Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

CASE STUDY ON DELAY

TOLERANT NETWORK
(INTERNET OF THINGS)
Submitted To: Submitted By:

Mr. Ram Murti Rawat Natasha Mushinge 2K19/SE/079

Munira Bahar 2K19/SE/156


INTRODUCTION

Delay Tolerant Network (DTN) is a class of network architectures that address the lack of continuous network
connectivity. This issue has been studied for over a decade by promoting new routing protocols. However, recent
research in DTN should rekindle proposed solutions to support new emerging network-based applications, in which
DTN techniques can be used to offer delay-tolerant support.

An example of these applications domains is the Internet of Things (IOT). We survey the use of DTN solutions in
IOT applications to overcome connectivity problems considering the opportunities and challenges for each technology.

The purpose of this work is to introduce the most recent solutions that enable delay-tolerant IOT. We propose a
taxonomy and discuss the advantages and limitations of each study.
Delay-Tolerant Networks (DTN) are mobile networks that may never have an end-to-
end contemporaneous path. The characteristics of DTN are different from traditional Ad
Hoc networks. For this reason, researchers propose new routing protocols that better
support DTN challenges (mobility, transient connection, long-delay delivery, etc.).

So if a message was dropped in any intermediate node during its transmission, it could
be stored and then forwarded whenever the intermediate node rejoins the network.
Recently, several new emerging application domains are drawing near that also require
delay-tolerant support. Internet of Things (IOT) is one of these novel areas. IOT
interconnects sensor-augmented physical objects anywhere anytime for many application
domains (industry, military, smart home, etc.).

Enabling delay-tolerant communication in IOT will allow smart objects to better


communicate even with the presence of disruption in their connectivity. For example, in the
case of road traffic control applications with limited connectivity, vehicles recording
important information on road status may need to store/carry data until they find an
opportunity to forward.
DTN: TAXONOMY AND SURVEY
The underlying principle behind DTN to route data is store-carry and forward, in
which intermediate mobile nodes store data to be transmitted till it finds an appropriate
relay node (to forward the message) in the path towards the destination.

The DTN key properties that make them different from conventional networks are
manifolds: high latency, low data rate, disconnection, limited longevity, limited resources,
etc. These peculiar properties have raised the number of proposals in routing protocols
and DTN architectures. We present hereafter existing works and surveys on DTN
solutions. Before that, we define DTN classification criteria and performance evaluation
metrics.
DTN classification categories:

Various DTN schemes were proposed


to overcome the lack of
contemporaneous end-to-end
connectivity. The figure classifies existing
solutions according to three main
categories: network topology, routing
strategy, and message replication and
semantics.
Performance evaluation for DTN solutions:
Many performance metrics are associated with proposed DTN solutions in the
literature. We classify them into three main categories:
• Delivery metrics
• Effectiveness metrics and
• Resources metrics.

Developing new DTN routing protocols should satisfy the performance


requirements such as increasing delivery ratio and data effectiveness, decreasing
transmission latency and cost, and optimizing resource allocation. We discuss hereafter
the performance evaluation factors.

Later on, we will link these performance metrics with IOT characteristics and
address the challenges faced to satisfy a better efficiency
Existing surveys on DTN
Many survey papers have addressed the challenges and opportunities in DTN. Some
of them give a taxonomy of routing protocols, while others focus only on design issues.

This section summarizes a number of high-quality surveys that covered DTN routing
protocols in the literature.
Year Description
2006 • Taxonomy up to 2006 for unicast DTN schemes.
• Topology and mobility-based classification (deterministic, stochastic & coding-based)
2008 • Flooding/forwarding classification
• No taxonomy
2010 • Taxonomy using flooding-based, history based, & special device-based classification
2010 • Taxonomy until 2010
• DTN design issues
• Architectural layer-based classification
2012 • DTN issues analysis
• Routing strategies classification
2012 • Taxonomy from 2007 to 2010
• Cooperative DTN routing protocols
2012 • Taxonomy from 2006 to 2010
• Delivery semantic classification
• Naïve replication, utility forwarding classification.
2013 • Taxonomy from 2007 to 2011
• Positive and negative social properties
• Social-based routing classification
2016 • Classification based on message replication and network primitives
• Social-based and pure opportunistic routing and data dissemination protocols
Cooperation for Internet of Things based vehicular
delay tolerant networks (VDTN)
Many Internet of Things (IOT) applications have been developed and implemented
on unreliable wireless networks like the delay-tolerant network (DTN); however, efficient
data transfer in DTN is still an important issue for the IOT applications.
One of the application areas of DTN is the vehicular delay-tolerant network (VDTN)
where the network faces communication disruption due to the lack of an end-to-end
relay route. It is challenging as some of the nodes show selfish behavior to preserve their
resources like memory and energy and become non-cooperative.
In this case study, an honesty-based democratic scheme (HBDS) is introduced where
vehicles with higher honesty levels are elected as heads—during the process. Vehicles
involved in the process would maximize their rewards (reputation) through active
participation in the network activities, whereas vehicles with non-cooperative selfish
behavior are punished.
Key contributions to the proposed scheme in VDTN.
• Analyzing node behavior in VDTN.

• To investigate the influence of the activities of the node on network performance and to
develop a methodology in which nodes with selfish behavior are stimulated and encouraged to
cooperate.

• To boost the overall performance of the system on the basis of node honesty with different
parameters such as frequency of interaction, mutuality and centrality, and community of interest
to elect heads, for example, community head, auxiliary community head, and incentive head.

• To design a Watchdog system that properly checks the behavior of nodes in a community.

• A comparative review is conducted to compare the performance of the proposed mechanism


with all the other incentive-based techniques. In addition, the proposed solution has increased
network performance in terms of packet delivery probability, packet dropping ratio, overhead,
and delivery delay.
PROPOSED SCHEME HBDS
The proposed mechanism suggests incentives to the nodes in the form of reputation to motivate the nodes
for stimulation and to improve the performance of the network. The proposed mechanism makes incentive to
the nodes for (a) involvement of the node in the democratic process, (b) messages forwarding to its fellow
nodes, (c) watching the behavior of the other nodes.
Conclusion.
In conclusion, the Internet of Things is the concept in which the virtual world of information
technology is connected to the real world of things. The technologies of the Internet of things such as
RFID and sensors make our life become better and more comfortable. One of the main features in the
development of an IOT architecture is the use of a wireless network of sensors that allow data capture
of system variables, which will then be analyzed for decision-making within the production process.
There are a variety of technologies for the implementation of IOT applications, but their choice will
depend on the environmental and geographical conditions where they will be used, as well as the
resources available since there are also free hardware and software options that allow performing the
functions mentioned in the article.

The IOT applications that currently exist generate satisfactory results, but with the passage of time
and market demand, they will require a greater number of applications that leads to the use of better
technologies and equipment with greater reach, much larger networks and more complex information
systems. This conclusion presents some closing thoughts on the concepts covered in the preceding
chapters of this book. The book discusses the centrality of data at the foundation of the Internet of
Things (IOT) ecosystems. IOT initiatives involve solutions that rely on sensor deployments and
associated datasets. With the ever-increasing number of IOT deployments, there is a danger of
fragmentation. Fragmentation can be reduced when interoperability allows the exchange of data and/or
services.

You might also like