SlideShare a Scribd company logo
NOTRE DAME UNIVERSITY
Faculty of Science
Computer Science Department
Data Communication and Computer Networks
Formal Report
Delay Tolerant Network - DTN
Submitted by:
Michel Chamat
Michel Azzi
2
Table Of Content
Abstract ………………………………………………………………………………………….. 3
Introduction and Problem Definition ……………………………………………………………. 4
Background Documented Research ……………………………………………………………... 5
Conclusion ………………………………………………………………………………………. 9
List of Reference ………………. ……………………………………………………………….10
3
I. Abstract
This research is based on the Delay Tolerant Network. Main aspects and characteristics of
DTN are subject of this report, taking into considerationthe technical problems this network
may encounter while applying them in real life. The report contains a documented research
about the actual applications that can be applied, data forwarding process and privacy
protectionforusers inthis kind of network. Furthermore,future possible worksinthis domain,
in addition to possible applications, are included to encourage the research in this subject.
4
II. Introduction and Problem Definition
Delay Tolerant Network, based on network architecture, is made to ensure continuous
network connectivity between heterogeneous networks operating on different transmission
media. Also, thecommunicationdoesn’tonlydepend ontheInternet.Such network isdesigned
to operate effectivelyover extreme distances, as those encounteredinspace communications.
In this environment, long latency is inevitable. However, similar problems canalso occur over
small distances, where interference is high or network resources are overloaded.
When it comes to application, Delay Tolerant Network has many problems which
directly affects the efficiency of the network, especially with the involvement of human
interaction. It features long latency and unstable network topology, where delay is enormous
and routing paths may not exist. Traditional routing protocols for mobile networks are
thereforeunsuitableforDTNs. In addition, the networkusesstoreand forwardtechniqueswith
no fixed connectionavailable between the users, allowing the increase in transmissiondelay.
Finally, privacy of real social life may be subject to potential attacks as data is being forward
in public places through public devices.
Despite these problems, DTN is the solutionfor challenging networks, such as space
communicationand military operations, as its characteristics are perfect match in these kind
of networks.
5
III. Background Documented Research
Most routing protocols for traditional networks need to set up a complete end-to-end
route, with at least one available end-to-endpath between the source and destination, before
packet transferring in the traditional mobile network. It is assumed that in DTNs, any link
between two nodes is duplex and the latency of the network is not an issue. Therefore, the
DTN doesn’tneedto setupthe paths forcommunications.Regardlessbeingoneofits problem,
the Delay Tolerant Network can be very useful in very complex networks, such as space
communication. Hereafter, data processing, privacy protection in addition to the applications
of the DTN are to be discussed.
Concerning data forwarding, DTN typically uses store and forward technique: if no
connection is available at a particular time in this technique, the source node storesandcarries
the message until the next available node is encountered andform a candidature set. Although
this technique is being applied, the comparisonand selectionof the most suitable forwarding
targets are topics for more advanced researches in DTN. On the other hand, when mobile
devices in DTN are associatedwithhuman beings, such as a Bluetoothenabledmobile phone,
they demonstrate certain social aspects associated with human-to-human communications.
More specifically, the human’s social behavior has a big role in these kinds of delay tolerant
networks. Also, the locationwhere a DTN is locatedmight have severe consequences onthe
efficiency comparedto humaninteraction, as geographic topologyinaDTN is unstable, while
socialcharacteristics ofmobilenodesarerelativelystableforafixedperiodoftime.Therefore,
the influence of human contribution can be very supportive and more important than
geographic informationin routing. The main problem with human interactions is that social
activities are limitedto specific hours, and therefore the data forwarding in such DTN will be
very time-dependent. For example, after midnight, the communication will barely exist and
the communicationwillbe very slowtounavailable, while inthe middle ofthe day it will reach
its peak. Moreover, a faster way for forwarding data in DTN is by using vehicles. Vehicular
DTN (VDTN) has many advantages as it expands connectivity, despite any lack of
infrastructure. It also simplifies the networkarchitecture by settingmobile routers, stationary
6
nodes and relaynodes placedat intersections, for example. Whenit comes to dataforwarding,
time varying social contact topology model is proposed to combine social attributes, time
patterns and geographic information. This model analyses the social similarityof nodes along
with the geographic information bounded with time factors to generate an overall delivery
probabilityforeachnode to the destination.Basedonthisdeliveryprobability, a multicastdata
forwarding algorithm is deployed to efficiently deliver packets.
To apply the store and forwardtechnique in the delay tolerant network, routing implies
and concerns itself with the ability to deliver data from a source to a destination which is
essential in any network. Despite DTN’s lack of connectivity and instantaneous end-to-end
paths, data is incrementally moved and stored throughout the network in hopes that it will
eventually reach its destination when the correct nodes are found. Epidemic router is the
technicusedto increasetheprobabilityofa packet being successfullytransferredistoreplicate
