SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015
DOI:10.5121/ijcsit.2015.7609 107
A ROUTING MECHANISM BASED ON SOCIAL
NETWORKS AND BETWEENNESS CENTRALITY IN
DELAY-TOLERANT NETWORKS
Zhang Huijuan and Liu Kai
School of Software Engineering, Tongji University, Shanghai, China
ABSTRACT
With the growing popularity of mobile smart devices, the existing networks are unable to meet the
requirement of many complex scenarios; current network architectures and protocols do not work well with
the network with high latency and frequent disconnections. To improve the performance of these networks
some scholars opened up a new research field, delay-tolerant networks, in which one of the important
research subjects is the forwarding and routing mechanism of data packets. This paper presents a routing
scheme based on social networks owing to the fact that nodes in computer networks and social networks
have high behavioural similarity. To further improve efficiency this paper also suggests a mechanism,
which is the improved version of an existing betweenness centrality based routing algorithm [1]. The
experiments showed that the proposed scheme has better performance than the existing friendship routing
algorithms.
KEYWORDS
Delay-Tolerant Network, Social Network, Routing Mechanism.
1. INTRODUCTION
The existing TCP/IP protocols guarantee stable and efficient data transmission, based on the
following premises [2]:
1) There is at least one end-to-end path between data source and destination.
2) The maximum round-trip time (RTT) between any node in the network is not excessive.
3) The packet loss rate is relatively low.
Unfortunately, a class of challenged network, which don’t meet the above conditions, may not
able to be served well by the current TCP/IP model. For instance, some networks may not have
sufficient energy supply, some nodes in the network may not have enough storage space to relay
the data packets, data source may not have stable end-to-end paths to its peers, or the networks
with latency, which always cause unacceptable delays. All these examples bring new challenges
to current network technology.
To solve such kind of problems, K. Fall demonstrates new network architecture, delay-tolerant
network (DTN) at SIGCOMM 2003 [3]. Delay-tolerant networks refer to the networks, which
cannot have a stable end-to-end path for various reasons; the status of the networks may even
appear as disconnected most of the time. Compared with the traditional network architecture,
DTN has such characteristics as self-organized and dynamic topology. Therefore, an efficient
store-carry-forward routing scheme is essential to DTNs.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015
108
Many studies have shown that the movements of nodes in social networks and DTNs are based on
similar motion patterns; nodes tent to have mobility patterns influenced by their social
relationships or social behaviour [4]. It may be possible to improve DTN routing efficiency by
increasing the priorities of some nodes that are much socially related.
In most sociality-based DTNs, nodes meet other nodes then store the contact information. Some
existing methods analyse social relationship of nodes based on such kind of contact history. E.
Bulut et al. introduced a new metric to detect the quality of friendships of each node accurately
[5]. They calculate the link weights between each pair of nodes then construct a friendship
network based on the link weights. A sociality-based routing scheme, Friendship Routing, which
utilizes such friendship network to make the forwarding decisions of data packets. C. M. Kim et
al. present a routing strategy which uses expanded ego-network betweenness centrality when a
relay node is selected [1].
In this paper, we propose a routing scheme in which each node determines the data packet’s next
hop based on the contact history. Endpoint-biased expanded ego-network betweenness centrality
is used to enhance the overall routing efficiency. We also demonstrated the proposed scheme has
better performance than the existing friendship routing algorithm.
The rest of this paper is organized as follows. Section 2 explains how to construct the social
network and the detailed definition of betweenness centralities (Primitive, Expanded Ego; Section
3 presents the proposed routing scheme; Section 4 shows the simulation analysis and the Section
5 concludes the paper.
2. VIRTUAL SOCIAL NETWORK CONSTRUCTION
We suppose the nodes in DTNs keep moving in a long time frame. Here we assume the
transmission range of a node is r. A node i encounters another node j when these two nodes are
within transmission range r from each other; node i receives a first hello message broadcasted by
node j at the moment. If node i and node j stay within the transmission range of each other, both
will get a periodic hello message from its peer. We consider node i leaves node j if node i does
not hear a predefined number of hello messages from node j continuously. If node i encounters
node j at time tc and leaves node j at time ts, we define tc – ts as the contact duration of node i for
node j.
2.1. Social Network Based on Contact History
We assume every node in DTNs records the contact duration information when it encounters
every other node, i.e., in a DTN with n nodes, every node should keep contact history for other n-
1 nodes in its buffer. Each node allocates contact windows in its buffer, whose size is called
contact window size Ws which is predefined by the node. Within the range Ws a node keeps its
contact duration for other node it has encountered respectively. As time passed the contact
window slides by one-unit time, e.g., one second, to keep the recorded contact information latest.
The weight of the link between node i and node j at time t, wi,j, is defined by the following
formula:
,
where f(t) means the remaining time to the first encounter of the node j after time t.
