Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm

International Journal of Science and Research (IJSR)
International Journal of Science and Research (IJSR)Editor in Chief en International Journal of Science and Research (IJSR)

Present new mechanisms for modelling multiple interfaces on a node, support for interference-limited links and a frame-work for modelling complex applications running on the nodes. Furthermore, provide an overview of concrete use cases where the simulator has been successfully exploited to study a variety of aspects related to opportunistic, message-based communications. Node movement is implemented by movement models. These are either synthetic models or existing movement traces. Connectivity between the nodes is based on their location, communication range and the bit-rate. The routing function is implemented by routing modules that decide which messages to forward over existing contacts. Finally, the messages themselves are generated either through event generators that generate random traffic between the nodes, or through applications that generate traffic based on application interactions. The main functions of the simulator are the modelling of node movement, inter-node contacts using various interfaces, routing, message handling and application interactions. Result collection and analysis are done through visualization, reports and post-processing tools.

International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064 
Volume 2 Issue 8, August 2013 
www.ijsr.net 
Opportunistic Routing in Delay Tolerant Network
with Different Routing Algorithm
K. Sudha1
, R. Rathipriya2
1
Research Scholar, Sri Jayaendra Saraswathy Maha Vidyalaya College of Arts & Science, Coimbatore-5, India
2
Assistant Professor, Department of Information Technology, Sri Jayaendra Saraswathy Maha Vidyalaya College of Arts & Science,
Coimbatore-5, India
Abstract: Present new mechanisms for modelling multiple interfaces on a node, support for interference-limited links and a frame-
work for modelling complex applications running on the nodes. Furthermore, provide an overview of concrete use cases where the
simulator has been successfully exploited to study a variety of aspects related to opportunistic, message-based communications. Node
movement is implemented by movement models. These are either synthetic models or existing movement traces. Connectivity between the
nodes is based on their location, communication range and the bit-rate. The routing function is implemented by routing modules that
decide which messages to forward over existing contacts. Finally, the messages themselves are generated either through event
generators that generate random traffic between the nodes, or through applications that generate traffic based on application
interactions. The main functions of the simulator are the modelling of node movement, inter-node contacts using various interfaces,
routing, message handling and application interactions. Result collection and analysis are done through visualization, reports and post-
processing tools.
Keywords: Opportunistic Routing Algorithm, WIFI Model
1. Introduction
Simulations play an important role in analyzing the
behaviour of DTN routing and application protocols. With
typically sparsely distributed nodes, DTN simulations
abstract from the details of the wireless link characteristics
and simply assume that two nodes can communicate when
they are in range of one another. This allows focusing on
the evaluation of the DTN protocols an approach we
follow in this paper. Instead of fully modelling the lower
layers we make simplifying assumptions about the data
rates, the radio ranges, and thus the resulting transfer
volumes.
In sparse node populations, the space-time paths, which
are exploited by the store-carry-forward communications,
are composed of the encounters between the nodes. The
frequency, duration, and other characteristics of these
encounters are largely dependent on the underlying
mobility patterns. Evaluations of DTN protocols have
used a large variety of
Figure 1: Sample DTN model
Synthetic mobility models as well as real-world mobility
traces. While synthetically generated node mobility allows
for fine tuning in many respects, this usually covers only
limited mobility characteristics. In contrast, real-world
traces often have only coarse temporal (e.g., scanning
intervals in the order of several minutes) or spatial
resolution (e.g., location determined from WLAN access
point attachment) and coverage (e.g., only covering a
campus area) and may exhibit biases due to the user group
chosen for sampling.
All these approaches may provide complementary data
points when assessing the performance of DTN protocols.
What is important is that protocols are evaluated under
different settings and that these settings can be fine tuned
to match the intended application scenario(s) as closely as
possible.
2. Problem Statement
This can be formulated as an optimization problem that
maximizes total network throughput subject to
information conservation constraints, opportunistic
constraints, and interference constraints. Interestingly,
topology control can be cast as a routing problem and can
be optimized in the same framework. Note that since our
optimization problem is non convex, existing techniques
developed for distributed convex optimization are not
directly applicable.
3. Related Works
DTNRG architecture [5] proposes a bundle layer as an
overlay to bridge different (inter)networks. Nodes
communicate via asynchronous messages of arbitrary size
that are exchanged using the store-carry-and-forward
paradigm. Messages have a finite TTL and are discarded
when the TTL expires. They may also get dropped by a
node due to congestion, yielding a best-effort service.
Application protocols need to tolerate the delays resulting
from the challenged environment and the risk that
messages are not delivered in time or not at all. Typical
performance metrics for evaluating DTN protocol
434
International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064 
Volume 2 Issue 8, August 2013 
www.ijsr.net 
performance are hence message delivery probability and
latency.
Numerous routing and forwarding schemes have been
proposed over the past years (refer to [5] and [3] for
overviews). Different mechanisms are usually applied
depending on whether the network is primarily of mobile
adhoc nature (e.g., mobile devices carried by humans) or
is based upon a (fixed or mobile) infrastructure (e.g.,
space networks, bus networks). Obviously, mixed
networks exist as well, for example, with mobile users
supported by infrastructure nodes.
The primary difference between various DTN routing
protocols is the amount of information they have available
to make forwarding decisions [3]. Ad-hoc DTNs usually
apply variants of reactive protocols. Flooding protocols
such as epidemic routing [3] do not use any information.
Predictive protocols use past encounters of nodes to
predict their future suitability to deliver messages to a
certain target whereas other protocols also exploit further
