翻訳と辞書
Words near each other
・ Routine Breathing
・ Routine Check
・ Routine health outcomes measurement
・ Routine Love Story
・ Routine Valor
・ Routing
・ Routing (disambiguation)
・ Routing (electronic design automation)
・ Routing (hydrology)
・ Routing and Remote Access Service
・ Routing and wavelength assignment
・ Routing Assets Database
・ Routing bridge
・ Routing domain
・ Routing in cellular networks
Routing in delay-tolerant networking
・ Routing in the PSTN
・ Routing indicator
・ Routing Information Protocol
・ Routing loop problem
・ Routing Policy Specification Language
・ Routing protocol
・ Routing table
・ Routing Table Maintenance Protocol
・ Routing transit number
・ Routledge
・ Routledge (surname)
・ Routledge Approaches to History
・ Routledge Encyclopedia of Philosophy
・ Routledge Studies in Medieval Religion and Culture


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Routing in delay-tolerant networking : ウィキペディア英語版
Routing in delay-tolerant networking
Routing in delay-tolerant networking concerns itself with the
ability to transport, or route, data from a source to a
destination, which is a fundamental ability all communication networks must
have. Delay- and disruption-tolerant networks
(DTNs)
are characterized by their lack of connectivity, resulting in a lack of instantaneous end-to-end paths. In these challenging environments, popular ad hoc routing protocols such as AODV〔C. E. Perkins and E. M. Royer. Ad hoc on-demand distance vector routing. In The Second IEEE Workshop on Mobile Computing Systems and Applications, February 1999.〕 and DSR〔D. B. Johnson and D. A. Maltz. Mobile Computing, chapter Dynamic source routing in ad hoc wireless networks, pages 153–181. Kluwer Academic Publishers, February 1996.〕 fail to establish routes. This is due to these protocols trying to first establish a complete route and then, after the route has been established, forward the actual data. However, when instantaneous end-to-end paths are difficult or impossible to establish, routing protocols must take to a "store and forward" approach, where data is
incrementally moved and stored throughout the network in hopes that it will eventually reach its destination.〔John Burgess,
Brian Gallagher, David Jensen, and Brian Neil Levine. MaxProp: Routing for vehicle-based disruption-tolerant networks. In Proc. IEEE INFOCOM, April
2006.〕〔Philo Juang, Hidekazu Oki, Yong Wang, Margaret Martonosi,
Li Shiuan Peh, and Daniel Rubenstein. Energy-efficient computing
for wildlife tracking: design tradeoffs and early experiences with
zebranet. SIGOPS Oper. Syst. Rev., 36(5):96–107, 2002.〕〔Augustin
Chaintreau, Pan Hui, Jon Crowcroft, Christophe Diot, Richard Gass,
and James Scott. Impact of human mobility on opportunistic forwarding
algorithms. IEEE Transactions on Mobile Computing, 6(6):606–620,
2007.〕 A common technique used to
maximize the probability of a message being successfully transferred is to
replicate many copies of the message in hopes that one will succeed in
reaching its destination.〔Amin Vahdat and
David Becker. Epidemic routing for partially connected ad hoc
networks. Technical Report CS-2000-06, Department of Computer Science,
Duke University, April 2000.〕
== Routing considerations ==

There are many characteristics DTN protocols, including routing, must
take into consideration. A first consideration is if information
about future contacts is readily available. For example, in
interplanetary communications, many times a planet or moon
is the
cause of contact disruption, and large distance is the cause of
communication delay. However, due to the laws of physics, it is
possible to predict the future in terms of the times contacts will be
available, and how long they will last. These types of contacts are
known as ''scheduled'' or ''predictable contacts''.〔Sushant
Jain, Kevin Fall, and Rabin Patra. Routing in a delay-tolerant network. In
Proc. ACM SIGCOMM, 2004.〕 On the contrary, in
disaster recovery networks the future location of communicating
entities, such as emergency responders, may not be known. These types
of contacts are known as ''intermittent'' or ''opportunistic contacts''.
A second consideration is if mobility can be exploited and, if so,
which nodes are mobile. There are three major cases, classifying the
level of mobility in the network. First, it is possible that there
are no mobile entities. In this case, contacts appear and disappear
based solely on the quality of the communication channel between them.
For instance, in interplanetary networks, large objects in space, such
as planets, can block communicating nodes for a set period of time.
Second, it is possible that some, but not all, nodes in the network
are mobile. These nodes, sometimes referred to as Data Mules,〔Jea D.,
Somasundara A. A, and Srivastava M. B. Multiple Controlled Mobile Elements
(Data Mules) for Data Collection in Sensor Networks. In Proc. IEEE/ACM
International Conference on Distributed Computing in Sensor Systems
(DCOSS), June 2005.〕〔Rahul C. Shah, Sumit Roy, Sushant Jain,
and Waylon Brunette. Data MULEs: Modeling a Three-tier Architecture for
Sparse Sensor Networks. In Proc. IEEE SNPA Workshop, May 2003.〕
are exploited for their mobility. Since they are the primary
source of transitive communication between two non-neighboring nodes
in the network, an important routing question is how to properly
distribute data among these nodes. Third,
it is possible that the vast majority, if not all, nodes in the
network are mobile. In this case, a routing protocol will most
likely have more options available during contact opportunities, and
may not have to utilize each one.〔〔name="balasubramanian2007">Aruna Balasubramanian, Brian Neil
Levine, and Arun Venkataramani. DTN routing as a resource
allocation problem. In Proc. ACM SIGCOMM, August 2007.〕〔name="spyropoulos2005">Thrasyvoulos Spyropoulos, Konstantinos Psounis,
and Cauligi S. Raghavendra. Spray and wait: An efficient routing scheme
for intermittently connected mobile networks. In WDTN ’05: Proceeding of
the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, 2005.〕〔name="spyropoulos2007">Thrasyvoulos Spyropoulos, Konstantinos Psounis,
and Cauligi S. Raghavendra. Spray and focus: Efficient mobility-assisted
routing for heterogeneous and correlated mobility. In Fifth Annual
IEEE International Conference on Pervasive Computing and Communications
Workshops, 2007.〕 An example of this
type of network is a disaster recovery network where all nodes
(generally people and vehicles) are mobile.〔Samuel C. Nelson,
Albert F. Harris, and Robin Kravets. Event-driven, role-based mobility
in disaster recovery networks. In CHANTS 07: Proceedings of the second
workshop on Challenged Networks, 2007.〕 A second example is a
vehicular network where mobile cars, trucks, and buses act as
communicating entities.〔
A third consideration is the availability of network resources. Many
nodes, such as mobile phones, are limited in terms of storage space,
transmission rate, and battery life. Others, such as buses on the
road, may not be as limited. Routing protocols can utilize this
information to best determine how messages should be transmitted and
stored to not over-burden limited resources. As of April 2008, only recently has the
scientific community started taking resource management into
consideration, and this is still an active area of research.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Routing in delay-tolerant networking」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.