SlideShare a Scribd company logo
1 of 27
Download to read offline
KARPAGA VINAYAGA COLLEGE OF ENGINEERING & TECHNOLOGY
G.S.T Road, Madhuranthagam Taluk, Kanchipuram – 603 308
Seminar on
Advanced Computing Techonologies
Dr.A.Kathirvel
Professor & HoD M.E-CSE
13.12.2011
2
Delay-Tolerant Network
3
Outline
 Introduction
 Challenged Internet
 Fixed The Internet Protocols
 A Delay Tolerant Message Based Overlay
Architecture
 Application Interface
 Related Work
 Conclusion
DTN - Introduction
 Delay-tolerant networking (DTN) is an approach to computer
network architecture that seeks to address the technical issues in
heterogeneous networks that may lack continuous network
connectivity. Examples of such networks are those operating in
mobile or extreme terrestrial environments, or planned networks in
space.
 Recently, the term disruption-tolerant networking has gained
currency in the United States due to support from DARPA, which
has funded many DTN projects. Disruption may occur because of
the limits of wireless radio range, sparsity of mobile nodes, energy
resources, attack, and noise.
DTN Status
 Spring of 2002: Internet Research Task Force research group
DTNRG formed to articulate DTN concepts.
 Summer of 2002: first demonstration of initial Bundling
implementation.
 March 2003: peer review of DTN architecture Internet Draft.
 May 2004: DARPA issues BAA (Broad Agency Announcement) for its
DTN research program.
 July 2004: version 01 of LTP Internet Draft published.
 Version 02 editing is in progress.
 Stephen Farrell is working on the first implementation.
 September 2004: version 03 of Bundling protocol spec Internet
Draft published.
 November 2004: initial meeting of CCSDS DTN BOF.
6
Introduction (cont.)
 Three key assumption to achieve today’s end-to-
end inter-process communication
1.An end-to-end path exists between a data
source and its peer(s).
2.The maximum round-trip time between any node
pairs in the network is not excessive.
3.The end-to-end packet drop probaility is small.
7
Introduction ( cont.)
 Challenged network :
1.Terrestrial Mobile Networks:
2.Exotic Media Networks:
3.Military Ad-Hoc Networks:
4.Sensor/Actuator Networks:
8
Introduction ( cont.)
 Some approaches to adapt Internet to unusual
evironments:
1.Link-repair approaches : engineer problem
links to appear more similar to the types of links
for which TCP/IP war designed.
2.To attach them to only the edge of the
Internet by means of a special proxy agent.(but
does not provide a general way to use such
networks for data transit.
9
Introduction
 We suggest a general purpose message-oriented
reliable overlay architecture as the appropriate
approach to tie together such networks, forming
an”internetwork of challenged internets.”
 Its design is influenced by the internet
design( interoperability),the roust noninteractive
delivery semantics of electronic mail, and
USPostal System.
10
CHALLENGED INTERNETS(cont.)
 Path and Link Characteristic
1.High Latency, Low Data Rate.
2.Disconnection: Non-faulty disconnections
A. Motion:
B. Low-duty-cycle
3.Long Queuing Times
11
CHALLENGED INTERNETS(cont.)
 Network Architectures
1.Interoperability Considerations: Some network
tend to be comparatively simple and local in scope, and
may fail to provide even the baseline abstractions that
are well-match for supporting layered protocol families
(such as Internet).
2.Security: end-to-end-only approaches typically
require some exchange of challenges or keys ,which
would be undesirable for high-delay and disconnection-
prone networks.
12
CHALLENGED INTERNETS
 End System Charateristics
1.Limited Longevity : sensor network
2.Low Duty Cycle Operation
• Motion
• Low-duty-cycle
3.limited Resources
13
FIX THE INTERNET
PROTOCOLS?(cont.)
 Two limits of PEPs (Performance
Enhancing Proxies), Boosters and Proxies :
 Specific command to specific network: Limits
