SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 82
PERFORMANCE EVALUATION OF MOFO BUFFER MANAGEMENT
TECHNIQUE WITH DIFFERENT ROUTING PROTOCOLS IN DTN
UNDER VARIABLE MESSAGE BUFFER SIZE
Anita Rani1
, Sangeeta Rani2
, Harminder Singh Bindra3
1
Student, 2
Teaching Associate, Computer Sci. & Applications Department, Chaudhary Devi Lal University, Haryana,
India
3
HOD IT Department, Malout Institute of Management & Information Technology, Punjab, India
Abstract
Delay Tolerant Networks (DTNs) uses the store-carry-forward scheme for the delivery of the messages, with this way data
transmission can be successfully done despite of the absence of continuous end-to-end paths. The opportunities of message forwarding
in such types of networks usually are limited due to the absence of contemporaneous paths. In such networks, the “store-carry-
forward” methodology is used for the transmission of the messages to be delivered to their intend destinations in a hop by hop
manner. It arises many problems like how to schedule the messages, how to drop the messages in the buffer due to the impulsive
nature of the nodes. It also arises many challengeable situations like short contact durations between the two nodes, limited storage
capacity of nodes and so on. This paper evaluates the performance of MOFO buffer management technique with three routing
protocols i.e. Epidemic, Prophet and MaxProp under variable message buffer sizes (5MB to 40MB). Such evaluation can improve the
performance of the opportunistic networks by reducing the overhead ratio, enhancing the delivery rate, minimizing latency average
and hop count average in a certain degree. So four performance evaluation metrics namely delivery probability, latency average,
overhead ratio and hop count average are used in this study. This study uses ONE (Opportunistic Network Environment) simulator for
the performance evaluation of the MOFO buffer management technique and routing protocols. The evaluation results shows that the
performance of different protocols can benefit to optimizing the performance of delay tolerant networks in terms of delivery
probability, Latency average, Overhead ratio and Hop count average of messages with the increase in message buffer size. Finally,
this study suggested that which routing protocol is most suitable with MOFO buffer management technique.
Keywords: Delay Tolerant Networks, Buffer Management, Routing Protocols, MOFO, Epidemic, Prophet, MaxProp
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
In the present day scenario, rapid rise in the heterogeneous
networks has been seen in the wireless communications. The
heterogeneous network may be termed as the network, which
connects computers and such other devices, which uses
different operating systems and communication protocols.
Delay Tolerant Network approach addresses the issues that
provide communication in the heterogeneous networks. In
Delay Tolerant Networks (DTN), there is frequency of
disruptions is much higher, as end to end path is not available
all the time. Due environment nature of delay tolerant
networks like underwater, ocean sensor, deep space, delays
can further be extended. In such demanding networking
situations, to obtain data delivery researchers have proposed a
technique in which the messages is stored into the buffers of
the intermediary nodes until it is forwarded to the destination.
Thus, in order to obtain the higher delivery probabilities of the
messages and reliable communication in such challenging
networks, many approaches have been adopted. Several issues
like increasing the delivery ratio or minimizing the delivery
delays, optimizing resources usage etc. has been the main
focused area of the researchers to achieve message delivery
probability. Moreover, to increase delivery probability,
multiple copies of the messages into the network is done. This
arrangement of long-standing storage and duplication results
in high storage overhead on the network. Therefore, efficient
buffer management policies are required, which decides that
what messages must be dropped, while node buffers are
overflowed [2].
In this paper, we have evaluated the performance of MOFO
buffer management technique with Epidemic, Prophet and
MaxProp routing protocols under variable message buffer
size. The performance metrics chosen for the evaluation of
these routing protocols is delivery probability, overhead ratio,
hop count average and latency time average. The tool used for
the simulation is Opportunistic Network Environment.
Simulation setup for the study is given in the Table-1 in
Section 4.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 83
2. BUFFER MANAGEMENT TECHNIQUES
Buffer Management technology is a fundamental approach
that manages the various resources among different situations
as per the technique used. An efficient buffer management
technique decides at each step that which of the messages is to
be dropped first, when the buffer is full likewise which
messages are to be transmitted, when bandwidth is limited.
Some of the popular buffer management techniques are as
follows:
2.1 Drop Least Recently Received (DLR)
In DLR technique as the name implies, the message which is
staying for a long time in the buffer will be dropped first. As
it has the less probability to be conceded to the other nodes
[2].
2.2 Drop Oldest (DOA)
In DOA technique, the message with the shortest remaining
life time (TTL) is dropped first. The idea behind dropping
such messages is that the messages whose TTL is small, then
these are in the network from a long period of time and thus
has the high probability to be already delivered [2].
2.3 Drop Front (DF) FIFO
This technique drops the messages on the basis of the order in
which they entered into the buffer, for example the first
message that entered the queue will be the first to be dropped
[3].
2.4 Drop Largest (DLA)
In Drop Largest (DLA) buffer management technique message
having large size will be selected in order to drop [2].
2.5 MOFO (Evict Most Forwarded First)
MOFO attempts to maximise the propagation of the messages
through the network by dropping those messages that have
been forwarded the maximum number of time. In such way
the messages with lower hop count enables to travel further
within the network [3].
2.6 DL-Drop Last
The newly received message is first removed simply.
2.7 MOPR (Evict Most Favorably Forwarded First)
MOPR maintains the value of each message in its queue. Thus
each time when a message is replicated the value in the
message is increased based on the predictability of the
message being delivered, thus the message with the highest
value is dropped first [3].
2.8 SHLI (Evict Shortest Life Time First)
This technique uses the timeout value of the message, which
indicates that when it is no longer useful, such that a message
with the shortest remaining life time is dropped first [3].
2.9 LEPR (Evict Least Probable First)
This technique works by a node ranking the messages within
its buffer based on the predicted probability of delivery, the
message with the lowest probability is dropped first [3].
This study evaluates the performance of MOFO buffer
management technique on the basis of metrics, delivery
probability, overheads ratio, latency time average and hop
count average.
3. ROUTING PROTOCOLS USED
3.1 Epidemic Routing protocol
In DTN, among all the routing protocols, Epidemic routing
protocol is the leading protocol. This protocol is flooding
based in nature as all the nodes continuously replicate and
transmit the messages to the adjacent nodes that do not already
have a copy of the message. Using this protocol, when a node
comes into the contact of other node, it checks whether the
new node has the copy of this message or not. If it does not
have, then the new message is forwarded to that node. This
protocol uses the summary vectors for this task. The node
exchanges their summary vectors when they comes in the
communication range of each other to decide which message
have not been seen by that node. Host request for a copy of a
message which it has not seen yet. The receiving host has the
complete autonomy to reject or accept the message [6].
3.2 PRoPHET Routing Protocol
Epidemic routing protocol is a resource hungry protocol
because it makes no attempt to remove the replications
deliberately that would be unlikely to increase the delivery
probability of the messages. Such type of strategy is more
effective if the opportunities of delivering the messages
encounters between the nodes are purely random, but in
realistic circumstances, meeting of nodes are rarely totally
random. Data Mules such as human beings moves in the
society and have higher probabilities of meeting the certain
Mules than others. The PRoPHET (Probabilistic Routing
Protocol using History of Encounters and Transitivity)
protocol used an algorithm that attempts to use the non
randomness of the real-world encounters by maintaining the
set of probabilities for a successful delivery to the known
destinations in DTN [4].
3.3 MaxProp Routing Protocol
MaxProp routing protocol is a flooding-based protocol by
nature. In MaxProp if a contact is occurred, then all the
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 84
messages not held by the contact will be replicated and
transferred. The MaxProp routing protocol intelligently
determines that which messages should be transmitted first
and which of the messages should be dropped first. Here an
ordered queue is maintained by this protocol based on the
destination of each message, ordered by the probability of a
future transitive path to that particular destination. When two
nodes meet each other, firstly, they exchange their estimated
node meeting likelihood vectors. Preferably, each node will
have an up to date vector from every other node. With these
„n‟ vectors at hand, the node can compute the shortest path on
the basis of a depth-first search where path weights indicate
the probability that the link does not occur [5].
4. SIMULATION SETUP
The performance of MOFO buffer management technique
with different routing protocols is analyzed through simulation
using the Opportunistic Network Environment (ONE). The
ONE simulator is an agent based discrete event simulation
engine. The main functionality of the ONE consists of the
modeling of the node movement, inter node contacts using
various interfaces, routing, message handling and application
interactions. The simulator is configured using text based
configuration files that contains the simulation, event
generation and reporting parameters. This file also has the
defining parameters for the nodes like the storage capability,
transmit range, bit rates as well as the routing model to use.
Table 1 summarizes the simulation configuration used for the
current analysis.
5. PERFORMANCE METRICS
The following are the performance metrics used for the
analysis:
Table -1 Simulation Setup of the Study
5.1 Delivery Probability
The delivery probability is the amount of the fraction of all the
created packets that are successfully delivered to its
destination. This is the ratio of the total number of packets that
are delivered to their destinations against the total number of
packets that are created. Thus this is a direct measurement of
how reliably packets are routed in the network by a routing
protocol under consideration [6].
5.2 Overhead Ratio
The overhead ratio is calculated using the following equation:
Overhead ratio =
(Number of relayed messages – Number of delivered
messages) / Number of delivered messages
Here, the term relayed messages refers to the messages that
have been forwarded by the source to an intermediate node to
be forwarded towards the destination. This number is a
measure for the number of packets or copies of packets that
have been inducted into the network. The number of delivered
messages refers to the total number of created packets that are
successfully delivered to the destination. The overhead ratio
also shows the amount of the network resources required to
deliver a packet from source to its destination [6].
5.3 Latency Average
The latency measured here is the time that elapses between the
creation of a message and its delivery at its destination. This
study considers the average of the latency of the packets over
the entire simulation time. This is the time as calculated for
the delivered packets only. In most protocols, it is desired that
the value of latency time average is low. In the DTNs
environment the latency is acceptable at some extent [6].
5.4 HopCount Average
It is the mean hops which a message takes to reach its
destination
6. RESULTS AND DISCUSSION
6.1 Delivery Probability
The delivery probability of MOFO buffer management
technique with Epidemic, Prophet and MaxProp routing
protocols under variable message buffer size is shown in Chart
1.
1. The Chart shows that the delivery probability of all the
three routing protocols under MOFO buffer management
technique increase as the message buffer size increases.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 85
Chart- 1: Delivery Probability
2. The overlapping lines of Epidemic and Prophet shows
