0% found this document useful (0 votes)
8 views3 pages

Delay-Tolerant Networking

Nothing

Uploaded by

rohit451977
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views3 pages

Delay-Tolerant Networking

Nothing

Uploaded by

rohit451977
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Definition of Delay-Tolerant Networking in WSN:

Delay-Tolerant Networking (DTN) in WSNs is a networking model that


enables communication between sensor nodes when an end-to-end path between
the source and destination does not exist or is frequently disrupted. DTNs use
intermediate nodes to store data temporarily until a communication path
becomes available, ensuring eventual data delivery.

Issues in Delay-Tolerant Networking for WSNs:

1. Intermittent Connectivity:
o In WSNs, sensor nodes may have limited communication windows
due to energy-saving sleep schedules, sparse deployment, or
environmental obstacles. This results in frequent disruptions in
connectivity, making continuous data transmission difficult.
2. Energy Constraints:
o Sensor nodes in WSNs are often battery-powered and have strict
energy limitations. DTN’s store-and-forward mechanism can
consume significant energy resources, as nodes need to store data
and wait for forwarding opportunities.
3. Storage Limitations:
o Sensor nodes have limited memory, so their capacity to store data
while waiting for a transmission opportunity is constrained. When
the buffer is full, new data may be dropped, leading to data loss in
the network.
4. Long Delays:
o In DTN-based WSNs, data may experience long delays due to
infrequent transmission opportunities. These delays are caused by
factors like node mobility, scheduled wake-up times, or
environmental disruptions.

Basic Approaches in Delay-Tolerant Networking for WSNs:

1. Store-Carry-and-Forward Mechanism:
o Description: This is the fundamental technique in DTN for WSNs.
When a node is unable to forward data immediately due to lack of
connectivity, it stores the data in its buffer until it encounters
another node or a communication link becomes available.
o Example: In a wildlife monitoring WSN, a mobile node (like a
drone) collects data from sensors and carries it until it comes
within range of a data collection point.
2. Custody Transfer:
o Description: In this approach, a sensor node that forwards a
message to another node can transfer the "custody" of the message
to that node. The receiving node then becomes responsible for
ensuring that the message is delivered, providing a reliable handoff
of data.
o Advantages: Reduces the risk of data loss by ensuring that once a
message is handed off, the previous node can release it from its
buffer, freeing storage space.
3. Energy-Efficient DTN Routing:
o Description: Energy-efficient routing algorithms are essential in
WSNs to minimize the energy consumed by nodes while storing
and forwarding data. These algorithms optimize message
transmission based on node energy levels, transmission power, and
delay tolerance.
o Examples:
 Energy-Aware Epidemic Routing: Limits the number of
message replications in the network to save energy while
maintaining reliable delivery.
 Sleep Scheduling: Coordinates the sleep cycles of sensor
nodes to conserve energy, waking up nodes only when
necessary for data transmission.
4. Bundle Protocol (BP):
o Description: The Bundle Protocol operates above traditional
transport protocols, managing the storage, forwarding, and
eventual delivery of application data in DTNs. It segments data
into "bundles" and allows nodes to store bundles until they find a
suitable forwarding opportunity.
o Features:
 Fragmentation: Large data bundles can be fragmented, and
reassembled at the destination to ensure delivery even if the
network is unreliable.
 Custody Transfer: Nodes can transfer responsibility for
delivering bundles, providing reliability.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy