Routing in Opportunistic Networks

Size: px
Start display at page:

Download "Routing in Opportunistic Networks"

Transcription

1 Routing in Opportunistic Networks Silvia Giordano work in collaboration with: Marco Conti, Jon Crowcroft, Pan Hui, Hoang Anh Nguyen, Andrea Passarella and the whole Haggle project thanks to Cecilia Mascolo and Martin May SUPSI-DTI 1 Outline Internet: where are we? ubiquitous computing/communication clean-slate approach New Networking Technologies Haggle DTN Opportunistic Networks Routing in OppNets context based routing C-BR classification SANETs SUPSI-DTI 2 1

2 Ubiquitous Computing: Business Users users must interrupt their work when they move users can work without interrupting their work even when they move SUPSI-DTI 3 Ubiquitous Computing: Other Users visiting people young people SUPSI-DTI 4 2

3 Example: realize the ubiquitous computing with MANET technology. First dream M. Conti and S. Giordano. Multihop Ad Hoc Networking: The Theory. IEEE Communications Magazine, SUPSI-DTI 5 Missing a pragmatic approach! Example: realize the ubiquitous computing with MANET technology. M. Conti and S. Giordano. Multihop Ad Hoc Networking: The Reality. IEEE Communications Magazine, SUPSI-DTI 6 3

4 But pervasiveness is a reality Chatpen Digital Information recognized and transmitted by pen CeivaDigital Picture Frame Plug & Play 640 x 480 VGA JPEG Image Format Storage: 10 photos/250 on - line SUPSI-DTI 7 Clean-slate approach Heterogeneous networks technologies Heterogeneous applications New architecture and communications paradigms: DTNs ANA Haggle: opportunistic networks, social networks SUPSI-DTI 8 4

5 The Internet Hourglass Voice, Video, P2P, , youtube,. Protocols TCP, UDP, SCTP, ICMP, Changing/updating the Internet core is difficult or impossible! (e.g. Multicast, Mobile IP, QoS, ) Everything on IP Application layer IPv6 Link IP on layer Everything Ethernet, WIFI (802.11), ATM, SONET/SDH, FrameRelay, modem, ADSL, Cable, Bluetooth Homogeneous networking abstraction Disruptive approaches need a disruptive architecture SUPSI-DTI 9 Application layer Link layer Approach 1: ANA We have to widen the waist and host more paradigms Federation instead of homogeneous abstraction May the best concept wins We need the framework for these multiple networks SUPSI-DTI 10 maym@tik.ee.ethz.ch 10 5

6 ANA "one-size-fits-all" A network compartment implements the operational rules and administrative policies for a given communication context Application ANA framework Link layer Publish Subscribe Compartment PodNet compartment SUPSI-DTI 11 maym@tik.ee.ethz.ch 11 Application layer Link layer Approach 2: DTN Support interoperability across radically heterogeneous networks Tolerate delay and disruption Acceptable performance in high loss/delay/error/disconnected environments Decent performance for low loss/delay/errors Still IP based SUPSI-DTI 12 maym@tik.ee.ethz.ch 12 6

7 Delay-Tolerant Networking Architecture* Components Flexible naming scheme Message abstraction and API Extensible Store-and-Forward Overlay Routing Per-(overlay)-hop reliability and authentication Still IP based *from DTN group slides SUPSI-DTI 13 bandwidth Example Routing Problem * time (days) bike satellite phone Connectivity: Village 1 City 2 City Internet bike *from DTN group slides 3 1 Village SUPSI-DTI 14 7

8 DTNs: What? Network with intermittent connectivity Data are disseminated exploiting host mobility long and variable delays high error rates heterogeneity SUPSI-DTI 15 DTNs: Why? To cover regions with no infrastructure Human social networks Intelligent highways Emergency rescue Sensor networks Wildlife monitoring SUPSI-DTI 16 8

9 Application layer Data Haggle Link layer Physical Link No more layers! Approach 3: Haggle new autonomic networking architecture enables communication for intermittent network connectivity, exploits autonomic opportunistic communications (i.e., when no end-to-end communication infrastructures). support interoperability across radically heterogeneous networks SUPSI-DTI Haggle ( ) I have 100M bytes of data, who can carry for me? Give it to me, I have 1G bytes phone flash. Thank you but you are in the opposite direction! We can also carry for you! Don t give to me! I am running out of storage. Reach an access point. Started January EU FP6 FET developed 3 prototypes (Infant, Child & Young Haggle) 100MB Finally, it code on sourceforge arrives Internet SUPSI-DTI 18 9

10 User a revolutionary paradigm for communicating without end-to-end connection relax the end-to-end paradigm HIS Forward Resource control Incentive Authentication Classifier Haggle control Bluetooth GPRS Connectivity Cradle Ethernet management SUPSI-DTI 19 a context based routing fwding manager with more strategies Uh! I love La Bonheme! (My wife should have it ) Sorry, I don t know any singer called Bonheme! There is one in my pocket Search La Bonheme.mp3 for me Search La Bonheme.mp3 for me Search La Bonheme.mp3 for me SUPSI-DTI 20 10

11 Opportunistic Networks Opportunistic networking: we are surrounded by communicating devices and most of applications are not real time constrained relax the end-to-end paradigm communication is on-the-fly heterogeneous devices mobile phones laptops, palm sensors, etc... exploit mobility real best-effort SUPSI-DTI 21 Opportunistic Networks The Missing Link? In oppnets, diverse systems not deployed originally as oppnet nodes join an oppnet dynamically in order to perform certain tasks they have been invited (or ordered) to participate in Not always connected, internet connectivity islands Huge amount of untapped resources in portable devices Local wireless bandwidth Storages CPUs A packet can reach destination using network connectivity or user mobility SUPSI-DTI 22 11

12 Objectives Oppnets are envisioned to provide, among others: Bridges between disjoint communication media Additional platforms for offloading tasks Additional sensing modalities by integrating existing independent sensory systems Oppnets can exploit context information There is one in my pocket Search La Bonheme.mp3 for me CONTEXT Search La Bonheme.mp3 for me Search La Bonheme.mp3 for me SUPSI-DTI 23 OppNets routing: context information the context in which the users communicate. Examples: users' working address and institution, personal information, habits SUPSI-DTI 24 12

