SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Journal of Modern Engineering Research (IJMER)
               www.ijmer.com            Vol.2, Issue.4, July-Aug. 2012 pp-1732-1735      ISSN: 2249-6645

                Effective routing protocols for delay tolerant network

                                             Sukhbirl, Dr. Rishipal Singh2
                                         1
                                         M.Tech Student, 2Assistant Prof. CSE Deptt.
                                  Guru jambheshwar university science & technology, hisar


Abstract: Delay-tolerant Networking (DTN) enables
communication in sparse mobile ad-hoc networks and
other challenged environments where traditional
networking fails and new routing and application
protocols are required. Past experience with DTN routing
and application protocols has shown that their
performance is highly dependent on the underlying
mobility and node characteristics. Evaluating DTN
protocols across many scenarios requires suitable
simulation tools. This paper presents the existing routing
protocols techniques and Comparative study of existing              Figure 1: Time Evolving Behavior of the Network
routing protocols of Delay-Tolerant Networks based upon                               efficiently.
the metrics like Overhead Ratio, Hop Count and Buffer
Size.                                                                     DTN follow store carry and forward approach.
                                                                Node should carry the message until proper custodian is
                I. INTRODUCTION                                 not found. Because of resource limitation each node in
          Delay tolerant networks are an emerging field of      DTN has some fix size of buffer. Node store the message
networks that show some different characteristics from          in its own buffer until the next custodian is found in the
today’s internet such as intermittent connectivity, long        path towards the destination. As the buffer size is limited
delays etc. Delay tolerant networks arise in a variety of       node should follow some policy to decide which message
situation like disaster relief, military rescue operations,     is dropped when the buffer size is full. Develop an
rural internet access etc. There are some critical situations   algorithm and a weight function to make this decision that
where the ability to communicate make a significant             effectively choose message to be dropped. As a result
difference for human lives. In DTN decision to drop a           proposed algorithm has been compare with already
message is taken on several constraints like size of            existing DROP FRONT policy. The approach better
message, no of copies, time to live and buffer size etc.        results in terms of delivery probability, buffer time avg
In DTN, end to end path is very rare and unstable in nature     and Hop count avg..
and opportunity to establish complete route is negligible.
DTN support those applications, whose time requirement                         II. RELATED WORK
is hours or even day or longer. It is necessary to deliver           The major objective of routing in DTNs is to deliver
high priority message during “contact” phase [1]. DTN           packets from the source to the destination by means of the
enable communication by taking advantage of Temporary           mobility of nodes. Since the end-to-end path may not be
connections to relay data in a fashion similar to Postal        available, routing schemes have to optimize data
network instead of requiring an end to end network path to      dissemination by utilizing the connectivity information
be available.                                                   and network conditions maintained by each node. For
However communication in DTN is a very challenging              example, in [3], the routing scheme based on the estimates
task. Traditional network simply assume a complete              of the average inter contact time between the mobile nodes
connected graph should be there and a period of time that       in the network was proposed. This routing scheme was
is long enough to allow communication. In DTN there             designed to minimize the packet delivery time. The
might not even be end to end path between a pair of nodes       routing properties in terms of loop-free forwarding and
at any moment of time as shown in the figure 1 [2]. Due to      polynomial convergence were studied, which ensure the
this unique feature of DTN, existing routing algorithm that     performance of the packet delivery in DTNs. In [4], the
are developed for Internet and MANETS do not                    packet-delivery scheme based on the super node
performing well. Reason for this is that all these algorithm    architecture and epidemic routing was introduced. With
assume that the network is connected and end to end path        epidemic routing, the packets are forwarded to other
exist between each pair of nodes. DTN are often resource        contacted nodes (i.e., nodes with a direct connection).
limited and not able to deliver required performance in         Unlike traditional epidemic routing, the packets are
case of intermittent connectivity. Due to given resource        forwarded to the super nodes to improve the performance
limitation and uncertainty in DTN it is very difficult to       and reduce overhead. The super nodes are then responsible
deliver data.                                                   in carrying the packets to the destination.




