HCS: hierarchical cluster-based forwarding scheme for mobile social networks
|
|
- Natalie Franklin
- 5 years ago
- Views:
Transcription
1 Wireless Netw (2015) 21: DOI /s x HCS: hierarchical cluster-based forwarding scheme for mobile social networks Sun-Kyum Kim Ji-Hyeun Yoon Junyeop Lee Sung-Bong Yang Published online: 19 December 2014 Springer Science+Business Media New York 2014 Abstract Clustering has been shown to be a highly effective way to reduce network traffic in mobile ad hoc networks. Many clustering schemes have been proposed. However, none of these schemes can be directly applied to a mobile social network because they are designed for well-connected networks and require timely information sharing among the nodes. In this paper, we propose the hierarchical clustering-based forwarding scheme (HCS), which implements hierarchical clustering on social information. Each node constructs hierarchical clusters based on common neighbor similarity at the end of the warm-up period. The nodes then forward a message to other nodes based on the clustering information and similarity scores. HCS exploits the shortcuts on the path toward the destination node with the help of social similarity and node movement patterns. Experiments were performed on an NS-2 network simulator. The results show that HCS reduces network traffic compared to non-clustering schemes, such as Epidemic, SimBet, PRoPHET, and common neighbor similarity schemes, while maintaining acceptable transmission delay compared to the Wait scheme. S.-K. Kim J.-H. Yoon J. Lee S.-B. Yang (&) Department of Computer Science, Yonsei University, Seoul, Korea sbyang@cs.yonsei.ac.kr S.-K. Kim skyum@yonsei.ac.kr J.-H. Yoon y_chick@yonsei.ac.kr J. Lee kotzyi@yonsei.ac.kr Keywords Hierarchical clustering Forwarding Routing Mobile social network (MSN) NS-2 1 Introduction With advances in wireless communication technologies and the popularity of mobile devices, mobile social networks (MSNs) also known as opportunistic networks [1] or pocket switched networks [2] have rapidly become an increasingly popular field of networking research. MSNs are applicable to mobile wireless communications such as Sami Network Connectivity Project [3], Zebranet [4], Shared Wireless Info-Station [5], Vehicular Delay Tolerant Networks [6], and so on. MSNs have evolved from mobile ad hoc networks (MANETs) [7] and delay-tolerant networks (DTNs) (also known as disruption tolerant networks) [8] with social characteristics [9]. MSNs carry a more general concept with human-carried devices and include DTNs. Also, MSNs do not assume any compatibility with the Internet architecture, nor any a priori knowledge about the network topology, the areas of disconnections, or future link availability [10]. MSNs use contact opportunities and rely on devices carried by humans to relay messages for others [9]. However, like DTNs, MSNs suffer from intermittent connectivity and long-lasting disconnections due to low node density, short transmission ranges, and free node mobility. In addition, there may be no complete paths between the source and destination nodes [1]. Thus, the forwarding or routing schemes for MANETs are not applicable, and development of such schemes in MSNs have become a challenging problem. In MSNs, nodes communicate with the multi-hop and relay nodes that forward message addresses to other nodes in MSNs. In this case, however, forwarding is not on the
2 1700 Wireless Netw (2015) 21: fly because the relay nodes store messages when no forwarding opportunity exists, such as when there are no nodes within the transmission range. Moreover, they exploit any contact opportunity with other nodes in order to forward the message [10]. This forwarding mechanism is called a store, carry, and forward scheme and is performed hop by hop. In MSNs, node mobility creates opportunities for communication, whereas mobility in MANETs is viewed as a disruption of connections among nodes [10]. Therefore, the key issue in message forwarding is selection of proper nodes for message (or a copy of the message for a multi-copy scheme) handed [11]. Clustering has been shown to be a highly effective way to reduce network traffic in MANETs, and many clustering schemes have been proposed. However, none of them can be directly applied to MSNs because they are designed for well-connected networks and require timely information sharing among the nodes [12]. Among the proposed clustering schemes in MSNs, a distributed clustering scheme based on an exponentially weighted moving average [12] has been proposed. However, this scheme requires gateway nodes, each of which plays a role as a bridge between two nodes in different clusters. If a gateway node operates unpredictably, the scheme suffers from low performance. The DTN hierarchical routing (DHR) scheme [13] has been proposed to improve routing scalability. However, DHR is based on a deterministic mobility model in which all nodes move according to strict, repetitive patterns. Hence, the method is very difficult to implement in MSNs. Because mobile nodes have limited resources, such as bandwidth, power consumption, channel utilization, network size, and so on, the nodes in MSNs experience some communication difficulties. Therefore, as network traffic increases, network problems, such as bottlenecks, slow communication, and noise problems, are unavoidable. In addition, applications in MSNs should be relatively delaytolerant. However, it is still of interest to minimize the delay whenever possible [24]. To resolve this problem, we propose the hierarchical cluster-based forwarding scheme (HCS) to reduce network traffic while maintaining acceptable transmission delay. HCS constructs hierarchical clusters [14] using social information with the home-cell community-based mobility model (HCMM) [15]. Hierarchical clustering is a highly effective way for clustering nodes in MSNs because each node plays a similar role in flat clustering. This method is simple and effective in small networks but not applicable to large-sized MSNs [14]. HCS exploits agglomerate hierarchical clustering in the same way as in DHR. However, HCS adopts the common neighbor similarity to construct hierarchical clusters instead of the contact probability used in DHR. In HCS, each node utilizes both hierarchical clustering and similarity scores. The clustering information helps deliver the message with a smaller number of hops owing to social similarity and node movement patterns. The experimental results show that HCS reduces network traffic compared to non-clustering schemes, such as Epidemic [18], SimBet [24], PRoPHET [29], and common neighbor similarity [32] schemes, while maintaining decent transmission delay compared to the Wait scheme. Mobile nodes in MSNs generally more frequently visit certain places, like home communities, while visiting other locations only occasionally [16]. Because the home community-based mobility model (HCMM) reflects such a characteristic, it is well-suited for use in MSNs. The main contributions of this paper can be summarized as follows. 1. We propose a scheme using agglomerative (bottomup) hierarchical clustering with common neighbor similarities. Cluster level-based forwarding is introduced. 2. To more efficiently deliver a message to the destination node, similarity-based forwarding compensates for level-based forwarding. Using this technique, a node sends a message to other nodes with higher similarity scores with respect to the destination. 3. We conduct extensive simulations for experiments with the network simulator NS-2 and compare the results with non-clustering schemes, such as Epidemic, Wait, SimBet, PRoPHET, and common neighbor similarity schemes. The rest of this paper is organized as follows. In Sect. 2, we discuss related work. After introducing the simplified MSN model in Sect. 3, we describe the proposed scheme in Sect. 4. The simulation environment and results are presented in Sect. 5. Finally, the conclusion and future work are outlined in Sect Related work Existing routing protocols for MANETs [7], such as Dynamic Source Routing, Ad Hoc On-Demand Distance Vector, Split Multipath Routing, Shortest Multipath Source, and AntHocNet, have been introduced. A doublelayered peer-to-peer system using clustering was also proposed for improved routing performance [17]. None of the current schemes are applicable to MSNs regardless of improved performance because of the requirement for no complete path between the source and destination in MSNs. The opportunistic routing schemes can be classified in two categories: zero knowledge schemes and non-zero knowledge schemes. Zero knowledge schemes use no social information, while non-zero knowledge schemes