13 OppNets routing: context information Thus: given context information about the destination suitable forwarders can be found based on: the probability of meeting with other users the probability of visiting particular places I ve a message for Jack Jack is at school school bus is just coming I ll wait the school bus and give the message to someone in it, who is going to school, who is likely to meet Jack in few minutes SUPSI-DTI 25 Context aware routing classification context-oblivious: basically exploit some form of flooding partially context-aware (aka mobility-based): exploit some particular piece of context information to optimise the forwarding task. fully context-aware (aka social contextaware): not only exploit context information to optimise routing, but also provide general mechanisms to handle and use context information SUPSI-DTI 26 13

14 Context-oblivious Protocols exploit some form of flooding. a message should be disseminated as widely as possible. might be the only solution when no context information is available. generate a high overhead may suffer high contention and potentially lead to network congestion SUPSI-DTI 27 Context-oblivious Protocols To limit this overhead, the common technique is to control flooding by limiting the number of copies allowed to exist in the network by limiting the maximum number of hops a message can travel. In the latter case, when no relaying is further allowed, a node can only send directly to the destination when (in case) it is met SUPSI-DTI 28 14

15 Context-oblivious Protocols Epidemic Routing A. Vahdat and D. Becker. Epidemic Routing for Partially Connected Ad Hoc Networks. Technical Report CS , CS. Dept. Duke Univ., Network Coding J. Widmer and J. Le Boudec. Network coding for efficient communication in extreme networks. Proc. of the ACM SIGCOMM WDTN, Spray&Wait T. Spyropoulos, K. Psounis, and C. Raghavendra. Efficient routing in intermittently connected mobile networks: The multiple-copy case, ACM/IEEE Transactions on Networking, 16, SUPSI-DTI 29 Context-oblivious Protocols Epidemic Routing When two nodes meet exchange summary vectors with compact unambiguous representation of the messages currently stored in their local buffers. Then, each node requests from the other the messages it is currently missing. hop count limits dissemination (hc = 1 -> only to dest.). A V[msg] a,b,d B SUPSI-DTI 30 15

16 Network Coding Context-oblivious Protocols an original approach to limit message flooding. ca a + c ac a + c A B C In general, network coding-based routing outperforms flooding, as it is able to deliver the same amount of information with fewer messages injected into the network SUPSI-DTI 31 Spray&Wait Context-oblivious Protocols two phases: the spray phase and the wait phase. spray phase: L copies of the same message are spread over the network wait phase: each relay node stores its copy and eventually delivers it to the destination when (in case) it comes within reach. L can is chosen based on a target average delay. spray can be performed in multiple ways (e.g. binary) SUPSI-DTI 32 16

17 Partially Context-aware exploit some particular piece of context information to optimise the forwarding task. e.g. mobility of nodes Main difference with fully context-aware: generally is customized for a specific type of context information does not provide a full-fledged set of algorithms to gather and manage any type of context information SUPSI-DTI 33 Partially Context-aware Probabilistic ROuting Protocol using History of Encounters and Transitivity (PROPHET) A. Lindgren, A. Doria, and O. Schelen. Probabilistic routing in intermittently connected networks. ACM Mobile Computing and Communications Review, MV and MaxProp B. Burns, O. Brock, and B. Levine. MV routing and capacity building in disruption tolerant networks. Proc. of the 24th INFOCOM, J. Burgess, B. Gallagher, D. Jensen, and B. Levine. MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks. Proc. of the 25th INFOCOM, SUPSI-DTI 34 17

18 Partially Context-aware Last Encounter Routing and Spray&Focus M. Grossglauser and M. Vetterli. Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion. Proc. of the 22 nd INFOCOM, T. Spyropoulos and K. Psounis. Spray and focus: Efficient mobilityassisted routing for heterogeneous and correlated mobility. Proc. of IEEE Percom International Workshop on Intermittently Connected Mobile Ad hoc Networks, March MobySpace Routing T. C. V. Leguay, J.; Friedman. Evaluating mobility pattern space routing for dtns. Proc. of the 25th INFOCOM, Bubble Rap P. Hui and J. Crowcroft. Bubble rap: Forwarding in small world dtns in every decreasing circles. Technical report, Technical Report UCAM-CL- TR684, Univ. of Cambridge, SUPSI-DTI 35 PROPHET Partially Context-aware evolution of Epidemic: during a contact, nodes also exchange their delivery predictability (DP) to destinations of messages they store in their buffers messages are requested only if DP is higher than that of the node currently storing the message. DP is the probability for a node to encounter a certain destination increases when the node meets the destination decreases (according to an ageing function) between meetings context information used by PROPHET is the frequency of meetings between nodes SUPSI-DTI 36 18

19 MV and MaxProp Partially Context-aware in addition, also exploit information about the frequency of visits to specific physical places. Last Encounter Routing and Spray&Focus exploit the fact that the decreasing gradient of the time lag identifies a suitable path towards the destination. MobySpace Routing the mobility pattern of nodes is the context information used for routing SUPSI-DTI 37 Bubble-Rap automatically inferring the parameters of the underlying social structure. exploiting the structure properties to select paths. dynamically identifies users communities, and ranks the nodes sociability (measured as the number of links) inside each community SUPSI-DTI 38 19

20 Fully Context-aware provide general mechanisms to handle and use context information more general than PCA: works with any context information can be customized for the specific environment it must work SUPSI-DTI 39 Fully Context-aware Context-Aware Routing (CAR) M. Musolesi, S. Hailes, and C. Mascolo. Adaptive routing for intermittently connected mobile ad hoc networks. Proc. of WoWMoM History Based Opportunistic Routing (HiBOp) C. Boldrini, M. Conti, I. Jacopini, A. Passarella, and P. IIT-CNR. HiBOp: a History Based Routing Protocol for Opportunistic Networks. Proc. of WoWMoM 2007 Probabilistic Routing Protocol for Intermittently Connected Mobile Ad hoc Network (PROPICMAN/Spatio-Tempo) H. Anh Nguyen, S. Giordano, A. Puiatti. Probabilistic Routing Protocol for Intermittently Connected Mobile Ad Hoc Networks (PROPICMAN). Proceedings of IEEE WoWMoM/AOC H. Anh Nguyen, S. Giordano, Spatiotemporal Routing Algorithm in Opportunistic Networks. Proceedings of IEEE WoWMoM/AOC SUPSI-DTI 40 20

