Routing in Opportunistic Networks
|
|
- Hannah Perry
- 5 years ago
- Views:
Transcription
1 Routing in Opportunistic Networks Silvia Giordano work in collaboration with: Marco Conti, Jon Crowcroft, Pan Hui, Hoang Anh Nguyen, Andrea Passarella and the whole Haggle project thanks to Cecilia Mascolo and Martin May SUPSI-DTI 1 Outline Internet: where are we? ubiquitous computing/communication clean-slate approach New Networking Technologies Haggle DTN Opportunistic Networks Routing in OppNets context based routing C-BR classification SANETs SUPSI-DTI 2 1
2 Ubiquitous Computing: Business Users users must interrupt their work when they move users can work without interrupting their work even when they move SUPSI-DTI 3 Ubiquitous Computing: Other Users visiting people young people SUPSI-DTI 4 2
3 Example: realize the ubiquitous computing with MANET technology. First dream M. Conti and S. Giordano. Multihop Ad Hoc Networking: The Theory. IEEE Communications Magazine, SUPSI-DTI 5 Missing a pragmatic approach! Example: realize the ubiquitous computing with MANET technology. M. Conti and S. Giordano. Multihop Ad Hoc Networking: The Reality. IEEE Communications Magazine, SUPSI-DTI 6 3
4 But pervasiveness is a reality Chatpen Digital Information recognized and transmitted by pen CeivaDigital Picture Frame Plug & Play 640 x 480 VGA JPEG Image Format Storage: 10 photos/250 on - line SUPSI-DTI 7 Clean-slate approach Heterogeneous networks technologies Heterogeneous applications New architecture and communications paradigms: DTNs ANA Haggle: opportunistic networks, social networks SUPSI-DTI 8 4
5 The Internet Hourglass Voice, Video, P2P, , youtube,. Protocols TCP, UDP, SCTP, ICMP, Changing/updating the Internet core is difficult or impossible! (e.g. Multicast, Mobile IP, QoS, ) Everything on IP Application layer IPv6 Link IP on layer Everything Ethernet, WIFI (802.11), ATM, SONET/SDH, FrameRelay, modem, ADSL, Cable, Bluetooth Homogeneous networking abstraction Disruptive approaches need a disruptive architecture SUPSI-DTI 9 Application layer Link layer Approach 1: ANA We have to widen the waist and host more paradigms Federation instead of homogeneous abstraction May the best concept wins We need the framework for these multiple networks SUPSI-DTI 10 maym@tik.ee.ethz.ch 10 5
6 ANA "one-size-fits-all" A network compartment implements the operational rules and administrative policies for a given communication context Application ANA framework Link layer Publish Subscribe Compartment PodNet compartment SUPSI-DTI 11 maym@tik.ee.ethz.ch 11 Application layer Link layer Approach 2: DTN Support interoperability across radically heterogeneous networks Tolerate delay and disruption Acceptable performance in high loss/delay/error/disconnected environments Decent performance for low loss/delay/errors Still IP based SUPSI-DTI 12 maym@tik.ee.ethz.ch 12 6
7 Delay-Tolerant Networking Architecture* Components Flexible naming scheme Message abstraction and API Extensible Store-and-Forward Overlay Routing Per-(overlay)-hop reliability and authentication Still IP based *from DTN group slides SUPSI-DTI 13 bandwidth Example Routing Problem * time (days) bike satellite phone Connectivity: Village 1 City 2 City Internet bike *from DTN group slides 3 1 Village SUPSI-DTI 14 7
8 DTNs: What? Network with intermittent connectivity Data are disseminated exploiting host mobility long and variable delays high error rates heterogeneity SUPSI-DTI 15 DTNs: Why? To cover regions with no infrastructure Human social networks Intelligent highways Emergency rescue Sensor networks Wildlife monitoring SUPSI-DTI 16 8
9 Application layer Data Haggle Link layer Physical Link No more layers! Approach 3: Haggle new autonomic networking architecture enables communication for intermittent network connectivity, exploits autonomic opportunistic communications (i.e., when no end-to-end communication infrastructures). support interoperability across radically heterogeneous networks SUPSI-DTI Haggle ( ) I have 100M bytes of data, who can carry for me? Give it to me, I have 1G bytes phone flash. Thank you but you are in the opposite direction! We can also carry for you! Don t give to me! I am running out of storage. Reach an access point. Started January EU FP6 FET developed 3 prototypes (Infant, Child & Young Haggle) 100MB Finally, it code on sourceforge arrives Internet SUPSI-DTI 18 9
10 User a revolutionary paradigm for communicating without end-to-end connection relax the end-to-end paradigm HIS Forward Resource control Incentive Authentication Classifier Haggle control Bluetooth GPRS Connectivity Cradle Ethernet management SUPSI-DTI 19 a context based routing fwding manager with more strategies Uh! I love La Bonheme! (My wife should have it ) Sorry, I don t know any singer called Bonheme! There is one in my pocket Search La Bonheme.mp3 for me Search La Bonheme.mp3 for me Search La Bonheme.mp3 for me SUPSI-DTI 20 10
11 Opportunistic Networks Opportunistic networking: we are surrounded by communicating devices and most of applications are not real time constrained relax the end-to-end paradigm communication is on-the-fly heterogeneous devices mobile phones laptops, palm sensors, etc... exploit mobility real best-effort SUPSI-DTI 21 Opportunistic Networks The Missing Link? In oppnets, diverse systems not deployed originally as oppnet nodes join an oppnet dynamically in order to perform certain tasks they have been invited (or ordered) to participate in Not always connected, internet connectivity islands Huge amount of untapped resources in portable devices Local wireless bandwidth Storages CPUs A packet can reach destination using network connectivity or user mobility SUPSI-DTI 22 11
12 Objectives Oppnets are envisioned to provide, among others: Bridges between disjoint communication media Additional platforms for offloading tasks Additional sensing modalities by integrating existing independent sensory systems Oppnets can exploit context information There is one in my pocket Search La Bonheme.mp3 for me CONTEXT Search La Bonheme.mp3 for me Search La Bonheme.mp3 for me SUPSI-DTI 23 OppNets routing: context information the context in which the users communicate. Examples: users' working address and institution, personal information, habits SUPSI-DTI 24 12
