ERASURE-CODING DEPENDENT STORAGE AWARE ROUTING

Similar documents
Buffer Management in Delay Tolerant Networks

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

An Energy Efficient and Delay Aware Data Collection Protocol in Heterogeneous Wireless Sensor Networks A Review

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Improvement of Buffer Scheme for Delay Tolerant Networks

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

Excavation Balance Routing Algorithm Simulation Based on Fuzzy Ant Colony

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Chapter 7 CONCLUSION

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

Delay Tolerant Networks

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

A Dynamic Adaptive Algorithm Based on HTTP Streaming Media Technology

Computation of Multiple Node Disjoint Paths

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

Impact of Source Counter on Routing Performance in Resource Constrained DTNs

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

Peculiarities of Delay Tolerant Networks

WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks

A Study on Issues Associated with Mobile Network

Estimation based Erasure-coding Routing in Delay Tolerant Networks

World Journal of Engineering Research and Technology WJERT

Protocol Design and Optimization for

Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios

Available online at ScienceDirect. Procedia Computer Science 85 (2016 )

Cost Based Efficient Routing for Wireless Body Area Networks

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Presenter: Wei Chang4

MDR Based Cooperative Strategy Adaptation in Wireless Communication

Selection of Optimum Routing Protocol for 2D and 3D WSN

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks

Routing in Delay Tolerant Networks (DTN)

1. INTRODUCTION. Saravanan.A 1 and Dr.Sunitha Abburu 2

A Review: Optimization of Energy in Wireless Sensor Networks

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Application of Graph Theory in DTN Routing

Impact of Social Networks in Delay Tolerant Routing

AS-PUMA : ANYCAST SEMANTICS IN PARKING USING METAHEURISTIC APPROACH

An Iterative Greedy Approach Using Geographical Destination Routing In WSN

Routing in a Delay Tolerant Network

All Rights Reserved 2017 IJARCET

Review Article AN ANALYSIS ON THE PERFORMANCE OF VARIOUS REPLICA ALLOCATION ALGORITHMS IN CLOUD USING MATLAB

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

Routing Protocol Approaches in Delay Tolerant Networks

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

A Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks

AN OPTIMIZED CLUSTER BASED APPROACH FOR MULTI- SOURCE MULTICAST ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS USING OWCA

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs

Opportunistic Routing Algorithms in Delay Tolerant Networks

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

PROFICIENT CLUSTER-BASED ROUTING PROTOCOL USING EBSA AND LEACH APPROACHES

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Analyzing traffic source impact on returning visitors ratio in information provider website

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication.

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs

Max-Pivot Routing for Opportunistic Networks

Incentive-Aware Routing in DTNs

Data Gathering for Wireless Sensor Network using PEGASIS Protocol

Figure 1. Clustering in MANET.

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

A Secure Routing Protocol for Wireless Adhoc Network Creation

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Capacity-Aware Routing Using Throw-Boxes

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

A SOLUTION FOR REPLICA CONSISTENCY MAINTENANCE IN UNSTRUCTURED PEER-TO-PEER NETWORKS

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Enhancement of Routing in Urban Scenario using Link State Routing Protocol and Firefly Optimization

ANANT COLONY SYSTEMFOR ROUTING IN PCB HOLES DRILLING PROCESS

A NEW ALGORITHM FOR JITTER CONTROL IN WIRELESS NETWORKS FOR QUALITY OF SERVICE

An Improved Gateway Based Multi Hop Routing Protocol for Wireless Sensor Network

IJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) REQUIREMENTS FOR ALTERNATE ROUTES IN MANET ABSTRACT

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

To Enhance the Lifetime of WSN Network using PSO

Relaxation Control of Packet Arrival Rate in the Neighborhood of the Destination in Concentric Sensor Networks

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

IMPACT OF PACKET SIZE ON THE PERFORMANCE OF IEEE FOR WIRELESS SENSOR NETWORK

Optimally-balanced Hash Tree Generation in Ad Hoc Networks

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

MTU Based Dynamic Routing Using Mobile Agents

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Routing in Delay Tolerant Networks (2)

