Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Size: px
Start display at page:

Download "Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India"

Transcription

1 Volume 4, Issue 3, March 2014 ISSN: X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Performance Evaluation of Optimized Routing Technique in Adhoc Networks Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India Abstract: Many applications rely heavily on energy and thereby have a huge impact on number of times a packet is forwarded or sent across the network channel. It is very obvious that there is very low resource availability in such networks and applications and hence more copies and replications of a packet add significantly towards the energy and resource utilization in these networks. In real time systems, users have a particular deadline under which they need to communicate since the messages can be as urgent as 200 seconds or as unimportant as 2 to 3 days. To provide QoS in adhoc network with delay tolerant characteristic we take into account delay metric of the discovered links between source and destination in the route discovery process. This metric will be recorded inside the routing table, and it will be used to select the path that carries the lowest value of delay to use it as an active route between the source and destination. We develop prediction algorithm which predicts lowest cost path that satisfies a deadline. Then we propose a routing technique for Adhoc networks with quality of service that takes into account two important factors for messages of mobile nodes, deadline and cost and uses the prediction algorithm to make a more intelligent decision on which node to forward the message to. As many nodes in networks have high constraint on energy, so we will try to optimize on cost which is the number of transmissions on the network. Then we evaluate our proposed routing technique with existing protocols. Keywords: PORT, QoS. TCP/IP I. Introduction In Mobile Adhoc networks, a complete path does not exist from a source to a destination for most of the time or such a path is highly unstable and even may change or break soon after it has been discovered. This is due to constraints like node mobility, limited radio range etc. While mobile networks create many opportunities for computer communication, they also pose new challenges, for example frequent disconnections, limited bandwidth, long delays etc. Most of the networking protocols that are widely used like TCP/IP protocol were designed with wired networks in mind. Sometimes, there is no single-hop or multiple-hop route between some (or all) source/destination node pairs which might prevent some nodes from communicating with others and result in a disconnected network. If the disconnection last for a long duration of time, then it is not possible to deliver a packet from source to destination. It requires a new routing approach i.e. Store-Carry-and-Forward routing [3] rather than the traditional store-and-forward" routing paradigm, used in most current ad hoc routing approaches, in which messages are dropped if no route is found to reach a destination within a short period of time [4][5]. To deliver messages in a disconnected network or network which tolerate some delay [1], new quality of service routing approaches are proposed for delivering data. When QoS is considered, some techniques may be unsatisfactory or impractical due to the lack of resources and the excessive computation overhead. QoS routing usually involves two tasks: collecting and maintaining up-to-date state information about the network and finding feasible paths for a connection based on its QoS requirements. To support QoS, a service can be characterized by a set of measurable pre-specified service requirements such as minimum bandwidth, maximum delay, maximum delay variance and maximum packet loss rate. However many other metrics are also used to quantify QoS. To offer QoS routing, at least two parameters must be considered: minimum available bandwidth and maximum delay. Each node maintains a routing table to route data destined to the other nodes in the network. Most Adhoc networks with Delay Tolerant routing focus on whether or not to make a copy when meeting a node but not on planning a path, because path planning requires either knowledge of all the paths or prediction of the paths. Path planning is a more efficient way of routing since one can reduce on cost and yet achieve the reliability. But for high performance of path planning algorithm, we need high quality prediction and such high quality prediction might only be possible in semi-deterministic Adhoc Delay Tolerant Networks. Thus if a prediction scheme that can give the delay for the next contact for all the neighbors and also how often the neighbors meet, then it can find a more energy efficient routing solution and can make a decision on whether to forward to current neighbor or wait for a future contact that might arrive. The performance of the routing technique then will depend on the accuracy of the prediction algorithm used. So we are interested in predicting not only how often a given pair of nodes meets, but also the time at which they are likely to meet, given their past history of contacts. 2014, IJARCSSE All Rights Reserved Page 1492

