SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013

PERFORMANCE IMPROVEMENT OF VEHICULAR
DELAY TOLERANT NETWORKS USING PUBLIC
TRANSPORTATION SYSTEMS
Tohid Shamspour1, Saleh Yousefi2, Jamshid Bagherzadeh3
1

Department of Computer Science, Islamic Azad University, Shabestar Branch,
Shabestar, Iran
2
Department of Computer Engineering, University of Urmia, Urmia, Iran
3
Department of Computer Engineering, University of Urmia, Urmia, Iran

ABSTRACT
In some networks, communications are sometimes interrupted and packet sending encounters many delays
due to lack of permanent connection between the nodes. Inter-vehicular and inter-satellite networks, which
are the so-called delay-tolerant networks, are an example to this type. This paper proposed a new routing
algorithm, which could increase efficiency of this kind of networks using predictability feature of bus
movement in a vehicular network. In this paper, bus routes were considered the backbone for vehicular
network and, knowing route of bus and destination of packets, the proposed algorithm, which was able to
use this information, was introduced. In addition, the proposed algorithm was simulated to prove its
efficiency and then it was compared with other algorithms in different conditions. The obtained results
indicated acceptable efficiency of the proposed algorithm.

KEY WORDS
Public transportation system, vehicular networks, delay-tolerant networks, roadside units

1. INTRODUCTION
Using delay-tolerant networks is greatly efficient and effective in most of commercial
applications and road safety systems. As an example, vehicular networks can be used for the
awareness of other vehicles from upcoming traffic lights, regulation of roads' traffic load and
reduction of travel time. Moreover, the facilities provided by vehicular networks can be used to
inform other vehicles about an event and prevent occurrence of chain accidents.
In many studies and also according to many industrial experts, using vehicular networks for
traffic safety and other commercial applications can reduce costs. Although current configuration
and installation of vehicular network is slightly costly, in near future, many applications will be
available based on data delivery as delay-tolerant by vehicular networks.
Below in this paper, first, delay-tolerant networks are introduced with a focus on routing
challenges and some examples of the algorithms proposed in this field are presented. Then, the
proposed algorithm is introduced and compared with the algorithms presented in the previous
section.

DOI : 10.5121/ijmnct.2013.3604

41
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013

1.1. Delay-Tolerant Networks
The research workgroup of delay-tolerant networks has been established as a part of the Internet
research workgroup, the purpose of which is to specify protocol design rules and architecture
needed for delay-tolerant networks that can easily work in the environments in which permanent
connections are not available.
Members of research workgroup of delay-tolerant networks have defined a basic architecture for
this type of networks. Kevin Fall was the first who determined challenges and problems existing
in IP address based networks and introduced delay-tolerant communication architecture. This
architecture is based on a message-oriented layer and implemented on a transport layer, which
was called Bundle. The devices in which this layer is implemented are called delay-tolerant
nodes. Packets are stored and kept in this layer until a proper connection becomes available.
This layer is responsible for reliable delivery of packets to the destination and assurance from
their successful delivery. Due to the implementation of Bundle layer in different types of
transport layers, it is possible to support heterogeneous networks using delay-tolerant gateways;
for instance, the Internet can support several networks. However, these networks may have
different data connection layers.
In order to optimize network efficiency, routing algorithm must select the appropriate contact
based on the next step and determined transport time. When no connection is available, the
message received from higher layers is kept in Bundle layer to set a proper contact or, finally, the
message is discarded. Considering the main nature of delay-tolerant networks and unavailability
of permanent connections, increasing packet delivery rate and reducing final delay are among the
main goals of routing algorithms.
When routing algorithm has better information about the current state of network topology and its
future variations, it can adopt more effective decisions in terms of sending messages. Routings in
which current status of topology and its future changes are predictable are called deterministic
delay-tolerant routing. Sending packets can be done in a scheduled way by deterministic routing;
as a result, network efficiency is improved and resource application is reduced. On the other hand,
nodes may randomly move and have little or no information about future variations of network
topology. In this way, delay-tolerant routing randomly sends packets step by step. In such a case,
packet delivery is probabilistic and without any guarantees. Meanwhile, there are some
mechanisms which predict contacts based on the information about previous state of the network
or determine nodes' movement path for packet carriers. Random routing technique has more
focus on repeating packets and controlling network drowning by messages in order to make an
appropriate balance between using network resources and enhancing its efficiency in the absence
of information related to the network's future variations.

