SlideShare a Scribd company logo
1 of 33






Delay tolerant networks are the Networks
which has lack of continuous connectivity.
So,there will be more Delay.Even Delay’s of
several days is inevitable in this network.
DTN’s are also called as Intermittently
connected Mobile Networks.


Encounter Schedule



Network Capacity



Storage



Energy








Encounter schedule is the term used to denote hoe
the nodes in the network is contacted by the other
(or) how the nodes in the network contact each
other.
The challenge here is that the source node may or
may not encounter the destination node.
In case of periodic mobility of the nodes, even if
the encounter schedules are known to some
extent, there may be some chaos.
In the extreme case of mobility, it leads to memory
less encounter schedules (i.e) no assumptions can
be made about the node contact pattern.




In general, the duration of the encounter and
the link Bandwidth dictates the amount o data
that can be transferred among the nodes.
Another factor is that the contention of
multiple nodes that tries to send the data to the
same destination node at a given encounter.







During an encounter, The node may decide to
exchange the entire data, which is not possible
in the storage-constrained node.
Hence there may be a loss in data.
To overcome this, intelligent routines to avoid
the copies of same data and to delete the stale
copies of the data are used.
In an heterogeneous node capacity n/w ’s
better delivery strategy has to be applied for
efficient data delivery.






Transmission ,reception and computation of
data incurs power.
In certain scenarios like battery operated
wireless networks ,the residual energy in the
source and destination has to be taken into
consideration before starting the data transfer.
Data delivery mechanisms should also take
this into account and should adapt the wide
range of scenarios.









EPIDEMIC ROUING SCHEMES
DIRECT CONTACT SCHEMES
ONE HOP RELAY SCHEMES
ROUTING BASED ON KNOWLEDGE
ORACLES
LOCATION BASED SCHEMES
GRADIENT BASED SCHEMES
CONTROLLED RELICATION SCHEMES








Whenever two nodes contact each other,they
will exchange all the data they have currently
with them irrespective of the source and
destination.
At the end of the encounter, both will have the
same set of data with them.
Eventually, data will be flooded in the
network.
Data transfer will take place even after the
data reaches the destination node.
(contd…)













in 2001 epidemic scheme was modified by
DAVIS with DROPPING POLICIES.
Here,size of the buffer is resricted according to
the dropping policies.
The dropping stratagies are
Drop Random (DRA)
Drop Least Recently Ussed(DLR)
Drop Oldest (DOA)
In all the above strategies, DLE and DOA
yields best results.
In 2005, Time TO Live (TTL) was inroduced to
avoid flooding.






This has no bandwidth or Energy/ Power
constraints.
This doesn’t care about the source and
destination nodes.
No extra computations must be made on
Routing processes.






As it doesn’t care about the source and the
destination, data is FLODDED throghout the
network.
Stales copies will be present in each and every
node in the network.
Data will be transferred even when the data
has already reached the destination.
This is the simple scheme which delivers the data
to the destination when the source encounters the
destination node.
 This doesn’t require any additional resources.
MERITS:
No additional resoureces are required as a result no
additional engery and power is neede.
DEMERITS:
Delivery delay can be extremely large as the source
may or may not encounter the destination node.











In this scheme ,source delivers the packet to an
intermediate node, which in turn delivers it to the
destination.
Compared with the previous direct contact scheme,it
only creates an additional copy of the data.
The mobility of the relay node may be controlled or
random.
Intermediate mobile nodes that follow a random walk
mobility model are used to carry data from static
sensors to base-stations.
The individual sensor nodes transfer their data to the
intermediate node when it comes in radio range and
the collected data is in turn delivered to the sinks.




The data transfer capacity is based on the
mobility pattern that the intermediate node
follows .
Another dependency is on the buffer that the
intermediate mobile node has (i.e) it marks the
capacity of the data that an intermediate
mobile node can carry to the sink node.
DTN is modelled as a directed multistage
graph with time-varying edge costs, based on
propagation delay and edge capacity.
 The various knowledge oracles considered
provide information about the following
>all future contacts of nodes such as time of
contact, duration of contact, bandwidth available
for information exchange during contact.


(contd.)