(explicitly configured) schedule and context information
per node [2]. Furthermore, they differ in their replication
strategies, i.e., how many copies of a message they create
which, in turn, has a direct impact on the load incurred on
the network. Opportunity occurs between two nodes.
Finally, queue management strategies define when and
which messages are deleted, e.g., if congestion occurs.
4. Proposed System
Focus on communication performance in delay-tolerant
ad-hoc networks comprising mobile nodes. Delay-tolerant
Networking [1] is increasingly applied to enable
communication in challenging networking environments,
including sparse sensor nets and opportunistic mobile ad-
hoc networks. The main functions of the simulator are the
modelling of node movement, inter-node contacts using
various interfaces, routing, message handling and
application interactions. Result collection and analysis are
done through visualization, reports and post-processing
tools. The elements and their interactions are shown in
Figure 2.
Node movement is implemented by movement models.
These are either synthetic models or existing movement
traces. Connectivity between the nodes is based on their
location, communication range and the bit-rate. The
routing function is implemented by routing modules that
decide which messages to forward over existing contacts.
Finally, the messages themselves are generated either
through event generators that generate random traffic
between the nodes, or through applications that generate
traffic based on application interactions. The messages are
always unicast, having a single source and destination host
inside the simulation world.
Figure 2: Overview of the simulation environment
Simulation results are collected primarily through reports
generated by report modules during the simulation run.
Report modules receive events (e.g., message or
connectivity events) from the simulation engine and
generate results based on them. The results generated may
be logs of events that are then further processed by the
external post-processing tools, or they may be aggregate
statistics calculated in the simulator. Secondarily, the
graphical user interface (GUI) displays a visualization of
the simulation state showing the locations, active contacts
and messages carried by the nodes.
4.1 Network Model
The basic agents in the simulator are called nodes. A node
models a mobile endpoint capable of acting as a store-
carry-forward router (e.g., a pedestrian, car or tram with
the required hardware). Simulation scenarios are built
from groups of nodes in a simulation world. Each group is
configured with different capabilities. Each node has a set
of basic capabilities that are modelled.
These are radio interfaces, persistent storage, and
movement, and energy consumption, message routing and
application interactions. Node capabilities such as
persistent storage that involve only simple modelling are
configured through parameterization (e.g., peer scanning
interval and storage capacity). More complex capabilities
such as movement, routing and network interfaces are
configured through specialized modules that implement a
particular behaviour for the capability (e.g., different
mobility models or interference-limited radio interfaces).
The node energy consumption model is based on an
energy budget approach. Each node is given an energy
budget which is spent by energy consuming activities such
as transmission or scanning and can be filled by charging
in certain locations (e.g., at home). An inquiry mechanism
allows other modules to obtain energy level readings and
adjust their actions (e.g., scanning frequency as,
forwarding activity, or transmission power) accordingly.
435
International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064 
Volume 2 Issue 8, August 2013 
www.ijsr.net 
4.2 Mobility Model
Node movement capabilities are implemented through
mobility models. Mobility models define the algorithms
and rules that generate the node movement paths. Three
types of synthetic movement models are included: 1)
random movement, 2) map-constrained random
movement, and 3) human behaviour based movement.
Framework for creating movement models as well as
interfaces for loading external movement data.
Implementations of popular Random Walk (RW) and
Random Waypoint (RWP) are included. While these
models are popular due to their simplicity, they have
various known shortcomings. It is also possible to
completely omit mobility modeling and construct
topologies based on static nodes.
To better model real-world mobility, map-based mobility
constrains node movement to predefined paths and routes
derived from real map data. Further realism is added by
the Working Day Movement (WDM) model that attempts
to model typical human movement patters during working
weeks.
4.2.1 Map-Based Mobility
Map-based movement models constrain the node
movement to paths defined in map data. The simulator
includes three map-based movement models: 1) Random
Map-Based Movement (MBM), 2) Shortest Path Map-
Based Movement (SPMBM), and 3) Routed Map-Based
Movement (RMBM). Furthermore, the release contains
map data of the Helsinki downtown area (roads and
pedestrian walkways) that the map-based movement
models can use. However, the movement models
understand arbitrary map data defined in (a subset of)
Well Known Text (WKT). Such data is typically
converted from real world map data or created manually
using Geographic Information System (GIS) programs.
4.2.2 Working Day Movement Model
The WDM model brings more reality to the node
movement by modelling three major activities typically
performed by humans during a working week: 1) sleeping
at home, 2) working at the office, and 3) going out with
friends in the evening. These three activities are divided
into corresponding sub-models between which the
simulated nodes transition depending on the time of the
day. Beyond the activities themselves, the WDM model
includes three different transport models. The nodes can
move alone or in groups by walking, driving or riding a
bus. The ability to move alone or in groups at different
speeds increases the heterogeneity of movement which
has impact on the performance of, e.g., routing protocols.
Finally, WDM introduces communities and social
relationships which are not captured by simpler models
such as RWP. The communities are composed from nodes
which work in the same office, spend time in the same
evening activity spots or live together.
4.3 Routing Message
Spray-and-Wait is an n-copy routing protocol that limits
the number of message copies created to a configurable
maximum and distributes (“sprays”) these copies to
contacts until the number of copies is exhausted. Both
variants of Spray-and-Wait suggested by its authors are
included: in normal mode, a node gives one copy to a
contact; in binary mode half of the copies are forwarded.
Once only a single copy is left, it is forwarded only to the
final recipient.
Three routing protocols perform variants of flooding.
Epidemic replicates messages to all encountered peers,