2. RELATED WORKS
So far, numerous algorithms have been introduced for routing in delay-tolerant networks. In this
section, some examples of these algorithms are introduced.
In Epidemic method, every node has a list of all the packets that are in standby mode and
exchange their packets with each other as soon as contacting other nodes. This method guarantees
packet delivery because the packet will be delivered to the destination at least via one route;
however, this algorithm has problems such as large overhead, high transport cost and high
memory usage. This algorithm can have the best efficiency if nodes have unlimited bandwidth
and buffer; however, according to the current conditions and limitations, it is not possible to
42
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013

provide unlimited bandwidth and buffer. So, algorithms should be introduced which smartly use
current bandwidth, memory and other resources [6].
Another algorithm of this group is Spray and Wait. Instead of sending copies to all the nodes with
which it is in contact, this algorithm sends copies to only a limited number; i.e. N copies of
packets are provided and sent to the first N nodes with which it is in contact. Then, in case no
destination is found, no other copy is made in the first phase and message carriers will have direct
transmission of packet sending [8].
Another algorithm in this method is an algorithm that tries to prevent blind sending of copies.
This algorithm is called PRoPHET and its logic is based on history of nodes' movement. Since
nodes usually move in a certain manner, their next location can be predicted by gathering time
and space information of the nodes. This information is calculated according to history of the

nodes that have been already encountered by this node [4].
Considering the above points, this algorithm determines the criterion for probability of successful
delivery of packets to the destination from current node. The nodes that have more contact with
each other have higher probability of packet delivery. Then, they send copies to those nodes.

3. THE PROPOSED ALGORITHM
By studying the nature of nodes' mobility in vehicular networks, it was concluded that nodes
were buses in the network which had a fixed route and continuously passed it. Therefore,
predictability feature of movement of these nodes was applied.
In the proposed algorithm, vehicles studied bus routes when getting in contact with them; if a bus
was moving to the destination, they would deliver packets to that bus. Considering feature of
storing, transporting and sending packets, the bus would carry the packet to deliver it in the final
destination. In this algorithm, if a vehicle wanted to deliver the packets but there was no bus for
delivery, it would only deliver the packets to N encountered vehicles which could control the
network traffic.

Figure 1: Packet sending to destination by Bus B

43
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013

For example in Figure 1, Vehicle A has a packet that should be sent to Vehicle D. Route of Bus B
is marked gray. Considering that Bus B is moving toward the destination, Vehicle A delivers the
packet to Bus B. In the proposed algorithm, in addition to using bus routes, roadside equipment
was also applied. However, due to high cost of the equipment, attempts were made to minimize
their application. To this end, the equipment was placed only on the crossroads on which two
buses crossed each other. When nodes were in contact with roadside equipment, they sent them a
copy of their packets. Then, the roadside unit delivered them to the suitable bus. Thus, indirect
bus routes were also used which increased rate of packet delivery.
As mentioned previously, message repetition is used in delay-tolerant networks. Accordingly, in
each contact of the packet with routing algorithm, some copies of the message are sent to the
encountered nodes; therefore, the packet would probably reach its final destination while there are
copies of the packet in the network. Since these messages are unused and only waste memory of
nodes and transport of packets, the proposed method had an idea for disposing these unused
packets. Considering the structure of streets in the urban environment and bus routes, it can be
concluded that route of buses is a backbone for vehicular network in urban environments,
which covers most of the streets.
In the proposed algorithm, the number of bus routes was assumed L; as mentioned earlier, bus
routes act as the backbone of vehicular network; therefore, each message should arrive at the
destination at most in L steps and the packets which have passed more than L steps are the
unused ones that increase network traffic and waste memory of nodes. So, in the proposed
algorithm, each packet was sent only to L steps. Figure 2 shows the routing decisions used in the
proposed algorithm as a pseudo-code.