13 OppNets routing: context information Thus: given context information about the destination suitable forwarders can be found based on: the probability of meeting with other users the probability of visiting particular places I ve a message for Jack Jack is at school school bus is just coming I ll wait the school bus and give the message to someone in it, who is going to school, who is likely to meet Jack in few minutes SUPSI-DTI 25 Context aware routing classification context-oblivious: basically exploit some form of flooding partially context-aware (aka mobility-based): exploit some particular piece of context information to optimise the forwarding task. fully context-aware (aka social contextaware): not only exploit context information to optimise routing, but also provide general mechanisms to handle and use context information SUPSI-DTI 26 13
14 Context-oblivious Protocols exploit some form of flooding. a message should be disseminated as widely as possible. might be the only solution when no context information is available. generate a high overhead may suffer high contention and potentially lead to network congestion SUPSI-DTI 27 Context-oblivious Protocols To limit this overhead, the common technique is to control flooding by limiting the number of copies allowed to exist in the network by limiting the maximum number of hops a message can travel. In the latter case, when no relaying is further allowed, a node can only send directly to the destination when (in case) it is met SUPSI-DTI 28 14
15 Context-oblivious Protocols Epidemic Routing A. Vahdat and D. Becker. Epidemic Routing for Partially Connected Ad Hoc Networks. Technical Report CS , CS. Dept. Duke Univ., Network Coding J. Widmer and J. Le Boudec. Network coding for efficient communication in extreme networks. Proc. of the ACM SIGCOMM WDTN, Spray&Wait T. Spyropoulos, K. Psounis, and C. Raghavendra. Efficient routing in intermittently connected mobile networks: The multiple-copy case, ACM/IEEE Transactions on Networking, 16, SUPSI-DTI 29 Context-oblivious Protocols Epidemic Routing When two nodes meet exchange summary vectors with compact unambiguous representation of the messages currently stored in their local buffers. Then, each node requests from the other the messages it is currently missing. hop count limits dissemination (hc = 1 -> only to dest.). A V[msg] a,b,d B SUPSI-DTI 30 15
16 Network Coding Context-oblivious Protocols an original approach to limit message flooding. ca a + c ac a + c A B C In general, network coding-based routing outperforms flooding, as it is able to deliver the same amount of information with fewer messages injected into the network SUPSI-DTI 31 Spray&Wait Context-oblivious Protocols two phases: the spray phase and the wait phase. spray phase: L copies of the same message are spread over the network wait phase: each relay node stores its copy and eventually delivers it to the destination when (in case) it comes within reach. L can is chosen based on a target average delay. spray can be performed in multiple ways (e.g. binary) SUPSI-DTI 32 16
17 Partially Context-aware exploit some particular piece of context information to optimise the forwarding task. e.g. mobility of nodes Main difference with fully context-aware: generally is customized for a specific type of context information does not provide a full-fledged set of algorithms to gather and manage any type of context information SUPSI-DTI 33 Partially Context-aware Probabilistic ROuting Protocol using History of Encounters and Transitivity (PROPHET) A. Lindgren, A. Doria, and O. Schelen. Probabilistic routing in intermittently connected networks. ACM Mobile Computing and Communications Review, MV and MaxProp B. Burns, O. Brock, and B. Levine. MV routing and capacity building in disruption tolerant networks. Proc. of the 24th INFOCOM, J. Burgess, B. Gallagher, D. Jensen, and B. Levine. MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks. Proc. of the 25th INFOCOM, SUPSI-DTI 34 17
18 Partially Context-aware Last Encounter Routing and Spray&Focus M. Grossglauser and M. Vetterli. Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion. Proc. of the 22 nd INFOCOM, T. Spyropoulos and K. Psounis. Spray and focus: Efficient mobilityassisted routing for heterogeneous and correlated mobility. Proc. of IEEE Percom International Workshop on Intermittently Connected Mobile Ad hoc Networks, March MobySpace Routing T. C. V. Leguay, J.; Friedman. Evaluating mobility pattern space routing for dtns. Proc. of the 25th INFOCOM, Bubble Rap P. Hui and J. Crowcroft. Bubble rap: Forwarding in small world dtns in every decreasing circles. Technical report, Technical Report UCAM-CL- TR684, Univ. of Cambridge, SUPSI-DTI 35 PROPHET Partially Context-aware evolution of Epidemic: during a contact, nodes also exchange their delivery predictability (DP) to destinations of messages they store in their buffers messages are requested only if DP is higher than that of the node currently storing the message. DP is the probability for a node to encounter a certain destination increases when the node meets the destination decreases (according to an ageing function) between meetings context information used by PROPHET is the frequency of meetings between nodes SUPSI-DTI 36 18
19 MV and MaxProp Partially Context-aware in addition, also exploit information about the frequency of visits to specific physical places. Last Encounter Routing and Spray&Focus exploit the fact that the decreasing gradient of the time lag identifies a suitable path towards the destination. MobySpace Routing the mobility pattern of nodes is the context information used for routing SUPSI-DTI 37 Bubble-Rap automatically inferring the parameters of the underlying social structure. exploiting the structure properties to select paths. dynamically identifies users communities, and ranks the nodes sociability (measured as the number of links) inside each community SUPSI-DTI 38 19
20 Fully Context-aware provide general mechanisms to handle and use context information more general than PCA: works with any context information can be customized for the specific environment it must work SUPSI-DTI 39 Fully Context-aware Context-Aware Routing (CAR) M. Musolesi, S. Hailes, and C. Mascolo. Adaptive routing for intermittently connected mobile ad hoc networks. Proc. of WoWMoM History Based Opportunistic Routing (HiBOp) C. Boldrini, M. Conti, I. Jacopini, A. Passarella, and P. IIT-CNR. HiBOp: a History Based Routing Protocol for Opportunistic Networks. Proc. of WoWMoM 2007 Probabilistic Routing Protocol for Intermittently Connected Mobile Ad hoc Network (PROPICMAN/Spatio-Tempo) H. Anh Nguyen, S. Giordano, A. Puiatti. Probabilistic Routing Protocol for Intermittently Connected Mobile Ad Hoc Networks (PROPICMAN). Proceedings of IEEE WoWMoM/AOC H. Anh Nguyen, S. Giordano, Spatiotemporal Routing Algorithm in Opportunistic Networks. Proceedings of IEEE WoWMoM/AOC SUPSI-DTI 40 20
