Spotting Opportunity today and recognizing the same is the vision of the expert. The wireless
communication network regime is one such environment that offers such a platform for many working
scientific, academic and engineering experts. Henceforth, “Opportunistic-network” is a recent evolution
of the above said phenomena in the wireless community. They function by spontaneous cooperation &
coordination giving birth to a special type network called wireless-mobile-adhoc-network (W-MAN). As
said, these networks are formed instantaneously in a random manner – breaking the conventional
mathematically evolved algorithms’, and provided the quintessential of a network(s) that exist in
neighbourhood(s) or approachable limits. Is more of situational based, exploited for specialized purpose
or advantage, which mimics all the characteristic of a well evolved network. Such networks, lack an endto-end path, contact, cooperation and coordination; which is mainly opportunity based, and break or
even disintegrate soon after discovery, thus the challenge lay in integration, construction and probable
sustenance or even mid-way reconstruction till purpose. One can cite many realistic scenarios fitting to
this situation. For example, wildlife tracking sensor networks, military networks, vehicular ad hoc
networks to mention a few. To transmit information under such circumstances/scenarios researchers have
proposed various efficient forwarding (single copy), replication routing and controlled based schemes. In
this paper, we propose to explore, investigate and analyze most of the schemes [1] [2] [3] [4] [5] [6] and
present the findings of the said scheme by consolidating critical parameters and issues and towards the
end of this paper, algorithms, possible solutions to deal with such complex and dynamic situations
through W-MAN scheme suggested by us.
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
Delay-Tolerant Networks are those which lacks continuous communications among mobile
nodes . Distributed clustering scheme and cluster-based routing protocol are used for DelayTolerant
Mobile Networks (DTMNs). The basic idea is to distributive group mobile nodes with
similar mobility pattern into a cluster, which can then interchangeably share their resources for
overhead reduction and load balancing, aiming to achieve efficient and scalable routing in DTMN. Load balancing is carried out in two ways, Intra cluster load balancing and Inter cluster load balancing. The Convergence and stability become major challenges in distributed clustering in DTMN. An efficient routing protocol will be provided for the delay tolerant networks through which the stability of the network is maintained .Based on nodal contact probabilities, a set of functions including Sync(), Leave(), and Join() are devised for cluster formation and gateway selection. Finally, the gateway nodes exchange network information and perform routing
Present new mechanisms for modelling multiple interfaces on a node, support for interference-limited links and a frame-work for modelling complex applications running on the nodes. Furthermore, provide an overview of concrete use cases where the simulator has been successfully exploited to study a variety of aspects related to opportunistic, message-based communications. Node movement is implemented by movement models. These are either synthetic models or existing movement traces. Connectivity between the nodes is based on their location, communication range and the bit-rate. The routing function is implemented by routing modules that decide which messages to forward over existing contacts. Finally, the messages themselves are generated either through event generators that generate random traffic between the nodes, or through applications that generate traffic based on application interactions. The main functions of the simulator are the modelling of node movement, inter-node contacts using various interfaces, routing, message handling and application interactions. Result collection and analysis are done through visualization, reports and post-processing tools.
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...ijasuc
Broadcasting is a fundamental service in Mobile Ad hoc Networks (MANETs). Cluster based approach
are proposed in literature to reduce the network collision, to reduce delay of packet transmission, to
reduce the energy consumption and improves the throughput. In this paper, a cluster- based
infrastructure is proposed for broadcasting in MANETs. The backbone of the network takes advantage of
the cluster structure and only requires cluster- heads and some selected gateways to forward the
broadcast packet. Each cluster head selects some gateways to forward the packet when it sends the
packet to all the cluster heads in its coverage set. Cluster structures have been simulated using mobile
simulator Glomosim 2.03, which gives better performance to reduce the network collision, to reduce
delay of packet transmission, to reduce the energy consumption and improves the throughput.
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisNagendra Posani
Delay Tolerant Networks(DTN) are a class of emerg- ing networks which experience intermittent connectivity and lack end-to-end paths due to absence of well-defined infrastructure. In this paper we explore the nuances of multicasting in DTNs. Multicasting enables efficient distribution of messages to a group of users, a paradigm that can be applicable in the context of DTNs. While multicasting in internet and ad-hoc networks has been studied extensively, realizing the same in DTNs is non- trivial given that many factors have to be considered. This paper, presents an implementation of multicast routing for various protocols in DTNs using ONE simulator. It also provides the analysis and performance results for the various protocols studies against the different movement models.
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
In Mobile Ad Hoc Network (MANET), the collection of mobile nodes gets communicated without the need of any customary infrastructure. In MANET, repeated topology changes and intermittent link breakage
causes the failure of existing path. This leads to rediscovery of new route by broadcasting RREQ packet.The number of RREQ packet in the network gets added due to the increased amount of link failures. This result in increased routing overhead which degrades the packet delivery ratio in MANET. While designing
routing protocols for MANET, it is indispensable to reduce the overhead in route discovery. In our previous
work[17], routing protocol based on neighbour details and probabilistic knowledge is utilized, additionally
the symmetric cipher AES is used for securing the data packet. Through this protocol, packet delivery ratio
gets increased and confidentiality is ensured. But there is a problem in secure key exchange among the
source and destination while using AES. To resolve that problem, hybrid cryptographic system i.e.,
combination of AES and RSA is proposed in this paper. By using this hybrid cryptographic scheme and the
routing protocol based on probability and neighbour knowledge, enhanced secure packet delivery is
ensured in MANET
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
Delay-Tolerant Networks are those which lacks continuous communications among mobile
nodes . Distributed clustering scheme and cluster-based routing protocol are used for DelayTolerant
Mobile Networks (DTMNs). The basic idea is to distributive group mobile nodes with
similar mobility pattern into a cluster, which can then interchangeably share their resources for
overhead reduction and load balancing, aiming to achieve efficient and scalable routing in DTMN. Load balancing is carried out in two ways, Intra cluster load balancing and Inter cluster load balancing. The Convergence and stability become major challenges in distributed clustering in DTMN. An efficient routing protocol will be provided for the delay tolerant networks through which the stability of the network is maintained .Based on nodal contact probabilities, a set of functions including Sync(), Leave(), and Join() are devised for cluster formation and gateway selection. Finally, the gateway nodes exchange network information and perform routing
Present new mechanisms for modelling multiple interfaces on a node, support for interference-limited links and a frame-work for modelling complex applications running on the nodes. Furthermore, provide an overview of concrete use cases where the simulator has been successfully exploited to study a variety of aspects related to opportunistic, message-based communications. Node movement is implemented by movement models. These are either synthetic models or existing movement traces. Connectivity between the nodes is based on their location, communication range and the bit-rate. The routing function is implemented by routing modules that decide which messages to forward over existing contacts. Finally, the messages themselves are generated either through event generators that generate random traffic between the nodes, or through applications that generate traffic based on application interactions. The main functions of the simulator are the modelling of node movement, inter-node contacts using various interfaces, routing, message handling and application interactions. Result collection and analysis are done through visualization, reports and post-processing tools.
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...ijasuc
Broadcasting is a fundamental service in Mobile Ad hoc Networks (MANETs). Cluster based approach
are proposed in literature to reduce the network collision, to reduce delay of packet transmission, to
reduce the energy consumption and improves the throughput. In this paper, a cluster- based
infrastructure is proposed for broadcasting in MANETs. The backbone of the network takes advantage of
the cluster structure and only requires cluster- heads and some selected gateways to forward the
broadcast packet. Each cluster head selects some gateways to forward the packet when it sends the
packet to all the cluster heads in its coverage set. Cluster structures have been simulated using mobile
simulator Glomosim 2.03, which gives better performance to reduce the network collision, to reduce
delay of packet transmission, to reduce the energy consumption and improves the throughput.
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisNagendra Posani
Delay Tolerant Networks(DTN) are a class of emerg- ing networks which experience intermittent connectivity and lack end-to-end paths due to absence of well-defined infrastructure. In this paper we explore the nuances of multicasting in DTNs. Multicasting enables efficient distribution of messages to a group of users, a paradigm that can be applicable in the context of DTNs. While multicasting in internet and ad-hoc networks has been studied extensively, realizing the same in DTNs is non- trivial given that many factors have to be considered. This paper, presents an implementation of multicast routing for various protocols in DTNs using ONE simulator. It also provides the analysis and performance results for the various protocols studies against the different movement models.
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
In Mobile Ad Hoc Network (MANET), the collection of mobile nodes gets communicated without the need of any customary infrastructure. In MANET, repeated topology changes and intermittent link breakage
causes the failure of existing path. This leads to rediscovery of new route by broadcasting RREQ packet.The number of RREQ packet in the network gets added due to the increased amount of link failures. This result in increased routing overhead which degrades the packet delivery ratio in MANET. While designing
routing protocols for MANET, it is indispensable to reduce the overhead in route discovery. In our previous
work[17], routing protocol based on neighbour details and probabilistic knowledge is utilized, additionally
the symmetric cipher AES is used for securing the data packet. Through this protocol, packet delivery ratio
gets increased and confidentiality is ensured. But there is a problem in secure key exchange among the
source and destination while using AES. To resolve that problem, hybrid cryptographic system i.e.,
combination of AES and RSA is proposed in this paper. By using this hybrid cryptographic scheme and the
routing protocol based on probability and neighbour knowledge, enhanced secure packet delivery is
ensured in MANET
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics
algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and
alternative cluster head node, problem of delay on processing, processing of selecting members, decrease
of expenses, and energy consumption, decrease of sending message, and receiving messages inside the
clusters, selecting of cluster heads in large sensor networks were solved. This algorithm uses hierarchical
heterogeneous network (3-levels), collective intelligence, and intra-cluster interaction for communications.