2 II. Related Work Existing ad hoc routing techniques are unable to transmit between a source and destination that does not have a connected path. On the other hand in reality, there is never a connected path from source to destination. Recent research in this field includes Routing for such type of Networks [7] where messages are distributed within connected nodes in a set of message exchange sessions. Through node mobility, carriers contact other connected portions of network and message is spread to additional island of connected nodes. Given random exchange of data among replicas, all replicas will see all updates in a bounded amount of time. By giving random exchange of data among replicas, all updates will be seen by all replicas in a bounded amount of time. Routing is relatively simple because it requires no knowledge about the network. The disadvantage is that a huge amount of resources are consumed due to the large number of copies. This requires large amount of buffer space, bandwidth, and power. routing is a very simple and effective approach, but it does not consider the Constraints on the resource limitation. PROPHET, a Probabilistic Routing Protocol using History of Encounters and Transitivity, proposed by Lindgren et al. in [6] uses delivery predictability to determine a metric for contacts relative to successful delivery, such as delivery probability or delay. The operation of PROPHET is similar to that of Routing. When two nodes meet, they exchange summary vectors which in this case also contain the delivery predictability information stored at the nodes. This information is used to update the internal delivery predictability vector and then the information in the summary vector is used to decide which messages to request from the other node based on the forwarding strategy used. The basic assumption in the PROPHET is that mobility of nodes is not purely random, but it has a number of deterministic properties e.g. repeating behavior. The nodes that met each other in the past are more likely to meet in the future. Delivery predictability estimates the probability of the node A to be able to deliver a message to the destination node B. Similar to epidemic routing, whenever a node comes in to contact with other nodes in the network, they exchange summary vectors. The difference is that in the PROPHET method, the summary vectors also contain the delivery predictability values for destinations known by each node. Each node further requests messages it does not have and updates its internal delivery predictability vector to identify which node has greater delivery predictability to a given destination. Nodes update their delivery predictability metrics whenever meet each other. The delivery predictability favors nodes to meet frequently, and the fact that even if mobility is random, nodes that previously were close, probably have not moved far away from each other. III. Mobility Prediction Algorithm We assume that the mobility of nodes in a certain class of Adhoc Networks with Delay Tolerant characteristic is somewhat predictable and this is reflected in the contact pattern of nodes. We also assume that pattern of contact is somewhat periodic. This periodicity of behavior is captured by what we call a frame, which is the length of time after which the pattern repeats itself. Hence predicting how the nodes behave relies on predicting their behavior in the frame. For a contact pattern to be deterministic means, the frame is finite. Hence, a frame is the minimum (finite) amount of time after which the contact pattern repeats itself. The prediction problem can be stated as follows: Given a history of contact H i,j, which is an array size h l of tuples < t c,l c > (time of contact and length of contact) and time t, predict the delay before the next contact. We adopt the following prediction methodology developed by Mukundan Sridharan [2]. We divide time into frames of length f l and each frame into slots S n of fixed length S l. Next we find the average number of contacts per slot Pc i, j, given the history, which is simply the ratio of the number of contacts in time slot Sn and the number of frames of contact history data available, i.e., h l /f l. Given the average contacts Pc i, j and the time frame tf( i, j ), we calculate the maximum expected delay for the next contact for a probability threshold Pc thresh (for example, say 0.95), by summing up the individual contact probabilities in each slot, so the sum equals the threshold Pc thresh and finding the corresponding delays for the contacts. A natural threshold in our slot average case is 1.0 or a number very close to 1.0, which means that as the cumulative sum crosses 1.0 you are assured of at-least one contact before or by that time slot. Thus, a node i, for each node j it meets, predicts the maximum contact delays < C 1 j,c 2 j..c n j > with respect to a time frame tf( i, j), based on the contact history between the two nodes. IV. Proposed Routing Technique We have proposed routing technique for adhoc network with delay tolerant characteristic as QoS metric. The proposed approach has two phases path discovery phase and path maintenance phase. When a source node has to pass data to a destination node with QoS requirements, it starts with the path discovery phase. We used mobility prediction algorithm for intelligent path discovery. Once the path is found, the data transfer will take place. While data transmission is going on, it is also required to maintain the path to the destination. Steps of proposed routing technique are as follows: 1. Update history and contact predictions. /*Contact history of the nodes are updated and the contact prediction algorithm is run to get the expected contact delays*/ 2. Compute the available paths vector. /*compute the set of paths available from a node to the destination, through all of its available neighbors (excluding the current contact). Through each of the neighbors, multiple paths could be available*/ 2014, IJARCSSE All Rights Reserved Page 1493

