International Journal of Computer Engineering and Applications, Volume XII, Special Issue, August 18, ISSN

Similar documents
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

Comparing Delay Tolerant Network Routing Protocols for Optimizing L-Copies in Spray and Wait Routing for Minimum Delay

Performance of Efficient Routing Protocol in Delay Tolerant Network: A Comparative Survey. Namita Mehta 1 and Mehul Shah 2

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Design and Implementation of Improved Routing Algorithm for Energy Consumption in Delay Tolerant Network

Archna Rani [1], Dr. Manu Pratap Singh [2] Research Scholar [1], Dr. B.R. Ambedkar University, Agra [2] India

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS

Impact of Social Networks in Delay Tolerant Routing

Integrated Routing Protocol for Opportunistic Networks

COMPARATIVE ANALYSIS OF DIFFERENT ROUTING PROTOCOLS IN DELAY TOLERANT NETWORKS

Energy Consumption and Performance of Delay Tolerant Network Routing Protocols under Different Mobility Models

A Survey of Opportunistic Networks

IJSER. 1. Introduction. 1.1 Routing in DTN: Sukhpreet Kaur

Buffer Aware Routing in Interplanetary Ad Hoc Network

Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs

TRUST FRAMEWORK FOR DATA FORWARDING IN OPPORTUNISTIC NETWORKS USING MOBILE TRACES

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Performance Analysis of Delay Tolerant Network Routing Protocols in Different Mobility Environments

Improvement of Buffer Scheme for Delay Tolerant Networks

Simulation of Epidemic, Spray and Wait and First Contact Routing Protocols in Delay Tolerant Network

Application of Graph Theory in DTN Routing

Impact of Social Networks on Delay Tolerant Routing

Max-Pivot Routing for Opportunistic Networks

Buffer Aware Network Coded Routing Protocol for Delay Tolerant Networks

A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DATA OFFLOADING

Opportunistic Networks: A Review

Estimation based Erasure-coding Routing in Delay Tolerant Networks

Routing Protocol Approaches in Delay Tolerant Networks

Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

ROUTING AND CONGESTION CONTROL STRATEGIES IN OPPORTUNISTIC NETWORKS: A SURVEY

Timely Information Dissemination with Distributed Storage in Delay Tolerant Mobile Sensor Networks

ANNALS of Faculty Engineering Hunedoara International Journal of Engineering

Using local speed information as routing metric for delay tolerant networks

Routing in a Delay Tolerant Network Sushant Jain, Kevin Fall and Rabin Patra SIGCOMM Presented by Xun Gong

Design of Simulator for Finding the Delay Distribution in Delay Tolerant Networking

Buffer Management in Delay Tolerant Networks

Minimizing Average Spraying Cost for Routing in Delay Tolerant Networks

Keywords: Detection, Disruption Tolerant Networks, Mitigation, Routing Misbehavior, Security.

BUFFER MANAGEMENT FOR PREFERENTIAL DELIVERY IN OPPORTUNISTIC DELAY TOLERANT NETWORKS

Friendship Based Routing in Delay Tolerant Mobile Social Networks

Capacity-Aware Routing Using Throw-Boxes

Community-Based Adaptive Buffer Management Strategy in Opportunistic Network

MDR Based Cooperative Strategy Adaptation in Wireless Communication

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

BOND: Unifying Mobile Networks with Named Data. Michael Meisel

Comparative Study of Routing Protocols for Opportunistic Networks

Energy Efficient Social-Based Routing for Delay Tolerant Networks

Overhead Reduction In Delay Tolerant Networks

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

Routing Issues & Performance Of Different Opportunistic Routing Protocols In Delay Tolerant Network

A Partially Centralized Messaging Control Scheme Using Star Topology in Delay and Disruption Tolerant Networks

Space Optimized Multicast in Delay Tolerant Networks

1. INTRODUCTION. Saravanan.A 1 and Dr.Sunitha Abburu 2

Keywords: Store and carry networks, Forwarding strategies, routing, DTN, Minimum hop transmission

Routing in Delay Tolerant Networks (DTN)

NEW STRATEGY TO OPTIMIZE THE PERFORMANCE OF SPRAY AND WAIT ROUTING PROTOCOL

hash chains to provide efficient secure solutions for DSDV [7].

