• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 2
  • Tagged with
  • 12
  • 12
  • 12
  • 6
  • 6
  • 6
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A routing architecture for delay tolerant networks

Enderle, Justin Wayne 11 July 2011 (has links)
As the field of Delay Tolerant Networking continues to expand and receive more attention, a new class of routing algorithms have been proposed that are specifically tailored to perform in a network where no end to end paths between devices are assumed to exist. As the number of proposed routing algorithms has grown, it has become difficult to fully understand their similarities and differences. Although published results clearly show different performance results between algorithms, it can be difficult to pinpoint which of their characteristics are most responsible for their performance differences. This thesis proposes an architectural framework to define the underlying features that Delay Tolerant Network routing algorithms are composed of. Popular routing algorithms from research are discussed and shown to be compositions of the proposed architectural features, thereby validating the architecture itself. The architectural framework is also shown to be a useful guide to developing a modular and configurable simulation platform. Algorithms from literature were implemented as a composition of features, which can easily be modified and combined later to define and implement new algorithms. Better understanding the underlying structure and similarities between different routing algorithm approaches is key to truly analyzing their performance and obtaining a deep understanding of which components of an algorithm have the most influence, both positively and negatively, on the results. Armed with this knowledge, designers of Delay Tolerant Networks can more easily determine the proper composition of routing algorithm features to best fit their needs. / text
2

Bundle Security: Verifying Confidentiality and Integrity for the Interplanetary Overlay Network

Lindner, Patricia J. 11 June 2019 (has links)
No description available.
3

An analytical model for pedestrian content distribution in a grid of streets

Vukadinovic, Vladimir, Karlsson, Gunnar, Helgason, Ólafur January 2012 (has links)
Mobile communication devices may be used for spreading multimedia data without support of an infrastructure. Such a scheme, where the data is carried by people walking around and relayed from device to device by means of short range radio, could potentially form a public content distribution system that spans vast urban areas. The transport mechanism is the flow of people and it can be studied but not engineered. We study the efficiency of pedestrian content distribution by modeling the mobility of people moving around in a city, constrained by a given topology. The model is supplemented by simulation of similar or related scenarios for validation and extension. The results show that contents spread well with pedestrian speeds already at low arrival rates into a studied region. Our contributions are both the queuing analytic model that captures the flow of people and the results on the feasibility of pedestrian content distribution. / <p>QC 20130109</p>
4

Enabling Censorship Tolerant Networking

Oliver, Earl 17 December 2012 (has links)
Billions of people in the world live under heavy information censorship. We propose a new class of delay tolerant network (DTN), known as a censorship tolerant network (CTN), to counter the growing practice of Internet-based censorship. CTNs should provide strict guarantees on the privacy of both information shared within the network and the identities of network participants. CTN software needs to be publicly available as open source software and run on personal mobile devices with real-world computational, storage, and energy constraints. We show that these simple assumptions and system constraints have a non-obvious impact on the design and implementation of CTNs, and serve to differentiate our system design from previous work. We design data routing within a CTN using a new paradigm: one where nodes operate selfishly to maximize their own utility, make decisions based only on their own observations, and only communicate with nodes they trust. We introduce the Laissez-faire framework, an incentivized approach to CTN routing. Laissez-faire does not mandate any specific routing protocol, but requires that each node implement tit-for-tat by keeping track of the data exchanged with other trusted nodes. We propose several strategies for valuing and retrieving content within a CTN. We build a prototype BlackBerry implementation and conduct both controlled lab and field trials, and show how each strategy adapts to different network conditions. We further demonstrate that, unlike existing approaches to routing, Laissez-faire prevents free-riding. We build an efficient and reliable data transport protocol on top of the Short Message Service (SMS) to serve a control channel for the CTN. We conduct a series of experiments to characterise SMS behaviour under bursty, unconventional workloads. This study examines how variables such as the transmission order, delay between transmissions, the network interface used, and the time-of-day affect the service. We present the design and implementation of our transport protocol. We show that by adapting to the unique channel conditions of SMS we can reduce message overheads by as much as 50\% and increase data throughput by as much as 545% over the approach used by existing applications. A CTN's dependency on opportunistic communication imposes a significant burden on smartphone energy resources. We conduct a large-scale user study to measure the energy consumption characteristics of 20100 smartphone users. Our dataset is two orders of magnitude larger than any previous work. We use this dataset to build the Energy Emulation Toolkit (EET) that allows developers to evaluate the energy consumption requirements of their applications against real users' energy traces. The EET computes the successful execution rate of energy-intensive applications across all users, specific devices, and specific smartphone user-types. We also consider active adaptation to energy constraints. By classifying smartphone users based on their charging characteristics we demonstrate that energy level can be predicted within 72% accuracy a full day in advance, and through an Energy Management Oracle energy intensive applications, such as CTNs, can adapt their execution to maintain the operation of the host device.
5