We consider that node i and node j have a stable relationship if the weight wi,j is larger than the
predefined threshold Th; an edge between node i and node j is created in two nodes’ social
International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015
109
networks SNi and SNj in this case. Also, node i is added to SNj and node j is added to SNi. Node i
and node j exchange its social network information with each other through hello messages
periodically. The algorithm 1 represents the social network construction procedure, where Vi and
Ei means set of nodes and edges in SNi, and Ni means set of 1-hop neighbour nodes of node i.
Algorithm 1 Social Network Construction Procedure For Node i
1: Slide its contact window by a unit time
2: for a node j which the node i has at least one contact with do
3: if Wi,j > Th then
4: Vi ∪{j}, Ei ∪{(i, j)}
5: if Nj ̸= ∅ then
6: Vi = Vi ∪ Nj
7: Ei = Ei ∪{(j, k)} for k ∈ Nj
8: end if
9: else
10: if j ∈ Vi then
11: Vi = Vi −{j} − (Nj − Ni)
12: Ei = Ei − {(i, j)}, Ei = Ei −{(j, k)} for k ∈ Nj
13: end if
14: end if
15: end for
2.2. Expanded Ego Betweenness Centrality
Centrality is a core concept for the analysis of social networks, and betweenness is one of the
most prominent measures of centrality. It was introduced independently by Anthonisse (1971)
and Freeman (1977), and measures the degree to which a vertex is in a position of brokerage by
summing up the fractions of shortest paths between other pairs of vertices that pass through it [6].
We use the betweenness centrality to increase routing efficiency of DTNs. For node i in network,
betweenness centrality CB(i) is defined as follows:
,
where V is the set of nodes in network, ρst is the number of shortest paths between the node s and
t, and ρst (i) is the number of those shortest paths that include the node i. Due to lack of the whole
network-wide end-to-end connectivity, it is hard to utilize the betweenness centrality in DTNs,
which requires the entire network information. However, we can use the expanded ego
betweenness, which is calculated only with the local information [7].
International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015
110
Figure 1. Expanded Ego Network
Figure 1 illustrates an expanded ego network of node i, which is constituted by the ego (node i),
its 1-hop neighbours and its 2-hop neighbours. While solid links presents the ego network
introduced in [8,9], the entire expanded ego network (Figure 1) is constructed by algorithm 1.
Y.H. Kim et al. verified that the expanded ego betweenness centrality is highly correlated with
the betweenness centrality in a complete network [7]. Hence we use expanded ego betweenness
centrality instead in subsequent studies.
2.3. Endpoint Biased Expanded Ego Betweenness Centrality
In some cases, it may be inappropriate to have pairs of vertices depend on intermediaries, but not
on themselves (or at least one of them as the source or target). In an information exchange
network, for instance, one might argue that the source of information has just as much control
over its content as anyone passing it on [6]. So that we have the following formula:
For the above-mentioned reasons this routing strategy should also be used in ego betweenness
networks. The following section will illustrate its performance.
3. ROUTING STRATEGY
In our algorithm, the following steps are required for a node before making routing decisions:
1) Calculate the link weight based on the contact history recorded for other encountered nodes.
2) Construct the virtual social network.
3) Calculate the expanded ego betweenness centrality.
Then a node can make decision on a relay node when it tries send messages to the destination.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015
111
3.1. Link Weight Based Strategy
Imagine the following scenario: node i tries to send a message to node k and it just contacts with
node j; now node i has to make a decision if it should forward the message to node j. At this time,
node i compares two link weight values wi,k and wj,k. Higher link weight value indicates the
corresponding two nodes are more friendly and it is more possible for these two nodes to meet
again. Node i forward the data packet to node j if the following condition is met.
Condition I: wi,k > wj,k
3.2. Expanded Ego Betweenness Centrality Based Strategy
We also use expanded ego betweenness centrality to increase the overall routing efficiency. In
DTNs some nodes may have quite low link weights for they hardly meet other nodes. Using link
weight based strategy some nodes may not find a proper relay if the destination node is one of
these isolated nodes. Under the circumstances, the data packet could be removing from the
sender’s buffer by TTL expiration before delivered to the destination. To prevent this situation
node j sends the message to node j if CB(j) is larger than CB(i) even though Condition I is not met.
The second condition for message forwarding is as follow.
Condition II: CB(j) > CB(i)
3.3. Endpoint Biased Expanded Ego Betweenness Centrality Based Strategy
For the same reasons discussed in previous sub-section, node j sends the message to node j if
CEB(j) is larger than CEB(i) even though Condition I is not met, if network adopts the modified
version (endpoint biased) of expanded ego betweenness centrality based strategy. So we have the
Condition III:
Condition III: CEB(j) > CEB(i)
In later sections we will also focus on the performance differences of strategies mentioned in sub-
sections 3.2 and 3.3.
3.4. Message Delivery Cost Reduction Mechanism
This sub-section proposes a mechanism to reduce the node’s buffer consumption. If there is a data
packet in node i’s buffer, which is destined to send to node k, and node i just contact with node j
which satisfies wj,k > wi,k, node i will forward the message to node j. Under the circumstances if
wj,k is the largest among the link weights between other nodes in SNi, node i deletes this data
