HCS: hierarchical cluster-based forwarding scheme for mobile social networks

Size: px
Start display at page:

Download "HCS: hierarchical cluster-based forwarding scheme for mobile social networks"

Transcription

1 Wireless Netw (2015) 21: DOI /s x HCS: hierarchical cluster-based forwarding scheme for mobile social networks Sun-Kyum Kim Ji-Hyeun Yoon Junyeop Lee Sung-Bong Yang Published online: 19 December 2014 Springer Science+Business Media New York 2014 Abstract Clustering has been shown to be a highly effective way to reduce network traffic in mobile ad hoc networks. Many clustering schemes have been proposed. However, none of these schemes can be directly applied to a mobile social network because they are designed for well-connected networks and require timely information sharing among the nodes. In this paper, we propose the hierarchical clustering-based forwarding scheme (HCS), which implements hierarchical clustering on social information. Each node constructs hierarchical clusters based on common neighbor similarity at the end of the warm-up period. The nodes then forward a message to other nodes based on the clustering information and similarity scores. HCS exploits the shortcuts on the path toward the destination node with the help of social similarity and node movement patterns. Experiments were performed on an NS-2 network simulator. The results show that HCS reduces network traffic compared to non-clustering schemes, such as Epidemic, SimBet, PRoPHET, and common neighbor similarity schemes, while maintaining acceptable transmission delay compared to the Wait scheme. S.-K. Kim J.-H. Yoon J. Lee S.-B. Yang (&) Department of Computer Science, Yonsei University, Seoul, Korea sbyang@cs.yonsei.ac.kr S.-K. Kim skyum@yonsei.ac.kr J.-H. Yoon y_chick@yonsei.ac.kr J. Lee kotzyi@yonsei.ac.kr Keywords Hierarchical clustering Forwarding Routing Mobile social network (MSN) NS-2 1 Introduction With advances in wireless communication technologies and the popularity of mobile devices, mobile social networks (MSNs) also known as opportunistic networks [1] or pocket switched networks [2] have rapidly become an increasingly popular field of networking research. MSNs are applicable to mobile wireless communications such as Sami Network Connectivity Project [3], Zebranet [4], Shared Wireless Info-Station [5], Vehicular Delay Tolerant Networks [6], and so on. MSNs have evolved from mobile ad hoc networks (MANETs) [7] and delay-tolerant networks (DTNs) (also known as disruption tolerant networks) [8] with social characteristics [9]. MSNs carry a more general concept with human-carried devices and include DTNs. Also, MSNs do not assume any compatibility with the Internet architecture, nor any a priori knowledge about the network topology, the areas of disconnections, or future link availability [10]. MSNs use contact opportunities and rely on devices carried by humans to relay messages for others [9]. However, like DTNs, MSNs suffer from intermittent connectivity and long-lasting disconnections due to low node density, short transmission ranges, and free node mobility. In addition, there may be no complete paths between the source and destination nodes [1]. Thus, the forwarding or routing schemes for MANETs are not applicable, and development of such schemes in MSNs have become a challenging problem. In MSNs, nodes communicate with the multi-hop and relay nodes that forward message addresses to other nodes in MSNs. In this case, however, forwarding is not on the

2 1700 Wireless Netw (2015) 21: fly because the relay nodes store messages when no forwarding opportunity exists, such as when there are no nodes within the transmission range. Moreover, they exploit any contact opportunity with other nodes in order to forward the message [10]. This forwarding mechanism is called a store, carry, and forward scheme and is performed hop by hop. In MSNs, node mobility creates opportunities for communication, whereas mobility in MANETs is viewed as a disruption of connections among nodes [10]. Therefore, the key issue in message forwarding is selection of proper nodes for message (or a copy of the message for a multi-copy scheme) handed [11]. Clustering has been shown to be a highly effective way to reduce network traffic in MANETs, and many clustering schemes have been proposed. However, none of them can be directly applied to MSNs because they are designed for well-connected networks and require timely information sharing among the nodes [12]. Among the proposed clustering schemes in MSNs, a distributed clustering scheme based on an exponentially weighted moving average [12] has been proposed. However, this scheme requires gateway nodes, each of which plays a role as a bridge between two nodes in different clusters. If a gateway node operates unpredictably, the scheme suffers from low performance. The DTN hierarchical routing (DHR) scheme [13] has been proposed to improve routing scalability. However, DHR is based on a deterministic mobility model in which all nodes move according to strict, repetitive patterns. Hence, the method is very difficult to implement in MSNs. Because mobile nodes have limited resources, such as bandwidth, power consumption, channel utilization, network size, and so on, the nodes in MSNs experience some communication difficulties. Therefore, as network traffic increases, network problems, such as bottlenecks, slow communication, and noise problems, are unavoidable. In addition, applications in MSNs should be relatively delaytolerant. However, it is still of interest to minimize the delay whenever possible [24]. To resolve this problem, we propose the hierarchical cluster-based forwarding scheme (HCS) to reduce network traffic while maintaining acceptable transmission delay. HCS constructs hierarchical clusters [14] using social information with the home-cell community-based mobility model (HCMM) [15]. Hierarchical clustering is a highly effective way for clustering nodes in MSNs because each node plays a similar role in flat clustering. This method is simple and effective in small networks but not applicable to large-sized MSNs [14]. HCS exploits agglomerate hierarchical clustering in the same way as in DHR. However, HCS adopts the common neighbor similarity to construct hierarchical clusters instead of the contact probability used in DHR. In HCS, each node utilizes both hierarchical clustering and similarity scores. The clustering information helps deliver the message with a smaller number of hops owing to social similarity and node movement patterns. The experimental results show that HCS reduces network traffic compared to non-clustering schemes, such as Epidemic [18], SimBet [24], PRoPHET [29], and common neighbor similarity [32] schemes, while maintaining decent transmission delay compared to the Wait scheme. Mobile nodes in MSNs generally more frequently visit certain places, like home communities, while visiting other locations only occasionally [16]. Because the home community-based mobility model (HCMM) reflects such a characteristic, it is well-suited for use in MSNs. The main contributions of this paper can be summarized as follows. 1. We propose a scheme using agglomerative (bottomup) hierarchical clustering with common neighbor similarities. Cluster level-based forwarding is introduced. 2. To more efficiently deliver a message to the destination node, similarity-based forwarding compensates for level-based forwarding. Using this technique, a node sends a message to other nodes with higher similarity scores with respect to the destination. 3. We conduct extensive simulations for experiments with the network simulator NS-2 and compare the results with non-clustering schemes, such as Epidemic, Wait, SimBet, PRoPHET, and common neighbor similarity schemes. The rest of this paper is organized as follows. In Sect. 2, we discuss related work. After introducing the simplified MSN model in Sect. 3, we describe the proposed scheme in Sect. 4. The simulation environment and results are presented in Sect. 5. Finally, the conclusion and future work are outlined in Sect Related work Existing routing protocols for MANETs [7], such as Dynamic Source Routing, Ad Hoc On-Demand Distance Vector, Split Multipath Routing, Shortest Multipath Source, and AntHocNet, have been introduced. A doublelayered peer-to-peer system using clustering was also proposed for improved routing performance [17]. None of the current schemes are applicable to MSNs regardless of improved performance because of the requirement for no complete path between the source and destination in MSNs. The opportunistic routing schemes can be classified in two categories: zero knowledge schemes and non-zero knowledge schemes. Zero knowledge schemes use no social information, while non-zero knowledge schemes

