Rapid increases in cellular data traffic demand creative alternative delivery vectors for data. Despite the conceptual attractiveness of mobile data offloading, no concrete web server architectures integrate intelligent offloading in a production-ready and easily deployable manner without relying on vast infrastructural changes to carriers' networks. Delay-tolerant networking technology offers the means to do just this. We introduce MADServer, a novel DTN-based architecture for mobile data offloading that splits web content among multiple independent delivery vectors based on user and data context. It enables intelligent data offloading, caching, and querying solutions which can be incorporated in a manner that still satisfies user expectations for timely delivery. At the same time, it allows for users who have poor or expensive connections to the cellular network to leverage multi-hop opportunistic routing to send and receive data. We also present a preliminary implementation of MADServer and provide real-world performance evaluations.
{"title":"MADServer: a server architecture for mobile advanced delivery","authors":"A. Petz, Anders Lindgren, Pan Hui, C. Julien","doi":"10.1145/2348616.2348621","DOIUrl":"https://doi.org/10.1145/2348616.2348621","url":null,"abstract":"Rapid increases in cellular data traffic demand creative alternative delivery vectors for data. Despite the conceptual attractiveness of mobile data offloading, no concrete web server architectures integrate intelligent offloading in a production-ready and easily deployable manner without relying on vast infrastructural changes to carriers' networks. Delay-tolerant networking technology offers the means to do just this. We introduce MADServer, a novel DTN-based architecture for mobile data offloading that splits web content among multiple independent delivery vectors based on user and data context. It enables intelligent data offloading, caching, and querying solutions which can be incorporated in a manner that still satisfies user expectations for timely delivery. At the same time, it allows for users who have poor or expensive connections to the cellular network to leverage multi-hop opportunistic routing to send and receive data. We also present a preliminary implementation of MADServer and provide real-world performance evaluations.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134556422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Partridge, R. Walsh, M. Gillen, G. Lauer, J. Lowry, W. Strayer, D. Kong, David Levin, J. Loyall, M. Paulitsch
We present a content network architecture for a cluster of satellites flying in low Earth orbit. The cluster uses a dynamic wireless network to interconnect the satellites and has an intermittent link to the ground. Even though a cluster of satellites fly in formation, their relative positions can vary widely, and occasionally the cluster can disperse and regroup in order to avoid obstacles or to affect a better arrangement. The network, therefore, is a MANET with elements of a disruption tolerant network. Further, data security is a fundamental concern. Our approach is to layer a content network over the wireless network, supporting multiple qualities of service and multiple independent levels of security.
{"title":"A secure content network in space","authors":"C. Partridge, R. Walsh, M. Gillen, G. Lauer, J. Lowry, W. Strayer, D. Kong, David Levin, J. Loyall, M. Paulitsch","doi":"10.1145/2348616.2348626","DOIUrl":"https://doi.org/10.1145/2348616.2348626","url":null,"abstract":"We present a content network architecture for a cluster of satellites flying in low Earth orbit. The cluster uses a dynamic wireless network to interconnect the satellites and has an intermittent link to the ground. Even though a cluster of satellites fly in formation, their relative positions can vary widely, and occasionally the cluster can disperse and regroup in order to avoid obstacles or to affect a better arrangement. The network, therefore, is a MANET with elements of a disruption tolerant network. Further, data security is a fundamental concern. Our approach is to layer a content network over the wireless network, supporting multiple qualities of service and multiple independent levels of security.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114136793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we present a series of experiments that evaluate the performance of two DTN implementations, DTN2 and IBR-DTN, in urban mobility scenarios. The experiments were carried out on the wireless network emulation testbed named QOMB, which was extended to support such DTN evaluations. Our quantitative assessment verified the basic behavior of the DTN implementations, but also identified scalability issues for DTN2 in scenarios with as few as 26 nodes. These results emphasize the need for more extensive large-scale experiments with DTN applications and protocols for comprehensive evaluations in view of functionality validation and performance optimization. This can be readily achieved through the use of emulation testbeds such as the one that we have developed.