Enabling Censorship Tolerant Networking

Oliver, Earl 17 December 2012 (has links)
Billions of people in the world live under heavy information censorship. We propose a new class of delay tolerant network (DTN), known as a censorship tolerant network (CTN), to counter the growing practice of Internet-based censorship. CTNs should provide strict guarantees on the privacy of both information shared within the network and the identities of network participants. CTN software needs to be publicly available as open source software and run on personal mobile devices with real-world computational, storage, and energy constraints. We show that these simple assumptions and system constraints have a non-obvious impact on the design and implementation of CTNs, and serve to differentiate our system design from previous work. We design data routing within a CTN using a new paradigm: one where nodes operate selfishly to maximize their own utility, make decisions based only on their own observations, and only communicate with nodes they trust. We introduce the Laissez-faire framework, an incentivized approach to CTN routing. Laissez-faire does not mandate any specific routing protocol, but requires that each node implement tit-for-tat by keeping track of the data exchanged with other trusted nodes. We propose several strategies for valuing and retrieving content within a CTN. We build a prototype BlackBerry implementation and conduct both controlled lab and field trials, and show how each strategy adapts to different network conditions. We further demonstrate that, unlike existing approaches to routing, Laissez-faire prevents free-riding. We build an efficient and reliable data transport protocol on top of the Short Message Service (SMS) to serve a control channel for the CTN. We conduct a series of experiments to characterise SMS behaviour under bursty, unconventional workloads. This study examines how variables such as the transmission order, delay between transmissions, the network interface used, and the time-of-day affect the service. We present the design and implementation of our transport protocol. We show that by adapting to the unique channel conditions of SMS we can reduce message overheads by as much as 50\% and increase data throughput by as much as 545% over the approach used by existing applications. A CTN's dependency on opportunistic communication imposes a significant burden on smartphone energy resources. We conduct a large-scale user study to measure the energy consumption characteristics of 20100 smartphone users. Our dataset is two orders of magnitude larger than any previous work. We use this dataset to build the Energy Emulation Toolkit (EET) that allows developers to evaluate the energy consumption requirements of their applications against real users' energy traces. The EET computes the successful execution rate of energy-intensive applications across all users, specific devices, and specific smartphone user-types. We also consider active adaptation to energy constraints. By classifying smartphone users based on their charging characteristics we demonstrate that energy level can be predicted within 72% accuracy a full day in advance, and through an Energy Management Oracle energy intensive applications, such as CTNs, can adapt their execution to maintain the operation of the host device.
6

Programming Support for a Delay-Tolerant Web of Things / Support de programmation pour un Web des objets tolérant les délais