that delivery probability of Epidemic and Prophet are
same at a particular message buffer size
3. Whereas the delivery probability of MaxProp is much
higher than Epidemic and Prophet routing protocols at all
the message buffer sizes.
6.2 Overhead Ratio
The overhead ratio of MOFO buffer management technique
with Epidemic, Prophet and MaxProp routing protocols under
variable message buffer size is shown in Chart- 2.
1. The Chart 2 clearly demonstrate that the overhead
ratio under all the three protocols falls sharply as the
message buffer size increased from 5MB to 10MB.
Chart- 2: Overhead Ratio
2. As the message buffer size increased further, the
decline in overhead ratio under all the three routing
protocols continues very slowly.
3. Overhead ratio under MaxProp is lower than
Epidemic and Prophet routing protocols.
4. Overhead ratio under Epidemic is much higher than
Prophet and MaxProp at 5MB, but becomes equals
with Prophet from 10MB message buffer size.
6.3 Latency Average
Chart- 3: Latency Average
The latency average of MOFO buffer management technique
with Epidemic, Prophet and MaxProp routing protocols under
variable message buffer size is shown in Chart- 3.
1. The Chart 3 depicts that the latency average under
Epidemic and Prophet routing protocols increases with
respect to message buffer size.
2. Whereas latency average under MaxProp increases up to
15MB message buffer size and then declines constantly
with increasing message buffer size.
3. The latency average of MaxProp is higher than Epidemic
and Prophet routing protocols up to 10MB message buffer
size.
4. But as the message buffer size increased, the latency
average under MaxProp drops significantly in contrast to
Epidemic and Prophet routing protocols.
6.4 Hop Count Average
The hop count average of MOFO buffer management
technique with Epidemic, Prophet and MaxProp routing
protocols under variable message buffer size is shown in
Chart- 4.
1. The Chart- describes that the hop count average of MOFO
buffer management technique under all the three routing
protocols increases as the message buffer size increases.
2. The hop count average of MaxProp is higher than
Epidemic and Prophet routing protocols.
3. Hop count average of Prophet is equal with Epidemic up
to 20MB message buffer size, thereafter it gets marginally
lower than Epidemic routing protocols.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 86
Chart- 4: Hop Count Average
7. CONCLUSIONS
This study evaluated the performance of MOFO Buffer
management technique with Epidemic, Prophet and MaxProp
routing protocols under variable message buffer sizes. The
results show that there are clear benefits of increasing the
message buffer size for the parameters Delivery Probability,
Overhead Ratio in case of all the routing protocols under
study. The Delivery Probability, Overhead Ratio and Latency
Time Average of MOFO with MaxProp routing protocol gives
the best results among the three routing protocols under study.
Whereas for the performance metric Hop Count Average,
MOFO with Prophet is better than the other two routing
protocols.
In this study, MOFO buffer management technique with
different routing protocols has been simulated on the ONE
simulator. They have not been deployed on the real network.
There may be a higher significance that this technique and
protocols be tested out on the real network. This study
assumes that all the nodes have unlimited energy. This study
do not considers the energy loss of the network as the message
buffer size increased for all the nodes. Such constraints should
take into account, the energy spent for the network as the
message buffer size increases.
REFERENCES
[1]. A. Vasilakos, Y. Zhang, and T. Spyropolous. Delay
Tolerant Networks: Protocols and Applications. 2009.
[2] Sulma Rashid, Qaisar Ayub, et al. E-DROP: An
Effective Drop Buffer Management Policy for DTN
Routing Protocols. International Journal of Computer
Applications (0975 – 8887) Volume 13– No.7, January
2011
[3] Andrew Michael Grundy. Congestion Control
Framework For Delay-Tolerant Communications. A
Ph.D thesis, University of Nottingham, July 2012
[4] Khalil Massri, Alessandro Vernata, Andrea Vitaletti.
Routing Protocols for Delay Tolerant Networks: a
Quantitative Evaluation. Published in PM2HW2N‟12
Proceedings of the 7th ACM workshop Performance
Monitoring and Measurement of Heterogeneous
Wireless and Wired Networks, 2012, pp 107-114
[5] J. Burgess, B. Gallagher, D. Jensen, B.N. Levine.
MaxProp: Routing for Vehicle-Based Disruption-
Tolerant Networks. Published in INFOCOM 2006,
25th IEEE International Conference on Computer
Communications, pp 1-11.
[6] Priyanka Gururaj Rotti. Opportunistic Lookahead
Routing Protocol For Delay Tolerant Networks. A
Theses submitted in Visvesvaraya Technological
University, 2008 December 2012
[7] J. Sushant, K. Fall, R. Patra. Routing in a Delay
Tolerant Network. Proceedings of the 2004 conference
on Applications, technologies, architectures, and
protocols for computer communications. Vol. 34, No.
4, pp.145-158, 2004.
[8] Evan P.C.Jones, Paul A.S. Ward. Routing Strategies for
Delay-Tolerant Networks. Submitted in the Computer
Communication Review, 2006
[9] Ari Keranen. Opportunistic Network Environment
simulator. Special assignment submitted in Helsiniki
University of Technology, May 29, 2008
[10] Khaled A.Harras. Challenged Networks –Protocol and
Architectural Challenges in Delay and Disruption
Tolerant Networks. A thesis submitted at University of
California in Santa Barbara, 2008.
[11] http://www.netlab.tkk.fi/tutkimus/dtn/theone/ accessed
on October, 2013.
[12] Wenrui Zhao. Routing and Network Design in Delay
Tolerant Networks. A theses presented to the Academic
Faculty of College of Computing, Georgia Institute of
Technology, December 2006.
[13] Evan P.C. Jones. Practical Routing in Delay-Tolerant
Networks. A theses submitted at University of
Waterloo, Ontario, Canada, 2006.
[14] Samo Grasic, Anders Lindgren. An analysis of
Evaluation Practices for DTN Routing Protocols.
Published in CHANTS‟12 Proceedings of the seventh
ACM international workshop on Challenged networks,
2012 pp 57-64.
[15] Jahwan Koo, Seongjin Ahn, Jinwook Chung. A
Comparative Study of Queue, Delay and Loss
Characteristics of AQM Schemes in QOS-Enabled
Networks. Published in Computing and Informatics,
Vol.22, 2003, pp 1001-1019
[16] Hemal Shah, Yogeshwar P. Kosta, Evolution of
Routing Techniques, Routing Protocols and Routing
Efficiencies for Delay Tolerant Network. Published in
IJCA Special Issue on “Mobile Ad-hoc Networks”
MANETs, 2010