packet after forwarding the message to prevent further dissemination. Algorithm 2 illustrates in
detail this message delivery cost reduction mechanism.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015
112
Algorithm 2 Message Forwarding Procedure
1: upon reception of a Hello message from a node j do
2: if j ∈ SNi then
3: if wj,k > wi,k then
4: forward the message destined for the node k to the node j
5: if wj,k > wm,k for all m ∈ SNi then
6: delete the message destined for the node k from the node i’s buffer
7: end if
8: else if CB(j) > CB(i) then
9: forward the message destined for the node k to the node j
10: end if
11: end if
4. PERFORMANCE EVALUATION
In this section, we provide simulation results for two proposed schemes, and compare them with
the epidemic [10] and the friendship [5] routing schemes. Proposed Algorithm I refers to the
scheme based on link weight and expanded ego betweenness centrality; Proposed Algorithm II is
the scheme based on link weight and endpoint biased expanded ego betweenness centrality. The
following metrics are used to measure the performance of various schemes:
1) Message delivery ratio.
2) Message delivery cost.
3) Message delivery efficiency.
The message delivery ratio is the proportion of messages that destinations successfully received
among the total messages generated by source nodes. The delivery cost is the average number of
forwards done during the simulation. The delivery efficiency is defined as the ratio of delivery
ratio to the delivery cost.
Our simulation is based on predefined node mobility data; all nodes in the network record contact
information during the simulation. We generated 1000 messages, each from a node to a random
destination after Ws period of time. All the data packets are given a certain TTL value; any TTL-
expired packet will be removed from buffer. The simulation ended when 1000 messages are
delivered successfully or expired. All results are averages over 10 runs. Table 1 gives the
parameters.
Table 1. Simulation Parameters
Area Size(m) 1000 * 1500
Number of Nodes 25, 75
Communication Range (m) 3
Moving Speed (m/s) 0.5, 1.0, 1.25, 1.5
Contact Window Size (Ws, second) 600
TTL (second) 60, 120, 180, 240, 300, 360
Threshold (Th) 0.01
Number of Messages 1000
International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015
113
(a) N = 25
(b) N = 75
Figure 2. Delivery Ratio
Figure 2 shows the delivery ratios achieved by each routing schemes. As TTL increases, all the
schemes tend to have higher success rate of delivering. Epidemic routing scheme has the highest
delivery ratio as expected. It is noteworthy that the rest schemes have similar performance.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015
114
(a) N = 25
(b) N = 75
Figure 3. Delivery Cost
Figure 3 shows the delivery cost achieved by each schemes. Epidemic routing scheme has the
worst performance for the delivery cost because it uses flooding strategy. We can also see both
two proposed schemes perform better than friendship routing scheme.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015
115
(a) N = 25
(b) N = 75
Figure 4. Delivery Efficiency
Figure 4 shows the delivery efficiency achieved by each schemes. We can see two proposed
schemes have better routing efficiency than epidemic and friendship routing schemes. Compared
to the friendship routing schemes, our schemes have higher efficiency by reducing the delivery
cost with similar delivery ratio. It is also noted that Proposed Algorithm I performs slightly better
than Proposed Algorithm II in a small DTN (N = 25).
5. CONCLUSIONS
In this paper we introduced a routing mechanism and its variation in delay-tolerant networks, in
which each node forwards their messages to nodes that contain the destination node in their
friendship communities. We evaluated our schemes through simulations using predefined node
International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015
116
mobility data, and demonstrated that our schemes achieved higher efficiency than two routing
schemes proposed previously.
ACKNOWLEDGEMENTS
The main research is supported by National Natural Science Foundation of China.
REFERENCES
[1] Kim, Chan-Myung, et al. "An efficient routing scheme based on social relations in delay-tolerant
networks." Ubiquitous information technologies and applications. Springer Berlin Heidelberg, 2014.
533-540.
[2] Fan, Xiu-mei, et al. "State-of-the-art of the architecture and techniques for delay-tolerant networks."
Acta Electronica Sinica 36.1 (2008): 161.
[3] Fall, Kevin. Delay-tolerant network architecture for challenged internets." Proceedings of the 2003
conference on Applications, technologies, architectures, and protocols for computer communications.
ACM, 2003.
[4] Gao, Wei, et al. "Multicasting in delay tolerant networks: a social network perspective." Proceedings
of the tenth ACM international symposium on Mobile ad hoc networking and computing. ACM,
2009.
[5] Bulut, Eyuphan, and Boleslaw K. Szymanski. "Friendship based routing in delay tolerant mobile
social networks." Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE. IEEE,
2010.
[6] Brandes, Ulrik. "On variants of shortest-path betweenness centrality and their generic computation."
Social Networks 30.2 (2008): 136-145.
[7] Kim, Yong-hwan, et al. "Betweenness of expanded Ego networks in sociality-aware delay tolerant
networks." Ubiquitous Information Technologies and Applications. Springer Netherlands, 2013. 499-
505.
[8] Everett, Martin, and Stephen P. Borgatti. "Ego network betweenness." Social networks 27.1 (2005):
31-38.
[9] Odella, Francesca. "Using Ego-networks in surveys: methodological and research issues."
Proceedings of International Conference on Network Science. 2006.
[10] Vahdat, Amin, and David Becker. Epidemic routing for partially connected ad hoc networks.
Technical Report CS-200006, Duke University, 2000.

