Professional Documents
Culture Documents
MASTER OF TECHNOLOGY
in
DHANBAD – 826004
INDIA
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
CERTIFICATE
This is to certify that the Minor Project Work entitled “Studies on Fractal Dielectric
Resonator Antenna” submitted by TWARITA BERA (Admission No. 16MT001463) has
been carried out under the guidance & supervision of Dr.RAJENDRA PAMULA. The
project is approved for submission towards partial fulfillment as required for the award of
degree of MASTER of TECHNOLOGY in COMPUTER SCIENCE & ENGINEERING
(2017-2018) from Indian Institute of Technology (Indian School of Mines), Dhanbad
(Jharkhand).
Dr.Rajendra Pamula
Assistant Professor
IIT-ISM Dhanbad
ACKNOWLEDGEMENT
It is with immense gratitude that I acknowledge the support and help of my supervisor,
Dr. Rajendra Pamula, Assistant professor of Computer Science & Engineering
Department at IIT-ISM, Dhanbad, for his valuable guidance during the course of the
project. I am highly indebted to him for constantly encouraging me by giving his critics
on my work. I am grateful to him for having given me the support and confidence. His
trust and support inspired me the most in making right decisions and I am glad to work
with him.
Twarita Bera
ABSTRACT
Continuous network connectivity has always been a significant issue in the area of
networks.DTN provides architecture that casts upon the problem of discontinuity in the
network and tries to solve it. Such dropping of connectivity is found in tremendous
terrestrial atmosphere and planetary systems.Instead of direct delivery of data from
source to destination through a physical medium(coaxial cables,wires)DTN uses the help
of intermediate nodes that can relay messages from one node to another through
replication to avoid data loss.But these nodes may act selfish to save their energy,battery
power,bandwidth and so on and may not agree to forward data packets which leads to
lack of co-operation and hence hampers transferability in the network.To combat this
selfish behaviour various incentives or rewards have been proposed to these nodes such
they assist with each other and make the network communication smoother.
TABLE OF CONTENTS
Page No.
Chapter 1
1.1 Introduction
Basic Characteristics
Applications
Challenges
Areas of Research
1.3 Basic Routing Protocols
• Epidemic
• Prophet
• Maxprop
• Spray and Wait
Chapter 2
2.1 Related Works
2.2 Proposed Work
Chapter 3
3.1 Performance Evaluation
3.2 Results
3.3 Parameters
3.4 Result Comparison
3.5 Graphs
Chapter 4
4.1 Future Scope
4.2 Conclusion
4.3 References
Chapter 1
1.1 Introduction
Delay Tolerant Networks are special purpose networks which seeks to enhance mobility
of nodes thus increasing interoperability.Traditionally end to end path communication
was used for delivering packets which was to be maintained throughout the duration of a
communication session.This arrangement had many drawbacks such as disruption of the
channel,sudden loss of data packets,attacks of third party and many more.So DTN chose
intermediate nodes as means of data transfer tool which uses the store -carry- forward
method.DTN cocentrates on reliable message routing rather acessing the best node to
guarantee delivery of the message.Nodes while moving carries the messages hop by hop
and replication of the packets is done at the same time.While coming contact with other
node it shares the message and also retains a copy of it.The Bundle Protocol in the
Bundle layer of DTN allows contiguous data blocks instead of individual data to be
transmitted through the network for faster communication.It has custody based
retransmission alongwith opportunistic connectivity that is able to interoperate with
intermittent connectivity.The bundle protocol agent of each node is expected to provide
the following services to the node's application agent:
commencing a registration .
terminating a registration.
canceling a transmission.
Apart from the various usefulness there are number of challanges to face in the DTN
networks.
Nodes that demand reward in forwarding the messages may not be pleased with it
and thus will disagree to communicate further which leads to lack of co-
operation in the networks.
Only secret or public keys are used for exchange of information in the nodes but
there is no combination of it.Any intruder may know either of the keys and steal
the information .So,key management is also an issue to it.
1.2 Delay Tolerant Networks(DTN)
Basic Characteristics
2. Storing a message, carrying it along often for a long time, and transmitting during
a subsequent contact with another node.
Applications
Although DTNs were originally conceived for interplanetary use, they may have a
far greater number of applications on Earth. Here is a short summary of the
possible applications:
Commercial: Cargo and vehicle tracking (by road, rail, sea, and air), in-store and
in-warehouse asset tracking, data transactions (e.g., financial, reservations),
agricultural crop monitoring, processing-plant monitoring, communication in
underground mines.
Public Service and Safety: Security and disaster communication, search and
rescue communication, humanitarian relief monitoring, smart-city event-response,
smart transportation networks, smart electric-power networks, global airport-traffic
control, infrastructure-integrity monitoring, unmanned aerial vehicle (UAV)
communication and control, remote learning.