many copies of the packet in hopes that one will reaches its correct destination.
As thedata forwarding issuebecomesincreasinglyimportantinhuman involved DTNs,
lots of researchers use real social trace files to study the characteristics of mobile nodes.
However, thesedatasetsaresensitive,with potentialattacksusing the providedsocialattributes
to retrieve the subject identification, and thereforethe publisher may not want to release these
datasets. Privacy protectionis important for researchers andin most cases, researchers use the
data anonymous method to pre-processdata identifiers and attributes to make sure attackers
do not disclosethe dataset withthe released data. K-anonymityand Generalizations.These are
typical anonymous methods, which decrease the data utilityto protect attribute semanticsand
thereforeprevent the privacy disclosure issue. Attribute semantics shouldbe reservedinsome
scenarios, such as data mining or information retrieval. However, it is not necessary in a
scenario of DTNs. As the informationrequiredfor the routing decisionmaking process is the
corresponding relationships amongattributes, the attributes themselves canbe anonymized. If
both node’s identification and their associated attributes are anonymous, privacy disclosure
canbe prevented. In addition, an Entropybasedanonymous data detectionmodel wasproposed
to measure how important each attribute and their overall relationships were. Based on these
relationships and their importance, each attribute was assigned a weight factor to identify its
7
positionin this anonymous dataset. Furthermore, a social aware K-core (S-kcore)algorithm
was designedto combine these generatedweight factors to detect the keynode. Although this
key node may not be physically locatedin the neighbor area of the source node, the S-kcore
algorithm was based on social attributes and their associatedweight factor where it is not be
affectedby the physical movement of nodes. Another advantage of the proposedmodel is the
unicast forwarding model. As the network topology of human associated delay tolerant
networks is unpredictable, the concurrent most popular node is selectedby using the S-kcore
algorithm to conduct unicast forwarding to reduce those duplicated copies.
Typical applications of DTN techniques stratify four aspects: digital communication
forruralareas, personal/wildlifecommunications,battlefieldcommunications,disasterrescues
and environmental monitoring communications.
When it comes to rural areas, many prototypes were designed and applied to provide
connectionto the biggest number of users. Such prototypes are calledDakNet, TrainNet and
KioskNet, and they share the same basic principles of sharing facilities to provide
communication for the users. DakNet, for example, provides an asynchronous digital
connectionon the infrastructure of ad hoc networks. DakNet uses existing communications
and transport infrastructure to form a DTN, where it combines physical transportationwith a
wireless data transferal functionto extendInternet connectivityto acentral hub, such as a post
office. It transmits data over short point-to-point links between kiosks and portable storage
devices called mobile access points (MAPs). The point-to-point data transfers use high
bandwidth with low-cost WiFi radio transceivers. The same concept is applied to TrainNet,
using the already working trains in any location, and to KioskNet, using the available kiosks
in smaller cities to provide public networks.
Other applications for this network are personal/wildlife, battlefield, disaster rescues
and environmental monitoringcommunications and they all have the same fundamentals for
their DTNs. Free space optical communications (FSOC) is used in these kinds of missions,
where bandwidth and communicationsignals might be affectedbythe geographical area: lack
of infrastructure, uncovered zone… DTN serves efficientlyas it helps to move information
closer to its destination on each of the transactions by considering the topology control
8
requirement from FSOC. Therefore, units communicate internallywithno significant noise or
interruptions throughinterconnect devices, and a mobile router connectedto the base through
FSOC is available to communicate with the base to gather additional information, when
necessary. Delay tolerant networks are very useful in these kinds of mission as the main
problem any team could face in these uncovered places is the lack of connection, which the
DTN solves efficiently.
Finally, one of the most important application is space communication. Using DTN,
the communication between devices on different planets is provided by the space base.
Connectedto earth, to provide internet, and the remaining hosts, this DTN provide the basic
elements to exchange data and keep the connection going without using the necessity of
internet.
9
IV. Conclusion
To conclude, delay tolerant networks are the best solutionfor very complexnetworks,
due togeographical orinfrastructureproblems.Basedonthestoreandforwardtechnique,these
networks offer high bandwidth with low cost despite the unavailability of connectionat many
times. DTNs use the available basic resources to spread the network for the users in the
location, with DakNet and TrainNet as examples. In addition, privacy in public areas is
protectedusinganonymous addresses to protect the datasets of mobile routers. Finally, many
applicationsarenow being usedtoensurebasicconnectionsindifficultconditionslikeinspace
or battlefields, inadditionto future works that couldimprove these networks like Multicasting
efficiency in VDTN and Multi-Layer Survivability.
10
V. List of References
Delay Tolerant Networks, L. Gao, S. Yu & T. Luan, 2015
http://searchnetworking.techtarget.com/definition/delay-tolerant-network
https://en.wikipedia.org/wiki/Routing_in_delay-tolerant_networking
https://en.wikipedia.org/wiki/Delay-tolerant_networking