3 Wireless Netw (2015) 21: take advantage of the information about node behaviors or social relationships in order to make decisions for forwarding messages. Non-zero knowledge schemes are the ones utilized in MSNs. Zero knowledge schemes include Epidemic [18], Sprayand-Wait [19], Controlled routing protocol for DTN based on hierarchy forwarding and cluster control (CRHC) [20], Backpressure with adaptive redundancy (BWAR) [21], Backpressure-based routing scheme [22], Homing spread [16], and Hotspot-based forwarding scheme (HFS) [23]. In Epidemic when each node meets other nodes, it distributes the message to each of them, creating the replicas of the message. In Spray-and-Wait a node sprays a number of copies into some nodes in the network and then waits until one of these nodes meet the destination. First, a fixed number k of messages is transferred by spraying a half of k- copies. When each node has the last message after spraying messages, it waits until the moment when it meets the destination node during the wait phase. In CRHC, a node spreads a half of the messages to other nodes until meeting the destination when the destination is in the same cluster. On the other hand, a node sends a message to the clusterhead in the different cluster first, when the destination node is in a different cluster. However, it is not applicable to our environment because the network should select cluster heads and stable nodes in advance, where we can easily predict their moving patterns. BWAR takes advantages of replication to reduce delay under low load conditions. It creates copies of packets in a new duplicate buffer upon an encounter, when the transmitter s queue occupancy is low. In Backpressure-based routing scheme a node can make source rate, packet routing, and forwarding decisions without the notion of end-to-end routes, using information about queue backlogs and link states. Both BWAR and Backpressure-based routing schemes are applicable to the environment considering queue, link states and load conditions. Homing Spread utilizes community structure to identify suitable relay nodes. These approaches spread messages to the detected communities via relay nodes; however, they incur extra delivery overhead for mobile nodes. HFS floods messages only in hotpots, where nodes often interact; however, the size of the hotspots is limited. Various non-zero knowledge schemes have been proposed for MSNs [11, 24 31]. The non-zero knowledge schemes can be further classified into three schemes: centrality/similarity-based, social context-based, and probability-based. The centrality/similarity-based schemes include SimBet [24], Bubble Rap [25], and SANE [26]. SimBet makes use of the exchange of both betweenness centrality metrics and the locally determined social similarity to the destination node. When a node encounters other nodes, it transfers a message to the node with the higher utility values of betweenness centrality and similarity until reaching the destination node. Bubble Rap takes advantage of both global and local centrality. The bubble-up operations transmit a message to the destination node or its community. However, when the destination belongs only to a community whose members all have low global centrality values, such a strategy may fail. In this case, a relay node in the same local community as the destination node cannot be identified. SANE utilizes user interests and similarity. Social context-based schemes include Label [27] and HiBop [28]. In Label, each node is assumed to hold the label information of other nodes in its social community, similar to name tags used in a conference. Based on the labels, the routing scheme selects nodes for directly forwarding messages to the destination or for acting as the next-hop node that shares the same label as that of the destination. HiBop requires personal information, such as residence, work, hobbies and fun, as well as system information. Finally, probability-based schemes include PRoPHET [29], PeopleRank [30], and MobySpace [31]. PRoPHET first estimates a probabilistic metric called the delivery predictability, P(a, b), which indicates how likely it is that node b will receive a message from node a during a warmup period. Two nodes exchange the summary vector of the information on the messages and the delivery predictability vector. The information in the summary vector is used to determine which messages should be sent for requesting information from other nodes. PeopleRank uses the Page- Rank algorithm of Google as a guide for forwarding decisions. Whenever two neighbor nodes in the social graph meet, they exchange their current PeopleRank values and their numbers of social graph neighbors. MobySpace takes advantage of the knowledge concerning node mobility; however, it requires global information for routing. Non-zero knowledge schemes are very effective in forwarding messages. However, most non-zero knowledge schemes require global information for forwarding decisions. These schemes therefore exploit real datasets for their simulations. These real datasets can be processed in advance because they contain information on mobility, contact trace, and social interaction graphs [23]. 3 Simplified MSN model This system obeys the rules of typical message forwarding, whereby each node forwards a message to the destination node. We assume the network is represented by the graph G = hv, Ei, where the vertex set V consists of all nodes, and edge set E consists of the social links between nodes. Each node in MSNs has a unique identifier and is denoted

4 1702 Wireless Netw (2015) 21: by N i, i = 1, 2,, m, where m is the number of nodes in the network. Each node N i keeps track of a set C i of nodes that N i has encountered. Each node N i belongs to a single community, called its home community [2] so that it has a label [27] that indicates its home community, denoted by H i, where H i is one of {1, 2,, r} and r is the number of communities. Each node moves freely from its own home community to other communities and is aware of its own speed and current location. Each node periodically assesses its location. To determine the speed and location, each node is assumed to have positioning system equipment. For simplicity, we do not consider resources such as buffer size, bandwidth, or power. Although such measurements would result in additional computational costs, we do not consider such computational costs in this paper because the computation can be performed with simple equations. Moreover, the focus of this paper is not on computational cost reduction. The following table summarizes key notations used in describing HCS; some notations are introduced in the following sections (Table 1). 4 Proposed scheme 4.1 Information exchange in the warm-up period The greater is the number of common associates between a pair of persons, the more likely they are to be friends with each other, and the more frequently they are likely to meet each other. Such a social concept is naturally suited for the common neighbor similarity in the network [32] if we interpret a neighbor of a node as a commonly encountered node. A pair of nodes becomes more similar to each other as the number of common neighbor nodes increases. During the warm-up period, nodes exchange and update their information, including their own similarity scores. The purpose of updating the similarity scores is to accumulate the node contact information so that each node is able to obtain the estimated global information on the entire network. The similarity score between a pair of nodes, N i and N j, i = j, can be computed with C i \ C j that is the number of nodes encountered by both N i and N j. Each node N i maintains the information vector of (N i, H i, C i, S i ), where S i is the similarity score lists. During the warm-up period, whenever N i meets other nodes, N i exchanges its information vector with each of the encountered nodes and updates both C i and S i. Figure 1 shows a data structure of S i, where C i \ C j is the number of nodes encountered by both N i and N j. Observe that S i contains not only the contact information of N i itself but also the contact information of other nodes; for example, in Fig. 1, S i also contains the contact information of N j and N k. If any of N j and N k have met other nodes before encountering N i, there would be more entries in S i for their contact information. We now explain how two nodes update their own similarity scores after exchanging the information vectors each other. Assume that two nodes, say N 1 and N 2, are approaching each other at time t 1 with their similarity score lists S 1 and S 2 as shown in Fig. 2(a). Assume that N 1 had encountered N 3 and N 4 met N 3 for the first time, respectively, and later N 1 has encountered N 4. Therefore, C 1 \ C 4 = 1, indicating that both N 1 and N 4 commonly encountered N 3 before they meet each other. All such encounters have been recorded at S 1. Similarly, N 2 is assumed to have its contact information as in S 2. At time t 2, N 1 and N 2 exchange their information vectors and update their similarity score lists as shown in Fig. 2(b). In the first and second entries of S 1 and S 2,(N 2,1) and (N 1,1) have been created with score C 1 \ C 2 = 1, indicating that both N 1 and N 2 had encountered N 3 earlier than t 2. In Fig. 2(b), S 1 has the shaded entries that came from S 2 at time t 1, while S 2 has the unshaded entries that came from S 1 at time t 1. However, when S 1 and S 2 have a common entry such that one entry has larger similarity Table 1 Key notations used in HCS Notation m r N i H i C i S i L i [j] K i [j] d Definition The number of nodes in the network area The number of communities in the network area Node i, where i = 1, 2,, m Home community of N i A set of nodes that N i has encountered The similarity score lists of N i N j s level in the hierarchy of clusters constructed by N i A set of nodes in the cluster at level j in the hierarchy of clusters constructed by N i A threshold of level to quit the clustering Fig. 1 Data structure of S i