More Related Content

Viewers also liked

Measurement model of software quality in user’s
Measurement model of software quality in user’sMeasurement model of software quality in user’s
Measurement model of software quality in user’seSAT Publishing House
 
An application specific reconfigurable architecture
An application specific reconfigurable architectureAn application specific reconfigurable architecture
An application specific reconfigurable architectureeSAT Publishing House
 
Implementation and analysis of power reduction in 2 to 4 decoder design using...
Implementation and analysis of power reduction in 2 to 4 decoder design using...Implementation and analysis of power reduction in 2 to 4 decoder design using...
Implementation and analysis of power reduction in 2 to 4 decoder design using...eSAT Publishing House
 
A survey on fem modelling for composites
A survey on fem modelling for compositesA survey on fem modelling for composites
A survey on fem modelling for compositeseSAT Publishing House
 
Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...eSAT Publishing House
 
Thermal, microstructure and dielectric behavior of la modified bismuth titana...
Thermal, microstructure and dielectric behavior of la modified bismuth titana...Thermal, microstructure and dielectric behavior of la modified bismuth titana...
Thermal, microstructure and dielectric behavior of la modified bismuth titana...eSAT Publishing House
 
Text independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficientsText independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficientseSAT Publishing House
 
Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...eSAT Publishing House
 
Cfd simulation on different geometries of venturimeter
Cfd simulation on different geometries of venturimeterCfd simulation on different geometries of venturimeter
Cfd simulation on different geometries of venturimetereSAT Publishing House
 
Fpga implementation of run length encoding with new formulated codeword gener...
Fpga implementation of run length encoding with new formulated codeword gener...Fpga implementation of run length encoding with new formulated codeword gener...
Fpga implementation of run length encoding with new formulated codeword gener...eSAT Publishing House
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packeteSAT Publishing House
 
A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...eSAT Publishing House
 
Multi fractal analysis of human brain mr image
Multi fractal analysis of human brain mr imageMulti fractal analysis of human brain mr image
Multi fractal analysis of human brain mr imageeSAT Publishing House
 
Wavelet based ecg signal component identification
Wavelet based ecg signal component identificationWavelet based ecg signal component identification
Wavelet based ecg signal component identificationeSAT Publishing House
 
3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domain3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domaineSAT Publishing House
 
Design of vco using current mode logic with low supply
Design of vco using current mode logic with low supplyDesign of vco using current mode logic with low supply
Design of vco using current mode logic with low supplyeSAT Publishing House
 
Survey of analysis and performance of ofdm signals in time and frequency disp...
Survey of analysis and performance of ofdm signals in time and frequency disp...Survey of analysis and performance of ofdm signals in time and frequency disp...
Survey of analysis and performance of ofdm signals in time and frequency disp...eSAT Publishing House
 