Exploiting Heterogeneity in Mobile Opportunistic Networks: An Analytic Approach

ABSTRACT I. INTRODUCTION II. CHARACTERISTICS OF DELAY TOLERANT NETWORKS

Nodes Misbehavior in Vehicular Delay-Tolerant Networks

A DTN Packet Forwarding Scheme Inspired by Thermodynamics

Simulation and Analysis of Opportunistic Routing Protocols

Research Article ISSN:

SMART: A Selective Controlled-Flooding Routing for Delay Tolerant Networks

A Genetic-Neural Approach for Mobility Assisted Routing in a Mobile Encounter Network

Routing in Large-Scale Buses Ad Hoc Networks

ARE VDTN ROUTING PROTOCOLS SUITABLE FOR DATA COLLECTION IN SMART CITIES: A PERFORMANCE ASSESSMENT

Spray and forward: Efficient routing based on the Markov location prediction model for DTNs

Analysis of Energy and Mobility Model on Opportunistic Routing Algorithms

Modeling Redundancy-based Routing in Delay Tolerant Networks

Exploiting Active Sub-areas for Multi-copy Routing in VDTNs

Efficient Routing In Delay Tolerant Network Based On Secure Fuzzy Spray Decision Algorithm

Studies with ns-2 and ns-3 based DTN Simulators

Hierarchical Trust Management for Delay Tolerant Networks Using Stochastic Petrinet for Secure Routing

Rumor Routing Algorithm

Probabilistic Routing With Multi-copies in Delay Tolerant Networks

HCS: hierarchical cluster-based forwarding scheme for mobile social networks

High Throughput in MANET Using relay algorithm and rebroadcast probability

A Review on Routing In Partially Connected Ad-Hoc Network

Self Adaptive Utility-Based Routing Protocol (SAURP)

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

DTN Routing in Vehicular Sensor Networks

OLFServ: an Opportunistic and Location-Aware Forwarding Protocol for Service Delivery in Disconnected MANETs

Opportunistic Routing Algorithms in Delay Tolerant Networks

A Qualitative Survey on Multicast Routing in Delay Tolerant Networks

Available online at ScienceDirect. Procedia Computer Science 85 (2016 )

CFP: Integration of Fountain Codes and Optimal Probabilistic Forwarding in DTNs

CONTENT SHARING OVER SMARTPHONE AND PC USING ANDROID

MaxHopCount: DTN congestion control algorithm under MaxProp routing

Combined Mobile Ad-hoc and Delay/Disruption-tolerant Routing

Impact of Selective Dropping Attacks on Network Coding Performance in DTNs and a Potential Mitigation Scheme

Social-Aware Routing in Delay Tolerant Networks

Need of Removing Delivered Message Replica from Delay Tolerant Network - A Problem Definition

NECTAR: A DTN Routing Protocol Based on Neighborhood Contact History

A CHECKPOINT BASED MESSAGE FORWARDING APPROACH FOR OPPORTUNISTIC COMMUNICATION

Delay Tolerant Networks

Performance Evaluation of Node Density- Based Adaptive Routing Scheme for Disruption Tolerant Networks 1

Selective Message Forwarding in Delay Tolerant Networks

EA-Epidemic: An Energy Aware Epidemic-Based Routing Protocol for Delay Tolerant Networks

Transcription:

International Journal of Computer Engineering and Applications, ANALYZING IMPACT OF FACTORS ON ROUTING DECISIONS IN OPPORTUNISTIC MOBILE NETWORKS Sonam Kumari 1, Dr. Itu Snigdh 2 Department of Computer Science and Technology, Birla Institute of Technology, Mesra, Ranchi, India. 1. aa.sonamkumari@gmail.com 2. itusnigdh@bitmesra.ac.in Abstract With the proliferation of sensor networks and mobile ad hoc networks, we have a plethora of intelligence equipped smart devices that are heterogeneous in nature and need to communicate frequently over the network. Also, for such devices, the basic requirement is supporting mobility and ubiquitous computing. Opportunistic (self-organizing) networking (OMNs) may be considered as a remarkable concept and the first step towards realizing these requirements. Current literature suggests a set of forwarding protocols evaluated on the basis of mobility, contacts and traffic patterns and reliability concerns. These constraints increase the burden of successful communication and affect the energy reserve of the participating nodes. Thus, the efficiency of the forwarding mechanism or the routing scheme and ad hoc connections is related to how intelligently the node decides the forwarding candidate. This article analyzes the impact of social behavior, node remaining energy, and node speed and delivery probability on opportunistic networks. It also designs a framework that can be adapted to predict the connectivity and message delivery reliability and thus work towards improving it. The framework essentially considers a type II fuzzy rule-based intelligent system that chooses the best candidate for data delivery dependent on a belief value. Index Terms Contact duration, Inter-contact time, Opportunistic Mobile Network (OMN), Relay node. I. INTRODUCTION The opportunistic network [1] is the evolution of mobile ad hoc networks (MANET) where nodes are wirelessly connected. However, contrary to MANETs the connections between the nodes are not stable and break as quickly as discovered. The communication in opportunistic network takes place on the establishment of opportunistic contacts among mobile nodes as an end to end path does not exist. Sonam Kumari, Dr. Itu Snigdh 1