Also it will solve the problems of sending data in Multi-BS mobile networks, expanding inter-cluster
networks, overlap cluster, genesis orphan nodes, boundary change dynamically clusters, using backbone
networks, cloud sensor. Using sleep/wake scheduling algorithm or TDMA-schedule alternative cluster head
node provides redundancy, and fault tolerance. Local processing in cluster head nodes, and alternative
cluster head, intra-cluster and inter-cluster communications such as Multi-HOP cause increase on
processing speed, and sending data intra-cluster and inter-cluster. Decrease of overhead network, and
increase the load balancing among cluster heads. Using encapsulation of data method, by cluster head
nodes, energy consumption decrease during sending data. Also by improving quality of service (QoS) in
CBRP, LEACH, 802.15.4, decrease of energy consumption in sensors, cluster heads and alternative cluster
head nodes, cause increase on lift time of sensor networks.
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
IJCERT Standard on-line Journal
ISSN(Online):2349-7084,(An ISO 9001:2008 Certified Journal)
iso nicir csir
http://www.ijcert.org offers Discount for Indian research Scholars
IJCERT (ISSN 2349–7084 (Online)) is approved by National Science Library (NSL), National Institute of Science Communication And Information Resources (NISCAIR), Council of Scientific and Industrial Research, New Delhi, India.
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
Delay Tolerant Network shows many issues that are exist in traditional network. Opportunistic network emerge as interesting evolution in MANET. Mobile nodes in the opportunistic network communicate with each other even in case of no route connection. In this paper a kiosk (or hub station) that is connected to villages to establish internet connection. Such kiosk is placed where traffic frequency is high. We will use high frequency sensor in vehicles. When passing through kiosk, high frequency sensor will establish connection to kiosk & kiosk will connect villages to internet. This system is very useful in crime information sharing services. As an example, if there are a person who is victim of any crime or in a trouble condition. He/she have mobile devices connect to internet. They send a trouble message which is passed to near kiosk and passed on to vehicles and forward their information to police station. This system is helpful in villages, where network communication is not proper.
Wireless Mesh Network rose as a promising innovation for providing quick and productive communication for which numerous algorithms have been proposed in networking infrastructure. For routing there are various performance parameters such as throughput, network congestion, resiliency, fairness, robustness, network jitter, delay, stability, optimality, simplicity, completeness etc. Robustness provides the capability to deal with all the failures that come across during the connection in the network to increase the network performance. In this paper we have studied and analyzed three algorithms namely on robustness parameter Resilient multicasting [2], Resilient Opportunistic Mesh Routing for Wireless Mesh Network (ROMER) [3], and Buffer Based Routing (BBR) [4], in Wireless Mesh Networks. Analysis through various parameters such as network congestion, network throughput and resiliency [5], shows network performance of BBR is better.
Effective Path Identification Protocol for Wireless Mesh NetworksIDES Editor
Wireless Mesh Networks (WMNs) have emerged as
a key technology for next-generation wireless networking.
Routing is a key factor for transfer of packets from source to
destination. SrcRR is widely used protocol for transferring
packets from source to destination. This protocol often uses
Dijkstra’s algorithm on its link state database to find the next
alternative path to the destination when ever the ETX metric
of the link changes.This is a time consuming process if the
ETX metric of the links are changing frequently. So this paper
eliminates the use of Dijkistra’s algorithm and uses the a
search operation for finding the best paths.
Simulation Issues in Wireless Sensor Networks: A SurveyM H
This paper presents a survey of simulation tools and systems for wireless sensor networks. Wireless sensor network modelling and simulation methodologies are presented for each system alongside judgments concerning their relative ease of use and accuracy. Finally, we propose a mixed-mode simulation methodology that integrates a simulated environment with real wireless sensor network testbed hardware in order to improve both the accuracy and scalability of results when evaluating different prototype designs and systems.
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
Link aware nice application level multicast protocolIJCNCJournal
Multicast is one of the most efficient ways to dist
ribute data to multiple users. There are different
types of
Multicast such as IP Multicast, Overlay Multicast,
and Application Layer Multicast (ALM). In this pape
r,
we present a link-aware Application Layer (ALM) Mul
ticast algorithm. Our proposed algorithm, Link
Aware-NICE (LA-NICE) [1], is an enhanced version of
the NICE protocol [2]. LA-NICE protocol uses the
variations of bandwidth or capacity in communicatio
n links to improve multicast message delivery and
minimize end-to-end delay. OMNeT++ simulation frame
work [3] was used to evaluate LA-NICE. The
evaluation is done through a comparison between LA-
NICE and NICE. The simulation results showed that
LA-NICE produces an increased percentage of success
ful message delivery ranging from 2% to 10%
compared to NICE. Also, LA-NICE has less average de
lay and less average message hop count than NICE
which reduces the overall latency of message delive
ry
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...ijasuc
A crucial issue for a mobile ad hoc network is the handling of a large number of nodes. As more nodes join
the mobile ad hoc network, contention and congestion are more likely. The on demand routing protocols
which broadcasts control packets to discover routes to the destination nodes, generate a high number of
broadcast packets in a larger networks causing contention and collision. We propose an efficient route
discovery protocol, which reduces the number of broadcast packet, using controlled flooding technique.
The simulation results show that the proposed probabilistic flooding decreases the number of control
packets floating in the network during route discovery phase, without lowering the success ratio of path
discoveries. Furthermore, the proposed method adapts to the normal network conditions. The results show
that up to 70% of control packet traffic is saved in route discovery phase when the network is denser.
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
A wireless sensor network is a network of tiny nodes with wireless sensing capacity for data collection processing and further communicating with the Base Station this paper discusses the overall mechanism of data dissemination right from data collection at the sensor nodes, clustering of sensor nodes, data aggregation at the cluster heads and disseminating data to the Base Station the overall motive of the paper is to conserve energy so that lifetime of the network is extended this paper highlights the existing algorithms and open research gaps in efficient data dissemination.
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...IDES Editor
Network-on-Chip (NoC) is a packet switched onchip
communication network designed using a layered
methodology i.e. “routes packets, not wires”. It is an efficient
on chip communication architecture for System on Chip (SoC)
architectures. NoCs solved the disadvantages of SoCs and are
scalable. Each route in NoC includes some routers and it takes
a few clock periods by passing a router.
When the network is in congestion, the package transmission
will produce much more time delay. So adopting an appropriate
routing algorithm to get the balance between the time delay
and throughput rate becomes the key problem. In this paper
we tried to solve that problem using torus topology with our
modified XY routing algorithm.
We used NIRGAM simulator for analysis of latency and
throughput of modified XY routing algorithm for 2D torus
topology. 3x3 network size used for analyze the performance.
We consider all tiles as source, all tiles as destination and
vary the packet size & traffic used is Constant Bit Rate (CBR)
random traffic. It is found that packet size increases then
latency/packet increases and throughput (in Gbps) also
increases but latency/flit decreases.
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
Delay Tolerant Network (DTNs) is a wireless network that experiences frequent connectivity and due to mobility of nodes long duration partitions occurred during transmission of data. DTN has the main feature that there is not full path present from source to destination. In Delay Tolerant Network (DTN), traditional routing protocol for mobile Ad-hoc protocol to be ineffective to extend of message transmission between different nodes. Delay tolerant networks (DTNs) are used in many applications like in deep space communications, under water Acoustic Network, Sparsely Populated Areas Networks Etc. In such network a routing with minimum energy congumption is major issue. In this paper, we try to explore a routing issue in DTN. First energy requirement and routing with their corresponding countermeasures in DTN are explained. Moving nodes in DTN keep the updating of network as well energy at every stage. By using the geographical concept the location of each node is maintained by updating in topology. There are many routing protocols are available for routing purpose in DTN.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
Reliable group communication is a challenging issue for most Mobile Ad-hoc Networks (MANETs) due to
dynamic nature of wireless mobile nodes, group key establishment and management, ensuring secure
information exchange and Quality of Service (QoS) in data transfer. Recently multicast and broadcast
routing protocols are emerging for supporting QoS aware group communication. In MANETs QoS
requirements can be quantified by a set of measurable pre-specified service attributes such as packet
delivery ratio, end-to-end delay, packet loss probability, network control overhead, throughput,
bandwidth, power consumption, service coverage area etc. In this paper, the performance of a neighbor
knowledge based broadcast protocol is analyzed using different QoS metrics (packet delivery ratio, end-toend delay, packet loss probability and network control overhead). BCAST is used as broadcast protocol.