Figure 2: Pseudo-code of the proposed algorithm
44
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013

4. SIMULATION
In this section, efficiency of the proposed method is evaluated and investigated. Then, it is
compared with Epidemic and Spray and Wait algorithms.
In this paper, ONE (opportunistic network environment) was used for evaluating efficiency of the
proposed method. This simulator has been written in Java and is open source. ONE simulator is
devoted to delay-tolerant networks; thus, this simulator was used for simulating the proposed
algorithm.The simulation environment consisted of 16 bus routes, each of which had 5 buses that
went back and forth on these routes. In addition, 15 roadside units were used at the intersection of
bus routes. Simulation period was equal to 6 h in all the scenarios.
One of the most important criteria for evaluating routing algorithms is their rate of successful
packet delivery. Therefore, in the first scenario, capability of packet delivery was evaluated.
Figure 3 demonstrates rate of successful packet delivery in three different algorithms.

Figure 3: Percent of packet delivery in routing algorithms

As can be seen in the figure, the more the number of nodes, the better the performance of the
proposed algorithm would be. Below, mean delay of packets is investigated in different
algorithms. Latency of each packet indicates time interval between time of packet development
and its delivery to the destination. Results of this comparison are given in Figure 4.

Figure 4: Mean delay of packet in routing algorithms

45
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013

The more the number of nodes in the network, the more the possibility of contact would be; as a
result, delivery of the packet to the considered destination would be faster. Increased number of
nodes in all three algorithms can reduce delay time; however, this reduction was much more in
the proposed algorithm than the other two.
Finally, overhead of these three algorithms was compared. For this comparison, effect of
increasing the number of nodes was investigated. Figure 5 indicates overhead of the compared
algorithms. In this figure, numbers in the general column show overhead of the algorithms. The
simulator used in this algorithm considered ratio of all copied packets to the delivered packets as
network overhead.

Figure 5: Mean network overhead of routing algorithms

As can be seen, increased network severely raised overhead of Epidemic algorithm,
which can be due to blind sending mechanism in this algorithm. Overhead of Spray and Wait
algorithm did not change with increasing the number of network nodes. As mentioned previously,
packets are constantly repeated in Spray and Wait algorithm; therefore, change in the number of
nodes does not affect overhead of this algorithm. Overhead of the proposed algorithm also
increased with constant slope, which was much less compared with Epidemic algorithm.
By observing the results of the performed simulations, acceptable efficiency of the proposed
algorithm and importance of using public transportation systems are found. Furthermore,
importance of using an appropriate mechanism for network drowning using packets can be well
understood.

5. CONCLUSIONS
Considering the current limitations, it is necessary to used delay-tolerant networks. Thus, in
this paper, first, delay-tolerant networks were introduced and architecture of this kind of networks
along with other examples of available algorithms was investigated. Then, predictability
advantage of nodes' movement in public transportation systems was used to introduce the
proposed algorithm. Later, simulation and comparison results demonstrated acceptable efficiency
of the proposed algorithm and importance of using public transportation systems.

46
International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013

REFERENCES
[1]

[2]

[3]

[4]

[4]
[6]
[7]

[8]