21 Context-Aware Routing (CAR) Nodes are divided in groups Nodes inside the same group have social links between each other Are connected by an underlying MANET routing protocol Nodes of different groups can have social links as well Nodes reconfigure SUPSI-DTI 41 CAR A node selects the fwder node/group Probabilistically Based on the social attraction among nodes multi-attribute utility-based framework is defined to combine context information for computing the delivery probabilities CAR compute delivery probabilities proactively, and disseminate them in their ad hoc cloud. context information is exploited to evaluate probabilities just for known destinations SUPSI-DTI 42 21
22 CAR: conjunction beteewn PCA & FCA The framework is general enough to accommodate different types of context information. Context information in CAR consists of the logical connectivity of nodes, such as the rate of connectivity change, the delivery probability of the neighbor nodes to the destination, and device information, such as residual battery life. However, the social context information is not taken into consideration as in social context-based category CAR can be seen as a conjunction between mobility-based protocols and social context-based protocols SUPSI-DTI 43 HiBOp Mimic the establishment of social relationships among people Users describe themselves Users decide what information about themselves and their habits they want to make publicly available users store this information into their own devices HiBOp is not bound to any predefined set of information Identity Table Personal Information Name Donald Surname Duck d.duck@cnr.it Phone Work Street Via Moruzzi, 1 City Institute attributes Pisa IIT-CNR values SUPSI-DTI
23 HiBOp in a nutshell Sender does several copies (k) of the message To achieve a target delivery probability k = min K K i =0 (i ) (1 p succ max ) p l Messages are discarded after being handed over to the next hop i.e., message spread is controlled by the target delivery probability SUPSI-DTI Propicman: Probabilistic Routing Protocol for Intermittently Connected Mobile Ad hoc Network Exploit the context information of nodes to select the best next hop candidate. Each node has a common node profile with evidence/value pairs. Evidences have different weights. Compute the deliverity probability to the destination. Zero-conf SUPSI-DTI 46 23
24 Propicman social approach Common set of evidences for every node - T Evidence names(e) E1 E2 En Weights(W) W1 W2 Wn Node profile: Evidence names Values E1 E2 En V1 V2 Vn Hashed values H(E1,V1) H(E2,V2) H(En,Vn) An example: Evidence names Values Hashed values Evidence names(e) Weights(W) Work place SUPSI 26a48976c47c0d2 b2383 Work place City Profession City Profession Lugano 14a12de02cd9c0c 5fd94 c056817c8f c83 Nationality 2 Nationality Swiss 536a195c27b76cc 2b SUPSI-DTI 47 Propicman P A1 A 1 Sender h M P A A *max{p h M Ai } P A2 A 2 P A3 A 3 P An A n SUPSI-DTI 48 24
25 Propicman Neighbors do local matching between received h M with its node profile. Message header h M H(E D1,V D1) H(E D2,V D2) H(E D3,V D3) H(E D4,V D4) H(E Dn,V Dn) MAC S SN H(E 1,V 1) H(E 2,V 2) H(E 3,V 3) H(E 4,V 4) H(E n,v n) Then neighbor node (A) can compute its P A: i Hashed values in node profile 0 P A = matched ( Wi) WM : sum of the weights of all the evidences that S knows about D. W Mi SUPSI-DTI 49 Morning SUPSI-DTI 50 25
26 Afternoon SUPSI-DTI 51 Evening SUPSI-DTI 52 26
27 Similarity! a period One cycle 7am-8am 8am-9am 9am-12am 12am-1pm 1pm-5pm 5pm-8pm 8pm-7am SUPSI-DTI 53 SpatioTempo Design Each period can have different contact opportunities. In some periods source node encounters few devices, some encounter bunch of devices with high DP. T i : period ith of the cycle c-1 S i : set of encountered nodes in period ith of the cycle c-1 S i T i S i + 1 T i + 1 c Si c 1 Ti 1 One cycle SUPSI-DTI 54 27
28 Variation of the sets of encounter nodes The variation of the set of encounter nodes in a period is indicated by EV i EV i is computed with respect to the past cycle (same period) and to the previous period (same cycle) S i c 1 T i S i + 1 c 1 T i + 1 c Si 1 c Ti 1 EV i EV i S = i S S c i 1 i S S i SUPSI-DTI 55 c i 1 S c i 1 SpatioTempo Design Each person is supposed to have a set of frequent contact persons (FD). The source node S wants to send a message M to the destination D. There are 2 cases: D belongs to FD D is an occasional destination (D belongs to OD) SUPSI-DTI 56 28
29 Recording task T i c 1 T i + 1 c Ti 1 S i S i S i + 1 S i S i + 1 S i SUPSI-DTI 57 Sliding window cycle S i S i + 1 c Si 1 t i Compute the number of retransmissions D belongs to OD: Basically use Propicman to select the next hop with the number (F) of rebroadcasting M H, depends on the battery level (b), the priority level of µ message ( ) and EV i in each period. 0 if b < β (0< β <1) F= round( EV i µ * t* ) i : number of units of time in the period SUPSI-DTI 58 29
30 D belongs to FD Delivery probability of a period: Delivery probability to reach the destination if the sender sends the message in this period. The number of retransmissions: c c DP i DP i F= round( FM * DPi * EVi + ( FM Fm ) * DPi + Fm ) c DPi * EVi + 1 F M, F : maximum and minimum number of times that S is able to m send during the period c c * 1 DP i + η DP i = 1 + η c SUPSI-DTI 59 D belongs to FD Given t i is number of units of time in the period And if S can resend M H each unit of time in the period, then F equals ti M c t * DP * EV + ( t 1) * DP F = round ( i i i i ) DP c i * EV i + 1 c SUPSI-DTI 60 30
31 DP DP DP M H M H M H DP M H maxdp maxdp M H M H M H maxdp S S S S S S T i T i + 1 Cycle c Ti SUPSI-DTI 61 OD/FD management & Message lifetime After one cycle, nodes review its OD, FD lists Each member in FD, OD of S has a frequency level (FL), which indicates how often S has a message to it. FL D > δ : removed FL D > δ : promoted OD FD Message lifetime: M TTL = µ * C T FL D > δ : demoted C T : The duration of time of a cycle SUPSI-DTI 62 31
32 Predict next best interval Having information on the past cycle and past interval, we can predict next best interval S i c 1 T i S i + 1 c 1 T i + 1 c Si 1 c Ti 1 c DP i SUPSI-DTI 63 Opportunistic Sensor Networks Context oblivious: Data Mules, SWIM, ZebraNet, Message Ferrying, DFT-MSN Z. Zhang. Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges. IEEE Communications Surveys & Tutorials, R. C. Shah, S. Roy, S. Jain, W. Brunette. Data MULEs: Modeling a three-tier architecture for sparse sensor networks. SNPA, Muhammad Mukarram Bin Tariq, Mostafa Ammar, Ellen Zegura. Message Ferry Route Design for Sparse Ad Hoc Networks with Mobile Nodes. In Proceedings of ACM Mobihoc06, SUPSI-DTI 64 32
