into available storage? is it too old? • Having decided which bundles to accept it sends acceptance responses to offering node posibly modifying the order to suit its own policy
– Offering node then sends accepted bundles to the other node in the order requested by the accepting node
13 April 2011
7/9
Folly Consulting
PRoPHET in N4C The Prophet DTN infrastructure code as developed by Samo Grašič has been extensively used for – The LTU web/email/nsim/podcast experiments in Swedish Lapland. – The MEIS meterological and radiological monitoring experiments in Kočevje, Slovenia.
The PRoPHET routing protocol code in the DTN2 reference implementation has been tested and had limited experimentation in conjunction with the PyMail DTN nomadic email system developed by Folly Consulting and deployed to a limited extent in Swedish Lapland. A new version of PRoPHET has been researched, designed and specified by Elwyn Davies of Folly Consulting. Extensive simulation of the new and older versions of PRoPHET have been carried out by Samo Grašič at LTU to demonstrate some issues with the older version and compare it with the new version. – An academic paper is in preparation
13 April 2011
8/9
Folly Consulting
PRoPHET Resources Current Internet Draft specifying Version 2 of the PRoPHET protocol: http://tools.ietf.org/html/draft-irtf-dtnrg-prophet-09 Source code of Prophet DTN Infrastructure software: http://code.n4c.eu/code/PRoPHET/ Source code and documentation of the PyMail nomadic email system http://code.n4c.eu/code/PyMail/