ANALYZING IMPACT OF FACTORS ON ROUTING DECISIONS IN OPPORTUNISTIC MOBILE NETWORKS Since no fixed connection between two nodes exists, the routes build here are highly dynamic and so we cannot use traditional routing strategies in opportunistic network efficiently. Moreover, opportunistic network works in an environment where lengthy delays and error rate are tolerant. There are several types of research going on the opportunistic network as in near future the number of mobile devices equipped with Wi-Fi, Bluetooth, sensors, camera etc is going to increase rapidly. The advantage of this situation is that we have a number of available mobile devices in an environment and hence the contact opportunities would likely increase which is very useful in establishing an opportunistic network. An OMN consists of a source node which generates the message forwards the message to its intermediate nodes such that the intermediate node brings the message closer to the destination node. The forwarding paradigm used in OMN is based on store-carry-forwarding. As the link performance is highly variable the node stores the message on its buffer until it comes in contact with the next hop and forwards the message if it discovers the intermediate node. and knowledge-based. Some of the commonly used approaches are enumerated as direct transmission [8], Location-based approach [7], Knowledge-based [7], context-aware routing (CAR) strategy [4], MaxProp [10] and Shortest expected path routing (SEPR) [12]. B. Flooding-Based Approach A flooding-based routing protocol is a multiple copy based strategy. Significant works include Epidemic routing [6] which uses the epidemic algorithm [11] and the Spray and Wait scheme [9] containing two phases i) spray phase and ii) wait phase. In spray phase, N number of copies is generated by the node and is spread randomly to its neighbors present at one hop count distance. In wait phase, if the destination was not found in spread phase the nodes will perform direct transmission. Another wellknown algorithm is PROPHET [13] based on a prediction routing protocol using history of encounters and transitivity. Table I illustrates the comparisons between different routing protocols of OMN. The comparative analysis has been based on parameters like buffer management, estimation of forwarding probability, reliability, and energy efficiency. II. EXISTING ROUTING PROTOCOLS A number of routing protocols have been proposed till now to deal with the highly dynamic environment of the opportunistic mobile network. The two main categories in which we can divide routing protocols are a) forwarding based approach and b) flooding based approach. Forwarding based approach is a single copy approach in which only one copy of the message is created and forwarded to the destination node using intermediate nodes. But in flooding based approach multiple copies of the message is created and broadcasted to its neighbors. The major drawback of forwarding based approach is the latency delay and the low delivery ratio but the buffer required is decreased as well as the traffic is reduced and hence the required is less as compared with flooding based approach. And the major drawback of flooding based approach is that the network traffic increases and hence the requirement increase, as well as the buffer space required, is more than forwarding based approach but the delivery latency decreases. A. Forwarding Based Approach The forwarding based approach can be classified into three main categories: direct transmission, location-based III. FACTORS AFFECTING BELIEF In an opportunistic mobile network, the key problem is to choose the appropriate relay nodes to transfer the message in multi-hop scenario, such that the delivery latency is decreased, and reliability is increased. The impact of social behavior, node remaining energy, node speed and delivery probability on opportunistic networks is analyzed in this section. Based on the estimation of these parameters, belief is been computed for each node TABLE I COMPARISON BETWEEN ROUTING PROTOCOLS Protocols Direct transmission Buffer Managem ent Estimation of Forwarding Probability Reliability Infinite No reliable, may incur long delays MoVe Infinite Yes, using the motion vector CAR Infinite Yes, using kalman filter MaxProb Yes, no of hop counts Yes, estimating the delivery likelihood Energy efficiency than epidemic than epidemic than epidemic if buffer size is small than CAR(higher delivery rate) than an epidemic Bandwidth than CAR Sonam Kumari, Dr. Itu Snigdh 2