Studies on seasonal variation of ground water quality
Studies on seasonal variation of ground water qualityStudies on seasonal variation of ground water quality
Studies on seasonal variation of ground water qualityeSAT Publishing House
 
Application of artificial neural network for blast performance evaluation
Application of artificial neural network for blast performance evaluationApplication of artificial neural network for blast performance evaluation
Application of artificial neural network for blast performance evaluationeSAT Publishing House
 

Viewers also liked (20)

Measurement model of software quality in user’s
Measurement model of software quality in user’sMeasurement model of software quality in user’s
Measurement model of software quality in user’s
 
An application specific reconfigurable architecture
An application specific reconfigurable architectureAn application specific reconfigurable architecture
An application specific reconfigurable architecture
 
Implementation and analysis of power reduction in 2 to 4 decoder design using...
Implementation and analysis of power reduction in 2 to 4 decoder design using...Implementation and analysis of power reduction in 2 to 4 decoder design using...
Implementation and analysis of power reduction in 2 to 4 decoder design using...
 
A survey on fem modelling for composites
A survey on fem modelling for compositesA survey on fem modelling for composites
A survey on fem modelling for composites
 
Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Thermal, microstructure and dielectric behavior of la modified bismuth titana...
Thermal, microstructure and dielectric behavior of la modified bismuth titana...Thermal, microstructure and dielectric behavior of la modified bismuth titana...
Thermal, microstructure and dielectric behavior of la modified bismuth titana...
 
Text independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficientsText independent speaker recognition using combined lpc and mfc coefficients
Text independent speaker recognition using combined lpc and mfc coefficients
 
Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...
 
Cfd simulation on different geometries of venturimeter
Cfd simulation on different geometries of venturimeterCfd simulation on different geometries of venturimeter
Cfd simulation on different geometries of venturimeter
 
Fpga implementation of run length encoding with new formulated codeword gener...
Fpga implementation of run length encoding with new formulated codeword gener...Fpga implementation of run length encoding with new formulated codeword gener...
Fpga implementation of run length encoding with new formulated codeword gener...
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packet
 
A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...
 
Multi fractal analysis of human brain mr image
Multi fractal analysis of human brain mr imageMulti fractal analysis of human brain mr image
Multi fractal analysis of human brain mr image
 
Wavelet based ecg signal component identification
Wavelet based ecg signal component identificationWavelet based ecg signal component identification
Wavelet based ecg signal component identification
 
3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domain3 d mrf based video tracking in the compressed domain
3 d mrf based video tracking in the compressed domain
 
Design of vco using current mode logic with low supply
Design of vco using current mode logic with low supplyDesign of vco using current mode logic with low supply
Design of vco using current mode logic with low supply
 
Survey of analysis and performance of ofdm signals in time and frequency disp...
Survey of analysis and performance of ofdm signals in time and frequency disp...Survey of analysis and performance of ofdm signals in time and frequency disp...
Survey of analysis and performance of ofdm signals in time and frequency disp...
 
Studies on seasonal variation of ground water quality
Studies on seasonal variation of ground water qualityStudies on seasonal variation of ground water quality
Studies on seasonal variation of ground water quality
 
Application of artificial neural network for blast performance evaluation
Application of artificial neural network for blast performance evaluationApplication of artificial neural network for blast performance evaluation
Application of artificial neural network for blast performance evaluation
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

Performance evaluation of mofo buffer management technique with different routing protocols in dtn under variable message buffer size