3 Wireless Netw (2015) 21: take advantage of the information about node behaviors or social relationships in order to make decisions for forwarding messages. Non-zero knowledge schemes are the ones utilized in MSNs. Zero knowledge schemes include Epidemic [18], Sprayand-Wait [19], Controlled routing protocol for DTN based on hierarchy forwarding and cluster control (CRHC) [20], Backpressure with adaptive redundancy (BWAR) [21], Backpressure-based routing scheme [22], Homing spread [16], and Hotspot-based forwarding scheme (HFS) [23]. In Epidemic when each node meets other nodes, it distributes the message to each of them, creating the replicas of the message. In Spray-and-Wait a node sprays a number of copies into some nodes in the network and then waits until one of these nodes meet the destination. First, a fixed number k of messages is transferred by spraying a half of k- copies. When each node has the last message after spraying messages, it waits until the moment when it meets the destination node during the wait phase. In CRHC, a node spreads a half of the messages to other nodes until meeting the destination when the destination is in the same cluster. On the other hand, a node sends a message to the clusterhead in the different cluster first, when the destination node is in a different cluster. However, it is not applicable to our environment because the network should select cluster heads and stable nodes in advance, where we can easily predict their moving patterns. BWAR takes advantages of replication to reduce delay under low load conditions. It creates copies of packets in a new duplicate buffer upon an encounter, when the transmitter s queue occupancy is low. In Backpressure-based routing scheme a node can make source rate, packet routing, and forwarding decisions without the notion of end-to-end routes, using information about queue backlogs and link states. Both BWAR and Backpressure-based routing schemes are applicable to the environment considering queue, link states and load conditions. Homing Spread utilizes community structure to identify suitable relay nodes. These approaches spread messages to the detected communities via relay nodes; however, they incur extra delivery overhead for mobile nodes. HFS floods messages only in hotpots, where nodes often interact; however, the size of the hotspots is limited. Various non-zero knowledge schemes have been proposed for MSNs [11, 24 31]. The non-zero knowledge schemes can be further classified into three schemes: centrality/similarity-based, social context-based, and probability-based. The centrality/similarity-based schemes include SimBet [24], Bubble Rap [25], and SANE [26]. SimBet makes use of the exchange of both betweenness centrality metrics and the locally determined social similarity to the destination node. When a node encounters other nodes, it transfers a message to the node with the higher utility values of betweenness centrality and similarity until reaching the destination node. Bubble Rap takes advantage of both global and local centrality. The bubble-up operations transmit a message to the destination node or its community. However, when the destination belongs only to a community whose members all have low global centrality values, such a strategy may fail. In this case, a relay node in the same local community as the destination node cannot be identified. SANE utilizes user interests and similarity. Social context-based schemes include Label [27] and HiBop [28]. In Label, each node is assumed to hold the label information of other nodes in its social community, similar to name tags used in a conference. Based on the labels, the routing scheme selects nodes for directly forwarding messages to the destination or for acting as the next-hop node that shares the same label as that of the destination. HiBop requires personal information, such as residence, work, hobbies and fun, as well as system information. Finally, probability-based schemes include PRoPHET [29], PeopleRank [30], and MobySpace [31]. PRoPHET first estimates a probabilistic metric called the delivery predictability, P(a, b), which indicates how likely it is that node b will receive a message from node a during a warmup period. Two nodes exchange the summary vector of the information on the messages and the delivery predictability vector. The information in the summary vector is used to determine which messages should be sent for requesting information from other nodes. PeopleRank uses the Page- Rank algorithm of Google as a guide for forwarding decisions. Whenever two neighbor nodes in the social graph meet, they exchange their current PeopleRank values and their numbers of social graph neighbors. MobySpace takes advantage of the knowledge concerning node mobility; however, it requires global information for routing. Non-zero knowledge schemes are very effective in forwarding messages. However, most non-zero knowledge schemes require global information for forwarding decisions. These schemes therefore exploit real datasets for their simulations. These real datasets can be processed in advance because they contain information on mobility, contact trace, and social interaction graphs [23]. 3 Simplified MSN model This system obeys the rules of typical message forwarding, whereby each node forwards a message to the destination node. We assume the network is represented by the graph G = hv, Ei, where the vertex set V consists of all nodes, and edge set E consists of the social links between nodes. Each node in MSNs has a unique identifier and is denoted
4 1702 Wireless Netw (2015) 21: by N i, i = 1, 2,, m, where m is the number of nodes in the network. Each node N i keeps track of a set C i of nodes that N i has encountered. Each node N i belongs to a single community, called its home community [2] so that it has a label [27] that indicates its home community, denoted by H i, where H i is one of {1, 2,, r} and r is the number of communities. Each node moves freely from its own home community to other communities and is aware of its own speed and current location. Each node periodically assesses its location. To determine the speed and location, each node is assumed to have positioning system equipment. For simplicity, we do not consider resources such as buffer size, bandwidth, or power. Although such measurements would result in additional computational costs, we do not consider such computational costs in this paper because the computation can be performed with simple equations. Moreover, the focus of this paper is not on computational cost reduction. The following table summarizes key notations used in describing HCS; some notations are introduced in the following sections (Table 1). 4 Proposed scheme 4.1 Information exchange in the warm-up period The greater is the number of common associates between a pair of persons, the more likely they are to be friends with each other, and the more frequently they are likely to meet each other. Such a social concept is naturally suited for the common neighbor similarity in the network [32] if we interpret a neighbor of a node as a commonly encountered node. A pair of nodes becomes more similar to each other as the number of common neighbor nodes increases. During the warm-up period, nodes exchange and update their information, including their own similarity scores. The purpose of updating the similarity scores is to accumulate the node contact information so that each node is able to obtain the estimated global information on the entire network. The similarity score between a pair of nodes, N i and N j, i = j, can be computed with C i \ C j that is the number of nodes encountered by both N i and N j. Each node N i maintains the information vector of (N i, H i, C i, S i ), where S i is the similarity score lists. During the warm-up period, whenever N i meets other nodes, N i exchanges its information vector with each of the encountered nodes and updates both C i and S i. Figure 1 shows a data structure of S i, where C i \ C j is the number of nodes encountered by both N i and N j. Observe that S i contains not only the contact information of N i itself but also the contact information of other nodes; for example, in Fig. 1, S i also contains the contact information of N j and N k. If any of N j and N k have met other nodes before encountering N i, there would be more entries in S i for their contact information. We now explain how two nodes update their own similarity scores after exchanging the information vectors each other. Assume that two nodes, say N 1 and N 2, are approaching each other at time t 1 with their similarity