33 Opportunistic Sensor Networks Context aware SCAR = Sensor based Context-Aware Routing Opportunistic Mobile Sensor Data Collection with SCAR. Bence Pasztor, Mirco Musolesi and Cecilia Mascolo. In Proceedings of MASS 2007 PROSAN: PRobabilistic Opportunistic Routing in SANets Probabilistic Opportunistic Routing in SANETs. A.H. Nguyen, S. Giordano. In Proceedings of ACM SANET MobiCOM SUPSI-DTI 65 Motivation Pervasiveness and repeating behavior are true also in SANET: people who repeatedly stay and pass in area A are the ones who most likely want, need and will support a reaction. By naturally acting, people can enable the communication between sensors and actuators, and trigger the reaction SUPSI-DTI 66 33
34 Motivating Scenario same for animals SUPSI-DTI 67 SCAR Mobile sensors collect information and try to deliver this opportunistically to one of the sinks Energy is an issue (batteries cannot be changed so easily) They exploit best carriers to deliver the information back to sinks Choice of the best carriers is key to the protocol: SCAR uses utility theory and Kalman Filter based prediction of various attributes to choose SUPSI-DTI 68 34
35 Assumptions Data is reasonably delay tolerant Clocks of the sensors are (reasonably) synchronized and the sensors wake up at regular intervals Sensors are all cooperating (possibly owned by same developer) Mobility is not source of energy consumption SUPSI-DTI 69 The key ideas of SCAR Each sensor collects and stores its data Each sensor will try to deliver its data in bundles to a number of neighbouring sensors which seem to be the best carriers to reach a sink Decision process based on the prediction of the evolution of the system: mobility of nodes colocation with the sinks battery level The forecasted values of the context attributes are then combined to define a probability P(s i ) of the sensor s i of delivering the bundles to one of the sinks SUPSI-DTI 70 35
36 Multiple-carrier Selection Each node maintains a list of the neighbouring nodes (including itself) ordered according to their delivery probabilities Each source node then replicates the bundle to the first R nodes (R-1 nodes if the node itself is in the first R positions of the list) Data bundles are only replicated on R nodes by the source, while they are forwarded (deleted from a node and copied on another) if the carriers, while roaming, find either a sink or a better carrier. The value of R is specified by the user and can be considered as a priority level associated to the data retrieved by the sensor SUPSI-DTI 71 Bundle Forwarding Each node keeps monitoring if there are neighbours with better probability of delivery than its own If this is the case the data bundles are shifted to the other nodes Key problem: intelligent replication SUPSI-DTI 72 36
37 Forecasting Techniques for Probabilistic Routing Each node calculates its delivery probability using multicriteria decision theory over the evolution of its context described by a set of attributes. In particular, we consider three attributes: Colocation with the sinks Change degree of connectivity (ie how many nodes have been seen in a fraction of time) Battery level Our aim is to maximize the combined utility function (i.e., selection of the nodes with the best trade-off between these attributes) SUPSI-DTI 73 Prosan design Based on user profiles Using users social behavior node profile - to predict the mobility of nodes. Routing with Zero Knowledge Sender does not need to know any information about other nodes no synchronizing, no local table. Only senders broadcast helloing messages. No sharing user information Nodes does not need to share, periodically update their information to others. Keep privacy amongst members SUPSI-DTI 74 37
38 Forwarding strategy Delivery probability (DP): The probability of a node to meet and forward a message to other nodes toward destination. The sender S wants to send a message M to the destination actuator D, S will choose the route that has the highest delivery probability (DP) to send M to D. Before sending the message content M to the destination D, S sends M s header to its neighbors. n h M = Concatenat ion (H(E Di,V Di ), MAC S, SN M ) (1) Example: i =1 26a48976c47c0d2b2383a34010eae937ebcf8d1f6c554b9f7214a12de02cd9c0c5fd9486e b60f6d2b008 ff1c110c09b62a536a195c27b76b17564e92f25260a3c6599f05fef87f3110b7f171871aef40a2b17fc1bbf88053aa cea724c0a08419a9f211b077bcc244c056817c8c4ca4238a0b923820dcc509a6f75849b SUPSI-DTI 75 Forwarding strategy (cont) Node profile Sender h M B A H(E D1, V D1) H(E D2, V D2) H(E D3, V D3) Evidence names E1 E2 En Message header h M H(E D4, V D4) Value V1 s V2 Vn H(E Dn, V Dn) Hashed H(E1,V1) values H(E2,V2) H(En,Vn) MAC S SN H(E 1,V 1) H(E 2,V 2) H(E 3,V 3) H(E 4,V 4) Hashed values in node profile H(E n,v n) SUPSI-DTI 76 38
39 Forwarding strategy (cont) Neighbors do local matching between received h M with its node profile. Message header h M H(E D1,V D1) H(E D2,V D2) H(E D3,V D3) H(E D4,V D4) H(E Dn,V Dn) MAC S SN H(E 1,V 1) H(E 2,V 2) H(E 3,V 3) H(E 4,V 4) H(E n,v n) With each matching, neighbor nodes profilelook up in T to get the corresponding weight. Then neighbor node (A) can compute its DP A as follows: matched ( Wi) 0 DP A = 1 WMi WMi Hashed values in node : sum of the weights of all the evidences that S knows about D SUPSI-DTI 77 Forwarding strategy (cont) DP DP DP DP Sender DP h M i A 0 DP N = 1 Mi DP B Delivery Probability DP Matched ( W ) W DP S will choose the route(s) with highest DP it receives from its neighbor nodes S only sends the message to these routes if DP route > DP S SUPSI-DTI 78 39
40 Simulation environment Hybrid P-MULEs nodes with higher capacity use Prosan move as MULEs Simulation area rectangle 870x520 meters divided in 6 areas 50 nodes (1 p-mule) use sleep mode Simulation approach static actuator mobile actuator trajectory of p-mule SUPSI-DTI 79 Overhead Simulation results for static actuator P-Mules 1000 PROSAN Hybrid P-Mules Bytes 1 30 Tests Delay Msec P-Mules PROSAN Hybrid P-Mules Tests SUPSI-DTI 80 40
41 Overhead Simulation results for mobile actuator 1400 Bytes P-Mules 800 PROSAN 600 Hybrid P-Mules Tests Delay Msec Tests P-Mules PROSAN Hybrid P-Mules SUPSI-DTI 81 Conclusion context information in opportunistic routing can be very advantageous exploit effectively the mobility, the social connections and the community relationships: reduce significantly the number of nodes involved in reduce the number of broadcasts efficiently control message lifetime assumption for effectively using context information people move in a predictable fashion based on repeating behavioral patterns at different timescales (day, week, and month) or these patterns are known -> mobility as expression of the users social behavior Haggle architecture for supporting context aware routing SUPSI-DTI 82 41
