SlideShare una empresa de Scribd logo
1 de 22
LailiAidi (aidi@kth.se)
Jung Changsu (changsu@kth.se)
   Many evolving wireless networks have
    characteristics different from the Internet.
    •   The instability of the link
    •   Long propagation and queuing delays
    •   Extremely asymmetric data rate
    •   High link error rates


   Delay Tolerant networks are designed to provide
    • reliable transmission
    • Interoperable communications between wide range of
      networks




                                                           2
 The Interplanetary Internet initiative: find a solution
  & suggestion network architecture, support reliable
  transmission between a station on the Earth and
  satellites, with an overlay network concept
 IRTF DTN Research Group: Interplanetary Internet
  under challenged networks
 DARPA Disruption Tolerant Networking program:
  Protocols for transmitting bundles to DTN nodes




                                                            3
 Path   and Link
 • High Error and Asymmetric Rate
 • Disconnection
 • Long and Variable Delay
 Network
 • Intermittent Connectivity
 • Security
 End    System
 • Limited Longevity
 • Low Duty Cycle Operation
 • Limited Resources



                                    4
 Link-repair   approach
Maintaining the end-to-end reliability and fate-sharing
 model of Internet
 Network-specific   proxy agent
Accessing internet from challenged networks, vice versa

 Message-oriented   reliable overlay architecture:
 Interoperability properties + Robust non-
 interactive delivery semantics + CoS

 Store-and-Forward     message switching:
 Gateway concept - Hold data until it has a scheduled
 transfer, In-network storage

                                                          5
 Region
 •   Regional network concept
 •   Interconnect different networks
 •   Own communication protocol
 •   Unique ID
 Node
 • Host: Sends or receives bundles and requires storage for
   queuing bundles.
 • Router: Forwards each bundles in the same DTN
   region, requires storage to store incoming packets
 • Gateway - support interoperability: interconnection
   point, forwards bundles to other DTN regions with different
   protocol stacks.


                                                                 6
   Bundle: message
    • Bundle header: Fragmentation
    • Control information: handling, storing, disposing
    • Source-application’s user data

   Fragmentation
    • To increase the possibility of delivery & increase
      performance
    • Proactive fragmentation
      • Predicted Contact volume + Optimize its usage
    • Reactive fragmentation
      • disconnection while transmitting fragmented bundles + Send
        smaller fragments


                                                                     7
   Bundle Layer




                   (2)




                         8
   Class of Service




                       (2)




                             9
   Name Tuple :
    • Region: Globally unique, reduce forwarding tables size
    • Entity Name: Identifier in specified region, not globally
      unique

   Contact Knowledge Oracle:encapsulate particular
    knowledge of network (Null, Contact Summary, Complete
    Contact, Queuing, Traffic On Demand)
   Group Membership Oracle:encapsulate particular
    knowledge of group dynamic (Local, Delay, Complete)




                                                                  10
   Objective: Maximize the probability of message delivery
•   time-varying multi-graph: no guarantee of the availability
    of the next hops link
•   Asymmetric data rate sender vs. receiver
•   high error rate link: retransmission
•   Contact intervals and volumes: unknown precisely ahead
    of time

 Routing     Algorithm Class
•   Zero Knowledge: Poor performance
•   Complete Knowledge: Complete knowledge
•   Partial Knowledge: Route message independently based
    on the future traffic demand.



                                                                 11
   Single-copy technique:
    • EMDDA: evaluating different routing metrics, no network
      traffic consideration
    • Deterministic node mobility assumption

   Multi-copy techniques:
    • Flooding-based protocols: non resource-constrained
      environments
    • Quota-based protocols: resource-constrained
      environments (quota flag to every message )




                                                                12
 Unicast-based  routing (UBR)
 Broadcast-Based Routing (BBR)
 Tree-Based Routing (TBR)
 Group-Based Routing (GBR)
 Context Aware Multicast Routing
 Static tree-based routing (STBR)
 Dynamic Tree-Based Multicasting Algorithm
  (DTBR)
 Context Aware Multicast Routing (CAMR)




                                              13
   Issues in bundle layer
    •   Vulnerable to attack because it is an overlay network
    •   Bundles can be modified
    •   Unauthorized insertion of bundles.
    •   Accept only authenticated messages

   Bundle Security
    • Authentication is carried out in routers and gateways
    • Public-key cryptography
        • both users and forwarders have their own key-pairs and certificates
    • A sender uses its private key to sign bundles and create
      bundle-specific signature.
    • A forwarding node replaces the sender’s signature with its
      own.