Personal Use: Personal monitoring and communication in wilderness and urban
areas, fire-and-forget text messaging.
Challenges
Key Management The major open issue in DTN security is the lack of a
delay-tolerant method for key management. We are at the stage where we
only really know how to use existing schemes, which ultimately require an
on-line status checking service or key distribution service which is not
practical in a high delay or highly disrupted environment. The only generally
applicable schemes we currently have are basically equivalent to shared
secrets or else irrevocable public key (or certificate based) schemes. Clearly,
this is an area where more research work could produce interesting results.
Routing
The design of the most efficient routing protocol for DTNs/OMNs still remains an open
problem. The key challenge of routing is to ensure as many number delivery of of
messages as possible using different available information, if at all, under diverse
scenarios. In the recent past, several routing protocols have been proposed that offer
interesting performance profile.
Congestion
Congestion mitigation in DTNs is particularly interesting and difficult due to its divergent
characteristics from the traditional Internet. In particular, unlike the Internet,high latency
in DTNs makes propagation of congestion indicator through the network impractical.
Similar to other networks, research on congestion in DTNs have focused on two
approaches—congestion avoidance and control.
Energy
Mobile devices are key components in DTNs.In most of the cases mobile devices have
limited battery and they have to always standby to prepare store-carry-forward services.
How to improve the energy efficiency of these communications given the tradeoff at the
moment between energy consumption and data forwarding performance becomes an
important research topic.Some have given ideas like a wake up mechanism where mobile
devices will only work when it is desired.This would give a high data forwarding
probability.
Security
DTNs are vulnerable to many malicious actions and bring a number of new security
challenges. The use of intermediate nodes as relays offers extraordinary opportunities
for security attacks, including compromising information integrity, authenticity, user
privacy and system performance. The use of specific routing mechanisms including
flooding-based ones may even increase the risks associated with inserting false
information into the network. Extra traffic injected by malicious nodes creates another
serious threat due to resource scarcity of DTNs in some application scenarios.
Unauthorized access and utilization of DTN resources for specific malicious actions are
other serious concerns. It is important to note that the research on DTN security is more
challenging compared to conventional mobile ad hoc networks due to its unique security
characteristics
Epidemic
The epidemic routing protocol (and similar protocols in distributed systems) is modeled
after the spreading of epidemic diseases in real life.With this analogy, a node consisting
of a message, m, may be considered as already infected. Now, when such a node comes in
contact with another node not having that message, the former node transmits m to the
latter and thereby, infects it.
Each packet generated is assigned a unique ID that is associated with it and all its copies
until they are dropped or delivered to the destination. The list of all the packets’ IDs ina
node’s buffer is called the summary vector. When two nodes meet, they exchange their
summary vectors. All data packets that are stored in one node and not in the other are
ordered ona first-come first-served basis to be transmitted to the other node. Packet
transfer then starts until the contact duration ends. Assuming that the contact duration is
long enough totransfer all the uncommon packets, the two nodes will have the same
packet list after their contact ends. Given unlimited buffersize, long enough contact
durations, unlimited lifetime for the data packets, and a non-infinite partitioned network,
EPIDEMIC routing guarantees the delivery of all the packets to their destinations. In
addition, it guarantees the lowest end-to-enddelay, because each packet is routed on all
possible paths from the source, and one of the copies will be on the shortest path.
1: Procedure Name: OnContact
2: Input: node a, node b, integer ContactDuration
3: DropExpiredPackets(a,b)
4: ExchangeSummaryVector(a,b)
5: if ContactDuration > 0 then
6: pkt=GetPacket(a)
7: if pkt then
8: if NotReceivedBefore(pkt,b) then
9: if IsDestination(pkt,b) then
10: SendPacket(pkt,a)
11: ConsumePacket(pkt,b)
12: else
13: SendPacket(pkt,a)
14: StorePacket(pkt,b)
15: end if
16: ContactDuration=ContactDuration-size(pkt) Fig:1
17: end if
18: end if
19: end if
Prophet
The protocol estimates a node metric called delivery predictability, P(a, b), at each node
a for each destination b. When two nodes meet, they update their delivery predictability
toward each other. Then the two nodes exchange their delivery predictability list toward
other nodes to each other to update their delivery predictability toward the other nodes
using the following equations.
Direct Update:
where P (a,b) old is the value of P(a,b) before updating, Pinit belongs to [0,1]is an
initialization constant. This update is done when the two nodes a and b come into direct
contact with each other.