5 Wireless Netw (2015) 21: Fig. 2 Update of the similarity score lists. (a) Before the encounter (b) During the encounter score than the other, the entry with smaller score is updated with the larger one. Notice that S 1 and S 2 are equivalent after updating. By the end of the warm-up period, each node accumulates the contact history with similarity scores to extract the global information on the network. After the warm-up period, each node builds hierarchical clusters based on the obtained similarity score lists. 4.2 Hierarchical clustering Hierarchical clustering is widely used for finding community structures in a network. HCS adopts bottom-up hierarchical clustering based on common neighbor similarity. In bottom-up hierarchical clustering, also known as agglomerative clustering, each node serves as a single cluster in the beginning of the warm-up period, and clusters are iteratively merged until a certain condition is satisfied. In HCS, each node hierarchically builds based on its similarity score lists at the end of the warm-up period. We modify bottom-up hierarchical clustering in two ways. First, clustering ceases at some predetermined level of the hierarchy. Second, more than two clusters can be merged in a larger cluster. Each node performs clustering greedily in terms of similarity scores; that is, clusters containing the nodes with the highest similarity score are first merged into a cluster. Note that, once the nodes with the highest score belong to the same cluster, their similarity scores will no longer be considered for future clustering steps. Figure 3 illustrates how a node, say N 1, performs clustering with a threshold d = 4. In Fig. 3, {N 4 } and {N 5 } are merged first at level 1, because C 4 \ C 5, the similarity score between N 4 and N 5, is assumed to be the largest. We store such clustering information in an 1-dimensional array K 1, where K i [j] denotes a set of nodes in the cluster at level j in the hierarchy of clusters constructed by N i. Hence K 1 [1] = {N 4 } [ {N 5 } = {N 4, N 5 }. We also store the level number 1 for each of N 4 and N 5 in an 1-dimensional array L 1 ; L 1 [4] = L 1 [5] = 1. Then, {N 4, N 5 } and {N 3 } become one cluster at level 2, assuming that C 3 \ C 4 is the next largest; K 1 [2] = {N 4, N 5 } [ {N 3 } = {N 3, N 4, N 5 }. We assign level 2 to N 3 ; L 1 [3] = 2. In the figure, at level 3 {N 3, N 4, N 5 }, {N 1 }, and {N 2 } are merged into a single cluster, because C 1 \ C 3 = C 2 \ C 3 areassumedtobethenext largest. Hence, K 1 [3] = {N 3, N 4, N 5 } [ {N 1 } [ {N 2 } = {N 1, N 2, N 3, N 4, N 5 }andl 1 [1] = L 1 [2] = 3. Finally, {N 6 } and {N 7 } are merged at level 4 in the above example; K 1 [4] = {N 6 } [ {N 7 } = {N 6, N 7 } and L 1 [6] = L 1 [7] = 4. The reason why N 6 and N 7 are merged into a different cluster from K 1 [3] is that C 6 \ C 7 is assumed to be the next largest similarity score and neither N 6 nor N 7 belongs to K 1 [3] = {N 1, N 2, N 3, N 4, N 5 }. In the above hierarchical clustering, the higher the similarity is, the lower level the nodes are merged at. HCS stops merging clusters at a certain level d, which is

6 1704 Wireless Netw (2015) 21: Fig. 3 An example of hierarchical clustering determined through extensive simulation. Algorithm 1 formally describes the hierarchical clustering algorithm for HCS. The message forwarding process in level-based forwarding mimics the way people forward messages in virtual clusters with similar movement patterns. Within such a cluster, it is 4.3 Hierarchical clustering-based forwarding scheme In this section, we describe the proposed HCS forwarding scheme. In HCS, each node N i uses either level-based forwarding or similarity-based forwarding. In level-based forwarding, N i forwards the message to N j if L i [j] \ L i [i]. Note that, when nodes are clustered at lower levels, they are more likely to be similar; that is, they have encountered more common nodes. Hence, in the future, they are expected to meet valuable nodes, including the destination node. By valuable we mean that a node is more likely to reach the destination node. On the other hand, if N i encounters only N j such that L i [j] C L i [i], then N i stops using the clustering information, and instead simply uses the similarity scores in its S i.in other words, N i forwards the message to a node with the highest similarity score with respect to the destination node. Such forwarding is called similarity-based forwarding. Hence, similarity-based forwarding serves to compensate for cases when the level of the destination node is relatively higher. highly likely that some people could travel around the destination of a message. Note that HCS does not compute the delivery probabilities for forwarding messages. Instead, it exploits shortcuts on the path toward the destination node with the help of social similarity and node movement patterns. To implement this concept, each node in HCS creates its own hierarchical clusters in which nodes can frequently interact with each other. Even though each node independently builds its own hierarchical clusters, we expect that the clustering results of the nodes are quite similar to each other, because the nodes continuously exchange their information vectors and update similarity score lists whenever encountering other nodes during the warm-up period. Such clustering results can be viewed as the global network information. In HCS, clustering in each node is not updated during the forwarding process, because it causes additional communication overheads and does not improve the overall performance noticeably. Figure 4 illustrates how message forwarding is achieved in HCS. Figure 4(a) shows how level-based forwarding is performed. Suppose that N 2 is the source node and N 5 is the destination node. A solid arrow indicates a possible

7 Wireless Netw (2015) 21: Fig. 4 Examples of forwarding process. (a) Level-based forwarding (b) Similarity-based forwarding forwarding, while a dotted arrow denotes that there is no message forwarding. N 2 forwards the message only if the level of the encountered node is lower than that of N 2. Here, N 2 can forward to N 3, N 4, or directly N 5, if they are within the communication range of N 2.IfN 3 receives the message from N 2, N 3 first looks into its level information, and then forwards the message to the encountered nodes with lower level than the level of N 3.IfN 4 receives the message from N 2, N 4 can send the message to N 5 when they encounter each other. N 7 whenever they are encountered, because they have higher similarity scores than N 5 ; that is, C 5 \ C 2 \ C 4 \ C 2 \ C 3 \ C 2. Note that they can check their similarity scores with the destination N 2 in their similarity score lists without additional communication with N 2. However, N 5 never sends the message to N 1 nor N 6 because their scores are lower than that of N 5. In general, once node N i has a message, it can forward the message to a node that has higher similarity score than that of N i with respect to the destination. Figure 4(b) illustrates how similarity-based forwarding is accomplished. We assume that the source node is N 5 and the destination node is N 2. The integer next to each node is the similarity score with respect to the destination node. In this case, because the level of the destination node is higher than that of the source node, HCS exploits the similarity scores. Therefore, N 5 can forward the message to N 3, N 4,or At the end of the warm-up period, each node independently constructs its own clusters and generates a message to send. When each node N i encounters a set of nodes within its communication range, it executes Algorithm 2. Let E be the set of (encountered) nodes within the communication range of N i. Assume that N s is the source node and N d is the destination node. In Line 2, when N d is in E,

