SlideShare une entreprise Scribd logo
1  sur  22
LailiAidi (aidi@kth.se)
Jung Changsu (changsu@kth.se)
   Many evolving wireless networks have
    characteristics different from the Internet.
    •   The instability of the link
    •   Long propagation and queuing delays
    •   Extremely asymmetric data rate
    •   High link error rates


   Delay Tolerant networks are designed to provide
    • reliable transmission
    • Interoperable communications between wide range of
      networks




                                                           2
 The Interplanetary Internet initiative: find a solution
  & suggestion network architecture, support reliable
  transmission between a station on the Earth and
  satellites, with an overlay network concept
 IRTF DTN Research Group: Interplanetary Internet
  under challenged networks
 DARPA Disruption Tolerant Networking program:
  Protocols for transmitting bundles to DTN nodes




                                                            3
 Path   and Link
 • High Error and Asymmetric Rate
 • Disconnection
 • Long and Variable Delay
 Network
 • Intermittent Connectivity
 • Security
 End    System
 • Limited Longevity
 • Low Duty Cycle Operation
 • Limited Resources



                                    4
 Link-repair   approach
Maintaining the end-to-end reliability and fate-sharing
 model of Internet
 Network-specific   proxy agent
Accessing internet from challenged networks, vice versa

 Message-oriented   reliable overlay architecture:
 Interoperability properties + Robust non-
 interactive delivery semantics + CoS

 Store-and-Forward     message switching:
 Gateway concept - Hold data until it has a scheduled
 transfer, In-network storage

                                                          5
 Region
 •   Regional network concept
 •   Interconnect different networks
 •   Own communication protocol
 •   Unique ID
 Node
 • Host: Sends or receives bundles and requires storage for
   queuing bundles.
 • Router: Forwards each bundles in the same DTN
   region, requires storage to store incoming packets
 • Gateway - support interoperability: interconnection
   point, forwards bundles to other DTN regions with different
   protocol stacks.


                                                                 6
   Bundle: message
    • Bundle header: Fragmentation
    • Control information: handling, storing, disposing
    • Source-application’s user data

   Fragmentation
    • To increase the possibility of delivery & increase
      performance
    • Proactive fragmentation
      • Predicted Contact volume + Optimize its usage
    • Reactive fragmentation
      • disconnection while transmitting fragmented bundles + Send
        smaller fragments


                                                                     7
   Bundle Layer




                   (2)




                         8
   Class of Service




                       (2)




                             9
   Name Tuple :
    • Region: Globally unique, reduce forwarding tables size
    • Entity Name: Identifier in specified region, not globally
      unique

   Contact Knowledge Oracle:encapsulate particular
    knowledge of network (Null, Contact Summary, Complete
    Contact, Queuing, Traffic On Demand)
   Group Membership Oracle:encapsulate particular
    knowledge of group dynamic (Local, Delay, Complete)




                                                                  10
   Objective: Maximize the probability of message delivery
•   time-varying multi-graph: no guarantee of the availability
    of the next hops link
•   Asymmetric data rate sender vs. receiver
•   high error rate link: retransmission
•   Contact intervals and volumes: unknown precisely ahead
    of time

 Routing     Algorithm Class
•   Zero Knowledge: Poor performance
•   Complete Knowledge: Complete knowledge
•   Partial Knowledge: Route message independently based
    on the future traffic demand.



