SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 82
PERFORMANCE EVALUATION OF MOFO BUFFER MANAGEMENT
TECHNIQUE WITH DIFFERENT ROUTING PROTOCOLS IN DTN
UNDER VARIABLE MESSAGE BUFFER SIZE
Anita Rani1
, Sangeeta Rani2
, Harminder Singh Bindra3
1
Student, 2
Teaching Associate, Computer Sci. & Applications Department, Chaudhary Devi Lal University, Haryana,
India
3
HOD IT Department, Malout Institute of Management & Information Technology, Punjab, India
Abstract
Delay Tolerant Networks (DTNs) uses the store-carry-forward scheme for the delivery of the messages, with this way data
transmission can be successfully done despite of the absence of continuous end-to-end paths. The opportunities of message forwarding
in such types of networks usually are limited due to the absence of contemporaneous paths. In such networks, the “store-carry-
forward” methodology is used for the transmission of the messages to be delivered to their intend destinations in a hop by hop
manner. It arises many problems like how to schedule the messages, how to drop the messages in the buffer due to the impulsive
nature of the nodes. It also arises many challengeable situations like short contact durations between the two nodes, limited storage
capacity of nodes and so on. This paper evaluates the performance of MOFO buffer management technique with three routing
protocols i.e. Epidemic, Prophet and MaxProp under variable message buffer sizes (5MB to 40MB). Such evaluation can improve the
performance of the opportunistic networks by reducing the overhead ratio, enhancing the delivery rate, minimizing latency average
and hop count average in a certain degree. So four performance evaluation metrics namely delivery probability, latency average,
overhead ratio and hop count average are used in this study. This study uses ONE (Opportunistic Network Environment) simulator for
the performance evaluation of the MOFO buffer management technique and routing protocols. The evaluation results shows that the
performance of different protocols can benefit to optimizing the performance of delay tolerant networks in terms of delivery
probability, Latency average, Overhead ratio and Hop count average of messages with the increase in message buffer size. Finally,
this study suggested that which routing protocol is most suitable with MOFO buffer management technique.
Keywords: Delay Tolerant Networks, Buffer Management, Routing Protocols, MOFO, Epidemic, Prophet, MaxProp
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
In the present day scenario, rapid rise in the heterogeneous
networks has been seen in the wireless communications. The
heterogeneous network may be termed as the network, which
connects computers and such other devices, which uses
different operating systems and communication protocols.
Delay Tolerant Network approach addresses the issues that
provide communication in the heterogeneous networks. In
Delay Tolerant Networks (DTN), there is frequency of
disruptions is much higher, as end to end path is not available
all the time. Due environment nature of delay tolerant
networks like underwater, ocean sensor, deep space, delays
can further be extended. In such demanding networking
situations, to obtain data delivery researchers have proposed a
technique in which the messages is stored into the buffers of
the intermediary nodes until it is forwarded to the destination.
Thus, in order to obtain the higher delivery probabilities of the
messages and reliable communication in such challenging
networks, many approaches have been adopted. Several issues
like increasing the delivery ratio or minimizing the delivery
delays, optimizing resources usage etc. has been the main
focused area of the researchers to achieve message delivery
probability. Moreover, to increase delivery probability,
multiple copies of the messages into the network is done. This
arrangement of long-standing storage and duplication results
in high storage overhead on the network. Therefore, efficient
buffer management policies are required, which decides that
what messages must be dropped, while node buffers are
overflowed [2].
In this paper, we have evaluated the performance of MOFO
buffer management technique with Epidemic, Prophet and
MaxProp routing protocols under variable message buffer
size. The performance metrics chosen for the evaluation of
these routing protocols is delivery probability, overhead ratio,
hop count average and latency time average. The tool used for
the simulation is Opportunistic Network Environment.
Simulation setup for the study is given in the Table-1 in
Section 4.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 83
2. BUFFER MANAGEMENT TECHNIQUES
Buffer Management technology is a fundamental approach
that manages the various resources among different situations
as per the technique used. An efficient buffer management
technique decides at each step that which of the messages is to
be dropped first, when the buffer is full likewise which
messages are to be transmitted, when bandwidth is limited.
Some of the popular buffer management techniques are as
follows:
2.1 Drop Least Recently Received (DLR)
In DLR technique as the name implies, the message which is
staying for a long time in the buffer will be dropped first. As
it has the less probability to be conceded to the other nodes
[2].
2.2 Drop Oldest (DOA)
In DOA technique, the message with the shortest remaining
life time (TTL) is dropped first. The idea behind dropping
such messages is that the messages whose TTL is small, then
these are in the network from a long period of time and thus
has the high probability to be already delivered [2].
2.3 Drop Front (DF) FIFO
This technique drops the messages on the basis of the order in
which they entered into the buffer, for example the first
message that entered the queue will be the first to be dropped
[3].
2.4 Drop Largest (DLA)
In Drop Largest (DLA) buffer management technique message
having large size will be selected in order to drop [2].
2.5 MOFO (Evict Most Forwarded First)
MOFO attempts to maximise the propagation of the messages
through the network by dropping those messages that have
been forwarded the maximum number of time. In such way
the messages with lower hop count enables to travel further
within the network [3].
2.6 DL-Drop Last
The newly received message is first removed simply.
2.7 MOPR (Evict Most Favorably Forwarded First)
MOPR maintains the value of each message in its queue. Thus
each time when a message is replicated the value in the
message is increased based on the predictability of the