Auzias, Maël 03 October 2017 (has links)
L'internet des Objets (IoT) est habituellement présenté comme l'ensemble d'objets interconnectés à travers un réseau qui est, en pratique, Internet. Or, il existe beaucoup de cas où la connectivité est intermittente à cause des interfaces radio courte-portées et des contraintes d'économie d'énergie. L'architecture de réseautage tolérant les délais (DTN) ainsi que le Bundle Protocole (BP) sont considérés comme des solutions viables pour résoudre ce genre de challenges grâce au mécanisme store-carry-and-forward. Cette thèse vise à fournir des supports de programmation adaptés autant à l'IoT qu'au contexte DTN. Dans ce but, les challenges relevant du DTN et de l'IoT (DT-IoT) sont étudiés et quelques principes de design logiciels sont proposés. Ces principes ont pour but d'optimiser la réactivité et l'efficacité des applications ayant pour cible un contexte DT- IoT. La première contribution est la définition d'un support de programmation orienté ressources, nommé BoaP. Ce support fournit un protocole de requête/réponse grâce à une transposition de CoAP (Contrained Application Protocol). Cette transposition est composée d'ajustements fondamentaux et d'améliorations pour utiliser BP en tant que couche de transport. BoaP a été implémenté et testée dans un petit réseau physique. Une méthode pour évaluer des intergiciels dans des réseaux DTNs est présentée. Un outil implémentant cette méthode a été développé. Il repose sur une plateforme de virtualisation qui simule les contacts réseaux tout en émulant les nœuds du réseau. Cet outil a été utilisé pour exécuter des expériences pour évaluer la validité de BoaP. Enfin, un autre support de programmation est examiné. Celui-ci adopte une approche orientée service et respecte les contraintes REST (Representational State Transfer). Il se repose sur BoaP a été créé avec l'IoT en tête et est adapté à l’environnement DTN. La découverte exploite une interface de publications/souscriptions. Les descripteurs de services contiennent des champs spécifiques pour informer de la disponibilité de leur fournisseurs. / The Internet of Things (IoT) is usually presented as a set of THINGS interconnected through a network that is, in practice, Internet. However, there exist many contexts in which the connectivity is intermittent due to short-range wireless communication means or energy constraints. The Delay Tolerant Networking (DTN) architecture and the Bundle Protocol (BP) are known to overcome this communication challenge as they provide communication means by relying on a store-carry-and- forward mechanism. This thesis aims to provide programming supports adapted to both IoT and DTN contexts. For this, both DTN and IoT (DT-IoT) challenges are studied and several design principles are proposed. These principles aim to optimize reactivity and efficiency of applications targeting the DT-IoT context. The first contribution is the definition of a resource-oriented programming support, named BoaP, to enable a DT-IoT. It provides a protocol based on request/response thanks to a transposition of CoAP (Contrained Application Protocol). This transposition consists of fundamental adjustments and enhancements to use BP as the underlying transport protocol. BoaP has been implemented and tested in a small physical network. A method to evaluate middleware systems in DTNs is presented. A tool implementing this method has been developed. It relies on a virtualization platform that simulates network contacts and emulates network devices. This tool was used to run experimentations that assessed the validity of BoaP. Finally, another programming support is investigated. It follows a service-oriented approach and respects REST (Representational State Transfer) constraints. It is built on top of BoaP with IoT in mind and is adapted to DTN environments. Its discovery/advertisement exploits a publish/subscribe interface. Service descriptors contain specific fields to inform on the availability of the service providers. %Finally, requests are extended with some options to enforce conditions on geographic or time context.
7

Application of Machine Learning Techniques to Delay Tolerant Network Routing

Dudukovich, Rachel 29 January 2019 (has links)
No description available.
8

Pervasive Service Provisioning in Intermittently Connected Hybrid Networks / Conception d’un support de communication opportuniste pour les services pervasifs