                                                                 11
   Single-copy technique:
    • EMDDA: evaluating different routing metrics, no network
      traffic consideration
    • Deterministic node mobility assumption

   Multi-copy techniques:
    • Flooding-based protocols: non resource-constrained
      environments
    • Quota-based protocols: resource-constrained
      environments (quota flag to every message )




                                                                12
 Unicast-based  routing (UBR)
 Broadcast-Based Routing (BBR)
 Tree-Based Routing (TBR)
 Group-Based Routing (GBR)
 Context Aware Multicast Routing
 Static tree-based routing (STBR)
 Dynamic Tree-Based Multicasting Algorithm
  (DTBR)
 Context Aware Multicast Routing (CAMR)




                                              13
   Issues in bundle layer
    •   Vulnerable to attack because it is an overlay network
    •   Bundles can be modified
    •   Unauthorized insertion of bundles.
    •   Accept only authenticated messages

   Bundle Security
    • Authentication is carried out in routers and gateways
    • Public-key cryptography
        • both users and forwarders have their own key-pairs and certificates
    • A sender uses its private key to sign bundles and create
      bundle-specific signature.
    • A forwarding node replaces the sender’s signature with its
      own.



                                                                                14
   Open Issues in Bundle Security
    • The level of flexibility
       The bundle security protocol prevents insecure combination of
        application such as including plain-text signatures.
       Can support VPN but the complexity can cause high cost


    • Key Management
       No key management schemes exist in DTN deployments
       Existing schemes need hard coding.


    • Canonicalization of bundles
       Requires the same bytes of bundle of signature for integrity
       Bundles may be changed during traversal between nodes




                                                                        15
 Analyticalresearch, Mobility model
 Free-space Optical Communications: smart
  mobile phone-based mobile ad-hoc networks
  (MANETs)
 Radio Frequency (RF)
 Ultra-Wide Band (UWB)
 Acoustic (Sonar, Ultrasonic)




                                              16
 Outer  Space / Deep-Space Networks
  Inter Planetary Networks: communication
  network robustness, timeliness data return
 Terrestrial Civilian Network
  Mule Networks (ZebraNet), Challenge Links
  (SenDT)
 Acoustic underwater networks
 Battlefield networks




                                               17
   Overview
    •   Developed by the University of Waterloo
    •   Providing low cost Internet services to the poorest villages
    •   Vehicles are used to deliver data
    •   Services:
         birth, marriage, and death certificates
         Medical consultation and agricultural problems
    • Key concepts for a robust system
           Low-cost(70$/kiosk/month)
           low-power kiosk controller (6~8W)
           Using refurbished PCs without hard disks
           Free software


                                                                     Figure 11. KioskNet overview
                                          S.Guo, M.H. Falaki, U.Ismail, E.A. Oliver, S.UrRahman, A. Seth, M.A. Zaharia, and S.Keshav.
                                          “Design and Implementation of the KioskNet System (Extended Version)”. [Online].




                                                                                                                                 18
   Components
    • Kiosk
       Kiosk controller provide a network boot function, a network file
        system, user management, and network connectivity
    • Ferries
       a car, buses, motorcycles or trains
       contact with kiosk controllers and gateways using opportunistic ways
    • Gateway
       connected to the Internet through DSL or broadband
       receives data from a ferry and uploads the data to the proxy
    • Proxy
       Support communication between kiosk users and a legacy server
    • Legacy Server
       Typical servers supporting applications such as IMAP, SMTP and HTTP




                                                                               19
   Security Architecture
    • Entities
       KioskNet Franchisers, Franchisees, Users, Application Service providers

    • Certificate
       All entities have a 2048-bit RSA key and a public key
       Proxy broadcasts a public key for users, franchisees and ASPs

    • Infrastructure Integrity
       Digital signatures are used on all remote commands and software updates
        from franchiser

    • User data protection
       This system offers encrypted virtual space for each user’s home directory



                                                                                    20
   The main goal of a DTN
    • Interoperability
       between different kinds of networks in wide-ranging regions even
        though many limitations

    • Reliable transmission based on overlay network

   The implementation of DTNs will be a good solution for
    challenged networks
    • For example: KioskNet




                                                                           21
Questions?




              22

Contenu connexe

Tendances

NGN Next Generation Networks
NGN Next Generation NetworksNGN Next Generation Networks
NGN Next Generation Networks
abdulquyyum
 
