Advances in delay-tolerant networks (dtns) : architecture by J Rodrigues

By J Rodrigues

Half one appears to be like at delay-tolerant community architectures and systems together with DTN for satellite tv for pc communications and deep-space communications, underwater networks, networks in constructing international locations, vehicular networks and emergency communications. half covers delay-tolerant community routing, together with concerns equivalent to congestion keep an eye on, naming, addressing and interoperability. half 3 explores companies and Read more...

summary: half one appears to be like at delay-tolerant community architectures and systems together with DTN for satellite tv for pc communications and deep-space communications, underwater networks, networks in constructing nations, vehicular networks and emergency communications. half covers delay-tolerant community routing, together with matters resembling congestion keep an eye on, naming, addressing and interoperability. half 3 explores providers and functions in delay-tolerant networks, reminiscent of net searching, social networking and knowledge streaming. half 4 discusses improving the functionality, reliability, privateness and protection of delay-tolerant networks. Chapters disguise source sharing, simulation and modeling and testbeds

Show description

Read Online or Download Advances in delay-tolerant networks (dtns) : architecture and enhanced performance PDF

Best design & architecture books

Operational Amplifiers: Theory and Design

Operational Amplifiers – idea and layout, moment variation offers a scientific circuit layout of operational amplifiers. Containing cutting-edge fabric in addition to the necessities, the booklet is written to entice either the circuit fashion designer and the method fashion designer. it's proven that the topology of all operational amplifiers should be divided into 9 major total configurations.

Computer and Information Security Handbook

The second edition of this complete guide of desktop and knowledge security provides the main whole view of desktop safety and privateness on hand. It bargains in-depth assurance of safeguard thought, know-how, and perform as they relate to demonstrated applied sciences in addition to fresh advances.

Languages, Design Methods, and Tools for Electronic System Design: Selected Contributions from FDL 2015

This publication brings jointly a range of the easiest papers from the eighteenth version of the discussion board on specification and layout Languages convention (FDL), which came about on September 14-16, 2015, in Barcelona, Spain. FDL is a well-established foreign discussion board dedicated to dissemination of analysis effects, sensible reviews and new rules within the software of specification, layout and verification languages to the layout, modeling and verification of built-in circuits, complicated hardware/software embedded structures, and mixed-technology structures.

Additional info for Advances in delay-tolerant networks (dtns) : architecture and enhanced performance

Example text

25 Copyright © 2015 Elsevier Ltd. All rights reserved. 26 Advances in Delay-tolerant Networks with the few ms of local connections and with about 150 ms of intercontinental connections for terrestrial wired links. As TCP congestion control is ACK-based, the longer the RTT, the worse the performance, with a severe penalization of GEO satellite connections (Caini and Firrincieli, 2004). , 2001). As GEO networks require specific solutions outside the ordinary TCP/IP architecture, they are fully entitled to be considered “challenged networks”, despite the fact that GEO satellite contacts are generally continuous.

First, the DTN solution is not as transparent as PEP, because the BP must be installed on end-nodes; however, it is much more “elegant”. In fact, while TCP-splitting is based on a sort of trick (fake ACKs are sent back by the first PEP on the path, not by destination, which is effective but neither elegant nor robust), in DTN the same result is achieved thanks to the different enhanced architecture. Second, but quite important in practice, TCP-splitting is incompatible with Internet Protocol security (IPsec) (ETSI, 2009; Cruickshank et al.

Epidemic is shown to be effective, but suffers from the disadvantages of flooding as the node density increases. It creates lots of contention for buffer space and required bandwidth, resulting in many bundle drops and retransmissions in resourceconstrained network environments. In an environment with infinite buffer resources and bandwidth, this protocol provides an optimal solution, since it delivers all the bundles that can possibly be delivered in the minimum amount of time. , 2007). e. copies) per bundle allowed in the network to control flooding.

Download PDF sample

Rated 4.66 of 5 – based on 49 votes