The performance differentials are analyzed using NS-2 network simulator for varying number of data
senders (multicast group size) and data sending rate (offered traffic to the network) over QoS aware group
communication. Simulation results show that BCAST performs well in most cases and provides robust
performance even with high traffic environments.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
Reliable group communication is a challenging issue for most Mobile Ad-hoc Networks (MANETs) due to
dynamic nature of wireless mobile nodes, group key establishment and management, ensuring secure
information exchange and Quality of Service (QoS) in data transfer. Recently multicast and broadcast
routing protocols are emerging for supporting QoS aware group communication. In MANETs QoS
requirements can be quantified by a set of measurable pre-specified service attributes such as packet
delivery ratio, end-to-end delay, packet loss probability, network control overhead, throughput,
bandwidth, power consumption, service coverage area etc. In this paper, the performance of a neighbor
knowledge based broadcast protocol is analyzed using different QoS metrics (packet delivery ratio, end-toend delay, packet loss probability and network control overhead). BCAST is used as broadcast protocol.
The performance differentials are analyzed using NS-2 network simulator for varying number of data
senders (multicast group size) and data sending rate (offered traffic to the network) over QoS aware group
communication. Simulation results show that BCAST performs well in most cases and provides robust
performance even with high traffic environments.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PROPOSED A HETEROGENEOUS CLUSTERING ALGORITHM TO IMPROVE QOS IN WSNIJCNCJournal
In this article it has presented leach extended hierarchical 3-level clustered heterogeneous and dynamics
algorithm. On suggested protocol (LEH3LA) with planning of selected auction cluster head, and
alternative cluster head node, problem of delay on processing, processing of selecting members, decrease
of expenses, and energy consumption, decrease of sending message, and receiving messages inside the
clusters, selecting of cluster heads in large sensor networks were solved. This algorithm uses hierarchical
heterogeneous network (3-levels), collective intelligence, and intra-cluster interaction for communications.
Also it will solve the problems of sending data in Multi-BS mobile networks, expanding inter-cluster
networks, overlap cluster, genesis orphan nodes, boundary change dynamically clusters, using backbone
networks, cloud sensor. Using sleep/wake scheduling algorithm or TDMA-schedule alternative cluster head
node provides redundancy, and fault tolerance. Local processing in cluster head nodes, and alternative
cluster head, intra-cluster and inter-cluster communications such as Multi-HOP cause increase on
processing speed, and sending data intra-cluster and inter-cluster. Decrease of overhead network, and
increase the load balancing among cluster heads. Using encapsulation of data method, by cluster head
nodes, energy consumption decrease during sending data. Also by improving quality of service (QoS) in
CBRP, LEACH, 802.15.4, decrease of energy consumption in sensors, cluster heads and alternative cluster
head nodes, cause increase on lift time of sensor networks.
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
IJCERT Standard on-line Journal
ISSN(Online):2349-7084,(An ISO 9001:2008 Certified Journal)
iso nicir csir
http://www.ijcert.org offers Discount for Indian research Scholars
IJCERT (ISSN 2349–7084 (Online)) is approved by National Science Library (NSL), National Institute of Science Communication And Information Resources (NISCAIR), Council of Scientific and Industrial Research, New Delhi, India.
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
Delay Tolerant Network shows many issues that are exist in traditional network. Opportunistic network emerge as interesting evolution in MANET. Mobile nodes in the opportunistic network communicate with each other even in case of no route connection. In this paper a kiosk (or hub station) that is connected to villages to establish internet connection. Such kiosk is placed where traffic frequency is high. We will use high frequency sensor in vehicles. When passing through kiosk, high frequency sensor will establish connection to kiosk & kiosk will connect villages to internet. This system is very useful in crime information sharing services. As an example, if there are a person who is victim of any crime or in a trouble condition. He/she have mobile devices connect to internet. They send a trouble message which is passed to near kiosk and passed on to vehicles and forward their information to police station. This system is helpful in villages, where network communication is not proper.
Wireless Mesh Network rose as a promising innovation for providing quick and productive communication for which numerous algorithms have been proposed in networking infrastructure. For routing there are various performance parameters such as throughput, network congestion, resiliency, fairness, robustness, network jitter, delay, stability, optimality, simplicity, completeness etc. Robustness provides the capability to deal with all the failures that come across during the connection in the network to increase the network performance. In this paper we have studied and analyzed three algorithms namely on robustness parameter Resilient multicasting [2], Resilient Opportunistic Mesh Routing for Wireless Mesh Network (ROMER) [3], and Buffer Based Routing (BBR) [4], in Wireless Mesh Networks. Analysis through various parameters such as network congestion, network throughput and resiliency [5], shows network performance of BBR is better.
Effective Path Identification Protocol for Wireless Mesh NetworksIDES Editor
Wireless Mesh Networks (WMNs) have emerged as
a key technology for next-generation wireless networking.
Routing is a key factor for transfer of packets from source to
destination. SrcRR is widely used protocol for transferring
packets from source to destination. This protocol often uses
Dijkstra’s algorithm on its link state database to find the next
alternative path to the destination when ever the ETX metric
of the link changes.This is a time consuming process if the
ETX metric of the links are changing frequently. So this paper
eliminates the use of Dijkistra’s algorithm and uses the a
search operation for finding the best paths.
Simulation Issues in Wireless Sensor Networks: A SurveyM H
This paper presents a survey of simulation tools and systems for wireless sensor networks. Wireless sensor network modelling and simulation methodologies are presented for each system alongside judgments concerning their relative ease of use and accuracy. Finally, we propose a mixed-mode simulation methodology that integrates a simulated environment with real wireless sensor network testbed hardware in order to improve both the accuracy and scalability of results when evaluating different prototype designs and systems.
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
In this paper data aggregation using multipath routing is proposed. In existing system, under hybrid scheme, it each sensor nodes generates information by sensing its physical environment and transmit to sink by multi hop communication. In network aggregation computation intermediate forwarding nodes can substantially increase the network life time but amount of data contained in single packet and make the system vulnerability to packet loss. Instead of retransmission it takes the additional time. Ad hoc On Demand Distance Vector routing protocol is used to improving the performance of data aggregation due to avoiding these problems.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which
corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in
modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control
digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits
will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for
broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient
algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were
compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
Link aware nice application level multicast protocolIJCNCJournal
Multicast is one of the most efficient ways to dist
ribute data to multiple users. There are different
types of
Multicast such as IP Multicast, Overlay Multicast,
and Application Layer Multicast (ALM). In this pape
r,
we present a link-aware Application Layer (ALM) Mul
ticast algorithm. Our proposed algorithm, Link
Aware-NICE (LA-NICE) [1], is an enhanced version of
the NICE protocol [2]. LA-NICE protocol uses the
variations of bandwidth or capacity in communicatio
n links to improve multicast message delivery and
minimize end-to-end delay. OMNeT++ simulation frame
work [3] was used to evaluate LA-NICE. The
evaluation is done through a comparison between LA-
NICE and NICE. The simulation results showed that
LA-NICE produces an increased percentage of success
ful message delivery ranging from 2% to 10%
compared to NICE. Also, LA-NICE has less average de
lay and less average message hop count than NICE
which reduces the overall latency of message delive
ry
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for ...ijasuc
A crucial issue for a mobile ad hoc network is the handling of a large number of nodes. As more nodes join
the mobile ad hoc network, contention and congestion are more likely. The on demand routing protocols
which broadcasts control packets to discover routes to the destination nodes, generate a high number of
broadcast packets in a larger networks causing contention and collision. We propose an efficient route
discovery protocol, which reduces the number of broadcast packet, using controlled flooding technique.
The simulation results show that the proposed probabilistic flooding decreases the number of control
packets floating in the network during route discovery phase, without lowering the success ratio of path
discoveries. Furthermore, the proposed method adapts to the normal network conditions. The results show
that up to 70% of control packet traffic is saved in route discovery phase when the network is denser.
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
A wireless sensor network is a network of tiny nodes with wireless sensing capacity for data collection processing and further communicating with the Base Station this paper discusses the overall mechanism of data dissemination right from data collection at the sensor nodes, clustering of sensor nodes, data aggregation at the cluster heads and disseminating data to the Base Station the overall motive of the paper is to conserve energy so that lifetime of the network is extended this paper highlights the existing algorithms and open research gaps in efficient data dissemination.
Analysis of Latency and Throughput of 2D Torus Topology using Modified XY Rou...IDES Editor
Network-on-Chip (NoC) is a packet switched onchip
communication network designed using a layered
methodology i.e. “routes packets, not wires”. It is an efficient
on chip communication architecture for System on Chip (SoC)
architectures. NoCs solved the disadvantages of SoCs and are
scalable. Each route in NoC includes some routers and it takes
a few clock periods by passing a router.
When the network is in congestion, the package transmission
will produce much more time delay. So adopting an appropriate
routing algorithm to get the balance between the time delay
and throughput rate becomes the key problem. In this paper
we tried to solve that problem using torus topology with our
modified XY routing algorithm.
We used NIRGAM simulator for analysis of latency and
throughput of modified XY routing algorithm for 2D torus
topology. 3x3 network size used for analyze the performance.
We consider all tiles as source, all tiles as destination and
vary the packet size & traffic used is Constant Bit Rate (CBR)
random traffic. It is found that packet size increases then
latency/packet increases and throughput (in Gbps) also
increases but latency/flit decreases.