while PRoPHET tries to estimate which node has the
highest “likelihood” of being able to deliver a message to
the final destination based on node encounter history. Max
Prop floods the messages but explicitly clears them once a
copy gets delivered to the destination. In addition, Max
Prop sends messages to other hosts in specific order that
takes into account message hop counts and message
delivery probabilities based on previous encounters
5. Simulation Results
While high-level movement models such as RWP, MBM,
and SPMBM are simple to understand and efficient to use
in simulations they do not generate inter-contact time and
contact time distributions that match real-world traces,
especially when the number of nodes in the simulation is
small. In order to increase the reality of (human) node
mobility, we have developed the Working Day Movement
(WDM) model.
The message routing capability is implemented similarly
to the movement capability: the simulator includes a
framework for defining the algorithms and rules used in
routing and comes with ready implementations of well
known DTN routing protocols.
There are six included routing protocols: 1) Direct
Delivery (DD), 2) First Contact (FC), 3) Spray-and-Wait,
4) PRoPHET, 5) Max-Prop, and 6) Epidemic. This
selection covers the most important classes of DTN
routing protocols: single-copy, n-copy and unlimited-copy
protocols, as well as estimation based protocols.
Direct Delivery and First Contact are single-copy routing
protocols where only one copy of each message exists in
the network. In Direct Delivery, the node carries messages
until it meets their final destination. In First Contact
routing the nodes forward messages to the first node they
encounter, which results in a “random walk” search for the
destination node.
Simulation scenarios are built by defining the simulated
nodes and their capabilities. This includes defining the
basic parameters such as storage capacity; transmit range
and bit-rates, as well as selecting and parameter the
specific movement and routing models to use. Some
simulation settings such as simulation duration and time
granularity also need to be defined. The simulator is
configured using simple text-based configuration files that
contain the simulation, user interface, event generation,
436
International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064 
Volume 2 Issue 8, August 2013 
www.ijsr.net 
and reporting parameters. All modules have their high-
level behaviour defined by their Java code
implementation, but their details of their behaviour is
adjustable using the configuration subsystem.
Many of the simulation parameters are configurable
separately for each node group but groups can also share a
set of parameters and only alter the parameters that are
specific for the group. The configuration system also
allows defining of an array of values for each parameter
hence enabling easy sensitivity analysis: in batch runs, a
different value is chosen for each run so that large
amounts of permutations are explored.
For our simulations, we assume interpersonal
communication between mobile users in a city using
modern mobile phones or similar devices, using Bluetooth
at 2 Mbit/s net data rate with 10m radio range. We
observed that WLAN radios with 100m radio range have
only a minor impact and do not change the elementary
interaction characteristics so that we limit our discussion
here to the Bluetooth case. The mobile devices have up to
100MB of free buffer space for storing and forwarding
messages (flash memory may mostly be occupied by
music or photos.)
Simulation have 544 and 1029 mobile nodes (humans,
cars and trams) referred to as small and large scenario,
respectively which move in a terrain of 8300X7300 m.
The area is either an open space (for simple mobility
models) or a part of the Helsinki city area as depicted in
figure 4 (for map-based movement).
Table 1: Table showing the Performance Comparison
Estimate Throughput
CG 1 1.5 2 3 3.5 4 4.54 5.45 7.45
Paper 1 2 3 4 4.5 5.5 6.5 7 8.5
DTN 1 2 3 4 5 6 7 8 9
ACUTAL VERSUS ESTIMATED 
THROUGHPUT
0
10
20
30
1 2 3 4 5 6 7 8 9
Estimated Throughput (Mbps)
Actual Throughput 
(Mbps)
DTN
Paper
CG
Figure 3: Vehicles/intersection v/s Entropy [bits]
6. Conclusion
An opportunistic networking evaluation system offers a
variety of tools to create complex mobility scenarios that
come closer to reality than many other synthetic mobility
models. GPS map data provides the scenario setting and
node groups with numerous different parameters are used
to model a wide variety of independent node activities and
capabilities. The Working Day Movement model allows
recreating complex social structures and features such as
scanning intervals add further aspects of reality and
heterogeneity to the modelling. All these aspects may
matter as our simple examples have shown. With its
flexible input and output interfaces, the simulator can
incorporate real-world traces and feeds from other
mobility generators as well as generate mobility traces for
use by other simulators. Its DTN framework currently
includes six parameterizable DTN routing protocols and
two types of application messaging. Its visualization
component is used for instant sanity checks, deeper
inspection, or simply to observe node movements in real-
time which broadens its applicability beyond DTN.
Particularly the integration with the DTN reference
implementation allows creating test beds and emulations.
References
[1] S. Agarwal, J. Padhye, V. N. Padmanabhan, L. Qiu,
A. Rao, and B. Zill, “Estimation of link interference
in static multi-hop wireless networks,” in Proc. IMC,
2005, p. 28.
[2] G. Bianchi, “Performance analysis of the IEEE
802.11 distributed coordination function,” IEEE J.
Sel. Areas Commun., vol. 18, no. 3, pp. 535–547,
Mar. 2000
[3] S. Biswas and R. Morris, “ExOR: Opportunistic
multi-hop routing for wireless networks,” in Proc.
ACM SIGCOMM, Aug. 2005, pp. 133–144.
[4] S. Chachulski,M. Jennings, S. Katti, and D. Katabi,
“Trading structure for randomness in wireless
opportunistic routing,” in Proc. SIGCOMM,2007, pp.
169–180.
[5] Y. Gao, J. Lui, and D. M. Chiu, “Determining the
end-to-end throughput capacity in multi-hop
networks: Methodology and applications,” in Proc.
ACM SIGMETRICS, Jun. 2006, pp. 39–50.
[6] D. Koutsonikolas, C.-C.Wang, and Y. C. Hu,
“CCACK: Efficient network coding based
opportunistic routing through cumulative coded
acknowledgments,” in Proc. IEEE INFOCOM, 2010,
pp. 1–9.
[7] Y. Li, L. Qiu, Y. Zhang, R.Mahajan, and E. Rozner,
“Predictable performance optimization for wireless
networks,” in Proc. of ACM SIGCOMM, Aug. 2008,
pp. 413–426.
[8] Y. Lin, B. Li, and B. Liang, “CodeOR: Opportunistic
routing in wireless mesh networks with segmented
network coding,” in Proc. IEEE ICNP, Oct. 2008, pp.
13–22.
Author Profile
K. Sudha received the B. Sc and M. Sc degree
in Computer Science from Sri Jayendra
Saraswathy Maha Vidyalaya college of Arts
and Science in 2010 and 2012.current she is
M. Phil Computer Science. Her research
interests are Networking, Mobile communication and
Software Project Management.
437