message being delivered, thus the message with the highest
value is dropped first [3].
2.8 SHLI (Evict Shortest Life Time First)
This technique uses the timeout value of the message, which
indicates that when it is no longer useful, such that a message
with the shortest remaining life time is dropped first [3].
2.9 LEPR (Evict Least Probable First)
This technique works by a node ranking the messages within
its buffer based on the predicted probability of delivery, the
message with the lowest probability is dropped first [3].
This study evaluates the performance of MOFO buffer
management technique on the basis of metrics, delivery
probability, overheads ratio, latency time average and hop
count average.
3. ROUTING PROTOCOLS USED
3.1 Epidemic Routing protocol
In DTN, among all the routing protocols, Epidemic routing
protocol is the leading protocol. This protocol is flooding
based in nature as all the nodes continuously replicate and
transmit the messages to the adjacent nodes that do not already
have a copy of the message. Using this protocol, when a node
comes into the contact of other node, it checks whether the
new node has the copy of this message or not. If it does not
have, then the new message is forwarded to that node. This
protocol uses the summary vectors for this task. The node
exchanges their summary vectors when they comes in the
communication range of each other to decide which message
have not been seen by that node. Host request for a copy of a
message which it has not seen yet. The receiving host has the
complete autonomy to reject or accept the message [6].
3.2 PRoPHET Routing Protocol
Epidemic routing protocol is a resource hungry protocol
because it makes no attempt to remove the replications
deliberately that would be unlikely to increase the delivery
probability of the messages. Such type of strategy is more
effective if the opportunities of delivering the messages
encounters between the nodes are purely random, but in
realistic circumstances, meeting of nodes are rarely totally
random. Data Mules such as human beings moves in the
society and have higher probabilities of meeting the certain
Mules than others. The PRoPHET (Probabilistic Routing
Protocol using History of Encounters and Transitivity)
protocol used an algorithm that attempts to use the non
randomness of the real-world encounters by maintaining the
set of probabilities for a successful delivery to the known
destinations in DTN [4].
3.3 MaxProp Routing Protocol
MaxProp routing protocol is a flooding-based protocol by
nature. In MaxProp if a contact is occurred, then all the
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 84
messages not held by the contact will be replicated and
transferred. The MaxProp routing protocol intelligently
determines that which messages should be transmitted first
and which of the messages should be dropped first. Here an
ordered queue is maintained by this protocol based on the
destination of each message, ordered by the probability of a
future transitive path to that particular destination. When two
nodes meet each other, firstly, they exchange their estimated
node meeting likelihood vectors. Preferably, each node will
have an up to date vector from every other node. With these
„n‟ vectors at hand, the node can compute the shortest path on
the basis of a depth-first search where path weights indicate
the probability that the link does not occur [5].
4. SIMULATION SETUP
The performance of MOFO buffer management technique
with different routing protocols is analyzed through simulation
using the Opportunistic Network Environment (ONE). The
ONE simulator is an agent based discrete event simulation
engine. The main functionality of the ONE consists of the
modeling of the node movement, inter node contacts using
various interfaces, routing, message handling and application
interactions. The simulator is configured using text based
configuration files that contains the simulation, event
generation and reporting parameters. This file also has the
defining parameters for the nodes like the storage capability,
transmit range, bit rates as well as the routing model to use.
Table 1 summarizes the simulation configuration used for the
current analysis.
5. PERFORMANCE METRICS
The following are the performance metrics used for the
analysis:
Table -1 Simulation Setup of the Study
5.1 Delivery Probability
The delivery probability is the amount of the fraction of all the
created packets that are successfully delivered to its
destination. This is the ratio of the total number of packets that
are delivered to their destinations against the total number of
packets that are created. Thus this is a direct measurement of
how reliably packets are routed in the network by a routing
protocol under consideration [6].
5.2 Overhead Ratio
The overhead ratio is calculated using the following equation:
Overhead ratio =
(Number of relayed messages – Number of delivered
messages) / Number of delivered messages
Here, the term relayed messages refers to the messages that
have been forwarded by the source to an intermediate node to
be forwarded towards the destination. This number is a
measure for the number of packets or copies of packets that
have been inducted into the network. The number of delivered
messages refers to the total number of created packets that are
successfully delivered to the destination. The overhead ratio
also shows the amount of the network resources required to
deliver a packet from source to its destination [6].
5.3 Latency Average
The latency measured here is the time that elapses between the
creation of a message and its delivery at its destination. This
study considers the average of the latency of the packets over
the entire simulation time. This is the time as calculated for
the delivered packets only. In most protocols, it is desired that
the value of latency time average is low. In the DTNs
environment the latency is acceptable at some extent [6].
5.4 HopCount Average
It is the mean hops which a message takes to reach its
destination
6. RESULTS AND DISCUSSION
6.1 Delivery Probability
The delivery probability of MOFO buffer management
technique with Epidemic, Prophet and MaxProp routing
protocols under variable message buffer size is shown in Chart
1.
1. The Chart shows that the delivery probability of all the
three routing protocols under MOFO buffer management
technique increase as the message buffer size increases.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 85
Chart- 1: Delivery Probability
2. The overlapping lines of Epidemic and Prophet shows