More Related Content

What's hot

CORRELATION AND REGRESSION ANALYSIS FOR NODE BETWEENNESS CENTRALITY
CORRELATION AND REGRESSION ANALYSIS FOR NODE BETWEENNESS CENTRALITYCORRELATION AND REGRESSION ANALYSIS FOR NODE BETWEENNESS CENTRALITY
CORRELATION AND REGRESSION ANALYSIS FOR NODE BETWEENNESS CENTRALITYijfcstjournal
 
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...ijwmn
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...eSAT Journals
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...ijasuc
 
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkA Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkIOSR Journals
 
Sector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networksSector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networksijwmn
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approachijasuc
 
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor NetworksA Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor Networksijeei-iaes
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Spacencct
 
Impact of static nodes and pause
Impact of static nodes and pauseImpact of static nodes and pause
Impact of static nodes and pauseijwmn
 
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...ijwmn
 

What's hot (12)

CORRELATION AND REGRESSION ANALYSIS FOR NODE BETWEENNESS CENTRALITY
CORRELATION AND REGRESSION ANALYSIS FOR NODE BETWEENNESS CENTRALITYCORRELATION AND REGRESSION ANALYSIS FOR NODE BETWEENNESS CENTRALITY
CORRELATION AND REGRESSION ANALYSIS FOR NODE BETWEENNESS CENTRALITY
 
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
 
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkA Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
 
Sector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networksSector based multicast routing algorithm for mobile ad hoc networks
Sector based multicast routing algorithm for mobile ad hoc networks
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
 
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor NetworksA Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
 
Impact of static nodes and pause
Impact of static nodes and pauseImpact of static nodes and pause
Impact of static nodes and pause
 
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
 

Viewers also liked

ARABIC LANGUAGE CHALLENGES IN TEXT BASED CONVERSATIONAL AGENTS COMPARED TO TH...
ARABIC LANGUAGE CHALLENGES IN TEXT BASED CONVERSATIONAL AGENTS COMPARED TO TH...ARABIC LANGUAGE CHALLENGES IN TEXT BASED CONVERSATIONAL AGENTS COMPARED TO TH...
ARABIC LANGUAGE CHALLENGES IN TEXT BASED CONVERSATIONAL AGENTS COMPARED TO TH...ijcsit
 
P REDICTION F OR S HORT -T ERM T RAFFIC F LOW B ASED O N O PTIMIZED W...
P REDICTION  F OR  S HORT -T ERM  T RAFFIC  F LOW  B ASED  O N  O PTIMIZED  W...P REDICTION  F OR  S HORT -T ERM  T RAFFIC  F LOW  B ASED  O N  O PTIMIZED  W...
P REDICTION F OR S HORT -T ERM T RAFFIC F LOW B ASED O N O PTIMIZED W...ijcsit
 
Shape based plagiarism detection for flowchart figures in texts
Shape based plagiarism detection for flowchart figures in textsShape based plagiarism detection for flowchart figures in texts
Shape based plagiarism detection for flowchart figures in textsijcsit
 
Molecular Solutions For The Set-Partition Problem On Dna-Based Computing
Molecular Solutions For The Set-Partition Problem On Dna-Based ComputingMolecular Solutions For The Set-Partition Problem On Dna-Based Computing
Molecular Solutions For The Set-Partition Problem On Dna-Based Computingijcsit
 
Building A Web Observatory Extension: Schema.org
Building A Web Observatory Extension: Schema.orgBuilding A Web Observatory Extension: Schema.org
Building A Web Observatory Extension: Schema.orggloriakt
 
Survey of the Euro Currency Fluctuation by Using Data Mining
Survey of the Euro Currency Fluctuation by Using Data MiningSurvey of the Euro Currency Fluctuation by Using Data Mining
Survey of the Euro Currency Fluctuation by Using Data Miningijcsit
 
Quantum Leap Opening Remarks
Quantum Leap   Opening RemarksQuantum Leap   Opening Remarks
Quantum Leap Opening RemarksRichwell Phinias
 
Top 7 hr assistant interview questions answers
Top 7 hr assistant interview questions answersTop 7 hr assistant interview questions answers
Top 7 hr assistant interview questions answersjob-interview-questions
 
Website to get more followers
Website to get more followersWebsite to get more followers
Website to get more followersmandy365
 
Massive parallelism with gpus for centrality ranking in complex networks
Massive parallelism with gpus for centrality ranking in complex networksMassive parallelism with gpus for centrality ranking in complex networks
Massive parallelism with gpus for centrality ranking in complex networksijcsit
 
Websites to gain more followers on keek
Websites to gain more followers on keekWebsites to gain more followers on keek
Websites to gain more followers on keekmandy365
 