The future traffic-demand of the nodes.
The instantaneous queue sizes at each node.
Using information from one or more
oracles, various algorithms have been designed to
route the data.
A linear programming formulation that uses all
the oracles to determine the optimal routing for
minimizing average delay in the network.
As algorithms are fed more knowledge from the
oracles, they provide better performance.
They introduce the concept of per-contact routing
where nodes frequently recompute their routing
table, similar to a traditional link-state routing
protocol, whenever contact is made with another
node.
(contd.)
This routing info.then redistributed through
the network using an epidemic routing like
protocol thereby allowing other n odes to k ow
about the neighbors route.
DEPENDENCIES:
>This scheme basically depends only on the
algorithm we use to calculate best route and the
type of knowledge oracles we use.







In certain scenarios, the nodes may be aware of
their location which can be used for opportunistic
forwarding in DTNs.
The location information may be known in either
a physical (for example, from GPS) or a virtual
coordinate space (designed to represent network
topology taking obstacles into account).
On an encounter, a node forwards data to another
node only if it is closer to the destination. Hence,
location-based routing is a form of greedy,
geographical-based routing .










This minimal information is enough to perform
routing and deliver data to the destinations.
Hence, they avoid the need to maintain any routing
tables or exchange any additional control information
between the nodes.
The MoVe scheme (LeBrun et al. (2005)) employs
information about the motion vectors of the mobile
nodes in addition to the location information.
With, the location and relative node velocity
information, the scheme calculates the closest distance
of a mobile node to get to the destination when
following its current movement.
So a node only forwards to a neighbor if the neighbor
is predicted to be moving toward the destination and
getting closer to the destination than itself.
(contd…)
Routing is done by forwarding messages
toward nodes that have mobility patterns that
are more similar to the mobility pattern of the
destination.
LIMITATIONS:
> These schemes have a well-known limitation
where they suffer from a local minima
phenomenon (i.e) the nodes can be tracked only
within a specific zone.
> This scheme can bring benefits in terms of
enhanced message delivery and reduced
communication costs.







In gradient-based routing, the message follows
a gradient of improving utility functions
toward the destination thereby delivering the
packet with a low delay and using minimal
system resources
The idea is that each node is associated with a
metric that represents its delivery predictability
for a given destination.
When a node carrying a message encounters
another node with a better metric to the
destination, it passes the message to it.








The metrics are positively updated based on
recent node encounters and metrics for
sparsely encountered nodes are appropriately
aged.
The connectivity information is exchanged
periodically among the nodes thereby allowing
nodes to maintain meaningful metrics.
As nodes run out of memory, the eviction
candidate is selected based on intelligent
eviction strategies.
The Shortest Expected Path Routing (SEPR) is
another scheme based on the link probability
calculated from the history of node encounters.
(contd.)






Each message in a nodes cache is assigned an
effective path length (EPL) based on the link
probabilities along the shortest path to the
destination.
When two nodes meet, they first exchange the
link probability table and employ Dijkstra
algorithm to get expected path length to all
other nodes in the network.
This algorithm is similar to a traditional link
state routing protocol.Nodes update their local
tables on an encounter and in this way
connectivity information is maintained in the
network in a distributed manner.
(contd.)








Gradient-based routing schemes suffer from a
slow-start phase. Sufficient number of encounters
must happen before the nodes develop meaningful
metrics for each destination.
In addition, this information needs to be
propagated through the network.
solution to address this shortcoming is the Seek
and Focus scheme. This scheme initially forwards
the message picking a neighbor at random until
the metric utility value reaches a certain threshold.
Thereafter a gradient-based approach may be
employed to deliver the message to the
destination.
This has two variants
>SPRAY AND WAIT
>SPRAY AND FOCUS
 SPRAY AND WAIT:
> The idea is that it reduces the number of copies of
a given message, and hence the number of
transmissions for a given message, to a fixed value L
that can be tuned in accordance with the delivery
delay requirement.
(contd.)







The scheme ‘sprays’ a number of copies of a
message into the network to L distinct relays
and then ‘waits’ till one of these relays meets
the destination.
A number of heuristics are presented about
how the L copies are sprayed, for example, the
source is responsible for spraying all L copies
or more optimally.
Each progressive node encountered by a
source or relay is handed over the
responsibility to distribute half of the
remaining copies.
This scheme requires no knowledge of the
mobility of the nodes.
 This delay is independent of the size of the
network and only depends on the number of
nodes.
 The scheme is shown to posses robust
scalability as the node density goes up.
SPRAY AND WAIT:

Spray and Focus provides further
improvements by taking advantage of the
mobility information in the wait-phase.



