1 / 13

Progetto IS-MANET

Progetto IS-MANET. ISTI - Pisa. Ongoing research: System Model. Autonomous system of mobile hosts connected by wireless links. Ongoing research. Routing protocols Dependable and secure data storage and retrieval Applications: Emergency services

brook
Download Presentation

Progetto IS-MANET

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Progetto IS-MANET ISTI - Pisa

  2. Ongoing research:System Model • Autonomous system of mobile hosts connected by wireless links

  3. Ongoing research • Routing protocols • Dependable and secure data storage and retrieval Applications: • Emergency services • Communication support in hostile environments

  4. Virtual Routing Protocol (1) • Defines a Logical Structure of the network • Each mobile implements two roles: peer and scout (to multiple peers) • Every peer is assigned a set of scouts • The scouts maintain a path to the assigned peers • Three protocols: • Route acquisition • Communication route maintenance • Route maintenance

  5. Virtual Routing Protocol (2) Logical Structure

  6. Virtual Routing Protocol (3) Route acquisition • The source sets up a virtual path • Computed on the logical structure • It is a sequence of scouts Redundancy of the logical structure: multiple virtual paths

  7. Virtual Routing Protocol (4) Route acquisition Setting a Physical path exploiting the information held by the scouts in the logical path u3 u2 u1 u0

  8. u4 Virtual Routing Protocol (5) Communication Route Maintenance • Used when a communication path gets broken • Selects a different logical path u0 u1 u4 u3 u5 u6 u2

  9. Virtual Routing Protocol (6) Route Maintenance • Used by the scouts to keep the path to the peered mobiles • Activated by failures in the route setup procedure • Low priority protocol • Similar to the route discovery of reactive protocols

  10. Dependable and Secure Data Storage and Retrieval Model • The mobiles cooperate by: • creating and sharing files • The system provides procedures to: • Create, share and reading of files Data dependability and confidentiality are important issues

  11. Dependable and Secure Data Storage and Retrieval • The file is encoded using a redundant code • A file of n records in encoded into n+d records • Each record is stored in a different mobile • a file descriptor keeps track of the records • File sharing by distributing the file descriptor Issues: • Choice of the redundant code • How to ensure data confidentiality

  12. Dependable and Secure Data Storage and Retrieval Data Encoding: • By means of RRNS (Redundant Residue Number System) • File creator defines n+r moduli (pairwise positive integers) • The file is encoded into n+r records hosted in different mobiles • The file descriptor is a mapping between moduli and hosting mobiles Features: • Data availability: • The file can be read if h records are unavailable and k records are corrupted, provided h+2kr • Data confidentiality: • No information can be read unless the file descriptor is known • Data sharing: • Encrypted distribution of the file descriptor

  13. Connessione tra MANET e reti satellitarie

More Related