42 Thanks SUPSI-DTI 83 42
Integrated Routing Protocol for Opportunistic Networks
Integrated Routing Protocol for Opportunistic Networks Anshul Verma Computer Science and Engineering Dept. ABV-Indian Institute of Information Technology and Management, Gwalior, India E-mail: anshulverma87@gmail.com
More informationDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,
More informationA Joint Replication-Migration-based Routing in Delay Tolerant Networks
A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West
More informationComparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay
Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula
More informationExploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach
Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach 7 th Annual IEEE Communication Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 10)
More informationPerformance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2
, pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department
More informationImpact of Social Networks in Delay Tolerant Routing
Impact of Social Networks in Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic
More informationComparative Study of Routing Protocols for Opportunistic Networks
Comparative Study of Routing Protocols for Opportunistic Networks Majeed Alajeely School of Information Technology Deakin University Melbourne, Australia Email: malajeel@deakin.edu.au Asma a Ahmad School
More informationTRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES
TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy,
More informationInternational Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18, ISSN
International Journal of Computer Engineering and Applications, ANALYZING IMPACT OF FACTORS ON ROUTING DECISIONS IN OPPORTUNISTIC MOBILE NETWORKS Sonam Kumari 1, Dr. Itu Snigdh 2 Department of Computer
More informationPeopleRank: Social Opportunistic Forwarding
PeopleRank: Social Opportunistic Forwarding Abderrahmen Mtibaa Martin May Christophe Diot Mostafa Ammar Thomson, Paris, France Georgia Institute of Technology firstname.lastname@thomson.net ammar@cc.gatech.edu
More informationOpportunistic Networks: A Review
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. III (Mar-Apr. 2016), PP 20-26 www.iosrjournals.org Opportunistic Networks: A Review Navneet
More informationWriting on the Clean Slate: Implementing a Socially-Aware Protocol in Haggle
Writing on the Clean Slate: Implementing a Socially-Aware Protocol in Haggle Mirco Musolesi Dartmouth College, USA musolesi@cs.dartmouth.edu Pan Hui, Cecilia Mascolo and Jon Crowcroft University of Cambridge,
More informationEnergy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models
2016 7th International Conference on Intelligent Systems, Modelling and Simulation Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models Bhed Bahadur
More informationMessage Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks
, March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,
More informationAvailable online at ScienceDirect. Procedia Computer Science 85 (2016 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 85 (2016 ) 891 898 International Conference on Computational Modeling and Security (CMS 2016) Analysis of routing and forwarding
More informationSCAR: Context-aware Adaptive Routing in Delay Tolerant Mobile Sensor Networks
SCAR: Context-aware Adaptive Routing in Delay Tolerant Mobile Sensor Networks Cecilia Mascolo and Mirco Musolesi Department of Computer Science, University College London Gower Street, London, WC1E 6BT,
More informationCFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs
: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs Ying Dai Software Institute Nanjing University dy06@software.nju.edu.cn Panlong Yang, Guihai Chen Dept. of Computer Sci. and
More informationSpray and Dynamic: Advanced Routing in Delay Tolerant Networks
Int. J. Communications, Network and System Sciences, 2012, 5, 98-104 http://dx.doi.org/10.4236/ijcns.2012.52013 Published Online February 2012 (http://www.scirp.org/journal/ijcns) Spray and Dynamic: Advanced
More informationFriendship Based Routing in Delay Tolerant Mobile Social Networks
Friendship Based Routing in Delay Tolerant Mobile Social Networks Eyuphan Bulut and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic
More informationMobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo
Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad
More informationImpact of Social Networks on Delay Tolerant Routing
Impact of Social Networks on Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic
More informationPerformance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments
Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Bhed Bahadur Bista Faculty of Software and Information Science Iwate Prefectural University Takizawa
More informationArchna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India
Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation
More informationSocial-Aware Routing in Delay Tolerant Networks
Social-Aware Routing in Delay Tolerant Networks Jie Wu Dept. of Computer and Info. Sciences Temple University Challenged Networks Assumptions in the TCP/IP model are violated DTNs Delay-Tolerant Networks
More informationElimination Of Redundant Data using user Centric Data in Delay Tolerant Network
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant
More informationMax-Pivot Routing for Opportunistic Networks
Max-Pivot Routing for Opportunistic Networks Tamer Dag Computer Engineering Department Kadir Has University Istanbul, Turkey tamer.dag@khas.edu.tr Abstract Opportunistic networks are challenging types
More informationBuffer Aware Network Coded Routing Protocol for Delay Tolerant Networks
Middle-East Journal of Scientific Research 23 (Sensing, Signal Processing and Security): 291-296, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.ssps.111 Buffer Aware Network
More informationBUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks
1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms
More informationIJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur
International Journal of Scientific & Engineering Research, Volume 7, Issue 4, April-2016 1717 A Review of Energy Consumption on DTN Routing Protocols Sukhpreet Kaur Abstract: DTN is net of similar nets.