the ability to re-use the proxies for different
applications.
 Fails to take advantage of any special
resources the proxy node may have to offer .
14
FIX THE INTERNET
PROTOCOLS?(cont.)
 Electronic Mail
 Provides an abstractions that comes close to
addressing many of the problems posed by
challenged networks. Such as its flexible
naming ,asynchronous message-based
operation, and in-band error reporting.
 Email falls short due to its lack of dynamic
routing, weakly-defined semantics, and
consistent application interface.
15
FIX THE INTERNET PROTOCOLS?
 Motivation for an Additional Architecture
Such a system should combine:
 Overlay routing capability such as is present in
peer-to-peer system with delay-tolerant and
disconnection-tolerant properties of electronic mail.
 Provide a gateway function between radically
dissimilar networks
16
A DELAY TOLERANT MESSAGE
BASED OVERLAY
ARCHITECTURE(cont.)
 Regions and DTN Gatways
17
A DELAY TOLERANT MESSAGE
BASED OVERLAY ARCHITECTURE
(cont.)
 Form of Name Tuples :
{Region Name, Entity Name}
ex: {internet.icann.int,
http://www.ietf.org/oview.html}
18
A DELAY TOLERANT MESSAGE
BASED OVERLAY ARCHITECTURE
(cont.)
 Path Selection and Scheduling
Routes are comprised of a cascade of
time-dependent contacts used to move
messages from their origins toward their
destination.
19
A DELAY TOLERANT MESSAGE
BASED OVERLAY ARCHITECTURE
(cont.)
 Custody Transfer and Reliability
 Custody transfer is akin to delegating
responsibility for delivering postal mail to a
person or service that promises (or contracts )
to do so.
 Reliability is depending on end-to-end
reliability.
20
A DELAY TOLERANT MESSAGE
BASED OVERLAY ARCHITECTURE
(cont.)
 Convergence Layers and Retransmission:
21
A DELAY TOLERANT MESSAGE
BASED OVERLAY ARCHITECTURE
(cont.)
 Time Synchronization
The DTN architecture requires a coarse level of
(relative) time synchronization, which is used for
identifying message fragments and also for
purging messages that have exceeded their
source-specified lifetimes.
22
A DELAY TOLERANT MESSAGE
BASED OVERLAY ARCHITECTURE
(cont.)
 Security
 Each message includes an immutable
“postage stamp” containing a verifiable
identity of the sender, an approval of the
requested CoS(class of service).
23
A DELAY TOLERANT MESSAGE
BASED OVERLAY ARCHITECTURE
 Congestion and Flow Control
 Proactive method: involve some form of
admission control to avoid the onset of
congestion in the first place.
 Reactive method: used which usually result in
degraded performance
24
APPLICATION INTERFACE (cont.)
 The DTN architecture is built as an overlay
network using messages as the primary unit of
data interchange.
 Application making use of the architecture must
be careful not to expect timely responses and
must generally be capable of operating in a
regime where a request/response turn-around
time exceeds the expected longevity of the client
and server processes.
25
APPLICATION INTERFACE (cont.)
 Applications must be prepared to handle the
creation and manipulation of name tuples and
their registrations (for demultiplexing received
messages), class of service specifiers, and
authentication information.
 The application interface is non-blocking, and
callback registrations are persistent.
 All DTN applications should be structured to
continue operating in the face of reboots or
network partitioning.
26
RELATED WORK (cont.)
 Store-and-forward routing :
 ZebraNet : sensor node (attached to animal).
 DataMules: powepower saving ( traveling
mule).
 The architectural thinking :
Interoperability and layering is guided by
principle of ARPANET/Internet
27
CONCLUSION
 The design embraces the notion of
message switching with in-network
storage and retransmission, late binding of
names, and routing tolerant of network
partitioning to construct a system better
suited to operation in challenged
environments than other existing network
architectures.