Dcunit4 transmission media
Dcunit4 transmission mediaDcunit4 transmission media
Dcunit4 transmission media
Akshay Nagpurkar
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 

Tendances (20)

Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
NGN Next Generation Networks
NGN Next Generation NetworksNGN Next Generation Networks
NGN Next Generation Networks
 
5 g wireless system
5 g wireless system5 g wireless system
5 g wireless system
 
I twin report
I twin reportI twin report
I twin report
 
5g wireless systems
5g wireless systems5g wireless systems
5g wireless systems
 
Internet telephony
Internet telephonyInternet telephony
Internet telephony
 
Dcunit4 transmission media
Dcunit4 transmission mediaDcunit4 transmission media
Dcunit4 transmission media
 
InfiniBand Presentation
InfiniBand PresentationInfiniBand Presentation
InfiniBand Presentation
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
 
Software defined networks and openflow protocol
Software defined networks and openflow protocolSoftware defined networks and openflow protocol
Software defined networks and openflow protocol
 
NGN BASICS
NGN BASICSNGN BASICS
NGN BASICS
 
5G technology part 1
5G technology part 15G technology part 1
5G technology part 1
 
Iot architecture
Iot architectureIot architecture
Iot architecture
 
mobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdfmobile computing - Unit 1 Material.pdf
mobile computing - Unit 1 Material.pdf
 
3G & 4G presentation
3G & 4G presentation 3G & 4G presentation
3G & 4G presentation
 
Device to Device Communication-5G technology
Device to Device Communication-5G technologyDevice to Device Communication-5G technology
Device to Device Communication-5G technology
 
ADSL
ADSLADSL
ADSL
 
Wireless security
Wireless securityWireless security
Wireless security
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 

En vedette

Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
Phearin Sok
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic Networking
Noorin Fatima
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Waldir Moreira
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
Eisha Madhwal
 
Social-aware Opportunistic Routing
Social-aware Opportunistic RoutingSocial-aware Opportunistic Routing
Social-aware Opportunistic Routing
Waldir Moreira
 
Introduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and ApplicationsIntroduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and Applications
Nasir Bhutta
 

En vedette (20)

Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant Networks
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic Networking
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
 
Vehicular network
Vehicular networkVehicular network
Vehicular network
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 
Advanced Wireless Technologies
Advanced Wireless TechnologiesAdvanced Wireless Technologies
Advanced Wireless Technologies
 
Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5
 
Social-aware Opportunistic Routing
Social-aware Opportunistic RoutingSocial-aware Opportunistic Routing
Social-aware Opportunistic Routing
 
Vo ip
Vo ipVo ip
Vo ip
 
Introduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and ApplicationsIntroduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and Applications
 

Similaire à Delay Tolerant Network - Presentation

Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
revathiyadavb
 
7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech
Hemant Nagwekar
 

Similaire à Delay Tolerant Network - Presentation (20)

internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptx
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Case mis ch06
Case mis ch06Case mis ch06
Case mis ch06
 
Ch06
Ch06Ch06
Ch06
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
Enterprise campus networks
Enterprise campus networksEnterprise campus networks
Enterprise campus networks
 
Networking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxNetworking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptx
 
Top schools in noida
Top schools in noidaTop schools in noida
Top schools in noida
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 

Plus de Laili Aidi

Mobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging MarketsMobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging Markets
Laili Aidi
 
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Laili Aidi
 
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Laili Aidi
 

Plus de Laili Aidi (20)

Mobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging MarketsMobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging Markets
 
Stream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - IntroductionStream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - Introduction
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Study Abroad in the Land of Nobel
Study Abroad in the Land of NobelStudy Abroad in the Land of Nobel
Study Abroad in the Land of Nobel
 
Go International: Challenges and Opportunities
Go International: Challenges and OpportunitiesGo International: Challenges and Opportunities
Go International: Challenges and Opportunities
 