8 1706 Wireless Netw (2015) 21: N i simply forwards the message, and the forwarding process is done. Otherwise, N i sends the message with levelbased forwarding if L i [d] \ L i [s]; that is, if the level of the destination node is lower than that of the source node. Therefore, N i attempts to find node N j, whose level is lower than L i [i]. If L i [d] C L i [s], N i sends the message with similarity-based forwarding. Therefore, it tries to finds node N j whose similarity score is higher than that of N i with respect to N d. In either case, N i sends the message to N j if found in E in Line 9. If N i cannot find N j in Lines 6 or 8, N i does not transmit the message at this time. 5 Experimental results 5.1 Simulation environments In the experiment, we use the network simulator NS-2 v2.35 [33] for the simulations. The network area is set to 450 m m, and the community size is 150 m m. The number of grids is 9. The number of communities among the grids is 4, and each community has 10 or more nodes. The number of nodes is set to 40, 50, 60 or 70. The communication range varies from 10 to 50 m. The movement of a node follows HCMM [15], which is a frequently used movement pattern in MSN simulations. Because the node contact information is not available in HCMM, a warm-up period is required to obtain estimated social (global) information in order to utilize the socialaware forwarding schemes. The velocity of a node ranges from 1 to 9 m/s, which is appropriate for either people or vehicles. In our simulator, a mobile node issues one message to a random destination right after the warm-up period. After a source node transmits its message to other nodes, it still keeps the message. The warm-up period is set to 1,000 s for collecting enough node contact information. Both SimBet and PRoPHET also need the warm-up period to obtain the information required. In particular, the cluster level varies from 1 to 10 for constructing hierarchical clusters based on our extensive experiments. The total simulation time is 8,000 s. We run each scheme 20 times and determine the average results. Table 2 summarizes the parameters used in our simulation. All simulation environments are as in [23]. We evaluated the proposed scheme with the following performance metrics: 1. Delivery ratio: Ratio of the number of delivered messages to the total number of messages issued. 2. Network traffic: Total number of messages sent and received. 3. Delay: Time required for a message to travel from the source to destination nodes. Table 2 Simulation parameters Parameter We do not consider the network traffic during the warmup period, since most schemes in MSNs ignore network traffic [24, 29]. We found that the amount of traffic in the warm-up period is not big enough to affect the total amount of traffic. For 8,000 s, we simulate and compare the proposed scheme HCS with non-clustering schemes such as Epidemic, Wait, SimBet, PRoPHET, and common neighbor similarity schemes. During this period, all the schemes except Wait achieve 1.0 delivery ratio. Epidemic and Wait, which are typical social-oblivious schemes, Epidemic has the highest network traffic and the lowest transmission delay, while Wait shows the highest transmission delay and the lowest network traffic. In the rest of the schemes, SimBet, which is the centrality/similarity-based scheme, uses the betweenness centrality. PRoPHET, which is the predictability-based scheme, takes advantages of contact probability. During the warm-up period, SimBet collects common neighbor similarities and betweenness centralities of nodes, obtains the SimBet utility values by combining both metrics. PRoPHET calculates the delivery predictability P(a, b) during the warm-up period. In both schemes, each node forwards a message to another node with higher SimBet utility or higher delivery predictability for the destination, respectively. Common neighbor similarity scheme uses only common neighbor similarity that HCS uses for clustering. Hence, we compare these schemes against HCS. 5.2 Simulation results Effect of cluster level Value (default) Network area m 2 Community size m 2 Number of grids 9 Number of communities 4 Number of nodes 40, 50, 60, 70, (40) Communication range 10, 20, 30, 40, 50, (10) m Velocity of nodes 1 * 9 m/s Warm-up period 1,000 s Cluster level 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, (5) Simulation time 8,000 s We examine the performance of HCS at different cluster levels when the communication range is 10 m. Figure 5 shows network traffic and transmission delay of HCS with various cluster levels. The cluster level varies from 1 to 10. As shown in Fig. 5(a), when the level is low, HCS shows higher network traffic. However, as the level increases,

9 Wireless Netw (2015) 21: Fig. 5 Effect of cluster level.(a) Network traffic (b) Transmission delay Fig. 6 Delivery ratios and network traffic by time. (a) Delivery ratio (b) Network traffic HCS increasingly reduces network traffic. Such a phenomenon arises because HCS utilizes clustering information very well at high clustering levels. On the other hand, as shown in Fig. 5(b), as the level becomes higher, HCS shows longer transmission delay because it requires longer time to find the nodes with lower levels. However, because HCS appropriately uses both level-based and similarity-based forwarding, its traffic amount is still smaller than those of the non-clustering schemes. It is evident that a proper value of d in hierarchical clustering for this environment is 5, because we get relatively lower traffic as well as acceptable delay. However, d should be appropriately chosen according to the given environment Delivery ratios and network traffic by time Figure 6 shows the delivery ratios and network traffic as the simulation time reaches 8,000 s. The results are shown after 1,000 s in order not to include the results of the warm-up period. The number of nodes is set to 40. In Fig. 6(a), the non-clustering schemes, except Wait, achieve the maximum delivery ratio that is faster than that of HCS, because they allow multiple copies of messages. Because Wait does not distribute a message but instead waits for the message to encounter its destination, it requires much longer time to reach the 1.0 delivery ratio. However, HCS uses an appropriate number of copies of a message, thereby resulting in a somewhat slower time in

10 1708 Wireless Netw (2015) 21: Fig. 7 Effect of the number of nodes. (a) Delivery ratio. (b) Network traffic. (c) Transmission delay reaching the 1.0 delivery ratio compared with other schemes. For network traffic shown in Fig. 6(b), each scheme experiences higher network traffic as time passes. HCS shows much lower traffic than the non-clustering schemes except Wait. Note that HCS distributes the messages to the nodes with lower levels or higher similarity scores Effect of number of nodes We evaluate the performance of the schemes as the number of nodes increases. Figure 7(a) shows the average delivery ratio with nodes. Figure 6(a) compares the delivery ratios of the schemes; the non-clustering schemes, except Wait, reach a 1.0 delivery ratio faster than HCS, because HCS maintains only an appropriate number of copies of a message. Figure 7(b) shows the network traffic when the number of nodes increases. As expected, the amount of traffic in the non-clustering schemes explosively increase as the number of nodes increases. In particular, the difference between HCS and each of the non-clustering schemes is large. HCS shows the lowest traffic except for Wait.InHCS, as the number of nodes increases, so does the number of valuable nodes that play a critical role in message delivery. Figure 7(c) shows transmission delay. The delays of most schemes decrease as the number of nodes increases. However, Wait demonstrates similar patterns regardless of the number of nodes. The delay in HCS is higher than those of the non-clustering schemes because of their multiple message copies. However, HCS well maintains the balance between network traffic and transmission delay.