                                                    www.ijmer.com                                              1732 | Page
International Journal of Modern Engineering Research (IJMER)
              www.ijmer.com            Vol.2, Issue.4, July-Aug. 2012 pp-1732-1735      ISSN: 2249-6645
              III. ROUTING PROTOCOLS                                      The Epidemic and The Spray and Wait routing
(a) First contact: – This is simplest strategy to transmit      protocols forward messages without taking node mobile
the data from source to destination in DTN. This transmit       patterns into consideration, therefore the delivery utility is
message immediately as soon as the source and destination       too low.
come in contact with each other directly. This is possible       Now present the notion of QoN. QoN indicates the
when the source and destination are one hop apart or            activity of a node, or the number one node meets other
immediately neighbor of each other.                             different nodes within a given interval. In the same period
(b) Direct delivery:- Scheme lets the source hold the data      of time, the more nodes that one node meets, the greater
until it comes in contact with the destination. This simple     the QoN. The variation of QoN can dynamically
strategy uses one message transmission. It is a degenerate      represents the node activity in a given period of time.
case of flooding family, requiring no info about network
but requires a direct path between source and destination.                    V. Drop policy algorithm
Hence if no contact occurs, message is not delivered.           Let us assume
(c) ProPHET:-Improve the routing performance by                 n= number of nodes in the network
adopting the probabilistic scheme that reflects the contact     t= number of digits in n
observation of nodes. However, the single copy                  Bavail=buffer available at particular node
forwarding based on the probability may affect to the           Mnew=new message
performance with limitation of the initial probability          Snew=size of new incoming message
distribution and a message drop. The limited buffer space       Ni(t)=no copies of message i at time t
and use of an ACK message should be investigated to             Ttl= time to live /*time duration in which message is live
enhance the performance further.                                means message is useful only this time duration */
Finally, although Spray and Wait can overcome the               Rtli=remaing time to live of message for message i
shortcomings of Epidemic routing protocol, the usability
of the wait phase with an efficient single copy forwarding      5.1 Proposed Algorithm
scheme and the optimal decision of an initial spray number      When two nodes communicate with each other they share
are open issues.                                                message to each other. It might be possible when they
(d) Spray and Wait:- The operation of Spray and Wait            communicate the buffer available is not enough to
consists of two phases:                                         accommodate a new message. At that time scheduling take
the spray phase and the wait phase. In the spray phase,         place. Each node have two options at that moment of time:
when a node generates a message, the node makes N               first it will discard a new message and second one is that it
copies of the message to spread it to relay nodes. When the     will drop some message from its buffer and make some
node meets the other node, the node checks N (i.e., N > 1).     room for the new message.
If the node has the spray message, the node hands over the      Until now all DTN routing protocol follow the DROP
message and revised N (i.e., N/2) to the other node. After      FRONT message approach in which they drop message
the spray phase is finished, each of N nodes carrying a         from the front of nodes buffer queue.
message copy performs the direct message transmission
until it successfully delivered the message to the             5.2 Weight function
destination.                                                    This function value makes the decision to drop a message
(e) Epidemic Routing: - Epidemic routing is an early           from the node buffer. This weight function consider
sparse network routing protocol proposed for DTN. It           various properties of the message and node. As a result it
assumes that each node has unlimited storage space and         gives a value on basis of that a node drop a particular
bandwidth. Therefore every node can store all the              message whose value is minimum.
messages transmitted during "contact" phase. This use the      Let N= no of nodes in the network
concept of database replication also a relay node can          MaxTTL= maximum value of time to live of any node in
exchange the entire message during "contact" phase. Each       the network
node maintains list of messages in the database called         While(Snew>Bavail)
summary vector.                                                {
                                                               Mid=call message equal (Snew); /* Search those message
    IV. Dynamic Spray and Wait with Quality of                 in the buffer of node whose size is equal to or greater then
                           Node (QoN)                          the size of incoming new message. This function will
                                                               return the message id of those messages who will be drop
4.1. Delivery utility                                          according to SRT algo */
When delivery rate stay the same, consider the relationship    Bavail=Bavail+ MessageCollection.get(MID).Size();
between network overhead and delivery utility. Delivery        Delete MessageCollection.get(MID);
utility is defined as the ratio of the number of messages      }
received by destination nodes to the number of messages        /* Body of the function call messageEqual(Snew) */
forwarded by relay nodes, as shown in Equation                 Int callmessageEqual(Snew)
(1).                                                           {
                  Messages of received                         For (each message M in node buffer)
delivery_utility=--------------------------------              {
                 Messages of forwarded                         If (Mni>=Snew)
4.2. The definition of Quality of Node (QoN)                   Add MessageCollection m; /* message id */}
                                                               }
                                                   www.ijmer.com                                               1733 | Page
International Journal of Modern Engineering Research (IJMER)
               www.ijmer.com             Vol.2, Issue.4, July-Aug. 2012 pp-1732-1735      ISSN: 2249-6645
/* Then apply a weight function on MessageCollection m.
*/
float F,F1,α;
/* initially F1 contain the function value (F) of m0
message */
int MessageId;
While (MessageCollection m)
{
F=a*(size of message)+ b/N *(no of copies) + c/MaxTTL
a=b+α+1;
α = 1/n
b=10n;                                                               Figure 2: Drop Front, SRT Drop Delivery Probability
c =RTLi /* remaining time to live */                                                  W.R.T to Routers
If (F<F1)
{                                                                7.2 Comparison Based on Buffer Time Average
F1=F;                                                            Figure 3 indicates that the buffer time average for SRT
Messageid=MessageCollection.get(F);                              DROP and DROP FRONT policy for various routers. The
}                                                                value of buffer time average is large in SRT drop as
Return MessageId;                                                compared to DROP FRONT. High value of buffer time
                                                                 average increase the probability of message delivery in the
}                                                                DTN paradigm. High value of buffer time average also
                   VI. SIMULATION                                decreases the drop ratio. Figure 3 shows that SRT DROP
         One is an agent based discrete event simulator          increases the buffer time average as compared to DROP
engine. The main functions of one simulator are the              FRONT.
modeling of node movement, inter node contact, routing
and message handling. Analysis of the result are done
through visualization or reports. Movement models are
used to implement the node movement.
Connectivity between the nodes depends on their location
and communication range. Routing modules are used to
implement the routing function that decide which message
to forward. Finally the message are generated through
event generator. The graphical user interface(GUI)
displays a visualization of the simulation.