More Related Content

What's hot

Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
Shivi Shukla
 
DTN
DTNDTN
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Sharif Hossen
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
Prasanna Shanmugasundaram
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Waldir Moreira
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
Laili Aidi
 
WLAN IP and Frame
WLAN IP and FrameWLAN IP and Frame
WLAN IP and Frame
Michel Chamat
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic NetworkingNoorin Fatima
 
Multicasting in DTN Networks
Multicasting in DTN Networks Multicasting in DTN Networks
Multicasting in DTN Networks
Nagendra Posani
 
Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant Networks
Anubhav Mahajan
 
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Dr. Mazlan Abbas
 
Project
Project Project
Project
J M
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
IJSRD
 
Always Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsAlways Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of Things
Daniel Austin
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Nasir Bhutta
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)
University of Science & Technology, Beijing
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant Network
Phearin Sok
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Publishing House
 
Peer To Peer Protocols
Peer To Peer ProtocolsPeer To Peer Protocols
Peer To Peer Protocolsanishgoel
 

What's hot (20)

Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
 
DTN
DTNDTN
DTN
 
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
WLAN IP and Frame
WLAN IP and FrameWLAN IP and Frame
WLAN IP and Frame
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic Networking
 
Multicasting in DTN Networks
Multicasting in DTN Networks Multicasting in DTN Networks
Multicasting in DTN Networks
 
Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant Networks
 
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
 
Project
Project Project
Project
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
 
Always Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsAlways Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of Things
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)
 
DPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant NetworkDPRoPHET in Delay Tolerant Network
DPRoPHET in Delay Tolerant Network
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Peer To Peer Protocols
Peer To Peer ProtocolsPeer To Peer Protocols
Peer To Peer Protocols
 

Viewers also liked

Seminar report
Seminar reportSeminar report
Seminar report
Koshy Geoji
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
Georgekutty Francis
 
Organisational Structural Change in Vodafone
Organisational Structural Change in VodafoneOrganisational Structural Change in Vodafone
Organisational Structural Change in VodafoneJoydeep Barman
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural networkSumeet Kakani
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
IAEME Publication
 
Organizational structure ppt
Organizational structure pptOrganizational structure ppt
Organizational structure ppt
vibhugorintla
 