score lists S 1 and S 2 as shown in Fig. 2(a). Assume that N 1 had encountered N 3 and N 4 met N 3 for the first time, respectively, and later N 1 has encountered N 4. Therefore, C 1 \ C 4 = 1, indicating that both N 1 and N 4 commonly encountered N 3 before they meet each other. All such encounters have been recorded at S 1. Similarly, N 2 is assumed to have its contact information as in S 2. At time t 2, N 1 and N 2 exchange their information vectors and update their similarity score lists as shown in Fig. 2(b). In the first and second entries of S 1 and S 2,(N 2,1) and (N 1,1) have been created with score C 1 \ C 2 = 1, indicating that both N 1 and N 2 had encountered N 3 earlier than t 2. In Fig. 2(b), S 1 has the shaded entries that came from S 2 at time t 1, while S 2 has the unshaded entries that came from S 1 at time t 1. However, when S 1 and S 2 have a common entry such that one entry has larger similarity Table 1 Key notations used in HCS Notation m r N i H i C i S i L i [j] K i [j] d Definition The number of nodes in the network area The number of communities in the network area Node i, where i = 1, 2,, m Home community of N i A set of nodes that N i has encountered The similarity score lists of N i N j s level in the hierarchy of clusters constructed by N i A set of nodes in the cluster at level j in the hierarchy of clusters constructed by N i A threshold of level to quit the clustering Fig. 1 Data structure of S i
5 Wireless Netw (2015) 21: Fig. 2 Update of the similarity score lists. (a) Before the encounter (b) During the encounter score than the other, the entry with smaller score is updated with the larger one. Notice that S 1 and S 2 are equivalent after updating. By the end of the warm-up period, each node accumulates the contact history with similarity scores to extract the global information on the network. After the warm-up period, each node builds hierarchical clusters based on the obtained similarity score lists. 4.2 Hierarchical clustering Hierarchical clustering is widely used for finding community structures in a network. HCS adopts bottom-up hierarchical clustering based on common neighbor similarity. In bottom-up hierarchical clustering, also known as agglomerative clustering, each node serves as a single cluster in the beginning of the warm-up period, and clusters are iteratively merged until a certain condition is satisfied. In HCS, each node hierarchically builds based on its similarity score lists at the end of the warm-up period. We modify bottom-up hierarchical clustering in two ways. First, clustering ceases at some predetermined level of the hierarchy. Second, more than two clusters can be merged in a larger cluster. Each node performs clustering greedily in terms of similarity scores; that is, clusters containing the nodes with the highest similarity score are first merged into a cluster. Note that, once the nodes with the highest score belong to the same cluster, their similarity scores will no longer be considered for future clustering steps. Figure 3 illustrates how a node, say N 1, performs clustering with a threshold d = 4. In Fig. 3, {N 4 } and {N 5 } are merged first at level 1, because C 4 \ C 5, the similarity score between N 4 and N 5, is assumed to be the largest. We store such clustering information in an 1-dimensional array K 1, where K i [j] denotes a set of nodes in the cluster at level j in the hierarchy of clusters constructed by N i. Hence K 1 [1] = {N 4 } [ {N 5 } = {N 4, N 5 }. We also store the level number 1 for each of N 4 and N 5 in an 1-dimensional array L 1 ; L 1 [4] = L 1 [5] = 1. Then, {N 4, N 5 } and {N 3 } become one cluster at level 2, assuming that C 3 \ C 4 is the next largest; K 1 [2] = {N 4, N 5 } [ {N 3 } = {N 3, N 4, N 5 }. We assign level 2 to N 3 ; L 1 [3] = 2. In the figure, at level 3 {N 3, N 4, N 5 }, {N 1 }, and {N 2 } are merged into a single cluster, because C 1 \ C 3 = C 2 \ C 3 areassumedtobethenext largest. Hence, K 1 [3] = {N 3, N 4, N 5 } [ {N 1 } [ {N 2 } = {N 1, N 2, N 3, N 4, N 5 }andl 1 [1] = L 1 [2] = 3. Finally, {N 6 } and {N 7 } are merged at level 4 in the above example; K 1 [4] = {N 6 } [ {N 7 } = {N 6, N 7 } and L 1 [6] = L 1 [7] = 4. The reason why N 6 and N 7 are merged into a different cluster from K 1 [3] is that C 6 \ C 7 is assumed to be the next largest similarity score and neither N 6 nor N 7 belongs to K 1 [3] = {N 1, N 2, N 3, N 4, N 5 }. In the above hierarchical clustering, the higher the similarity is, the lower level the nodes are merged at. HCS stops merging clusters at a certain level d, which is
6 1704 Wireless Netw (2015) 21: Fig. 3 An example of hierarchical clustering determined through extensive simulation. Algorithm 1 formally describes the hierarchical clustering algorithm for HCS. The message forwarding process in level-based forwarding mimics the way people forward messages in virtual clusters with similar movement patterns. Within such a cluster, it is 4.3 Hierarchical clustering-based forwarding scheme In this section, we describe the proposed HCS forwarding scheme. In HCS, each node N i uses either level-based forwarding or similarity-based forwarding. In level-based forwarding, N i forwards the message to N j if L i [j] \ L i [i]. Note that, when nodes are clustered at lower levels, they are more likely to be similar; that is, they have encountered more common nodes. Hence, in the future, they are expected to meet valuable nodes, including the destination node. By valuable we mean that a node is more likely to reach the destination node. On the other hand, if N i encounters only N j such that L i [j] C L i [i], then N i stops using the clustering information, and instead simply uses the similarity scores in its S i.in other words, N i forwards the message to a node with the highest similarity score with respect to the destination node. Such forwarding is called similarity-based forwarding. Hence, similarity-based forwarding serves to compensate for cases when the level of the destination node is relatively higher. highly likely that some people could travel around the destination of a message. Note that HCS does not compute the delivery probabilities for forwarding messages. Instead, it exploits shortcuts on the path toward the destination node with the help of social similarity and node movement patterns. To implement this concept, each node in HCS creates its own hierarchical clusters in which nodes can frequently interact with each other. Even though each node independently builds its own hierarchical clusters, we expect that the clustering results of the nodes are quite similar to each other, because the nodes continuously exchange their information vectors and update similarity score lists whenever encountering other nodes during the warm-up period. Such clustering results can be viewed as the global network information. In HCS, clustering in each node is not updated during the forwarding process, because it causes additional communication overheads and does not improve the overall performance noticeably. Figure 4 illustrates how message forwarding is achieved in HCS. Figure 4(a) shows how level-based forwarding is performed. Suppose that N 2 is the source node and N 5 is the destination node. A solid arrow indicates a possible
7 Wireless Netw (2015) 21: Fig. 4 Examples of forwarding process. (a) Level-based forwarding (b) Similarity-based forwarding forwarding, while a dotted arrow denotes that there is no message forwarding. N 2 forwards the message only if the level of the encountered node is lower than that of N 2. Here, N 2 can forward to N 3, N 4, or directly N 5, if they are within the communication range of N 2.IfN 3 receives the message from N 2, N 3 first looks into its level information, and then forwards the message to the encountered nodes with lower level than the level of N 3.IfN 4 receives the message from N 2, N 4 can send the message to N 5 when they encounter each other. N 7 whenever they are encountered, because they have higher similarity scores than N 5 ; that is, C 5 \ C 2 \ C 4 \ C 2 \ C 3 \ C 2. Note that they can check their similarity scores with the destination N 2 in their similarity score lists without additional communication with N 2. However, N 5 never sends the message to N 1 nor N 6 because their scores are lower than that of N 5. In general, once node N i has a message, it can forward the message to a node that has higher similarity score than that of N i with respect to the destination. Figure 4(b) illustrates how similarity-based forwarding is accomplished. We assume that the source node is N 5 and the destination node is N 2. The integer next to each node is the similarity score with respect to the destination node. In this case, because the level of the destination node is higher than that of the source node, HCS exploits the similarity scores. Therefore, N 5 can forward the message to N 3, N 4,or At the end of the warm-up period, each node independently constructs its own clusters and generates a message to send. When each node N i encounters a set of nodes within its communication range, it executes Algorithm 2. Let E be the set of (encountered) nodes within the communication range of N i. Assume that N s is the source node and N d is the destination node. In Line 2, when N d is in E,