                    VII.     RESULTS                             Figure 3: Drop Front, SRT Drop Buffer Time Avg. W.R.T
The results given below indicate the comparative study                                  to Routers
between DROP FRONT and SRT. The results show the
comparison between DROP FRONT and SRT drop policy.               7.3 Comparison Based on Overhead Ratio
These results prove that it is beneficial to use SRT drop        The overhead ratio with respect to various routers has been
policy as it improves the performance of any DTN.                plotted in figure 4 for SRT DROP and DROP FRONT.
                                                                 The results show that the SRT DROP is less in terms of
7.1 Comparison Based on Delivery Probability                     overhead ratio in all routers. Overhead ratio in DIRECT
The comparative study of DROP FRONT and SRT DROP                 DELIVERY router is zero due to direct transmission while
policy with respect to delivery probability has been plotted     the overhead ratio is decreases in epidemic, prophet, fc,
in the figure 2. The DROP FRONT policy drops the front           spray and waits up to a significant level. SRT DROP less
messages from the buffer; however the SRT drops the              no of messages as compare to DROP FRONT because it
bigger size message. But in case of FIRST CONTACT and            drop the message of nearly greater or equal size of
DIRECT DELIVERY router the probability of encounter              messages.
is less as a result the delivery probability is not increasing
significant as compared to previous results.




                                                                 Figure 4: Drop Front, SRT Drop Overhead Ratio W.R.T to
                                                                                         Routers

                                                     www.ijmer.com                                              1734 | Page
International Journal of Modern Engineering Research (IJMER)
                www.ijmer.com             Vol.2, Issue.4, July-Aug. 2012 pp-1732-1735      ISSN: 2249-6645
                                                                        Delay-Tolerant Wireless Sensor Networks” IEEE 978-1-
7.4 Comparison Based on Packet Dropped                                  4244-3750-4-2009
The results in the figure 5 show that the SRT DROP drops         [2]    Z. Zhang, Routing in Intermittently Connected Mobile Ad
less no. of messages as compared to DROP FRONT                          Hoc Networks and Delay Tolerant Networks: Overview
                                                                        and Challenges, in IEEE Commun. Surveys , vol. 8, no.1,
because it drops the message of nearly greater or equal
                                                                        1st Quarter 2006.
size of messages. Therefore, the network overhead also           [3]    V. Conan, J. Leguay, and T. Friedman, “Fixed point
decreases.                                                              opportunistic routing in delay tolerant networks,” IEEE J.
                                                                        Sel. Areas Commun., vol. 26, no. 5, pp. 773–782, Jun.
                                                                        2008.
                                                                 [4]    H. Samuel, W. Zhuang, and B. Preiss, “Routing over
                                                                        interconnected heterogeneous wireless networks with
                                                                        intermittent connections,” in Proc. IEEE ICC, May 2008,
                                                                        pp. 2282–2286.
                                                                 [5]    E.P.C. Jones and P.A.S. Ward, “Routing Strategies for
                                                                        Delay-Tolerant Networks”, Computer Communications,
                                                                        2008
                                                                 [6]    U. Lee, S.Y. Oh, K.W. Lee, M.Gerla, “RelayCast: scalable
                                                                        Multicast Routing in Delay Tolerant Networks”, IEEE,
                                                                        2008
                                                                 [7]    J. Burgess, B. Gallagher, D. Jensen and B.N. Levine,
  Figure 5: Drop Front,SRT Drop Packet Drop W.R.T to                    “MaxProp: Routing for Vehicle-Based Disruption-tolerant
                            Routers                                     Networks”, Proc. Of IEEE INFOCOM, April 2006
7.5 Comparison Based on Hop Count Avg.                           [8]    A. Lindgren, A. Doria, O. Schelen, “Probabilistic Routing
Figure 6 shows the hop count for various routers for SRT                in    Intermittently    Connected      Networks”,    ACM
DROP and DROP FRONT policy. The lower value of hop                      SIGMOBILE Mobile Computing and Communications
count means that message has consumed less resource to                  Review, Vol. 7, Issue 3, pp. 19-20, July, 2003
                                                                 [9]    A. Balasubramanian, B.N. Levine, and A.Venkataramani,
reach its destination. SRT DROP drops the messages
                                                                        “DTN Routing as a Resource Allocation Problem”, Proc.
whose size is nearly equal to the incoming message. Due                 of ACM SIGCOMM, Aug 2007
to this logic it will drop less no of messages and decreases     [10]   J. Shen, S. Moh, and I. Chung, “Routing Protocols in
the value of hop count average.                                         Delay Tolerant Networks: A Comparative Survey”, 23rd
                                                                        International Conference on Circuits/Systems, Computers
                                                                        and Communications, (ITC-CSCC 2008)
                                                                 [11]   E.P.C. Jones, L.Li, P.A.S. Ward, “Practical Routing in
                                                                        Delay-Tolerant Networks”, IEEE Transactions on Mobile
                                                                        Computing, Vol. 6, No. 8, Aug 2007
                                                                 [12]   G. Sandulescu and S.N. Tehrani, “Opportunistic DTN
                                                                        Routing with Window-aware Adaptive replication” Proc.
                                                                        of ACM on AINTEC, Nov 2008
                                                                 [13]   C. Liu and J. Wu, “Scalable Routing in Delay tolerant
                                                                        Networks”, Proc. of ACM on MobiHoc, Vol. 9, No. 14,
                                                                        pp. 51-60, Sep 2007
                                                                 [14]   M. Demmer, K. FSR: “DTLSR: Delay Tolerant routing for
      Figure 6: Drop Front,SRT Drop Hop Count W.R.T to                  Developing Regions”, Proc. of ACM on NDSR, 2007
                            Routers                              [15]   B. Burns, O. Brook, B.N. Levine, “MORA routing and
                 VIII.    CONCLUSION                                    Capacity Building in Disruption-Tolerant Networks”
          In this paper investigated SRT DROP policy with        [16]   Y. Liao, K. Tan, Z. Zhang and L. Gao, “Estimation based
DROP FRONT policy with respect to DTN routing                           Erasurecoding routing in Delay tolerant Networks” Proc.
                                                                        of IWCMC, July 2006
protocols. Results shows that our SRT DROP policy                [17]   L. J. Chen, C.H. Yu, T. Sun, Y.C. Chen and H.H. Chu, “A
perform well with respect to delivery probability, buffer               Hybrid Routing Approach for Opportunistic Networks”,
time, overhead ratio, hop count average and packet                      Proc. of ACM SIGCOMM on Challenged Networks, 2006
dropped. It should motivate to examine SRT DROP policy           [18]   D. Marasigan and P. Rommel, “MV routing and capacity
to other existing drop policy.                                          building in disruption tolerant networks,” in Proceedings
Compare the SRT DROP POLICY with DROP FRONT                             of IEEE INFOCOM, vol. 1, pp. 398–408, March 2005.
policy. This comparison motivate to compare SRT DROP             [19]   Q. Li and D. Rus, “Sending messages to mobile users in
policy with DROP LARGEST POLICY because both                            disconnected ad-hoc wireless networks,” in Proceedings of
policy gives importance to size of messages. The routing                ACM MobiCom, pp. 44–55, August 2000.
                                                                 [20]   W. Zhao, M. Ammar, and E. Zegura, “A message ferrying
protocol other then the EPIDEMIC, FC, DIRECT
                                                                        approach for data delivery in sparse mobile ad hoc
DELIVERY, SPRAY ANDWAIT and PROPHET routing                             networks,” in Proceedings of ACM MobiHoc, (New York,
protocols are also an interesting direction of work.                    NY, USA), pp. 187–198, ACM Press, May 2004.
                                                                 [21]   W. Zhao, M. Ammar, and E. Zegura, “Controlling the
REFERENCES                                                              mobility of multiple data transport ferries in a delay-
[1]     Abbas Nayebi, Hamid Sarbazi-Azad, and Gunnar Karlsson           tolerant network,” in Proceedings of IEEE INFOCOM,
        Sharif University of Technology, Tehran, Iran Royal             vol. 2, pp. 1407–1418 vol. 2, April 2005.
        Institutc of Technology(KTH) Stockholm, Sweden
        “Routing, Data Gathering, and Neighbor Discovery in