11 Wireless Netw (2015) 21: Fig. 8 Effect of communication range. (a) Delivery ratio, (b) Network traffic, (c) Transmission delay Effect of communication range Finally, we compare the effect of the communication range of the nodes for each scheme. The number of nodes is set to 40. Figure 8(a) shows the average delivery ratios with m of the communication range. In Figs. 6(a) and 7(a), the delivery ratios of HCS increase little bit slower than those of other schemes except Wait because HCS maintains a smaller number of copies even if the communication range increases. As shown in Fig. 8(b), as the communication range becomes wider, all the schemes except Wait experience increased network traffic. PRo- PHET shows a moderate increase because only the nodes with higher contact probability to the destination participated in the delivery of the messages. However, HCS shows the lowest traffic except Wait when the communication range is 10 because the nodes that are involved in message delivery are properly chosen. Such a result confirms that HCS can be well implemented in a sparse network. Figure 8(c) shows the transmission delays of the schemes. It is natural that most schemes incur shorter delays as the communication range increases. Epidemic shows the shortest delay. SimBet and Common exhibit similar results. However, PRoPHET suffers from a longer delay compared with HCS, except when the communication range is 10. The transmission delays of HCS and Wait significantly decrease as the range increases. In HCS, the percentages of level-based forwarding and similarity-based forwarding during the entire forwarding processes are 91.3 and 8.7 %, respectively. It is evident that hierarchical clustering on social similarity in HCS is well constructed; therefore, relay nodes are properly chosen with the

12 1710 Wireless Netw (2015) 21: clustering information. Hence, the transmission delay of HCS becomes significantly lower as the communication range becomes larger. The results in both figures demonstrate that HCS maintains a well-balanced performance between network traffic and transmission delay. 6 Conclusion In MSNs, non-clustering schemes suffer from higher network traffic. To reduce network traffic, we proposed a forwarding scheme using hierarchical clustering based on social information. The proposed scheme effectively distributes the messages to the nodes via shortcuts by exploiting clustering results. Experimental results demonstrated that the scheme reduced network traffic compared to non-clustering schemes, while delay was acceptable compared to the Wait scheme. In future work, we plan to study more enhanced dynamic forwarding schemes with varying resources in consideration of continuous information updating in MSNs. Acknowledgments This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2013R1A1A ). References 1. Conti, M., Giordano, S., May, M., & Passarella, A. (2010). From opportunistic networks to opportunistic computing networks. IEEE Communications Magazine, 48(9), Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., & Diot, C. (2005). Pocket switched networks and human mobility in conference environments. In Proceedings of ACM SIGCOMM Workshop on Delay-Tolerant Networking (WDTN 2005) (pp ). 3. Lindgren, A., & Doria, A. (2007). Experiences from deploying a reallife dtn system. In Proceedings of IEEE Consumer Communications and Networking Conference (CCNC) (pp ). 4. Juang, P., Oki, H., Wang, Y., Maronosi, M., Peh, L., & Rubenstein, D. (2002). Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet. In Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS) (pp ). 5. Small, T., & Haas, Z. J. (2003). The shared wireless infestation model: A new ad hoc networking paradigm (or where there is a whale, there is a way). In Proceedings of MobiHoc (pp ). 6. Zeng, Y., Xiang, K., Li, D., & Vaslakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), Zafar, H., Alhamahmy, N., Harle, D., & Andonovic, I. (2011). Survey of reactive and hybrid routing protocols for mobile ad hoc networks. Communication Networks and Information Security, 3(3), Spyropoulos, T., Rais, R. N., Turletti, T., Obraczka, K., & Vasilakos, A. (2010). Routing for disruption tolerant networks: Taxonomy and design. Wireless Networks, 16(8), Hui, P., Xu, K., Li, V., Crowcroft, J., Latora, V., & Lio, P. (2009). Selfishness, altruism and message spreading in mobile social networks. In Proceedings of IEEE INFOCOM Workshop (pp. 1 6). 10. Conti, M., & Kumar, M. (2010). Opportunities in opportunistic computing. IEEE Computer, 43(1), C. Bordrini, M. Conti, and A. Passarella (2011). Modeling socialaware forwarding in opportunistic networks. Performance Evaluation of Computer and Communication Systems, 6821 (LNCS), Dang, H., & Wu, H. (2010). Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Transactions on Wireless Communications, 9(6), Liu, C., & Wu, J. (2009). Scalable routing in delay tolerant networks. In Proceedings of MobiHoc (pp ). 14. Cambridge University (2009). Online edition (c), chapter hierarchical clustering, pp Boldrini, C., & Passarella, A. (2010). HCMM: Modelling spatial and temporal properties of human mobility driven by users social relationships. Computer Communications, 33(9), Wu, J., Xiao, M., & Huang, L. (2013). Homing spread: Community home-based multi-copy routing in mobile social networks. In Proceedings of IEEE INFOCOM (pp ). 17. Kim, J. H., Lee, K. J., Kim, T. H., & Yang, S. B. (2011). Effective routing schemes for double-layered peer-to-peer systems in manet. Journal of Computing Science Engineering, 5(1), Vahdat, A., & Becker, D. (2000). Epidemic routing for partiallyconnected ad hoc networks. Technical Report CS Spyropoulos, T., Psounis, K., & Raghavendra, C. (2005). Spray and wait: An efficient routing scheme for intermittently connected mobile networks. In Proceedings of ACM SIGCOMM (pp ). 20. Hua, D., Du, X., Qian, Y., & Yan, S. (2009). A DTN routing protocol based on hierarchy forwarding and cluster control. In Proceedings of IEEE Computational Intelligence and Security (pp ). 21. Alresaini, M., Sathiamoorthy, M., Krishnamachari, B., & Neely, M. J. (2012). Backpressure with adaptive redundancy. In Proceedings of IEEE INFOCOM (pp ). 22. Dvir, A., & Vasilakous, A. V. (2010). Backpressure-based routing protocol for DTNs. In Proceedings of ACM SIGCOMM (pp ). 23. Kim,S. K., Choi, J. H., & Yang, S. B. (in press). Hotspot: Location-based forwarding scheme in an opportunistic network. Ad hoc & Sensor Wireless Networks. 24. Daly,E. H., & Haahr, M. (2007). Social network analysis for routing in disconnected delay-tolerant manets. In Proceedings of ACM MobiHoc (pp ). 25. Hui, P., Crowcroft, J., & Yoneki, E. (2011). Bubble rap: Socialbased forwarding in delay tolerant networks. IEEE Transactions on Mobile Computing, 10(11), Mei, A., Morabitto, G., Santi, P., & Stefa, J. (2011). Social-aware stateless forwarding in pocket switched networks. In Proceedings of IEEE INFOCOM (pp ). 27. Hui, P., & Crowcroft, J. (2007). How small labels create big improvements. In Proceedings of Pervasive Computing and Communications Workshop (pp ). 28. Boldrini, C., Conti, M., & Passarella, A. (2008). Exploiting users social relations to forward data in opportunistic networks: The HiBop solution. Pervasive and Mobile Computing, 4(5), Lindgren, A., Doria, A., & Schelen, O. (2004). Probabilistic routing in intermittently connected networks. Service Assurance with Partial and Intermittent Resources, 3126 (LNCS),