AN EFFICIENT APPROACH FOR PROVIDING FULL CONNECTIVITY IN WIRELESS SENSOR NETWORK

Transcription:

International Journal of Mechanical Engineering and Technology (IJMET) Volume 9 Issue 11 November 2018 pp.2226 2231 Article ID: IJMET_09_11_235 Available online at http://www.ia aeme.com/ijmet/issues.asp?jtype=ijmet&vtype= =9&IType=11 ISSN Print: 0976-6340 and ISSN Online: 0976-6359 IAEME Publication Scopus Indexed ERASURE-CODING DEPENDENT STORAGE AWARE ROUTING Dr.K.Sabeetha Associate Professor PSNA College of Engineering and Technology Dindigul TamilNadu India Dr.A.Vincent Antony Kumar Professor PSNA College of Engineering and Technology Dindigul TamilNadu India P.Muneeshwari Assistant Professor PSNA College of Engineering and Technology Dindigul TamilNadu India J.K.Jeevitha Assistant Professor PSNA College of Engineering and Technology Dindigul TamilNadu India ABSTRACT Delay Tolerant Networks are a newest and promising class of wireless networks with sparse population of heterogeneous mobile nodes. These networks may not have full source to destination path at any particular instant due to intermittent connection between the nodes. There are many environments in which a Delay Tolerant Network can operate namely interplanetary networks underwater networks wildlife tracking sensor networks military networks and remote rural village networks. A new routing approach that employs erasure codes and buffer capacity evaluation before routing messages is proposed. This protocol evaluates the worthiness of a node before handing over the message blocks to other nodes. Keywords: Delay Tolerant Networks Routing Erasure Coding. Cite this Article: Dr.K.Sabeetha Dr.A.Vincent Antony Kumar P.Muneeshwari and J.K.Jeevitha Erasure-Coding Dependent Storage Aware Routing International Journal of Mechanical Engineering and Technology 9(11) 2018 pp. 2226 2231. http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=9&i IType=11 http://www.iaeme.com/ijmet/index.asp 2226 editor@iaeme.com

Dr.K.Sabeetha Dr.A.Vincent Antony Kumar P.Muneeshwari and J.K.Jeevitha 1. INTRODUCTION Owing to the absence of contemporaneous end to end path routing in a Delay tolerant Network (DTN) is a highly challenging task. Routing in delay tolerant networks is tough because nodes have very little information about the peer nodes. Also path from source to destination is non-existent at any particular time due to frequent disconnections. Erasure coding has widely been used in the literature (Wang et al 2014) to achieve lower time delay in DTN. Erasure coding is applied on the original message at the source node which splits the message into a set of code blocks. These coded message blocks are transmitted across different links. As soon as the required subset of coded blocks arrive at the destination the original message could be reconstructed. Thus erasure coding provides an alternate way to generate redundancy without full duplication of the message with fixed overhead since only a portion of the coded blocks are needed for rebuilding the message. 2. LITERATURE SURVEY Chen & Shen (2014) have proposed a lightweight routing using distributed social maps for DTN. Wang et al (2014) have designed a routing scheme which allows nodes to cooperatively distribute information that of interest to each other. Local historical paths travelled and user s information interests have been exploited to make effective transmission. Rao et al (2015) have addressed the problem of timely delivery of content in DTN using a solution framework called Ameba. The content properties are analysed to get the optimal routing hop count along with the evaluation of utility value of a node based on its location and capability before making a routing decision. Dudukovich et al (2017) have presented Bayesian and reinforcement learning for Contact Graph Routing algorithm. Omidvar & Mohammadi (2014) have suggested a particle swarm optimization strategy to choose the number of message copies for attaining better delivery performance. In the ACRP protocol suggested by Zhang et al (2010) control messages associated with forward ants and backward ants were transmitted through the use of the epidemic protocol. The CGrAnt protocol of Vendramin et al (2012) used the cultural algorithm and the ant colony optimization metaheuristic to explore new paths and route messages to their respective destination. 3. MP COMPUTATION Initially a node starts without knowing about other nodes in the network. When a node comes into contact with another node for the first time the node number along with the corresponding MP value are added in the node list table of both nodes. If the MP value between a pair of nodes is larger then it indicates that both nodes move around in the vicinity of one another. Therefore there is high probability for them to meet again in the near future. The MP value helps in the optimal use of network bandwidth and buffer storage at intermediate nodes by avoiding message transmission to nodes that are less likely to meet the destination. When two nodes meet for the first time they create a new MP value between them. For example after the first meeting between the nodes and the MP value of both nodes are updated according to Equation (1). = where = Initial Prospect (IP [0 1]) is a constant = Contact Duration between nodes and (1) http://www.iaeme.com/ijmet/index.asp 2227 editor@iaeme.com

