SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Jagruti Ramabhai Patel Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 6), February 2014, pp.21-26

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

A Popularity-Aware Buffer Management System to Stored Packet
Memory in Massage Transmission Grade in Delay Tolerant
Network
Jagruti Ramabhai Patel , Viren G. patel
Department of Computer Science and Engineering, Gujarat technological university, Patan, India.

ABSTRACT
A delay-tolerant network is a network designed so that momentary or flashing communication problems and
limitations have the least possible unpleasant impact. As the storage-carry-forward paradigm is adopted to
transfer messages in DTNs, buffer management schemes greatly influence the performance of routing protocols
when nodes have limited buffer space. Two major issues should be considered to achieve data delivery in such
challenging networking environments: a routing strategy for the network and a buffer management policy for
each node in the network. The routing strategy determines which messages should be forwarded when nodes
meet and the buffer management policy determines which message is purged when the buffer overflows in a
node. This study proposes an enhanced buffer management policy that utilizes message properties. For
maximization of the message deliveries and minimization of the average delay, two utility functions are
proposed on the basis of message properties, particularly the number of replicas, the age and the remaining timeto-live(TTL). Simulation results show that our buffer management scheme canimprove delivery ratio and has
relative lower overhead ratio compared with other buffer management schemes. In this scheme several type of
buffered policies, null buffered , single copy buffered ,infinite buffered etc. Our work in null buffered policies
there are no massage are available in buffered after massage send. In case massage send and this massage are
discarded and buffered store only single copy of massage than retransmitted it.
KeyWords -Delay tolerant network, Routing, Buffer Management , Intermittent connectivity, Massage
scheduling

I. INTRODUCTION
Delay-tolerant networking (DTN) is a field of
network research focused on architectures and
protocols that can operate in challenged networking
environments with extremely limited resources,
particularly in terms of CPU processing power,
memory size and network capacity [1]. As the
storage-carry-forward paradigm is adopted to transfer
messages in DTNs, buffer management schemes
greatly influence the performance of routing
protocols when nodes have limited buffer space.
These environments are typically distinguished by a
distruption. Communication links, which leads to
frequent and long periods of network partitioning,
long delays, limited resources and heterogeneity. The
implicit assumption in mobile and ad hoc networks is
that networks are connected and an end-to-end path
between any source and destination pair exists. Thus,
data are buffered and queues and paths are not
maintained because of mobility [2]. One of the issues
is routing in DTN and the solutions proposed thus far
for DTN routing range from the simplest mechanisms
to sophisticated mechanisms. The simplest
mechanism is the epidemic routing [3–5], where
messages are flooded through the network to reach as
www.ijera.com

much of the network as possible in the hope that each
message will eventually reach its destination.
Another important issue that must be considered in
DTN is the impact of buffer management policies
because DTN basically uses a store-carry-forward
routing protocol [13]. In store-carry-forward routing,
if the next hop is not immediately available for the
current node to forward a message, the node should
store the message in its buffer and carry it along
while moving until the node gets a communication
opportunity to forward this message farther.
Therefore the nodes must be capable of buffering
messages for a considerable time. Moreover, to
increase the probability of delivery, we need to
ensure the messages are replicated many times in the
network because of the lack of complete information
about other nodes [14]. As a result, the limited buffer
in each node is likely to be consumed rapidly when
the flooding messages are stored. According to the
literatures, buffer management policies significantly
affect the performance of DTN [13–16]. Zhang et al.
[13] showed that widely used traditional buffer
management policies, such as drop tail and drop
front, perform poorly in DTN. Recently, the historybased drop (HBD) policy based on global knowledge
of the network was proposed [15]; it outperforms
21 | P a g e
Jagruti Ramabhai Patel Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 6), February 2014, pp.21-26
traditional buffer management policies in terms of the
delivery ratio and the average delay. Although the
HBD outperforms traditional policies, the buffer
management of DTN still has plenty of room for
improvement. This study proposes an enhanced
buffer management policy (EBMP) that utilises
message properties to calculate the utility value of
each message. This paper studies a novel message
scheduling framework for DTNs under epidemic and
two-hop forwarding, aiming to enable an effective
decision process on which messages should be
forwarded and which should be dropped when the
buffer is full. Such a decision is made by evaluating
the impact of dropping each buffered message
according to collected network information for either
optimal message delivery ratio or message delivery
delay. To deal with the message propagation
prediction under epidemic forwarding and evaluate
the delivery delay and/ delivery ratio at any time
instance during message lifetime, Markov chain
model has been proven to be the best method in
doing such evaluation providing numerical solution
for such model becomes impractical when the
number of nodes is large .