Makke, Ali 03 March 2015 (has links)
La vision de l'informatique ubiquitaire permettant de construire des espaces intelligents interactifs dans l'environnement physique passe, peu à peu, du domaine de la recherche à la réalité. La capacité de calcul ne se limite plus à l'ordinateur personnel mais s'intègre dans de multiples appareils du quotidien, et ces appareils deviennent, grâce à plusieurs interfaces, capables de communiquer directement les uns avec les autres ou bien de se connecter à Internet.Dans cette thèse, nous nous sommes intéressés à un type d'environnement cible de l'informatique ubiquitaire qui forme ce que nous appelons un réseau hybride à connexions intermittentes (ICHN). Un ICHN est un réseau composé de deux parties : une partie fixe et une partie mobile. La partie fixe est constituée de plusieurs infostations fixes (potentiellement reliées entre elles avec une infrastructure fixe, typiquement l'Internet). La partie mobile, quant à elle, est constituée de smartphones portés par des personnes nomades. Tandis que la partie fixe est principalement stable, la partie mobile pose un certain nombre de défis propres aux réseaux opportunistes. En effet, l'utilisation de moyens de communication à courte portée couplée à des déplacements de personnes non contraints et à des interférences radio induit des déconnexions fréquentes. Le concept du "store, carry and forward" est alors habituellement appliqué pour permettre la communication sur l'ensemble du réseau. Avec cette approche, un message peut être stocké temporairement sur un appareil avant d'être transféré plus tard quand les circonstances sont plus favorables. Ainsi, n'importe quel appareil devient un relai de transmission opportuniste qui permet de faciliter la propagation d'un message dans le réseau. Dans ce contexte, la fourniture de services est particulièrement problématique, et exige de revisiter les composants principaux du processus de fourniture, tels que la découverte et l'invocation de service, en présence de ruptures de connectivité et en l'absence de chemins de bout en bout. Cette thèse aborde les problèmes de fourniture de service sur l'ensemble d'un ICHN et propose des solutions pour la découverte de services, l'invocation et la continuité d'accès. En ce qui concerne le défi de la découverte de services, nous proposons TAO-DIS, un protocole qui met en œuvre un mécanisme automatique et rapide de découverte de services. TAO-DIS tient compte de la nature hybride d'un ICHN et du fait que la majorité des services sont fournis par des infostations. Il permet aux utilisateurs mobiles de découvrir tous les services dans l'environnement afin d'identifier et de choisir les plus intéressants. Pour permettre aux utilisateurs d'interagir avec les services découverts, nous introduisons TAO-INV. TAO-INV est un protocole d'invocation de service spécialement conçu pour les ICHN. Il se fonde sur un ensemble d'heuristiques et de mécanismes qui assurent un acheminement efficace des messages (des requêtes et des réponses de services) entre les infostations fixes et les clients mobiles tout en conservant un surcoût et des temps de réponses réduits. Puisque certaines infostations dans le réseau peuvent être reliées entre elles, nous proposons un mécanisme de continuité d'accès (handover) qui modifie le processus d'invocation pour réduire les délais de délivrance. Dans sa définition, il est tenu compte de la nature opportuniste de la partie mobile de l'ICHN. Nous avons mené diverses expérimentations pour évaluer nos solutions et les comparer à d'autres protocoles conçus pour des réseaux ad hoc et des réseaux opportunistes. Les résultats obtenus tendent à montrer que nos solutions surpassent ces autres protocoles, notamment grâce aux optimisations que nous avons développées pour les ICHN. À notre avis, construire des protocoles spécialisés qui tirent parti des techniques spécifiquement conçues pour les ICHN est une approche à poursuivre en complément des recherches sur des protocoles de communication polyvalents / The vision of pervasive computing of building interactive smart spaces in the physical environment is gradually heading from the research domain to reality. Computing capacity is moving beyond personal computers to many day-to-day devices, and these devices become, thanks to multiple interfaces, capable of communicating directly with one another or of connecting to the Internet.In this thesis, we are interested in a kind of pervasive computing environment that forms what we call an Intermittently Connected Hybrid Network (ICHN). An ICHN is a network composed of two parts: a fixed and a mobile part. The fixed part is formed of some fixed infostations (potentially connected together with some fixed infrastructure, typically the Internet). The mobile part, on the other hand, is formed of smartphones carried by nomadic people. While the fixed part is mainly stable, the mobile part is considered challenging and form what is called an Opportunistic Network. Indeed, relying on short-range communication means coupled with the free movements of people and radio interferences lead to frequent disconnections. To perform a network-wide communication, the "store, carry and forward" approach is usually applied. With this approach, a message can be stored temporarily on a device, in order to be forwarded later when circumstances permit. Any device can opportunistically be used as an intermediate relay to facilitate the propagation of a message from one part of the network to another. In this context, the provisioning of pervasive services is particularly challenging, and requires revisiting important components of the provisioning process, such as performing pervasive service discovery and invocation with the presence of connectivity disruptions and absence of both end-to-end paths and access continuity due to user mobility. This thesis addresses the problems of providing network-wide service provisioning in ICHNs and proposes solutions for pervasive service discovery, invocation and access continuity. Concerning service discovery challenge, we propose TAO-DIS, a service discovery protocol that performs an automatic and fast service discovery mechanism. TAO-DIS takes into account the hybrid nature of an ICHN and that the majority of services are provided by infostations. It permits mobile users to discover all the services in the surrounding environment in order to identify and choose the most convenient ones. To allow users to interact with the discovered services, we introduce TAO-INV. TAO-INV is a service invocation protocol specifically designed for ICHNs. It relies on a set of heuristics and mechanisms that ensures performing efficient routing of messages (both service requests and responses) between fixed infostations and mobile clients while preserving both low values of overhead and round trip delays. Since some infostations in the network might be connected, we propose a soft handover mechanism that modifies the invocation process in order to reduce service delivery delays. This handover mechanism takes into consideration the opportunistic nature of the mobile part of the ICHN. We have performed various experiments to evaluate our solutions and compare them with other protocols designed for ad hoc and opportunistic networks. The obtained results tend to prove that our solutions outperform these protocols, namely thanks to the optimizations we have developed for ICHNs. In our opinion, building specialized protocols that benefit from techniques specifically designed for ICHNs is an approach that should be pursued, in complement with research works on general-purpose communication protocols
9

Compression of Endpoint Identifiers in Delay Tolerant Networking

Young, David A. January 2013 (has links)
No description available.
10

Satisfying End to End Quality of Service Requirements in DTN Environments

Deshpande, Jayram A. 28 December 2006 (has links)
No description available.

Page generated in 0.0779 seconds