A Review on Geographical Location Based Energy Efficient Direction Restricted...IJRES Journal
Delay Tolerant Network (DTNs) is a wireless network that experiences frequent connectivity and due to mobility of nodes long duration partitions occurred during transmission of data. DTN has the main feature that there is not full path present from source to destination. In Delay Tolerant Network (DTN), traditional routing protocol for mobile Ad-hoc protocol to be ineffective to extend of message transmission between different nodes. Delay tolerant networks (DTNs) are used in many applications like in deep space communications, under water Acoustic Network, Sparsely Populated Areas Networks Etc. In such network a routing with minimum energy congumption is major issue. In this paper, we try to explore a routing issue in DTN. First energy requirement and routing with their corresponding countermeasures in DTN are explained. Moving nodes in DTN keep the updating of network as well energy at every stage. By using the geographical concept the location of each node is maintained by updating in topology. There are many routing protocols are available for routing purpose in DTN.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
Reliable group communication is a challenging issue for most Mobile Ad-hoc Networks (MANETs) due to
dynamic nature of wireless mobile nodes, group key establishment and management, ensuring secure
information exchange and Quality of Service (QoS) in data transfer. Recently multicast and broadcast
routing protocols are emerging for supporting QoS aware group communication. In MANETs QoS
requirements can be quantified by a set of measurable pre-specified service attributes such as packet
delivery ratio, end-to-end delay, packet loss probability, network control overhead, throughput,
bandwidth, power consumption, service coverage area etc. In this paper, the performance of a neighbor
knowledge based broadcast protocol is analyzed using different QoS metrics (packet delivery ratio, end-toend delay, packet loss probability and network control overhead). BCAST is used as broadcast protocol.
The performance differentials are analyzed using NS-2 network simulator for varying number of data
senders (multicast group size) and data sending rate (offered traffic to the network) over QoS aware group
communication. Simulation results show that BCAST performs well in most cases and provides robust
performance even with high traffic environments.
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
Reliable group communication is a challenging issue for most Mobile Ad-hoc Networks (MANETs) due to
dynamic nature of wireless mobile nodes, group key establishment and management, ensuring secure
information exchange and Quality of Service (QoS) in data transfer. Recently multicast and broadcast
routing protocols are emerging for supporting QoS aware group communication. In MANETs QoS
requirements can be quantified by a set of measurable pre-specified service attributes such as packet
delivery ratio, end-to-end delay, packet loss probability, network control overhead, throughput,
bandwidth, power consumption, service coverage area etc. In this paper, the performance of a neighbor
knowledge based broadcast protocol is analyzed using different QoS metrics (packet delivery ratio, end-toend delay, packet loss probability and network control overhead). BCAST is used as broadcast protocol.
The performance differentials are analyzed using NS-2 network simulator for varying number of data
senders (multicast group size) and data sending rate (offered traffic to the network) over QoS aware group
communication. Simulation results show that BCAST performs well in most cases and provides robust
performance even with high traffic environments.
ADAPTIVE AODV ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKSijasuc
Enhancing route request broadcasting efficiency in protocols constitutes a substantial part of research in
Mobile Adhoc NETwork (MANET) routing. We suggest a novel approach to constrain route request
broadcast based on mobility of nodes. This technique is best suited for networks where the movement of
the nodes is with different random velocities in different random directions. This protocol adapts itself
automatically to two mobility conditions i.e. moderate and high speed. Intuition behind this technique is
that the nodes moving with higher mobility rates will have better recent routes compared to slow moving
nodes which may not be aware of the drastic changes happening in the network .In this approach we
select the neighbourhood nodes for broadcasting route requests based on their mobility rate and recent
involvement in routing so that blind flooding of the route request in the network can be avoided.
Our contributions include: (i) Two new enhancement technique to reduce route request broadcast for
reactive ad hoc routing protocols; (ii) Implementation of Enhanced Ad-hoc On-demand Distance Vector
routing 1 (EAODV1) for moderate speed of node movement;(iii) Implementation of Enhanced Ad-hoc Ondemand Distance Vector routing 2 (EAODV2) for high speed of node movement; (iv) Implementation of
Adaptive AODV (AAODV) which automatically switches over between EAODV1 and EAODV2 based on
the mobility of the nodes. (v) An extensive simulation study of EAODV1, EAODV2 and AAODV using
Glomosim showing significant improvement in overhead, packet delivery ratio and the end-to-end delay
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...CSCJournals
In this paper, we address the problem of routing in “delay tolerant networks” (DTN). In such networks there is no guarantee of finding a complete communication path connecting the source and the destination at any time, especially when the destination is not in the same region of the source, what makes the traditional routing protocols inefficient in that transmission of the messages between nodes. We propose to combine the routing protocol Prophet and the model of \"transfer by delegation\" (custody transfer) to improve the routing in DTN network and to exploit the nodes as a common carriers of messages between the network partitioned. To implement this approach and assess those improvements and changes we developed a DTN simulator. Simulation examples are illustrated in the article.
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks pijans
The wireless mobile ad hoc network (MANET) architecture is one consisting of a set of mobile hosts
capable of communicating with each other without the assistance of base stations. This has made possible
creating a mobile distributed computing environment and has also brought several new challenges in
distributed protocol design. In this paper, we study a very fundamental problem, the fault tolerance
problem, in a MANET environment and propose a minimum process coordinated checkpointing scheme.
Since potential problems of this new environment are insufficient power and limited storage capacity, the
proposed scheme tries to reduce the amount of information saved for recovery. The MANET structure used
in our algorithm is hierarchical based. The scheme is based for Cluster Based Routing Protocol (CBRP)
which belongs to a class of Hierarchical Reactive routing protocols. The protocol proposed by us is nonblocking coordinated checkpointing algorithm suitable for ad hoc environments. It produces a consistent
set of checkpoints; the algorithm makes sure that only minimum number of nodes in the cluster are
required to take checkpoints; it uses very few control messages. Performance analysis shows that our
algorithm outperforms the existing related works and is a novel idea in the field. Firstly, we describe an
organization of the cluster. Then we propose a minimum process coordinated checkpointing scheme for
cluster based ad hoc routing protocols.
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
Wireless mesh network (WMN) is a novel emerging tec
hnology that will change the world more effectively
and efficiently. It is regarded as a highly promisi
ng technology being increasingly important in mobil
e
wireless networks of the future generation. In this
paper, we consider energy management for wireless
mesh networks from a point of view that started rec
ently to attract the attention means the conservati
on of
energy for operational and the environment reasons
which is known as the Green Networking. This paper
discusses different routing protocols to establish
a protocol which considers energy efficiency. The e
xisting
protocols are compared using the basic functions of
routing and the suggest protocol is designed to
overcome some of their shortcomings. We are focusin
g on the conception of the cross-layer routing
protocol that is implemented in TDMA (Time Division
Multiple Access) wireless mesh networks based
MAC protocol.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
In MANET communication between two mobile nodes are carried out by routing protocol. In MANET each mobile node can directly communicate with other mobile node if both mobile nodes are within transmission range. Otherwise the nodes present in between have to forward the packets for them on network. dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. In this paper we proposed a novel Intrusion Detection and Prevention Scheme (IDPS) for protecting network against Blackhole attack. During the attack, a malicious node captures the data after the positive reply of route existence. Routing in Ad hoc networks has been a challenging task ever since the wireless networks came into existence. In multicasting the sender and communicated with multiple receivers. The routing misbehavior in multicast ODMRP is secured by proposed scheme. The proposed IDPS scheme first to detect the malicious nodes and after that block the activities of malicious nodes. The performance of proposed scheme is evaluated through performance metrics that shows the attacker routing misbehavior and proposed security scheme is provides secure and
vigorous performance in presence blackhole attacker.
Clustering effects on wireless mobile ad hoc networks performancesijcsit
A new era is dawning for wireless mobile ad hoc networks where communication will be done using a
group of mobile devices called cluster, hence clustered network. In a clustered network, protocols used by
these mobile devices are different from those used in a wired network; which helps to save computation
time and resources efficiently. This paper focuses on Cluster-Based Routing Protocol and Dynamic Source
Routing. The results presented in this paper illustrates the implementation of Ad-hoc On-Demand Distance
Vector routing protocol for enhancing mobile nodes performance and lifetime in a clustered network and to
demonstrate how this routing protocol results in time efficient and resource saving in wireless mobile ad
hoc networks.
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most
important process in communication and parallel computer is broadcast approach.. The approach of this
case of Broadcasting is to send the message from one source to all destinations in the network which corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in modern parallel computers which is characterized with low communication latency. We show how to apply
this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our
simulation results show the average of our proposed algorithm over the other algorithms that presented.
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...ijasuc
A wireless sensor network consists of light-weight, low power, small size sensor nodes. Routing in wireless
sensor networks is a demanding task. This demand has led to a number of routing protocols which
efficiently utilize the limited resources available at the sensor nodes. Most of these protocols are either
based on single hop routing or multi hop routing and typically find the minimum energy path without
addressing other issues such as time delay in delivering a packet, load balancing, and redundancy of data.
Response time is very critical in environment monitoring sensor networks where typically the sensors are
stationary and transmit data to a base station or a sink node. In this paper a faster load balancing routing
protocol based on location with a hybrid approach is proposed.
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...ijasuc
A wireless sensor network consists of light-weight, low power, small size sensor nodes. Routing in wireless
sensor networks is a demanding task. This demand has led to a number of routing protocols which
efficiently utilize the limited resources available at the sensor nodes. Most of these protocols are either
based on single hop routing or multi hop routing and typically find the minimum energy path without
addressing other issues such as time delay in delivering a packet, load balancing, and redundancy of data.