3 3. Exchange available path information. /* Nodes exchange the paths with each other*/ 4. Update the path table with new information /* Node updates its routing table with the paths it received*/ 5. Compute the best path for each packet. /* Compute the lowest cost path that satisfies the deadline*/ 6. Forward packets. /* Forwards the data packets meant for (current contact) node j*/ V. METHODOLOGY Simulation scenario Due to the cost and difficulty of collecting traces of real world, the trace data will generally not be enough to run the amount of simulations for testing routing techniques. So it is good to build a synthetic mobility model. This model can generate an infinite number of trace data with the same statistical mobility properties as compared to real-world mobility model. The KU Campus environment is a synthetic trace that uses the Time Variant Community Model of Wei-Jen Hsu et. al. [8]. The model is based on two very essential things, Communities and Time Periods. Every node has a probability of going to each community at each time period. Also every node has an epoch (period) length and an epoch time which signifies the stationary time of the nodes at those communities. By setting all these parameters, one can model a simulation scenario which is closer to the human mobility in these environments. Performance Metrics The following metrics are used for the comparison of the protocols and proposed technique: 1. Number of Forwards or Cost This is the most important metric in this study and is the main metric to optimize. Number of forwards is defined as the total number of times a packet is sent on the network channel and is averaged over total number of packets created in the network. Number of Forwards = Total number of sends / (Total packets created per node*number of nodes) 2. Technique s Efficiency This is another important metric in this study and is defined as the total number of packets including data packets and control packets but not beacon(new) packets sent on the network channel divided by total number of data packets received at the base station (Good-put). Technique Efficiency = (Number of data packets sent + number of control packets sent)/ Total packets received at base station 3. Throughput Throughput shows the reliability of a technique which proves how successful the technique is and hence is defined as total number of packets received at the base station divided by total number of packets created in the network. Throughput = Total packets received at base station / (Total packets created per node* number of nodes) 4. Average Delay Delay is a metric which is optimized in most of the work done in routing. Here we combined this metric with a constraint value named as 'Deadline' that needs to be met. Average Delay is defined as the Total End to End Delay which is the time duration between creation of packet and when packet is received at the base station for all the packets created in the network averaged over number of packets created for all nodes. n Average Delay = i=1 ( Time packet i was received - Time packet i was created)/ (Total packets created per node * Number of nodes) VI. Analysis and Results In order to simulate existing protocols and our proposed optimized routing technique, we use NS 2 network simulator. The mobility of nodes is set by ns mobility traces, files generated for the above mentioned synthetic traces. There exists 1 base station and other mobile nodes that generate traffic to be delivered at the base station. At every node, packets are generated with size of 400 bytes at a constant interval and we plot the above important routing metrics with change in interval. We also change the number of nodes in the network and try to analyze the technique. We set a fixed buffer size of 200 packets for our technique. When a node meets, it exchanges the routing control information first and then starts sending data packets in order until all the packets are send or if the node goes out of communication range of the other node. Our technique is referred as Proposed Optimized Routing Technique (PORT) with two different versions with different deadlines 12 and 24 in the graphs. 2014, IJARCSSE All Rights Reserved Page 1494

4 Throughput No. of Forwards Efficiency Efficiency Vs Traffic rate Figure 1: Efficiency vs. Our technique has the highest efficiency as can be seen in figure 1. Also efficiency decreases with lower deadlines which are expected since the delay constraints increase. The other techniques have a very low efficiency because of its high cost and higher technique overhead. 25 No. of Forwards Vs Figure 2: No. of forwards Vs As we can see from figure 2, our technique outperforms all the other techniques by a long margin in terms of cost which is number of forwards. Our technique with deadline 24 achieves the least cost since it is allowed to wait for a longer but low cost path compared to deadlines 12. is a single copy forwarding scheme and because of its average metric calculation, results in a high number of transmission thereby increasing cost. But it can also be seen that all the 2 versions of our technique with deadlines 12 and 24 still outperform and the other techniques Throughput Vs Figure 3: Throughput vs Figure 3 shows us the throughput with respect to rate of traffic. As can be seen that have the best throughput since it uses replication and also buffer mechanism policies and acknowledgment mechanism to reduce on buffer. 2014, IJARCSSE All Rights Reserved Page 1495