F. Giudici, D. Maggiorini, G .P. Rossi, “Performan ce Evaluation of Distance Vector-based
Routing Protocols for Public Transp ortation Vehicular Networks”, in : Wireless
Days,2008.WD'08. 1st IFIP,pp. 1 – 5. Doi: 10.1109/WD.2008.4812923 Paris, France, Nov. 2008
Kevin C. Lee, Uichin Lee, Mario Gerla , " Survey of Routing Protocols in Vehicular Ad Hoc
Networks ", book chapter, Mohamed Watfa (ed.)" Advances in Vehicular Ad-Hoc Networks:
Developments and Challenges ", IGI Global, 2010.
K. J. Wong, B. S. Lee, B. C. Seet, G. Liu, and L. Zhu, “BUSNet: Model and Usage of Regular
Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications”, in ICT 2003,
Thailand, April, 2003
L. Den Hartog, T. Spyropoulos, F. Legendre " Using Public Transportation as a DTN Backbone:
Mobility Properties and Performance Analysis " , in AOC 2010 Program , Canada, Montral, June,
2010
Lindgren, A., Doria, A., and SchelSn, O., Probabilistic Routing in Intermittently Connected
Networks, in Poster of ACM MOBIHOC, 2003.
Vahdat, A. and Becker, D., Epidemic Routing for Partially Connected Ad Hoc Networks, April
2000.
S. Gaito , D. Maggiorini , G.P. Rossi , A. Sala " Bus switched networks: An ad hoc mobile
platform enabling urban-wide communications ", in Ad Hoc Networks, In Press,
doi:10.1016/j.adhoc.2012
Spyropoulos, T., Psounis, K., and Raghavendra, C.S., Spray and Wait: An Effi cient Routing
Scheme for Intermittently Connected Mobile Networks, in Proc. ACM SIGCOMM Workshop on
Delay-Tolerant Networking, 2005.

AUTHORS
Tohid Shamspour
Received B.Sc. degree from university of applied science technology in 2008. He
received M.Sc. degree from Shabestar Azad University, shabestar, iran , in 2013. His
research interests include network management as well as VANET and DTN networks.
Saleh Yousefi
Received the B.Sc. and M.Sc. degrees in computer engineering (in the hardware field)
and the Ph.D. degree in computer engineering (in the networking field) from Iran
University of Science and Technology, Tehran, Iran , in 1999, 2002, and 2008,
respectively. He is currently an Assistant Professor with the Computer Department,
Faculty of Engineering, Urmia University, Urmia, Iran.

Jamshid Bagherzadeh
Received B.Sc. degree from Sharif University of Technology Tehran, Iran. He received
M.Sc. degree from Tarbiat Modares Tehran, Iran and the Ph.D.
degree
in computer engineering from Indian Institute of Technology, Dehli, India. He is currently
an Assistant Professor with the Computer Department, Faculty of Engineering, Urmia
University, Urmia, Iran.

47

Weitere ähnliche Inhalte

Was ist angesagt?

Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...IOSR Journals
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkIJCNCJournal
 
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Editor IJCATR
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantificationcsandit
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...ijfcstjournal
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networksijwmn
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemIOSR Journals
 
Local distance's neighbouring quantification
Local distance's neighbouring quantificationLocal distance's neighbouring quantification
Local distance's neighbouring quantificationijwmn
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...IJCNCJournal
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETijsrd.com
 

Was ist angesagt? (18)

Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Gene...
 
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor NetworkA Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network
 
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
 
Position based Opportunistic routing in MANET
Position based Opportunistic routing in MANETPosition based Opportunistic routing in MANET
Position based Opportunistic routing in MANET
 
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
Multimedia Streaming in Wireless Ad Hoc Networks According to Fuzzy Cross-lay...
 
Distance’s quantification
Distance’s quantificationDistance’s quantification
Distance’s quantification
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
Ha3512291233
Ha3512291233Ha3512291233
Ha3512291233
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
 
Local distance's neighbouring quantification
Local distance's neighbouring quantificationLocal distance's neighbouring quantification
Local distance's neighbouring quantification
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...Novel Position Estimation using Differential Timing Information for Asynchron...
Novel Position Estimation using Differential Timing Information for Asynchron...
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANET
 
C0351725
C0351725C0351725
C0351725
 

Ähnlich wie Performance improvement of vehicular delay tolerant networks using public transportation systems

A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...ijasa
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
 