R ESEARCH ON D ECISION M AKING R EGARDING H IGH - BUSINESS - STRATEGY C ...
R ESEARCH ON  D ECISION  M AKING  R EGARDING  H IGH - BUSINESS - STRATEGY  C ...R ESEARCH ON  D ECISION  M AKING  R EGARDING  H IGH - BUSINESS - STRATEGY  C ...
R ESEARCH ON D ECISION M AKING R EGARDING H IGH - BUSINESS - STRATEGY C ...ijcsit
 

Viewers also liked (13)

ARABIC LANGUAGE CHALLENGES IN TEXT BASED CONVERSATIONAL AGENTS COMPARED TO TH...
ARABIC LANGUAGE CHALLENGES IN TEXT BASED CONVERSATIONAL AGENTS COMPARED TO TH...ARABIC LANGUAGE CHALLENGES IN TEXT BASED CONVERSATIONAL AGENTS COMPARED TO TH...
ARABIC LANGUAGE CHALLENGES IN TEXT BASED CONVERSATIONAL AGENTS COMPARED TO TH...
 
P REDICTION F OR S HORT -T ERM T RAFFIC F LOW B ASED O N O PTIMIZED W...
P REDICTION  F OR  S HORT -T ERM  T RAFFIC  F LOW  B ASED  O N  O PTIMIZED  W...P REDICTION  F OR  S HORT -T ERM  T RAFFIC  F LOW  B ASED  O N  O PTIMIZED  W...
P REDICTION F OR S HORT -T ERM T RAFFIC F LOW B ASED O N O PTIMIZED W...
 
Shape based plagiarism detection for flowchart figures in texts
Shape based plagiarism detection for flowchart figures in textsShape based plagiarism detection for flowchart figures in texts
Shape based plagiarism detection for flowchart figures in texts
 
Molecular Solutions For The Set-Partition Problem On Dna-Based Computing
Molecular Solutions For The Set-Partition Problem On Dna-Based ComputingMolecular Solutions For The Set-Partition Problem On Dna-Based Computing
Molecular Solutions For The Set-Partition Problem On Dna-Based Computing
 
Building A Web Observatory Extension: Schema.org
Building A Web Observatory Extension: Schema.orgBuilding A Web Observatory Extension: Schema.org
Building A Web Observatory Extension: Schema.org
 
Survey of the Euro Currency Fluctuation by Using Data Mining
Survey of the Euro Currency Fluctuation by Using Data MiningSurvey of the Euro Currency Fluctuation by Using Data Mining
Survey of the Euro Currency Fluctuation by Using Data Mining
 
YNC presentation
YNC presentationYNC presentation
YNC presentation
 
Quantum Leap Opening Remarks
Quantum Leap   Opening RemarksQuantum Leap   Opening Remarks
Quantum Leap Opening Remarks
 
Top 7 hr assistant interview questions answers
Top 7 hr assistant interview questions answersTop 7 hr assistant interview questions answers
Top 7 hr assistant interview questions answers
 
Website to get more followers
Website to get more followersWebsite to get more followers
Website to get more followers
 
Massive parallelism with gpus for centrality ranking in complex networks
Massive parallelism with gpus for centrality ranking in complex networksMassive parallelism with gpus for centrality ranking in complex networks
Massive parallelism with gpus for centrality ranking in complex networks
 
Websites to gain more followers on keek
Websites to gain more followers on keekWebsites to gain more followers on keek
Websites to gain more followers on keek
 
R ESEARCH ON D ECISION M AKING R EGARDING H IGH - BUSINESS - STRATEGY C ...
R ESEARCH ON  D ECISION  M AKING  R EGARDING  H IGH - BUSINESS - STRATEGY  C ...R ESEARCH ON  D ECISION  M AKING  R EGARDING  H IGH - BUSINESS - STRATEGY  C ...
R ESEARCH ON D ECISION M AKING R EGARDING H IGH - BUSINESS - STRATEGY C ...
 

Similar to A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKSEVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKSAIRCC Publishing Corporation
 
Centrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksCentrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksIJERA Editor
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...IJECEIAES
 
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...IJNSA Journal
 
Effective load balancing method in ad hoc
Effective load balancing method in ad hocEffective load balancing method in ad hoc
Effective load balancing method in ad hocijmnct
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approachjake henry
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approachijasuc
 
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACHAN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACHijasuc
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshIJCNCJournal
 
Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...redpel dot com
 
Using spectral radius ratio for node degree
Using spectral radius ratio for node degreeUsing spectral radius ratio for node degree
Using spectral radius ratio for node degreeIJCNCJournal
 
An efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsAn efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsredpel dot com
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...IRJET Journal
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...inventionjournals
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...ijasuc
 

Similar to A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS (20)

EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKSEVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
 
Node similarity
Node similarityNode similarity
Node similarity
 
Centrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksCentrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social Networks
 
D0441722
D0441722D0441722
D0441722
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
 
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...
 
Effective load balancing method in ad hoc
Effective load balancing method in ad hocEffective load balancing method in ad hoc
Effective load balancing method in ad hoc
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
 
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACHAN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
AN OPPORTUNISTIC AODV ROUTING SCHEME: A COGNITIVE MOBILE AGENTS APPROACH
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d mesh
 
D0431013019
D0431013019D0431013019
D0431013019
 
Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...
 