Viewers also liked (6)

Seminar report
Seminar reportSeminar report
Seminar report
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Organisational Structural Change in Vodafone
Organisational Structural Change in VodafoneOrganisational Structural Change in Vodafone
Organisational Structural Change in Vodafone
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
 
Organizational structure ppt
Organizational structure pptOrganizational structure ppt
Organizational structure ppt
 

Similar to Delay Tolerant Network

A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
inventionjournals
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant Networks
IJERA Editor
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
DistributeddatabasesforchallengednetVinoth Chandar
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme via
Iaetsd Iaetsd
 
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
IJCNCJournal
 
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGYHOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
cscpconf
 
How to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodologyHow to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodology
csandit
 
A02120201010
A02120201010A02120201010
A02120201010
theijes
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN) International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)
ijwmn
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
IRJET Journal
 
1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main
Rizky Andawasatya
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
ranjith kumar
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
ranjith kumar
 
Delay Tolerant Networking routing as a Game Theory problem – An Overview
Delay Tolerant Networking routing as a Game Theory problem – An OverviewDelay Tolerant Networking routing as a Game Theory problem – An Overview
Delay Tolerant Networking routing as a Game Theory problem – An Overview
CSCJournals
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...
Pvrtechnologies Nellore
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
ijasuc
 
Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...
jake henry
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
ijasuc
 
Ijciet 08 02_002
Ijciet 08 02_002Ijciet 08 02_002
Ijciet 08 02_002
IAEME Publication
 

Similar to Delay Tolerant Network (20)

A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant Networks
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
Distributeddatabasesforchallengednet
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme via
 
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
 
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGYHOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
 
How to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodologyHow to detect middleboxes guidelines on a methodology
How to detect middleboxes guidelines on a methodology
 
A02120201010
A02120201010A02120201010
A02120201010
 
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN) International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Wireless & Mobile Networks (IJWMN)
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main
 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Delay Tolerant Networking routing as a Game Theory problem – An Overview
Delay Tolerant Networking routing as a Game Theory problem – An OverviewDelay Tolerant Networking routing as a Game Theory problem – An Overview
Delay Tolerant Networking routing as a Game Theory problem – An Overview
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
 
Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
 
Ijciet 08 02_002
Ijciet 08 02_002Ijciet 08 02_002
Ijciet 08 02_002
 

Recently uploaded

The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 

Recently uploaded (20)