21 Context-Aware Routing (CAR) Nodes are divided in groups Nodes inside the same group have social links between each other Are connected by an underlying MANET routing protocol Nodes of different groups can have social links as well Nodes reconfigure SUPSI-DTI 41 CAR A node selects the fwder node/group Probabilistically Based on the social attraction among nodes multi-attribute utility-based framework is defined to combine context information for computing the delivery probabilities CAR compute delivery probabilities proactively, and disseminate them in their ad hoc cloud. context information is exploited to evaluate probabilities just for known destinations SUPSI-DTI 42 21

22 CAR: conjunction beteewn PCA & FCA The framework is general enough to accommodate different types of context information. Context information in CAR consists of the logical connectivity of nodes, such as the rate of connectivity change, the delivery probability of the neighbor nodes to the destination, and device information, such as residual battery life. However, the social context information is not taken into consideration as in social context-based category CAR can be seen as a conjunction between mobility-based protocols and social context-based protocols SUPSI-DTI 43 HiBOp Mimic the establishment of social relationships among people Users describe themselves Users decide what information about themselves and their habits they want to make publicly available users store this information into their own devices HiBOp is not bound to any predefined set of information Identity Table Personal Information Name Donald Surname Duck d.duck@cnr.it Phone Work Street Via Moruzzi, 1 City Institute attributes Pisa IIT-CNR values SUPSI-DTI

23 HiBOp in a nutshell Sender does several copies (k) of the message To achieve a target delivery probability k = min K K i =0 (i ) (1 p succ max ) p l Messages are discarded after being handed over to the next hop i.e., message spread is controlled by the target delivery probability SUPSI-DTI Propicman: Probabilistic Routing Protocol for Intermittently Connected Mobile Ad hoc Network Exploit the context information of nodes to select the best next hop candidate. Each node has a common node profile with evidence/value pairs. Evidences have different weights. Compute the deliverity probability to the destination. Zero-conf SUPSI-DTI 46 23

24 Propicman social approach Common set of evidences for every node - T Evidence names(e) E1 E2 En Weights(W) W1 W2 Wn Node profile: Evidence names Values E1 E2 En V1 V2 Vn Hashed values H(E1,V1) H(E2,V2) H(En,Vn) An example: Evidence names Values Hashed values Evidence names(e) Weights(W) Work place SUPSI 26a48976c47c0d2 b2383 Work place City Profession City Profession Lugano 14a12de02cd9c0c 5fd94 c056817c8f c83 Nationality 2 Nationality Swiss 536a195c27b76cc 2b SUPSI-DTI 47 Propicman P A1 A 1 Sender h M P A A *max{p h M Ai } P A2 A 2 P A3 A 3 P An A n SUPSI-DTI 48 24

25 Propicman Neighbors do local matching between received h M with its node profile. Message header h M H(E D1,V D1) H(E D2,V D2) H(E D3,V D3) H(E D4,V D4) H(E Dn,V Dn) MAC S SN H(E 1,V 1) H(E 2,V 2) H(E 3,V 3) H(E 4,V 4) H(E n,v n) Then neighbor node (A) can compute its P A: i Hashed values in node profile 0 P A = matched ( Wi) WM : sum of the weights of all the evidences that S knows about D. W Mi SUPSI-DTI 49 Morning SUPSI-DTI 50 25

26 Afternoon SUPSI-DTI 51 Evening SUPSI-DTI 52 26

27 Similarity! a period One cycle 7am-8am 8am-9am 9am-12am 12am-1pm 1pm-5pm 5pm-8pm 8pm-7am SUPSI-DTI 53 SpatioTempo Design Each period can have different contact opportunities. In some periods source node encounters few devices, some encounter bunch of devices with high DP. T i : period ith of the cycle c-1 S i : set of encountered nodes in period ith of the cycle c-1 S i T i S i + 1 T i + 1 c Si c 1 Ti 1 One cycle SUPSI-DTI 54 27

28 Variation of the sets of encounter nodes The variation of the set of encounter nodes in a period is indicated by EV i EV i is computed with respect to the past cycle (same period) and to the previous period (same cycle) S i c 1 T i S i + 1 c 1 T i + 1 c Si 1 c Ti 1 EV i EV i S = i S S c i 1 i S S i SUPSI-DTI 55 c i 1 S c i 1 SpatioTempo Design Each person is supposed to have a set of frequent contact persons (FD). The source node S wants to send a message M to the destination D. There are 2 cases: D belongs to FD D is an occasional destination (D belongs to OD) SUPSI-DTI 56 28

29 Recording task T i c 1 T i + 1 c Ti 1 S i S i S i + 1 S i S i + 1 S i SUPSI-DTI 57 Sliding window cycle S i S i + 1 c Si 1 t i Compute the number of retransmissions D belongs to OD: Basically use Propicman to select the next hop with the number (F) of rebroadcasting M H, depends on the battery level (b), the priority level of µ message ( ) and EV i in each period. 0 if b < β (0< β <1) F= round( EV i µ * t* ) i : number of units of time in the period SUPSI-DTI 58 29

30 D belongs to FD Delivery probability of a period: Delivery probability to reach the destination if the sender sends the message in this period. The number of retransmissions: c c DP i DP i F= round( FM * DPi * EVi + ( FM Fm ) * DPi + Fm ) c DPi * EVi + 1 F M, F : maximum and minimum number of times that S is able to m send during the period c c * 1 DP i + η DP i = 1 + η c SUPSI-DTI 59 D belongs to FD Given t i is number of units of time in the period And if S can resend M H each unit of time in the period, then F equals ti M c t * DP * EV + ( t 1) * DP F = round ( i i i i ) DP c i * EV i + 1 c SUPSI-DTI 60 30

31 DP DP DP M H M H M H DP M H maxdp maxdp M H M H M H maxdp S S S S S S T i T i + 1 Cycle c Ti SUPSI-DTI 61 OD/FD management & Message lifetime After one cycle, nodes review its OD, FD lists Each member in FD, OD of S has a frequency level (FL), which indicates how often S has a message to it. FL D > δ : removed FL D > δ : promoted OD FD Message lifetime: M TTL = µ * C T FL D > δ : demoted C T : The duration of time of a cycle SUPSI-DTI 62 31