                                                                                14
   Open Issues in Bundle Security
    • The level of flexibility
       The bundle security protocol prevents insecure combination of
        application such as including plain-text signatures.
       Can support VPN but the complexity can cause high cost


    • Key Management
       No key management schemes exist in DTN deployments
       Existing schemes need hard coding.


    • Canonicalization of bundles
       Requires the same bytes of bundle of signature for integrity
       Bundles may be changed during traversal between nodes




                                                                        15
 Analyticalresearch, Mobility model
 Free-space Optical Communications: smart
  mobile phone-based mobile ad-hoc networks
  (MANETs)
 Radio Frequency (RF)
 Ultra-Wide Band (UWB)
 Acoustic (Sonar, Ultrasonic)




                                              16
 Outer  Space / Deep-Space Networks
  Inter Planetary Networks: communication
  network robustness, timeliness data return
 Terrestrial Civilian Network
  Mule Networks (ZebraNet), Challenge Links
  (SenDT)
 Acoustic underwater networks
 Battlefield networks




                                               17
   Overview
    •   Developed by the University of Waterloo
    •   Providing low cost Internet services to the poorest villages
    •   Vehicles are used to deliver data
    •   Services:
         birth, marriage, and death certificates
         Medical consultation and agricultural problems
    • Key concepts for a robust system
           Low-cost(70$/kiosk/month)
           low-power kiosk controller (6~8W)
           Using refurbished PCs without hard disks
           Free software


                                                                     Figure 11. KioskNet overview
                                          S.Guo, M.H. Falaki, U.Ismail, E.A. Oliver, S.UrRahman, A. Seth, M.A. Zaharia, and S.Keshav.
                                          “Design and Implementation of the KioskNet System (Extended Version)”. [Online].




                                                                                                                                 18
   Components
    • Kiosk
       Kiosk controller provide a network boot function, a network file
        system, user management, and network connectivity
    • Ferries
       a car, buses, motorcycles or trains
       contact with kiosk controllers and gateways using opportunistic ways
    • Gateway
       connected to the Internet through DSL or broadband
       receives data from a ferry and uploads the data to the proxy
    • Proxy
       Support communication between kiosk users and a legacy server
    • Legacy Server
       Typical servers supporting applications such as IMAP, SMTP and HTTP




                                                                               19
   Security Architecture
    • Entities
       KioskNet Franchisers, Franchisees, Users, Application Service providers

    • Certificate
       All entities have a 2048-bit RSA key and a public key
       Proxy broadcasts a public key for users, franchisees and ASPs

    • Infrastructure Integrity
       Digital signatures are used on all remote commands and software updates
        from franchiser

    • User data protection
       This system offers encrypted virtual space for each user’s home directory



                                                                                    20
   The main goal of a DTN
    • Interoperability
       between different kinds of networks in wide-ranging regions even
        though many limitations

    • Reliable transmission based on overlay network

   The implementation of DTNs will be a good solution for
    challenged networks
    • For example: KioskNet




                                                                           21
Questions?




              22

Más contenido relacionado

La actualidad más candente

Data link layer
Data link layerData link layer
Data link layerst2112
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing ProtocolsKABILESH RAMAR
 
Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed applicationRishikese MR
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)Krishna Kahar
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switchingDr Rajiv Srivastava
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizationsFabMinds
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPTKalpanaC14
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkPeter R. Egli
 

La actualidad más candente (20)

Data link layer
Data link layerData link layer
Data link layer
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed application
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Transport layer
Transport layerTransport layer
Transport layer
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Frame relay
Frame relayFrame relay
Frame relay
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
 
Manet
ManetManet
Manet
 
M2M systems layers and designs standardizations
M2M systems layers and designs standardizationsM2M systems layers and designs standardizations
M2M systems layers and designs standardizations
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Network Layer by-adeel
Network Layer by-adeelNetwork Layer by-adeel
Network Layer by-adeel
 

Destacado

Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant NetworksAnubhav Mahajan
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - JournalLaili Aidi
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Nasir Bhutta
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic NetworkingNoorin Fatima
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Waldir Moreira
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...eSAT Journals
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classificationShivi Shukla
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKIAEME Publication
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Social-aware Opportunistic Routing
Social-aware Opportunistic RoutingSocial-aware Opportunistic Routing
Social-aware Opportunistic RoutingWaldir Moreira
 
Introduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and ApplicationsIntroduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and ApplicationsNasir Bhutta
 

Destacado (20)

Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant Networks
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
 
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
Introduction to Secure Delay/Disruption Tolerant Networks (DTN)
 
Opportunistic Networking
Opportunistic NetworkingOpportunistic Networking
Opportunistic Networking
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...Opportunistic Networking: Extending Internet Communications Through Spontaneo...
Opportunistic Networking: Extending Internet Communications Through Spontaneo...
 