Response time is very critical in environment monitoring sensor networks where typically the sensors are
stationary and transmit data to a base station or a sink node. In this paper a faster load balancing routing
protocol based on location with a hybrid approach is proposed.
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...ijasuc
A wireless sensor network consists of light-weight, low power, small size sensor nodes. Routing in wireless
sensor networks is a demanding task. This demand has led to a number of routing protocols which
efficiently utilize the limited resources available at the sensor nodes. Most of these protocols are either
based on single hop routing or multi hop routing and typically find the minimum energy path without
addressing other issues such as time delay in delivering a packet, load balancing, and redundancy of data.
Response time is very critical in environment monitoring sensor networks where typically the sensors are
stationary and transmit data to a base station or a sink node. In this paper a faster load balancing routing
protocol based on location with a hybrid approach is proposed.
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
Abstract Mobile networks have received great deal of attention during last few decades due to their potential applications such as large scale, improved flexibility and reduced costs. This proposed work addresses two problems associated with mobile network such as method to reduce overhead between the nodes, and energy balanced routing of packets by Co-Operative opportunistic routing for cluster based communication. We propose a modified algorithm that uses On-Demand Opportunistic Group mobility based clustering (ODOGMBC) for forming the cluster and predicting the cluster mobility by neighbourhood update algorithm. Cluster formation involves election of a mobile node as Cluster head. Each cluster comprises of cluster head and non-cluster head node that forms a cluster dynamically. Each node in the network continuously finds it neighbour by communicating with them, and nodes have consistent updated routing information in route cache by neighbourhood update algorithm. In routing process packet forwarded by the source node is updated by intermediate forwarder if topology undergo changes. This opportunistic routing scheme provides responsive data transportation and managing the node effectively, even in heavily loaded environment. Thus, our proposed routing technique helps us to reduce overhead, increases efficiency and better control of path selection. Keywords- Clustering, Forwarder, MANET, Prediction, Reactive, opportunistic routing.
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
Energy is a valuable resource in wireless networks. For many multi hop networking scenarios, nodes require power for performing their operation, so requiring capable power management to make certain connectivity across the network. Though when wireless networks are attached outside power source due to obstruction between lively links the network may demand excessive energy per unit time Power due to this the overall performance is reduced. Since network life time or network capacity is depend on the power efficiency, many efforts to study energy efficient networks in the wireless network community. In multi hop wireless networks well organized routing algorithms are significant for network performance. We dispute that by carefully considering spatial reusability of the wireless communication media, we can reduce the overhead in multi hop wireless networks. To support our argument, propose Broadcast Tree Construction BTC and compare them with existing routing and multi path routing protocols, respectively. Our estimate outcome shows that proposed protocols significantly improve the end to end throughput compared with existing protocols. We also introduce the sleep scheduling approach for energy consumption and hybrid cryptography for security of data that can be prevent the data leakage and jammer attacks. Twinkal P. Dudhagawali | Prof. L. K. Gautam | Prof. V. P. Vaidya ""Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23489.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/23489/throughput-maximization-using-spatial-reusability-in-multi-hop-wireless-network/twinkal-p-dudhagawali
Anew approach to broadcast in wormhole routed three-dimensional networks is proposed. One of the most important process in communication and parallel computer is broadcast approach.. The approach of this case of Broadcasting is to send the message from one source to all destinations in the network which corresponds to one-to-all communication. Wormhole routing is a fundamental routing mechanism in modern parallel computers which is characterized with low communication latency. We show how to apply this approach to 3-D meshes. Wormhole routing is divided the packets into set of FLITS (flow control digits). The first Flit of the packet (Header Flit) is containing the destination address and all subsets flits will follow the routing way of the header Flit. In this paper, we consider an efficient algorithm for broadcasting on an all-port wormhole-routed 3D mesh with arbitrary size. We introduce an efficient algorithm, Y-Hamiltonian Layers Broadcast(Y-HLB). In this paper the behaviors of this algorithm were compared to the previous results, our paradigm reduces broadcast latency and is simpler. In this paper our simulation results show the average of our proposed algorithm over the other algorithms that presented.
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. we consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. We formulate this traffic allocation as a lossy network flow optimization problem using portfolio selection theory from financial statistics. We show that in multisource networks, this centralized optimization problem can be solved using a distributed algorithm based on decomposition in network utility maximization (NUM). We demonstrate the network's ability to estimate the impact of jamming and incorporate these estimates into the traffic allocation problem. Finally, we simulate the achievable throughput using our proposed traffic allocation method in several scenarios.
Similar to Exploiting Wireless Networks, through creation of Opportunity Network – Wireless-MobileAdhoc-Network (W-MAN) Scheme (20)
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...SocioCosmos
Get more Pinterest followers, reactions, and repins with Sociocosmos, the leading platform to buy all kinds of Pinterest presence. Boost your profile and reach a wider audience.
https://www.sociocosmos.com/product-category/pinterest/
“To be integrated is to feel secure, to feel connected.” The views and experi...AJHSSR Journal
ABSTRACT: Although a significant amount of literature exists on Morocco's migration policies and their
successes and failures since their implementation in 2014, there is limited research on the integration of subSaharan African children into schools. This paperis part of a Ph.D. research project that aims to fill this gap. It
reports the main findings of a study conducted with migrant children enrolled in two public schools in Rabat,
Morocco, exploring how integration is defined by the children themselves and identifying the obstacles that they
have encountered thus far. The following paper uses an inductive approach and primarily focuses on the
relationships of children with their teachers and peers as a key aspect of integration for students with a migration
background. The study has led to several crucial findings. It emphasizes the significance of speaking Colloquial
Moroccan Arabic (Darija) and being part of a community for effective integration. Moreover, it reveals that the
use of Modern Standard Arabic as the language of instruction in schools is a source of frustration for students,
indicating the need for language policy reform. The study underlines the importanceof considering the
children‟s agency when being integrated into mainstream public schools.
.
KEYWORDS: migration, education, integration, sub-Saharan African children, public school
Unlock TikTok Success with Sociocosmos..SocioCosmos
Discover how Sociocosmos can boost your TikTok presence with real followers and engagement. Achieve your social media goals today!
https://www.sociocosmos.com/product-category/tiktok/
Enhance your social media strategy with the best digital marketing agency in Kolkata. This PPT covers 7 essential tips for effective social media marketing, offering practical advice and actionable insights to help you boost engagement, reach your target audience, and grow your online presence.
Multilingual SEO Services | Multilingual Keyword Research | Filosemadisonsmith478075
Multilingual SEO services are essential for businesses aiming to expand their global presence. They involve optimizing a website for search engines in multiple languages, enhancing visibility, and reaching diverse audiences. Filose offers comprehensive multilingual SEO services designed to help businesses optimize their websites for search engines in various languages, enhancing their global reach and market presence. These services ensure that your content is not only translated but also culturally and contextually adapted to resonate with local audiences.
Visit us at -https://www.filose.com/
Your Path to YouTube Stardom Starts HereSocioCosmos
Skyrocket your YouTube presence with Sociocosmos' proven methods. Gain real engagement and build a loyal audience. Join us now.
https://www.sociocosmos.com/product-category/youtube/
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...AJHSSR Journal
ABSTRACT: In the Malaysian context, small and medium enterprises (SMEs) experience a significant
burden of workplace accidents. A consensus among scholars attributes a substantial portion of these incidents to
human factors, particularly unsafe behaviors. This study, conducted in Malaysia's northern region, specifically
targeted Safety and Health/Human Resource professionals within the manufacturing sector of SMEs. We
gathered a robust dataset comprising 107 responses through a meticulously designed self-administered
questionnaire. Employing advanced partial least squares-structural equation modeling (PLS-SEM) techniques
with SmartPLS 3.2.9, we rigorously analyzed the data to scrutinize the intricate relationship between safety
behavior and safety performance. The research findings unequivocally underscore the palpable and
consequential impact of safety behavior variables, namely safety compliance and safety participation, on
improving safety performance indicators such as accidents, injuries, and property damages. These results
strongly validate research hypotheses. Consequently, this study highlights the pivotal significance of cultivating
safety behavior among employees, particularly in resource-constrained SME settings, as an essential step toward
enhancing workplace safety performance.
KEYWORDS :Safety compliance, safety participation, safety performance, SME
Surat Digital Marketing School is created to offer a complete course that is specifically designed as per the current industry trends. Years of experience has helped us identify and understand the graduate-employee skills gap in the industry. At our school, we keep up with the pace of the industry and impart a holistic education that encompasses all the latest concepts of the Digital world so that our graduates can effortlessly integrate into the assigned roles.
This is the place where you become a Digital Marketing Expert.