SEPR International Journal of Computer Engineering and Applications, Removes packet with smaller EPL Yes PROPHET Infinite Yes, using delivery probability vector than epidemic(almost 35 percent) than an epidemic and we choose the best candidate node for data delivery dependent on a belief value. Figure.1briefly explains the prediction mechanism. In the figure, S represents the source node and D, the destination node. All nodes including the source and destination are constantly moving with variable speeds and belong to a particular reference region momentarily as shown by the irregular boundaries. Every node stores the frequently encountered nodes statistics namely, the frequency of encounter, the number of messages delivered to it, the duration time when they were in contact and then computes a belief value according to these parameters. This status table is frequently updated with every message delivery. A. SOCIAL REFERENCE than epidemic One of the characteristics of an OMN is that it is tightly (almost 50 percent) than an epidemic Fig. 1. Schematic diagram of OMNs forwarding technique based on Belief and NRE value. The figure depicts that initially, node 2 and node 3 is in the transmission range of node S. Source node stores an updated table of belief and node remaining energy (NRE) parameter values of 2 and 3 based on past experiences. As we see that the belief and NRE value of node 2 is more than node 3, the source node forwards the packet to node 2. Similarly, node 2 will transmit the packet to node 4 since the belief and NRE value of node 4 is greater than node 1. Now, since node 4 comes in the transmission range of destination node D, it will directly transmit the packet to D. The article proposes computation of a factor belief before forwarding data packets to the relay nodes. The belief is further computed on the basic environmental conditions and is stored and updated by each node. coupled with human social behavior. Social behavior in this article is computed based on the value of betweenness centrality [5]. Betweenness centrality of a node is the ratio between the numbers of shortest path that passes through that node to the total number of the shortest path. Betweenness(ѵ) = s ѵ t σ st σst (ѵ) (1) Where, σst is the total number of shortest paths from node s to node t and σs(ѵ) is the number of those paths that pass through ѵ. B. DELIVERY PROBABILITY The two factors, contact duration (CT) [2] and intercontact time (ICT) [2], are important parameters in determining the capacity of an opportunistic network. We infer that the delivery ratio (DR) is directly proportional to contact duration and indirectly proportional to inter-contact time. Contact duration is the time duration during which the devices are in contact with each other. Intercontact time is the time interval after which the two devices will come in contact with each other. Contact Duration DR α (2) Inter Contact Time C. NODE REMAINING ENERGY Node remaining energy (NRE) parameter depends on the number of packets it transmits and receives and the inter-probe time [3]. As a node decreases in power, the likeliness of the node suffering downtime increases. Inter probe is the time interval after which the device will do neighbor discovery again. Here, B is the movement speed at which the device is traveling in meter per second. R is the transmission radius of the device in the meter. The variable α lies within the range 0 < α 1. The parameter α specifies how close devices should be to each other in relation to a maximum uniform transmission radius before being classified as neighbors. 1 NRE α (3) No of packets received and transmitted ESend(k, d) = Eelec k + εamp k dij 2 (4) ERecv(k) = Eelec k (5) Where Eelec is the coefficient of radio frequency, εamp is the amplification coefficient of sending the device and dij is the data transmission radius of the node. 1 Sonam Kumari, Dr. Itu Snigdh 3

ANALYZING IMPACT OF FACTORS ON ROUTING DECISIONS IN OPPORTUNISTIC MOBILE NETWORKS Inter probe time (τ) = (6) αfs 2B fs = (7) R D. NODE SPEED Since the mobile devices are carried by the user, the node speed parameter is a stable value and depends on the mode of transportation of the user. In this article the speed of a walking person is assumed to vary from 0.5 to 1.5 meter per second, the speed of person traveling by a vehicle is assumed to vary from 8.3 to 30 meters per second and of a cyclist is assumed to vary from 4.2 to 11 meters per second. IV. PROPOSED SYSTEM MODEL Fig. 2. Proposed system model based on BBN V. IMPACT OF PARAMETERS ON BELIEF USING FIS Since the parameters considered in this article does not have a certain value, fuzzy inference system is used to deal with this uncertainty. Using a type II fuzzy rule-based intelligent system belief value is computed in this section. The impact of delivery ratio, node remaining energy and social reference on belief is shown in the Fig. 4, Fig. 5 and Fig. 6. Cases Fig. 5. The impact of social reference on the belief TABLE II THE IMPACT OF DELIVERY RATIO ON BELIEF Social Reference Node remaining energy Description Case-1 Low Low Belief is low Case-2 Low Medium Belief is medium when Case-3 Low High Belief is medium when Case-4 Medium Low Belief is medium when Case-5 Medium Medium Belief is medium Case -6 Medium High Belief is medium Sonam Kumari, Dr. Itu Snigdh 4