More informationImprovement of Buffer Scheme for Delay Tolerant Networks
Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science
More informationRouting in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong
Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM 2004 Presented by Xun Gong Outline Delay Tolerant Networks Routing Problem in DTNs Multiple-copy Approach Flooding and
More informationSimulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network
Simulation of, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network 1 Monika Aneja, 2 Vishal Garg 1 (P.G. Student JMIT, Radaur, Yamunanagar) 2 (Assistant Professor JMIT Radaur Yamunanagar)
More informationEnergy Efficient Social-Based Routing for Delay Tolerant Networks
Energy Efficient Social-Based Routing for Delay Tolerant Networks Chenfei Tian,FanLi,, Libo Jiang,ZeyeWang, and Yu Wang 2, School of Computer Science, Beijing Institute of Technology, Beijing, 8, China
More informationSpray and forward: Efficient routing based on the Markov location prediction model for DTNs
. RESEARCH PAPER. SCIENCE CHINA Information Sciences February 2012 Vol. 55 No. 2: 433 440 doi: 10.1007/s11432-011-4345-1 Spray and forward: Efficient routing based on the Markov location prediction model
More informationDesign and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network
IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy
More informationApplication of Graph Theory in DTN Routing
Application of Graph Theory in DTN Routing Madan H. T. 1, Shabana Sultana 2 1 M. Tech. (CNE), NIE, Mysuru 2 Associate Professor, Dept. of Computer Science & Eng., NIE, Mysuru Abstract: Delay tolerant network
More informationA Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network
A Genetic-Neural Approach for obility Assisted Routing in a obile Encounter Network Niko P. Kotilainen, Jani Kurhinen Abstract--obility assisted routing (AR) is a concept, where the mobility of a network
More informationSMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks
SMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks Lei Tang, Qunwei Zheng, Jun Liu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {ltang,qzheng,jliu,hxy}@cs.ua.edu
More informationROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY
ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY Vidya K 1, Mr Hemanth S R 2 1 M.Tech, 2 Assistant Professor, Department of Computer Science Maharaja Institute of Technology
More informationA Survey of Opportunistic Networks
22nd International Conference on Advanced Information Networking and Applications - Workshops A Survey of Opportunistic Networks Chung-Ming Huang, Kun-chan Lan and Chang-Zhou Tsai Department of Computer
More informationOLFServ: an Opportunistic and Location-Aware Forwarding Protocol for Service Delivery in Disconnected MANETs
OLFServ: an Opportunistic and Location-Aware Forwarding Protocol for Service Delivery in Disconnected MANETs Nicolas Le Sommer and Yves Mahéo Valoria Laboratory, Université de Bretagne-Sud, France {Nicolas.Le-Sommer,Yves.Maheo}@univ-ubs.fr
More informationResearch Article ISSN:
International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2.2015 Boosting Performance of Data
More informationProbabilistic Routing With Multi-copies in Delay Tolerant Networks
Probabilistic Routing With Multi-copies in Delay Tolerant Networks Ze Li and Haiying Shen Department of Computer Science and Computer Engineering University of Arkansas, Fayetteville, AR 7701 {zxl008,
More informationMDR Based Cooperative Strategy Adaptation in Wireless Communication
MDR Based Cooperative Strategy Adaptation in Wireless Communication Aswathy Mohan 1, Smitha C Thomas 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: Cooperation among
More informationRouting with Multi-Level Social Groups in Mobile Opportunistic Networks
Routing with Multi-Level Social Groups in Mobile Opportunistic Networks Lunan Zhao Fan Li Chao Zhang Yu Wang School of Computer Science, Beijing Institute of Technology, Beijing, 100081, China. Department
More informationOverhead Reduction In Delay Tolerant Networks
Overhead Reduction In Delay Tolerant Networks Azadeh Omidvar School of Electrical Engineering Iran University of Science and Technology Tehran, Iran omidvar@elec.iust.ac.ir Karim Mohammadi School of Electrical
More informationCOMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS
COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS Chintan B. Desai PG Student, Electronics and Communication Department, Charotar University of Science & Technology, Changa,
More informationDelay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.
Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density
More informationCOMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks
COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks Long Vu, Quang Do, Klara Nahrstedt Department of Computer Science, University of Illinois
More informationGeographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs
Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs Dr. Santhi Kumaran Associate Professor, Dept of Computer Engineering,
More informationOpportunistic Networking: Data Forwarding in Disconnected Mobile Ad hoc Networks
Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad hoc Networks Luciana Pelusi, Andrea Passarella, and Marco Conti Pervasive Computing and Networking Laboratory (PerLab) IIT-CNR, Via G.
More informationOpportunistic Networking: Data Forwarding in Disconnected Mobile Ad Hoc Networks
TOPICS IN AD HOC AND SENSOR NETWORKS Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad Hoc Networks Luciana Pelusi, Andrea Passarella, and Marco Conti, IIT-CNR This work was partially
More informationHCS: hierarchical cluster-based forwarding scheme for mobile social networks
Wireless Netw (2015) 21:1699 1711 DOI 10.1007/s11276-014-0876-x HCS: hierarchical cluster-based forwarding scheme for mobile social networks Sun-Kyum Kim Ji-Hyeun Yoon Junyeop Lee Sung-Bong Yang Published
More informationABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 Survey of Various Protocols Used for Delay Tolerant
More informationPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS Sanjay Kumar, K. Suraj and Sudhakar Pandey Department of Information Technology, National Institute of Technology Raipur, India E-Mail:
More informationMessage Forwarding in Cyclic MobiSpace: the Multi-copy Case
Message Forwarding in Cyclic MobiSpace: the Multi-copy Case Cong Liu Shenzhen Institute of Advanced Technology Chinese Academy of Science gzcong@gmail.com Jie Wu Dept. of Computer & Information Sciences
More informationExploiting users social relations to forward data in opportunistic networks: The HiBOp solution
Pervasive and Mobile Computing 4 (2008) 633 657 Contents lists available at ScienceDirect Pervasive and Mobile Computing journal homepage: www.elsevier.com/locate/pmc Fast track article Exploiting users
More informationMinimizing Average Spraying Cost for Routing in Delay Tolerant Networks
Minimizing Average Spraying Cost for Routing in Delay Tolerant Networks Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking
More informationHierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing Chithra M. 1, Mr. Vimalathithan
More informationEstimation based Erasure-coding Routing in Delay Tolerant Networks
Estimation based Erasure-coding Routing in Delay Tolerant Networks Yong Liao, Kun Tan, Zhensheng Zhang, Lixin Gao Dep. of Electrical & Computer Eng. Microsoft Research Asia San Diego Research Center University
More informationBuffer Management in Delay Tolerant Networks
Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)
More informationA Hybrid Routing Approach for Opportunistic Networks
A Hybrid Routing Approach for Opportunistic Networks Ling-Jyh Chen Chen-Hung Yu Tony Sun Yung-Chih Chen Hao-hua Chu Academia Sinica National Taiwan University UCLA Academia Sinica National Taiwan University
More informationA ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS
A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China
More information3R: Fine-grained Encounter-based Routing in Delay Tolerant Networks
3R: Fine-grained Encounter-based Routing in Delay Tolerant Networks Long Vu, Quang Do, Klara Nahrstedt Department of Computer Science, University of Illinois Email:{longvu2,quangdo2,klara}@illinois.edu
More informationRouting in Delay Tolerant Networks (DTN)
Int. J. Communications, Network and System Sciences, 2011, 4, 53-58 doi:10.4236/ijcns.2011.41006 Published Online January 2011 (http://www.scirp.org/journal/ijcns) Routing in Delay Tolerant Networks (DTN)
More informationRouting Protocol Approaches in Delay Tolerant Networks
Routing Protocol Approaches in Delay Tolerant Networks Shivi Shukla 1, Amit Munjal 2 and Y. N. Singh 2 AIM & ACT Dept., Banasthali Vidyapith, Rajasthan 1 EE Dept., Indian Institute of Technology, Kanpur
More informationDelay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.
Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density
More informationBuffer Aware Routing in Interplanetary Ad Hoc Network
Buffer Aware Routing in Interplanetary Ad Hoc Network Kamal Mistry (Wipro Technologies, Bangalore) Sanjay Srivastava (DA-IICT, Gandhinagar) R. B. Lenin (DA-IICT, Gandhinagar) January 8, 2009 Buffer Aware
More informationSocial-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks
Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks Yuan Xu, Xiao Chen Department of Computer Science, Texas State University, San Marcos, TX, USA Email: y x3@txstate.edu, xc@txstate.edu
More informationTimely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks
27 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): 27 IEEE Infocom MiseNet Workshop Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks
More informationAdvanced Internet Architectures
Advanced Internet Architectures Carlos Borrego Iglesias Carlos.Borrego@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Tecnologies avançades d
More informationSelective Message Forwarding in Delay Tolerant Networks
Selective Message Forwarding in Delay Tolerant Networks Lei Tang, Qunwei Zheng, Jun Liu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {ltang,qzheng,jliu,hxy}@cs.ua.edu
More informationKeywords: Store and carry networks, Forwarding strategies, routing, DTN, Minimum hop transmission
Global Journal of Computer Science and Technology Volume 11 Issue 9 Version 1.0 May 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) ISSN: 0975-4172
More informationKeywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY An Efficient Selfishness Aware Routing in Delay Tolerant Networks N.Senthilkumar *1, Dr. T.V U. Kiran Kumar 2 *1,2,3,4 Bharath
More informationHeterogeneous Community-based Routing in Opportunistic Mobile Social Networks
Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Yunsheng Wang Kettering University Jie Wu Temple University Mingjun Xiao University of Science and Tech. of China Daqiang Zhang