Erasure-Coding Dependent Storage Aware Routing At the start of every next meeting between the same pair of nodes their MP value is lessened to compensate for the non-contact duration between them using Equation (2). For example if the nodes and encounter each other after their first meeting then = (2) where = Non-Contact Duration between nodes and If the non contact duration is less or more the MP value is decremented appropriately through the proposed Equation (2). At the end of their contact their MP value is swelled through the execution of Equation (3). For example at the end of meeting between the nodes and then = + (3) where = Number of meetings between nodes and If the contact duration is large or small then there would be a proportional increment in the MP value of the nodes using Equation (3). 3.1. STORAGE CAPABILITY EVALUATION The Storage Capability! of a node is also taken into account before transferring the message blocks. Only when a node has sufficient buffer area to hold a message the success of message delivery would increase. Therefore! of a node is evaluated by the formula given in Equation (4).!=1 #$% &$% where '! ('! - Occupied Buffer Space in node - Total Buffer Space in node (4) 3.2. MESSAGE BLOCK DISTRIBUTION When node meets another node the number of erasure coded message blocks transmitted between them differs depending on the MP and! values. Let node contain message blocks for the destination node ). Message blocks are sent from node to node only if * is lesser than *. All message blocks for node ) are routed from node to node if * is greater than ++ and! is greater than! ++ since node has very good opportunity to meet the destination and also ample storage space to comfortably carry the coded blocks. If * is greater than ++ and! is greater than! -. or * is greater than -. and! is greater than! ++ then only half of the message blocks in node are sent to node as there is lower chance to meet the destination and the buffer storage is also lesser. 4. EVALUATION The ESR protocol has been evaluated with the ONE simulator and SPSS has been used to statistically analyze the simulation results using paired t-test. A t-test is a statistical hypothesis test in which the test statistic follows a student's t distribution if the null hypothesis is supported. It can be used to determine if two sets of data are significantly different from each other and is most commonly applied when the test statistic would follow a normal distribution. A paired t-test compares two samples in cases where each value in one sample has a natural partner in the other. A paired t-test looks at the difference between paired values http://www.iaeme.com/ijmet/index.asp 2228 editor@iaeme.com

Dr.K.Sabeetha Dr.A.Vincent Antony Kumar P.Muneeshwari and J.K.Jeevitha in two samples takes into account the variation of values within each sample and produces a single number known as a t-value. The formula for t-value is given in Equation (5). Difference of two means t-value = (5) Standard error of difference between two means The results of the map based movement model in terms of the delivery ratio for the three protocols are presented in Figures 1 and 2 for varying buffer size and varying transmission range respectively. These Figures show that ESR achieves about 1.19 to 1.72 times increase in delivery ratio than other protocols. ESR has accomplished a higher delivery ratio through the use of an efficient erasure coding based routing mechanism so that message blocks are sent through nodes that would meet the destination and deliver messages speedily. Figure 1 Map based movement model - Varying buffer size Delivery ratio Figure 2 Map based movement model - Varying transmission range Delivery ratio Paired t-tests were conducted to compare the delivery ratio and delivery delay of ESR with TBR and EC. The paired t-test finds the difference in mean between the tested protocols at 95% Confidence Interval (CI) and establishes the result to be statistically significant when the probability (p) value is found to be less than 0.05. A statistically significant result proves the supremacy of the protocol. Table 1 presents the results of the paired t-test between the delivery ratio of ESR with TBR and delivery ratio of ESR with EC for varying buffer size and transmission range. There was a significant difference in the mean values for the pair ESR (Mean (M) = 0.70621 Standard Deviation (SD) = 0.027453) TBR (M = 0.66261 SD = 0.024965); t at df 8 = 12.918 p = 0.0001 and also for the pair ESR EC (M = 0.55490 SD = 0.074430); t at df 8 = 8.878 p = 0.0001. http://www.iaeme.com/ijmet/index.asp 2229 editor@iaeme.com