Recomendados

Designing an opportunistic routing scheme for adaptive clustering in mobile a... por
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
415 vistas4 diapositivas
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel... por
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...ijasuc
22 vistas12 diapositivas
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs) por
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
35 vistas6 diapositivas
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES por
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
62 vistas6 diapositivas
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se... por
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...M H
789 vistas5 diapositivas

Más contenido relacionado

La actualidad más candente

Simulation Issues in Wireless Sensor Networks: A Survey por
Simulation Issues in Wireless Sensor Networks: A SurveySimulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A SurveyM H
1.6K vistas7 diapositivas
An Overview of Information Extraction from Mobile Wireless Sensor Networks por
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksM H
704 vistas12 diapositivas
Welcome to International Journal of Engineering Research and Development (IJERD) por
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
403 vistas6 diapositivas
Information extraction from sensor networks using the Watershed transform alg... por
Information extraction from sensor networks using the Watershed transform alg...Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...M H
1.9K vistas11 diapositivas
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs por
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsIDES Editor
197 vistas3 diapositivas
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo... por
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
151 vistas5 diapositivas

La actualidad más candente(20)

Simulation Issues in Wireless Sensor Networks: A Survey por M H
Simulation Issues in Wireless Sensor Networks: A SurveySimulation Issues in Wireless Sensor Networks: A Survey
Simulation Issues in Wireless Sensor Networks: A Survey
M H1.6K vistas
An Overview of Information Extraction from Mobile Wireless Sensor Networks por M H
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor Networks
M H704 vistas
Welcome to International Journal of Engineering Research and Development (IJERD) por IJERD Editor
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor403 vistas
Information extraction from sensor networks using the Watershed transform alg... por M H
Information extraction from sensor networks using the Watershed transform alg...Information extraction from sensor networks using the Watershed transform alg...
Information extraction from sensor networks using the Watershed transform alg...
M H1.9K vistas
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs por IDES Editor
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETsA Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
A Novel Approach for Detection of Routes with Misbehaving Nodes in MANETs
IDES Editor197 vistas
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo... por IJSRD
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
IJSRD 151 vistas
Stability routing in fso manets por eSAT Journals
Stability routing in fso manetsStability routing in fso manets
Stability routing in fso manets
eSAT Journals80 vistas
Interpolation Techniques for Building a Continuous Map from Discrete Wireless... por M H
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
M H1.2K vistas
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A... por ijwmn
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
ijwmn147 vistas
Improve MANET network performance using ESPS approach por Surbhi Sharma
Improve MANET network performance using ESPS approachImprove MANET network performance using ESPS approach
Improve MANET network performance using ESPS approach
Surbhi Sharma64 vistas
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant... por IRJET Journal
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
IRJET Journal50 vistas
Effect of multipath routing in autonomous mobile mesh networks por eSAT Journals
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networks
eSAT Journals102 vistas
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM... por ijcsity
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ijcsity387 vistas
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach por ijceronline
Advancement in VANET Routing by Optimize the Centrality with ANT Colony ApproachAdvancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
ijceronline127 vistas
Data Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy por IJCNCJournal
Data Aggregation Routing Protocols in Wireless Sensor Networks : A TaxonomyData Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
Data Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
IJCNCJournal108 vistas
Content Sharing over Smartphone-Based Delay-Tolerant Networks por IJERA Editor
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant Networks
IJERA Editor508 vistas
Replica Placement In Unstable Radio Links por CSCJournals
Replica Placement In Unstable Radio LinksReplica Placement In Unstable Radio Links
Replica Placement In Unstable Radio Links
CSCJournals197 vistas

Similar a Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm

Ds35676681 por
Ds35676681Ds35676681
Ds35676681IJERA Editor
282 vistas6 diapositivas
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ... por
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
3 vistas12 diapositivas
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ... por
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
2 vistas12 diapositivas
Designing an opportunistic routing scheme for adaptive clustering in mobile a... por
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
79 vistas4 diapositivas
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED... por
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...ijasuc
18 vistas15 diapositivas
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED... por
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...ijasuc
158 vistas15 diapositivas