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 82 PERFORMANCE EVALUATION OF MOFO BUFFER MANAGEMENT TECHNIQUE WITH DIFFERENT ROUTING PROTOCOLS IN DTN UNDER VARIABLE MESSAGE BUFFER SIZE Anita Rani1 , Sangeeta Rani2 , Harminder Singh Bindra3 1 Student, 2 Teaching Associate, Computer Sci. & Applications Department, Chaudhary Devi Lal University, Haryana, India 3 HOD IT Department, Malout Institute of Management & Information Technology, Punjab, India Abstract Delay Tolerant Networks (DTNs) uses the store-carry-forward scheme for the delivery of the messages, with this way data transmission can be successfully done despite of the absence of continuous end-to-end paths. The opportunities of message forwarding in such types of networks usually are limited due to the absence of contemporaneous paths. In such networks, the “store-carry- forward” methodology is used for the transmission of the messages to be delivered to their intend destinations in a hop by hop manner. It arises many problems like how to schedule the messages, how to drop the messages in the buffer due to the impulsive nature of the nodes. It also arises many challengeable situations like short contact durations between the two nodes, limited storage capacity of nodes and so on. This paper evaluates the performance of MOFO buffer management technique with three routing protocols i.e. Epidemic, Prophet and MaxProp under variable message buffer sizes (5MB to 40MB). Such evaluation can improve the performance of the opportunistic networks by reducing the overhead ratio, enhancing the delivery rate, minimizing latency average and hop count average in a certain degree. So four performance evaluation metrics namely delivery probability, latency average, overhead ratio and hop count average are used in this study. This study uses ONE (Opportunistic Network Environment) simulator for the performance evaluation of the MOFO buffer management technique and routing protocols. The evaluation results shows that the performance of different protocols can benefit to optimizing the performance of delay tolerant networks in terms of delivery probability, Latency average, Overhead ratio and Hop count average of messages with the increase in message buffer size. Finally, this study suggested that which routing protocol is most suitable with MOFO buffer management technique. Keywords: Delay Tolerant Networks, Buffer Management, Routing Protocols, MOFO, Epidemic, Prophet, MaxProp ----------------------------------------------------------------------***------------------------------------------------------------------------ 1. INTRODUCTION In the present day scenario, rapid rise in the heterogeneous networks has been seen in the wireless communications. The heterogeneous network may be termed as the network, which connects computers and such other devices, which uses different operating systems and communication protocols. Delay Tolerant Network approach addresses the issues that provide communication in the heterogeneous networks. In Delay Tolerant Networks (DTN), there is frequency of disruptions is much higher, as end to end path is not available all the time. Due environment nature of delay tolerant networks like underwater, ocean sensor, deep space, delays can further be extended. In such demanding networking situations, to obtain data delivery researchers have proposed a technique in which the messages is stored into the buffers of the intermediary nodes until it is forwarded to the destination. Thus, in order to obtain the higher delivery probabilities of the messages and reliable communication in such challenging networks, many approaches have been adopted. Several issues like increasing the delivery ratio or minimizing the delivery delays, optimizing resources usage etc. has been the main focused area of the researchers to achieve message delivery probability. Moreover, to increase delivery probability, multiple copies of the messages into the network is done. This arrangement of long-standing storage and duplication results in high storage overhead on the network. Therefore, efficient buffer management policies are required, which decides that what messages must be dropped, while node buffers are overflowed [2]. In this paper, we have evaluated the performance of MOFO buffer management technique with Epidemic, Prophet and MaxProp routing protocols under variable message buffer size. The performance metrics chosen for the evaluation of these routing protocols is delivery probability, overhead ratio, hop count average and latency time average. The tool used for the simulation is Opportunistic Network Environment. Simulation setup for the study is given in the Table-1 in Section 4.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 83 2. BUFFER MANAGEMENT TECHNIQUES Buffer Management technology is a fundamental approach that manages the various resources among different situations as per the technique used. An efficient buffer management technique decides at each step that which of the messages is to be dropped first, when the buffer is full likewise which messages are to be transmitted, when bandwidth is limited. Some of the popular buffer management techniques are as follows: 2.1 Drop Least Recently Received (DLR) In DLR technique as the name implies, the message which is staying for a long time in the buffer will be dropped first. As it has the less probability to be conceded to the other nodes [2]. 2.2 Drop Oldest (DOA) In DOA technique, the message with the shortest remaining life time (TTL) is dropped first. The idea behind dropping such messages is that the messages whose TTL is small, then these are in the network from a long period of time and thus has the high probability to be already delivered [2]. 2.3 Drop Front (DF) FIFO This technique drops the messages on the basis of the order in which they entered into the buffer, for example the first message that entered the queue will be the first to be dropped [3]. 2.4 Drop Largest (DLA) In Drop Largest (DLA) buffer management technique message having large size will be selected in order to drop [2]. 2.5 MOFO (Evict Most Forwarded First) MOFO attempts to maximise the propagation of the messages through the network by dropping those messages that have been forwarded the maximum number of time. In such way the messages with lower hop count enables to travel further within the network [3]. 2.6 DL-Drop Last The newly received message is first removed simply. 