                                                     www.ijmer.com                                                   1735 | Page

Mais conteúdo relacionado

Mais procurados

Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic NetworksAuwal Amshi
 
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisMulticasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisNagendra Posani
 
Csit54201
Csit54201Csit54201
Csit54201csandit
 
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONijwmn
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...cscpconf
 
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETIMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
 
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Dr. Mazlan Abbas
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]ingenioustech
 
Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicastingingenioustech
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
 
New strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolNew strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolijwmn
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...ijmnct
 
Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACHEditor IJCATR
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGijseajournal
 
Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsTowards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsIDES Editor
 
Performance evaluation of mofo buffer management technique with different rou...
Performance evaluation of mofo buffer management technique with different rou...Performance evaluation of mofo buffer management technique with different rou...
Performance evaluation of mofo buffer management technique with different rou...eSAT Journals
 

Mais procurados (19)

Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisMulticasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
 
Csit54201
Csit54201Csit54201
Csit54201
 
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
 
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETIMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANET
 
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
Performance Evaluation of Binary Spray and Wait OppNet Protocol in the Contex...
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
 
F0313539
F0313539F0313539
F0313539
 
Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicasting
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 
New strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolNew strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocol
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
 
Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACH
 
A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...A Review on Geographical Location Based Energy Efficient Direction Restricted...
A Review on Geographical Location Based Energy Efficient Direction Restricted...
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol EnvironmentsTowards Seamless TCP Congestion Avoidance in Multiprotocol Environments
Towards Seamless TCP Congestion Avoidance in Multiprotocol Environments
 
Performance evaluation of mofo buffer management technique with different rou...
Performance evaluation of mofo buffer management technique with different rou...Performance evaluation of mofo buffer management technique with different rou...
Performance evaluation of mofo buffer management technique with different rou...
 
Jcomss 8358 final
Jcomss 8358 finalJcomss 8358 final
Jcomss 8358 final
 

Destaque

Ag32637641
Ag32637641Ag32637641
Ag32637641IJMER
 
A production - Inventory model with JIT setup cost incorporating inflation an...
A production - Inventory model with JIT setup cost incorporating inflation an...A production - Inventory model with JIT setup cost incorporating inflation an...
A production - Inventory model with JIT setup cost incorporating inflation an...IJMER
 
Effect of Co doping on the structural and physical properties of SrC4H4O6.3H2...
Effect of Co doping on the structural and physical properties of SrC4H4O6.3H2...Effect of Co doping on the structural and physical properties of SrC4H4O6.3H2...
Effect of Co doping on the structural and physical properties of SrC4H4O6.3H2...IJMER
 
Ba2419551957
Ba2419551957Ba2419551957
Ba2419551957IJMER
 
Propabilistic Analysis of a Man-Machine System Operating Subject To Differen...
Propabilistic Analysis of a Man-Machine System Operating  Subject To Differen...Propabilistic Analysis of a Man-Machine System Operating  Subject To Differen...
Propabilistic Analysis of a Man-Machine System Operating Subject To Differen...IJMER
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
How to quickly put money in your bank
How to quickly put money in your bankHow to quickly put money in your bank
How to quickly put money in your bankdenise2228
 