Grow Your Reddit Community Fast.........SocioCosmos
Sociocosmos helps you gain Reddit followers quickly and easily. Build your community and expand your influence.
https://www.sociocosmos.com/product-category/reddit/
Exploiting Wireless Networks, through creation of Opportunity Network – Wireless-MobileAdhoc-Network (W-MAN) Scheme
1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
DOI : 10.5121/ijasuc.2011.2109 99
Exploiting Wireless Networks, through creation
of Opportunity Network – Wireless-Mobile-
Adhoc-Network (W-MAN) Scheme
Hemal Shah1 and Yogeshwar P. Kosta2
,
1
Department of Computer Engineering, Ganpat University, Mehsana, Gujarat, India
hemal.shah@ganpatuniversity.ac.in
2Marwadi Education Foundation – Rajkot, Gujarat, India
ypkosta@gmail.com
ABSTRACT
Spotting Opportunity today and recognizing the same is the vision of the expert. The wireless
communication network regime is one such environment that offers such a platform for many working
scientific, academic and engineering experts. Henceforth, “Opportunistic-network” is a recent evolution
of the above said phenomena in the wireless community. They function by spontaneous cooperation &
coordination giving birth to a special type network called wireless-mobile-adhoc-network (W-MAN). As
said, these networks are formed instantaneously in a random manner – breaking the conventional
mathematically evolved algorithms’, and provided the quintessential of a network(s) that exist in
neighbourhood(s) or approachable limits. Is more of situational based, exploited for specialized purpose
or advantage, which mimics all the characteristic of a well evolved network. Such networks, lack an end-
to-end path, contact, cooperation and coordination; which is mainly opportunity based, and break or
even disintegrate soon after discovery, thus the challenge lay in integration, construction and probable
sustenance or even mid-way reconstruction till purpose. One can cite many realistic scenarios fitting to
this situation. For example, wildlife tracking sensor networks, military networks, vehicular ad hoc
networks to mention a few. To transmit information under such circumstances/scenarios researchers have
proposed various efficient forwarding (single copy), replication routing and controlled based schemes. In
this paper, we propose to explore, investigate and analyze most of the schemes [1] [2] [3] [4] [5] [6] and
present the findings of the said scheme by consolidating critical parameters and issues and towards the
end of this paper, algorithms, possible solutions to deal with such complex and dynamic situations
through W-MAN scheme suggested by us.
KEYWORDS
Adhoc networks, opportunistic networks, W-MAN, intermittent connectivity, routing, algorithms,
performance
1. INTRODUCTION
W-MAN is a network where the nodes are so sparse or moving in such a way that there exist at
least two groups of nodes for which there is no contemporaneous path between the nodes. If the
node movement is such that the inter contact times are unknown and unpredictable then the
node contacts are called opportunistic. The enabler to route in opportunistic networks or delay
tolerant networks (DTN) [7] is node mobility. Over time, different links come up and down due
to node mobility. If the sequence of connectivity graphs over a time interval is overlapped, then
an end-to-end path might exist. This implies that a message could be sent over an existing link,
get buffered at the next hop until the next link in the path comes up (e.g., a new node moves in
range or an existing one wakes-up), and so on and so forth, until it reaches its destination. This
model of routing constitutes a significant departure from existing routing practices. It is usually
referred to as “mobility-assisted” routing; because node mobility often needs to be exploited to
2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
100
deliver a message to its destination (other names include “encounter-based forwarding” or
“store-carry-and-forward”). Routing here consists of independent, local forwarding decisions,
based on current connectivity information and predictions of future connectivity information,
and made in an opportunistic fashion.
Despite a number of existing proposals for opportunistic routing [8] [9] [10] [11], the answer to
the previous question has usually been “one” or “all”. The majority of existing protocols are
flooding-based that distribute duplicate copies to all nodes in the network [8] or forwarding
based that forwards single copy in the network [12] [13]. Although flooding can be quite fast in
some scenarios, the overhead involved in terms of bandwidth, buffer space, and energy
dissipation is often prohibitive for small wireless devices (e.g., sensors). Other end, single-copy
schemes that only route one copy per message can considerably reduce resource wastage [12]
[14]. Yet, they can often be orders of magnitude slower than multi-copy algorithms and are
inherently less reliable. These latter characteristics might make single-copy schemes very
undesirable for some applications (e.g., in disaster recovery networks or tactical networks
beyond enemy lines; even if communication must be intermittent, minimizing delay or message
loss is a priority). Summarizing, no routing scheme for extreme environments currently exists
that can achieve both small delays and prudent usage of the network and node resources.
For this reason, researchers have proposed controlled copy schemes [1] [15], also known as
controlled replication, which can achieve both low delays and good transmissions. We have
study, analyze and investigate the various controlled based replication schemes. Our objective is
to present the detailed survey on these techniques, parameters and explore the problem space for
future extension.
2. RELATED WORK
Although a large number of routing protocols for wireless ad hoc networks have been proposed
[16] [17] traditional routing protocols are not appropriate for networks that are sparse and
disconnected. The performance of such protocols would be poor even if the network was only
“slightly” disconnected. Due to the uncertainty and time-varying nature of DTNs, routing poses
unique challenges. As mentioned in literature [18], some routing approaches are broadly based
on forwarding approaches [10] [12] [19] [20] [21].Forwarding scheme(s) uses single message
copy and thus, optimizes usage of network resources but suffers from higher delivery delay and
poor message transmission ratio; Others are based on flooding or multi copy spreading approach
[2] [8]. This scheme achieves better delivery ratio but, in turn, suffers from poor resource
utilization and contention. Thus, researchers have proposed controlled based replication
schemes [1] [2] [3] [4] [5] [6] [15] as solution to achieve better delivery ratio and optimal
resource utilization. We present evolution of various controlled based replication approaches
and investigate problem space as how to achieve efficient performance or improve existing
scheme with limited number of message copies.
3. Routing Classification
Routing in opportunistic networks is broadly classify based on number of copies distributed into
network namely single copy (forwarding), Multi copy (replication / flooding) and fixed number
of copies (controlled replication / quota based replication/ hybrid scheme.) Table-1[24] briefs
about important characteristics of each of this scheme with important parameters.
3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
101
Table-1 Comparative of message copy techniques
Parameters Single copy Multiple
Copy
Controlled Copy
Reference protocol
cited for comparative
Direct delivery
[11] [19]
Epidemic[8] Binary Spray and Wait [15]
Message copies Single Many Fix number
No. of transmission Lower Many Lower than multiple copy
Delivery delays Higher Lower Lower than single copy
Delivery ratio Lower Higher Better than single copy
Contention No Higher Lower
Network resource
wastage
No Higher Lower than multi copy
Network resource
wastage
No Higher Lower than multi copy
4. CONTROLLED COPY/REPLICATION SCHEMES
Thrasyvoulos Spyropoulos et.al. has described controlled replication as “When a new message
is generated at a source node, this node also creates L “forwarding tokens” for this message. A
forwarding token implies that the node that owns it can spawn and forward an additional copy
of the given message”. During the spraying phase, messages get forwarded according to the
following rules:
• if a node (either the source or a relay), carrying a message copy and c > 1 forwarding
tokens for this message, encounters a node with no copy of the message1, it spawns and
forwards a copy of that message to the second node; it also hands over l(c) tokens to
that node (l(c) [1; c-1]) and keeps the rest c ¡ l(c) for itself (“Spray” phase);
• When a node has a message copy and c = 1 forwarding tokens for this message, then it
can only forward this message to the destination itself (“Wait” phase).
let’s look at various controlled replication schemes from its evolution to trends (latest)
comprising broadly an input, output, assumptions, algorithm, spraying schemes, message and
node distribution, mobility model used, advantages and disadvantages.
4.1. Source Spray and Wait (SNW)
Input: Area, Transmission Range, No. of nodes, Message copies, Mobility model, TTL
Output: Average delivery delay, No. of message transmission
Assumption: No contention, infinite buffer and bandwidth
Algorithm [2]:
• Set up the network with input parameters & randomly select source and destination nodes
• All the nodes are homogeneous in nature.
• Source node carries initially L copies of message M.
• Source moves and suppose encounters n distinct relays without message copy.
4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
102
• Then, it forwards one of L copies of Message M to each encountered node. If destination
Is found, message is forwarded otherwise source/relay node continues searching
Destination for direct transmission.
• Each node /relay carrying the message copy in turn will only allowed to forward to
Destination if encountered. Thus it performs direct transmission towards destination.
• All the node moves are IID & according to given mobility model.
• This scheme has highest delivery delay.
Advantage: Fewer transmission than epidemic, low contention under high traffic, scalable,
Requires little knowledge about network.
Disadvantage: Only source node is allowed to spray copies. Thus, it incurs considerable
Delay & needs to investigate the performance in realistic situation.
4.2. Binary Spray and Wait (BSW)
Input: Area, Transmission Range, No. of nodes, Message copies, Mobility model, TTL
Output: Average delivery delay, No. of message transmission
Assumption: No contention, infinite buffer and bandwidth
Algorithm [2]:
• Set up the network with input parameters & randomly select source and destination nodes.
• All the nodes are homogeneous in nature.
• Source of message starts with L copies; when a node A (Source node or relay node) that
has n >1 message copies encounters node B (with no copies) it hands over to B [n/ 2] and
keeps [n/2] for itself
• When A has only one copy left , it switches to direct transmission and forwards the
message only to its destination
• All the node moves are IID & according to given mobility model.
• It is optimal spraying strategy with lowest delay compared to other scheme.
Advantage: Fewer transmissions than epidemic, low contention under high traffic, scalable,
Requires little knowledge about network
Disadvantage: It does blind fold forwarding (random) of message copies. It needs to
Investigate the performance in realistic situation.
4.3. Spray and Focus
Input: Area, Transmission Range, No. of nodes, Message copies, Mobility model, TTL, age of
encounter timers
Output: Average delivery delay, No. of message transmission
Assumption: No contention, infinite buffer and bandwidth
5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
103
Algorithm [1]:
• Set up the network with input parameters & randomly select source and destination nodes.