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
 
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
 
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
 
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
 
Music Service Monetization 2.0
Music Service Monetization 2.0Music Service Monetization 2.0
Music Service Monetization 2.0
 
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
 
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
 
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
 
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationAnalysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringSNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
 
Sweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - PresentationSweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - Presentation
 
Condroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final ReportCondroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final Report
 
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution ListCondroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
 
Condroid KTH Summer CSD 2011 - Press Release
Condroid KTH Summer CSD 2011 - Press ReleaseCondroid KTH Summer CSD 2011 - Press Release
Condroid KTH Summer CSD 2011 - Press Release
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Delay Tolerant Network - Presentation

  • 2. Many evolving wireless networks have characteristics different from the Internet. • The instability of the link • Long propagation and queuing delays • Extremely asymmetric data rate • High link error rates  Delay Tolerant networks are designed to provide • reliable transmission • Interoperable communications between wide range of networks 2
  • 3.  The Interplanetary Internet initiative: find a solution & suggestion network architecture, support reliable transmission between a station on the Earth and satellites, with an overlay network concept  IRTF DTN Research Group: Interplanetary Internet under challenged networks  DARPA Disruption Tolerant Networking program: Protocols for transmitting bundles to DTN nodes 3
  • 4.  Path and Link • High Error and Asymmetric Rate • Disconnection • Long and Variable Delay  Network • Intermittent Connectivity • Security  End System • Limited Longevity • Low Duty Cycle Operation • Limited Resources 4
  • 5.  Link-repair approach Maintaining the end-to-end reliability and fate-sharing model of Internet  Network-specific proxy agent Accessing internet from challenged networks, vice versa  Message-oriented reliable overlay architecture: Interoperability properties + Robust non- interactive delivery semantics + CoS  Store-and-Forward message switching: Gateway concept - Hold data until it has a scheduled transfer, In-network storage 5
  • 6.  Region • Regional network concept • Interconnect different networks • Own communication protocol • Unique ID  Node • Host: Sends or receives bundles and requires storage for queuing bundles. • Router: Forwards each bundles in the same DTN region, requires storage to store incoming packets • Gateway - support interoperability: interconnection point, forwards bundles to other DTN regions with different protocol stacks. 6
  • 7. Bundle: message • Bundle header: Fragmentation • Control information: handling, storing, disposing • Source-application’s user data  Fragmentation • To increase the possibility of delivery & increase performance • Proactive fragmentation • Predicted Contact volume + Optimize its usage • Reactive fragmentation • disconnection while transmitting fragmented bundles + Send smaller fragments 7
  • 8. Bundle Layer (2) 8
  • 9. Class of Service (2) 9
  • 10. Name Tuple : • Region: Globally unique, reduce forwarding tables size • Entity Name: Identifier in specified region, not globally unique  Contact Knowledge Oracle:encapsulate particular knowledge of network (Null, Contact Summary, Complete Contact, Queuing, Traffic On Demand)  Group Membership Oracle:encapsulate particular knowledge of group dynamic (Local, Delay, Complete) 10
  • 11. Objective: Maximize the probability of message delivery • time-varying multi-graph: no guarantee of the availability of the next hops link • Asymmetric data rate sender vs. receiver • high error rate link: retransmission • Contact intervals and volumes: unknown precisely ahead of time  Routing Algorithm Class • Zero Knowledge: Poor performance • Complete Knowledge: Complete knowledge • Partial Knowledge: Route message independently based on the future traffic demand. 11