that delivery probability of Epidemic and Prophet are
same at a particular message buffer size
3. Whereas the delivery probability of MaxProp is much
higher than Epidemic and Prophet routing protocols at all
the message buffer sizes.
6.2 Overhead Ratio
The overhead ratio of MOFO buffer management technique
with Epidemic, Prophet and MaxProp routing protocols under
variable message buffer size is shown in Chart- 2.
1. The Chart 2 clearly demonstrate that the overhead
ratio under all the three protocols falls sharply as the
message buffer size increased from 5MB to 10MB.
Chart- 2: Overhead Ratio
2. As the message buffer size increased further, the
decline in overhead ratio under all the three routing
protocols continues very slowly.
3. Overhead ratio under MaxProp is lower than
Epidemic and Prophet routing protocols.
4. Overhead ratio under Epidemic is much higher than
Prophet and MaxProp at 5MB, but becomes equals
with Prophet from 10MB message buffer size.
6.3 Latency Average
Chart- 3: Latency Average
The latency average of MOFO buffer management technique
with Epidemic, Prophet and MaxProp routing protocols under
variable message buffer size is shown in Chart- 3.
1. The Chart 3 depicts that the latency average under
Epidemic and Prophet routing protocols increases with
respect to message buffer size.
2. Whereas latency average under MaxProp increases up to
15MB message buffer size and then declines constantly
with increasing message buffer size.
3. The latency average of MaxProp is higher than Epidemic
and Prophet routing protocols up to 10MB message buffer
size.
4. But as the message buffer size increased, the latency
average under MaxProp drops significantly in contrast to
Epidemic and Prophet routing protocols.
6.4 Hop Count Average
The hop count average of MOFO buffer management
technique with Epidemic, Prophet and MaxProp routing
protocols under variable message buffer size is shown in
Chart- 4.
1. The Chart- describes that the hop count average of MOFO
buffer management technique under all the three routing
protocols increases as the message buffer size increases.
2. The hop count average of MaxProp is higher than
Epidemic and Prophet routing protocols.
3. Hop count average of Prophet is equal with Epidemic up
to 20MB message buffer size, thereafter it gets marginally
lower than Epidemic routing protocols.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 86
Chart- 4: Hop Count Average
7. CONCLUSIONS
This study evaluated the performance of MOFO Buffer
management technique with Epidemic, Prophet and MaxProp
routing protocols under variable message buffer sizes. The
results show that there are clear benefits of increasing the
message buffer size for the parameters Delivery Probability,
Overhead Ratio in case of all the routing protocols under
study. The Delivery Probability, Overhead Ratio and Latency
Time Average of MOFO with MaxProp routing protocol gives
the best results among the three routing protocols under study.
Whereas for the performance metric Hop Count Average,
MOFO with Prophet is better than the other two routing
protocols.
In this study, MOFO buffer management technique with
different routing protocols has been simulated on the ONE
simulator. They have not been deployed on the real network.
There may be a higher significance that this technique and
protocols be tested out on the real network. This study
assumes that all the nodes have unlimited energy. This study
do not considers the energy loss of the network as the message
buffer size increased for all the nodes. Such constraints should
take into account, the energy spent for the network as the
message buffer size increases.
REFERENCES
[1]. A. Vasilakos, Y. Zhang, and T. Spyropolous. Delay
Tolerant Networks: Protocols and Applications. 2009.
[2] Sulma Rashid, Qaisar Ayub, et al. E-DROP: An
Effective Drop Buffer Management Policy for DTN
Routing Protocols. International Journal of Computer
Applications (0975 – 8887) Volume 13– No.7, January
2011
[3] Andrew Michael Grundy. Congestion Control
Framework For Delay-Tolerant Communications. A
Ph.D thesis, University of Nottingham, July 2012
[4] Khalil Massri, Alessandro Vernata, Andrea Vitaletti.
Routing Protocols for Delay Tolerant Networks: a
Quantitative Evaluation. Published in PM2HW2N‟12
Proceedings of the 7th ACM workshop Performance
Monitoring and Measurement of Heterogeneous
Wireless and Wired Networks, 2012, pp 107-114
[5] J. Burgess, B. Gallagher, D. Jensen, B.N. Levine.
MaxProp: Routing for Vehicle-Based Disruption-
Tolerant Networks. Published in INFOCOM 2006,
25th IEEE International Conference on Computer
Communications, pp 1-11.
[6] Priyanka Gururaj Rotti. Opportunistic Lookahead
Routing Protocol For Delay Tolerant Networks. A
Theses submitted in Visvesvaraya Technological
University, 2008 December 2012
[7] J. Sushant, K. Fall, R. Patra. Routing in a Delay
Tolerant Network. Proceedings of the 2004 conference
on Applications, technologies, architectures, and
protocols for computer communications. Vol. 34, No.
4, pp.145-158, 2004.
[8] Evan P.C.Jones, Paul A.S. Ward. Routing Strategies for
Delay-Tolerant Networks. Submitted in the Computer
Communication Review, 2006
[9] Ari Keranen. Opportunistic Network Environment
simulator. Special assignment submitted in Helsiniki
University of Technology, May 29, 2008
[10] Khaled A.Harras. Challenged Networks –Protocol and
Architectural Challenges in Delay and Disruption
Tolerant Networks. A thesis submitted at University of
California in Santa Barbara, 2008.
[11] http://www.netlab.tkk.fi/tutkimus/dtn/theone/ accessed
on October, 2013.
[12] Wenrui Zhao. Routing and Network Design in Delay
Tolerant Networks. A theses presented to the Academic
Faculty of College of Computing, Georgia Institute of
Technology, December 2006.
[13] Evan P.C. Jones. Practical Routing in Delay-Tolerant
Networks. A theses submitted at University of
Waterloo, Ontario, Canada, 2006.
[14] Samo Grasic, Anders Lindgren. An analysis of
Evaluation Practices for DTN Routing Protocols.
Published in CHANTS‟12 Proceedings of the seventh
ACM international workshop on Challenged networks,
2012 pp 57-64.
[15] Jahwan Koo, Seongjin Ahn, Jinwook Chung. A
Comparative Study of Queue, Delay and Loss
Characteristics of AQM Schemes in QOS-Enabled
Networks. Published in Computing and Informatics,
Vol.22, 2003, pp 1001-1019
[16] Hemal Shah, Yogeshwar P. Kosta, Evolution of
Routing Techniques, Routing Protocols and Routing
Efficiencies for Delay Tolerant Network. Published in
IJCA Special Issue on “Mobile Ad-hoc Networks”
MANETs, 2010