More Related Content

What's hot

Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTPrasant Misra
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxDRREC
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication ProtocolsPradeep Kumar TS
 
Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basicMathan kumar
 
Radio Frequencies for IoT
Radio Frequencies for IoTRadio Frequencies for IoT
Radio Frequencies for IoTJordan Eller
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network DesignSteven Cahill
 
Chapter 1 motivation
Chapter 1   motivationChapter 1   motivation
Chapter 1 motivationUmar Ali
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesAsim Rais Siddiqui
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdffirstlast467690
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service securityG Prachi
 

What's hot (20)

Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Link Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoTLink Layer Protocols for WSN-based IoT
Link Layer Protocols for WSN-based IoT
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
 
Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
 
Iot
IotIot
Iot
 
Ip telephony
Ip telephonyIp telephony
Ip telephony
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
 
Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basic
 
Radio Frequencies for IoT
Radio Frequencies for IoTRadio Frequencies for IoT
Radio Frequencies for IoT
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network Design
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Chapter 1 motivation
Chapter 1   motivationChapter 1   motivation
Chapter 1 motivation
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
edge computing seminar report.pdf
edge computing seminar report.pdfedge computing seminar report.pdf
edge computing seminar report.pdf
 
Authentication service security
Authentication service securityAuthentication service security
Authentication service security
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Unit 4
Unit 4Unit 4
Unit 4
 

Viewers also liked

Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing TechonologiesKathirvel Ayyaswamy
 
Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusionSoft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusionAlexander Decker
 
Network Security Offering by GSS America
Network  Security Offering by GSS AmericaNetwork  Security Offering by GSS America
Network Security Offering by GSS AmericaGss America
 
Artificial intelligence original
Artificial intelligence originalArtificial intelligence original
Artificial intelligence originalSaila Sri
 
Information & network security certifications
Information & network security certificationsInformation & network security certifications
Information & network security certificationsHamid Hasanabadi
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric VanderburgInformation Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric VanderburgEric Vanderburg
 
Network security & information security maintainence modified
Network security & information security maintainence modifiedNetwork security & information security maintainence modified
Network security & information security maintainence modifiedKeerthan Shetty
 

Viewers also liked (20)

Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
Advanced Computing Techonologies
Advanced Computing TechonologiesAdvanced Computing Techonologies
Advanced Computing Techonologies
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusionSoft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusion
 
Network Security Offering by GSS America
Network  Security Offering by GSS AmericaNetwork  Security Offering by GSS America
Network Security Offering by GSS America
 
Artificial intelligence original
Artificial intelligence originalArtificial intelligence original
Artificial intelligence original
 
Information & network security certifications
Information & network security certificationsInformation & network security certifications
Information & network security certifications
 
CS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKSCS6003 ADHOC & SENSOR NETWORKS
CS6003 ADHOC & SENSOR NETWORKS
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric VanderburgInformation Security Lesson 5 - Network Infrastructure - Eric Vanderburg
Information Security Lesson 5 - Network Infrastructure - Eric Vanderburg
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Wire Less
Wire LessWire Less
Wire Less
 
Network security & information security maintainence modified
Network security & information security maintainence modifiedNetwork security & information security maintainence modified
Network security & information security maintainence modified
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Question Paper Setting
Question Paper SettingQuestion Paper Setting
Question Paper Setting
 

Similar to Advanced Computing Techonologies

A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...inventionjournals
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Journals
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Publishing House
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos incaijjournal
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networkstechbed
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKIAEME Publication
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networkingArdit Meti
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
 
Cy31439446
Cy31439446Cy31439446
Cy31439446IJMER
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfArumugam90
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPTssuser2cc0d4
 

Similar to Advanced Computing Techonologies (20)

A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
 
934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
 
Essay On Ethernet
Essay On EthernetEssay On Ethernet
Essay On Ethernet
 
Ccna report
Ccna reportCcna report
Ccna report
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
 
Ijciet 08 02_002
Ijciet 08 02_002Ijciet 08 02_002
Ijciet 08 02_002
 
E42022125
E42022125E42022125
E42022125
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networking
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
 
Document
DocumentDocument
Document
 
Cy31439446
Cy31439446Cy31439446
Cy31439446
 
Unit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdfUnit_I_Computer Networks 4.pdf
Unit_I_Computer Networks 4.pdf
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPT
 

More from Kathirvel Ayyaswamy

22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTUREKathirvel Ayyaswamy
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2Kathirvel Ayyaswamy
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information TechnologyKathirvel Ayyaswamy
 