The idea is that once the spray phase is
over, each relay can then forward the packet
further using a single-copy utility based
scheme instead of naively waiting to meet the
destination.
DoS Attacks







In these attacks, makes the network resurce
unavailable by sending bulk requests to the target
so that it cannot respond to the legitimate traffic.
In DTN’s latencies are larger while forwarding.
So,attackers have ample amount of time to access
the network and create possibility of Dos and
makes the resource unavailable.
Two types of DoS is
(i) consumes scarce resource
(ii) Bundle Flooding
BLACK HOLE RISKS:
 here the malicious node is called as the black
node because it drops the incoming packets.
GREY HOLE ATTACKS:
 it is same as the black hole attack .The
difference is that the valid node in a network
changes to a blackhole node.
WORMHOLE ATTACKS:
 Here a malicious node records the packets and
forwards it to the other connive nodes.
SYBIL RISKS:
 This is the risk where a node creates
pseudonyms to enter into a network for
spoofing and the probability of occurrence of
this kind of attack is high.
CONFIDNETIALITY RISKS:
 These are the attacks which targets the
confidential bundles in the network.

More Related Content

What's hot

Multicasting in DTN Networks
Multicasting in DTN Networks Multicasting in DTN Networks
Multicasting in DTN Networks Nagendra Posani
 
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Dr. Mazlan Abbas
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - JournalLaili Aidi
 
Delay tolerant networking
Delay tolerant networkingDelay tolerant networking
Delay tolerant networkingApoorva Hebbar
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Waldir Moreira
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksIJTET Journal
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Publishing House
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Journals
 
Z02417321735
Z02417321735Z02417321735
Z02417321735IJMER
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocolssourabhshivtiwari
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...ijasuc
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...ijasuc
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic NetworksAuwal Amshi
 
Packet switching
Packet switchingPacket switching
Packet switchingVikash Dhal
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...ijasuc
 

What's hot (20)

Multicasting in DTN Networks
Multicasting in DTN Networks Multicasting in DTN Networks
Multicasting in DTN Networks
 
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
 
DTN
DTNDTN
DTN
 
Delay tolerant networking
Delay tolerant networkingDelay tolerant networking
Delay tolerant networking
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
 
ICICCE0367
ICICCE0367ICICCE0367
ICICCE0367
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocols
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
 
Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
E42062126
E42062126E42062126
E42062126
 
Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)Network Coding in Disruption Tolerant Network (DTN)
Network Coding in Disruption Tolerant Network (DTN)
 
Packet switching
Packet switchingPacket switching
Packet switching
 
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...
 

Viewers also liked

UMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architectureUMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architecturePaulo Milheiro Mendes
 
Dynamic trust management for delay tolerant networks and its application to s...
Dynamic trust management for delay tolerant networks and its application to s...Dynamic trust management for delay tolerant networks and its application to s...
Dynamic trust management for delay tolerant networks and its application to s...Papitha Velumani
 
Condroid WSN/DTN Gateway - User Manual & Installation Guide
Condroid WSN/DTN Gateway - User Manual & Installation GuideCondroid WSN/DTN Gateway - User Manual & Installation Guide
Condroid WSN/DTN Gateway - User Manual & Installation GuideLaili Aidi
 
Abhishek presentation october 2013
Abhishek presentation october 2013Abhishek presentation october 2013
Abhishek presentation october 2013Pratik Narang
 
Dynamic Compression Transmission for Energy Harvesting Networks
Dynamic Compression Transmission for Energy Harvesting NetworksDynamic Compression Transmission for Energy Harvesting Networks
Dynamic Compression Transmission for Energy Harvesting NetworksCristiano Tapparello
 
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...acignoni
 
Always Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsAlways Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsDaniel Austin
 
How Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN RoutingHow Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN RoutingWaldir Moreira
 
dLife: Opportunistic Routing based on Users Daily Life Routine
dLife: Opportunistic Routing based on Users Daily Life RoutinedLife: Opportunistic Routing based on Users Daily Life Routine
dLife: Opportunistic Routing based on Users Daily Life RoutineWaldir Moreira
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networkssashar86
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic NetworkingNoorin Fatima
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Dr. Mazlan Abbas
 
An IOT gateway Architecture using an MQTT bundle transport & LTP Convergence ...
An IOT gateway Architecture using an MQTT bundle transport & LTP Convergence ...An IOT gateway Architecture using an MQTT bundle transport & LTP Convergence ...
An IOT gateway Architecture using an MQTT bundle transport & LTP Convergence ...Alex Kritikos
 
A Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsA Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsabhijit parmar
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - PresentationLaili Aidi
 