8 1706 Wireless Netw (2015) 21: N i simply forwards the message, and the forwarding process is done. Otherwise, N i sends the message with levelbased forwarding if L i [d] \ L i [s]; that is, if the level of the destination node is lower than that of the source node. Therefore, N i attempts to find node N j, whose level is lower than L i [i]. If L i [d] C L i [s], N i sends the message with similarity-based forwarding. Therefore, it tries to finds node N j whose similarity score is higher than that of N i with respect to N d. In either case, N i sends the message to N j if found in E in Line 9. If N i cannot find N j in Lines 6 or 8, N i does not transmit the message at this time. 5 Experimental results 5.1 Simulation environments In the experiment, we use the network simulator NS-2 v2.35 [33] for the simulations. The network area is set to 450 m m, and the community size is 150 m m. The number of grids is 9. The number of communities among the grids is 4, and each community has 10 or more nodes. The number of nodes is set to 40, 50, 60 or 70. The communication range varies from 10 to 50 m. The movement of a node follows HCMM [15], which is a frequently used movement pattern in MSN simulations. Because the node contact information is not available in HCMM, a warm-up period is required to obtain estimated social (global) information in order to utilize the socialaware forwarding schemes. The velocity of a node ranges from 1 to 9 m/s, which is appropriate for either people or vehicles. In our simulator, a mobile node issues one message to a random destination right after the warm-up period. After a source node transmits its message to other nodes, it still keeps the message. The warm-up period is set to 1,000 s for collecting enough node contact information. Both SimBet and PRoPHET also need the warm-up period to obtain the information required. In particular, the cluster level varies from 1 to 10 for constructing hierarchical clusters based on our extensive experiments. The total simulation time is 8,000 s. We run each scheme 20 times and determine the average results. Table 2 summarizes the parameters used in our simulation. All simulation environments are as in [23]. We evaluated the proposed scheme with the following performance metrics: 1. Delivery ratio: Ratio of the number of delivered messages to the total number of messages issued. 2. Network traffic: Total number of messages sent and received. 3. Delay: Time required for a message to travel from the source to destination nodes. Table 2 Simulation parameters Parameter We do not consider the network traffic during the warmup period, since most schemes in MSNs ignore network traffic [24, 29]. We found that the amount of traffic in the warm-up period is not big enough to affect the total amount of traffic. For 8,000 s, we simulate and compare the proposed scheme HCS with non-clustering schemes such as Epidemic, Wait, SimBet, PRoPHET, and common neighbor similarity schemes. During this period, all the schemes except Wait achieve 1.0 delivery ratio. Epidemic and Wait, which are typical social-oblivious schemes, Epidemic has the highest network traffic and the lowest transmission delay, while Wait shows the highest transmission delay and the lowest network traffic. In the rest of the schemes, SimBet, which is the centrality/similarity-based scheme, uses the betweenness centrality. PRoPHET, which is the predictability-based scheme, takes advantages of contact probability. During the warm-up period, SimBet collects common neighbor similarities and betweenness centralities of nodes, obtains the SimBet utility values by combining both metrics. PRoPHET calculates the delivery predictability P(a, b) during the warm-up period. In both schemes, each node forwards a message to another node with higher SimBet utility or higher delivery predictability for the destination, respectively. Common neighbor similarity scheme uses only common neighbor similarity that HCS uses for clustering. Hence, we compare these schemes against HCS. 5.2 Simulation results Effect of cluster level Value (default) Network area m 2 Community size m 2 Number of grids 9 Number of communities 4 Number of nodes 40, 50, 60, 70, (40) Communication range 10, 20, 30, 40, 50, (10) m Velocity of nodes 1 * 9 m/s Warm-up period 1,000 s Cluster level 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, (5) Simulation time 8,000 s We examine the performance of HCS at different cluster levels when the communication range is 10 m. Figure 5 shows network traffic and transmission delay of HCS with various cluster levels. The cluster level varies from 1 to 10. As shown in Fig. 5(a), when the level is low, HCS shows higher network traffic. However, as the level increases,
9 Wireless Netw (2015) 21: Fig. 5 Effect of cluster level.(a) Network traffic (b) Transmission delay Fig. 6 Delivery ratios and network traffic by time. (a) Delivery ratio (b) Network traffic HCS increasingly reduces network traffic. Such a phenomenon arises because HCS utilizes clustering information very well at high clustering levels. On the other hand, as shown in Fig. 5(b), as the level becomes higher, HCS shows longer transmission delay because it requires longer time to find the nodes with lower levels. However, because HCS appropriately uses both level-based and similarity-based forwarding, its traffic amount is still smaller than those of the non-clustering schemes. It is evident that a proper value of d in hierarchical clustering for this environment is 5, because we get relatively lower traffic as well as acceptable delay. However, d should be appropriately chosen according to the given environment Delivery ratios and network traffic by time Figure 6 shows the delivery ratios and network traffic as the simulation time reaches 8,000 s. The results are shown after 1,000 s in order not to include the results of the warm-up period. The number of nodes is set to 40. In Fig. 6(a), the non-clustering schemes, except Wait, achieve the maximum delivery ratio that is faster than that of HCS, because they allow multiple copies of messages. Because Wait does not distribute a message but instead waits for the message to encounter its destination, it requires much longer time to reach the 1.0 delivery ratio. However, HCS uses an appropriate number of copies of a message, thereby resulting in a somewhat slower time in
10 1708 Wireless Netw (2015) 21: Fig. 7 Effect of the number of nodes. (a) Delivery ratio. (b) Network traffic. (c) Transmission delay reaching the 1.0 delivery ratio compared with other schemes. For network traffic shown in Fig. 6(b), each scheme experiences higher network traffic as time passes. HCS shows much lower traffic than the non-clustering schemes except Wait. Note that HCS distributes the messages to the nodes with lower levels or higher similarity scores Effect of number of nodes We evaluate the performance of the schemes as the number of nodes increases. Figure 7(a) shows the average delivery ratio with nodes. Figure 6(a) compares the delivery ratios of the schemes; the non-clustering schemes, except Wait, reach a 1.0 delivery ratio faster than HCS, because HCS maintains only an appropriate number of copies of a message. Figure 7(b) shows the network traffic when the number of nodes increases. As expected, the amount of traffic in the non-clustering schemes explosively increase as the number of nodes increases. In particular, the difference between HCS and each of the non-clustering schemes is large. HCS shows the lowest traffic except for Wait.InHCS, as the number of nodes increases, so does the number of valuable nodes that play a critical role in message delivery. Figure 7(c) shows transmission delay. The delays of most schemes decrease as the number of nodes increases. However, Wait demonstrates similar patterns regardless of the number of nodes. The delay in HCS is higher than those of the non-clustering schemes because of their multiple message copies. However, HCS well maintains the balance between network traffic and transmission delay.