More Related Content

What's hot

Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...ijmnct
 
Csit54201
Csit54201Csit54201
Csit54201csandit
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicasIJCNCJournal
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Publishing House
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...eSAT Journals
 
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networksAdvisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networkseSAT Journals
 
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileAdvisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileeSAT Publishing House
 
Enhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networksEnhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networksIRJET Journal
 
Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicastingingenioustech
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]ingenioustech
 
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...Sharif Hossen
 
New strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolNew strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolijwmn
 
Buffer aided relay selection with reduced packet delay in cooprative network
Buffer aided relay selection with reduced packet delay in cooprative networkBuffer aided relay selection with reduced packet delay in cooprative network
Buffer aided relay selection with reduced packet delay in cooprative networkredpel dot com
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...IRJET Journal
 
Multicasting in DTN Networks
Multicasting in DTN Networks Multicasting in DTN Networks
Multicasting in DTN Networks Nagendra Posani
 

What's hot (20)

Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
 
Csit54201
Csit54201Csit54201
Csit54201
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicas
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
 
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
Performance evaluation of rapid and spray and-wait dtn routing protocols unde...
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networksAdvisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
 
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileAdvisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobile
 
Enhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networksEnhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networks
 
Supporting efficient and scalable multicasting
Supporting efficient and scalable multicastingSupporting efficient and scalable multicasting
Supporting efficient and scalable multicasting
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
Conditional%20 shortest%20path%20routing%20in%20delay%20tolerant%20networks[1]
 
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
 
New strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocolNew strategy to optimize the performance of spray and wait routing protocol
New strategy to optimize the performance of spray and wait routing protocol
 
Buffer aided relay selection with reduced packet delay in cooprative network
Buffer aided relay selection with reduced packet delay in cooprative networkBuffer aided relay selection with reduced packet delay in cooprative network
Buffer aided relay selection with reduced packet delay in cooprative network
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
Multicasting in DTN Networks
Multicasting in DTN Networks Multicasting in DTN Networks
Multicasting in DTN Networks
 
Fo35991995
Fo35991995Fo35991995
Fo35991995
 
F0313539
F0313539F0313539
F0313539
 

Viewers also liked

Wireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm moduleWireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm moduleeSAT Journals
 
Community mosque is a symbol of social status – a case of participatory desig...
Community mosque is a symbol of social status – a case of participatory desig...Community mosque is a symbol of social status – a case of participatory desig...
Community mosque is a symbol of social status – a case of participatory desig...eSAT Journals
 
Karim Baina Big Data Seminar ENSIAS December 2016
Karim Baina Big Data Seminar ENSIAS December 2016Karim Baina Big Data Seminar ENSIAS December 2016
Karim Baina Big Data Seminar ENSIAS December 2016Karim Baïna
 