Performance Evaluation of Efficient Data Dissemination Approach For QoS Enha...
 Performance Evaluation of Efficient Data Dissemination Approach For QoS Enha... Performance Evaluation of Efficient Data Dissemination Approach For QoS Enha...
Performance Evaluation of Efficient Data Dissemination Approach For QoS Enha...IJCSIS Research Publications
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
 
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...AIRCC Publishing Corporation
 
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONRASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONAIRCC Publishing Corporation
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...AIRCC Publishing Corporation
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...AIRCC Publishing Corporation
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
 
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...ijcncs
 
Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET  Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET pijans
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...IOSR Journals
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...inventionjournals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMIOSR Journals
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...ijafrc
 
Data gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elementsData gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elementsijwmn
 

Ähnlich wie Performance improvement of vehicular delay tolerant networks using public transportation systems (20)

A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...A new approach in position-based routing Protocol using learning automata for...
A new approach in position-based routing Protocol using learning automata for...
 
CONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETSCONGESTION AWARE LINK COST ROUTING FOR MANETS
CONGESTION AWARE LINK COST ROUTING FOR MANETS
 
Performance Evaluation of Efficient Data Dissemination Approach For QoS Enha...
 Performance Evaluation of Efficient Data Dissemination Approach For QoS Enha... Performance Evaluation of Efficient Data Dissemination Approach For QoS Enha...
Performance Evaluation of Efficient Data Dissemination Approach For QoS Enha...
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
 
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONRASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...
 
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
Enhancing the Performance of DSR Routing Protocol Using Link Breakage Predict...
 
Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET  Multipath Fault Tolerant Routing Protocol in MANET
Multipath Fault Tolerant Routing Protocol in MANET
 
Elsevier paper
Elsevier paperElsevier paper
Elsevier paper
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
Improving Capacity and Load Distribution of a Node Using Circular Sailing Rou...
 
Data gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elementsData gathering in wireless sensor networks using mobile elements
Data gathering in wireless sensor networks using mobile elements
 

Kürzlich hochgeladen

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Kürzlich hochgeladen (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Performance improvement of vehicular delay tolerant networks using public transportation systems