11 Wireless Netw (2015) 21: Fig. 8 Effect of communication range. (a) Delivery ratio, (b) Network traffic, (c) Transmission delay Effect of communication range Finally, we compare the effect of the communication range of the nodes for each scheme. The number of nodes is set to 40. Figure 8(a) shows the average delivery ratios with m of the communication range. In Figs. 6(a) and 7(a), the delivery ratios of HCS increase little bit slower than those of other schemes except Wait because HCS maintains a smaller number of copies even if the communication range increases. As shown in Fig. 8(b), as the communication range becomes wider, all the schemes except Wait experience increased network traffic. PRo- PHET shows a moderate increase because only the nodes with higher contact probability to the destination participated in the delivery of the messages. However, HCS shows the lowest traffic except Wait when the communication range is 10 because the nodes that are involved in message delivery are properly chosen. Such a result confirms that HCS can be well implemented in a sparse network. Figure 8(c) shows the transmission delays of the schemes. It is natural that most schemes incur shorter delays as the communication range increases. Epidemic shows the shortest delay. SimBet and Common exhibit similar results. However, PRoPHET suffers from a longer delay compared with HCS, except when the communication range is 10. The transmission delays of HCS and Wait significantly decrease as the range increases. In HCS, the percentages of level-based forwarding and similarity-based forwarding during the entire forwarding processes are 91.3 and 8.7 %, respectively. It is evident that hierarchical clustering on social similarity in HCS is well constructed; therefore, relay nodes are properly chosen with the
12 1710 Wireless Netw (2015) 21: clustering information. Hence, the transmission delay of HCS becomes significantly lower as the communication range becomes larger. The results in both figures demonstrate that HCS maintains a well-balanced performance between network traffic and transmission delay. 6 Conclusion In MSNs, non-clustering schemes suffer from higher network traffic. To reduce network traffic, we proposed a forwarding scheme using hierarchical clustering based on social information. The proposed scheme effectively distributes the messages to the nodes via shortcuts by exploiting clustering results. Experimental results demonstrated that the scheme reduced network traffic compared to non-clustering schemes, while delay was acceptable compared to the Wait scheme. In future work, we plan to study more enhanced dynamic forwarding schemes with varying resources in consideration of continuous information updating in MSNs. Acknowledgments This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2013R1A1A ). References 1. Conti, M., Giordano, S., May, M., & Passarella, A. (2010). From opportunistic networks to opportunistic computing networks. IEEE Communications Magazine, 48(9), Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., & Diot, C. (2005). Pocket switched networks and human mobility in conference environments. In Proceedings of ACM SIGCOMM Workshop on Delay-Tolerant Networking (WDTN 2005) (pp ). 3. Lindgren, A., & Doria, A. (2007). Experiences from deploying a reallife dtn system. In Proceedings of IEEE Consumer Communications and Networking Conference (CCNC) (pp ). 4. Juang, P., Oki, H., Wang, Y., Maronosi, M., Peh, L., & Rubenstein, D. (2002). Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet. In Proceedings of Architectural Support for Programming Languages and Operating Systems (ASPLOS) (pp ). 5. Small, T., & Haas, Z. J. (2003). The shared wireless infestation model: A new ad hoc networking paradigm (or where there is a whale, there is a way). In Proceedings of MobiHoc (pp ). 6. Zeng, Y., Xiang, K., Li, D., & Vaslakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), Zafar, H., Alhamahmy, N., Harle, D., & Andonovic, I. (2011). Survey of reactive and hybrid routing protocols for mobile ad hoc networks. Communication Networks and Information Security, 3(3), Spyropoulos, T., Rais, R. N., Turletti, T., Obraczka, K., & Vasilakos, A. (2010). Routing for disruption tolerant networks: Taxonomy and design. Wireless Networks, 16(8), Hui, P., Xu, K., Li, V., Crowcroft, J., Latora, V., & Lio, P. (2009). Selfishness, altruism and message spreading in mobile social networks. In Proceedings of IEEE INFOCOM Workshop (pp. 1 6). 10. Conti, M., & Kumar, M. (2010). Opportunities in opportunistic computing. IEEE Computer, 43(1), C. Bordrini, M. Conti, and A. Passarella (2011). Modeling socialaware forwarding in opportunistic networks. Performance Evaluation of Computer and Communication Systems, 6821 (LNCS), Dang, H., & Wu, H. (2010). Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Transactions on Wireless Communications, 9(6), Liu, C., & Wu, J. (2009). Scalable routing in delay tolerant networks. In Proceedings of MobiHoc (pp ). 14. Cambridge University (2009). Online edition (c), chapter hierarchical clustering, pp Boldrini, C., & Passarella, A. (2010). HCMM: Modelling spatial and temporal properties of human mobility driven by users social relationships. Computer Communications, 33(9), Wu, J., Xiao, M., & Huang, L. (2013). Homing spread: Community home-based multi-copy routing in mobile social networks. In Proceedings of IEEE INFOCOM (pp ). 17. Kim, J. H., Lee, K. J., Kim, T. H., & Yang, S. B. (2011). Effective routing schemes for double-layered peer-to-peer systems in manet. Journal of Computing Science Engineering, 5(1), Vahdat, A., & Becker, D. (2000). Epidemic routing for partiallyconnected ad hoc networks. Technical Report CS Spyropoulos, T., Psounis, K., & Raghavendra, C. (2005). Spray and wait: An efficient routing scheme for intermittently connected mobile networks. In Proceedings of ACM SIGCOMM (pp ). 20. Hua, D., Du, X., Qian, Y., & Yan, S. (2009). A DTN routing protocol based on hierarchy forwarding and cluster control. In Proceedings of IEEE Computational Intelligence and Security (pp ). 21. Alresaini, M., Sathiamoorthy, M., Krishnamachari, B., & Neely, M. J. (2012). Backpressure with adaptive redundancy. In Proceedings of IEEE INFOCOM (pp ). 22. Dvir, A., & Vasilakous, A. V. (2010). Backpressure-based routing protocol for DTNs. In Proceedings of ACM SIGCOMM (pp ). 23. Kim,S. K., Choi, J. H., & Yang, S. B. (in press). Hotspot: Location-based forwarding scheme in an opportunistic network. Ad hoc & Sensor Wireless Networks. 24. Daly,E. H., & Haahr, M. (2007). Social network analysis for routing in disconnected delay-tolerant manets. In Proceedings of ACM MobiHoc (pp ). 25. Hui, P., Crowcroft, J., & Yoneki, E. (2011). Bubble rap: Socialbased forwarding in delay tolerant networks. IEEE Transactions on Mobile Computing, 10(11), Mei, A., Morabitto, G., Santi, P., & Stefa, J. (2011). Social-aware stateless forwarding in pocket switched networks. In Proceedings of IEEE INFOCOM (pp ). 27. Hui, P., & Crowcroft, J. (2007). How small labels create big improvements. In Proceedings of Pervasive Computing and Communications Workshop (pp ). 28. Boldrini, C., Conti, M., & Passarella, A. (2008). Exploiting users social relations to forward data in opportunistic networks: The HiBop solution. Pervasive and Mobile Computing, 4(5), Lindgren, A., Doria, A., & Schelen, O. (2004). Probabilistic routing in intermittently connected networks. Service Assurance with Partial and Intermittent Resources, 3126 (LNCS),
13 Wireless Netw (2015) 21: Mtibaa, A., May, M., Diot, C., & Ammar, M. (2010). People- Rank: Social opportunistic forwarding. In Proceedings of IEEE INFOCOM (pp. 1 5). 31. Leguay, J., Friedman, T., & Conan, V. (2007). Evaluating MobySpace based routing strategies in delay tolerant networks. Wireless Communications and Mobile Computing, 7(10), Newman, M. E. J. (2001). Clustering and preferential attachment in growing networks. Physical Review Letters, E 64, Network simulator-2. Junyeop Lee is currently an M.S. candidate in computer science at Yonsei University in Korea. His research interests include mobile social networks, delay tolerant networks and social network analysis. Sun-Kyum Kim received his M.S. in computer science from Yonsei University in Korea in He is currently a Ph.D. candidate at Yonsei University. His research interests include mobile social networks, delay tolerant networks and social network analysis. Sung-Bong Yang received his M.S. and Ph.D. from the Department of Computer Science at the University of Oklahoma in 1986 and 1992, respectively. He has been a professor at Yonsei University since His research interests include graph algorithms, mobile computing, and social network analysis. Ji-Hyeun Yoon is currently an Ph.D. candidate in computer science at Yonsei University in Korea. His research interests include mobile social networks, delay tolerant networks and social network analysis.