Using spectral radius ratio for node degree
Using spectral radius ratio for node degreeUsing spectral radius ratio for node degree
Using spectral radius ratio for node degree
 
An efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of thingsAn efficient tree based self-organizing protocol for internet of things
An efficient tree based self-organizing protocol for internet of things
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 

A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015 DOI:10.5121/ijcsit.2015.7609 107 A ROUTING MECHANISM BASED ON SOCIAL NETWORKS AND BETWEENNESS CENTRALITY IN DELAY-TOLERANT NETWORKS Zhang Huijuan and Liu Kai School of Software Engineering, Tongji University, Shanghai, China ABSTRACT With the growing popularity of mobile smart devices, the existing networks are unable to meet the requirement of many complex scenarios; current network architectures and protocols do not work well with the network with high latency and frequent disconnections. To improve the performance of these networks some scholars opened up a new research field, delay-tolerant networks, in which one of the important research subjects is the forwarding and routing mechanism of data packets. This paper presents a routing scheme based on social networks owing to the fact that nodes in computer networks and social networks have high behavioural similarity. To further improve efficiency this paper also suggests a mechanism, which is the improved version of an existing betweenness centrality based routing algorithm [1]. The experiments showed that the proposed scheme has better performance than the existing friendship routing algorithms. KEYWORDS Delay-Tolerant Network, Social Network, Routing Mechanism. 1. INTRODUCTION The existing TCP/IP protocols guarantee stable and efficient data transmission, based on the following premises [2]: 1) There is at least one end-to-end path between data source and destination. 2) The maximum round-trip time (RTT) between any node in the network is not excessive. 3) The packet loss rate is relatively low. Unfortunately, a class of challenged network, which don’t meet the above conditions, may not able to be served well by the current TCP/IP model. For instance, some networks may not have sufficient energy supply, some nodes in the network may not have enough storage space to relay the data packets, data source may not have stable end-to-end paths to its peers, or the networks with latency, which always cause unacceptable delays. All these examples bring new challenges to current network technology. To solve such kind of problems, K. Fall demonstrates new network architecture, delay-tolerant network (DTN) at SIGCOMM 2003 [3]. Delay-tolerant networks refer to the networks, which cannot have a stable end-to-end path for various reasons; the status of the networks may even appear as disconnected most of the time. Compared with the traditional network architecture, DTN has such characteristics as self-organized and dynamic topology. Therefore, an efficient store-carry-forward routing scheme is essential to DTNs.
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015 108 Many studies have shown that the movements of nodes in social networks and DTNs are based on similar motion patterns; nodes tent to have mobility patterns influenced by their social relationships or social behaviour [4]. It may be possible to improve DTN routing efficiency by increasing the priorities of some nodes that are much socially related. In most sociality-based DTNs, nodes meet other nodes then store the contact information. Some existing methods analyse social relationship of nodes based on such kind of contact history. E. Bulut et al. introduced a new metric to detect the quality of friendships of each node accurately [5]. They calculate the link weights between each pair of nodes then construct a friendship network based on the link weights. A sociality-based routing scheme, Friendship Routing, which utilizes such friendship network to make the forwarding decisions of data packets. C. M. Kim et al. present a routing strategy which uses expanded ego-network betweenness centrality when a relay node is selected [1]. In this paper, we propose a routing scheme in which each node determines the data packet’s next hop based on the contact history. Endpoint-biased expanded ego-network betweenness centrality is used to enhance the overall routing efficiency. We also demonstrated the proposed scheme has better performance than the existing friendship routing algorithm. The rest of this paper is organized as follows. Section 2 explains how to construct the social network and the detailed definition of betweenness centralities (Primitive, Expanded Ego; Section 3 presents the proposed routing scheme; Section 4 shows the simulation analysis and the Section 5 concludes the paper. 2. VIRTUAL SOCIAL NETWORK CONSTRUCTION We suppose the nodes in DTNs keep moving in a long time frame. Here we assume the transmission range of a node is r. A node i encounters another node j when these two nodes are within transmission range r from each other; node i receives a first hello message broadcasted by node j at the moment. If node i and node j stay within the transmission range of each other, both will get a periodic hello message from its peer. We consider node i leaves node j if node i does not hear a predefined number of hello messages from node j continuously. If node i encounters node j at time tc and leaves node j at time ts, we define tc – ts as the contact duration of node i for node j. 2.1. Social Network Based on Contact History We assume every node in DTNs records the contact duration information when it encounters every other node, i.e., in a DTN with n nodes, every node should keep contact history for other n- 1 nodes in its buffer. Each node allocates contact windows in its buffer, whose size is called contact window size Ws which is predefined by the node. Within the range Ws a node keeps its contact duration for other node it has encountered respectively. As time passed the contact window slides by one-unit time, e.g., one second, to keep the recorded contact information latest. The weight of the link between node i and node j at time t, wi,j, is defined by the following formula: , where f(t) means the remaining time to the first encounter of the node j after time t. We consider that node i and node j have a stable relationship if the weight wi,j is larger than the predefined threshold Th; an edge between node i and node j is created in two nodes’ social