The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 

Delay Tolerant Network

  • 1. NOTRE DAME UNIVERSITY Faculty of Science Computer Science Department Data Communication and Computer Networks Formal Report Delay Tolerant Network - DTN Submitted by: Michel Chamat Michel Azzi
  • 2. 2 Table Of Content Abstract ………………………………………………………………………………………….. 3 Introduction and Problem Definition ……………………………………………………………. 4 Background Documented Research ……………………………………………………………... 5 Conclusion ………………………………………………………………………………………. 9 List of Reference ………………. ……………………………………………………………….10
  • 3. 3 I. Abstract This research is based on the Delay Tolerant Network. Main aspects and characteristics of DTN are subject of this report, taking into considerationthe technical problems this network may encounter while applying them in real life. The report contains a documented research about the actual applications that can be applied, data forwarding process and privacy protectionforusers inthis kind of network. Furthermore,future possible worksinthis domain, in addition to possible applications, are included to encourage the research in this subject.
  • 4. 4 II. Introduction and Problem Definition Delay Tolerant Network, based on network architecture, is made to ensure continuous network connectivity between heterogeneous networks operating on different transmission media. Also, thecommunicationdoesn’tonlydepend ontheInternet.Such network isdesigned to operate effectivelyover extreme distances, as those encounteredinspace communications. In this environment, long latency is inevitable. However, similar problems canalso occur over small distances, where interference is high or network resources are overloaded. When it comes to application, Delay Tolerant Network has many problems which directly affects the efficiency of the network, especially with the involvement of human interaction. It features long latency and unstable network topology, where delay is enormous and routing paths may not exist. Traditional routing protocols for mobile networks are thereforeunsuitableforDTNs. In addition, the networkusesstoreand forwardtechniqueswith no fixed connectionavailable between the users, allowing the increase in transmissiondelay. Finally, privacy of real social life may be subject to potential attacks as data is being forward in public places through public devices. Despite these problems, DTN is the solutionfor challenging networks, such as space communicationand military operations, as its characteristics are perfect match in these kind of networks.
  • 5. 5 III. Background Documented Research Most routing protocols for traditional networks need to set up a complete end-to-end route, with at least one available end-to-endpath between the source and destination, before packet transferring in the traditional mobile network. It is assumed that in DTNs, any link between two nodes is duplex and the latency of the network is not an issue. Therefore, the DTN doesn’tneedto setupthe paths forcommunications.Regardlessbeingoneofits problem, the Delay Tolerant Network can be very useful in very complex networks, such as space communication. Hereafter, data processing, privacy protection in addition to the applications of the DTN are to be discussed. Concerning data forwarding, DTN typically uses store and forward technique: if no connection is available at a particular time in this technique, the source node storesandcarries the message until the next available node is encountered andform a candidature set. Although this technique is being applied, the comparisonand selectionof the most suitable forwarding targets are topics for more advanced researches in DTN. On the other hand, when mobile devices in DTN are associatedwithhuman beings, such as a Bluetoothenabledmobile phone, they demonstrate certain social aspects associated with human-to-human communications. More specifically, the human’s social behavior has a big role in these kinds of delay tolerant networks. Also, the locationwhere a DTN is locatedmight have severe consequences onthe efficiency comparedto humaninteraction, as geographic topologyinaDTN is unstable, while socialcharacteristics ofmobilenodesarerelativelystableforafixedperiodoftime.Therefore, the influence of human contribution can be very supportive and more important than geographic informationin routing. The main problem with human interactions is that social activities are limitedto specific hours, and therefore the data forwarding in such DTN will be very time-dependent. For example, after midnight, the communication will barely exist and the communicationwillbe very slowtounavailable, while inthe middle ofthe day it will reach its peak. Moreover, a faster way for forwarding data in DTN is by using vehicles. Vehicular DTN (VDTN) has many advantages as it expands connectivity, despite any lack of infrastructure. It also simplifies the networkarchitecture by settingmobile routers, stationary
  • 6. 6 nodes and relaynodes placedat intersections, for example. Whenit comes to dataforwarding, time varying social contact topology model is proposed to combine social attributes, time patterns and geographic information. This model analyses the social similarityof nodes along with the geographic information bounded with time factors to generate an overall delivery probabilityforeachnode to the destination.Basedonthisdeliveryprobability, a multicastdata forwarding algorithm is deployed to efficiently deliver packets. To apply the store and forwardtechnique in the delay tolerant network, routing implies and concerns itself with the ability to deliver data from a source to a destination which is essential in any network. Despite DTN’s lack of connectivity and instantaneous end-to-end paths, data is incrementally moved and stored throughout the network in hopes that it will eventually reach its destination when the correct nodes are found. Epidemic router is the technicusedto increasetheprobabilityofa