Ac2640014009
Ac2640014009Ac2640014009
Ac2640014009IJMER
 
Solar-Thermoelectric Hybrid Powergenerator
Solar-Thermoelectric Hybrid PowergeneratorSolar-Thermoelectric Hybrid Powergenerator
Solar-Thermoelectric Hybrid PowergeneratorIJMER
 
3 first steps you must do
3 first steps you must do3 first steps you must do
3 first steps you must dodenise2228
 
Tips to Become Genius | SEEMAS ACADEMY
Tips to Become  Genius | SEEMAS ACADEMYTips to Become  Genius | SEEMAS ACADEMY
Tips to Become Genius | SEEMAS ACADEMYSEEMAS ACADEMY
 
구글 Search engine-optimization-starter-guide-ko
구글 Search engine-optimization-starter-guide-ko구글 Search engine-optimization-starter-guide-ko
구글 Search engine-optimization-starter-guide-ko용대 김
 
Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...
Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...
Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...IJMER
 
An32678684
An32678684An32678684
An32678684IJMER
 
There was war in heaven
There was war in heavenThere was war in heaven
There was war in heavenRobert Taylor
 
Stress Analysis of Precast Prestressed Concrete Beams during Lifting
Stress Analysis of Precast Prestressed Concrete Beams during  LiftingStress Analysis of Precast Prestressed Concrete Beams during  Lifting
Stress Analysis of Precast Prestressed Concrete Beams during LiftingIJMER
 
Bq32857863
Bq32857863Bq32857863
Bq32857863IJMER
 

Destaque (20)

Ag32637641
Ag32637641Ag32637641
Ag32637641
 
A production - Inventory model with JIT setup cost incorporating inflation an...
A production - Inventory model with JIT setup cost incorporating inflation an...A production - Inventory model with JIT setup cost incorporating inflation an...
A production - Inventory model with JIT setup cost incorporating inflation an...
 
Soap Magazines Analysis
Soap Magazines AnalysisSoap Magazines Analysis
Soap Magazines Analysis
 
Effect of Co doping on the structural and physical properties of SrC4H4O6.3H2...
Effect of Co doping on the structural and physical properties of SrC4H4O6.3H2...Effect of Co doping on the structural and physical properties of SrC4H4O6.3H2...
Effect of Co doping on the structural and physical properties of SrC4H4O6.3H2...
 
Ba2419551957
Ba2419551957Ba2419551957
Ba2419551957
 
Propabilistic Analysis of a Man-Machine System Operating Subject To Differen...
Propabilistic Analysis of a Man-Machine System Operating  Subject To Differen...Propabilistic Analysis of a Man-Machine System Operating  Subject To Differen...
Propabilistic Analysis of a Man-Machine System Operating Subject To Differen...
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
How to quickly put money in your bank
How to quickly put money in your bankHow to quickly put money in your bank
How to quickly put money in your bank
 
Sistema térmico usg tablaroca
Sistema térmico usg tablarocaSistema térmico usg tablaroca
Sistema térmico usg tablaroca
 
Ac2640014009
Ac2640014009Ac2640014009
Ac2640014009
 
Solar-Thermoelectric Hybrid Powergenerator
Solar-Thermoelectric Hybrid PowergeneratorSolar-Thermoelectric Hybrid Powergenerator
Solar-Thermoelectric Hybrid Powergenerator
 
3 first steps you must do
3 first steps you must do3 first steps you must do
3 first steps you must do
 
Tips to Become Genius | SEEMAS ACADEMY
Tips to Become  Genius | SEEMAS ACADEMYTips to Become  Genius | SEEMAS ACADEMY
Tips to Become Genius | SEEMAS ACADEMY
 
CCL
CCLCCL
CCL
 
구글 Search engine-optimization-starter-guide-ko
구글 Search engine-optimization-starter-guide-ko구글 Search engine-optimization-starter-guide-ko
구글 Search engine-optimization-starter-guide-ko
 
Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...
Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...
Effect of Air Entrainment on Compressive Strength, Density, and Ingredients o...
 
An32678684
An32678684An32678684
An32678684
 
There was war in heaven
There was war in heavenThere was war in heaven
There was war in heaven
 
Stress Analysis of Precast Prestressed Concrete Beams during Lifting
Stress Analysis of Precast Prestressed Concrete Beams during  LiftingStress Analysis of Precast Prestressed Concrete Beams during  Lifting
Stress Analysis of Precast Prestressed Concrete Beams during Lifting
 
Bq32857863
Bq32857863Bq32857863
Bq32857863
 

Semelhante a Z02417321735

Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Haya Saani
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...IRJET Journal
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd Iaetsd
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...inventionjournals
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksIJERA Editor
 
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...CSCJournals
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...eSAT Journals
 
Enhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networksEnhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networksIRJET Journal
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
 
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...ijceronline
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network partha pratim deb
 

Semelhante a Z02417321735 (20)

Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
 
dtn-180110112549.pdf
dtn-180110112549.pdfdtn-180110112549.pdf
dtn-180110112549.pdf
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
D0441722
D0441722D0441722
D0441722
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme via
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant Networks
 
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 
D0431013019
D0431013019D0431013019
D0431013019
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...
 
Enhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networksEnhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networks
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
 
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
Manets: Increasing N-Messages Delivery Probability Using Two-Hop Relay with E...
 