Similar a Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm(20)

Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ... por pijans
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
pijans3 vistas
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ... por pijans
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
pijans2 vistas
Designing an opportunistic routing scheme for adaptive clustering in mobile a... por eSAT Journals
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Journals79 vistas
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED... por ijasuc
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
ijasuc18 vistas
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED... por ijasuc
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
ijasuc158 vistas
Community Detection Using Inter Contact Time and Social Characteristics Based... por jake henry
Community Detection Using Inter Contact Time and Social Characteristics Based...Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...
jake henry72 vistas
Clustering effects on wireless mobile ad hoc networks performances por ijcsit
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
ijcsit576 vistas
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY... por ijwmn
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
ijwmn7 vistas
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY... por ijwmn
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
ijwmn67 vistas
Proposed Scheme for Secured Routing in MANET por IJAEMSJORNAL
Proposed Scheme for Secured Routing in MANETProposed Scheme for Secured Routing in MANET
Proposed Scheme for Secured Routing in MANET
IJAEMSJORNAL66 vistas
Efficient and stable route selection by using cross layer concept for highly... por Roopali Singh
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
Roopali Singh133 vistas
Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols por CSEIJJournal
Performance Comparison and Analysis of Mobile Ad Hoc Routing ProtocolsPerformance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
Performance Comparison and Analysis of Mobile Ad Hoc Routing Protocols
CSEIJJournal2 vistas
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop... por CSCJournals
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
CSCJournals233 vistas
Route Stability in Mobile Ad-Hoc Networks por arpublication
Route Stability in Mobile Ad-Hoc NetworksRoute Stability in Mobile Ad-Hoc Networks
Route Stability in Mobile Ad-Hoc Networks
arpublication564 vistas
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON... por ijwmn
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
COMPARING THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON...
ijwmn87 vistas
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK por IAEME Publication
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
IAEME Publication102 vistas

Más de International Journal of Science and Research (IJSR)

Innovations in the Diagnosis and Treatment of Chronic Heart Failure por
Innovations in the Diagnosis and Treatment of Chronic Heart FailureInnovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart FailureInternational Journal of Science and Research (IJSR)
167 vistas2 diapositivas
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter por
Design and implementation of carrier based sinusoidal pwm (bipolar) inverterDesign and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverterInternational Journal of Science and Research (IJSR)
235 vistas5 diapositivas
Polarization effect of antireflection coating for soi material system por
Polarization effect of antireflection coating for soi material systemPolarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material systemInternational Journal of Science and Research (IJSR)
176 vistas5 diapositivas
Image resolution enhancement via multi surface fitting por
Image resolution enhancement via multi surface fittingImage resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fittingInternational Journal of Science and Research (IJSR)
105 vistas5 diapositivas
Ad hoc networks technical issues on radio links security & qo s por
Ad hoc networks technical issues on radio links security & qo sAd hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo sInternational Journal of Science and Research (IJSR)
208 vistas6 diapositivas
Microstructure analysis of the carbon nano tubes aluminum composite with diff... por
Microstructure analysis of the carbon nano tubes aluminum composite with diff...Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...International Journal of Science and Research (IJSR)
198 vistas6 diapositivas

Más de International Journal of Science and Research (IJSR)(20)

Último

CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf por
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfSukhwinderSingh895865
507 vistas6 diapositivas
JiscOAWeek_LAIR_slides_October2023.pptx por
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
79 vistas8 diapositivas
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptx por
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptxCollective Bargaining and Understanding a Teacher Contract(16793704.1).pptx
Collective Bargaining and Understanding a Teacher Contract(16793704.1).pptxCenter for Integrated Training & Education
90 vistas57 diapositivas
discussion post.pdf por
discussion post.pdfdiscussion post.pdf
discussion post.pdfjessemercerail
120 vistas1 diapositiva
Solar System and Galaxies.pptx por
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptxDrHafizKosar
85 vistas26 diapositivas
Computer Introduction-Lecture06 por
Computer Introduction-Lecture06Computer Introduction-Lecture06
Computer Introduction-Lecture06Dr. Mazin Mohamed alkathiri
71 vistas12 diapositivas

Último(20)

JiscOAWeek_LAIR_slides_October2023.pptx por Jisc
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
Jisc79 vistas
Solar System and Galaxies.pptx por DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar85 vistas
AI Tools for Business and Startups por Svetlin Nakov
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov101 vistas
Narration ppt.pptx por TARIQ KHAN
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
TARIQ KHAN119 vistas
11.30.23 Poverty and Inequality in America.pptx por mary850239
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptx
mary850239144 vistas
Psychology KS5 por WestHatch
Psychology KS5Psychology KS5
Psychology KS5
WestHatch77 vistas
Use of Probiotics in Aquaculture.pptx por AKSHAY MANDAL
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptx
AKSHAY MANDAL89 vistas
Narration lesson plan.docx por TARIQ KHAN
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docx
TARIQ KHAN104 vistas
AUDIENCE - BANDURA.pptx por iammrhaywood
AUDIENCE - BANDURA.pptxAUDIENCE - BANDURA.pptx
AUDIENCE - BANDURA.pptx
iammrhaywood69 vistas
11.28.23 Social Capital and Social Exclusion.pptx por mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239281 vistas
Ch. 7 Political Participation and Elections.pptx por Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala72 vistas
Class 10 English notes 23-24.pptx por TARIQ KHAN
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptx
TARIQ KHAN107 vistas
Lecture: Open Innovation por Michal Hron
Lecture: Open InnovationLecture: Open Innovation
Lecture: Open Innovation
Michal Hron96 vistas
The Accursed House by Émile Gaboriau por DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta158 vistas

Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm

  • 1. International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064  Volume 2 Issue 8, August 2013  www.ijsr.net  Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm K. Sudha1 , R. Rathipriya2 1 Research Scholar, Sri Jayaendra Saraswathy Maha Vidyalaya College of Arts & Science, Coimbatore-5, India 2 Assistant Professor, Department of Information Technology, Sri Jayaendra Saraswathy Maha Vidyalaya College of Arts & Science, Coimbatore-5, India Abstract: Present new mechanisms for modelling multiple interfaces on a node, support for interference-limited links and a frame- work for modelling complex applications running on the nodes. Furthermore, provide an overview of concrete use cases where the simulator has been successfully exploited to study a variety of aspects related to opportunistic, message-based communications. Node movement is implemented by movement models. These are either synthetic models or existing movement traces. Connectivity between the nodes is based on their location, communication range and the bit-rate. The routing function is implemented by routing modules that decide which messages to forward over existing contacts. Finally, the messages themselves are generated either through event generators that generate random traffic between the nodes, or through applications that generate traffic based on application interactions. The main functions of the simulator are the modelling of node movement, inter-node contacts using various interfaces, routing, message handling and application interactions. Result collection and analysis are done through visualization, reports and post- processing tools. Keywords: Opportunistic Routing Algorithm, WIFI Model 1. Introduction Simulations play an important role in analyzing the behaviour of DTN routing and application protocols. With typically sparsely distributed nodes, DTN simulations abstract from the details of the wireless link characteristics and simply assume that two nodes can communicate when they are in range of one another. This allows focusing on the evaluation of the DTN protocols an approach we follow in this paper. Instead of fully modelling the lower layers we make simplifying assumptions about the data rates, the radio ranges, and thus the resulting transfer volumes. In sparse node populations, the space-time paths, which are exploited by the store-carry-forward communications, are composed of the encounters between the nodes. The frequency, duration, and other characteristics of these encounters are largely dependent on the underlying mobility patterns. Evaluations of DTN protocols have used a large variety of Figure 1: Sample DTN model Synthetic mobility models as well as real-world mobility traces. While synthetically generated node mobility allows for fine tuning in many respects, this usually covers only limited mobility characteristics. In contrast, real-world traces often have only coarse temporal (e.g., scanning intervals in the order of several minutes) or spatial resolution (e.g., location determined from WLAN access point attachment) and coverage (e.g., only covering a campus area) and may exhibit biases due to the user group chosen for sampling. All these approaches may provide complementary data points when assessing the performance of DTN protocols. What is important is that protocols are evaluated under different settings and that these settings can be fine tuned to match the intended application scenario(s) as closely as possible. 2. Problem Statement This can be formulated as an optimization problem that maximizes total network throughput subject to information conservation constraints, opportunistic constraints, and interference constraints. Interestingly, topology control can be cast as a routing problem and can be optimized in the same framework. Note that since our optimization problem is non convex, existing techniques developed for distributed convex optimization are not directly applicable. 3. Related Works DTNRG architecture [5] proposes a bundle layer as an overlay to bridge different (inter)networks. Nodes communicate via asynchronous messages of arbitrary size that are exchanged using the store-carry-and-forward paradigm. Messages have a finite TTL and are discarded when the TTL expires. They may also get dropped by a node due to congestion, yielding a best-effort service. Application protocols need to tolerate the delays resulting from the challenged environment and the risk that messages are not delivered in time or not at all. Typical performance metrics for evaluating DTN protocol 434
  • 2. International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064  Volume 2 Issue 8, August 2013  www.ijsr.net  performance are hence message delivery probability and latency. Numerous routing and forwarding schemes have been proposed over the past years (refer to [5] and [3] for overviews). Different mechanisms are usually applied depending on whether the network is primarily of mobile adhoc nature (e.g., mobile devices carried by humans) or is based upon a (fixed or mobile) infrastructure (e.g., space networks, bus networks). Obviously, mixed networks exist as well, for example, with mobile users supported by infrastructure nodes. The primary difference between various DTN routing protocols is the amount of information they have available to make forwarding decisions [3]. Ad-hoc DTNs usually apply variants of reactive protocols. Flooding protocols such as epidemic routing [3] do not use any information. Predictive protocols use past encounters of nodes to predict their future suitability to deliver messages to a certain target whereas other protocols also exploit further (explicitly configured) schedule and context information per node [2]. Furthermore, they differ in their replication strategies, i.e., how many copies of a message they create which, in turn, has a direct impact on the load incurred on the network. Opportunity occurs between two nodes. Finally, queue management strategies define when and which messages are deleted, e.g., if congestion occurs. 