32 Predict next best interval Having information on the past cycle and past interval, we can predict next best interval S i c 1 T i S i + 1 c 1 T i + 1 c Si 1 c Ti 1 c DP i SUPSI-DTI 63 Opportunistic Sensor Networks Context oblivious: Data Mules, SWIM, ZebraNet, Message Ferrying, DFT-MSN Z. Zhang. Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges. IEEE Communications Surveys & Tutorials, R. C. Shah, S. Roy, S. Jain, W. Brunette. Data MULEs: Modeling a three-tier architecture for sparse sensor networks. SNPA, Muhammad Mukarram Bin Tariq, Mostafa Ammar, Ellen Zegura. Message Ferry Route Design for Sparse Ad Hoc Networks with Mobile Nodes. In Proceedings of ACM Mobihoc06, SUPSI-DTI 64 32

33 Opportunistic Sensor Networks Context aware SCAR = Sensor based Context-Aware Routing Opportunistic Mobile Sensor Data Collection with SCAR. Bence Pasztor, Mirco Musolesi and Cecilia Mascolo. In Proceedings of MASS 2007 PROSAN: PRobabilistic Opportunistic Routing in SANets Probabilistic Opportunistic Routing in SANETs. A.H. Nguyen, S. Giordano. In Proceedings of ACM SANET MobiCOM SUPSI-DTI 65 Motivation Pervasiveness and repeating behavior are true also in SANET: people who repeatedly stay and pass in area A are the ones who most likely want, need and will support a reaction. By naturally acting, people can enable the communication between sensors and actuators, and trigger the reaction SUPSI-DTI 66 33

34 Motivating Scenario same for animals SUPSI-DTI 67 SCAR Mobile sensors collect information and try to deliver this opportunistically to one of the sinks Energy is an issue (batteries cannot be changed so easily) They exploit best carriers to deliver the information back to sinks Choice of the best carriers is key to the protocol: SCAR uses utility theory and Kalman Filter based prediction of various attributes to choose SUPSI-DTI 68 34

35 Assumptions Data is reasonably delay tolerant Clocks of the sensors are (reasonably) synchronized and the sensors wake up at regular intervals Sensors are all cooperating (possibly owned by same developer) Mobility is not source of energy consumption SUPSI-DTI 69 The key ideas of SCAR Each sensor collects and stores its data Each sensor will try to deliver its data in bundles to a number of neighbouring sensors which seem to be the best carriers to reach a sink Decision process based on the prediction of the evolution of the system: mobility of nodes colocation with the sinks battery level The forecasted values of the context attributes are then combined to define a probability P(s i ) of the sensor s i of delivering the bundles to one of the sinks SUPSI-DTI 70 35

36 Multiple-carrier Selection Each node maintains a list of the neighbouring nodes (including itself) ordered according to their delivery probabilities Each source node then replicates the bundle to the first R nodes (R-1 nodes if the node itself is in the first R positions of the list) Data bundles are only replicated on R nodes by the source, while they are forwarded (deleted from a node and copied on another) if the carriers, while roaming, find either a sink or a better carrier. The value of R is specified by the user and can be considered as a priority level associated to the data retrieved by the sensor SUPSI-DTI 71 Bundle Forwarding Each node keeps monitoring if there are neighbours with better probability of delivery than its own If this is the case the data bundles are shifted to the other nodes Key problem: intelligent replication SUPSI-DTI 72 36

37 Forecasting Techniques for Probabilistic Routing Each node calculates its delivery probability using multicriteria decision theory over the evolution of its context described by a set of attributes. In particular, we consider three attributes: Colocation with the sinks Change degree of connectivity (ie how many nodes have been seen in a fraction of time) Battery level Our aim is to maximize the combined utility function (i.e., selection of the nodes with the best trade-off between these attributes) SUPSI-DTI 73 Prosan design Based on user profiles Using users social behavior node profile - to predict the mobility of nodes. Routing with Zero Knowledge Sender does not need to know any information about other nodes no synchronizing, no local table. Only senders broadcast helloing messages. No sharing user information Nodes does not need to share, periodically update their information to others. Keep privacy amongst members SUPSI-DTI 74 37

38 Forwarding strategy Delivery probability (DP): The probability of a node to meet and forward a message to other nodes toward destination. The sender S wants to send a message M to the destination actuator D, S will choose the route that has the highest delivery probability (DP) to send M to D. Before sending the message content M to the destination D, S sends M s header to its neighbors. n h M = Concatenat ion (H(E Di,V Di ), MAC S, SN M ) (1) Example: i =1 26a48976c47c0d2b2383a34010eae937ebcf8d1f6c554b9f7214a12de02cd9c0c5fd9486e b60f6d2b008 ff1c110c09b62a536a195c27b76b17564e92f25260a3c6599f05fef87f3110b7f171871aef40a2b17fc1bbf88053aa cea724c0a08419a9f211b077bcc244c056817c8c4ca4238a0b923820dcc509a6f75849b SUPSI-DTI 75 Forwarding strategy (cont) Node profile Sender h M B A H(E D1, V D1) H(E D2, V D2) H(E D3, V D3) Evidence names E1 E2 En Message header h M H(E D4, V D4) Value V1 s V2 Vn H(E Dn, V Dn) Hashed H(E1,V1) values H(E2,V2) H(En,Vn) MAC S SN H(E 1,V 1) H(E 2,V 2) H(E 3,V 3) H(E 4,V 4) Hashed values in node profile H(E n,v n) SUPSI-DTI 76 38

39 Forwarding strategy (cont) Neighbors do local matching between received h M with its node profile. Message header h M H(E D1,V D1) H(E D2,V D2) H(E D3,V D3) H(E D4,V D4) H(E Dn,V Dn) MAC S SN H(E 1,V 1) H(E 2,V 2) H(E 3,V 3) H(E 4,V 4) H(E n,v n) With each matching, neighbor nodes profilelook up in T to get the corresponding weight. Then neighbor node (A) can compute its DP A as follows: matched ( Wi) 0 DP A = 1 WMi WMi Hashed values in node : sum of the weights of all the evidences that S knows about D SUPSI-DTI 77 Forwarding strategy (cont) DP DP DP DP Sender DP h M i A 0 DP N = 1 Mi DP B Delivery Probability DP Matched ( W ) W DP S will choose the route(s) with highest DP it receives from its neighbor nodes S only sends the message to these routes if DP route > DP S SUPSI-DTI 78 39