  • 1. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013 PERFORMANCE IMPROVEMENT OF VEHICULAR DELAY TOLERANT NETWORKS USING PUBLIC TRANSPORTATION SYSTEMS Tohid Shamspour1, Saleh Yousefi2, Jamshid Bagherzadeh3 1 Department of Computer Science, Islamic Azad University, Shabestar Branch, Shabestar, Iran 2 Department of Computer Engineering, University of Urmia, Urmia, Iran 3 Department of Computer Engineering, University of Urmia, Urmia, Iran ABSTRACT In some networks, communications are sometimes interrupted and packet sending encounters many delays due to lack of permanent connection between the nodes. Inter-vehicular and inter-satellite networks, which are the so-called delay-tolerant networks, are an example to this type. This paper proposed a new routing algorithm, which could increase efficiency of this kind of networks using predictability feature of bus movement in a vehicular network. In this paper, bus routes were considered the backbone for vehicular network and, knowing route of bus and destination of packets, the proposed algorithm, which was able to use this information, was introduced. In addition, the proposed algorithm was simulated to prove its efficiency and then it was compared with other algorithms in different conditions. The obtained results indicated acceptable efficiency of the proposed algorithm. KEY WORDS Public transportation system, vehicular networks, delay-tolerant networks, roadside units 1. INTRODUCTION Using delay-tolerant networks is greatly efficient and effective in most of commercial applications and road safety systems. As an example, vehicular networks can be used for the awareness of other vehicles from upcoming traffic lights, regulation of roads' traffic load and reduction of travel time. Moreover, the facilities provided by vehicular networks can be used to inform other vehicles about an event and prevent occurrence of chain accidents. In many studies and also according to many industrial experts, using vehicular networks for traffic safety and other commercial applications can reduce costs. Although current configuration and installation of vehicular network is slightly costly, in near future, many applications will be available based on data delivery as delay-tolerant by vehicular networks. Below in this paper, first, delay-tolerant networks are introduced with a focus on routing challenges and some examples of the algorithms proposed in this field are presented. Then, the proposed algorithm is introduced and compared with the algorithms presented in the previous section. DOI : 10.5121/ijmnct.2013.3604 41
  • 2. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013 1.1. Delay-Tolerant Networks The research workgroup of delay-tolerant networks has been established as a part of the Internet research workgroup, the purpose of which is to specify protocol design rules and architecture needed for delay-tolerant networks that can easily work in the environments in which permanent connections are not available. Members of research workgroup of delay-tolerant networks have defined a basic architecture for this type of networks. Kevin Fall was the first who determined challenges and problems existing in IP address based networks and introduced delay-tolerant communication architecture. This architecture is based on a message-oriented layer and implemented on a transport layer, which was called Bundle. The devices in which this layer is implemented are called delay-tolerant nodes. Packets are stored and kept in this layer until a proper connection becomes available. This layer is responsible for reliable delivery of packets to the destination and assurance from their successful delivery. Due to the implementation of Bundle layer in different types of transport layers, it is possible to support heterogeneous networks using delay-tolerant gateways; for instance, the Internet can support several networks. However, these networks may have different data connection layers. In order to optimize network efficiency, routing algorithm must select the appropriate contact based on the next step and determined transport time. When no connection is available, the message received from higher layers is kept in Bundle layer to set a proper contact or, finally, the message is discarded. Considering the main nature of delay-tolerant networks and unavailability of permanent connections, increasing packet delivery rate and reducing final delay are among the main goals of routing algorithms. When routing algorithm has better information about the current state of network topology and its future variations, it can adopt more effective decisions in terms of sending messages. Routings in which current status of topology and its future changes are predictable are called deterministic delay-tolerant routing. Sending packets can be done in a scheduled way by deterministic routing; as a result, network efficiency is improved and resource application is reduced. On the other hand, nodes may randomly move and have little or no information about future variations of network topology. In this way, delay-tolerant routing randomly sends packets step by step. In such a case, packet delivery is probabilistic and without any guarantees. Meanwhile, there are some mechanisms which predict contacts based on the information about previous state of the network or determine nodes' movement path for packet carriers. Random routing technique has more focus on repeating packets and controlling network drowning by messages in order to make an appropriate balance between using network resources and enhancing its efficiency in the absence of information related to the network's future variations. 2. RELATED WORKS So far, numerous algorithms have been introduced for routing in delay-tolerant networks. In this section, some examples of these algorithms are introduced. In Epidemic method, every node has a list of all the packets that are in standby mode and exchange their packets with each other as soon as contacting other nodes. This method guarantees packet delivery because the packet will be delivered to the destination at least via one route; however, this algorithm has problems such as large overhead, high transport cost and high memory usage. This algorithm can have the best efficiency if nodes have unlimited bandwidth and buffer; however, according to the current conditions and limitations, it is not possible to 42