4. Proposed System Focus on communication performance in delay-tolerant ad-hoc networks comprising mobile nodes. Delay-tolerant Networking [1] is increasingly applied to enable communication in challenging networking environments, including sparse sensor nets and opportunistic mobile ad- hoc networks. The main functions of the simulator are the modelling of node movement, inter-node contacts using various interfaces, routing, message handling and application interactions. Result collection and analysis are done through visualization, reports and post-processing tools. The elements and their interactions are shown in Figure 2. Node movement is implemented by movement models. These are either synthetic models or existing movement traces. Connectivity between the nodes is based on their location, communication range and the bit-rate. The routing function is implemented by routing modules that decide which messages to forward over existing contacts. Finally, the messages themselves are generated either through event generators that generate random traffic between the nodes, or through applications that generate traffic based on application interactions. The messages are always unicast, having a single source and destination host inside the simulation world. Figure 2: Overview of the simulation environment Simulation results are collected primarily through reports generated by report modules during the simulation run. Report modules receive events (e.g., message or connectivity events) from the simulation engine and generate results based on them. The results generated may be logs of events that are then further processed by the external post-processing tools, or they may be aggregate statistics calculated in the simulator. Secondarily, the graphical user interface (GUI) displays a visualization of the simulation state showing the locations, active contacts and messages carried by the nodes. 4.1 Network Model The basic agents in the simulator are called nodes. A node models a mobile endpoint capable of acting as a store- carry-forward router (e.g., a pedestrian, car or tram with the required hardware). Simulation scenarios are built from groups of nodes in a simulation world. Each group is configured with different capabilities. Each node has a set of basic capabilities that are modelled. These are radio interfaces, persistent storage, and movement, and energy consumption, message routing and application interactions. Node capabilities such as persistent storage that involve only simple modelling are configured through parameterization (e.g., peer scanning interval and storage capacity). More complex capabilities such as movement, routing and network interfaces are configured through specialized modules that implement a particular behaviour for the capability (e.g., different mobility models or interference-limited radio interfaces). The node energy consumption model is based on an energy budget approach. Each node is given an energy budget which is spent by energy consuming activities such as transmission or scanning and can be filled by charging in certain locations (e.g., at home). An inquiry mechanism allows other modules to obtain energy level readings and adjust their actions (e.g., scanning frequency as, forwarding activity, or transmission power) accordingly. 435
  • 3. International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064  Volume 2 Issue 8, August 2013  www.ijsr.net  4.2 Mobility Model Node movement capabilities are implemented through mobility models. Mobility models define the algorithms and rules that generate the node movement paths. Three types of synthetic movement models are included: 1) random movement, 2) map-constrained random movement, and 3) human behaviour based movement. Framework for creating movement models as well as interfaces for loading external movement data. Implementations of popular Random Walk (RW) and Random Waypoint (RWP) are included. While these models are popular due to their simplicity, they have various known shortcomings. It is also possible to completely omit mobility modeling and construct topologies based on static nodes. To better model real-world mobility, map-based mobility constrains node movement to predefined paths and routes derived from real map data. Further realism is added by the Working Day Movement (WDM) model that attempts to model typical human movement patters during working weeks. 4.2.1 Map-Based Mobility Map-based movement models constrain the node movement to paths defined in map data. The simulator includes three map-based movement models: 1) Random Map-Based Movement (MBM), 2) Shortest Path Map- Based Movement (SPMBM), and 3) Routed Map-Based Movement (RMBM). Furthermore, the release contains map data of the Helsinki downtown area (roads and pedestrian walkways) that the map-based movement models can use. However, the movement models understand arbitrary map data defined in (a subset of) Well Known Text (WKT). Such data is typically converted from real world map data or created manually using Geographic Information System (GIS) programs. 4.2.2 Working Day Movement Model The WDM model brings more reality to the node movement by modelling three major activities typically performed by humans during a working week: 1) sleeping at home, 2) working at the office, and 3) going out with friends in the evening. These three activities are divided into corresponding sub-models between which the simulated nodes transition depending on the time of the day. Beyond the activities themselves, the WDM model includes three different transport models. The nodes can move alone or in groups by walking, driving or riding a bus. The ability to move alone or in groups at different speeds increases the heterogeneity of movement which has impact on the performance of, e.g., routing protocols. Finally, WDM introduces communities and social relationships which are not captured by simpler models such as RWP. The communities are composed from nodes which work in the same office, spend time in the same evening activity spots or live together. 4.3 Routing Message Spray-and-Wait is an n-copy routing protocol that limits the number of message copies created to a configurable maximum and distributes (“sprays”) these copies to contacts until the number of copies is exhausted. Both variants of Spray-and-Wait suggested by its authors are included: in normal mode, a node gives one copy to a contact; in binary mode half of the copies are forwarded. Once only a single copy is left, it is forwarded only to the final recipient. Three routing protocols perform variants of flooding. Epidemic replicates messages to all encountered peers, while PRoPHET tries to estimate which node has the highest “likelihood” of being able to deliver a message to the final destination based on node encounter history. Max Prop floods the messages but explicitly clears them once a copy gets delivered to the destination. In addition, Max Prop sends messages to other hosts in specific order that takes into account message hop counts and message delivery probabilities based on previous encounters 5. Simulation Results While