5 Average Delayt Average Delay Vs Figure 4: Average Delay Vs Figure 4 shows the average delay for packets with respect to rate of traffic. As with throughput, the delay of the replication techniques is the best as expected. But it can be seen that our technique outperforms other single copy techniques and is also very close in terms of delay as compared to the replication techniques. Also it can be seen that if higher delay constraints are enforced, the delay reduces as deadline decreases. Thus the deadline parameter can be refined such that a particular delay can be achieved but with increase in cost. VII. Conclusion In this paper, we have developed a prediction algorithm in ad hoc networks with delay tolerant characteristic that takes nodes inter contact time history and gives future contact times for all pair of nodes in network. The availability of future contact times help in making routing decisions for routing techniques. We have analyzed the node mobility to better estimate node-to-node future contact statistics for improving message delivery. We have also designed an optimized routing technique that predicts the future nodes to reach the destination with quality of service under delay and buffer constraints of a network. For QoS, we have taken into account two factors for packets of mobile nodes- deadline i.e. time limit and cost i.e. the number of transmissions required for transfer of packet to the destination. Thus we have optimized routing technique that achieves equivalent reliability under delay and buffer constraints of a network. Simulation results are shown and the comparison of optimized routing technique with existing protocols is carried out. The result shows better performance in routing of data from source to destination. In Optimized routing technique, we will find paths to transmit data between any nodes in a semi-deterministic adhoc network with delay characteristics. It also tries to show the optimality of the technique with a low computational cost using Qos factors. After that it describes the synthetic traces used to validate the routing technique. It then describes briefly the other routing techniques used to compare with the proposed technique. Finally and also the validation of the proposed routing technique and References [1] Graham Williamson, Routing in Human Contact Networks, National University of Ireland, Dublin, [2] T. Spyropoulos, K. Psounis and C. Raghavendra. Spray and wait: an efficient routing scheme for intermittently connected mobile networks, Proceedings of the 2005 ACM SIGCOMM workshop on Delay tolerant networking (WDTN '05). ACM, New York, NY, USA, , [3] L. Song, D.F. Kotz., Evaluating Opportunistic Routing Protocols with large Realistic Contact Traces, Proceedings of the second workshop on Challenged networks (CHANTS), ACM,2007. [4] Abolhasan M., Wysocki T. and Dutkiewicz E, A review of routing protocols for mobile ad hoc networks, Ad Hoc Networks Elsevier Vol. 2 No.1, Pp. 1-22, [5] Mundur P., Lee S. and Seligman M, Routing for Data Delivery in Dynamic Networks, Military Communications Conference MILCOM, IEEE Washington, DC, 1-7, [6] A. Lindgren, A. Doria, and O. Schelen, Probabilistic routing in intermittently connected networks, In Proc. of the 1 st Int l. Wkshp. on Service Assurance with Partial and Intermittent Resources, pages , [7] Amin Vahdat and David Becker, Routing for Partially-Connected Ad Hoc Networks, Department of Computer Science Duke University Durham, NC July [8] Wei-Jen Hsu, Thrasyvoulos Spyropoulos, Konstantinos Psounis, and Ahmed Helmy, Modeling spatial and temporal dependencies of user mobility in wireless mobile networks, ACM Transaction 17(5): , [9] D. Johnson, D. Maltz, Dynamic source routing in ad hoc wireless networks, Mobile Computing, The Springer International Series in Engineering and Computer Science, Volume , IJARCSSE All Rights Reserved Page 1496

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy, Anna University Chennai,

More information

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013) Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay Anjula

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 07 December 2016 ISSN (online): 2349-6010 Design and Implementation of Improved Routing Algorithm for Energy

More information

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models 2016 7th International Conference on Intelligent Systems, Modelling and Simulation Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models Bhed Bahadur

More information

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2 , pp.151-158 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.15 Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey Namita Mehta 1 and Mehul Shah 2 1 Student, Department

More information

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM 2004 Presented by Xun Gong Outline Delay Tolerant Networks Routing Problem in DTNs Multiple-copy Approach Flooding and

More information

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments Bhed Bahadur Bista Faculty of Software and Information Science Iwate Prefectural University Takizawa

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Impact of Social Networks in Delay Tolerant Routing

Impact of Social Networks in Delay Tolerant Routing Impact of Social Networks in Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Simulation and Analysis of Opportunistic Routing Protocols

Simulation and Analysis of Opportunistic Routing Protocols Simulation and Analysis of Opportunistic Routing Protocols 1 The Purpose The purpose of this assignment is to gain familiarity with a network simulation tool and to get experience in basic data analysis.