More informationBOND: Unifying Mobile Networks with Named Data. Michael Meisel
BOND: Unifying Mobile Networks with Named Data Michael Meisel Ph.D. Dissertation Defense March 16, 2011 Freeform Wireless Networks Multi-hop Unpredictable mobility Can be connected or disconnected Examples:
More informationA SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING Sanjit Kumar Dash 1, Chandrakanta Mahanty 2, Sasmita Mishra 3 and Jibitesh Mishra 1 1 College of Engineering and
More informationData Management Issues in Disconnected Sensor Networks
Data Management Issues in Disconnected Sensor Networks Wolfgang Lindner MIT CSAIL wolfgang@csail.mit.edu Samuel Madden MIT CSAIL madden@csail.mit.edu Abstract: The possibility of disconnection is one of
More informationANNALS of Faculty Engineering Hunedoara International Journal of Engineering
ANNALS of Faculty Engineering Hunedoara International Journal of Engineering Tome XIII [2015] Fascicule 4 [November] ISSN: 1584-2673 [CD-Rom; online] a free-access multidisciplinary publication of the
More informationEfficient Routing In Delay Tolerant Network Based On Secure Fuzzy Spray Decision Algorithm
INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 10 37 Efficient Routing In Delay Tolerant Network Based On Secure Fuzzy Spray Decision Algorithm Kumar Kombaiya.A,
More informationNetwork Routing Without Delay Using Message Scheduling
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationAn Agenda-Based Routing Protocol in Delay Tolerant Mobile Sensor Networks
Sensors 2010, 10, 9564-9580; doi:10.3390/s101109564 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article An Agenda-Based Routing Protocol in Delay Tolerant Mobile Sensor Networks Xiao-Min
More informationSocial Properties Based Routing in Delay Tolerant Network
RESEARCH ARTICLE OPEN ACCESS Properties Based Routing in Delay Tolerant Network Aliasger k. Dhilawala 1, Vishal shah 2 1 (Computer Department, S.V.I.T, Vasad,India 2 (Computer Department, S.V.I.T, Vasad,India
More informationA comprehensive-integrated buffer management strategy for opportunistic networks
Pan et al. EURASIP Journal on Wireless Communications and Networking 2013, 2013:103 RESEARCH Open Access A comprehensive-integrated buffer management strategy for opportunistic networks Daru Pan 1*, Zhaohua
More informationSome Routing Challenges in Dynamic Networks
Some Routing Challenges in Dynamic Networks Jie Wu Dept. of Computer and Information Sciences Temple University Overview 1. Current State of Networking More Wireless Mobile and Opportunistic Applications
More informationConstructing Time-Varying Contact Graphs for Heterogeneous Delay Tolerant Networks
Globecom 2012 - Wireless Networking Symposium Constructing Time-Varying Contact Graphs for Heterogeneous Delay Tolerant Networks Xiaoyan Hong, Bo Gu, Yuguang Zeng, Jingyuan Zhang Department of Computer
More informationCapacity-Aware Routing Using Throw-Boxes
Capacity-Aware Routing Using Throw-Boxes Bo Gu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {bgu,hxy}@cs.ua.edu Abstract Deploying the static wireless devices
More informationDTIPN: Delay Tolerant IP Networking for Opportunistic Network Applications
DTIPN: Delay Tolerant IP Networking for Opportunistic Network Applications Hideya Ochiai The University of Tokyo/NICT jo2lxq@hongo.wide.ad.jp Kenichi Shimotada The University of Tokyo ken@hongo.wide.ad.jp
More informationSocial-Based Cooperative Caching in multi-hop wireless networks
Social-Based Cooperative Caching in multi-hop wireless networks 1 Kothagundla Divya, 2 S.Suresh 1,2 D ept. of CSE, Sree Rama Institute of Technology & Science, SKuppenakuntla, Penuballi, K hammam, AP,
More informationDIAL: A Distributed Adaptive-Learning Routing Method in VDTNs
DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs Authors: Bo Wu, Haiying Shen and Kang Chen Dept. of Electrical and Computer Engineering Clemson University, SC, USA 1 Outline Background Trace
More informationACICE-2013 ISSN: ; e-issn
1022 A Novel Ferry-Initiated Message Ferrying Approach for Data Delivery in Disconnected Mobile Ad Hoc Networks through Native Ferries K. MURALIDHAR 1, N. GEETHANJALI 2 1 Assistant Professor, Department
More informationInterestSpread: An Efficient Method for Content Transmission in Mobile Social Networks
: An Efficient Method for Content Transmission in Mobile Social Networks ABSTRACT Ning Wang Dept. of Computer and Information Sciences Temple University Philadelphia PA 9 ning.wang@temple.edu In Mobile
More informationCommunity-Based Adaptive Buffer Management Strategy in Opportunistic Network
Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Junhai Zhou, Yapin Lin ( ), Siwang Zhou, and Qin Liu College of Computer Science and Electronic Engineering, Hunan University,
More informationOpportunistic Routing Algorithms in Delay Tolerant Networks
Opportunistic Routing Algorithms in Delay Tolerant Networks Eyuphan Bulut Rensselaer Polytechnic Institute Department of Computer Science and Network Science and Technology (NeST) Center PhD Thesis Defense
More informationEnd-To-End Delay Optimization in Wireless Sensor Network (WSN)
Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,
More informationWaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks
WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,
More informationFrom Opportunistic Networks to Opportunistic Computing
AD HOC AND SENSOR NETWORKS From Opportunistic Networks to Opportunistic Computing Marco Conti, IIT-CNR Silvia Giordano, SUPSI Martin May, Technicolor Research Andrea Passarella, IIT-CNR This work was partially
More informationDTN Interworking for Future Internet Presented by Chang, Dukhyun
DTN Interworking for Future Internet 2008.02.20 Presented by Chang, Dukhyun Contents 1 2 3 4 Introduction Project Progress Future DTN Architecture Summary 2/29 DTN Introduction Delay and Disruption Tolerant
More informationRouting in Large-Scale Buses Ad Hoc Networks
1 Routing in Large-Scale Buses Ad Hoc Networks Michel Sede, Xu Li *, Da Li *, Min-You Wu * Laboratory for Computer Communications and Applications, EPFL, Switzerland * Department of Computer Science and
More information