13 Wireless Netw (2015) 21: Mtibaa, A., May, M., Diot, C., & Ammar, M. (2010). People- Rank: Social opportunistic forwarding. In Proceedings of IEEE INFOCOM (pp. 1 5). 31. Leguay, J., Friedman, T., & Conan, V. (2007). Evaluating MobySpace based routing strategies in delay tolerant networks. Wireless Communications and Mobile Computing, 7(10), Newman, M. E. J. (2001). Clustering and preferential attachment in growing networks. Physical Review Letters, E 64, Network simulator-2. Junyeop Lee is currently an M.S. candidate in computer science at Yonsei University in Korea. His research interests include mobile social networks, delay tolerant networks and social network analysis. Sun-Kyum Kim received his M.S. in computer science from Yonsei University in Korea in He is currently a Ph.D. candidate at Yonsei University. His research interests include mobile social networks, delay tolerant networks and social network analysis. Sung-Bong Yang received his M.S. and Ph.D. from the Department of Computer Science at the University of Oklahoma in 1986 and 1992, respectively. He has been a professor at Yonsei University since His research interests include graph algorithms, mobile computing, and social network analysis. Ji-Hyeun Yoon is currently an Ph.D. candidate in computer science at Yonsei University in Korea. His research interests include mobile social networks, delay tolerant networks and social network analysis.

novel cooperative forwarding scheme for social preference-based

novel cooperative forwarding scheme for social preference-based Wireless Netw (2016) 22:537 552 DOI 10.1007/s11276-015-0984-2 A cooperative forwarding scheme for social preference-based selfishness in mobile social networks Sun-Kyum Kim 1 Ji-Hyeun Yoon 1 JunYeop Lee

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Impact of Social Networks in Delay Tolerant Routing

Impact of Social Networks in Delay Tolerant Routing Impact of Social Networks in Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks Routing with Multi-Level Social Groups in Mobile Opportunistic Networks Lunan Zhao Fan Li Chao Zhang Yu Wang School of Computer Science, Beijing Institute of Technology, Beijing, 100081, China. Department

More information

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2 , pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department

More information

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula

More information

Estimation based Erasure-coding Routing in Delay Tolerant Networks

Estimation based Erasure-coding Routing in Delay Tolerant Networks Estimation based Erasure-coding Routing in Delay Tolerant Networks Yong Liao, Kun Tan, Zhensheng Zhang, Lixin Gao Dep. of Electrical & Computer Eng. Microsoft Research Asia San Diego Research Center University

More information

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models 2016 7th International Conference on Intelligent Systems, Modelling and Simulation Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models Bhed Bahadur

More information

Routing Protocol Approaches in Delay Tolerant Networks

Routing Protocol Approaches in Delay Tolerant Networks Routing Protocol Approaches in Delay Tolerant Networks Shivi Shukla 1, Amit Munjal 2 and Y. N. Singh 2 AIM & ACT Dept., Banasthali Vidyapith, Rajasthan 1 EE Dept., Indian Institute of Technology, Kanpur

More information

Impact of Social Networks on Delay Tolerant Routing

Impact of Social Networks on Delay Tolerant Routing Impact of Social Networks on Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Energy Efficient Social-Based Routing for Delay Tolerant Networks

Energy Efficient Social-Based Routing for Delay Tolerant Networks Energy Efficient Social-Based Routing for Delay Tolerant Networks Chenfei Tian,FanLi,, Libo Jiang,ZeyeWang, and Yu Wang 2, School of Computer Science, Beijing Institute of Technology, Beijing, 8, China

More information

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

Friendship Based Routing in Delay Tolerant Mobile Social Networks

Friendship Based Routing in Delay Tolerant Mobile Social Networks Friendship Based Routing in Delay Tolerant Mobile Social Networks Eyuphan Bulut and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Comparative Study of Routing Protocols for Opportunistic Networks

Comparative Study of Routing Protocols for Opportunistic Networks Comparative Study of Routing Protocols for Opportunistic Networks Majeed Alajeely School of Information Technology Deakin University Melbourne, Australia Email: malajeel@deakin.edu.au Asma a Ahmad School

More information

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks 1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms

More information

Application of Graph Theory in DTN Routing

Application of Graph Theory in DTN Routing Application of Graph Theory in DTN Routing Madan H. T. 1, Shabana Sultana 2 1 M. Tech. (CNE), NIE, Mysuru 2 Associate Professor, Dept. of Computer Science & Eng., NIE, Mysuru Abstract: Delay tolerant network

More information

Integrated Routing Protocol for Opportunistic Networks

Integrated Routing Protocol for Opportunistic Networks Integrated Routing Protocol for Opportunistic Networks Anshul Verma Computer Science and Engineering Dept. ABV-Indian Institute of Information Technology and Management, Gwalior, India E-mail: anshulverma87@gmail.com

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

Social Properties Based Routing in Delay Tolerant Network

Social Properties Based Routing in Delay Tolerant Network RESEARCH ARTICLE OPEN ACCESS Properties Based Routing in Delay Tolerant Network Aliasger k. Dhilawala 1, Vishal shah 2 1 (Computer Department, S.V.I.T, Vasad,India 2 (Computer Department, S.V.I.T, Vasad,India

More information

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach 7 th Annual IEEE Communication Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 10)

More information

InterestSpread: An Efficient Method for Content Transmission in Mobile Social Networks

InterestSpread: An Efficient Method for Content Transmission in Mobile Social Networks : An Efficient Method for Content Transmission in Mobile Social Networks ABSTRACT Ning Wang Dept. of Computer and Information Sciences Temple University Philadelphia PA 9 ning.wang@temple.edu In Mobile

More information

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Bhed Bahadur Bista Faculty of Software and Information Science Iwate Prefectural University Takizawa

More information

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy

More information

PeopleRank: Social Opportunistic Forwarding

PeopleRank: Social Opportunistic Forwarding PeopleRank: Social Opportunistic Forwarding Abderrahmen Mtibaa Martin May Christophe Diot Mostafa Ammar Thomson, Paris, France Georgia Institute of Technology firstname.lastname@thomson.net ammar@cc.gatech.edu

More information

Delay Tolerant Networks

Delay Tolerant Networks Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Overhead Reduction In Delay Tolerant Networks

Overhead Reduction In Delay Tolerant Networks Overhead Reduction In Delay Tolerant Networks Azadeh Omidvar School of Electrical Engineering Iran University of Science and Technology Tehran, Iran omidvar@elec.iust.ac.ir Karim Mohammadi School of Electrical

More information

Opportunistic Networks: A Review

Opportunistic Networks: A Review IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. III (Mar-Apr. 2016), PP 20-26 www.iosrjournals.org Opportunistic Networks: A Review Navneet

More information

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Junhai Zhou, Yapin Lin ( ), Siwang Zhou, and Qin Liu College of Computer Science and Electronic Engineering, Hunan University,

More information

Opportunistic Networks: Minimizing Expected Latency

Opportunistic Networks: Minimizing Expected Latency Opportunistic Networks: Minimizing Expected Latency Shohreh Shaghaghian and Mark Coates Department of Electrical and Computer Engineering, McGill University 348 University St., Montreal, QC, Canada H3A

More information

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks Yuan Xu, Xiao Chen Department of Computer Science, Texas State University, San Marcos, TX, USA Email: y x3@txstate.edu, xc@txstate.edu

More information

Wei Gao, Qinghua Li, Bo Zhao and Guohong Cao The Pennsylvania State University From: MobiHoc Presentor: Mingyuan Yan Advisor: Dr.