All the nodes are heterogeneous in nature.
• Each node maintains a “message vector” with IDs of all messages that it has stored, and for
which it acts as a relay.
• Whenever two nodes encounter each other, they exchange their vectors and check which
messages they have in common Source of message starts with L copies; when a node A
(Source node or relay node) that has n >1 message copies encounters node B (with no
copies) it hands over to B [n/ 2] copies and keeps rest [n/2] for itself.
• When node A has only one copy left, it can be forwarded using single copy utility based
routing technique.
• Each node i maintains a timer τi(j) for every other node j in the network, which records the
time elapsed since the two nodes last encountered each other as follows: initially set τi(j) = 0
and τi(j) = ∞, ∀i, j; whenever i encounters j, set τi(j) = τj(i) = 0;
• At every clock tick increase each timer by 1. Position information regarding different nodes
gets indirectly logged in the last encounter timers, and gets diffused through the mobility
process of other nodes.
• Therefore, we can define a utility function, based on these timers, that indicates how “useful”
a node might be in delivering a message to another node.
• Every node i maintain a utility value Ui (j) for every other node j in the network. Then, a
node A forwards to another node B a message destined to a node D, if and only if UB(D) >
UA(D) + Uth, where Uth (utility threshold) is a parameter of the algorithm.
• When node A sees node B often, and node B sees node C often, A may be a good candidate
to deliver a message to C (through B), even if A rarely sees C. Therefore, when A encounters
node B, it should also update (increase) its utility for all nodes for which B has a high utility.
• Utility based routing uses timer transitivity. Let a node encounter a node B at distance dAB.
Let further tm(d) denote the expected time it takes a node to move a distance d under a given
mobility model. Then: ∀ j ≠ B : τB(j) < τA(j) − tm(dAB), set τA(j) = τB(j) + tm(dAB).
Advantage: Improves the performance by twenty times than spray & wait
Disadvantage: Finding optimal distribution strategy
4.4. Spray and Wait with average delivery probability
Input: Area, Transmission Range, No. of nodes, Message copies, Mobility model, TTL
Output: Average delivery delay, No. of message transmission
Assumption: No contention, infinite buffer and bandwidth
Algorithm [3][10]:
• Set up the network with input parameters & randomly select source and destination nodes.
All the nodes are homogeneous in nature.
• In binary spray and wait, when a node A (Source node or relay node) that has n >1 message
Copies encounters node B (with no copies) it hands over to B [n/ 2] and keeps [n/2] for
itself.
6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
104
• Rather forwarding in random & blind fold way, it uses average delivery probability using
Probabilistic Routing Protocol using a History of Encounters and Transitivity (PROPHET).
• When node A encounters node B for the first time, the delivery predictabilities is calculated:
P1(a,b) = Pinit
• Node A records P1(a,b) and t1 which is the interval from network initializing to the time
which node An encounters node B for the first time.
• When node A encounters node B the second time, the delivery predictabilities at the second
encountered time is calculated by: P2(a,b) = P1(a,b) + (1- P1(a,b))×Pinit
• Node A records t2 which is the interval from the first encountered time to the second
encountered time And then, the average delivery predictabilities from node A to B at the
second encountered time can be calculated by:Pavg(2)(a,b) = (P1(a,b)×t1 + P2(a,b)×t2)/(t1 +
t2).
• At the n encountered time, the average delivery predictabilities from node A to B can be
calculated by:
•
if node A which posses n copies of this message encounters node B and Pavg(b,d) > Pavg(a,d),
A will hand over B, n/2 messages and keeps n/2 for itself. If Pavg(b,d) <= Pavg(a,d), A will not
forward messages to B.
• When A has only one copy left , it switches to direct transmission and forwards the
message only to its destination
Advantage: Shorter delay with small value of message copy L needs Buffer management
policies for history and messages
Disadvantage: History management and synchronization.
4.5. Fuzzy Spray and Wait
Input: Area, Transmission Range, No. of nodes, Message copies, Mobility model, TTL, FTC,
Message size
Output: Average delivery delay, No. of message transmission
Assumption: Finite storage and bandwidth, Pragmatic assumption
Algorithm [4]:
• Fuzzy-spray uses fuzzy technique to prioritize messages that are stored in the buffer, and
then transfers (so called “spray”) as many messages from the buffer to its peer as possible,
during its contact time.
• It uses two parameters, forward transmission count (FTC) and message size which are
updated using simple rule.
• Count of duplicated message (CDM) is first metric used to compute message transmission.
• To estimate CDM, hop count is used. Set initial value of Hop count and CDM to 1 at source
node. Hop count value is increases by 1 at receiving node.
• FTC value is increased by 1 at sender and receiver node if it is delivered successfully.
• Its value is accumulated and forwarded. Large FTC count ensures most of the node in that
route has copy of message in its buffer. It is not necessary to further spread message copies.
Hence, message with higher FTC count has lower priority for message transmission.
7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
105
• FTC with the lower counts means message is not sprayed and should be transmitted with
higher priority.
• FTC membership function divided into three section low, medium and high & Message is
also divided into small, medium and large.
Messages are divided into nine buffer section and put with fuzzy rule.
• Defuzzifier process, Centre of Area (COA) is applied to create a crisp value. The priority of a
message, P, is 1 – COA, and the messages in buffer are all sorted by values of their P, from
highest to lowest, where highest P value is at the head of the queue, and lowest P value is at
the tail
Advantage: Less sensitive to chosen parameters (fuzzy membership function)
Disadvantage: Needs to investigate the performance in real trace based mobility models with
Heterogeneous nodes.
4.6. Oracle based Spray and Wait (O-SW)
Input: Area, Transmission Range, No. of nodes, Roller net trace data set, TTL
Output: Average delivery delay, No. of message transmission
Assumption: Contention free access, Infinite bandwidth, Infinite storage
Algorithm [5]:
• Set up the network with input parameters & randomly select source and destination nodes.
All the nodes are heterogeneous in nature.
• Current status of network is known to O-SW.
• Based on this it dynamically determines number of copies to be sprayed in distributed way.
• The oracle is capable of determining the most adequate number of copies adaptive routing
strategies which control the dissemination effort with regards to node density
To send depending on some criterion.
Advantage: Sprays most adequate number of copies in adaptive way.
Disadvantage: It is theoretical. Cannot be realized.
4.7. Density aware of spray and wait
Input: Area, Transmission Range, No. of nodes, Roller net trace data set, TTL
Output: Average delivery delay, No. of message transmission
Assumption: Contention free access, Infinite bandwidth, Infinite storage
Algorithm [5]:
• Set up the network with input parameters & randomly select source and destination nodes.
All the nodes are heterogeneous in nature.
8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
106
• Whenever a node has a bundle to transmit, it computes its current connectivity degree and
refers to the abacus to determine the exact number of copies that is expected to lead to some
expected delay.
• Connectivity degree is the number of neighbours a node has within the latest 30 seconds.
• Abacus consists in the average delay experienced by a number of SW(n) variants as a
function of the average node degree observed when packets were generated.
• Thus, the source sends more copies of a bundle when the topology is sparse and fewer copies
when the topology becomes denser as per node density.
• Node movement is captured from roller net tour trace data set.
Advantage: Controls communication overhead keeping delay within expected bounds.
Disadvantage: Needs good predictors for anticipating changes in mobility patterns and thus
Node degree.
2.8. Dynamic Spray and Wait:
Input: Area, Transmission Range, No. of nodes, Message copies, Mobility model, TTL
Output: Average delivery delay, No. of message transmission
Assumption: Finite buffer
Algorithm [6]:
• Set up the network with input parameters & randomly select source and destination nodes.
All the nodes are homogeneous in nature.
• In binary spray and wait, when a node A (Source node or relay node) that has n >1 message
Copies encounters node B (with no copies) it hands over to B, [n/ 2] and keeps [n/2] for
itself.
• Rather forwarding in random & blind fold way, it uses ratio of QoN (Quality of node) for
forwarding the message copies.
• QoN indicates the activity of a node, or the number one node meets other different nodes
within a given interval.
• In opportunistic network node dynamically join or leave. Longer the stay of node in network
higher will be QoN and for shorter stay it will be low.
• QoN is computed for each fragment and influence is measured of former fragment on current
fragment. Time fragments are divided into h.
• Using Jacobson formula [22], QoN for each node can be updated by equation :
• α is smoothing factor and determines degree of influence.
• Avgk is the number of other nodes that one node experiences in the network during the
period of time from the end time of former fragment to the current time. Nodes must first
update Avgk and Q at each connection.
9. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
107
• Update process can be describe using following pseudo code
k = 0; kold = 0;
Q = 0; Qold = 0;
last_update_time = 0;
α = 0.15;
if (connection is on) {
++ k;
DTNHost.updateQ( ); }
updateQ ( ) {
Avgk = (currect_k - kold)*3600 / (current_time
last_update_time);
if (last_update_time = = 0)
Q = Avgk;
else
Q = α * Qold + (1 - α) *Avgk;
timeDiff = (current_time - last_update_time);
if (timeDiff >= 3600) {
kold = this time_k; Qold = this time_Q;
last_update_time = this _time; } }
• When two nodes encounter, they will update the QoN at first and exchange QoN with each
other, and then forward message copies according to the ratio of QoNs The source of a
message initially starts with L copies and then message copies are forwarded from A to B is
N2 = Q2 / Q1 +Q2 * N1
• Node A keeps N1’= N1-N2 = (1 – Q2 / Q1 + Q2)*N1 copies for itself.