packet being successfullytransferredistoreplicate many copies of the packet in hopes that one will reaches its correct destination. As thedata forwarding issuebecomesincreasinglyimportantinhuman involved DTNs, lots of researchers use real social trace files to study the characteristics of mobile nodes. However, thesedatasetsaresensitive,with potentialattacksusing the providedsocialattributes to retrieve the subject identification, and thereforethe publisher may not want to release these datasets. Privacy protectionis important for researchers andin most cases, researchers use the data anonymous method to pre-processdata identifiers and attributes to make sure attackers do not disclosethe dataset withthe released data. K-anonymityand Generalizations.These are typical anonymous methods, which decrease the data utilityto protect attribute semanticsand thereforeprevent the privacy disclosure issue. Attribute semantics shouldbe reservedinsome scenarios, such as data mining or information retrieval. However, it is not necessary in a scenario of DTNs. As the informationrequiredfor the routing decisionmaking process is the corresponding relationships amongattributes, the attributes themselves canbe anonymized. If both node’s identification and their associated attributes are anonymous, privacy disclosure canbe prevented. In addition, an Entropybasedanonymous data detectionmodel wasproposed to measure how important each attribute and their overall relationships were. Based on these relationships and their importance, each attribute was assigned a weight factor to identify its
  • 7. 7 positionin this anonymous dataset. Furthermore, a social aware K-core (S-kcore)algorithm was designedto combine these generatedweight factors to detect the keynode. Although this key node may not be physically locatedin the neighbor area of the source node, the S-kcore algorithm was based on social attributes and their associatedweight factor where it is not be affectedby the physical movement of nodes. Another advantage of the proposedmodel is the unicast forwarding model. As the network topology of human associated delay tolerant networks is unpredictable, the concurrent most popular node is selectedby using the S-kcore algorithm to conduct unicast forwarding to reduce those duplicated copies. Typical applications of DTN techniques stratify four aspects: digital communication forruralareas, personal/wildlifecommunications,battlefieldcommunications,disasterrescues and environmental monitoring communications. When it comes to rural areas, many prototypes were designed and applied to provide connectionto the biggest number of users. Such prototypes are calledDakNet, TrainNet and KioskNet, and they share the same basic principles of sharing facilities to provide communication for the users. DakNet, for example, provides an asynchronous digital connectionon the infrastructure of ad hoc networks. DakNet uses existing communications and transport infrastructure to form a DTN, where it combines physical transportationwith a wireless data transferal functionto extendInternet connectivityto acentral hub, such as a post office. It transmits data over short point-to-point links between kiosks and portable storage devices called mobile access points (MAPs). The point-to-point data transfers use high bandwidth with low-cost WiFi radio transceivers. The same concept is applied to TrainNet, using the already working trains in any location, and to KioskNet, using the available kiosks in smaller cities to provide public networks. Other applications for this network are personal/wildlife, battlefield, disaster rescues and environmental monitoringcommunications and they all have the same fundamentals for their DTNs. Free space optical communications (FSOC) is used in these kinds of missions, where bandwidth and communicationsignals might be affectedbythe geographical area: lack of infrastructure, uncovered zone… DTN serves efficientlyas it helps to move information closer to its destination on each of the transactions by considering the topology control
  • 8. 8 requirement from FSOC. Therefore, units communicate internallywithno significant noise or interruptions throughinterconnect devices, and a mobile router connectedto the base through FSOC is available to communicate with the base to gather additional information, when necessary. Delay tolerant networks are very useful in these kinds of mission as the main problem any team could face in these uncovered places is the lack of connection, which the DTN solves efficiently. Finally, one of the most important application is space communication. Using DTN, the communication between devices on different planets is provided by the space base. Connectedto earth, to provide internet, and the remaining hosts, this DTN provide the basic elements to exchange data and keep the connection going without using the necessity of internet.
  • 9. 9 IV. Conclusion To conclude, delay tolerant networks are the best solutionfor very complexnetworks, due togeographical orinfrastructureproblems.Basedonthestoreandforwardtechnique,these networks offer high bandwidth with low cost despite the unavailability of connectionat many times. DTNs use the available basic resources to spread the network for the users in the location, with DakNet and TrainNet as examples. In addition, privacy in public areas is protectedusinganonymous addresses to protect the datasets of mobile routers. Finally, many applicationsarenow being usedtoensurebasicconnectionsindifficultconditionslikeinspace or battlefields, inadditionto future works that couldimprove these networks like Multicasting efficiency in VDTN and Multi-Layer Survivability.
  • 10. 10 V. List of References Delay Tolerant Networks, L. Gao, S. Yu & T. Luan, 2015 http://searchnetworking.techtarget.com/definition/delay-tolerant-network https://en.wikipedia.org/wiki/Routing_in_delay-tolerant_networking https://en.wikipedia.org/wiki/Delay-tolerant_networking