More information

Buffer Management in Delay Tolerant Networks

Buffer Management in Delay Tolerant Networks Buffer Management in Delay Tolerant Networks Rachana R. Mhatre 1 And Prof. Manjusha Deshmukh 2 1,2 Information Technology, PIIT, New Panvel, University of Mumbai Abstract Delay tolerant networks (DTN)

More information

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks Int. J. Communications, Network and System Sciences, 2012, 5, 98-104 http://dx.doi.org/10.4236/ijcns.2012.52013 Published Online February 2012 (http://www.scirp.org/journal/ijcns) Spray and Dynamic: Advanced

More information

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS Sanjay Kumar, K. Suraj and Sudhakar Pandey Department of Information Technology, National Institute of Technology Raipur, India E-Mail:

More information

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS Chintan B. Desai PG Student, Electronics and Communication Department, Charotar University of Science & Technology, Changa,

More information

Routing Protocol Approaches in Delay Tolerant Networks

Routing Protocol Approaches in Delay Tolerant Networks Routing Protocol Approaches in Delay Tolerant Networks Shivi Shukla 1, Amit Munjal 2 and Y. N. Singh 2 AIM & ACT Dept., Banasthali Vidyapith, Rajasthan 1 EE Dept., Indian Institute of Technology, Kanpur

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

Opportunistic Routing Algorithms in Delay Tolerant Networks

Opportunistic Routing Algorithms in Delay Tolerant Networks Opportunistic Routing Algorithms in Delay Tolerant Networks Eyuphan Bulut Rensselaer Polytechnic Institute Department of Computer Science and Network Science and Technology (NeST) Center PhD Thesis Defense

More information

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks Middle-East Journal of Scientific Research 23 (Sensing, Signal Processing and Security): 291-296, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.mejsr.2015.23.ssps.111 Buffer Aware Network

More information

Buffer Aware Routing in Interplanetary Ad Hoc Network

Buffer Aware Routing in Interplanetary Ad Hoc Network Buffer Aware Routing in Interplanetary Ad Hoc Network Kamal Mistry (Wipro Technologies, Bangalore) Sanjay Srivastava (DA-IICT, Gandhinagar) R. B. Lenin (DA-IICT, Gandhinagar) January 8, 2009 Buffer Aware

More information

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS ABSTRACT Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China

More information

A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING

A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING Sanjit Kumar Dash 1, Chandrakanta Mahanty 2, Sasmita Mishra 3 and Jibitesh Mishra 1 1 College of Engineering and

More information

BOND: Unifying Mobile Networks with Named Data. Michael Meisel

BOND: Unifying Mobile Networks with Named Data. Michael Meisel BOND: Unifying Mobile Networks with Named Data Michael Meisel Ph.D. Dissertation Defense March 16, 2011 Freeform Wireless Networks Multi-hop Unpredictable mobility Can be connected or disconnected Examples:

More information

Capacity-Aware Routing Using Throw-Boxes

Capacity-Aware Routing Using Throw-Boxes Capacity-Aware Routing Using Throw-Boxes Bo Gu, Xiaoyan Hong Department of Computer Science University of Alabama, Tuscaloosa, AL 35487 {bgu,hxy}@cs.ua.edu Abstract Deploying the static wireless devices

More information

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network Simulation of, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network 1 Monika Aneja, 2 Vishal Garg 1 (P.G. Student JMIT, Radaur, Yamunanagar) 2 (Assistant Professor JMIT Radaur Yamunanagar)

More information

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing This is an authors' version of the manuscript. Final version published in Proc. 13th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW '14). Springer LNCS 8487, pp. 1-14, 2014. The final

More information

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad

More information

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks

Routing with Multi-Level Social Groups in Mobile Opportunistic Networks Routing with Multi-Level Social Groups in Mobile Opportunistic Networks Lunan Zhao Fan Li Chao Zhang Yu Wang School of Computer Science, Beijing Institute of Technology, Beijing, 100081, China. Department

More information

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur International Journal of Scientific & Engineering Research, Volume 7, Issue 4, April-2016 1717 A Review of Energy Consumption on DTN Routing Protocols Sukhpreet Kaur Abstract: DTN is net of similar nets.

