IMPROVING THE SCALABILITY BY CONTACT INFORMATION COMPRESSION IN ROUTING

Similar documents
Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Delay-Differentiated Gossiping in Delay Tolerant Networks

Estimation based Erasure-coding Routing in Delay Tolerant Networks

PROFICIENT CLUSTER-BASED ROUTING PROTOCOL USING EBSA AND LEACH APPROACHES

Message Forwarding in Cyclic MobiSpace: the Multi-copy Case

Cooperative File Sharing in Hybrid Delay Tolerant Networks

Cluster Based Approach for Overhead Reduction and Load Balancing in Delay Tolerant Mobile Applications

OS-multicast: On-demand Situation-aware Multicasting in Disruption Tolerant Networks

A Study on Efficient Route Optimization using Border Gateway Protocol in Mobile Adhoc Networks

An Optimal Probabilistic Forwarding Protocol in Delay Tolerant Networks

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong

Improvement of Buffer Scheme for Delay Tolerant Networks

Scalable Routing in Cyclic Mobile Networks

Experimental Evaluation of Delay Tolerant Networking (DTN) Protocols for Long-Delay Cislunar Communications

Routing Protocol Approaches in Delay Tolerant Networks

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

Modeling Redundancy-based Routing in Delay Tolerant Networks

Routing protocols in WSN

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

Multicast Multi-path Power Efficient Routing in Mobile ADHOC networks

Routing in Ad-Hoc Networks

MDR Based Cooperative Strategy Adaptation in Wireless Communication

Routing in a Cyclic MobiSpace

Routing in Large-Scale Buses Ad Hoc Networks

DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

ENSC 427: COMMUNICATION NETWORK PROJECT PRESENTATION Spring 2010 Instructor: Ljiljana Trajkovic. Message Ferrying

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Rumor Routing Algorithm

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

WSN Routing Protocols

Protocol for Tetherless Computing

Custodial Multicast in Delay Tolerant Networks

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

Probabilistic Routing With Multi-copies in Delay Tolerant Networks

Time Synchronization in Wireless Sensor Networks: CCTS

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

Opportunistic Networks: A Review

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

ISSN Vol.04,Issue.12, September-2016, Pages:

Variable Length and Dynamic Addressing for Mobile Ad Hoc Networks

A Delay-Tolerant Network Architecture for Challenged Internets

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur

ECE 333: Introduction to Communication Networks Fall 2001

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

Store-and-Forward Performance in a DTN

Constructing Time-Varying Contact Graphs for Heterogeneous Delay Tolerant Networks

DTN Routing Protocols for VANETs: Issues and Approaches

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

1. INTRODUCTION. Saravanan.A 1 and Dr.Sunitha Abburu 2

MPBCA: Mobility Prediction Based Clustering Algorithm for MANET

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

Estimation of Network Partition Problem in Mobile Ad hoc Network

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Performance Analysis and Enhancement of Routing Protocol in Manet

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

IMPROVING QoS IN DELAY TOLERANT MOBILE AD HOC NETWORK USING MULTIPLE MESSAGE FERRIES

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

An Opportunistic On Routing Protocols and Persisting Challenges in Delay-Tolerant Networking

Performance Evaluation of Various Routing Protocols in MANET

IJMIE Volume 2, Issue 6 ISSN:

Probability Delegation Forwarding in Delay Tolerant Networks

Application of Graph Theory in DTN Routing

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

NECTAR: A DTN Routing Protocol Based on Neighborhood Contact History

Buffer Aware Routing in Interplanetary Ad Hoc Network

The General Analysis of Proactive Protocols DSDV, FSR and WRP

Multicasting in Delay Tolerant Networks: Semantic Models and Routing Algorithms

CS 268: Computer Networking. Taking Advantage of Broadcast

BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks

A Novel Interference Aware Optimized Link State Routing Protocol for Power Heterogeneous MANETs

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS

ROUTING IN WIRELESS NETWORKS WITH INTERMITTENT CONNECTIVITY

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

A Qos Based Stable Routing Protocol for Multihop Cognitive Radio Adhoc Networks

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

Routing Protocols in MANETs

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Analysis and Comparison of Routing Protocol of Wireless Sensor Network

Study on Wireless Sensor Networks Challenges and Routing Protocols

Transcription:

IMPROVING THE SCALABILITY BY CONTACT INFORMATION COMPRESSION IN ROUTING V.Karthikeyan 1 and V.J.Vijayalakshmi 2 1 Department of ECE, SVS College of Engineering, Coimbatore, India 2 Department of EEE, Sri Krishna College of Engg & Tech., Coimbatore, India ABSTRACT The existence of reduced scalability and delivery leads to the development of scalable routing by contact information compression. The previous work dealt with the result of consistent analysis in the performance of DTN hierarchical routing ( DHR). It increases as the source to destination distance increases with decreases in the routing performance. This paper focuses on improving the scalability and delivery through contact information compression algorithm and also addresses the problem of power awareness routing to increase the lifetime of the overall network. Thus implementing the contact information compression (CIC) algorithm the estimated shortest path (ESP) is detected dynamically. The scalability and release are more improved during multipath multicasting, which delivers the information to a collection of target concurrently in a single transmission from the source. KEYWORDS Delay Tolerant Network (DTN), DTN Hierarchical Routing (DHR), Contact Information Compression (CIC), Scalability and Delivery 1. INTRODUCTION The DTN Research Group (DTNRG) has designed architecture to support different protocols in DTN which can be described using graphs. So, any border in the graph indicates the continuation of set of contacts. The communication among any two nodes for a stage of instance is defined as the contact. Unlike types of contacts survived among which unrelenting contacts for incessant communication and predicted contacts for irregular communication amid nodes. listed contacts can stay alive, for occurrence, between a base station on earth and an Orbiting spread satellite. Opportunistic contacts are shaped just by the occurrence of two entities at the similar position. In the Opportunistic contacts a node waits to get together the goal in regulate to move its package. Messages transferred in DTNs are simply called bundles. They are transferred in an tiny manner between nodes using a transfer procedure that ensures node-to-node consistency. These messages can be of any size. Nodes are unspecified to contain huge buffers in which they can store up the bundles. The main benefit of this method is that it involves only one transmission per bundle. Most of the work relating to routing in DTN will be performed with predicted contacts. This DTN faces harsh problems due to the unreliable time and uncertainty in network connections. Hierarchical techniques are projected to improve scalability. In order to fully develop scalable routing techniques, it is essential to classify user communication sessions in a hierarchical way, so that the existing traffic prototype also scales well. The study of hierarchical routing reveals DOI : 10.5121/ijit.2014.2404 45

that, by adjusting the numeral of levels in the routing hierarchy a enhanced scalability can be achieved [2]. The DTN hierarchical routing address competent information aggregation and compression in the time-space domain while maintaining serious information Hierarchical routing requires the address of the source and the destination for efficient scalable routing [1]. If any of the sources in the network lacks in the address information, the source can remedy to a overhaul location. 2. RELATED WORKS Routing in communication networks involves the indirection as of a unrelenting name (or ID) to a locator and delivering packets based in the lead the locator. On a large-scale, highly active network, the ID-to-locator mappings are both huge in number, and modify frequently. conventional routing protocols have need of elevated transparency to keep these indirections upto-date [1]. In Weak State Routing (WSR), a routing device for large-scale highly active networks. WSR s innovation is that it uses arbitrary directional walks incomplete irregularly by weak indirection state information in midway nodes. The indirection position information is weak, i.e. interpreted not as complete truth, but as probabilistic hints. Nodes only have part information about the district a destination node is likely to be. This technique allows us to cumulative information about a number of distant locations in a geographic section. In other words, the state information maps a set-of-ids to a geographical region [1]. In order to stay away from the propagation of the packets the threshold between 0.6 to 0.8 probabilities is permanent for each node and manage flooding can be avoided [4]. 3. FORMULATED CIC ROUTING In this proposed paper, we widen the study of scalable deterministic routing in DTNs by means of recurring mobility based on our preceding works. As an alternative of routing with global contact information, we proposed a routing algorithm that routes on contact information compacted by three collective methods. We address the challenge of well-organized information aggregation and firmness in the time-space area while maintaining significant information for capable routing. 4. DHR ALGORITHMS Our proposed DHR is fairly clear-cut subsequent to the hierarchical network has been built. DHR is as well a hop by- hop routing. Every node makes its forwarding conclusion in two phases. The first phase runs only when the maximum level on which the cluster of the current node and that of the destination are different [1]. Fig.1 46

5. MULTI PATH CREATION It creates the nodes (sensors) according to the network capability. Here it will show in a draw panel. While the conception of, all the nodes show their connected calls and primarily it resolve be zero. After the construction of the multi paths, link between the nodes will set up and links are based on two circumstances, by finding adjacent neighbors and by linking to the inaccessible paths. Each path must join to the nodes through by the devices, according to the node competence and power efficient. If the network capability is less, there will be unsuccessful paths. User can see the listing of total nodes made. 6. MULTI - PATH MULTICASTING The proposed system is multicast data put on the air in multiple paths over wireless networks. We presume that the set of connections is evenly loaded, i.e., mobility and deprived channel circumstance rather than jamming are main reasons for packet crash. Begin by viewing the viability of numerous path multicasts, and subsequently move on to describe the way to forward the packets through multiple paths. The projected system has three basic steps, discovery of the shortest route, maintenance of the Route and Data Transmission [6]. 6.1 Route Discovery The underneath planning consists of 30 nodes in which two being source and destination others will be used for data transmission. The collection of a path for data broadcast is done based on the accessibility of the nodes in the section using the ad-hoc on insist remoteness vector routing algorithm. By using the Ad hoc on Demand Distance Vector routing protocol, the routes are created on demand, i.e. only when a route is needed for which there is no fresh record in the routing table [6]. 6.2 Route Maintenance The next step is the preservation of these routes which is evenly significant. The source has to incessantly observe the location of the nodes to create sure the data are creature agreed during the path to the destination lacking loss. In any case, if the location of the nodes change and the source doesn t make a note of it then the packets will be mislaid and ultimately have to be dislike [5]. 6.3 Data Transmission The pathway selection, preservation and data transmission are successive processes which happens in split seconds in real-time broadcast. Hence the paths allocated priory is used for data transmission. The first path allocated before is currently used for data transmission. The data is transferred through the tinted path. The second path chosen is now used for data transmission. The data is transferred through the highlighted path. The third path selected is used for data transmission. The data is transferred through the highlighted path [5]. 7 MULTI-PATH POWER EFFICIENT ROUTING A MANET might consist of nodes which are not capable to be re-charged in an predictable time period, energy maintenance is crucial to maintaining the lifetime of such a node. In networks consisting of these nodes, where it is unfeasible to stock up the nodes power, techniques for 47