International Journal of Computer Engineering and Applications, Case -7 High Low Belief is medium Case 8 High Medium Belief is medium initially and high probability increases Case 9 High High Belief is high TABLE III THE IMPACT OF NODE REMAINING ENERGY ON BELIEF Cases Social Delivery Description reference Probability Case-1 Low Low Belief is low Case-2 Low Medium Belief is low Case-3 Low High Belief is medium when Case-4 Medium Low Belief is medium when Case-5 Medium Medium Belief is medium when Case -6 Medium High Belief is medium Case -7 High Low Belief is high when Case-8 High Medium Belief is high when Case-9 High High Belief is high when THE Cases Node Remaining Energy TABLE IV SOCIAL REFE ON Delivery Ratio BELIEF Description Case-1 Low Low Belief is low Case-2 Low Medium Belief is low Case-3 Low High Belief is medium Case-4 Medium Low Belief is medium Case-5 Medium Medium Belief is medium Case -6 Medium High Belief is high Case -7 High Low Belief is high Case-8 High Medium Belief is high Case-9 High High Belief is high VI. CONCLUSION In the article, the impact of social reference, node remaining energy and delivery probability on belief has been analyzed based on which intermediate node is selected for data transmission. Table II gives the description of different cases of social reference and node remaining energy and its impact on belief is illustrated when the delivery ratio is varied. Similarly, Table III describes different cases of social reference and delivery ratio and its impact on belief when node remaining energy is varied and Table IV describes all the cases of delivery ratio and node remaining energy and its impact on belief when social reference is varied. From the graph, we can say that the influence of social reference on belief value is less than the other parameters. Thus the node whose node remaining energy and delivery ratio is more becomes the eligible candidate for data delivery. REFERENCES [1] Conti, Marco, Silvia Giordano, Martin May, and Andrea Passarella. (2010, Sep). From opportunistic networks to opportunistic computing. IEEE Communications Magazine. [Online]. 48(9),pp.126-139.Available: http://ieeexplore.ieee.org/document/5560597/?part=1 [2] Pelusi, Luciana, Andrea Passarella, and Marco Conti. (2006, Nov). Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE Communications Magazine. [Online]. 44(11), pp. 134-141. Available: http://ieeexplore.ieee.org/document/4014485/ [3] M. Orlinski, N. Filer. (2014,Aug). Neighbour discovery in opportunistic networks. Ad hoc Networks. [Online]. 25, pp. 383-392. Available: www.elsevier.com/locate/adhoc [4] Musolesi, Mirco, and Cecilia Mascolo.(2009 Feb). CAR: Context-aware adaptive routing for delay-tolerant mobile networks. IEEE Trans Mobile Computing [Online]. 8(2), pp. 246-260. Available: http://ieeexplore.ieee.org/abstract/document/4585387/ [5] Liu, Tong, Yanmin Zhu, Ruobing Jiang, and Bo Li.,"A sociality-aware approach to computing backbone in mobile opportunistic networks." in GLOBECOM, 2015, pp. 46-56. [6] A. Vahdat and D. Becker, Epidemic routing for partially Connected ad hoc networks, In Duke University, Technical Report CS-200006,2000. [7] J. LeBrun, C.-N. Chuah, D. Ghosal, and M. Zhang, Knowledgebased opportunistic forwarding in vehicular wireless ad hoc networks, in VTC, 2005, pp. 2289 2293. [8] T. Spyropoulos, K. Psounis, and C. S. Raghavendra, Singlecopy routing in intermittently connected mobile networks, In IEEE SECON,2004, pp. 235 244. [9] T. Spyropoulos, K. Psounis, and C. S. Raghavendra, Spray and wait: An efficient routing scheme for intermittently connected mobile networks, In Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking WDTN 05, pp. 252 259, 2005. Sonam Kumari, Dr. Itu Snigdh 5

ANALYZING IMPACT OF FACTORS ON ROUTING DECISIONS IN OPPORTUNISTIC MOBILE NETWORKS [10] Burgess, John, Brian Gallagher, David Jensen, and Brian Neil Levine. "Maxprop: Routing for vehicle-based disruption- tolerant networks.",in INFOCOM,2006, pp. 1-11. [11] Demers, Alan J., Daniel H. Greene, Carl H. Hauser, Irish, John Larson, Scott Shenker, Howard E. Sturgis, Daniel Wes Swinehart and C. Douglas B. Terry. Epidemic Algorithms for Replicated Database Maintenance. in PODC, 1987, pp. 8-32. [12] Tan, Kun, Qian Zhang, and Wenwu Zhu. "Shortest path routing in partially connected ad hoc networks." in GLOBECOM'03,, 2003, pp. 1038-1042. [13] Lindgren, Anders, Avri Doria, and Olov Schelen. "Probabilistic routing in intermittently connected networks." in Service Assurance with Partial and Intermittent Resources, 2004, pp. 239-254. Sonam Kumari, Dr. Itu Snigdh 6

International Journal of Computer Engineering and Applications, Sonam Kumari, Dr. Itu Snigdh 7