Advantages: Adapts to real dynamic network conditions, enhances delivery utility
Disadvantages: Needs to make more energy efficient
4.9. Utility based spraying schemes:
In heterogeneous node environment to find best relay for forwarding the message node’s utility
is used as heuristic. Based on these following spraying schemes have been evolved:
4.9.1. Last-seen-first ( LSF) spraying
• Choose as relays the nodes that have seen the destination most recently
• Each node keeps encounter timers which keeps the records of two nodes last encounter with
each other.
• Reason behind keeping age of encounter timer is to advance single copy towards its
destination using gradient based routing.
• This scheme best fits for the scenario when nodes are divided into group and members in
group more often see each other than outside the group.
4.9.2. Most-mobile-first (MMF) spraying
• This scheme assumes some nodes are more mobile than others. (In general more capable).
• Each node carries some label (e.g. TAXI, BUS, CAR ...) which classifies the node type.
• Then labels are but in preference order : e.g. LABEL1 > LABEL2 > LABLE3
10. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
108
• One could have different preference order depending upon the type of node.
4.9.3. Most-Social-First (MSF) spraying
• Some nodes might encounter other more than average not just due to mobility but may visit
Some location more often than other or have more social links than average. Hence, this
Scheme focuses on sociability than mobility.
• Sociability value of a node will be a function of the time interval during which it is measured.
If a node’s statistical behaviour varies over time, then its sociability index might also change
Between time intervals.
• This implies that it might be more appropriate for a node maintain a running average of its
perceived sociability index, rather than just looking at the previous interval.
• Each node I maintains its running index of sociability (Si)for given interval tn = ((n-1) T,
nT) called sliding window. It counts uniq encounters during this interval N i(n). Then at the
end of sliding window, social index Si is updates as Si = (1 –α ) Si + α Ni(n) / T and
proceeds to the next interval t n+1, where α is weighting factor given to sliding window.
• Finally utility of node i is given by Ui(j) = Ui = Si
3. CONCLUSIONS & FUTURE WORK
We have presented through investigation followed by an analysis along with summary
regarding controlled based replication schemes with an objective that it turns out be promising
technique for routing in W-MAN. Further, this approach has provided us complete information
starting from the evolution of the said schemes to its final stages of development as in operation
and in use today. Discussion about various spraying strategies shows thin and thick sides of
each technique, node characteristics, mobility patterns, assumptions. This pin points possible
investigation spaces and domains for further extension.
ACKNOWLEDGEMENTS
We express our sincere gratitude to the management of GANPAT UNIVERSITY; for providing
us research opportunities and their wholehearted support for such activities. Finally, our
acknowledgement can not end without thanking to the authors whose research papers helped us
in making this research.
REFERENCES
1. Thrasyvoulos, S., Konstantinos, P.,Cauligi, S. Raghavendra: Spray and Focus: Efficient Mobility-
Assisted Routing for Heterogeneous and Correlated Mobility Pervasive Computing and
Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International
Conference. : IEEE, March 2007 . - pp. 79 - 85
2. T. Spyropoulos K. Psounis, and C. S. Raghavendra : Efficient routing in intermittently connected
mobile networks: The multiple-copy case IEEE/ACM Trans. on Networking. - 2008. - Vol. 16.
3. Jingfeng Xue Xiumei Fan, Yuanda Cao, Ji Fang, Jiansheng Li :Spray and Wait Routing Based on
Average Delivery Probability in Delay Tolerant International Conference on Networks Security,
Wireless Communications and Trusted Computing. : IEEE Computer Society, 2009.
11. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
109
4. Akadet Mathurapoj Chotipat Pornavalai, Goutam Chakraborty :Fuzzy Spray: Efficient Routing in
Delay Tolerant Ad-hoc network based on Fuzzy Decision Mechanism FUZZ-IEEE. - Korea : IEEE,
2009.
5. Pierre-Ugo Tournoux J´er´emie Leguay, Farid Benbadis, Vania Conan,Marcelo Dias de Amorim,
and John Whitbeck : The Accordion Phenomenon: Analysis,Characterization, and Impact on DTN
Routing IEEE INFOCOM 2009 : IEEE Communications Society.
6. Guizhu Wang Bingting Wang, Yongzhi Gao :Dynamic Spray and Wait Routing algorithm with
Quality of Node in DelayTolerant Network International Conference on Communications and
Mobile Computing. : IEEE, 2010.
7. Fall. K.: A Delay-tolerant Network Architecture for Challenged Internets SIGCOMM '03:
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for
computer communications. - NY, USA : ACM, 2003. - pp. 27-34.
8. A. Vahdat D. Becker : Epidemic routing for partially connected ad hoc networks Technical Report
CS-200006. - Duke University : [s.n.], 2000.
9. P. Juang H. Oki, Y.Wang, M. Martonosi, L. S. Peh, and D. Rubenstein :Energy-efficient computing
for wildlife tracking: Design tradeoffs and early experiences with Zebranet ASPLOS. - [s.l.] :
ACM, 2002.
10. A. Lindgren A. Doria, O. Schelen :Probabilistic routing in intermittently connected networks
SIGMOBILE Mobile Computing and Communications Review. - 2003. - Vol. 7.
11. J. Widmer J.-Y. Le Boudec :Network coding for efficient communication in extreme networks
ACM SIGCOMM Workshop on Delay-Tolerant Networking (WDTN’05) . - August 2005. - pp.
284–291.
12. T. Spyropoulos K. Psounis, C. S. Raghavendra : Efficient routing in intermittently connected mobile
networks: The single-copy case IEEE/ACM Trans. on Networking. - 2008. - Vol. 16.
13. J.Leguay T.Friedman,V.Conan: DTN Routing in mobility pattern space In ACM SIGCOMM
Workshop on DTN. - 2003.
14. Rahul C. Shah Sumit Roy, Sushant Jain, and Waylon Brunette :Data MULEs: Modeling a Three-tier
Architecture for Sparse Sensor Networks IEEE SNPA workshop. - May 2003.
15. Thrasyvoulos Spyropoulos Konstantinos Psounis,Cauligi S. Raghavendra : Spray and wait: an
efficient routing scheme for intermittently connected mobile networks SIGCOMM. - USC : ACM,
2005.
16. Broch D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva: A performance comparison of multi-
hop wireless ad hoc network routing protocols Proc. Mobile Computing and Networking. - 1998.
17. M. Mave J.Widmer, and H. Hartenstein: A Survey on Position-Based Routing in Mobile Ad-Hoc
Networks IEEE Network, Nov.-Dec. 2001. - Vols. vol. 15, no. 6. - pp. 30-39.
18. Evan P.C. Jones Paul A.S. Ward:Routing Strategies for Delay-Tolerant Networks [ Computer
Communication Review. : ACM, 2006.
19. R. H. Frenkiel B. R. Badrinath, J. Borres, R. D. Yates:The infostations challenge: balancing cost and
ubiquity in delivering wireless data IEEE Personal Communications. - 2000. - Vols. 7, No. 2. - pp.
66–71.
12. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.1, March 2011
110
20. S. Jain K. Fall, R. Patra : Routing in a Delay Tolerant Network Proc. ACM SIGCOMM. - 2004. -
pp. 145–158.
21. Yong Wang Sushant Jain,Margaret Martonosi, Kevin Fall :Erasure-coding based routing for
opportunistic networks ACM SIGCOMM workshop on Delay-tolerant networking. : ACM , 2005 . -
pp. 229 - 236.
22. Prentice Hall Andrew S.Tanenbaum, Computer Networks, Fourth Edition, Peking, Press of Tsinghua
University, 2007, P551.
23. H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli, “Age matters: efficient route discovery in
mobile ad hoc networks using encounter ages,” in Proceedings of ACM MobiHoc, 2003.
24. Hemal Shah ,Yogeshwar P Kosta: Evolution of various controlled replication routing schemes for
opportunistic networks”, in proceedings of AUC 2.0, part-III, 2011
25. Thrasyvoulos Spyropoulos, Thierry Turletti, and Katia Obraczka:Routing in Delay Tolerant
Networks Comprising Heterogeneous Node Populations IEEE Transactions on Mobile
Computing,vol.8,p-1132-1147, Aug 2009.
Authors
Hemal Shah is PhD scholar of Ganpat
University,Gujarat India. He has done B.Tech in
year 1999 and M.Tech in year 2007 from DDIT
Nadiad. Currently working as Assistant
Professor at U.V.Patel College of Engineering,
Ganpat University, having 12 years of teaching
experience in field of Computer Engineering &
Dissertation had carried out at Space
application centre, Ahmadabad on TCP
Performance Enhancing Proxies [PEP] for
satellite links.
Yogeshwar Kosta is Professor and director
at Marwadi education foundation, Rajkot,
Gujarat India. He has around 20 years of
experience in Academic Teaching, Consultancy,
Research and development in the field of RF
and Microwave and wireless Communications.
He has worked as scientist at Space application
centre, Ahmadabad around 8 years and Design
and development of Ku-Band (Receiver)
payload for the INSAT-2C/2D and INSAT-3B
satellites.