Dynamic trust management for delay tolerant networks and its application to s...
Dynamic trust management for delay tolerant networks and its application to s...Dynamic trust management for delay tolerant networks and its application to s...
Dynamic trust management for delay tolerant networks and its application to s...LeMeniz Infotech
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 

Viewers also liked (20)

UMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architectureUMOBILE: Universal, mobile-centric and opportunistic communications architecture
UMOBILE: Universal, mobile-centric and opportunistic communications architecture
 
Dynamic trust management for delay tolerant networks and its application to s...
Dynamic trust management for delay tolerant networks and its application to s...Dynamic trust management for delay tolerant networks and its application to s...
Dynamic trust management for delay tolerant networks and its application to s...
 
Condroid WSN/DTN Gateway - User Manual & Installation Guide
Condroid WSN/DTN Gateway - User Manual & Installation GuideCondroid WSN/DTN Gateway - User Manual & Installation Guide
Condroid WSN/DTN Gateway - User Manual & Installation Guide
 
Abhishek presentation october 2013
Abhishek presentation october 2013Abhishek presentation october 2013
Abhishek presentation october 2013
 
Dynamic Compression Transmission for Energy Harvesting Networks
Dynamic Compression Transmission for Energy Harvesting NetworksDynamic Compression Transmission for Energy Harvesting Networks
Dynamic Compression Transmission for Energy Harvesting Networks
 
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
Evaluation of Delay/Disruptive Tolerant Network Solutions in Networks under I...
 
Always Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of ThingsAlways Offline: Delay-Tolerant Networking for the Internet of Things
Always Offline: Delay-Tolerant Networking for the Internet of Things
 
How Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN RoutingHow Important Social Graphs are for DTN Routing
How Important Social Graphs are for DTN Routing
 
dLife: Opportunistic Routing based on Users Daily Life Routine
dLife: Opportunistic Routing based on Users Daily Life RoutinedLife: Opportunistic Routing based on Users Daily Life Routine
dLife: Opportunistic Routing based on Users Daily Life Routine
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic Networking
 
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
Trends and Challenges in Delay Tolerant Network (DTN) or Mobile Opportunistic...
 
An IOT gateway Architecture using an MQTT bundle transport & LTP Convergence ...
An IOT gateway Architecture using an MQTT bundle transport & LTP Convergence ...An IOT gateway Architecture using an MQTT bundle transport & LTP Convergence ...
An IOT gateway Architecture using an MQTT bundle transport & LTP Convergence ...
 
A Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETsA Survey of Various Efficient and Secure Routing Protocols for VANETs
A Survey of Various Efficient and Secure Routing Protocols for VANETs
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
Dynamic trust management for delay tolerant networks and its application to s...
Dynamic trust management for delay tolerant networks and its application to s...Dynamic trust management for delay tolerant networks and its application to s...
Dynamic trust management for delay tolerant networks and its application to s...
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Wsn
WsnWsn
Wsn
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 

Similar to ROUTING STRATEGIES IN DTN

Improving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingImproving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingijitjournal
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AKARTHIKEYAN V
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkJamia Hamdard
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
 

Similar to ROUTING STRATEGIES IN DTN (20)

Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Improving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingImproving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routing
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
D0441722
D0441722D0441722
D0441722
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
An Insight on Routing
An Insight on RoutingAn Insight on Routing
An Insight on Routing
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
 