Wei Gao, Qinghua Li, Bo Zhao and Guohong Cao The Pennsylvania State University From: MobiHoc Presentor: Mingyuan Yan Advisor: Dr. Wei Gao, Qinghua Li, Bo Zhao and Guohong Cao The Pennsylvania State University From: MobiHoc 2009 Presentor: Mingyuan Yan Advisor: Dr. Yingshu Li 1 2 3 4 5 Introduction Problem definition Single-data multicast

More information

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy,

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs Dr. Santhi Kumaran Associate Professor, Dept of Computer Engineering,

More information

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Yunsheng Wang Kettering University Jie Wu Temple University Mingjun Xiao University of Science and Tech. of China Daqiang Zhang

More information

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks Int. J. Communications, Network and System Sciences, 2012, 5, 98-104 http://dx.doi.org/10.4236/ijcns.2012.52013 Published Online February 2012 (http://www.scirp.org/journal/ijcns) Spray and Dynamic: Advanced

More information

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS http:// CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS M.Sengaliappan 1, K.Kumaravel 2, Dr. A.Marimuthu 3 1 Ph.D( Scholar), Govt. Arts College, Coimbatore, Tamil Nadu, India 2 Ph.D(Scholar), Govt.,

More information

Probability Delegation Forwarding in Delay Tolerant Networks

Probability Delegation Forwarding in Delay Tolerant Networks Probability Delegation Forwarding in Delay Tolerant etworks Xiao Chen Dept. of Comp. Sci. Texas State University San Marcos, TX 78666 xc10@txstate.edu Jian Shen Dept. of Math. Texas State University San

More information

Buffer Management in Delay Tolerant Networks

Buffer Management in Delay Tolerant Networks Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

Capacity-Aware Routing Using Throw-Boxes

Capacity-Aware Routing Using Throw-Boxes Capacity-Aware Routing Using Throw-Boxes Bo Gu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {bgu,hxy}@cs.ua.edu Abstract Deploying the static wireless devices

More information

Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks

Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks sensors Article Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks Feng Zeng 1, *, Nan Zhao 1 and Wenjia Li 2, * 1 School of Software, Central South University,

More information

Social-Aware Routing in Delay Tolerant Networks

Social-Aware Routing in Delay Tolerant Networks Social-Aware Routing in Delay Tolerant Networks Jie Wu Dept. of Computer and Info. Sciences Temple University Challenged Networks Assumptions in the TCP/IP model are violated DTNs Delay-Tolerant Networks

More information

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks 27 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): 27 IEEE Infocom MiseNet Workshop Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

More information

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS Sanjay Kumar, K. Suraj and Sudhakar Pandey Department of Information Technology, National Institute of Technology Raipur, India E-Mail:

More information

An Agenda-Based Routing Protocol in Delay Tolerant Mobile Sensor Networks

An Agenda-Based Routing Protocol in Delay Tolerant Mobile Sensor Networks Sensors 2010, 10, 9564-9580; doi:10.3390/s101109564 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article An Agenda-Based Routing Protocol in Delay Tolerant Mobile Sensor Networks Xiao-Min

More information

ABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS

ABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 Survey of Various Protocols Used for Delay Tolerant

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18,   ISSN International Journal of Computer Engineering and Applications, ANALYZING IMPACT OF FACTORS ON ROUTING DECISIONS IN OPPORTUNISTIC MOBILE NETWORKS Sonam Kumari 1, Dr. Itu Snigdh 2 Department of Computer

More information

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks Douglas McGeehan Dan Lin Sanjay Madria Department of Computer Science Missouri University of Science and Technology Rolla,

More information

SMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks

SMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks SMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks Kang Chen and Haiying Shen Department of Electrical and Computer Engineering Clemson University, Clemson, SC 9631 Email:

More information

Cluster Based Approach for Overhead Reduction and Load Balancing in Delay Tolerant Mobile Applications

Cluster Based Approach for Overhead Reduction and Load Balancing in Delay Tolerant Mobile Applications Cluster Based Approach for Overhead Reduction and Load Balancing in Delay Tolerant Mobile Applications 1 Shankar B Sajjan, 2 Amit Kumar, 3 Masrath Begum, 4 Ambrish Kaneri 1234 Assistant Professor, CSE

More information

Cost Efficient Erasure Coding based Routing in Delay Tolerant Networks

Cost Efficient Erasure Coding based Routing in Delay Tolerant Networks Cost Efficient Erasure Coding based Routing in Delay Tolerant Networks Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking

More information

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Ankur Upadhyay Department of Computer Science & Engineering School of Engineering & Technology, IFTM

More information

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs Authors: Bo Wu, Haiying Shen and Kang Chen Dept. of Electrical and Computer Engineering Clemson University, SC, USA 1 Outline Background Trace

More information

Exploiting Active Sub-areas for Multi-copy Routing in VDTNs

Exploiting Active Sub-areas for Multi-copy Routing in VDTNs Exploiting Active Sub-areas for Multi-copy Routing in VDTNs Bo Wu, Haiying Shen and Kang Chen Department of Electrical and Computer Engineering Clemson University, Clemson, South Carolina 29634 {bwu2,

More information

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing This is an authors' version of the manuscript. Final version published in Proc. 13th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW '14). Springer LNCS 8487, pp. 1-14, 2014. The final

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks 1682 IEEE TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 7, JULY 2014 Community-Aware Opportunistic Routing in Mobile Social Networks Mingjun Xiao, Member, IEEE, Jie Wu, Fellow, IEEE, and Liusheng Huang, Member,

More information

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs . RESEARCH PAPER. SCIENCE CHINA Information Sciences February 2012 Vol. 55 No. 2: 433 440 doi: 10.1007/s11432-011-4345-1 Spray and forward: Efficient routing based on the Markov location prediction model

More information

Modeling Redundancy-based Routing in Delay Tolerant Networks

Modeling Redundancy-based Routing in Delay Tolerant Networks Modeling Redundancy-based Routing in Delay Tolerant Networks Yong Liao, Kun Tan, Zhensheng Zhang, Lixin Gao Dep. of Electrical & Computer Eng. Microsoft Research Asia San Diego Research Center University

More information

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks Middle-East Journal of Scientific Research 23 (Sensing, Signal Processing and Security): 291-296, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.ssps.111 Buffer Aware Network

More information

Available online at ScienceDirect. Procedia Computer Science 85 (2016 )

Available online at   ScienceDirect. Procedia Computer Science 85 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 85 (2016 ) 891 898 International Conference on Computational Modeling and Security (CMS 2016) Analysis of routing and forwarding

More information

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS Chintan B. Desai PG Student, Electronics and Communication Department, Charotar University of Science & Technology, Changa,

More information

Probabilistic Routing With Multi-copies in Delay Tolerant Networks

Probabilistic Routing With Multi-copies in Delay Tolerant Networks Probabilistic Routing With Multi-copies in Delay Tolerant Networks Ze Li and Haiying Shen Department of Computer Science and Computer Engineering University of Arkansas, Fayetteville, AR 7701 {zxl008,