More information

MDR Based Cooperative Strategy Adaptation in Wireless Communication

MDR Based Cooperative Strategy Adaptation in Wireless Communication MDR Based Cooperative Strategy Adaptation in Wireless Communication Aswathy Mohan 1, Smitha C Thomas 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: Cooperation among

More information

Impact of Social Networks on Delay Tolerant Routing

Impact of Social Networks on Delay Tolerant Routing Impact of Social Networks on Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut

More information

1. INTRODUCTION. Saravanan.A 1 and Dr.Sunitha Abburu 2

1. INTRODUCTION. Saravanan.A 1 and Dr.Sunitha Abburu 2 www.ijcsi.org 365 Computing Conditional Intermeeting Time in Conditional Shortest Path Routing Saravanan.A 1 and Dr.Sunitha Abburu 2 1 Adhiyamaan College of Engineering, Department of Computer Application,

More information

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs Dr. Santhi Kumaran Associate Professor, Dept of Computer Engineering,

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

Modeling Time-variant User Mobility in Wireless Mobile Networks (Time-variant Community (TVC) Model)

Modeling Time-variant User Mobility in Wireless Mobile Networks (Time-variant Community (TVC) Model) Modeling Time-variant User Mobility in Wireless Mobile Networks (Time-variant Community (TVC) Model) Wei-jen Hsu, Dept. of CISE, U. of Florida Thrasyvoulos Spyropoulos, INRIA, Sophia-Antipolis, France

More information

Social-Aware Routing in Delay Tolerant Networks

Social-Aware Routing in Delay Tolerant Networks Social-Aware Routing in Delay Tolerant Networks Jie Wu Dept. of Computer and Info. Sciences Temple University Challenged Networks Assumptions in the TCP/IP model are violated DTNs Delay-Tolerant Networks

More information

II. ROUTING CATEGORIES

II. ROUTING CATEGORIES ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses

More information

A Comparative Simulation of Opportunistic Routing Protocols Using Realistic Mobility Data Obtained from Mass Events

A Comparative Simulation of Opportunistic Routing Protocols Using Realistic Mobility Data Obtained from Mass Events A Comparative Simulation of Opportunistic Routing Protocols Using Realistic Mobility Data Obtained from Mass Events Arno Barzan, Bram Bonné, Peter Quax, Wim Lamotte Hasselt University - tul - iminds Wetenschapspark

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

Estimation based Erasure-coding Routing in Delay Tolerant Networks

Estimation based Erasure-coding Routing in Delay Tolerant Networks Estimation based Erasure-coding Routing in Delay Tolerant Networks Yong Liao, Kun Tan, Zhensheng Zhang, Lixin Gao Dep. of Electrical & Computer Eng. Microsoft Research Asia San Diego Research Center University

More information

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES B.Poonguzharselvi 1 and V.Vetriselvi 2 1,2 Department of Computer Science and Engineering, College of Engineering Guindy,

More information

Application of Graph Theory in DTN Routing

Application of Graph Theory in DTN Routing Application of Graph Theory in DTN Routing Madan H. T. 1, Shabana Sultana 2 1 M. Tech. (CNE), NIE, Mysuru 2 Associate Professor, Dept. of Computer Science & Eng., NIE, Mysuru Abstract: Delay tolerant network

More information

Integrated Routing Protocol for Opportunistic Networks

Integrated Routing Protocol for Opportunistic Networks Integrated Routing Protocol for Opportunistic Networks Anshul Verma Computer Science and Engineering Dept. ABV-Indian Institute of Information Technology and Management, Gwalior, India E-mail: anshulverma87@gmail.com

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network Ankur Upadhyay Department of Computer Science & Engineering School of Engineering & Technology, IFTM

More information

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol Original Article Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol P. Kalaivani* 1, G. Sathya 1 and N. Senthilnathan 2 1 Assistant Professor, SNS College of Engineering,

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 4, July - August 2018, pp. 77 83, Article ID: IJARET_09_04_007 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=4