  • 3. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013 provide unlimited bandwidth and buffer. So, algorithms should be introduced which smartly use current bandwidth, memory and other resources [6]. Another algorithm of this group is Spray and Wait. Instead of sending copies to all the nodes with which it is in contact, this algorithm sends copies to only a limited number; i.e. N copies of packets are provided and sent to the first N nodes with which it is in contact. Then, in case no destination is found, no other copy is made in the first phase and message carriers will have direct transmission of packet sending [8]. Another algorithm in this method is an algorithm that tries to prevent blind sending of copies. This algorithm is called PRoPHET and its logic is based on history of nodes' movement. Since nodes usually move in a certain manner, their next location can be predicted by gathering time and space information of the nodes. This information is calculated according to history of the nodes that have been already encountered by this node [4]. Considering the above points, this algorithm determines the criterion for probability of successful delivery of packets to the destination from current node. The nodes that have more contact with each other have higher probability of packet delivery. Then, they send copies to those nodes. 3. THE PROPOSED ALGORITHM By studying the nature of nodes' mobility in vehicular networks, it was concluded that nodes were buses in the network which had a fixed route and continuously passed it. Therefore, predictability feature of movement of these nodes was applied. In the proposed algorithm, vehicles studied bus routes when getting in contact with them; if a bus was moving to the destination, they would deliver packets to that bus. Considering feature of storing, transporting and sending packets, the bus would carry the packet to deliver it in the final destination. In this algorithm, if a vehicle wanted to deliver the packets but there was no bus for delivery, it would only deliver the packets to N encountered vehicles which could control the network traffic. Figure 1: Packet sending to destination by Bus B 43
  • 4. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013 For example in Figure 1, Vehicle A has a packet that should be sent to Vehicle D. Route of Bus B is marked gray. Considering that Bus B is moving toward the destination, Vehicle A delivers the packet to Bus B. In the proposed algorithm, in addition to using bus routes, roadside equipment was also applied. However, due to high cost of the equipment, attempts were made to minimize their application. To this end, the equipment was placed only on the crossroads on which two buses crossed each other. When nodes were in contact with roadside equipment, they sent them a copy of their packets. Then, the roadside unit delivered them to the suitable bus. Thus, indirect bus routes were also used which increased rate of packet delivery. As mentioned previously, message repetition is used in delay-tolerant networks. Accordingly, in each contact of the packet with routing algorithm, some copies of the message are sent to the encountered nodes; therefore, the packet would probably reach its final destination while there are copies of the packet in the network. Since these messages are unused and only waste memory of nodes and transport of packets, the proposed method had an idea for disposing these unused packets. Considering the structure of streets in the urban environment and bus routes, it can be concluded that route of buses is a backbone for vehicular network in urban environments, which covers most of the streets. In the proposed algorithm, the number of bus routes was assumed L; as mentioned earlier, bus routes act as the backbone of vehicular network; therefore, each message should arrive at the destination at most in L steps and the packets which have passed more than L steps are the unused ones that increase network traffic and waste memory of nodes. So, in the proposed algorithm, each packet was sent only to L steps. Figure 2 shows the routing decisions used in the proposed algorithm as a pseudo-code. Figure 2: Pseudo-code of the proposed algorithm 44