More from Kathirvel Ayyaswamy (20)

22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
18CS3040_Distributed Systems
18CS3040_Distributed Systems18CS3040_Distributed Systems
18CS3040_Distributed Systems
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2
 
18CS3040 Distributed System
18CS3040 Distributed System	18CS3040 Distributed System
18CS3040 Distributed System
 
20CS2021 Distributed Computing
20CS2021 Distributed Computing 20CS2021 Distributed Computing
20CS2021 Distributed Computing
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
 
18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and Sustainability
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 

Advanced Computing Techonologies

  • 1. KARPAGA VINAYAGA COLLEGE OF ENGINEERING & TECHNOLOGY G.S.T Road, Madhuranthagam Taluk, Kanchipuram – 603 308 Seminar on Advanced Computing Techonologies Dr.A.Kathirvel Professor & HoD M.E-CSE 13.12.2011
  • 3. 3 Outline  Introduction  Challenged Internet  Fixed The Internet Protocols  A Delay Tolerant Message Based Overlay Architecture  Application Interface  Related Work  Conclusion
  • 4. DTN - Introduction  Delay-tolerant networking (DTN) is an approach to computer network architecture that seeks to address the technical issues in heterogeneous networks that may lack continuous network connectivity. Examples of such networks are those operating in mobile or extreme terrestrial environments, or planned networks in space.  Recently, the term disruption-tolerant networking has gained currency in the United States due to support from DARPA, which has funded many DTN projects. Disruption may occur because of the limits of wireless radio range, sparsity of mobile nodes, energy resources, attack, and noise.
  • 5. DTN Status  Spring of 2002: Internet Research Task Force research group DTNRG formed to articulate DTN concepts.  Summer of 2002: first demonstration of initial Bundling implementation.  March 2003: peer review of DTN architecture Internet Draft.  May 2004: DARPA issues BAA (Broad Agency Announcement) for its DTN research program.  July 2004: version 01 of LTP Internet Draft published.  Version 02 editing is in progress.  Stephen Farrell is working on the first implementation.  September 2004: version 03 of Bundling protocol spec Internet Draft published.  November 2004: initial meeting of CCSDS DTN BOF.
  • 6. 6 Introduction (cont.)  Three key assumption to achieve today’s end-to- end inter-process communication 1.An end-to-end path exists between a data source and its peer(s). 2.The maximum round-trip time between any node pairs in the network is not excessive. 3.The end-to-end packet drop probaility is small.
  • 7. 7 Introduction ( cont.)  Challenged network : 1.Terrestrial Mobile Networks: 2.Exotic Media Networks: 3.Military Ad-Hoc Networks: 4.Sensor/Actuator Networks:
  • 8. 8 Introduction ( cont.)  Some approaches to adapt Internet to unusual evironments: 1.Link-repair approaches : engineer problem links to appear more similar to the types of links for which TCP/IP war designed. 2.To attach them to only the edge of the Internet by means of a special proxy agent.(but does not provide a general way to use such networks for data transit.
  • 9. 9 Introduction  We suggest a general purpose message-oriented reliable overlay architecture as the appropriate approach to tie together such networks, forming an”internetwork of challenged internets.”  Its design is influenced by the internet design( interoperability),the roust noninteractive delivery semantics of electronic mail, and USPostal System.
  • 10. 10 CHALLENGED INTERNETS(cont.)  Path and Link Characteristic 1.High Latency, Low Data Rate. 2.Disconnection: Non-faulty disconnections A. Motion: B. Low-duty-cycle 3.Long Queuing Times
  • 11. 11 CHALLENGED INTERNETS(cont.)  Network Architectures 1.Interoperability Considerations: Some network tend to be comparatively simple and local in scope, and may fail to provide even the baseline abstractions that are well-match for supporting layered protocol families (such as Internet). 2.Security: end-to-end-only approaches typically require some exchange of challenges or keys ,which would be undesirable for high-delay and disconnection- prone networks.