Karim Baïna (ENSIAS) Cloud research opportunities
Karim Baïna (ENSIAS) Cloud research opportunitiesKarim Baïna (ENSIAS) Cloud research opportunities
Karim Baïna (ENSIAS) Cloud research opportunitiesKarim Baïna
 
Open Source as IT and Business Strategy
Open Source as IT and Business StrategyOpen Source as IT and Business Strategy
Open Source as IT and Business StrategyKarim Baïna
 
Karim Baina Big Data ENSIAS December 2016
Karim Baina Big Data ENSIAS December 2016Karim Baina Big Data ENSIAS December 2016
Karim Baina Big Data ENSIAS December 2016Karim Baïna
 

Viewers also liked (6)

Wireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm moduleWireless facsimile connectivity using gsm module
Wireless facsimile connectivity using gsm module
 
Community mosque is a symbol of social status – a case of participatory desig...
Community mosque is a symbol of social status – a case of participatory desig...Community mosque is a symbol of social status – a case of participatory desig...
Community mosque is a symbol of social status – a case of participatory desig...
 
Karim Baina Big Data Seminar ENSIAS December 2016
Karim Baina Big Data Seminar ENSIAS December 2016Karim Baina Big Data Seminar ENSIAS December 2016
Karim Baina Big Data Seminar ENSIAS December 2016
 
Karim Baïna (ENSIAS) Cloud research opportunities
Karim Baïna (ENSIAS) Cloud research opportunitiesKarim Baïna (ENSIAS) Cloud research opportunities
Karim Baïna (ENSIAS) Cloud research opportunities
 
Open Source as IT and Business Strategy
Open Source as IT and Business StrategyOpen Source as IT and Business Strategy
Open Source as IT and Business Strategy
 
Karim Baina Big Data ENSIAS December 2016
Karim Baina Big Data ENSIAS December 2016Karim Baina Big Data ENSIAS December 2016
Karim Baina Big Data ENSIAS December 2016
 

Similar to Performance evaluation of mofo buffer management technique with different routing protocols in dtn under variable message buffer size

Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Haya Saani
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksIJERA Editor
 
IRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
IRJET- Vitality Rooted Modern Trends in Delay Tolerant NetworksIRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
IRJET- Vitality Rooted Modern Trends in Delay Tolerant NetworksIRJET Journal
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...ijasuc
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd Iaetsd
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
DEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTURE
DEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTUREDEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTURE
DEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTUREVLSICS Design
 
Mac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlanMac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlaneSAT Publishing House
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...IEEEGLOBALSOFTTECHNOLOGIES
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 

Similar to Performance evaluation of mofo buffer management technique with different routing protocols in dtn under variable message buffer size (20)

dtn-180110112549.pdf
dtn-180110112549.pdfdtn-180110112549.pdf
dtn-180110112549.pdf
 
Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)Delay Tolerant Network (DTN)
Delay Tolerant Network (DTN)
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant Networks
 
IRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
IRJET- Vitality Rooted Modern Trends in Delay Tolerant NetworksIRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
IRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme via
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
 
P43018691
P43018691P43018691
P43018691
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
DEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTURE
DEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTUREDEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTURE
DEADLOCK RECOVERY TECHNIQUE IN BUS ENHANCED NOC ARCHITECTURE
 
Mac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlanMac protocols for cooperative diversity in wlan
Mac protocols for cooperative diversity in wlan
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 

Performance evaluation of mofo buffer management technique with different routing protocols in dtn under variable message buffer size