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

Routing in a Delay Tolerant Network

Routing in a Delay Tolerant Network Routing in a Delay Tolerant Network Vladislav Marinov Jacobs University Bremen March 31st, 2008 Vladislav Marinov Routing in a Delay Tolerant Network 1 Internet for a Remote Village Dial-up connection

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18,   ISSN International Journal of Computer Engineering and Applications, ANALYZING IMPACT OF FACTORS ON ROUTING DECISIONS IN OPPORTUNISTIC MOBILE NETWORKS Sonam Kumari 1, Dr. Itu Snigdh 2 Department of Computer

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks

Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks Evaluation of Epidemic Routing Protocol in Delay Tolerant Networks D. Kiranmayi Department of CSE, Vignan s Institute Of IT, Visakhapatnam, India ABSTRACT:There are many routing protocols that which can

More information

IMPROVING QoS IN DELAY TOLERANT MOBILE AD HOC NETWORK USING MULTIPLE MESSAGE FERRIES

IMPROVING QoS IN DELAY TOLERANT MOBILE AD HOC NETWORK USING MULTIPLE MESSAGE FERRIES IMPROVING QoS IN DELAY TOLERANT MOBILE AD HOC NETWORK USING MULTIPLE MESSAGE FERRIES R. C. Suganthe Professor Department of Computer Science and Engineering Kongu Engineering College, Perundurai-638 052,

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Probabilistic Routing With Multi-copies in Delay Tolerant Networks

Probabilistic Routing With Multi-copies in Delay Tolerant Networks Probabilistic Routing With Multi-copies in Delay Tolerant Networks Ze Li and Haiying Shen Department of Computer Science and Computer Engineering University of Arkansas, Fayetteville, AR 7701 {zxl008,

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Optimal Buffer Management Policies for Delay Tolerant Networks

Optimal Buffer Management Policies for Delay Tolerant Networks Optimal Buffer Management Policies for Delay Tolerant Networks Chadi BARAKAT INRIA Sophia Antipolis, France Planète research group Joint work with Amir Krifa and Thrasyvoulos Spyropoulos Email: Chadi.Barakat@sophia.inria.fr

More information

Performance Comparison of AODV, DSDV and DSR Protocols in Mobile Networks using NS-2

Performance Comparison of AODV, DSDV and DSR Protocols in Mobile Networks using NS-2 , Vol 9(8), DOI: 10.17485/ijst/2016/v9i8/87948, February 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Performance Comparison of AODV, DSDV and DSR Protocols in Mobile Networks using NS-2 R.

More information

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing Chithra M. 1, Mr. Vimalathithan

More information

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs . RESEARCH PAPER. SCIENCE CHINA Information Sciences February 2012 Vol. 55 No. 2: 433 440 doi: 10.1007/s11432-011-4345-1 Spray and forward: Efficient routing based on the Markov location prediction model

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,

More information

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols R.Devi, B.Sumathi, T.Gandhimathi, G.Alaiyarasi 1 st year, M.Tech (Software Engineering), Department of Information Technology,

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination

Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination Evaluation of Seed Selection Strategies for Vehicle to Vehicle Epidemic Information Dissemination Richard Kershaw and Bhaskar Krishnamachari Ming Hsieh Department of Electrical Engineering, Viterbi School

More information

Delay Tolerant Networks

Delay Tolerant Networks Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected

More information

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance Analysis of Three Routing Protocols for Varying MANET Size Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach 7 th Annual IEEE Communication Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (IEEE SECON 10)

More information

Energy Efficient EE-DSR Protocol for MANET

Energy Efficient EE-DSR Protocol for MANET Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network A Genetic-Neural Approach for obility Assisted Routing in a obile Encounter Network Niko P. Kotilainen, Jani Kurhinen Abstract--obility assisted routing (AR) is a concept, where the mobility of a network

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Max-Pivot Routing for Opportunistic Networks

Max-Pivot Routing for Opportunistic Networks Max-Pivot Routing for Opportunistic Networks Tamer Dag Computer Engineering Department Kadir Has University Istanbul, Turkey tamer.dag@khas.edu.tr Abstract Opportunistic networks are challenging types