novel cooperative forwarding scheme for social preference-based
Wireless Netw (2016) 22:537 552 DOI 10.1007/s11276-015-0984-2 A cooperative forwarding scheme for social preference-based selfishness in mobile social networks Sun-Kyum Kim 1 Ji-Hyeun Yoon 1 JunYeop Lee
More informationA Joint Replication-Migration-based Routing in Delay Tolerant Networks
A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West
More informationDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,
More informationImpact of Social Networks in Delay Tolerant Routing
Impact of Social Networks in Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic
More informationRouting with Multi-Level Social Groups in Mobile Opportunistic Networks
Routing with Multi-Level Social Groups in Mobile Opportunistic Networks Lunan Zhao Fan Li Chao Zhang Yu Wang School of Computer Science, Beijing Institute of Technology, Beijing, 100081, China. Department
More informationPerformance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2
, pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department
More informationComparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay
Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula
More informationEstimation based Erasure-coding Routing in Delay Tolerant Networks
Estimation based Erasure-coding Routing in Delay Tolerant Networks Yong Liao, Kun Tan, Zhensheng Zhang, Lixin Gao Dep. of Electrical & Computer Eng. Microsoft Research Asia San Diego Research Center University
More informationEnergy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models
2016 7th International Conference on Intelligent Systems, Modelling and Simulation Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models Bhed Bahadur
More informationRouting Protocol Approaches in Delay Tolerant Networks
Routing Protocol Approaches in Delay Tolerant Networks Shivi Shukla 1, Amit Munjal 2 and Y. N. Singh 2 AIM & ACT Dept., Banasthali Vidyapith, Rajasthan 1 EE Dept., Indian Institute of Technology, Kanpur
More informationImpact of Social Networks on Delay Tolerant Routing
Impact of Social Networks on Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic
More informationEnergy Efficient Social-Based Routing for Delay Tolerant Networks
Energy Efficient Social-Based Routing for Delay Tolerant Networks Chenfei Tian,FanLi,, Libo Jiang,ZeyeWang, and Yu Wang 2, School of Computer Science, Beijing Institute of Technology, Beijing, 8, China
More informationArchna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India
Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation
More informationFriendship Based Routing in Delay Tolerant Mobile Social Networks
Friendship Based Routing in Delay Tolerant Mobile Social Networks Eyuphan Bulut and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic
More informationComparative Study of Routing Protocols for Opportunistic Networks
Comparative Study of Routing Protocols for Opportunistic Networks Majeed Alajeely School of Information Technology Deakin University Melbourne, Australia Email: malajeel@deakin.edu.au Asma a Ahmad School
More informationBUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks
1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms
More informationApplication of Graph Theory in DTN Routing
Application of Graph Theory in DTN Routing Madan H. T. 1, Shabana Sultana 2 1 M. Tech. (CNE), NIE, Mysuru 2 Associate Professor, Dept. of Computer Science & Eng., NIE, Mysuru Abstract: Delay tolerant network
More informationIntegrated Routing Protocol for Opportunistic Networks
Integrated Routing Protocol for Opportunistic Networks Anshul Verma Computer Science and Engineering Dept. ABV-Indian Institute of Information Technology and Management, Gwalior, India E-mail: anshulverma87@gmail.com
More informationMessage Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks
, March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,
More informationSocial Properties Based Routing in Delay Tolerant Network
RESEARCH ARTICLE OPEN ACCESS Properties Based Routing in Delay Tolerant Network Aliasger k. Dhilawala 1, Vishal shah 2 1 (Computer Department, S.V.I.T, Vasad,India 2 (Computer Department, S.V.I.T, Vasad,India
More informationExploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach
Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach 7 th Annual IEEE Communication Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 10)
More informationInterestSpread: An Efficient Method for Content Transmission in Mobile Social Networks
: An Efficient Method for Content Transmission in Mobile Social Networks ABSTRACT Ning Wang Dept. of Computer and Information Sciences Temple University Philadelphia PA 9 ning.wang@temple.edu In Mobile
More informationPerformance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments
Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Bhed Bahadur Bista Faculty of Software and Information Science Iwate Prefectural University Takizawa
More informationDesign and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network
IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy
More informationPeopleRank: Social Opportunistic Forwarding
PeopleRank: Social Opportunistic Forwarding Abderrahmen Mtibaa Martin May Christophe Diot Mostafa Ammar Thomson, Paris, France Georgia Institute of Technology firstname.lastname@thomson.net ammar@cc.gatech.edu
More informationDelay Tolerant Networks
Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected
More informationImprovement of Buffer Scheme for Delay Tolerant Networks
Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science
More informationOverhead Reduction In Delay Tolerant Networks
Overhead Reduction In Delay Tolerant Networks Azadeh Omidvar School of Electrical Engineering Iran University of Science and Technology Tehran, Iran omidvar@elec.iust.ac.ir Karim Mohammadi School of Electrical
More informationOpportunistic Networks: A Review
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. III (Mar-Apr. 2016), PP 20-26 www.iosrjournals.org Opportunistic Networks: A Review Navneet
More informationCommunity-Based Adaptive Buffer Management Strategy in Opportunistic Network
Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Junhai Zhou, Yapin Lin ( ), Siwang Zhou, and Qin Liu College of Computer Science and Electronic Engineering, Hunan University,
More informationOpportunistic Networks: Minimizing Expected Latency
Opportunistic Networks: Minimizing Expected Latency Shohreh Shaghaghian and Mark Coates Department of Electrical and Computer Engineering, McGill University 348 University St., Montreal, QC, Canada H3A
More informationSocial-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks
Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks Yuan Xu, Xiao Chen Department of Computer Science, Texas State University, San Marcos, TX, USA Email: y x3@txstate.edu, xc@txstate.edu
More informationWei Gao, Qinghua Li, Bo Zhao and Guohong Cao The Pennsylvania State University From: MobiHoc Presentor: Mingyuan Yan Advisor: Dr.
