Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
delay tolerant network (Download Full Report And Abstract)
Post: #1


Consider a scientist who is responsible for the operation of robotic meteorological station located on the planet Mars (Fig. 1). The weather station is one of several dozen instrument platforms that communicate among themselves via a wireless local area network deployed on the Martian surface. The scientist wants to upgrade the software in the weather stationâ„¢s data management computer by installing and dynamically loading a large new module. The module must be transmitted first from the scientistâ„¢s workstation to a deep space antenna complex, then form the antenna complex to a constellation of relay satellites in low Mars orbit (no one of which is visible from Earth ling enough on any single orbit to receive the entire module), and finally from the relay satellites to the weather station.

The first leg of this journey would typically be completed using the TCP/IP protocol suite over the Internet, where electronic communication is generally characterized by:

¢ Relatively small signal propagation latencies (on the order of milliseconds)
¢ Relatively high data rates (up to 40 Gb/s for OC-768 service)
¢ Bidirectional communication on each connection
¢ Continuous end-to-end connectivity
¢ On-demand network access with high potential for congestion

However, for the second leg a different protocol stack would be necessary. Electronic communication between a tracking station and a robotic spacecraft in deep space is generally characterized by:

¢ Very large signal propagation latencies (on the order of minutes; Fig. 2)
¢ Relatively low data rates (typically 8-256 kb/s)
¢ Possibly time-disjoint periods of reception and transmission, due to orbital mechanics and/or spacecraft operational policy
¢ Intermittent scheduled connectivity
¢ Centrally managed access to the communication channel with essentially no potential for congestion

The combination of ling signal propagation times and intermittent connectivity-caused, for example, by the interposition of a planetary body between the sender and the receiver-can result in round-trip communication delays measured not in milliseconds or even minutes but in hours or days. The Internet protocols do not behave well under these conditions, for reasons discussed later in this article.

Yet a retransmission protocol of some sort is required to assure that every bit of the new executable module is correctly received. Forward error correction (FEC) can reduce data loss and corruption, but it consumes bandwidth whether data are lost or not, and it offers no protection against sustained outage. Optimum utilization of meager links demands automated repeat request (ARO) in addition to some level of FEC what in needed on this part of the route is an ARO system fir efficient retransmission on the link.

Recent developments in deep space communications technology have begun to address this problem. Over the past 20 years the Consultative Committee for Space Data Systems (CCSDS) has established a wide range of standards for deep space communications, including Telecommand and Telemetry wireless link protocols for spacecraft operations. A recent addition to this program is the CCSDS File Delivery protocol (CFDP) which is designed for reliable file transfer across interplanetary distances .The CFDPRP link ARQ system in Fig. 1 is a hypothetical protocol that would be constructed by, in essence, implementing just the data retransmission procedures specified for CFDP. (Note that although CFDP implementations exist, the CFDP-RP stand alone subset has not yet been isolated for the purpose proposed here.)

For the final delivery of the module from the relay orbiters to the weather station on its wireless LAN, TCP/RP might again be the best choice .But now TCP/IP would be running over wireless link protocols, perhaps CCSDS Proximity-1 to the satellites and 802.11b among the landed assets. As in interplanetary space, and in contrast to the wired Internet, data rates on these links are likely to be fairly low, and the potential for congestion will be low for the foreseeable future.

Since no single stack will perform satisfactorily on all segments of the route, no single protocol immediately below the application layer is suitable for end-to-end use in this scenario. How then can the application operate?

This is not an altogether new problem. The three different sets of physical and operational constraints described above define very different networking environments. Protocols that enable effective communication within each of these environments have been developed and are continually being improved, and techniques already exist for forwarding data between environments that differ in less radical ways. For example, IP routers typically convey traffic between adjacent subnets running at different data rates; transport-level proxies can bridge between TCP connections tuned to different data loss profiles and relatively small differences in signal propagation time. But for large differences in the scale of round-trip latency, wholly different transport mechanisms are needed.


One approach to reliable transport that can tolerate extremely long and variable round-trip latency is reflected in the design of CFDP . CFDP can operate in either acknowledged (reliable) or unacknowledged mode; in acknowledged mode, lost or corrupted data are automatically retransmitted. CFDPâ„¢s design includes a number of measures adopted to enable robust operation of its ARQ system in high-latency environments:

¢ Because the time required establishing a connection might exceed the duration of a communication opportunity, there is no connection protocol; communication parameters are managed.
¢ Because round-trip latency may far exceed the time required to transmit a given file, CFDP never waits for acknowledgment of one transmission before beginning another. Therefore, the retransmitted data for one file may arrive long after the originally transmitted data for a subsequently issued file, so CFDP must attach a common transaction identifier to all messages pertaining to a given file transmission.
¢ Because a large number of file transmissions may concurrently be in various stages of transmission, retransmission buffers typically must be retained in nonvolatile storage; this can help prevent catastrophic communications failure in the event of an unplanned power cycle at either the sender or the receiver.

Download Full Report And Abstract


Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: delay tolerant networks, vhdl delay, delay tolerant networking ppt, dtn delay tolerant networking, timer delay calculation in lpc2148, social network analysis for information flow in disconnected delay tolerant manets ppt, on delay timer circuits,

Quick Reply
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  imouse full report computer science technology 3 3,636 17-06-2016 12:16 PM
Last Post: ashwiniashok
  computer networks full report seminar topics 7 4,906 25-05-2016 02:07 PM
Last Post: dhanyavp
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 5,002 10-05-2016 12:21 PM
Last Post: dhanyavp
  Optical Computer Full Seminar Report Download computer science crazy 43 34,290 29-04-2016 09:16 AM
Last Post: dhanyavp
Lightbulb Virtual Laser Keyboards (Download PPT,Abstract,Report) computer science crazy 493 104,789 28-03-2016 04:10 AM
Last Post: zotufalist
  ethical hacking full report computer science technology 41 46,794 18-03-2016 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 2,108 27-02-2016 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 19,491 11-02-2016 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 14,055 16-09-2015 02:51 PM
Last Post: seminar report asees
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 15,168 08-06-2015 03:26 PM
Last Post: seminar report asees