high-level movement models such as RWP, MBM, and SPMBM are simple to understand and efficient to use in simulations they do not generate inter-contact time and contact time distributions that match real-world traces, especially when the number of nodes in the simulation is small. In order to increase the reality of (human) node mobility, we have developed the Working Day Movement (WDM) model. The message routing capability is implemented similarly to the movement capability: the simulator includes a framework for defining the algorithms and rules used in routing and comes with ready implementations of well known DTN routing protocols. There are six included routing protocols: 1) Direct Delivery (DD), 2) First Contact (FC), 3) Spray-and-Wait, 4) PRoPHET, 5) Max-Prop, and 6) Epidemic. This selection covers the most important classes of DTN routing protocols: single-copy, n-copy and unlimited-copy protocols, as well as estimation based protocols. Direct Delivery and First Contact are single-copy routing protocols where only one copy of each message exists in the network. In Direct Delivery, the node carries messages until it meets their final destination. In First Contact routing the nodes forward messages to the first node they encounter, which results in a “random walk” search for the destination node. Simulation scenarios are built by defining the simulated nodes and their capabilities. This includes defining the basic parameters such as storage capacity; transmit range and bit-rates, as well as selecting and parameter the specific movement and routing models to use. Some simulation settings such as simulation duration and time granularity also need to be defined. The simulator is configured using simple text-based configuration files that contain the simulation, user interface, event generation, 436
  • 4. International Journal of Science and Research (IJSR), India Online ISSN: 2319‐7064  Volume 2 Issue 8, August 2013  www.ijsr.net  and reporting parameters. All modules have their high- level behaviour defined by their Java code implementation, but their details of their behaviour is adjustable using the configuration subsystem. Many of the simulation parameters are configurable separately for each node group but groups can also share a set of parameters and only alter the parameters that are specific for the group. The configuration system also allows defining of an array of values for each parameter hence enabling easy sensitivity analysis: in batch runs, a different value is chosen for each run so that large amounts of permutations are explored. For our simulations, we assume interpersonal communication between mobile users in a city using modern mobile phones or similar devices, using Bluetooth at 2 Mbit/s net data rate with 10m radio range. We observed that WLAN radios with 100m radio range have only a minor impact and do not change the elementary interaction characteristics so that we limit our discussion here to the Bluetooth case. The mobile devices have up to 100MB of free buffer space for storing and forwarding messages (flash memory may mostly be occupied by music or photos.) Simulation have 544 and 1029 mobile nodes (humans, cars and trams) referred to as small and large scenario, respectively which move in a terrain of 8300X7300 m. The area is either an open space (for simple mobility models) or a part of the Helsinki city area as depicted in figure 4 (for map-based movement). Table 1: Table showing the Performance Comparison Estimate Throughput CG 1 1.5 2 3 3.5 4 4.54 5.45 7.45 Paper 1 2 3 4 4.5 5.5 6.5 7 8.5 DTN 1 2 3 4 5 6 7 8 9 ACUTAL VERSUS ESTIMATED  THROUGHPUT 0 10 20 30 1 2 3 4 5 6 7 8 9 Estimated Throughput (Mbps) Actual Throughput  (Mbps) DTN Paper CG Figure 3: Vehicles/intersection v/s Entropy [bits] 6. Conclusion An opportunistic networking evaluation system offers a variety of tools to create complex mobility scenarios that come closer to reality than many other synthetic mobility models. GPS map data provides the scenario setting and node groups with numerous different parameters are used to model a wide variety of independent node activities and capabilities. The Working Day Movement model allows recreating complex social structures and features such as scanning intervals add further aspects of reality and heterogeneity to the modelling. All these aspects may matter as our simple examples have shown. With its flexible input and output interfaces, the simulator can incorporate real-world traces and feeds from other mobility generators as well as generate mobility traces for use by other simulators. Its DTN framework currently includes six parameterizable DTN routing protocols and two types of application messaging. Its visualization component is used for instant sanity checks, deeper inspection, or simply to observe node movements in real- time which broadens its applicability beyond DTN. Particularly the integration with the DTN reference implementation allows creating test beds and emulations. References [1] S. Agarwal, J. Padhye, V. N. Padmanabhan, L. Qiu, A. Rao, and B. Zill, “Estimation of link interference in static multi-hop wireless networks,” in Proc. IMC, 2005, p. 28. [2] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function,” IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535–547, Mar. 2000 [3] S. Biswas and R. Morris, “ExOR: Opportunistic multi-hop routing for wireless networks,” in Proc. ACM SIGCOMM, Aug. 2005, pp. 133–144. [4] S. Chachulski,M. Jennings, S. Katti, and D. Katabi, “Trading structure for randomness in wireless opportunistic routing,” in Proc. SIGCOMM,2007, pp. 169–180. [5] Y. Gao, J. Lui, and D. M. Chiu, “Determining the end-to-end throughput capacity in multi-hop networks: Methodology and applications,” in Proc. ACM SIGMETRICS, Jun. 2006, pp. 39–50. [6] D. Koutsonikolas, C.-C.Wang, and Y. C. Hu, “CCACK: Efficient network coding based opportunistic routing through cumulative coded acknowledgments,” in Proc. IEEE INFOCOM, 2010, pp. 1–9. [7] Y. Li, L. Qiu, Y. Zhang, R.Mahajan, and E. Rozner, “Predictable performance optimization for wireless networks,” in Proc. of ACM SIGCOMM, Aug. 2008, pp. 413–426. [8] Y. Lin, B. Li, and B. Liang, “CodeOR: Opportunistic routing in wireless mesh networks with segmented network coding,” in Proc. IEEE ICNP, Oct. 2008, pp. 13–22. Author Profile K. Sudha received the B. Sc and M. Sc degree in Computer Science from Sri Jayendra Saraswathy Maha Vidyalaya college of Arts and Science in 2010 and 2012.current she is M. Phil Computer Science. Her research interests are Networking, Mobile communication and Software Project Management. 437