Figure 4 - uploaded by Brian Adamson
Content may be subject to copyright.
EPLRS 1-Hop Needline Achievable Data Rate

EPLRS 1-Hop Needline Achievable Data Rate

Source publication
Conference Paper
Full-text available
We describe an approach to improving network performance in networks with heterogeneous links - for example, a communications network constructed from satellite links, airborne relays, and line-of-site radios - using disruption tolerant networking. DTN defines an overlay network that uses storage at each hop to make end-to-end communications resili...

Context in source publication

Context 1
... reliability mechanisms ensure that transmissions are not lost. Figure 4 compares the performance of a standard 4- hop needline to 1-hop needlines with three different DTN convergence layers: TCP, TCP in conjunction with a SCPS-TP Performance Enhancing Proxy [8], and NORM. Throughput was measured with the dtnperf application included in the DTNRG RI. Results are from lab experiments (solid lines) and field-exercises using real USMC equipment (dashed lines). ...

Similar publications

Conference Paper
Full-text available
This paper provides a short presentation of the Multi-purpose End-To-End Robotic Operations Network (METERON). This project aims at simulating selected future Human exploration scenarios including immersive remote control of a robot by an astronaut in orbit around a target object (such as Mars or the Moon). The remote human orbiter is simulated by...
Article
Full-text available
When there is disconnection in mobile ad hoc network under group mobility, it falls into the delay-tolerant network (DTN). However, most existing research in DTN targets entity mobility. In this paper, we consider the routing strategy for DTN with group mobility, and propose the leader based group routing (LBGR) by making full use of group structur...
Article
Full-text available
One-shot multiple object tracking (MOT), which learns object detection and identity embedding in a unified network, has attracted increasing attention due to its low complexity and high tracking speed. However, most one-shot trackers ignore that detection and re-identification (ReID) require different representations of features. The inherent diffe...
Article
Full-text available
Communications from remote areas that may be of interest is still a problem. Many innovative projects applied to remote sites face communications difficulties. The GOLDFISH project was an EU-funded project for river pollution monitoring in developing countries. It had several sensor clusters, with floating WiFi antennas, deployed along a downstream...
Article
Full-text available
Stroke is one of the leading causes of death and disability among adults worldwide. The World Health Organization (WHO) officially declared a COVID-19 pandemic on March 11, 2020. The first case in Mexico was confirmed in February 2020, subsequently becoming one of the countries most affected by the pandemic. In 2020, The National Institute of Neuro...