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015 109 networks SNi and SNj in this case. Also, node i is added to SNj and node j is added to SNi. Node i and node j exchange its social network information with each other through hello messages periodically. The algorithm 1 represents the social network construction procedure, where Vi and Ei means set of nodes and edges in SNi, and Ni means set of 1-hop neighbour nodes of node i. Algorithm 1 Social Network Construction Procedure For Node i 1: Slide its contact window by a unit time 2: for a node j which the node i has at least one contact with do 3: if Wi,j > Th then 4: Vi ∪{j}, Ei ∪{(i, j)} 5: if Nj ̸= ∅ then 6: Vi = Vi ∪ Nj 7: Ei = Ei ∪{(j, k)} for k ∈ Nj 8: end if 9: else 10: if j ∈ Vi then 11: Vi = Vi −{j} − (Nj − Ni) 12: Ei = Ei − {(i, j)}, Ei = Ei −{(j, k)} for k ∈ Nj 13: end if 14: end if 15: end for 2.2. Expanded Ego Betweenness Centrality Centrality is a core concept for the analysis of social networks, and betweenness is one of the most prominent measures of centrality. It was introduced independently by Anthonisse (1971) and Freeman (1977), and measures the degree to which a vertex is in a position of brokerage by summing up the fractions of shortest paths between other pairs of vertices that pass through it [6]. We use the betweenness centrality to increase routing efficiency of DTNs. For node i in network, betweenness centrality CB(i) is defined as follows: , where V is the set of nodes in network, ρst is the number of shortest paths between the node s and t, and ρst (i) is the number of those shortest paths that include the node i. Due to lack of the whole network-wide end-to-end connectivity, it is hard to utilize the betweenness centrality in DTNs, which requires the entire network information. However, we can use the expanded ego betweenness, which is calculated only with the local information [7].
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015 110 Figure 1. Expanded Ego Network Figure 1 illustrates an expanded ego network of node i, which is constituted by the ego (node i), its 1-hop neighbours and its 2-hop neighbours. While solid links presents the ego network introduced in [8,9], the entire expanded ego network (Figure 1) is constructed by algorithm 1. Y.H. Kim et al. verified that the expanded ego betweenness centrality is highly correlated with the betweenness centrality in a complete network [7]. Hence we use expanded ego betweenness centrality instead in subsequent studies. 2.3. Endpoint Biased Expanded Ego Betweenness Centrality In some cases, it may be inappropriate to have pairs of vertices depend on intermediaries, but not on themselves (or at least one of them as the source or target). In an information exchange network, for instance, one might argue that the source of information has just as much control over its content as anyone passing it on [6]. So that we have the following formula: For the above-mentioned reasons this routing strategy should also be used in ego betweenness networks. The following section will illustrate its performance. 3. ROUTING STRATEGY In our algorithm, the following steps are required for a node before making routing decisions: 1) Calculate the link weight based on the contact history recorded for other encountered nodes. 2) Construct the virtual social network. 3) Calculate the expanded ego betweenness centrality. Then a node can make decision on a relay node when it tries send messages to the destination.
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015 111 3.1. Link Weight Based Strategy Imagine the following scenario: node i tries to send a message to node k and it just contacts with node j; now node i has to make a decision if it should forward the message to node j. At this time, node i compares two link weight values wi,k and wj,k. Higher link weight value indicates the corresponding two nodes are more friendly and it is more possible for these two nodes to meet again. Node i forward the data packet to node j if the following condition is met. Condition I: wi,k > wj,k 3.2. Expanded Ego Betweenness Centrality Based Strategy We also use expanded ego betweenness centrality to increase the overall routing efficiency. In DTNs some nodes may have quite low link weights for they hardly meet other nodes. Using link weight based strategy some nodes may not find a proper relay if the destination node is one of these isolated nodes. Under the circumstances, the data packet could be removing from the sender’s buffer by TTL expiration before delivered to the destination. To prevent this situation node j sends the message to node j if CB(j) is larger than CB(i) even though Condition I is not met. The second condition for message forwarding is as follow. Condition II: CB(j) > CB(i) 3.3. Endpoint Biased Expanded Ego Betweenness Centrality Based Strategy For the same reasons discussed in previous sub-section, node j sends the message to node j if CEB(j) is larger than CEB(i) even though Condition I is not met, if network adopts the modified version (endpoint biased) of expanded ego betweenness centrality based strategy. So we have the Condition III: Condition III: CEB(j) > CEB(i) In later sections we will also focus on the performance differences of strategies mentioned in sub- sections 3.2 and 3.3. 3.4. Message Delivery Cost Reduction Mechanism This sub-section proposes a mechanism to reduce the node’s buffer consumption. If there is a data packet in node i’s buffer, which is destined to send to node k, and node i just contact with node j which satisfies wj,k > wi,k, node i will forward the message to node j. Under the circumstances if wj,k is the largest among the link weights between other nodes in SNi, node i deletes this data packet after forwarding the message to prevent further dissemination. Algorithm 2 illustrates in detail this message delivery cost reduction mechanism.