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
Comparative Analysis of Different TCP Variants in Mobile Ad-Hoc Network
 
E42022125
E42022125E42022125
E42022125
 

Mais de IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

Mais de IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Último

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Z02417321735

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-1732-1735 ISSN: 2249-6645 Effective routing protocols for delay tolerant network Sukhbirl, Dr. Rishipal Singh2 1 M.Tech Student, 2Assistant Prof. CSE Deptt. Guru jambheshwar university science & technology, hisar Abstract: Delay-tolerant Networking (DTN) enables communication in sparse mobile ad-hoc networks and other challenged environments where traditional networking fails and new routing and application protocols are required. Past experience with DTN routing and application protocols has shown that their performance is highly dependent on the underlying mobility and node characteristics. Evaluating DTN protocols across many scenarios requires suitable simulation tools. This paper presents the existing routing protocols techniques and Comparative study of existing Figure 1: Time Evolving Behavior of the Network routing protocols of Delay-Tolerant Networks based upon efficiently. the metrics like Overhead Ratio, Hop Count and Buffer Size. DTN follow store carry and forward approach. Node should carry the message until proper custodian is I. INTRODUCTION not found. Because of resource limitation each node in Delay tolerant networks are an emerging field of DTN has some fix size of buffer. Node store the message networks that show some different characteristics from in its own buffer until the next custodian is found in the today’s internet such as intermittent connectivity, long path towards the destination. As the buffer size is limited delays etc. Delay tolerant networks arise in a variety of node should follow some policy to decide which message situation like disaster relief, military rescue operations, is dropped when the buffer size is full. Develop an rural internet access etc. There are some critical situations algorithm and a weight function to make this decision that where the ability to communicate make a significant effectively choose message to be dropped. As a result difference for human lives. In DTN decision to drop a proposed algorithm has been compare with already message is taken on several constraints like size of existing DROP FRONT policy. The approach better message, no of copies, time to live and buffer size etc. results in terms of delivery probability, buffer time avg In DTN, end to end path is very rare and unstable in nature and Hop count avg.. and opportunity to establish complete route is negligible. DTN support those applications, whose time requirement II. RELATED WORK is hours or even day or longer. It is necessary to deliver The major objective of routing in DTNs is to deliver high priority message during “contact” phase [1]. DTN packets from the source to the destination by means of the enable communication by taking advantage of Temporary mobility of nodes. Since the end-to-end path may not be connections to relay data in a fashion similar to Postal available, routing schemes have to optimize data network instead of requiring an end to end network path to dissemination by utilizing the connectivity information be available. and network conditions maintained by each node. For However communication in DTN is a very challenging example, in [3], the routing scheme based on the estimates task. Traditional network simply assume a complete of the average inter contact time between the mobile nodes connected graph should be there and a period of time that in the network was proposed. This routing scheme was is long enough to allow communication. In DTN there designed to minimize the packet delivery time. The might not even be end to end path between a pair of nodes routing properties in terms of loop-free forwarding and at any moment of time as shown in the figure 1 [2]. Due to polynomial convergence were studied, which ensure the this unique feature of DTN, existing routing algorithm that performance of the packet delivery in DTNs. In [4], the are developed for Internet and MANETS do not packet-delivery scheme based on the super node performing well. Reason for this is that all these algorithm architecture and epidemic routing was introduced. With assume that the network is connected and end to end path epidemic routing, the packets are forwarded to other exist between each pair of nodes. DTN are often resource contacted nodes (i.e., nodes with a direct connection). limited and not able to deliver required performance in Unlike traditional epidemic routing, the packets are case of intermittent connectivity. Due to given resource forwarded to the super nodes to improve the performance limitation and uncertainty in DTN it is very difficult to and reduce overhead. The super nodes are then responsible deliver data. in carrying the packets to the destination. www.ijmer.com 1732 | Page
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-1732-1735 ISSN: 2249-6645 III. ROUTING PROTOCOLS The Epidemic and The Spray and Wait routing (a) First contact: – This is simplest strategy to transmit protocols forward messages without taking node mobile the data from source to destination in DTN. This transmit patterns into consideration, therefore the delivery utility is message immediately as soon as the source and destination too low. come in contact with each other directly. This is possible Now present the notion of QoN. QoN indicates the when the source and destination are one hop apart or activity of a node, or the number one node meets other immediately neighbor of each other. different nodes within a given interval. In the same period (b) Direct delivery:- Scheme lets the source hold the data of time, the more nodes that one node meets, the greater until it comes in contact with the destination. This simple the QoN. The variation of QoN can dynamically strategy uses one message transmission. It is a degenerate represents the node activity in