Citations

... Some of the growing uses of OppNets include their use in Zebranets [3], a sensor network with tracking sensors attached to the animals (zebras). OppNets are also used in the military [4], in inter-planetary networks [5], and for natural disaster recoveries where opportunistic communication between people becomes the only option. ...
Article
Full-text available
With the natural characteristics of Opportunistic networks (OppNets) where delivery is delayed with frequent disconnections between mobile nodes in dynamically changing routes to destinations, malicious nodes can perform selective packet dropping attacks easily without been identified easily. This is why securing the data flow without any loss becomes challenging in OppNets. In this paper, we present a solid trust based node and path detection technique against selective packet dropping attacks. Using the trust attribute with the Merkle hashing technique, a node’s identity can be validated, and malicious nodes can be detected. We integrate our proposed technique with Epidemic routing and use simulation to show how effective the technique works against selective packet dropping attacks. We use simulation to show how the node detection accuracy increases with time, as intermediate nodes have more time to establish trust with destination nodes. We also use simulation to show that delivery rates increase with increased storage, and show how our trust model improves and secures routing compared to non-trust models.
... TCPCL [36] is a convergence layer protocol, provided to adopt TCP based protocols operation to the DTN architecture model and the requirements of the Bundle protocol. Other reliable protocols such as DS-TP [37] and NORM [38], [39] aim to apply congestion control in a more e cient manner than TCP, by decoupling the specification of the transmission rate at the sender from the delayed feedback (positive or negative ACKs) arriving from the receiver. Contrary to the aforementioned approaches, LTP [40], [41] and Saratoga [42], [43], [44] focus on point-to-point, data transfer at the link layer. ...
Thesis
Disruption Tolerant Networks (DTNs) generally refer to a wide range of mobile networking environments which suffer from intermittent connectivity, due to reasons such as nodes mobility, poor wireless link conditions etc. In this context, the store-carry-and forward approach allows to store data locally at the nodes, to survive communication disruptions. However, ensuring end-to-end reliable data delivery (as with TCP) is very challenging, especially for environments where the mobile nodes come in communication range randomly (opportunistic contacts). Many existing approaches provide distributed resources management techniques with the aim of maximizing the performance of the network in such resource limited environments. However, such approaches generally consider application sessions of equal importance. The aim of this thesis was to propose efficient ways to add the dimension of multi-QoS class support in the resources management framework. We provide a distributed constrained optimization framework based on delivery predictions, which aims to guarantee the optimal balance between: (i) individual QoS classes satisfaction and (ii) overall performance maximization. To this end, our approach can be considered as a “loose” equivalent of reliable delivery, mapped to opportunistic DTNs. We then provide different alternatives for extending our policies, in order to account for real life mobility conditions which affect the accuracy of delivery predictions. Through extensive evaluation based on synthetic and real mobility traces we validate the optimality of our approach as well as the fact that it outperforms other existing QoS prioritization policies.
... Along with the requirement of the communication under various extreme network conditions, such as, deep-space communication [1][2][3], maritime communication [4,5], underwater communication [6,7], and communication in remote areas [8][9][10], DTN [11] gradually get more and more focus as a new network model with intermittent connectivity. ...
... Recently, along with the rise of the communication demand under various extreme conditions, such as deep-space communication [1,2,3], maritime communication [4,5], underwater communication [6,7], and communication in remote areas [8,9,10], DTN [10], as a new routing model for the network scenarios with intermittent connectivity, has become a hot topic in network community. ...
... The Delay or Disruption Tolerant Network (DTN) architecture is a paradigm that has been advanced in order to provide services for challenging networks [43] (ensuring connectivity in rural areas [37,96], military networks [93], underwater networks [88], . . . ). ...
Article
During the last years, we have observed a progressive and continuous expansion of human-centered mobile wireless networks. The advent of these networks has encouraged the researchers to think about new solutions in order to ensure efficient evaluation and design of communication protocols. In fact, these networks are faced to several constraints as the lack of infrastructure, the dynamic topology, the limited resources and the deficient quality of service and security. We have been interested in the dynamicity of the network and in particular in human mobility. The human mobility has been widely studied in order to extract its intrinsic properties and to harness them to propose more accurate approaches. Among the prominent properties depicted in the literature, we have been specially attracted by the impact of the social interactions on the human mobility and consequently on the structure of the network. To grasp structural information of such networks, many metrics and techniques have been borrowed from the Social Network Analysis (SNA). The SNA can be seen as another network measurement task which extracts structural information of the network and provides useful feedback for communication protocols. In this context, the SNA has been extensively used to perform link prediction in social networks relying on their structural properties. Motivated by the importance of social ties in human-centered mobile wireless networks and by the possibilities that are brought by SNA to perform link prediction, we are interested by designing the first link prediction framework adapted for mobile wireless networks as Mobile Ad-hoc Networks (MANETs) and Delay/Disruption Tolerant Networks (DTN). Our proposal tracks the evolution of the network through a third-order tensor over T periods and computes the sociometric Katz measure for each pair of nodes to quantify the strength of the social ties between the network entities. Such quantification gives insights about the links that are expected to occur in the period T+1 and the new links that are created in the future without being observed during the tracking time. To attest the efficiency of our framework, we apply our link prediction technique on three real traces and we compare its performance to the ones of other well-known link prediction approaches. The results prove that our method reaches the highest level of accuracy and outperforms the other techniques. One of the major contributions behind our proposal highlights that the link prediction in such networks can be made in a distributed way. In other words, the nodes can predict their future links relying on the local information (one-hop and two-hop neighbors) instead of a full knowledge about the topology of the network. Furthermore, we are keen to improve the link prediction