{"title":"Performance evaluation of DTN implementations on a large-scale network emulation testbed","authors":"R. Beuran, Shinsuke Miwa, Y. Shinoda","doi":"10.1145/2348616.2348624","DOIUrl":"https://doi.org/10.1145/2348616.2348624","url":null,"abstract":"In this paper we present a series of experiments that evaluate the performance of two DTN implementations, DTN2 and IBR-DTN, in urban mobility scenarios. The experiments were carried out on the wireless network emulation testbed named QOMB, which was extended to support such DTN evaluations. Our quantitative assessment verified the basic behavior of the DTN implementations, but also identified scalability issues for DTN2 in scenarios with as few as 26 nodes. These results emphasize the need for more extensive large-scale experiments with DTN applications and protocols for comprehensive evaluations in view of functionality validation and performance optimization. This can be readily achieved through the use of emulation testbeds such as the one that we have developed.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124051820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Opportunistic networking between mobile devices relies on the capabilities of those devices to establish ad-hoc communication among each other. While the two dominant wireless interface technologies, IEEE 802.11 wireless LAN and Bluetooth, offer such capabilities in theory, limitations of the protocol specification, chipsets, and operating systems in mobile devices render those features largely unusable in practice. Researchers have recognized these shortcomings and devised mechanisms in which mobile devices act as WLAN access points to simulate WLAN infrastructure-based operation. In this paper, we complement these approaches by instrumenting commercial WLAN APs that do not employ L2 security to serve as link layer packet relays without requiring the mobile nodes to authenticate with the WLAN hot-spot. We present different mechanisms for peer discovery, evaluate their feasibility for a set of commercial hot-spots, and discuss operational considerations for fair use of commercial access points.
{"title":"Enabling ad-hoc-style communication in public WLAN hot-spots","authors":"Teemu Kärkkäinen, M. Pitkänen, J. Ott","doi":"10.1145/2348616.2348623","DOIUrl":"https://doi.org/10.1145/2348616.2348623","url":null,"abstract":"Opportunistic networking between mobile devices relies on the capabilities of those devices to establish ad-hoc communication among each other. While the two dominant wireless interface technologies, IEEE 802.11 wireless LAN and Bluetooth, offer such capabilities in theory, limitations of the protocol specification, chipsets, and operating systems in mobile devices render those features largely unusable in practice. Researchers have recognized these shortcomings and devised mechanisms in which mobile devices act as WLAN access points to simulate WLAN infrastructure-based operation. In this paper, we complement these approaches by instrumenting commercial WLAN APs that do not employ L2 security to serve as link layer packet relays without requiring the mobile nodes to authenticate with the WLAN hot-spot. We present different mechanisms for peer discovery, evaluate their feasibility for a set of commercial hot-spots, and discuss operational considerations for fair use of commercial access points.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123029287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Over the past decade, a lot of research has been done to develop efficient routing protocols for Delay- and Disruption Tolerant Networks (DTNs). In the course of this work, many comparative evaluation studies have been done to determine which of two proposed protocols is the better one (for a given situation). The majority of these evaluations are based on results gained from simulated network environments. In order to conduct a relevant evaluation of routing schemes, numerous conditions, policies and data need to be specified and fed into the simulation environment. The aim of our work in this paper is to discuss current DTN evaluation practices through a thorough and critical literature study. Based on the surveyed material, we show some weaknesses and lack of argumentation used in the evaluations. Through this, we hope to aid in bridging the gap between simulated and real-world DTN environments. In addition, and as a call for further research, we propose a model for evaluation of DTN routing schemes that outlines the most crucial inputs that needs to be considered in the evaluation process. This model is then projected onto evaluation practices used for evaluations of DTN routing protocols in a set of sixteen papers roughly covering a decade of DTN research.
{"title":"An analysis of evaluation practices for DTN routing protocols","authors":"S. Grasic, Anders Lindgren","doi":"10.1145/2348616.2348629","DOIUrl":"https://doi.org/10.1145/2348616.2348629","url":null,"abstract":"Over the past decade, a lot of research has been done to develop efficient routing protocols for Delay- and Disruption Tolerant Networks (DTNs). In the course of this work, many comparative evaluation studies have been done to determine which of two proposed protocols is the better one (for a given situation). The majority of these evaluations are based on results gained from simulated network environments. In order to conduct a relevant evaluation of routing schemes, numerous conditions, policies and data need to be specified and fed into the simulation environment. The aim of our work in this paper is to discuss current DTN evaluation practices through a thorough and critical literature study. Based on the surveyed material, we show some weaknesses and lack of argumentation used in the evaluations. Through this, we hope to aid in bridging the gap between simulated and real-world DTN environments. In addition, and as a call for further research, we propose a model for evaluation of DTN routing schemes that outlines the most crucial inputs that needs to be considered in the evaluation process. This model is then projected onto evaluation practices used for evaluations of DTN routing protocols in a set of sixteen papers roughly covering a decade of DTN research.","PeriodicalId":211112,"journal":{"name":"CHANTS '12","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2012-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127168277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}