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 82 PERFORMANCE EVALUATION OF MOFO BUFFER MANAGEMENT TECHNIQUE WITH DIFFERENT ROUTING PROTOCOLS IN DTN UNDER VARIABLE MESSAGE BUFFER SIZE Anita Rani1 , Sangeeta Rani2 , Harminder Singh Bindra3 1 Student, 2 Teaching Associate, Computer Sci. & Applications Department, Chaudhary Devi Lal University, Haryana, India 3 HOD IT Department, Malout Institute of Management & Information Technology, Punjab, India Abstract Delay Tolerant Networks (DTNs) uses the store-carry-forward scheme for the delivery of the messages, with this way data transmission can be successfully done despite of the absence of continuous end-to-end paths. The opportunities of message forwarding in such types of networks usually are limited due to the absence of contemporaneous paths. In such networks, the “store-carry- forward” methodology is used for the transmission of the messages to be delivered to their intend destinations in a hop by hop manner. It arises many problems like how to schedule the messages, how to drop the messages in the buffer due to the impulsive nature of the nodes. It also arises many challengeable situations like short contact durations between the two nodes, limited storage capacity of nodes and so on. This paper evaluates the performance of MOFO buffer management technique with three routing protocols i.e. Epidemic, Prophet and MaxProp under variable message buffer sizes (5MB to 40MB). Such evaluation can improve the performance of the opportunistic networks by reducing the overhead ratio, enhancing the delivery rate, minimizing latency average and hop count average in a certain degree. So four performance evaluation metrics namely delivery probability, latency average, overhead ratio and hop count average are used in this study. This study uses ONE (Opportunistic Network Environment) simulator for the performance evaluation of the MOFO buffer management technique and routing protocols. The evaluation results shows that the performance of different protocols can benefit to optimizing the performance of delay tolerant networks in terms of delivery probability, Latency average, Overhead ratio and Hop count average of messages with the increase in message buffer size. Finally, this study suggested that which routing protocol is most suitable with MOFO buffer management technique. Keywords: Delay Tolerant Networks, Buffer Management, Routing Protocols, MOFO, Epidemic, Prophet, MaxProp ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION In the present day scenario, rapid rise in the heterogeneous networks has been seen in the wireless communications. The heterogeneous network may be termed as the network, which connects computers and such other devices, which uses different operating systems and communication protocols. Delay Tolerant Network approach addresses the issues that provide communication in the heterogeneous networks. In Delay Tolerant Networks (DTN), there is frequency of disruptions is much higher, as end to end path is not available all the time. Due environment nature of delay tolerant networks like underwater, ocean sensor, deep space, delays can further be extended. In such demanding networking situations, to obtain data delivery researchers have proposed a technique in which the messages is stored into the buffers of the intermediary nodes until it is forwarded to the destination. Thus, in order to obtain the higher delivery probabilities of the messages and reliable communication in such challenging networks, many approaches have been adopted. Several issues like increasing the delivery ratio or minimizing the delivery delays, optimizing resources usage etc. has been the main focused area of the researchers to achieve message delivery probability. Moreover, to increase delivery probability, multiple copies of the messages into the network is done. This arrangement of long-standing storage and duplication results in high storage overhead on the network. Therefore, efficient buffer management policies are required, which decides that what messages must be dropped, while node buffers are overflowed [2]. In this paper, we have evaluated the performance of MOFO buffer management technique with Epidemic, Prophet and MaxProp routing protocols under variable message buffer size. The performance metrics chosen for the evaluation of these routing protocols is delivery probability, overhead ratio, hop count average and latency time average. The tool used for the simulation is Opportunistic Network Environment. Simulation setup for the study is given in the Table-1 in Section 4.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 83 2. BUFFER MANAGEMENT TECHNIQUES Buffer Management technology is a fundamental approach that manages the various resources among different situations as per the technique used. An efficient buffer management technique decides at each step that which of the messages is to be dropped first, when the buffer is full likewise which messages are to be transmitted, when bandwidth is limited. Some of the popular buffer management techniques are as follows: 2.1 Drop Least Recently Received (DLR) In DLR technique as the name implies, the message which is staying for a long time in the buffer will be dropped first. As it has the less probability to be conceded to the other nodes [2]. 2.2 Drop Oldest (DOA) In DOA technique, the message with the shortest remaining life time (TTL) is dropped first. The idea behind dropping such messages is that the messages whose TTL is small, then these are in the network from a long period of time and thus has the high probability to be already delivered [2]. 2.3 Drop Front (DF) FIFO This technique drops the messages on the basis of the order in which they entered into the buffer, for example the first message that entered the queue will be the first to be dropped [3]. 2.4 Drop Largest (DLA) In Drop Largest (DLA) buffer management technique message having large size will be selected in order to drop [2]. 2.5 MOFO (Evict Most Forwarded First) MOFO attempts to maximise the propagation of the messages through the network by dropping those messages that have been forwarded the maximum number of time. In such way the messages with lower hop count enables to travel further within the network [3]. 2.6 DL-Drop Last The newly received message is first removed simply. 2.7 MOPR (Evict Most Favorably Forwarded First) MOPR maintains the value of each message in its queue. Thus each time when a message is replicated the value in the message is increased based on the predictability of the message being delivered, thus the message with the highest value is dropped first [3]. 