Transitive Update:
where beta belons to [0,1] is the transitivity constant which reflects the impact of
transitivity on the delivery predictability. This equationupdates the delivery predictability
of node a toward node a through the transitive contact between a and c.
Aging:
where g belongs to [0,1] is the aging constant, and k is the number of time units that have
elapsed since the last time the metric was aged. This equation decreases the delivery
predictability by the time passed without direct between the two nodes a and
b.PROPHET provides a partial guiding toward thedestinationby tracing the contacts
between nodes and assigningweights to these contacts whether directly or through
intermediate nodes. Therefore, PROPHET is expected to outperform the blind protocols
in delivery ratio. On the other hand, it is expected that the average packet delay may
increase due to waiting for a good next node in the path. A pseudo-code for PROPHET is
provided below:-
Maxprop
The MAXPROP protocol proposed in [10] estimates a node metric, P(a, b), similar to
PROPHET. When two nodes a and b meet, they strengthen the link between each other
by addinga constant a which is set to equal 1 in the protocol. Then the two nodes divide
their delivery predictability towards all the nodes including each other by 1 + a so that the
sum of alldelivery predictability remains 1.
P(a,b) = P (a,b)old + alpha
P(a,c) = P (a,b)old /(1 + alpha)
where alpha belongs to [0,1] is the updating constant, which is set to 1 in their work, and
c is every other node including b.The node metric is used only when the hop count of the
packet is greater than a certain threshold. The main contribution of MAXPROP is in its
buffer management. Packets are sorted according to their hop count if the hop count is
below a certain threshold. Otherwise, packets are sorted with their delivery predictability.
In this way, MAXPROPfavors packets with lower hop count to spread in the network.
The pseudo-code for MAXPROP is shown in the following algorithm.
SnW
DTNs usually involve devices that are energy-sensitive in which saving energy becomes
one of its main objectives, ifnot the main one. Energy consumption is mostly incurred in
the communication process (transmission and reception). To save energy, it is required to
decrease the number of transmissions and receptions. Motivated by this fact, the authors
proposed the SnW routing protocol. The idea of SnW is to limit the number of packet
copies in the network. A packet copy, transferred from one node to another, is associated
with the number of further copies allowed for the second node to distribute. This number
is decreased by the number of transfersfor this packet at each node. When the allowed
number of copies reaches one, the carrying node stops generating any more copies of the
packet and keeps its single copy until it either meets the destination or the packet
isdropped becauseof a buffer overflow or lifetime expiry. A binary version of SnW is also
proposed i, in which each node is allowed to use half the number of copies allowed for
the packet, and theother half is left for the receiving node. The pseudo-code for the binary
SnW is shown.
1: Procedure Name: OnContact
2: Input: node a, node b, integer ContactDuration
3: DropExpiredPackets(a,b)
4: ExchangeSummaryVector(a,b)
5: if ContactDuration > 0 then
6: pkt=GetPacket(a)
7: if pkt then
8: if NotReceivedBefore(pkt,b) then
9: if IsDestination(pkt,b) then
10: SendPacket(pkt,a)
11: ConsumePacket(pkt,b)
12: else
13: NrOfCopies=GetNrOfCopies(pkt,a)
14: if NrOfCopies > 1 then
15: SendPacket(pkt,a)
16: StorePacket(pkt,b)
17: SetNrOfCopies(pkt,a,NrOfCopies/2)
18: SetNrOfCopies(pkt,b,NrOfCopies/2)
19: endif
20: endif
21: ContactDuration=ContactDuration-size(pkt)
22: endif
23: endif
24: endif
Chapter 2
New method to select relay nodes for multicopy transmissions is given. To ensure that the
selected relay nodes can receive their rewards securely, a signature scheme based has
been developed to prevent the malicious nodes from interferring.
The field chosen for the work is Routing.Under routing incentive based routing is
chosen to improve network performance in the parameters of simulation.For this
the simulation was run on THE ONE application to compare the results with the
other routing algorithms.
In prophet routing social and non social incentive based credits have been
introduced to enhance delivery ratio,reduce overhead ratio and reduce delay too.In
the update delivery predictability for a host the update has been done where the
update shows there is a fair increase of delivery ratio with increase of n the direct
delivery part where two nodes are directly in contact with each other
time.Overhead ratio decreases with time and latency also reduces
considerably.Changes have been done The Proposed algorithm is as follows:-
3.2 Results
where dp is the delay encountered by packet p delivered to its destination node n and
DVn is the set of packets delivered totheir destination n. The metric is simply the ratio of
the sumof all delivered packets’ delays to the number of deliveredpackets.
Graphs
Conclusion
Graph 2:Overhead Ratio with increasing simulation time
Future Scope:
Conclusion
References