2.7 MOPR (Evict Most Favorably Forwarded First) MOPR maintains the value of each message in its queue. Thus each time when a message is replicated the value in the message is increased based on the predictability of the message being delivered, thus the message with the highest value is dropped first [3]. 2.8 SHLI (Evict Shortest Life Time First) This technique uses the timeout value of the message, which indicates that when it is no longer useful, such that a message with the shortest remaining life time is dropped first [3]. 2.9 LEPR (Evict Least Probable First) This technique works by a node ranking the messages within its buffer based on the predicted probability of delivery, the message with the lowest probability is dropped first [3]. This study evaluates the performance of MOFO buffer management technique on the basis of metrics, delivery probability, overheads ratio, latency time average and hop count average. 3. ROUTING PROTOCOLS USED 3.1 Epidemic Routing protocol In DTN, among all the routing protocols, Epidemic routing protocol is the leading protocol. This protocol is flooding based in nature as all the nodes continuously replicate and transmit the messages to the adjacent nodes that do not already have a copy of the message. Using this protocol, when a node comes into the contact of other node, it checks whether the new node has the copy of this message or not. If it does not have, then the new message is forwarded to that node. This protocol uses the summary vectors for this task. The node exchanges their summary vectors when they comes in the communication range of each other to decide which message have not been seen by that node. Host request for a copy of a message which it has not seen yet. The receiving host has the complete autonomy to reject or accept the message [6]. 3.2 PRoPHET Routing Protocol Epidemic routing protocol is a resource hungry protocol because it makes no attempt to remove the replications deliberately that would be unlikely to increase the delivery probability of the messages. Such type of strategy is more effective if the opportunities of delivering the messages encounters between the nodes are purely random, but in realistic circumstances, meeting of nodes are rarely totally random. Data Mules such as human beings moves in the society and have higher probabilities of meeting the certain Mules than others. The PRoPHET (Probabilistic Routing Protocol using History of Encounters and Transitivity) protocol used an algorithm that attempts to use the non randomness of the real-world encounters by maintaining the set of probabilities for a successful delivery to the known destinations in DTN [4]. 3.3 MaxProp Routing Protocol MaxProp routing protocol is a flooding-based protocol by nature. In MaxProp if a contact is occurred, then all the
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 84 messages not held by the contact will be replicated and transferred. The MaxProp routing protocol intelligently determines that which messages should be transmitted first and which of the messages should be dropped first. Here an ordered queue is maintained by this protocol based on the destination of each message, ordered by the probability of a future transitive path to that particular destination. When two nodes meet each other, firstly, they exchange their estimated node meeting likelihood vectors. Preferably, each node will have an up to date vector from every other node. With these „n‟ vectors at hand, the node can compute the shortest path on the basis of a depth-first search where path weights indicate the probability that the link does not occur [5]. 4. SIMULATION SETUP The performance of MOFO buffer management technique with different routing protocols is analyzed through simulation using the Opportunistic Network Environment (ONE). The ONE simulator is an agent based discrete event simulation engine. The main functionality of the ONE consists of the modeling of the node movement, inter node contacts using various interfaces, routing, message handling and application interactions. The simulator is configured using text based configuration files that contains the simulation, event generation and reporting parameters. This file also has the defining parameters for the nodes like the storage capability, transmit range, bit rates as well as the routing model to use. Table 1 summarizes the simulation configuration used for the current analysis. 5. PERFORMANCE METRICS The following are the performance metrics used for the analysis: Table -1 Simulation Setup of the Study 5.1 Delivery Probability The delivery probability is the amount of the fraction of all the created packets that are successfully delivered to its destination. This is the ratio of the total number of packets that are delivered to their destinations against the total number of packets that are created. Thus this is a direct measurement of how reliably packets are routed in the network by a routing protocol under consideration [6]. 5.2 Overhead Ratio The overhead ratio is calculated using the following equation: Overhead ratio = (Number of relayed messages – Number of delivered messages) / Number of delivered messages Here, the term relayed messages refers to the messages that have been forwarded by the source to an intermediate node to be forwarded towards the destination. This number is a measure for the number of packets or copies of packets that have been inducted into the network. The number of delivered messages refers to the total number of created packets that are successfully delivered to the destination. The overhead ratio also shows the amount of the network resources required to deliver a packet from source to its destination [6]. 5.3 Latency Average The latency measured here is the time that elapses between the creation of a message and its delivery at its destination. This study considers the average of the latency of the packets over the entire simulation time. This is the time as calculated for the delivered packets only. In most protocols, it is desired that the value of latency time average is low. In the DTNs environment the latency is acceptable at some extent [6]. 5.4 HopCount Average It is the mean hops which a message takes to reach its destination 6. RESULTS AND DISCUSSION 6.1 Delivery Probability The delivery probability of MOFO buffer management technique with Epidemic, Prophet and MaxProp routing protocols under variable message buffer size is shown in Chart 1. 1. The Chart shows that the delivery probability of all the three routing protocols under MOFO buffer management technique increase as the message buffer size increases.