2.8 SHLI (Evict Shortest Life Time First) This technique uses the timeout value of the message, which indicates that when it is no longer useful, such that a message with the shortest remaining life time is dropped first [3]. 2.9 LEPR (Evict Least Probable First) This technique works by a node ranking the messages within its buffer based on the predicted probability of delivery, the message with the lowest probability is dropped first [3]. This study evaluates the performance of MOFO buffer management technique on the basis of metrics, delivery probability, overheads ratio, latency time average and hop count average. 3. ROUTING PROTOCOLS USED 3.1 Epidemic Routing protocol In DTN, among all the routing protocols, Epidemic routing protocol is the leading protocol. This protocol is flooding based in nature as all the nodes continuously replicate and transmit the messages to the adjacent nodes that do not already have a copy of the message. Using this protocol, when a node comes into the contact of other node, it checks whether the new node has the copy of this message or not. If it does not have, then the new message is forwarded to that node. This protocol uses the summary vectors for this task. The node exchanges their summary vectors when they comes in the communication range of each other to decide which message have not been seen by that node. Host request for a copy of a message which it has not seen yet. The receiving host has the complete autonomy to reject or accept the message [6]. 3.2 PRoPHET Routing Protocol Epidemic routing protocol is a resource hungry protocol because it makes no attempt to remove the replications deliberately that would be unlikely to increase the delivery probability of the messages. Such type of strategy is more effective if the opportunities of delivering the messages encounters between the nodes are purely random, but in realistic circumstances, meeting of nodes are rarely totally random. Data Mules such as human beings moves in the society and have higher probabilities of meeting the certain Mules than others. The PRoPHET (Probabilistic Routing Protocol using History of Encounters and Transitivity) protocol used an algorithm that attempts to use the non randomness of the real-world encounters by maintaining the set of probabilities for a successful delivery to the known destinations in DTN [4]. 3.3 MaxProp Routing Protocol MaxProp routing protocol is a flooding-based protocol by nature. In MaxProp if a contact is occurred, then all the
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 84 messages not held by the contact will be replicated and transferred. The MaxProp routing protocol intelligently determines that which messages should be transmitted first and which of the messages should be dropped first. Here an ordered queue is maintained by this protocol based on the destination of each message, ordered by the probability of a future transitive path to that particular destination. When two nodes meet each other, firstly, they exchange their estimated node meeting likelihood vectors. Preferably, each node will have an up to date vector from every other node. With these „n‟ vectors at hand, the node can compute the shortest path on the basis of a depth-first search where path weights indicate the probability that the link does not occur [5]. 4. SIMULATION SETUP The performance of MOFO buffer management technique with different routing protocols is analyzed through simulation using the Opportunistic Network Environment (ONE). The ONE simulator is an agent based discrete event simulation engine. The main functionality of the ONE consists of the modeling of the node movement, inter node contacts using various interfaces, routing, message handling and application interactions. The simulator is configured using text based configuration files that contains the simulation, event generation and reporting parameters. This file also has the defining parameters for the nodes like the storage capability, transmit range, bit rates as well as the routing model to use. Table 1 summarizes the simulation configuration used for the current analysis. 5. PERFORMANCE METRICS The following are the performance metrics used for the analysis: Table -1 Simulation Setup of the Study 5.1 Delivery Probability The delivery probability is the amount of the fraction of all the created packets that are successfully delivered to its destination. This is the ratio of the total number of packets that are delivered to their destinations against the total number of packets that are created. Thus this is a direct measurement of how reliably packets are routed in the network by a routing protocol under consideration [6]. 5.2 Overhead Ratio The overhead ratio is calculated using the following equation: Overhead ratio = (Number of relayed messages – Number of delivered messages) / Number of delivered messages Here, the term relayed messages refers to the messages that have been forwarded by the source to an intermediate node to be forwarded towards the destination. This number is a measure for the number of packets or copies of packets that have been inducted into the network. The number of delivered messages refers to the total number of created packets that are successfully delivered to the destination. The overhead ratio also shows the amount of the network resources required to deliver a packet from source to its destination [6]. 5.3 Latency Average The latency measured here is the time that elapses between the creation of a message and its delivery at its destination. This study considers the average of the latency of the packets over the entire simulation time. This is the time as calculated for the delivered packets only. In most protocols, it is desired that the value of latency time average is low. In the DTNs environment the latency is acceptable at some extent [6]. 5.4 HopCount Average It is the mean hops which a message takes to reach its destination 6. RESULTS AND DISCUSSION 6.1 Delivery Probability The delivery probability of MOFO buffer management technique with Epidemic, Prophet and MaxProp routing protocols under variable message buffer size is shown in Chart 1. 1. The Chart shows that the delivery probability of all the three routing protocols under MOFO buffer management technique increase as the message buffer size increases.