energy-efficient routing as well as competent data distribution between nodes is critical. An energy-efficient mechanism for input routing in sensor networks are called directed diffusion has been projected. Directed diffusion is an on-demand routing approach which has a data to drive occasionally and broadcasts it. When nodes receives a data, they send a support message to a preselected neighbor which indicates that it needs to receive more data from the selected neighbor. As these strengthening messages are propagated back to the source, an implied data path is set up; each midway node sets up state that forwards comparable data towards the previous hop [7]. Fig.2 Fig.3 48

8 CONCLUSION The projected work has show in simulations results, the period of connection state measurements is chosen as one second. As a result, source nodes can keep informed their rates at most excellent roughly every two seconds, while it requires two measurements for estimating the slope vector according to the customized power algorithm. For simplicity the rate of redundancy is due to source coding, The most favorable values put forward that the difficulty of having elegant routers that are capable to ahead packets onto every branch at a dissimilar rate. It offers only a insignificant profit in this situation, However, it is firm to depict any additional conclusions, as this result might depend on the exact topology and source-destination pair selections [4]. Also, our algorithm does better than traditional power algorithm as a effect of the accessibility of multiple trees to allocate the traffic load. However, while under network topology model the algorithm is capable to reduce the cost to a certain level, it cannot remove the packet losses and has a a great deal advanced overall cost compared to usual ones. The motive behind this result is the be short of of multicast functionality. Since we cannot generate multicast trees, the only savings due to multicasting occurs between the sources and overlay nodes. REFERENCES [1]Cong Liu and Jie Wu, Fellow, IEEE Scalable Routing in Cyclic Mobile Networks -2009 [2]U. Acer, S. Kalyanaraman, and A. Abouzeid, Weak State Routing for Large Scale Dynamic Networks, Proc. ACM MobiCom, 2007. [3]V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss, Delay-Tolerant Network Architecture, Internet Draft: draft-irrf-dtnrg-arch. Text, DTN Research Group, 2006. [4]J. Haas, J.Y. Halpern, and L. Li, Gossip-Based Ad Hoc Routing, Proc. IEEE INFOCOM, 2002. [5]J. Leguay, T. Friedman, and V. Conan, DTN Routing in a Mobility Pattern Space, Proc. ACM SIGCOMM Workshop Delay- Tolerant Networking, 2005 [6]J. Haas, J.Y. Halpern, and L. Li, Gossip-Based Ad Hoc Routing, Proc. IEEE INFOCOM, 2002.J. Eriksson, M. Faloutsos, and S. Krishnamurthy, Scalable Ad Hoc Routing: [The Case for Dynamic Addressing, Proc. IEEE INFOCOM, 2004. [7]S. Jain, K. Fall, and R. Patra, Routing in a Delay Tolerant Network, Proc. ACM SIGCOMM, 2004 [8]J. Leguay, T. Friedman, and V. Conan. DTN routing in a mobility pattern space. In Proc. Of ACM SIGCOMM Workshop on Delay-Tolerant Networking, 2005. [9]A. Lindgren, A. Doria, and O. Schelen. Probabilistic routing in intermittently connected networks. Lecture Notes in Computer Science, 3126:239 {254, Aug 2004. [10]S. Merugu, M. Ammar, and E. Zegura. Routing in space and time in network with predictable mobility. In Technical report: GIT-CC-04-07, College of Computing, Georgia Tech, 2004. Authors Prof. V. Karthikeyan has received his Bachelor s Degree in Electronics and Communication Engineering from PGP college of Engineering and Technology in 2003, Namakkal, India, He received a Masters Degree in Applied Electronics from KSR college of Technology, Erode in 2006 He is currently working as Assistant Professor in SVS College of Engineering and Technology, Coimbatore. She has about 8 years of Teaching Experience Prof. V. J.Vijayalakshmi has completed her Bachelor s Degree N Electrical & Electronics Engineering from Sri Ramakrishna Engineering College, Coimbatore, India. She finished her Masters Degree in Power Systems Engineering from Anna University of Technology, Coimbatore, She is currently working as Assistant Professor in Sri Krishna College of Engineering and Technology, Coimbatore She has about 5 years of Teaching Experience. 49