More information

Opportunistic Routing Algorithms in Delay Tolerant Networks

Opportunistic Routing Algorithms in Delay Tolerant Networks Opportunistic Routing Algorithms in Delay Tolerant Networks Eyuphan Bulut Rensselaer Polytechnic Institute Department of Computer Science and Network Science and Technology (NeST) Center PhD Thesis Defense

More information

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network Simulation of, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network 1 Monika Aneja, 2 Vishal Garg 1 (P.G. Student JMIT, Radaur, Yamunanagar) 2 (Assistant Professor JMIT Radaur Yamunanagar)

More information

Improving the efficiency of DTN with social graph

Improving the efficiency of DTN with social graph 1 Improving the efficiency of DTN with social graph Jiahua Chang Communication department of Aalto University School of Science & Technology Espoo, Finland Abstract Delay Tolerant Networks (DTN) are networks

More information

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur International Journal of Scientific & Engineering Research, Volume 7, Issue 4, April-2016 1717 A Review of Energy Consumption on DTN Routing Protocols Sukhpreet Kaur Abstract: DTN is net of similar nets.

More information

Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case

Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case Pierre-Ugo Tournoux, Student Member, IEEE, Je re mie Leguay, Farid Benbadis, John Whitbeck, Student Member, IEEE, Vania Conan, and Marcelo

More information

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely

More information

MDR Based Cooperative Strategy Adaptation in Wireless Communication

MDR Based Cooperative Strategy Adaptation in Wireless Communication MDR Based Cooperative Strategy Adaptation in Wireless Communication Aswathy Mohan 1, Smitha C Thomas 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: Cooperation among

More information

NEW STRATEGY TO OPTIMIZE THE PERFORMANCE OF SPRAY AND WAIT ROUTING PROTOCOL

NEW STRATEGY TO OPTIMIZE THE PERFORMANCE OF SPRAY AND WAIT ROUTING PROTOCOL NEW STRATEGY TO OPTIMIZE THE PERFORMANCE OF SPRAY AND WAIT ROUTING PROTOCOL Mohamed Ababou 1, Rachid Elkouch 2, Mostafa Bellafkih 3 and Nabil Ababou 4 1 National Institute of Posts and Telecommunications

More information

ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY

ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY Vidya K 1, Mr Hemanth S R 2 1 M.Tech, 2 Assistant Professor, Department of Computer Science Maharaja Institute of Technology

More information

Research Article ISSN:

Research Article ISSN: International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2.2015 Boosting Performance of Data

More information

Message Forwarding in Cyclic MobiSpace: the Multi-copy Case

Message Forwarding in Cyclic MobiSpace: the Multi-copy Case Message Forwarding in Cyclic MobiSpace: the Multi-copy Case Cong Liu Shenzhen Institute of Advanced Technology Chinese Academy of Science gzcong@gmail.com Jie Wu Dept. of Computer & Information Sciences

More information

Using local speed information as routing metric for delay tolerant networks

Using local speed information as routing metric for delay tolerant networks Using local speed information as routing metric for delay tolerant networks FUQUAN ZHANG 1, INWHEE JOE, DEMIN GAO 1 AND YUNFEI LIU 1 1 College of Information and Sciences NanJing Forestry University NanJing

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks

COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks Long Vu, Quang Do, Klara Nahrstedt Department of Computer Science, University of Illinois

More information

Minimizing Average Spraying Cost for Routing in Delay Tolerant Networks

Minimizing Average Spraying Cost for Routing in Delay Tolerant Networks Minimizing Average Spraying Cost for Routing in Delay Tolerant Networks Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking

More information

Dynamic Social Grouping Based Routing in a Mobile Ad-Hoc Network

Dynamic Social Grouping Based Routing in a Mobile Ad-Hoc Network Dynamic Social Grouping Based Routing in a Mobile Ad-Hoc Network Roy Cabaniss, Sanjay Madria, George Rush, Abbey Trotta and Srinivasa S. Vulli Department of Computer Science, Missouri University of Science

More information

Keywords: Store and carry networks, Forwarding strategies, routing, DTN, Minimum hop transmission

Keywords: Store and carry networks, Forwarding strategies, routing, DTN, Minimum hop transmission Global Journal of Computer Science and Technology Volume 11 Issue 9 Version 1.0 May 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) ISSN: 0975-4172

More information

An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments

An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments Sun-Kyum Kim, Kwang-Jo Lee, Sung-Bong Yang Departement of Computer Science Yonsei University Repubilc of Korea {skyum,

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Empirical Evaluation of Hybrid Opportunistic Networks

Empirical Evaluation of Hybrid Opportunistic Networks Empirical Evaluation of Hybrid Opportunistic Networks Pan Hui, Anders Lindgren, Jon Crowcroft firstname.lastname@cl.cam.ac.uk University of Cambridge Deutsche Telekom Laboratories Abstract In this paper,

More information

A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING

A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING Sanjit Kumar Dash 1, Chandrakanta Mahanty 2, Sasmita Mishra 3 and Jibitesh Mishra 1 1 College of Engineering and

More information

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing Chithra M. 1, Mr. Vimalathithan

More information

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security. IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY An Efficient Selfishness Aware Routing in Delay Tolerant Networks N.Senthilkumar *1, Dr. T.V U. Kiran Kumar 2 *1,2,3,4 Bharath

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM 2004 Presented by Xun Gong Outline Delay Tolerant Networks Routing Problem in DTNs Multiple-copy Approach Flooding and

More information

[Bhosale*, 4.(6): June, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Bhosale*, 4.(6): June, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EFFECTIVE DATA FORWARDING TECHNIQUE IN MOBILE SOCIAL NETWORK Ms.Yogita Y.Bhosale*, Prof.Nilesh R.Pardeshi * Department of Computer

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs : Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs Ying Dai Software Institute Nanjing University dy06@software.nju.edu.cn Panlong Yang, Guihai Chen Dept. of Computer Sci. and

More information

ERASURE-CODING DEPENDENT STORAGE AWARE ROUTING

ERASURE-CODING DEPENDENT STORAGE AWARE ROUTING International Journal of Mechanical Engineering and Technology (IJMET) Volume 9 Issue 11 November 2018 pp.2226 2231 Article ID: IJMET_09_11_235 Available online at http://www.ia aeme.com/ijmet/issues.asp?jtype=ijmet&vtype=

More information

EA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks

EA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks Journal of Communications Vol. 12, No. 6, June 217 EA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks Bhed B. Bista 1 and Danda B. Rawat 2 1 Iwate Prefectural University,

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

BOND: Unifying Mobile Networks with Named Data. Michael Meisel

BOND: Unifying Mobile Networks with Named Data. Michael Meisel BOND: Unifying Mobile Networks with Named Data Michael Meisel Ph.D. Dissertation Defense March 16, 2011 Freeform Wireless Networks Multi-hop Unpredictable mobility Can be connected or disconnected Examples:

More information

SMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks

SMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks SMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks Lei Tang, Qunwei Zheng, Jun Liu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {ltang,qzheng,jliu,hxy}@cs.ua.edu

More information