Wei Gao, Qinghua Li, Bo Zhao and Guohong Cao The Pennsylvania State University From: MobiHoc 2009 Presentor: Mingyuan Yan Advisor: Dr. Yingshu Li 1 2 3 4 5 Introduction Problem definition Single-data multicast
More informationTRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES
TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy,
More informationElimination Of Redundant Data using user Centric Data in Delay Tolerant Network
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant
More informationGeographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs
Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs Dr. Santhi Kumaran Associate Professor, Dept of Computer Engineering,
More informationHeterogeneous Community-based Routing in Opportunistic Mobile Social Networks
Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Yunsheng Wang Kettering University Jie Wu Temple University Mingjun Xiao University of Science and Tech. of China Daqiang Zhang
More informationSpray and Dynamic: Advanced Routing in Delay Tolerant Networks
Int. J. Communications, Network and System Sciences, 2012, 5, 98-104 http://dx.doi.org/10.4236/ijcns.2012.52013 Published Online February 2012 (http://www.scirp.org/journal/ijcns) Spray and Dynamic: Advanced
More informationCLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS
http:// CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS M.Sengaliappan 1, K.Kumaravel 2, Dr. A.Marimuthu 3 1 Ph.D( Scholar), Govt. Arts College, Coimbatore, Tamil Nadu, India 2 Ph.D(Scholar), Govt.,
More informationProbability Delegation Forwarding in Delay Tolerant Networks
Probability Delegation Forwarding in Delay Tolerant etworks Xiao Chen Dept. of Comp. Sci. Texas State University San Marcos, TX 78666 xc10@txstate.edu Jian Shen Dept. of Math. Texas State University San
More informationBuffer Management in Delay Tolerant Networks
Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)
More informationA ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China
More informationCapacity-Aware Routing Using Throw-Boxes
Capacity-Aware Routing Using Throw-Boxes Bo Gu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {bgu,hxy}@cs.ua.edu Abstract Deploying the static wireless devices
More informationEffective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks
sensors Article Effective Social Relationship Measurement and Cluster Based Routing in Mobile Opportunistic Networks Feng Zeng 1, *, Nan Zhao 1 and Wenjia Li 2, * 1 School of Software, Central South University,
More informationSocial-Aware Routing in Delay Tolerant Networks
Social-Aware Routing in Delay Tolerant Networks Jie Wu Dept. of Computer and Info. Sciences Temple University Challenged Networks Assumptions in the TCP/IP model are violated DTNs Delay-Tolerant Networks
More informationTimely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks
27 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): 27 IEEE Infocom MiseNet Workshop Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks
More informationPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS Sanjay Kumar, K. Suraj and Sudhakar Pandey Department of Information Technology, National Institute of Technology Raipur, India E-Mail:
More informationAn Agenda-Based Routing Protocol in Delay Tolerant Mobile Sensor Networks
Sensors 2010, 10, 9564-9580; doi:10.3390/s101109564 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article An Agenda-Based Routing Protocol in Delay Tolerant Mobile Sensor Networks Xiao-Min
More informationABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 Survey of Various Protocols Used for Delay Tolerant
More informationInternational Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18, ISSN
International Journal of Computer Engineering and Applications, ANALYZING IMPACT OF FACTORS ON ROUTING DECISIONS IN OPPORTUNISTIC MOBILE NETWORKS Sonam Kumari 1, Dr. Itu Snigdh 2 Department of Computer
More informationChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks
ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks Douglas McGeehan Dan Lin Sanjay Madria Department of Computer Science Missouri University of Science and Technology Rolla,
More informationSMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks
SMART: Lightweight Distributed Social Map Based Routing in Delay Tolerant Networks Kang Chen and Haiying Shen Department of Electrical and Computer Engineering Clemson University, Clemson, SC 9631 Email:
More informationCluster Based Approach for Overhead Reduction and Load Balancing in Delay Tolerant Mobile Applications
Cluster Based Approach for Overhead Reduction and Load Balancing in Delay Tolerant Mobile Applications 1 Shankar B Sajjan, 2 Amit Kumar, 3 Masrath Begum, 4 Ambrish Kaneri 1234 Assistant Professor, CSE
More informationCost Efficient Erasure Coding based Routing in Delay Tolerant Networks
Cost Efficient Erasure Coding based Routing in Delay Tolerant Networks Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking
More informationRouting Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network
Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Ankur Upadhyay Department of Computer Science & Engineering School of Engineering & Technology, IFTM
More informationDIAL: A Distributed Adaptive-Learning Routing Method in VDTNs
DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs Authors: Bo Wu, Haiying Shen and Kang Chen Dept. of Electrical and Computer Engineering Clemson University, SC, USA 1 Outline Background Trace
More informationExploiting Active Sub-areas for Multi-copy Routing in VDTNs
Exploiting Active Sub-areas for Multi-copy Routing in VDTNs Bo Wu, Haiying Shen and Kang Chen Department of Electrical and Computer Engineering Clemson University, Clemson, South Carolina 29634 {bwu2,
More informationCombined Mobile Ad-hoc and Delay/Disruption-tolerant Routing
This is an authors' version of the manuscript. Final version published in Proc. 13th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW '14). Springer LNCS 8487, pp. 1-14, 2014. The final
More informationCommunity-Aware Opportunistic Routing in Mobile Social Networks
1682 IEEE TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 7, JULY 2014 Community-Aware Opportunistic Routing in Mobile Social Networks Mingjun Xiao, Member, IEEE, Jie Wu, Fellow, IEEE, and Liusheng Huang, Member,
More informationSpray and forward: Efficient routing based on the Markov location prediction model for DTNs
. RESEARCH PAPER. SCIENCE CHINA Information Sciences February 2012 Vol. 55 No. 2: 433 440 doi: 10.1007/s11432-011-4345-1 Spray and forward: Efficient routing based on the Markov location prediction model
More informationModeling Redundancy-based Routing in Delay Tolerant Networks
Modeling Redundancy-based Routing in Delay Tolerant Networks Yong Liao, Kun Tan, Zhensheng Zhang, Lixin Gao Dep. of Electrical & Computer Eng. Microsoft Research Asia San Diego Research Center University
More informationBuffer Aware Network Coded Routing Protocol for Delay Tolerant Networks
Middle-East Journal of Scientific Research 23 (Sensing, Signal Processing and Security): 291-296, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.ssps.111 Buffer Aware Network
More informationAvailable online at ScienceDirect. Procedia Computer Science 85 (2016 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 85 (2016 ) 891 898 International Conference on Computational Modeling and Security (CMS 2016) Analysis of routing and forwarding
More informationCOMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS
COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS Chintan B. Desai PG Student, Electronics and Communication Department, Charotar University of Science & Technology, Changa,
More informationProbabilistic Routing With Multi-copies in Delay Tolerant Networks
Probabilistic Routing With Multi-copies in Delay Tolerant Networks Ze Li and Haiying Shen Department of Computer Science and Computer Engineering University of Arkansas, Fayetteville, AR 7701 {zxl008,
More informationOpportunistic Routing Algorithms in Delay Tolerant Networks
Opportunistic Routing Algorithms in Delay Tolerant Networks Eyuphan Bulut Rensselaer Polytechnic Institute Department of Computer Science and Network Science and Technology (NeST) Center PhD Thesis Defense
More informationSimulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network
Simulation of, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network 1 Monika Aneja, 2 Vishal Garg 1 (P.G. Student JMIT, Radaur, Yamunanagar) 2 (Assistant Professor JMIT Radaur Yamunanagar)
More informationImproving the efficiency of DTN with social graph
1 Improving the efficiency of DTN with social graph Jiahua Chang Communication department of Aalto University School of Science & Technology Espoo, Finland Abstract Delay Tolerant Networks (DTN) are networks
More informationIJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur
International Journal of Scientific & Engineering Research, Volume 7, Issue 4, April-2016 1717 A Review of Energy Consumption on DTN Routing Protocols Sukhpreet Kaur Abstract: DTN is net of similar nets.