More information

Studies with ns-2 and ns-3 based DTN Simulators

Studies with ns-2 and ns-3 based DTN Simulators Studies with and based DTN Simulators Epidemic Routing, Spray and Wait DTN Congestion Control Jani Lakkakorpi Department of Communications and Networking (Comnet) 2.11.2012 Simulators.34 With alternative

More information

hash chains to provide efficient secure solutions for DSDV [7].

hash chains to provide efficient secure solutions for DSDV [7]. A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han {chuah, pey24, jih26}@cse.lehigh.edu Department of Computer Science & Engineering Lehigh University

More information

COST EFFICIENT PREDICTIVE ROUTING FOR DISRUPTION TOLERANT NETWORKS

COST EFFICIENT PREDICTIVE ROUTING FOR DISRUPTION TOLERANT NETWORKS COST EFFICIENT PREDICTIVE ROUTING FOR DISRUPTION TOLERANT NETWORKS A THESIS Presented in Partial Fulfillment of the Requirements for the Degree Master of Science in the Graduate School of the Ohio State

More information

Epidemic Routing for Partially-Connected Ad Hoc Networks

Epidemic Routing for Partially-Connected Ad Hoc Networks Epidemic Routing for Partially-Connected Ad Hoc Networks Presented By- Kannan Chandrasekaran MS Computer Science, EECS, University of Kansas, Lawrence. Email: kannanc@ku.edu Amin Vahdat and David Becker,

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Performance Evaluations of Various Message Ferry Scheduling Schemes with Two Traffic Classes Mooi Choo Chuah

Performance Evaluations of Various Message Ferry Scheduling Schemes with Two Traffic Classes Mooi Choo Chuah Performance Evaluations of Various Message Ferry Scheduling Schemes with Two Traffic Classes Mooi Choo Chuah Peng Yang Department of Computer Science and Engineering Department of Computer Science and

More information

Design of Simulator for Finding the Delay Distribution in Delay Tolerant Networking

Design of Simulator for Finding the Delay Distribution in Delay Tolerant Networking Global Journal of Computer Science and Technology Network, Web & Security Volume 12 Issue 14 Version 1. Year 212 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

A DTN Packet Forwarding Scheme Inspired by Thermodynamics

A DTN Packet Forwarding Scheme Inspired by Thermodynamics A DTN Packet Forwarding Scheme Inspired by Thermodynamics Mehdi Kalantari and Richard J. La Department of Electrical and Computer Engineering University of Maryland {mehkalan, hyongla}@umd.edu Abstract

More information

International Journal of Advancements in Research & Technology, Volume 2, Issue1, January ISSN

International Journal of Advancements in Research & Technology, Volume 2, Issue1, January ISSN International Journal of Advancements in Research & Technology, Volume 2, Issue1, January-2013 1 ENERGY SAVING IN WIRELESS SENSOR NETWORK USING OPTIMAL SELECTIVE FORWARDING PROTOCOL 1 Mrs. K. ARUN PRABHA

More information

Modeling Redundancy-based Routing in Delay Tolerant Networks

Modeling Redundancy-based Routing in Delay Tolerant Networks Modeling Redundancy-based Routing in Delay Tolerant Networks Yong Liao, Kun Tan, Zhensheng Zhang, Lixin Gao Dep. of Electrical & Computer Eng. Microsoft Research Asia San Diego Research Center University

More information

Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition

Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition I. J. Computer Network and Information Security, 2012, 12, 59-64 Published Online November 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.12.06 Need of Removing Delivered Message Replica

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

AVC College of Engineering, Mayiladuthurai, India

AVC College of Engineering, Mayiladuthurai, India Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Recital Investigation

More information

User Manual for the Time-variant Community Mobility Model

User Manual for the Time-variant Community Mobility Model User Manual for the Time-variant Community Mobility Model Release Version: TVCM-1.1-beta Release Date: May 31, 2007 Authors: Wei-jen Hsu, Dept. of Computer and Information Science and Engineering, U. of

More information

Energy Efficient Social-Based Routing for Delay Tolerant Networks

Energy Efficient Social-Based Routing for Delay Tolerant Networks Energy Efficient Social-Based Routing for Delay Tolerant Networks Chenfei Tian,FanLi,, Libo Jiang,ZeyeWang, and Yu Wang 2, School of Computer Science, Beijing Institute of Technology, Beijing, 8, China

More information