Vehicular network
Vehicular networkVehicular network
Vehicular network
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 
Advanced Wireless Technologies
Advanced Wireless TechnologiesAdvanced Wireless Technologies
Advanced Wireless Technologies
 
Vanet Presentation
Vanet PresentationVanet Presentation
Vanet Presentation
 
Introduction to VANET
Introduction to VANETIntroduction to VANET
Introduction to VANET
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5
 
Social-aware Opportunistic Routing
Social-aware Opportunistic RoutingSocial-aware Opportunistic Routing
Social-aware Opportunistic Routing
 
Vo ip
Vo ipVo ip
Vo ip
 
Introduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and ApplicationsIntroduction to Delay/Disruption Tolerant Networking and Applications
Introduction to Delay/Disruption Tolerant Networking and Applications
 

Similar a Delay Tolerant Network - Presentation

internet network for o level
 internet network for o level  internet network for o level
internet network for o level Samit Singh
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptxMunazza63
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTINGdevika g
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...revathiyadavb
 
7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless techHemant Nagwekar
 
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Umang Singh
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
Enterprise campus networks
Enterprise campus networksEnterprise campus networks
Enterprise campus networksKishor Satpathy
 
Networking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxNetworking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxakshataharage
 
Top schools in noida
Top schools in noidaTop schools in noida
Top schools in noidaEdhole.com
 
OSI reference model
OSI reference modelOSI reference model
OSI reference modelshanthishyam
 

Similar a Delay Tolerant Network - Presentation (20)

internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Case mis ch06
Case mis ch06Case mis ch06
Case mis ch06
 
Ch06
Ch06Ch06
Ch06
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech7 - Telecom, internet & wireless tech
7 - Telecom, internet & wireless tech
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
Enterprise campus networks
Enterprise campus networksEnterprise campus networks
Enterprise campus networks
 
Networking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptxNetworking Bridge course_PPT.pptx
Networking Bridge course_PPT.pptx
 
Top schools in noida
Top schools in noidaTop schools in noida
Top schools in noida
 
OSI reference model
OSI reference modelOSI reference model
OSI reference model
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 

Más de Laili Aidi

Mobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging MarketsMobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging MarketsLaili Aidi
 
Stream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - IntroductionStream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - IntroductionLaili Aidi
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsLaili Aidi
 
Study Abroad in the Land of Nobel
Study Abroad in the Land of NobelStudy Abroad in the Land of Nobel
Study Abroad in the Land of NobelLaili Aidi
 
Go International: Challenges and Opportunities
Go International: Challenges and OpportunitiesGo International: Challenges and Opportunities
Go International: Challenges and OpportunitiesLaili Aidi
 
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Laili Aidi
 
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Laili Aidi
 
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Laili Aidi
 
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Laili Aidi
 
Music Service Monetization 2.0
Music Service Monetization 2.0Music Service Monetization 2.0
Music Service Monetization 2.0Laili Aidi
 
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Laili Aidi
 
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Laili Aidi
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationLaili Aidi
 
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Laili Aidi
 
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationAnalysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationLaili Aidi
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringSNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringLaili Aidi
 
Sweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - PresentationSweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - PresentationLaili Aidi
 
Condroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final ReportCondroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final ReportLaili Aidi
 
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution ListCondroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution ListLaili Aidi
 
Condroid KTH Summer CSD 2011 - Press Release
Condroid KTH Summer CSD 2011 - Press ReleaseCondroid KTH Summer CSD 2011 - Press Release
Condroid KTH Summer CSD 2011 - Press ReleaseLaili Aidi
 

Más de Laili Aidi (20)

Mobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging MarketsMobile Music Business Models in Asia's Emerging Markets
Mobile Music Business Models in Asia's Emerging Markets
 
Stream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - IntroductionStream Control Transmission Protocol (SCTP) - Introduction
Stream Control Transmission Protocol (SCTP) - Introduction
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Study Abroad in the Land of Nobel
Study Abroad in the Land of NobelStudy Abroad in the Land of Nobel
Study Abroad in the Land of Nobel
 
Go International: Challenges and Opportunities
Go International: Challenges and OpportunitiesGo International: Challenges and Opportunities
Go International: Challenges and Opportunities
 
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...
 