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 85 Chart- 1: Delivery Probability 2. The overlapping lines of Epidemic and Prophet shows that delivery probability of Epidemic and Prophet are same at a particular message buffer size 3. Whereas the delivery probability of MaxProp is much higher than Epidemic and Prophet routing protocols at all the message buffer sizes. 6.2 Overhead Ratio The overhead ratio of MOFO buffer management technique with Epidemic, Prophet and MaxProp routing protocols under variable message buffer size is shown in Chart- 2. 1. The Chart 2 clearly demonstrate that the overhead ratio under all the three protocols falls sharply as the message buffer size increased from 5MB to 10MB. Chart- 2: Overhead Ratio 2. As the message buffer size increased further, the decline in overhead ratio under all the three routing protocols continues very slowly. 3. Overhead ratio under MaxProp is lower than Epidemic and Prophet routing protocols. 4. Overhead ratio under Epidemic is much higher than Prophet and MaxProp at 5MB, but becomes equals with Prophet from 10MB message buffer size. 6.3 Latency Average Chart- 3: Latency Average The latency average of MOFO buffer management technique with Epidemic, Prophet and MaxProp routing protocols under variable message buffer size is shown in Chart- 3. 1. The Chart 3 depicts that the latency average under Epidemic and Prophet routing protocols increases with respect to message buffer size. 2. Whereas latency average under MaxProp increases up to 15MB message buffer size and then declines constantly with increasing message buffer size. 3. The latency average of MaxProp is higher than Epidemic and Prophet routing protocols up to 10MB message buffer size. 4. But as the message buffer size increased, the latency average under MaxProp drops significantly in contrast to Epidemic and Prophet routing protocols. 6.4 Hop Count Average The hop count average of MOFO buffer management technique with Epidemic, Prophet and MaxProp routing protocols under variable message buffer size is shown in Chart- 4. 1. The Chart- describes that the hop count average of MOFO buffer management technique under all the three routing protocols increases as the message buffer size increases. 2. The hop count average of MaxProp is higher than Epidemic and Prophet routing protocols. 3. Hop count average of Prophet is equal with Epidemic up to 20MB message buffer size, thereafter it gets marginally lower than Epidemic routing protocols.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 86 Chart- 4: Hop Count Average 7. CONCLUSIONS This study evaluated the performance of MOFO Buffer management technique with Epidemic, Prophet and MaxProp routing protocols under variable message buffer sizes. The results show that there are clear benefits of increasing the message buffer size for the parameters Delivery Probability, Overhead Ratio in case of all the routing protocols under study. The Delivery Probability, Overhead Ratio and Latency Time Average of MOFO with MaxProp routing protocol gives the best results among the three routing protocols under study. Whereas for the performance metric Hop Count Average, MOFO with Prophet is better than the other two routing protocols. In this study, MOFO buffer management technique with different routing protocols has been simulated on the ONE simulator. They have not been deployed on the real network. There may be a higher significance that this technique and protocols be tested out on the real network. This study assumes that all the nodes have unlimited energy. This study do not considers the energy loss of the network as the message buffer size increased for all the nodes. Such constraints should take into account, the energy spent for the network as the message buffer size increases. REFERENCES [1]. A. Vasilakos, Y. Zhang, and T. Spyropolous. Delay Tolerant Networks: Protocols and Applications. 2009. [2] Sulma Rashid, Qaisar Ayub, et al. E-DROP: An Effective Drop Buffer Management Policy for DTN Routing Protocols. International Journal of Computer Applications (0975 – 8887) Volume 13– No.7, January 2011 [3] Andrew Michael Grundy. Congestion Control Framework For Delay-Tolerant Communications. A Ph.D thesis, University of Nottingham, July 2012 [4] Khalil Massri, Alessandro Vernata, Andrea Vitaletti. Routing Protocols for Delay Tolerant Networks: a Quantitative Evaluation. Published in PM2HW2N‟12 Proceedings of the 7th ACM workshop Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2012, pp 107-114 [5] J. Burgess, B. Gallagher, D. Jensen, B.N. Levine. MaxProp: Routing for Vehicle-Based Disruption- Tolerant Networks. Published in INFOCOM 2006, 25th IEEE International Conference on Computer Communications, pp 1-11. [6] Priyanka Gururaj Rotti. Opportunistic Lookahead Routing Protocol For Delay Tolerant Networks. A Theses submitted in Visvesvaraya Technological University, 2008 December 2012 [7] J. Sushant, K. Fall, R. Patra. Routing in a Delay Tolerant Network. Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications. Vol. 34, No. 4, pp.145-158, 2004. [8] Evan P.C.Jones, Paul A.S. Ward. Routing Strategies for Delay-Tolerant Networks. Submitted in the Computer Communication Review, 2006 [9] Ari Keranen. Opportunistic Network Environment simulator. Special assignment submitted in Helsiniki University of Technology, May 29, 2008 [10] Khaled A.Harras. Challenged Networks –Protocol and Architectural Challenges in Delay and Disruption Tolerant Networks. A thesis submitted at University of California in Santa Barbara, 2008. [11] http://www.netlab.tkk.fi/tutkimus/dtn/theone/ accessed on October, 2013. [12] Wenrui Zhao. Routing and Network Design in Delay Tolerant Networks. A theses presented to the Academic Faculty of College of Computing, Georgia Institute of Technology, December 2006. [13] Evan P.C. Jones. Practical Routing in Delay-Tolerant Networks. A theses submitted at University of Waterloo, Ontario, Canada, 2006. [14] Samo Grasic, Anders Lindgren. An analysis of Evaluation Practices for DTN Routing Protocols. Published in CHANTS‟12 Proceedings of the seventh ACM international workshop on Challenged networks, 2012 pp 57-64. [15] Jahwan Koo, Seongjin Ahn, Jinwook Chung. A Comparative Study of Queue, Delay and Loss Characteristics of AQM Schemes in QOS-Enabled Networks. Published in Computing and Informatics, Vol.22, 2003, pp 1001-1019 [16] Hemal Shah, Yogeshwar P. Kosta, Evolution of Routing Techniques, Routing Protocols and Routing Efficiencies for Delay Tolerant Network. Published in IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010