40 Simulation environment Hybrid P-MULEs nodes with higher capacity use Prosan move as MULEs Simulation area rectangle 870x520 meters divided in 6 areas 50 nodes (1 p-mule) use sleep mode Simulation approach static actuator mobile actuator trajectory of p-mule SUPSI-DTI 79 Overhead Simulation results for static actuator P-Mules 1000 PROSAN Hybrid P-Mules Bytes 1 30 Tests Delay Msec P-Mules PROSAN Hybrid P-Mules Tests SUPSI-DTI 80 40

41 Overhead Simulation results for mobile actuator 1400 Bytes P-Mules 800 PROSAN 600 Hybrid P-Mules Tests Delay Msec Tests P-Mules PROSAN Hybrid P-Mules SUPSI-DTI 81 Conclusion context information in opportunistic routing can be very advantageous exploit effectively the mobility, the social connections and the community relationships: reduce significantly the number of nodes involved in reduce the number of broadcasts efficiently control message lifetime assumption for effectively using context information people move in a predictable fashion based on repeating behavioral patterns at different timescales (day, week, and month) or these patterns are known -> mobility as expression of the users social behavior Haggle architecture for supporting context aware routing SUPSI-DTI 82 41

42 Thanks SUPSI-DTI 83 42

Integrated Routing Protocol for Opportunistic Networks

Integrated Routing Protocol for Opportunistic Networks Integrated Routing Protocol for Opportunistic Networks Anshul Verma Computer Science and Engineering Dept. ABV-Indian Institute of Information Technology and Management, Gwalior, India E-mail: anshulverma87@gmail.com

More information

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula

More information

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach 7 th Annual IEEE Communication Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 10)

More information

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2 , pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department

More information

Impact of Social Networks in Delay Tolerant Routing

Impact of Social Networks in Delay Tolerant Routing Impact of Social Networks in Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Comparative Study of Routing Protocols for Opportunistic Networks

Comparative Study of Routing Protocols for Opportunistic Networks Comparative Study of Routing Protocols for Opportunistic Networks Majeed Alajeely School of Information Technology Deakin University Melbourne, Australia Email: malajeel@deakin.edu.au Asma a Ahmad School

More information

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy,

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18,   ISSN International Journal of Computer Engineering and Applications, ANALYZING IMPACT OF FACTORS ON ROUTING DECISIONS IN OPPORTUNISTIC MOBILE NETWORKS Sonam Kumari 1, Dr. Itu Snigdh 2 Department of Computer

More information

PeopleRank: Social Opportunistic Forwarding

PeopleRank: Social Opportunistic Forwarding PeopleRank: Social Opportunistic Forwarding Abderrahmen Mtibaa Martin May Christophe Diot Mostafa Ammar Thomson, Paris, France Georgia Institute of Technology firstname.lastname@thomson.net ammar@cc.gatech.edu

More information

Opportunistic Networks: A Review

Opportunistic Networks: A Review IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. III (Mar-Apr. 2016), PP 20-26 www.iosrjournals.org Opportunistic Networks: A Review Navneet

More information

Writing on the Clean Slate: Implementing a Socially-Aware Protocol in Haggle

Writing on the Clean Slate: Implementing a Socially-Aware Protocol in Haggle Writing on the Clean Slate: Implementing a Socially-Aware Protocol in Haggle Mirco Musolesi Dartmouth College, USA musolesi@cs.dartmouth.edu Pan Hui, Cecilia Mascolo and Jon Crowcroft University of Cambridge,

More information

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models 2016 7th International Conference on Intelligent Systems, Modelling and Simulation Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models Bhed Bahadur

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

Available online at ScienceDirect. Procedia Computer Science 85 (2016 )

Available online at   ScienceDirect. Procedia Computer Science 85 (2016 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 85 (2016 ) 891 898 International Conference on Computational Modeling and Security (CMS 2016) Analysis of routing and forwarding

More information

SCAR: Context-aware Adaptive Routing in Delay Tolerant Mobile Sensor Networks

SCAR: Context-aware Adaptive Routing in Delay Tolerant Mobile Sensor Networks SCAR: Context-aware Adaptive Routing in Delay Tolerant Mobile Sensor Networks Cecilia Mascolo and Mirco Musolesi Department of Computer Science, University College London Gower Street, London, WC1E 6BT,

More information

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs : Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs Ying Dai Software Institute Nanjing University dy06@software.nju.edu.cn Panlong Yang, Guihai Chen Dept. of Computer Sci. and

More information

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks Int. J. Communications, Network and System Sciences, 2012, 5, 98-104 http://dx.doi.org/10.4236/ijcns.2012.52013 Published Online February 2012 (http://www.scirp.org/journal/ijcns) Spray and Dynamic: Advanced

More information

Friendship Based Routing in Delay Tolerant Mobile Social Networks

Friendship Based Routing in Delay Tolerant Mobile Social Networks Friendship Based Routing in Delay Tolerant Mobile Social Networks Eyuphan Bulut and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad

More information

Impact of Social Networks on Delay Tolerant Routing

Impact of Social Networks on Delay Tolerant Routing Impact of Social Networks on Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Bhed Bahadur Bista Faculty of Software and Information Science Iwate Prefectural University Takizawa

More information

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

Social-Aware Routing in Delay Tolerant Networks

Social-Aware Routing in Delay Tolerant Networks Social-Aware Routing in Delay Tolerant Networks Jie Wu Dept. of Computer and Info. Sciences Temple University Challenged Networks Assumptions in the TCP/IP model are violated DTNs Delay-Tolerant Networks

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Max-Pivot Routing for Opportunistic Networks

Max-Pivot Routing for Opportunistic Networks Max-Pivot Routing for Opportunistic Networks Tamer Dag Computer Engineering Department Kadir Has University Istanbul, Turkey tamer.dag@khas.edu.tr Abstract Opportunistic networks are challenging types

More information

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks Middle-East Journal of Scientific Research 23 (Sensing, Signal Processing and Security): 291-296, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.ssps.111 Buffer Aware Network

More information

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks 1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms

More information

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur International Journal of Scientific & Engineering Research, Volume 7, Issue 4, April-2016 1717 A Review of Energy Consumption on DTN Routing Protocols Sukhpreet Kaur Abstract: DTN is net of similar nets.