Fa25939942
Fa25939942Fa25939942
Fa25939942
 
Gpsr2
Gpsr2Gpsr2
Gpsr2
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

ROUTING STRATEGIES IN DTN

  • 1.
  • 2.    Delay tolerant networks are the Networks which has lack of continuous connectivity. So,there will be more Delay.Even Delay’s of several days is inevitable in this network. DTN’s are also called as Intermittently connected Mobile Networks.
  • 4.     Encounter schedule is the term used to denote hoe the nodes in the network is contacted by the other (or) how the nodes in the network contact each other. The challenge here is that the source node may or may not encounter the destination node. In case of periodic mobility of the nodes, even if the encounter schedules are known to some extent, there may be some chaos. In the extreme case of mobility, it leads to memory less encounter schedules (i.e) no assumptions can be made about the node contact pattern.
  • 5.   In general, the duration of the encounter and the link Bandwidth dictates the amount o data that can be transferred among the nodes. Another factor is that the contention of multiple nodes that tries to send the data to the same destination node at a given encounter.
  • 6.     During an encounter, The node may decide to exchange the entire data, which is not possible in the storage-constrained node. Hence there may be a loss in data. To overcome this, intelligent routines to avoid the copies of same data and to delete the stale copies of the data are used. In an heterogeneous node capacity n/w ’s better delivery strategy has to be applied for efficient data delivery.
  • 7.    Transmission ,reception and computation of data incurs power. In certain scenarios like battery operated wireless networks ,the residual energy in the source and destination has to be taken into consideration before starting the data transfer. Data delivery mechanisms should also take this into account and should adapt the wide range of scenarios.
  • 8.        EPIDEMIC ROUING SCHEMES DIRECT CONTACT SCHEMES ONE HOP RELAY SCHEMES ROUTING BASED ON KNOWLEDGE ORACLES LOCATION BASED SCHEMES GRADIENT BASED SCHEMES CONTROLLED RELICATION SCHEMES
  • 9.     Whenever two nodes contact each other,they will exchange all the data they have currently with them irrespective of the source and destination. At the end of the encounter, both will have the same set of data with them. Eventually, data will be flooded in the network. Data transfer will take place even after the data reaches the destination node. (contd…)
  • 10.         in 2001 epidemic scheme was modified by DAVIS with DROPPING POLICIES. Here,size of the buffer is resricted according to the dropping policies. The dropping stratagies are Drop Random (DRA) Drop Least Recently Ussed(DLR) Drop Oldest (DOA) In all the above strategies, DLE and DOA yields best results. In 2005, Time TO Live (TTL) was inroduced to avoid flooding.
  • 11.    This has no bandwidth or Energy/ Power constraints. This doesn’t care about the source and destination nodes. No extra computations must be made on Routing processes.
  • 12.    As it doesn’t care about the source and the destination, data is FLODDED throghout the network. Stales copies will be present in each and every node in the network. Data will be transferred even when the data has already reached the destination.
  • 13. This is the simple scheme which delivers the data to the destination when the source encounters the destination node.  This doesn’t require any additional resources. MERITS: No additional resoureces are required as a result no additional engery and power is neede. DEMERITS: Delivery delay can be extremely large as the source may or may not encounter the destination node. 
  • 14.      In this scheme ,source delivers the packet to an intermediate node, which in turn delivers it to the destination. Compared with the previous direct contact scheme,it only creates an additional copy of the data. The mobility of the relay node may be controlled or random. Intermediate mobile nodes that follow a random walk mobility model are used to carry data from static sensors to base-stations. The individual sensor nodes transfer their data to the intermediate node when it comes in radio range and the collected data is in turn delivered to the sinks.
  • 15.   The data transfer capacity is based on the mobility pattern that the intermediate node follows . Another dependency is on the buffer that the intermediate mobile node has (i.e) it marks the capacity of the data that an intermediate mobile node can carry to the sink node.
  • 16. DTN is modelled as a directed multistage graph with time-varying edge costs, based on propagation delay and edge capacity.  The various knowledge oracles considered provide information about the following >all future contacts of nodes such as time of contact, duration of contact, bandwidth available for information exchange during contact.  (contd.)
  • 17.       The future traffic-demand of the nodes. The instantaneous queue sizes at each node. Using information from one or more oracles, various algorithms have been designed to route the data. A linear programming formulation that uses all the oracles to determine the optimal routing for minimizing average delay in the network. As algorithms are fed more knowledge from the oracles, they provide better performance. They introduce the concept of per-contact routing where nodes frequently recompute their routing table, similar to a traditional link-state routing protocol, whenever contact is made with another node. (contd.)
  • 18. This routing info.then redistributed through the network using an epidemic routing like protocol thereby allowing other n odes to k ow about the neighbors route. DEPENDENCIES: >This scheme basically depends only on the algorithm we use to calculate best route and the type of knowledge oracles we use. 
  • 19.    In certain scenarios, the nodes may be aware of their location which can be used for opportunistic forwarding in DTNs. The location information may be known in either a physical (for example, from GPS) or a virtual coordinate space (designed to represent network topology taking obstacles into account). On an encounter, a node forwards data to another node only if it is closer to the destination. Hence, location-based routing is a form of greedy, geographical-based routing .