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...
 
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...
 
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...
 
Music Service Monetization 2.0
Music Service Monetization 2.0Music Service Monetization 2.0
Music Service Monetization 2.0
 
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...
 
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...
 
Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
 
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...
 
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationAnalysis of WiMAX regulation in South Korea and Indonesia - Presentation
Analysis of WiMAX regulation in South Korea and Indonesia - Presentation
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringSNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
 
Sweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - PresentationSweden’s Telecom Markets, Actors & Roles - Presentation
Sweden’s Telecom Markets, Actors & Roles - Presentation
 
Condroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final ReportCondroid KTH Summer CSD 2011 - Final Report
Condroid KTH Summer CSD 2011 - Final Report
 
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution ListCondroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
Condroid KTH Summer CSD 2011 - Lesson Learned and Individual Contribution List
 
Condroid KTH Summer CSD 2011 - Press Release
Condroid KTH Summer CSD 2011 - Press ReleaseCondroid KTH Summer CSD 2011 - Press Release
Condroid KTH Summer CSD 2011 - Press Release
 

Último

Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?SANGHEE SHIN
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 

Último (20)

Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?Do we need a new standard for visualizing the invisible?
Do we need a new standard for visualizing the invisible?
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 

Delay Tolerant Network - Presentation

  • 2. Many evolving wireless networks have characteristics different from the Internet. • The instability of the link • Long propagation and queuing delays • Extremely asymmetric data rate • High link error rates  Delay Tolerant networks are designed to provide • reliable transmission • Interoperable communications between wide range of networks 2
  • 3.  The Interplanetary Internet initiative: find a solution & suggestion network architecture, support reliable transmission between a station on the Earth and satellites, with an overlay network concept  IRTF DTN Research Group: Interplanetary Internet under challenged networks  DARPA Disruption Tolerant Networking program: Protocols for transmitting bundles to DTN nodes 3
  • 4.  Path and Link • High Error and Asymmetric Rate • Disconnection • Long and Variable Delay  Network • Intermittent Connectivity • Security  End System • Limited Longevity • Low Duty Cycle Operation • Limited Resources 4
  • 5.  Link-repair approach Maintaining the end-to-end reliability and fate-sharing model of Internet  Network-specific proxy agent Accessing internet from challenged networks, vice versa  Message-oriented reliable overlay architecture: Interoperability properties + Robust non- interactive delivery semantics + CoS  Store-and-Forward message switching: Gateway concept - Hold data until it has a scheduled transfer, In-network storage 5
  • 6.  Region • Regional network concept • Interconnect different networks • Own communication protocol • Unique ID  Node • Host: Sends or receives bundles and requires storage for queuing bundles. • Router: Forwards each bundles in the same DTN region, requires storage to store incoming packets • Gateway - support interoperability: interconnection point, forwards bundles to other DTN regions with different protocol stacks. 6
  • 7. Bundle: message • Bundle header: Fragmentation • Control information: handling, storing, disposing • Source-application’s user data  Fragmentation • To increase the possibility of delivery & increase performance • Proactive fragmentation • Predicted Contact volume + Optimize its usage • Reactive fragmentation • disconnection while transmitting fragmented bundles + Send smaller fragments 7
  • 8. Bundle Layer (2) 8
  • 9. Class of Service (2) 9
  • 10. Name Tuple : • Region: Globally unique, reduce forwarding tables size • Entity Name: Identifier in specified region, not globally unique  Contact Knowledge Oracle:encapsulate particular knowledge of network (Null, Contact Summary, Complete Contact, Queuing, Traffic On Demand)  Group Membership Oracle:encapsulate particular knowledge of group dynamic (Local, Delay, Complete) 10
  • 11. Objective: Maximize the probability of message delivery • time-varying multi-graph: no guarantee of the availability of the next hops link • Asymmetric data rate sender vs. receiver • high error rate link: retransmission • Contact intervals and volumes: unknown precisely ahead of time  Routing Algorithm Class • Zero Knowledge: Poor performance • Complete Knowledge: Complete knowledge • Partial Knowledge: Route message independently based on the future traffic demand. 11