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM 2004 Presented by Xun Gong Outline Delay Tolerant Networks Routing Problem in DTNs Multiple-copy Approach Flooding and

More information

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network Simulation of, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network 1 Monika Aneja, 2 Vishal Garg 1 (P.G. Student JMIT, Radaur, Yamunanagar) 2 (Assistant Professor JMIT Radaur Yamunanagar)

More information

Energy Efficient Social-Based Routing for Delay Tolerant Networks

Energy Efficient Social-Based Routing for Delay Tolerant Networks Energy Efficient Social-Based Routing for Delay Tolerant Networks Chenfei Tian,FanLi,, Libo Jiang,ZeyeWang, and Yu Wang 2, School of Computer Science, Beijing Institute of Technology, Beijing, 8, China

More information

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs . RESEARCH PAPER. SCIENCE CHINA Information Sciences February 2012 Vol. 55 No. 2: 433 440 doi: 10.1007/s11432-011-4345-1 Spray and forward: Efficient routing based on the Markov location prediction model

More information

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy

More information

Application of Graph Theory in DTN Routing

Application of Graph Theory in DTN Routing Application of Graph Theory in DTN Routing Madan H. T. 1, Shabana Sultana 2 1 M. Tech. (CNE), NIE, Mysuru 2 Associate Professor, Dept. of Computer Science & Eng., NIE, Mysuru Abstract: Delay tolerant network

More information

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network A Genetic-Neural Approach for obility Assisted Routing in a obile Encounter Network Niko P. Kotilainen, Jani Kurhinen Abstract--obility assisted routing (AR) is a concept, where the mobility of a network

More information

SMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks

SMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks SMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks Lei Tang, Qunwei Zheng, Jun Liu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {ltang,qzheng,jliu,hxy}@cs.ua.edu

More information

ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY

ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY Vidya K 1, Mr Hemanth S R 2 1 M.Tech, 2 Assistant Professor, Department of Computer Science Maharaja Institute of Technology

More information

A Survey of Opportunistic Networks

A Survey of Opportunistic Networks 22nd International Conference on Advanced Information Networking and Applications - Workshops A Survey of Opportunistic Networks Chung-Ming Huang, Kun-chan Lan and Chang-Zhou Tsai Department of Computer

More information

OLFServ: an Opportunistic and Location-Aware Forwarding Protocol for Service Delivery in Disconnected MANETs

OLFServ: an Opportunistic and Location-Aware Forwarding Protocol for Service Delivery in Disconnected MANETs OLFServ: an Opportunistic and Location-Aware Forwarding Protocol for Service Delivery in Disconnected MANETs Nicolas Le Sommer and Yves Mahéo Valoria Laboratory, Université de Bretagne-Sud, France {Nicolas.Le-Sommer,Yves.Maheo}@univ-ubs.fr

More information

Research Article ISSN:

Research Article ISSN: International Journal of Computer Science & Mechatronics A peer reviewed International Journal Article Available online www.ijcsm.in smsamspublications.com Vol.1.Issue 2.2015 Boosting Performance of Data

More information

Probabilistic Routing With Multi-copies in Delay Tolerant Networks

Probabilistic Routing With Multi-copies in Delay Tolerant Networks Probabilistic Routing With Multi-copies in Delay Tolerant Networks Ze Li and Haiying Shen Department of Computer Science and Computer Engineering University of Arkansas, Fayetteville, AR 7701 {zxl008,

More information

MDR Based Cooperative Strategy Adaptation in Wireless Communication

MDR Based Cooperative Strategy Adaptation in Wireless Communication MDR Based Cooperative Strategy Adaptation in Wireless Communication Aswathy Mohan 1, Smitha C Thomas 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: Cooperation among

More information

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks Routing with Multi-Level Social Groups in Mobile Opportunistic Networks Lunan Zhao Fan Li Chao Zhang Yu Wang School of Computer Science, Beijing Institute of Technology, Beijing, 100081, China. Department

More information

Overhead Reduction In Delay Tolerant Networks

Overhead Reduction In Delay Tolerant Networks Overhead Reduction In Delay Tolerant Networks Azadeh Omidvar School of Electrical Engineering Iran University of Science and Technology Tehran, Iran omidvar@elec.iust.ac.ir Karim Mohammadi School of Electrical

More information

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS Chintan B. Desai PG Student, Electronics and Communication Department, Charotar University of Science & Technology, Changa,

More information

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo. Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density

More information

COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks

COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks Long Vu, Quang Do, Klara Nahrstedt Department of Computer Science, University of Illinois

More information

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs Dr. Santhi Kumaran Associate Professor, Dept of Computer Engineering,

More information

Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad hoc Networks

Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad hoc Networks Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad hoc Networks Luciana Pelusi, Andrea Passarella, and Marco Conti Pervasive Computing and Networking Laboratory (PerLab) IIT-CNR, Via G.

More information

Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad Hoc Networks

Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad Hoc Networks TOPICS IN AD HOC AND SENSOR NETWORKS Opportunistic Networking: Data Forwarding in Disconnected Mobile Ad Hoc Networks Luciana Pelusi, Andrea Passarella, and Marco Conti, IIT-CNR This work was partially

More information

HCS: hierarchical cluster-based forwarding scheme for mobile social networks

HCS: hierarchical cluster-based forwarding scheme for mobile social networks Wireless Netw (2015) 21:1699 1711 DOI 10.1007/s11276-014-0876-x HCS: hierarchical cluster-based forwarding scheme for mobile social networks Sun-Kyum Kim Ji-Hyeun Yoon Junyeop Lee Sung-Bong Yang Published

More information

ABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS

ABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 Survey of Various Protocols Used for Delay Tolerant

More information

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS Sanjay Kumar, K. Suraj and Sudhakar Pandey Department of Information Technology, National Institute of Technology Raipur, India E-Mail:

More information

Message Forwarding in Cyclic MobiSpace: the Multi-copy Case

Message Forwarding in Cyclic MobiSpace: the Multi-copy Case Message Forwarding in Cyclic MobiSpace: the Multi-copy Case Cong Liu Shenzhen Institute of Advanced Technology Chinese Academy of Science gzcong@gmail.com Jie Wu Dept. of Computer & Information Sciences

More information

Exploiting users social relations to forward data in opportunistic networks: The HiBOp solution

Exploiting users social relations to forward data in opportunistic networks: The HiBOp solution Pervasive and Mobile Computing 4 (2008) 633 657 Contents lists available at ScienceDirect Pervasive and Mobile Computing journal homepage: www.elsevier.com/locate/pmc Fast track article Exploiting users

More information

Minimizing Average Spraying Cost for Routing in Delay Tolerant Networks

Minimizing Average Spraying Cost for Routing in Delay Tolerant Networks Minimizing Average Spraying Cost for Routing in Delay Tolerant Networks Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking

More information

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing Chithra M. 1, Mr. Vimalathithan

More information

Estimation based Erasure-coding Routing in Delay Tolerant Networks

Estimation based Erasure-coding Routing in Delay Tolerant Networks Estimation based Erasure-coding Routing in Delay Tolerant Networks Yong Liao, Kun Tan, Zhensheng Zhang, Lixin Gao Dep. of Electrical & Computer Eng. Microsoft Research Asia San Diego Research Center University

More information

Buffer Management in Delay Tolerant Networks

Buffer Management in Delay Tolerant Networks Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)

More information

A Hybrid Routing Approach for Opportunistic Networks

A Hybrid Routing Approach for Opportunistic Networks A Hybrid Routing Approach for Opportunistic Networks Ling-Jyh Chen Chen-Hung Yu Tony Sun Yung-Chih Chen Hao-hua Chu Academia Sinica National Taiwan University UCLA Academia Sinica National Taiwan University

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

3R: Fine-grained Encounter-based Routing in Delay Tolerant Networks

3R: Fine-grained Encounter-based Routing in Delay Tolerant Networks 3R: Fine-grained Encounter-based Routing in Delay Tolerant Networks Long Vu, Quang Do, Klara Nahrstedt Department of Computer Science, University of Illinois Email:{longvu2,quangdo2,klara}@illinois.edu

More information

Routing in Delay Tolerant Networks (DTN)

Routing in Delay Tolerant Networks (DTN) Int. J. Communications, Network and System Sciences, 2011, 4, 53-58 doi:10.4236/ijcns.2011.41006 Published Online January 2011 (http://www.scirp.org/journal/ijcns) Routing in Delay Tolerant Networks (DTN)

More information

Routing Protocol Approaches in Delay Tolerant Networks

Routing Protocol Approaches in Delay Tolerant Networks Routing Protocol Approaches in Delay Tolerant Networks Shivi Shukla 1, Amit Munjal 2 and Y. N. Singh 2 AIM & ACT Dept., Banasthali Vidyapith, Rajasthan 1 EE Dept., Indian Institute of Technology, Kanpur

More information

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.

Delay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo. Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density

More information

Buffer Aware Routing in Interplanetary Ad Hoc Network

Buffer Aware Routing in Interplanetary Ad Hoc Network Buffer Aware Routing in Interplanetary Ad Hoc Network Kamal Mistry (Wipro Technologies, Bangalore) Sanjay Srivastava (DA-IICT, Gandhinagar) R. B. Lenin (DA-IICT, Gandhinagar) January 8, 2009 Buffer Aware

More information

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks

Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks Social-Similarity-based Multicast Algorithm in Impromptu Mobile Social Networks Yuan Xu, Xiao Chen Department of Computer Science, Texas State University, San Marcos, TX, USA Email: y x3@txstate.edu, xc@txstate.edu

More information

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks 27 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): 27 IEEE Infocom MiseNet Workshop Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

More information

Advanced Internet Architectures

Advanced Internet Architectures Advanced Internet Architectures Carlos Borrego Iglesias Carlos.Borrego@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma de Barcelona Tecnologies avançades d

More information

Selective Message Forwarding in Delay Tolerant Networks

Selective Message Forwarding in Delay Tolerant Networks Selective Message Forwarding in Delay Tolerant Networks Lei Tang, Qunwei Zheng, Jun Liu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {ltang,qzheng,jliu,hxy}@cs.ua.edu

More information

Keywords: Store and carry networks, Forwarding strategies, routing, DTN, Minimum hop transmission

Keywords: Store and carry networks, Forwarding strategies, routing, DTN, Minimum hop transmission Global Journal of Computer Science and Technology Volume 11 Issue 9 Version 1.0 May 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) ISSN: 0975-4172

More information

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security. IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY An Efficient Selfishness Aware Routing in Delay Tolerant Networks N.Senthilkumar *1, Dr. T.V U. Kiran Kumar 2 *1,2,3,4 Bharath

More information

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Yunsheng Wang Kettering University Jie Wu Temple University Mingjun Xiao University of Science and Tech. of China Daqiang Zhang

More information

BOND: Unifying Mobile Networks with Named Data. Michael Meisel

BOND: Unifying Mobile Networks with Named Data. Michael Meisel BOND: Unifying Mobile Networks with Named Data Michael Meisel Ph.D. Dissertation Defense March 16, 2011 Freeform Wireless Networks Multi-hop Unpredictable mobility Can be connected or disconnected Examples:

More information

A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING

A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING Sanjit Kumar Dash 1, Chandrakanta Mahanty 2, Sasmita Mishra 3 and Jibitesh Mishra 1 1 College of Engineering and

More information

Data Management Issues in Disconnected Sensor Networks

Data Management Issues in Disconnected Sensor Networks Data Management Issues in Disconnected Sensor Networks Wolfgang Lindner MIT CSAIL wolfgang@csail.mit.edu Samuel Madden MIT CSAIL madden@csail.mit.edu Abstract: The possibility of disconnection is one of

More information

ANNALS of Faculty Engineering Hunedoara International Journal of Engineering

ANNALS of Faculty Engineering Hunedoara International Journal of Engineering ANNALS of Faculty Engineering Hunedoara International Journal of Engineering Tome XIII [2015] Fascicule 4 [November] ISSN: 1584-2673 [CD-Rom; online] a free-access multidisciplinary publication of the