  • 5. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013 4. SIMULATION In this section, efficiency of the proposed method is evaluated and investigated. Then, it is compared with Epidemic and Spray and Wait algorithms. In this paper, ONE (opportunistic network environment) was used for evaluating efficiency of the proposed method. This simulator has been written in Java and is open source. ONE simulator is devoted to delay-tolerant networks; thus, this simulator was used for simulating the proposed algorithm.The simulation environment consisted of 16 bus routes, each of which had 5 buses that went back and forth on these routes. In addition, 15 roadside units were used at the intersection of bus routes. Simulation period was equal to 6 h in all the scenarios. One of the most important criteria for evaluating routing algorithms is their rate of successful packet delivery. Therefore, in the first scenario, capability of packet delivery was evaluated. Figure 3 demonstrates rate of successful packet delivery in three different algorithms. Figure 3: Percent of packet delivery in routing algorithms As can be seen in the figure, the more the number of nodes, the better the performance of the proposed algorithm would be. Below, mean delay of packets is investigated in different algorithms. Latency of each packet indicates time interval between time of packet development and its delivery to the destination. Results of this comparison are given in Figure 4. Figure 4: Mean delay of packet in routing algorithms 45
  • 6. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013 The more the number of nodes in the network, the more the possibility of contact would be; as a result, delivery of the packet to the considered destination would be faster. Increased number of nodes in all three algorithms can reduce delay time; however, this reduction was much more in the proposed algorithm than the other two. Finally, overhead of these three algorithms was compared. For this comparison, effect of increasing the number of nodes was investigated. Figure 5 indicates overhead of the compared algorithms. In this figure, numbers in the general column show overhead of the algorithms. The simulator used in this algorithm considered ratio of all copied packets to the delivered packets as network overhead. Figure 5: Mean network overhead of routing algorithms As can be seen, increased network severely raised overhead of Epidemic algorithm, which can be due to blind sending mechanism in this algorithm. Overhead of Spray and Wait algorithm did not change with increasing the number of network nodes. As mentioned previously, packets are constantly repeated in Spray and Wait algorithm; therefore, change in the number of nodes does not affect overhead of this algorithm. Overhead of the proposed algorithm also increased with constant slope, which was much less compared with Epidemic algorithm. By observing the results of the performed simulations, acceptable efficiency of the proposed algorithm and importance of using public transportation systems are found. Furthermore, importance of using an appropriate mechanism for network drowning using packets can be well understood. 5. CONCLUSIONS Considering the current limitations, it is necessary to used delay-tolerant networks. Thus, in this paper, first, delay-tolerant networks were introduced and architecture of this kind of networks along with other examples of available algorithms was investigated. Then, predictability advantage of nodes' movement in public transportation systems was used to introduce the proposed algorithm. Later, simulation and comparison results demonstrated acceptable efficiency of the proposed algorithm and importance of using public transportation systems. 46
  • 7. International Journal of Mobile Network Communications & Telematics ( IJMNCT) Vol. 3, No.6, December 2013 REFERENCES [1] [2] [3] [4] [4] [6] [7] [8] F. Giudici, D. Maggiorini, G .P. Rossi, “Performan ce Evaluation of Distance Vector-based Routing Protocols for Public Transp ortation Vehicular Networks”, in : Wireless Days,2008.WD'08. 1st IFIP,pp. 1 – 5. Doi: 10.1109/WD.2008.4812923 Paris, France, Nov. 2008 Kevin C. Lee, Uichin Lee, Mario Gerla , " Survey of Routing Protocols in Vehicular Ad Hoc Networks ", book chapter, Mohamed Watfa (ed.)" Advances in Vehicular Ad-Hoc Networks: Developments and Challenges ", IGI Global, 2010. K. J. Wong, B. S. Lee, B. C. Seet, G. Liu, and L. Zhu, “BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications”, in ICT 2003, Thailand, April, 2003 L. Den Hartog, T. Spyropoulos, F. Legendre " Using Public Transportation as a DTN Backbone: Mobility Properties and Performance Analysis " , in AOC 2010 Program , Canada, Montral, June, 2010 Lindgren, A., Doria, A., and SchelSn, O., Probabilistic Routing in Intermittently Connected Networks, in Poster of ACM MOBIHOC, 2003. Vahdat, A. and Becker, D., Epidemic Routing for Partially Connected Ad Hoc Networks, April 2000. S. Gaito , D. Maggiorini , G.P. Rossi , A. Sala " Bus switched networks: An ad hoc mobile platform enabling urban-wide communications ", in Ad Hoc Networks, In Press, doi:10.1016/j.adhoc.2012 Spyropoulos, T., Psounis, K., and Raghavendra, C.S., Spray and Wait: An Effi cient Routing Scheme for Intermittently Connected Mobile Networks, in Proc. ACM SIGCOMM Workshop on Delay-Tolerant Networking, 2005. AUTHORS Tohid Shamspour Received B.Sc. degree from university of applied science technology in 2008. He received M.Sc. degree from Shabestar Azad University, shabestar, iran , in 2013. His research interests include network management as well as VANET and DTN networks. Saleh Yousefi Received the B.Sc. and M.Sc. degrees in computer engineering (in the hardware field) and the Ph.D. degree in computer engineering (in the networking field) from Iran University of Science and Technology, Tehran, Iran , in 1999, 2002, and 2008, respectively. He is currently an Assistant Professor with the Computer Department, Faculty of Engineering, Urmia University, Urmia, Iran. Jamshid Bagherzadeh Received B.Sc. degree from Sharif University of Technology Tehran, Iran. He received M.Sc. degree from Tarbiat Modares Tehran, Iran and the Ph.D. degree in computer engineering from Indian Institute of Technology, Dehli, India. He is currently an Assistant Professor with the Computer Department, Faculty of Engineering, Urmia University, Urmia, Iran. 47