More informationDensity-Aware Routing in Highly Dynamic DTNs: The RollerNet Case
Density-Aware Routing in Highly Dynamic DTNs: The RollerNet Case Pierre-Ugo Tournoux, Student Member, IEEE, Je re mie Leguay, Farid Benbadis, John Whitbeck, Student Member, IEEE, Vania Conan, and Marcelo
More informationEnhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization
Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization Dhanveer Kaur 1, Harwant Singh Arri 2 1 M.Tech, Department of Computer Science and Engineering, Lovely
More informationMDR Based Cooperative Strategy Adaptation in Wireless Communication
MDR Based Cooperative Strategy Adaptation in Wireless Communication Aswathy Mohan 1, Smitha C Thomas 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: Cooperation among
More informationNEW STRATEGY TO OPTIMIZE THE PERFORMANCE OF SPRAY AND WAIT ROUTING PROTOCOL
NEW STRATEGY TO OPTIMIZE THE PERFORMANCE OF SPRAY AND WAIT ROUTING PROTOCOL Mohamed Ababou 1, Rachid Elkouch 2, Mostafa Bellafkih 3 and Nabil Ababou 4 1 National Institute of Posts and Telecommunications
More informationROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY
ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY Vidya K 1, Mr Hemanth S R 2 1 M.Tech, 2 Assistant Professor, Department of Computer Science Maharaja Institute of Technology
More informationResearch Article ISSN:
International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2.2015 Boosting Performance of Data
More informationMessage Forwarding in Cyclic MobiSpace: the Multi-copy Case
Message Forwarding in Cyclic MobiSpace: the Multi-copy Case Cong Liu Shenzhen Institute of Advanced Technology Chinese Academy of Science gzcong@gmail.com Jie Wu Dept. of Computer & Information Sciences
More informationUsing local speed information as routing metric for delay tolerant networks
Using local speed information as routing metric for delay tolerant networks FUQUAN ZHANG 1, INWHEE JOE, DEMIN GAO 1 AND YUNFEI LIU 1 1 College of Information and Sciences NanJing Forestry University NanJing
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationCOMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks
COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks Long Vu, Quang Do, Klara Nahrstedt Department of Computer Science, University of Illinois
More informationMinimizing Average Spraying Cost for Routing in Delay Tolerant Networks
Minimizing Average Spraying Cost for Routing in Delay Tolerant Networks Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking
More informationDynamic Social Grouping Based Routing in a Mobile Ad-Hoc Network
Dynamic Social Grouping Based Routing in a Mobile Ad-Hoc Network Roy Cabaniss, Sanjay Madria, George Rush, Abbey Trotta and Srinivasa S. Vulli Department of Computer Science, Missouri University of Science
More informationKeywords: Store and carry networks, Forwarding strategies, routing, DTN, Minimum hop transmission
Global Journal of Computer Science and Technology Volume 11 Issue 9 Version 1.0 May 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) ISSN: 0975-4172
More informationAn Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments
An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments Sun-Kyum Kim, Kwang-Jo Lee, Sung-Bong Yang Departement of Computer Science Yonsei University Repubilc of Korea {skyum,
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationEmpirical Evaluation of Hybrid Opportunistic Networks
Empirical Evaluation of Hybrid Opportunistic Networks Pan Hui, Anders Lindgren, Jon Crowcroft firstname.lastname@cl.cam.ac.uk University of Cambridge Deutsche Telekom Laboratories Abstract In this paper,
More informationA SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING Sanjit Kumar Dash 1, Chandrakanta Mahanty 2, Sasmita Mishra 3 and Jibitesh Mishra 1 1 College of Engineering and
More informationHierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing Chithra M. 1, Mr. Vimalathithan
More informationKeywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY An Efficient Selfishness Aware Routing in Delay Tolerant Networks N.Senthilkumar *1, Dr. T.V U. Kiran Kumar 2 *1,2,3,4 Bharath
More informationWaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks
WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,
More informationRouting in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong
Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM 2004 Presented by Xun Gong Outline Delay Tolerant Networks Routing Problem in DTNs Multiple-copy Approach Flooding and
More information[Bhosale*, 4.(6): June, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EFFECTIVE DATA FORWARDING TECHNIQUE IN MOBILE SOCIAL NETWORK Ms.Yogita Y.Bhosale*, Prof.Nilesh R.Pardeshi * Department of Computer
More informationA Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks
A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,
More informationInternational Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali
More informationCFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs
: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs Ying Dai Software Institute Nanjing University dy06@software.nju.edu.cn Panlong Yang, Guihai Chen Dept. of Computer Sci. and
More informationERASURE-CODING DEPENDENT STORAGE AWARE ROUTING
International Journal of Mechanical Engineering and Technology (IJMET) Volume 9 Issue 11 November 2018 pp.2226 2231 Article ID: IJMET_09_11_235 Available online at http://www.ia aeme.com/ijmet/issues.asp?jtype=ijmet&vtype=
More informationEA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks
Journal of Communications Vol. 12, No. 6, June 217 EA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks Bhed B. Bista 1 and Danda B. Rawat 2 1 Iwate Prefectural University,
More informationA Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks
A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,
More informationBOND: Unifying Mobile Networks with Named Data. Michael Meisel
BOND: Unifying Mobile Networks with Named Data Michael Meisel Ph.D. Dissertation Defense March 16, 2011 Freeform Wireless Networks Multi-hop Unpredictable mobility Can be connected or disconnected Examples:
More informationSMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks
SMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks Lei Tang, Qunwei Zheng, Jun Liu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {ltang,qzheng,jliu,hxy}@cs.ua.edu
More information