More information

Efficient Routing In Delay Tolerant Network Based On Secure Fuzzy Spray Decision Algorithm

Efficient Routing In Delay Tolerant Network Based On Secure Fuzzy Spray Decision Algorithm INTERNATIONAL JOURNAL OF TECHNOLOGY ENHANCEMENTS AND EMERGING ENGINEERING RESEARCH, VOL 2, ISSUE 10 37 Efficient Routing In Delay Tolerant Network Based On Secure Fuzzy Spray Decision Algorithm Kumar Kombaiya.A,

More information

Network Routing Without Delay Using Message Scheduling

Network Routing Without Delay Using Message Scheduling ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

An Agenda-Based Routing Protocol in Delay Tolerant Mobile Sensor Networks

An Agenda-Based Routing Protocol in Delay Tolerant Mobile Sensor Networks Sensors 2010, 10, 9564-9580; doi:10.3390/s101109564 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Article An Agenda-Based Routing Protocol in Delay Tolerant Mobile Sensor Networks Xiao-Min

More information

Social Properties Based Routing in Delay Tolerant Network

Social Properties Based Routing in Delay Tolerant Network RESEARCH ARTICLE OPEN ACCESS Properties Based Routing in Delay Tolerant Network Aliasger k. Dhilawala 1, Vishal shah 2 1 (Computer Department, S.V.I.T, Vasad,India 2 (Computer Department, S.V.I.T, Vasad,India

More information

A comprehensive-integrated buffer management strategy for opportunistic networks

A comprehensive-integrated buffer management strategy for opportunistic networks Pan et al. EURASIP Journal on Wireless Communications and Networking 2013, 2013:103 RESEARCH Open Access A comprehensive-integrated buffer management strategy for opportunistic networks Daru Pan 1*, Zhaohua

More information

Some Routing Challenges in Dynamic Networks

Some Routing Challenges in Dynamic Networks Some Routing Challenges in Dynamic Networks Jie Wu Dept. of Computer and Information Sciences Temple University Overview 1. Current State of Networking More Wireless Mobile and Opportunistic Applications

More information

Constructing Time-Varying Contact Graphs for Heterogeneous Delay Tolerant Networks

Constructing Time-Varying Contact Graphs for Heterogeneous Delay Tolerant Networks Globecom 2012 - Wireless Networking Symposium Constructing Time-Varying Contact Graphs for Heterogeneous Delay Tolerant Networks Xiaoyan Hong, Bo Gu, Yuguang Zeng, Jingyuan Zhang Department of Computer

More information

Capacity-Aware Routing Using Throw-Boxes

Capacity-Aware Routing Using Throw-Boxes Capacity-Aware Routing Using Throw-Boxes Bo Gu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {bgu,hxy}@cs.ua.edu Abstract Deploying the static wireless devices

More information

DTIPN: Delay Tolerant IP Networking for Opportunistic Network Applications

DTIPN: Delay Tolerant IP Networking for Opportunistic Network Applications DTIPN: Delay Tolerant IP Networking for Opportunistic Network Applications Hideya Ochiai The University of Tokyo/NICT jo2lxq@hongo.wide.ad.jp Kenichi Shimotada The University of Tokyo ken@hongo.wide.ad.jp

More information

Social-Based Cooperative Caching in multi-hop wireless networks

Social-Based Cooperative Caching in multi-hop wireless networks Social-Based Cooperative Caching in multi-hop wireless networks 1 Kothagundla Divya, 2 S.Suresh 1,2 D ept. of CSE, Sree Rama Institute of Technology & Science, SKuppenakuntla, Penuballi, K hammam, AP,

More information

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs

DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs DIAL: A Distributed Adaptive-Learning Routing Method in VDTNs Authors: Bo Wu, Haiying Shen and Kang Chen Dept. of Electrical and Computer Engineering Clemson University, SC, USA 1 Outline Background Trace

More information

ACICE-2013 ISSN: ; e-issn

ACICE-2013 ISSN: ; e-issn 1022 A Novel Ferry-Initiated Message Ferrying Approach for Data Delivery in Disconnected Mobile Ad Hoc Networks through Native Ferries K. MURALIDHAR 1, N. GEETHANJALI 2 1 Assistant Professor, Department

More information

InterestSpread: An Efficient Method for Content Transmission in Mobile Social Networks

InterestSpread: An Efficient Method for Content Transmission in Mobile Social Networks : An Efficient Method for Content Transmission in Mobile Social Networks ABSTRACT Ning Wang Dept. of Computer and Information Sciences Temple University Philadelphia PA 9 ning.wang@temple.edu In Mobile

More information

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Community-Based Adaptive Buffer Management Strategy in Opportunistic Network Junhai Zhou, Yapin Lin ( ), Siwang Zhou, and Qin Liu College of Computer Science and Electronic Engineering, Hunan University,

More information

Opportunistic Routing Algorithms in Delay Tolerant Networks

Opportunistic Routing Algorithms in Delay Tolerant Networks Opportunistic Routing Algorithms in Delay Tolerant Networks Eyuphan Bulut Rensselaer Polytechnic Institute Department of Computer Science and Network Science and Technology (NeST) Center PhD Thesis Defense

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,

More information

From Opportunistic Networks to Opportunistic Computing

From Opportunistic Networks to Opportunistic Computing AD HOC AND SENSOR NETWORKS From Opportunistic Networks to Opportunistic Computing Marco Conti, IIT-CNR Silvia Giordano, SUPSI Martin May, Technicolor Research Andrea Passarella, IIT-CNR This work was partially

More information

DTN Interworking for Future Internet Presented by Chang, Dukhyun

DTN Interworking for Future Internet Presented by Chang, Dukhyun DTN Interworking for Future Internet 2008.02.20 Presented by Chang, Dukhyun Contents 1 2 3 4 Introduction Project Progress Future DTN Architecture Summary 2/29 DTN Introduction Delay and Disruption Tolerant

More information

Routing in Large-Scale Buses Ad Hoc Networks

Routing in Large-Scale Buses Ad Hoc Networks 1 Routing in Large-Scale Buses Ad Hoc Networks Michel Sede, Xu Li *, Da Li *, Min-You Wu * Laboratory for Computer Communications and Applications, EPFL, Switzerland * Department of Computer Science and

More information