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 85 Chart- 1: Delivery Probability 2. The overlapping lines of Epidemic and Prophet shows that delivery probability of Epidemic and Prophet are same at a particular message buffer size 3. Whereas the delivery probability of MaxProp is much higher than Epidemic and Prophet routing protocols at all the message buffer sizes. 6.2 Overhead Ratio The overhead ratio of MOFO buffer management technique with Epidemic, Prophet and MaxProp routing protocols under variable message buffer size is shown in Chart- 2. 1. The Chart 2 clearly demonstrate that the overhead ratio under all the three protocols falls sharply as the message buffer size increased from 5MB to 10MB. Chart- 2: Overhead Ratio 2. As the message buffer size increased further, the decline in overhead ratio under all the three routing protocols continues very slowly. 3. Overhead ratio under MaxProp is lower than Epidemic and Prophet routing protocols. 4. Overhead ratio under Epidemic is much higher than Prophet and MaxProp at 5MB, but becomes equals with Prophet from 10MB message buffer size. 6.3 Latency Average Chart- 3: Latency Average The latency average of MOFO buffer management technique with Epidemic, Prophet and MaxProp routing protocols under variable message buffer size is shown in Chart- 3. 1. The Chart 3 depicts that the latency average under Epidemic and Prophet routing protocols increases with respect to message buffer size. 2. Whereas latency average under MaxProp increases up to 15MB message buffer size and then declines constantly with increasing message buffer size. 3. The latency average of MaxProp is higher than Epidemic and Prophet routing protocols up to 10MB message buffer size. 4. But as the message buffer size increased, the latency average under MaxProp drops significantly in contrast to Epidemic and Prophet routing protocols. 6.4 Hop Count Average The hop count average of MOFO buffer management technique with Epidemic, Prophet and MaxProp routing protocols under variable message buffer size is shown in Chart- 4. 1. The Chart- describes that the hop count average of MOFO buffer management technique under all the three routing protocols increases as the message buffer size increases. 2. The hop count average of MaxProp is higher than Epidemic and Prophet routing protocols. 3. Hop count average of Prophet is equal with Epidemic up to 20MB message buffer size, thereafter it gets marginally lower than Epidemic routing protocols.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 86 Chart- 4: Hop Count Average 7. CONCLUSIONS This study evaluated the performance of MOFO Buffer management technique with Epidemic, Prophet and MaxProp routing protocols under variable message buffer sizes. The results show that there are clear benefits of increasing the message buffer size for the parameters Delivery Probability, Overhead Ratio in case of all the routing protocols under study. The Delivery Probability, Overhead Ratio and Latency Time Average of MOFO with MaxProp routing protocol gives the best results among the three routing protocols under study. Whereas for the performance metric Hop Count Average, MOFO with Prophet is better than the other two routing protocols. In this study, MOFO buffer management technique with different routing protocols has been simulated on the ONE simulator. They have not been deployed on the real network. There may be a higher significance that this technique and protocols be tested out on the real network. This study assumes that all the nodes have unlimited energy. This study do not considers the energy loss of the network as the message buffer size increased for all the nodes. Such constraints should take into account, the energy spent for the network as the message buffer size increases. REFERENCES [1]. A. Vasilakos, Y. Zhang, and T. Spyropolous. Delay Tolerant Networks: Protocols and Applications. 2009. [2] Sulma Rashid, Qaisar Ayub, et al. E-DROP: An Effective Drop Buffer Management Policy for DTN Routing Protocols. International Journal of Computer Applications (0975 – 8887) Volume 13– No.7, January 2011 [3] Andrew Michael Grundy. Congestion Control Framework For Delay-Tolerant Communications. A Ph.D thesis, University of Nottingham, July 2012 [4] Khalil Massri, Alessandro Vernata, Andrea Vitaletti. Routing Protocols for Delay Tolerant Networks: a Quantitative Evaluation. Published in PM2HW2N‟12 Proceedings of the 7th ACM workshop Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2012, pp 107-114 [5] J. Burgess, B. Gallagher, D. Jensen, B.N. Levine. MaxProp: Routing for Vehicle-Based Disruption- Tolerant Networks. Published in INFOCOM 2006, 25th IEEE International Conference on Computer Communications, pp 1-11. [6] Priyanka Gururaj Rotti. Opportunistic Lookahead Routing Protocol For Delay Tolerant Networks. A Theses submitted in Visvesvaraya Technological University, 2008 December 2012 [7] J. Sushant, K. Fall, R. Patra. Routing in a Delay Tolerant Network. Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications. Vol. 34, No. 4, pp.145-158, 2004. [8] Evan P.C.Jones, Paul A.S. Ward. Routing Strategies for Delay-Tolerant Networks. Submitted in the Computer Communication Review, 2006 [9] Ari Keranen. Opportunistic Network Environment simulator. Special assignment submitted in Helsiniki University of Technology, May 29, 2008 [10] Khaled A.Harras. Challenged Networks –Protocol and Architectural Challenges in Delay and Disruption Tolerant Networks. A thesis submitted at University of California in Santa Barbara, 2008. [11] http://www.netlab.tkk.fi/tutkimus/dtn/theone/ accessed on October, 2013. [12] Wenrui Zhao. Routing and Network Design in Delay Tolerant Networks. A theses presented to the Academic Faculty of College of Computing, Georgia Institute of Technology, December 2006. [13] Evan P.C. Jones. Practical Routing in Delay-Tolerant Networks. A theses submitted at University of Waterloo, Ontario, Canada, 2006. [14] Samo Grasic, Anders Lindgren. An analysis of Evaluation Practices for DTN Routing Protocols. Published in CHANTS‟12 Proceedings of the seventh ACM international workshop on Challenged networks, 2012 pp 57-64. [15] Jahwan Koo, Seongjin Ahn, Jinwook Chung. A Comparative Study of Queue, Delay and Loss Characteristics of AQM Schemes in QOS-Enabled Networks. Published in Computing and Informatics, Vol.22, 2003, pp 1001-1019 [16] Hemal Shah, Yogeshwar P. Kosta, Evolution of Routing Techniques, Routing Protocols and Routing Efficiencies for Delay Tolerant Network. Published in IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010