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015 112 Algorithm 2 Message Forwarding Procedure 1: upon reception of a Hello message from a node j do 2: if j ∈ SNi then 3: if wj,k > wi,k then 4: forward the message destined for the node k to the node j 5: if wj,k > wm,k for all m ∈ SNi then 6: delete the message destined for the node k from the node i’s buffer 7: end if 8: else if CB(j) > CB(i) then 9: forward the message destined for the node k to the node j 10: end if 11: end if 4. PERFORMANCE EVALUATION In this section, we provide simulation results for two proposed schemes, and compare them with the epidemic [10] and the friendship [5] routing schemes. Proposed Algorithm I refers to the scheme based on link weight and expanded ego betweenness centrality; Proposed Algorithm II is the scheme based on link weight and endpoint biased expanded ego betweenness centrality. The following metrics are used to measure the performance of various schemes: 1) Message delivery ratio. 2) Message delivery cost. 3) Message delivery efficiency. The message delivery ratio is the proportion of messages that destinations successfully received among the total messages generated by source nodes. The delivery cost is the average number of forwards done during the simulation. The delivery efficiency is defined as the ratio of delivery ratio to the delivery cost. Our simulation is based on predefined node mobility data; all nodes in the network record contact information during the simulation. We generated 1000 messages, each from a node to a random destination after Ws period of time. All the data packets are given a certain TTL value; any TTL- expired packet will be removed from buffer. The simulation ended when 1000 messages are delivered successfully or expired. All results are averages over 10 runs. Table 1 gives the parameters. Table 1. Simulation Parameters Area Size(m) 1000 * 1500 Number of Nodes 25, 75 Communication Range (m) 3 Moving Speed (m/s) 0.5, 1.0, 1.25, 1.5 Contact Window Size (Ws, second) 600 TTL (second) 60, 120, 180, 240, 300, 360 Threshold (Th) 0.01 Number of Messages 1000
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015 113 (a) N = 25 (b) N = 75 Figure 2. Delivery Ratio Figure 2 shows the delivery ratios achieved by each routing schemes. As TTL increases, all the schemes tend to have higher success rate of delivering. Epidemic routing scheme has the highest delivery ratio as expected. It is noteworthy that the rest schemes have similar performance.
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015 114 (a) N = 25 (b) N = 75 Figure 3. Delivery Cost Figure 3 shows the delivery cost achieved by each schemes. Epidemic routing scheme has the worst performance for the delivery cost because it uses flooding strategy. We can also see both two proposed schemes perform better than friendship routing scheme.
  • 9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015 115 (a) N = 25 (b) N = 75 Figure 4. Delivery Efficiency Figure 4 shows the delivery efficiency achieved by each schemes. We can see two proposed schemes have better routing efficiency than epidemic and friendship routing schemes. Compared to the friendship routing schemes, our schemes have higher efficiency by reducing the delivery cost with similar delivery ratio. It is also noted that Proposed Algorithm I performs slightly better than Proposed Algorithm II in a small DTN (N = 25). 5. CONCLUSIONS In this paper we introduced a routing mechanism and its variation in delay-tolerant networks, in which each node forwards their messages to nodes that contain the destination node in their friendship communities. We evaluated our schemes through simulations using predefined node
  • 10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 7, No 6, December 2015 116 mobility data, and demonstrated that our schemes achieved higher efficiency than two routing schemes proposed previously. ACKNOWLEDGEMENTS The main research is supported by National Natural Science Foundation of China. REFERENCES [1] Kim, Chan-Myung, et al. "An efficient routing scheme based on social relations in delay-tolerant networks." Ubiquitous information technologies and applications. Springer Berlin Heidelberg, 2014. 533-540. [2] Fan, Xiu-mei, et al. "State-of-the-art of the architecture and techniques for delay-tolerant networks." Acta Electronica Sinica 36.1 (2008): 161. [3] Fall, Kevin. Delay-tolerant network architecture for challenged internets." Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. ACM, 2003. [4] Gao, Wei, et al. "Multicasting in delay tolerant networks: a social network perspective." Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing. ACM, 2009. [5] Bulut, Eyuphan, and Boleslaw K. Szymanski. "Friendship based routing in delay tolerant mobile social networks." Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE. IEEE, 2010. [6] Brandes, Ulrik. "On variants of shortest-path betweenness centrality and their generic computation." Social Networks 30.2 (2008): 136-145. [7] Kim, Yong-hwan, et al. "Betweenness of expanded Ego networks in sociality-aware delay tolerant networks." Ubiquitous Information Technologies and Applications. Springer Netherlands, 2013. 499- 505. [8] Everett, Martin, and Stephen P. Borgatti. "Ego network betweenness." Social networks 27.1 (2005): 31-38. [9] Odella, Francesca. "Using Ego-networks in surveys: methodological and research issues." Proceedings of International Conference on Network Science. 2006. [10] Vahdat, Amin, and David Becker. Epidemic routing for partially connected ad hoc networks. Technical Report CS-200006, Duke University, 2000.