  • 12. Single-copy technique: • EMDDA: evaluating different routing metrics, no network traffic consideration • Deterministic node mobility assumption  Multi-copy techniques: • Flooding-based protocols: non resource-constrained environments • Quota-based protocols: resource-constrained environments (quota flag to every message ) 12
  • 13.  Unicast-based routing (UBR)  Broadcast-Based Routing (BBR)  Tree-Based Routing (TBR)  Group-Based Routing (GBR)  Context Aware Multicast Routing  Static tree-based routing (STBR)  Dynamic Tree-Based Multicasting Algorithm (DTBR)  Context Aware Multicast Routing (CAMR) 13
  • 14. Issues in bundle layer • Vulnerable to attack because it is an overlay network • Bundles can be modified • Unauthorized insertion of bundles. • Accept only authenticated messages  Bundle Security • Authentication is carried out in routers and gateways • Public-key cryptography • both users and forwarders have their own key-pairs and certificates • A sender uses its private key to sign bundles and create bundle-specific signature. • A forwarding node replaces the sender’s signature with its own. 14
  • 15. Open Issues in Bundle Security • The level of flexibility  The bundle security protocol prevents insecure combination of application such as including plain-text signatures.  Can support VPN but the complexity can cause high cost • Key Management  No key management schemes exist in DTN deployments  Existing schemes need hard coding. • Canonicalization of bundles  Requires the same bytes of bundle of signature for integrity  Bundles may be changed during traversal between nodes 15
  • 16.  Analyticalresearch, Mobility model  Free-space Optical Communications: smart mobile phone-based mobile ad-hoc networks (MANETs)  Radio Frequency (RF)  Ultra-Wide Band (UWB)  Acoustic (Sonar, Ultrasonic) 16
  • 17.  Outer Space / Deep-Space Networks Inter Planetary Networks: communication network robustness, timeliness data return  Terrestrial Civilian Network Mule Networks (ZebraNet), Challenge Links (SenDT)  Acoustic underwater networks  Battlefield networks 17
  • 18. Overview • Developed by the University of Waterloo • Providing low cost Internet services to the poorest villages • Vehicles are used to deliver data • Services:  birth, marriage, and death certificates  Medical consultation and agricultural problems • Key concepts for a robust system  Low-cost(70$/kiosk/month)  low-power kiosk controller (6~8W)  Using refurbished PCs without hard disks  Free software Figure 11. KioskNet overview S.Guo, M.H. Falaki, U.Ismail, E.A. Oliver, S.UrRahman, A. Seth, M.A. Zaharia, and S.Keshav. “Design and Implementation of the KioskNet System (Extended Version)”. [Online]. 18
  • 19. Components • Kiosk  Kiosk controller provide a network boot function, a network file system, user management, and network connectivity • Ferries  a car, buses, motorcycles or trains  contact with kiosk controllers and gateways using opportunistic ways • Gateway  connected to the Internet through DSL or broadband  receives data from a ferry and uploads the data to the proxy • Proxy  Support communication between kiosk users and a legacy server • Legacy Server  Typical servers supporting applications such as IMAP, SMTP and HTTP 19
  • 20. Security Architecture • Entities  KioskNet Franchisers, Franchisees, Users, Application Service providers • Certificate  All entities have a 2048-bit RSA key and a public key  Proxy broadcasts a public key for users, franchisees and ASPs • Infrastructure Integrity  Digital signatures are used on all remote commands and software updates from franchiser • User data protection  This system offers encrypted virtual space for each user’s home directory 20
  • 21. The main goal of a DTN • Interoperability  between different kinds of networks in wide-ranging regions even though many limitations • Reliable transmission based on overlay network  The implementation of DTNs will be a good solution for challenged networks • For example: KioskNet 21

Notes de l'éditeur

  1. Unauthorized insertion of bundles- Can cause serious threats because of the node’s limited resources.- Can be exploited by increasing resource consumption (i.e. DoS attack)
  2. The level of flexibility The bundle security protocol prevents insecure combination of application such as including plain-text signatures.May support a VPN but the complexity can cause high cost for implementationKey ManagementNo key management schemes exist in DTN deploymentsExisting schemes need hard coding. Accordingly, replacement of trusted keys in all nodes makes it difficult to adopt this scheme. Canonicalization of bundlesThe definition of a canonical bundle form is an open issue for data integrityRequires the same bytes of bundle of signature for integrity