a given period of time. case of flooding family, requiring no info about network but requires a direct path between source and destination. V. Drop policy algorithm Hence if no contact occurs, message is not delivered. Let us assume (c) ProPHET:-Improve the routing performance by n= number of nodes in the network adopting the probabilistic scheme that reflects the contact t= number of digits in n observation of nodes. However, the single copy Bavail=buffer available at particular node forwarding based on the probability may affect to the Mnew=new message performance with limitation of the initial probability Snew=size of new incoming message distribution and a message drop. The limited buffer space Ni(t)=no copies of message i at time t and use of an ACK message should be investigated to Ttl= time to live /*time duration in which message is live enhance the performance further. means message is useful only this time duration */ Finally, although Spray and Wait can overcome the Rtli=remaing time to live of message for message i shortcomings of Epidemic routing protocol, the usability of the wait phase with an efficient single copy forwarding 5.1 Proposed Algorithm scheme and the optimal decision of an initial spray number When two nodes communicate with each other they share are open issues. message to each other. It might be possible when they (d) Spray and Wait:- The operation of Spray and Wait communicate the buffer available is not enough to consists of two phases: accommodate a new message. At that time scheduling take the spray phase and the wait phase. In the spray phase, place. Each node have two options at that moment of time: when a node generates a message, the node makes N first it will discard a new message and second one is that it copies of the message to spread it to relay nodes. When the will drop some message from its buffer and make some node meets the other node, the node checks N (i.e., N > 1). room for the new message. If the node has the spray message, the node hands over the Until now all DTN routing protocol follow the DROP message and revised N (i.e., N/2) to the other node. After FRONT message approach in which they drop message the spray phase is finished, each of N nodes carrying a from the front of nodes buffer queue. message copy performs the direct message transmission until it successfully delivered the message to the 5.2 Weight function destination. This function value makes the decision to drop a message (e) Epidemic Routing: - Epidemic routing is an early from the node buffer. This weight function consider sparse network routing protocol proposed for DTN. It various properties of the message and node. As a result it assumes that each node has unlimited storage space and gives a value on basis of that a node drop a particular bandwidth. Therefore every node can store all the message whose value is minimum. messages transmitted during "contact" phase. This use the Let N= no of nodes in the network concept of database replication also a relay node can MaxTTL= maximum value of time to live of any node in exchange the entire message during "contact" phase. Each the network node maintains list of messages in the database called While(Snew>Bavail) summary vector. { Mid=call message equal (Snew); /* Search those message IV. Dynamic Spray and Wait with Quality of in the buffer of node whose size is equal to or greater then Node (QoN) the size of incoming new message. This function will return the message id of those messages who will be drop 4.1. Delivery utility according to SRT algo */ When delivery rate stay the same, consider the relationship Bavail=Bavail+ MessageCollection.get(MID).Size(); between network overhead and delivery utility. Delivery Delete MessageCollection.get(MID); utility is defined as the ratio of the number of messages } received by destination nodes to the number of messages /* Body of the function call messageEqual(Snew) */ forwarded by relay nodes, as shown in Equation Int callmessageEqual(Snew) (1). { Messages of received For (each message M in node buffer) delivery_utility=-------------------------------- { Messages of forwarded If (Mni>=Snew) 4.2. The definition of Quality of Node (QoN) Add MessageCollection m; /* message id */} } www.ijmer.com 1733 | Page
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-1732-1735 ISSN: 2249-6645 /* Then apply a weight function on MessageCollection m. */ float F,F1,α; /* initially F1 contain the function value (F) of m0 message */ int MessageId; While (MessageCollection m) { F=a*(size of message)+ b/N *(no of copies) + c/MaxTTL a=b+α+1; α = 1/n b=10n; Figure 2: Drop Front, SRT Drop Delivery Probability c =RTLi /* remaining time to live */ W.R.T to Routers If (F<F1) { 7.2 Comparison Based on Buffer Time Average F1=F; Figure 3 indicates that the buffer time average for SRT Messageid=MessageCollection.get(F); DROP and DROP FRONT policy for various routers. The } value of buffer time average is large in SRT drop as Return MessageId; compared to DROP FRONT. High value of buffer time average increase the probability of message delivery in the } DTN paradigm. High value of buffer time average also VI. SIMULATION decreases the drop ratio. Figure 3 shows that SRT DROP One is an agent based discrete event simulator increases the buffer time average as compared to DROP engine. The main functions of one simulator are the FRONT. modeling of node movement, inter node contact, routing and message handling. Analysis of the result are done through visualization or reports. Movement models are used to implement the node movement. Connectivity between the nodes depends on their location and communication range. Routing modules are used to implement the routing function that decide which message to forward. Finally the message are generated through event generator. The graphical user interface(GUI) displays a visualization of the simulation. VII. RESULTS Figure 3: Drop Front, SRT Drop Buffer Time Avg. W.R.T The results given below indicate the comparative study to Routers between DROP FRONT and SRT. The results show the comparison between DROP FRONT and SRT drop policy. 