  • 12. 12 CHALLENGED INTERNETS  End System Charateristics 1.Limited Longevity : sensor network 2.Low Duty Cycle Operation • Motion • Low-duty-cycle 3.limited Resources
  • 13. 13 FIX THE INTERNET PROTOCOLS?(cont.)  Two limits of PEPs (Performance Enhancing Proxies), Boosters and Proxies :  Specific command to specific network: Limits the ability to re-use the proxies for different applications.  Fails to take advantage of any special resources the proxy node may have to offer .
  • 14. 14 FIX THE INTERNET PROTOCOLS?(cont.)  Electronic Mail  Provides an abstractions that comes close to addressing many of the problems posed by challenged networks. Such as its flexible naming ,asynchronous message-based operation, and in-band error reporting.  Email falls short due to its lack of dynamic routing, weakly-defined semantics, and consistent application interface.
  • 15. 15 FIX THE INTERNET PROTOCOLS?  Motivation for an Additional Architecture Such a system should combine:  Overlay routing capability such as is present in peer-to-peer system with delay-tolerant and disconnection-tolerant properties of electronic mail.  Provide a gateway function between radically dissimilar networks
  • 16. 16 A DELAY TOLERANT MESSAGE BASED OVERLAY ARCHITECTURE(cont.)  Regions and DTN Gatways
  • 17. 17 A DELAY TOLERANT MESSAGE BASED OVERLAY ARCHITECTURE (cont.)  Form of Name Tuples : {Region Name, Entity Name} ex: {internet.icann.int, http://www.ietf.org/oview.html}
  • 18. 18 A DELAY TOLERANT MESSAGE BASED OVERLAY ARCHITECTURE (cont.)  Path Selection and Scheduling Routes are comprised of a cascade of time-dependent contacts used to move messages from their origins toward their destination.
  • 19. 19 A DELAY TOLERANT MESSAGE BASED OVERLAY ARCHITECTURE (cont.)  Custody Transfer and Reliability  Custody transfer is akin to delegating responsibility for delivering postal mail to a person or service that promises (or contracts ) to do so.  Reliability is depending on end-to-end reliability.
  • 20. 20 A DELAY TOLERANT MESSAGE BASED OVERLAY ARCHITECTURE (cont.)  Convergence Layers and Retransmission:
  • 21. 21 A DELAY TOLERANT MESSAGE BASED OVERLAY ARCHITECTURE (cont.)  Time Synchronization The DTN architecture requires a coarse level of (relative) time synchronization, which is used for identifying message fragments and also for purging messages that have exceeded their source-specified lifetimes.
  • 22. 22 A DELAY TOLERANT MESSAGE BASED OVERLAY ARCHITECTURE (cont.)  Security  Each message includes an immutable “postage stamp” containing a verifiable identity of the sender, an approval of the requested CoS(class of service).
  • 23. 23 A DELAY TOLERANT MESSAGE BASED OVERLAY ARCHITECTURE  Congestion and Flow Control  Proactive method: involve some form of admission control to avoid the onset of congestion in the first place.  Reactive method: used which usually result in degraded performance
  • 24. 24 APPLICATION INTERFACE (cont.)  The DTN architecture is built as an overlay network using messages as the primary unit of data interchange.  Application making use of the architecture must be careful not to expect timely responses and must generally be capable of operating in a regime where a request/response turn-around time exceeds the expected longevity of the client and server processes.
  • 25. 25 APPLICATION INTERFACE (cont.)  Applications must be prepared to handle the creation and manipulation of name tuples and their registrations (for demultiplexing received messages), class of service specifiers, and authentication information.  The application interface is non-blocking, and callback registrations are persistent.  All DTN applications should be structured to continue operating in the face of reboots or network partitioning.
  • 26. 26 RELATED WORK (cont.)  Store-and-forward routing :  ZebraNet : sensor node (attached to animal).  DataMules: powepower saving ( traveling mule).  The architectural thinking : Interoperability and layering is guided by principle of ARPANET/Internet
  • 27. 27 CONCLUSION  The design embraces the notion of message switching with in-network storage and retransmission, late binding of names, and routing tolerant of network partitioning to construct a system better suited to operation in challenged environments than other existing network architectures.