  • 12. Single-copy technique: • EMDDA: evaluating different routing metrics, no network traffic consideration • Deterministic node mobility assumption  Multi-copy techniques: • Flooding-based protocols: non resource-constrained environments • Quota-based protocols: resource-constrained environments (quota flag to every message ) 12
  • 13.  Unicast-based routing (UBR)  Broadcast-Based Routing (BBR)  Tree-Based Routing (TBR)  Group-Based Routing (GBR)  Context Aware Multicast Routing  Static tree-based routing (STBR)  Dynamic Tree-Based Multicasting Algorithm (DTBR)  Context Aware Multicast Routing (CAMR) 13
  • 14. Issues in bundle layer • Vulnerable to attack because it is an overlay network • Bundles can be modified • Unauthorized insertion of bundles. • Accept only authenticated messages  Bundle Security • Authentication is carried out in routers and gateways • Public-key cryptography • both users and forwarders have their own key-pairs and certificates • A sender uses its private key to sign bundles and create bundle-specific signature. • A forwarding node replaces the sender’s signature with its own. 14
  • 15. Open Issues in Bundle Security • The level of flexibility  The bundle security protocol prevents insecure combination of application such as including plain-text signatures.  Can support VPN but the complexity can cause high cost • Key Management  No key management schemes exist in DTN deployments  Existing schemes need hard coding. • Canonicalization of bundles  Requires the same bytes of bundle of signature for integrity  Bundles may be changed during traversal between nodes 15
  • 16.  Analyticalresearch, Mobility model  Free-space Optical Communications: smart mobile phone-based mobile ad-hoc networks (MANETs)  Radio Frequency (RF)  Ultra-Wide Band (UWB)  Acoustic (Sonar, Ultrasonic) 16
  • 17.  Outer Space / Deep-Space Networks Inter Planetary Networks: communication network robustness, timeliness data return  Terrestrial Civilian Network Mule Networks (ZebraNet), Challenge Links (SenDT)  Acoustic underwater networks  Battlefield networks 17
  • 18. Overview • Developed by the University of Waterloo • Providing low cost Internet services to the poorest villages • Vehicles are used to deliver data • Services:  birth, marriage, and death certificates  Medical consultation and agricultural problems • Key concepts for a robust system  Low-cost(70$/kiosk/month)  low-power kiosk controller (6~8W)  Using refurbished PCs without hard disks  Free software Figure 11. KioskNet overview S.Guo, M.H. Falaki, U.Ismail, E.A. Oliver, S.UrRahman, A. Seth, M.A. Zaharia, and S.Keshav. “Design and Implementation of the KioskNet System (Extended Version)”. [Online]. 18
  • 19. Components • Kiosk  Kiosk controller provide a network boot function, a network file system, user management, and network connectivity • Ferries  a car, buses, motorcycles or trains  contact with kiosk controllers and gateways using opportunistic ways • Gateway  connected to the Internet through DSL or broadband  receives data from a ferry and uploads the data to the proxy • Proxy  Support communication between kiosk users and a legacy server • Legacy Server  Typical servers supporting applications such as IMAP, SMTP and HTTP 19
  • 20. Security Architecture • Entities  KioskNet Franchisers, Franchisees, Users, Application Service providers • Certificate  All entities have a 2048-bit RSA key and a public key  Proxy broadcasts a public key for users, franchisees and ASPs • Infrastructure Integrity  Digital signatures are used on all remote commands and software updates from franchiser • User data protection  This system offers encrypted virtual space for each user’s home directory 20
  • 21. The main goal of a DTN • Interoperability  between different kinds of networks in wide-ranging regions even though many limitations • Reliable transmission based on overlay network  The implementation of DTNs will be a good solution for challenged networks • For example: KioskNet 21

Notas del editor

  1. Unauthorized insertion of bundles- Can cause serious threats because of the node’s limited resources.- Can be exploited by increasing resource consumption (i.e. DoS attack)
  2. The level of flexibility The bundle security protocol prevents insecure combination of application such as including plain-text signatures.May support a VPN but the complexity can cause high cost for implementationKey ManagementNo key management schemes exist in DTN deploymentsExisting schemes need hard coding. Accordingly, replacement of trusted keys in all nodes makes it difficult to adopt this scheme. Canonicalization of bundlesThe definition of a canonical bundle form is an open issue for data integrityRequires the same bytes of bundle of signature for integrity