  • 20.      This minimal information is enough to perform routing and deliver data to the destinations. Hence, they avoid the need to maintain any routing tables or exchange any additional control information between the nodes. The MoVe scheme (LeBrun et al. (2005)) employs information about the motion vectors of the mobile nodes in addition to the location information. With, the location and relative node velocity information, the scheme calculates the closest distance of a mobile node to get to the destination when following its current movement. So a node only forwards to a neighbor if the neighbor is predicted to be moving toward the destination and getting closer to the destination than itself. (contd…)
  • 21. Routing is done by forwarding messages toward nodes that have mobility patterns that are more similar to the mobility pattern of the destination. LIMITATIONS: > These schemes have a well-known limitation where they suffer from a local minima phenomenon (i.e) the nodes can be tracked only within a specific zone. > This scheme can bring benefits in terms of enhanced message delivery and reduced communication costs. 
  • 22.    In gradient-based routing, the message follows a gradient of improving utility functions toward the destination thereby delivering the packet with a low delay and using minimal system resources The idea is that each node is associated with a metric that represents its delivery predictability for a given destination. When a node carrying a message encounters another node with a better metric to the destination, it passes the message to it.
  • 23.     The metrics are positively updated based on recent node encounters and metrics for sparsely encountered nodes are appropriately aged. The connectivity information is exchanged periodically among the nodes thereby allowing nodes to maintain meaningful metrics. As nodes run out of memory, the eviction candidate is selected based on intelligent eviction strategies. The Shortest Expected Path Routing (SEPR) is another scheme based on the link probability calculated from the history of node encounters. (contd.)
  • 24.    Each message in a nodes cache is assigned an effective path length (EPL) based on the link probabilities along the shortest path to the destination. When two nodes meet, they first exchange the link probability table and employ Dijkstra algorithm to get expected path length to all other nodes in the network. This algorithm is similar to a traditional link state routing protocol.Nodes update their local tables on an encounter and in this way connectivity information is maintained in the network in a distributed manner. (contd.)
  • 25.     Gradient-based routing schemes suffer from a slow-start phase. Sufficient number of encounters must happen before the nodes develop meaningful metrics for each destination. In addition, this information needs to be propagated through the network. solution to address this shortcoming is the Seek and Focus scheme. This scheme initially forwards the message picking a neighbor at random until the metric utility value reaches a certain threshold. Thereafter a gradient-based approach may be employed to deliver the message to the destination.
  • 26. This has two variants >SPRAY AND WAIT >SPRAY AND FOCUS  SPRAY AND WAIT: > The idea is that it reduces the number of copies of a given message, and hence the number of transmissions for a given message, to a fixed value L that can be tuned in accordance with the delivery delay requirement. (contd.) 
  • 27.    The scheme ‘sprays’ a number of copies of a message into the network to L distinct relays and then ‘waits’ till one of these relays meets the destination. A number of heuristics are presented about how the L copies are sprayed, for example, the source is responsible for spraying all L copies or more optimally. Each progressive node encountered by a source or relay is handed over the responsibility to distribute half of the remaining copies.
  • 28. This scheme requires no knowledge of the mobility of the nodes.  This delay is independent of the size of the network and only depends on the number of nodes.  The scheme is shown to posses robust scalability as the node density goes up. SPRAY AND WAIT:  Spray and Focus provides further improvements by taking advantage of the mobility information in the wait-phase. 
  • 29.  The idea is that once the spray phase is over, each relay can then forward the packet further using a single-copy utility based scheme instead of naively waiting to meet the destination.
  • 30.
  • 31. DoS Attacks     In these attacks, makes the network resurce unavailable by sending bulk requests to the target so that it cannot respond to the legitimate traffic. In DTN’s latencies are larger while forwarding. So,attackers have ample amount of time to access the network and create possibility of Dos and makes the resource unavailable. Two types of DoS is (i) consumes scarce resource (ii) Bundle Flooding
  • 32. BLACK HOLE RISKS:  here the malicious node is called as the black node because it drops the incoming packets. GREY HOLE ATTACKS:  it is same as the black hole attack .The difference is that the valid node in a network changes to a blackhole node. WORMHOLE ATTACKS:  Here a malicious node records the packets and forwards it to the other connive nodes.
  • 33. SYBIL RISKS:  This is the risk where a node creates pseudonyms to enter into a network for spoofing and the probability of occurrence of this kind of attack is high. CONFIDNETIALITY RISKS:  These are the attacks which targets the confidential bundles in the network.

Editor's Notes

  1. The idea is that once the spray phase is over, each relay can then forward the packet further using a single-copy utility based scheme instead of naively waiting to meet the destination. The idea is that once the spray phase is over, each relay can then forward the packet further using a single-copy utility based scheme instead of naively waiting to meet the destination.