Erasure-Coding Dependent Storage Aware Routing For varying transmission range the mean scores of the paired t-test for delivery ratio between the pairs ESR (M = 0.70948 SD = 0.009764) with TBR (M = 0.65361 SD = 0.019477); t at df 8 = 14.613 p = 0.0001 and ESR with EC (M = 0.41169 SD = 0.036533); t at df 8 = 19.858 p = 0.0001 also showed significant difference. These results suggest that the delivery ratio obtained through ESR is statistically significant than TBR and EC for varying buffer size and varying transmission range at p < 0.05 level. Table 1 Results of paired t-test between delivery ratio of ESR and other protocols - Map based movement model Protocol Mean SD 95% CI Mean Sig. Std. Error t difference Lower Upper 8 (p) Bound Bound Varying buffer size (n = 9) ESR 0.70621 0.027453 - - - - - - TBR 0.66261 0.024965 0.043595 0.003375 0.035813 0.051377 12.918 0.0001 * EC 0.55490 0.074430 0.151305 0.017042 0.112006 0.190604 8.878 0.0001 * Varying transmission range (n = 9) ESR 0.70948 0.009764 - - - - - - TBR 0.65361 0.019477 0.055873 0.003824 0.047056 0.064690 14.613 0.0001 * EC 0.41169 0.036533 0.297793 0.014996 0.263212 0.332373 19.858 0.0001 * * - Statistically significant Thus the efficiency of ESR has been demonstrated by comparing it with other DTN protocols namely TBR and EC both graphically and statistically. 5. CONCLUSION In the ESR approach fragmented erasure coded blocks of the original message were transmitted through nodes with higher meeting prospect to the destination and enough buffer space. The application of erasure coding increased system resilience by improving load balancing among multiple paths taken by each fragment. This approach yielded a higher delivery ratio lesser delivery delay and overhead than the EC and TBR protocols. REFERENCES [1] Chen K & Shen H 2014 SMART: utilizing distributed social map for lightweight routing in delay-tolerant networks IEEE/ACM Transactions on Networking vol. 22 no. 5 pp.1545-1558. [2] Omidvar A & Mohammadi K 2014 Particle swarm optimization in intelligent routing of delay-tolerant network routing EURASIP Journal on Wireless Communications and Networkingvol. 2014no. 1 pp. 1-8. [3] Rao W Zhao K Zhang Y Hui P & Tarkoma S 2015 Towards maximizing timely content delivery in delay tolerant networks IEEE Transactions on Mobile Computing vol. 14 no. 4 pp. 755-769. [4] Vendramin ACBK Munaretto A Delgado MRDBDS & Viana AC 2012 CGrAnt: a swarm intelligence-based routing protocol for delay tolerant networks In Proceedings of the fourteenth ACM International Conference on Genetic and Evolutionary Computation pp. 33-40. http://www.iaeme.com/ijmet/index.asp 2230 editor@iaeme.com

Dr.K.Sabeetha Dr.A.Vincent Antony Kumar P.Muneeshwari and J.K.Jeevitha [5] Wang Y Chuah MC & Chen Y 2014 Incentive based data sharing in delay tolerant mobile networks IEEE Transactions on Wireless Communications vol. 13 no. 1 pp. 370-381. [6] Zhang P Wang H Xia C Lv L & Liu X 2010 ACRP: Ant-colony-based routing protocol for DTMNs In Proceedings of the IEEE International Conference on Educational and Information Technology vol. 2 pp. 272-276. [7] R. Dudukovich A. Hylton and C. Papachristou "A machine learning concept for DTN routing" 2017 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE) Montreal QC 2017 pp. 110-115. http://www.iaeme.com/ijmet/index.asp 2231 editor@iaeme.com