performance of our tensor-based framework. To quantify the social closeness between the users, we take into consideration two aspects of the relationships: the recentness of the interactions and their frequency. From this perspective, we wonder if we can consider a third criterion to improve the link prediction precision. Asserting the heuristic that stipulates that persistent links are highly predictable, we take into account the stability of the relationships (link and proximity stabilities). To measure it, we opt for the entropy estimation of a time series proposed in the Lempel-Ziv data compression algorithm. As we think that our framework measurements and the stability estimations complement each other, we combine them in order to provide new link prediction metrics. The simulation results emphasize the pertinence of our intuition. Providing a tensor-based link prediction framework and proposing relative enhancements tied to stability considerations represent the main contributions of this thesis. Along the thesis, our concern was also focused on mechanisms and metrics that contribute towards improving communication protocols in these mobile networks [...]
... Examples of such domains include seismology, interplanetary space exploration, oceanography, battlefield surveillance and monitoring of remote rural areas. Delay-tolerant networking (DTN) has been proposed and is being increasingly adopted as the networking architecture for such environments [5,6,7]. ...
Conference Paper
Increased commodity use of mobile devices has the potential to enable mission-critical monitoring applications. However, these mobile-enabled monitoring applications have to often work in environments where a delay-tolerant network (DTN) is the only feasible communication paradigm. Detection of complex (composite) events is fundamental to monitoring applications. However, the existing plan-based CED techniques are mostly centralized, and hence are inherently unscalable for DTNs. In this paper, we create Comet â" a decentralized plan-based, efficient and scalable CED for DTNs. Comet shares the task of detecting complex events (CEs) among multiple nodes, with each node detecting a part of the CE by aggregating two or more primitive events or sub-CEs. Comet uses a unique h-function to construct cost and delay efficient CED trees. As finding an optimal CED plan requires exponential-time, Comet finds near-optimal detection plans for individual CEs through a novel multi-level push-pull conversion algorithm. Performance results show that Comet reduces cost by up to 89% compared to pushing all primitive events and over 60% compared to a two-level exhaustive search algorithm.
... For very long disruptions, DTN is definitively better. Some experiments applying DTN to GEO sat communications with mobile terminals have already been carried out in the military field [40]. ...
Article
Full-text available
Satellite communications are characterized by long delays, packet losses, and sometimes intermittent connectivity and link disruptions. The TCP/IP stack is ineffective against these impairments and even dedicated solutions, such as performance enhancing proxies (PEPs), can hardly tackle the most challenging environments, and create compatibility issues with current security protocols. An alternative solution arises from the delay- and disruption-tolerant networking (DTN) architecture, which specifies an overlay protocol, called bundle protocol (BP), on top of either transport protocols (TCP, UDP, etc.), or of lower layer protocols (Bluetooth, Ethernet, etc.). The DTN architecture provides long-term information storage on intermediate nodes, suitable for coping with disrupted links, long delays, and intermittent connectivity. By dividing the end-to-end path into multiple DTN hops, in a way that actually extends the TCP-splitting concept exploited in most PEPs, DTN allows the use of specialized protocols on the satellite (or space) links. This paper discusses the prospects for use of DTN in future satellite networks. We present a broad DTN overview, to make the reader familiar with the characteristics that differentiate DTN from ordinary TCP/IP networking, compare the DTN and PEP architectures and stacks, as a preliminary step for the subsequent DTN performance assessment carried out in practical LEO/GEO satellite scenarios. DTN security is studied next, examining the advantages over present satellite architectures, the threats faced in satellite scenarios, and also open issues. Finally, the relation between DTN and quality of service (QoS) is investigated, by focusing on QoS architectures and QoS tools and by discussing the state of the art of DTN research activity in modeling, routing, and congestion control.
... These issues have been explored for TCP and similar protocols in other work [13]. Because of its various properties, NORM demonstrates robust performance in wireless networks when operating at predetermined fixed data rates [14]. A common pathological case that has been examined is a " string " of nodes that comprise a multihop path from a source to a destination. ...
Conference Paper
Full-text available
Command and Control and other applications operating in tactical edge networks often require group-wise communication to effectively support military operations. Tactical users rely upon group situational awareness. Mission planning and execution involves distributing force orders and supporting information among collaborating groups. Network-centric concepts of operation offer the promise of a more flexible and responsive fighting force if the necessary information can be effectively disseminated and exchanged among warfighting users and elements. The Naval Research Laboratory (NRL) has conducted research and development of reliable multicast transport protocols for over a decade. The NACK-Oriented Reliable Multicast (NORM) protocol specification provides robust reliable transport and ancillary functions to support different application needs. The NRL NORM “toolkit” implementation provides controls for application developers to develop robust and efficient group messaging applications capable of operating in tactical edge network environments. This paper describes these mechanisms and presents some results from laboratory and field experiments.
... For D-Star testing, both the reference TCP/IP Convergence Layer and the NACK-Oriented Reliable Multicast (NORM) based CL [11] were used to investigate DTN performance. NORM was chosen for examination in response to research done by [12] which indicated that NORM would be suited to multi-hop wireless DTN links. Figure 2 shows the experimental network used to measure the system performance. ...
... For D-Star testing, both the DTN reference implementations TCP Convergence Layer (TCP-CL) and the NORM Convergence Layer (NORM-CL) were used to investigate DTN performance. NORM was chosen for examination as previous research [14] suggests that NORM would be suited for use in networks that are bandwidth constrained, or networks that suffer from high levels of packet loss. Two separate network configurations were examined. ...
Article
Full-text available
This paper examines the performance of the Digital Smart Technologies for Amateur Radio -Digital Data mode with various IP and non-IP based protocols. A throughput comparison was performed between IPv4, IPv6, the DTN Convergence Layer and the NORM Convergence Layer. The experimental results show that the DTN NORM Convergence Layer exhibits better performance than TCP/IP, and appears to perform better over difficult radio links.