7.3 Comparison Based on Overhead Ratio These results prove that it is beneficial to use SRT drop The overhead ratio with respect to various routers has been policy as it improves the performance of any DTN. plotted in figure 4 for SRT DROP and DROP FRONT. The results show that the SRT DROP is less in terms of 7.1 Comparison Based on Delivery Probability overhead ratio in all routers. Overhead ratio in DIRECT The comparative study of DROP FRONT and SRT DROP DELIVERY router is zero due to direct transmission while policy with respect to delivery probability has been plotted the overhead ratio is decreases in epidemic, prophet, fc, in the figure 2. The DROP FRONT policy drops the front spray and waits up to a significant level. SRT DROP less messages from the buffer; however the SRT drops the no of messages as compare to DROP FRONT because it bigger size message. But in case of FIRST CONTACT and drop the message of nearly greater or equal size of DIRECT DELIVERY router the probability of encounter messages. is less as a result the delivery probability is not increasing significant as compared to previous results. Figure 4: Drop Front, SRT Drop Overhead Ratio W.R.T to Routers www.ijmer.com 1734 | Page
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug. 2012 pp-1732-1735 ISSN: 2249-6645 Delay-Tolerant Wireless Sensor Networks” IEEE 978-1- 7.4 Comparison Based on Packet Dropped 4244-3750-4-2009 The results in the figure 5 show that the SRT DROP drops [2] Z. Zhang, Routing in Intermittently Connected Mobile Ad less no. of messages as compared to DROP FRONT Hoc Networks and Delay Tolerant Networks: Overview and Challenges, in IEEE Commun. Surveys , vol. 8, no.1, because it drops the message of nearly greater or equal 1st Quarter 2006. size of messages. Therefore, the network overhead also [3] V. Conan, J. Leguay, and T. Friedman, “Fixed point decreases. opportunistic routing in delay tolerant networks,” IEEE J. Sel. Areas Commun., vol. 26, no. 5, pp. 773–782, Jun. 2008. [4] H. Samuel, W. Zhuang, and B. Preiss, “Routing over interconnected heterogeneous wireless networks with intermittent connections,” in Proc. IEEE ICC, May 2008, pp. 2282–2286. [5] E.P.C. Jones and P.A.S. Ward, “Routing Strategies for Delay-Tolerant Networks”, Computer Communications, 2008 [6] U. Lee, S.Y. Oh, K.W. Lee, M.Gerla, “RelayCast: scalable Multicast Routing in Delay Tolerant Networks”, IEEE, 2008 [7] J. Burgess, B. Gallagher, D. Jensen and B.N. Levine, Figure 5: Drop Front,SRT Drop Packet Drop W.R.T to “MaxProp: Routing for Vehicle-Based Disruption-tolerant Routers Networks”, Proc. Of IEEE INFOCOM, April 2006 7.5 Comparison Based on Hop Count Avg. [8] A. Lindgren, A. Doria, O. Schelen, “Probabilistic Routing Figure 6 shows the hop count for various routers for SRT in Intermittently Connected Networks”, ACM DROP and DROP FRONT policy. The lower value of hop SIGMOBILE Mobile Computing and Communications count means that message has consumed less resource to Review, Vol. 7, Issue 3, pp. 19-20, July, 2003 [9] A. Balasubramanian, B.N. Levine, and A.Venkataramani, reach its destination. SRT DROP drops the messages “DTN Routing as a Resource Allocation Problem”, Proc. whose size is nearly equal to the incoming message. Due of ACM SIGCOMM, Aug 2007 to this logic it will drop less no of messages and decreases [10] J. Shen, S. Moh, and I. Chung, “Routing Protocols in the value of hop count average. Delay Tolerant Networks: A Comparative Survey”, 23rd International Conference on Circuits/Systems, Computers and Communications, (ITC-CSCC 2008) [11] E.P.C. Jones, L.Li, P.A.S. Ward, “Practical Routing in Delay-Tolerant Networks”, IEEE Transactions on Mobile Computing, Vol. 6, No. 8, Aug 2007 [12] G. Sandulescu and S.N. Tehrani, “Opportunistic DTN Routing with Window-aware Adaptive replication” Proc. of ACM on AINTEC, Nov 2008 [13] C. Liu and J. Wu, “Scalable Routing in Delay tolerant Networks”, Proc. of ACM on MobiHoc, Vol. 9, No. 14, pp. 51-60, Sep 2007 [14] M. Demmer, K. FSR: “DTLSR: Delay Tolerant routing for Figure 6: Drop Front,SRT Drop Hop Count W.R.T to Developing Regions”, Proc. of ACM on NDSR, 2007 Routers [15] B. Burns, O. Brook, B.N. Levine, “MORA routing and VIII. CONCLUSION Capacity Building in Disruption-Tolerant Networks” In this paper investigated SRT DROP policy with [16] Y. Liao, K. Tan, Z. Zhang and L. Gao, “Estimation based DROP FRONT policy with respect to DTN routing Erasurecoding routing in Delay tolerant Networks” Proc. of IWCMC, July 2006 protocols. Results shows that our SRT DROP policy [17] L. J. Chen, C.H. Yu, T. Sun, Y.C. Chen and H.H. Chu, “A perform well with respect to delivery probability, buffer Hybrid Routing Approach for Opportunistic Networks”, time, overhead ratio, hop count average and packet Proc. of ACM SIGCOMM on Challenged Networks, 2006 dropped. It should motivate to examine SRT DROP policy [18] D. Marasigan and P. Rommel, “MV routing and capacity to other existing drop policy. building in disruption tolerant networks,” in Proceedings Compare the SRT DROP POLICY with DROP FRONT of IEEE INFOCOM, vol. 1, pp. 398–408, March 2005. policy. This comparison motivate to compare SRT DROP [19] Q. Li and D. Rus, “Sending messages to mobile users in policy with DROP LARGEST POLICY because both disconnected ad-hoc wireless networks,” in Proceedings of policy gives importance to size of messages. The routing ACM MobiCom, pp. 44–55, August 2000. [20] W. Zhao, M. Ammar, and E. Zegura, “A message ferrying protocol other then the EPIDEMIC, FC, DIRECT approach for data delivery in sparse mobile ad hoc DELIVERY, SPRAY ANDWAIT and PROPHET routing networks,” in Proceedings of ACM MobiHoc, (New York, protocols are also an interesting direction of work. NY, USA), pp. 187–198, ACM Press, May 2004. [21] W. Zhao, M. Ammar, and E. Zegura, “Controlling the REFERENCES mobility of multiple data transport ferries in a delay- [1] Abbas Nayebi, Hamid Sarbazi-Azad, and Gunnar Karlsson tolerant network,” in Proceedings of IEEE INFOCOM, Sharif University of Technology, Tehran, Iran Royal vol. 2, pp. 1407–1418 vol. 2, April 2005. Institutc of Technology(KTH) Stockholm, Sweden “Routing, Data Gathering, and Neighbor Discovery in www.ijmer.com 1735 | Page