II. ROUTING STRATEGES BASSED
ON BUFFER MANAGEMENT IN
DTN
Routing in DTN is categorized in to two main
categories, Flooding strategy and Forwarding
strategy [26]. Flooding strategy is based on the
principal of replicating messages to enough nodes so
that destination nodes must receive it. Forwarding
strategy uses knowledge about network to select best
path to the destination.
2.1 Flooding Strategy
In this strategy, the multiple copies of same message
will be created and these copies will be delivered to
the set of nodes called relay nodes. Relay nodes
stores the messages until they come in contact with
destination node [26].
2.1.1 Single Hop Transmission
The simplest strategy to transmit the data from source
to destination in DTN is to transmit messages
immediately as soon as the source and destination
come in contact with each other directly.
2.1.2 Two Hop Transmission
In this strategy source node along with the nodes
which at the fIrst instance come in contact with
source node work in cooperative manner to increase
message delivery probability to successfully deliver
the message to the destination node.

www.ijera.com

www.ijera.com

2.1.3 Tree Based Flooding
In tree based flooding, the task of making copies to
other relay node is distributed to the next nodes
which come in contact with the already discovered
node The relay nodes forms tree which is routed at
source node [11].
2.1.4 Epidemic Routing
Epidemic routing [12] is an early sparse network
routing protocol proposed for DTN. It assumes that
each node has unlimited storage space and bandwidth
[13]. Therefore every node can store all the messages
transmitted during "contact" phase.
2.1.5 Spray and Wait
Spray and wait [16] approach consists of two phase,
spray phase and wait phase. During spray phase, each
node will flood (spray) each message to L no. of
relay nodes when they come in subsequent contact
with each other. This L is initialized by source node.
If destination is encounter, message transmission is
successfully terminated.
2.1 6. Spray and Focus
Spray and Focus [17] is modifIcation of spray and
wait strategy. This is designed for specifIc
application where the mobility of each node is
localized. The nodes are assumed to move in small
area for most of the time. Spray phase is similar to
the spray and wait strategy [16]. The difference lies
in second phase. In focus phase, single copy of
message [18] is used to focus limited relay node to
route the message to destination.
2.1.7. MaxProp strategy
In MaxProp [19] strategy, city environment are taken
into consideration where nodes are city buses which
has high probability to meet again. MaxProp
approach exploits this behavior of city buses for
exchanging messages in future.
2.2. Forwarding Strategy
Forwarding Approach makes use of the network
topology and local or global knowledge to find best
route along the path to destination. This best route is
used to deliver the message.
2.2.1 Location Based routing strategy
This is the simplest forwarding strategy which makes
use of basic knowledge about location of a node.
Each node in the network is assigned the coordinate.
The coordinate may be physical such as GPS
coordinate. Then distance formula is used to estimate
the cost of delivering message from one node to
another [24], [25]. The main advantage of location
based routing is that it eliminates the need for storing

22 | P a g e
Jagruti Ramabhai Patel Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 6), February 2014, pp.21-26
routing tables as well as control information transfer
management.
2.2.2 Gradient Routing strategy
In this approach weights are assigned to the nodes in
the network that represents it's suitability to deliver
messages to a given destination. The relay nodes,
which stores the messages temporarily contacts
another node that has better metric for the message
destination; it passes the message to it.
2.2.3 Label Based Forwarding Strategy
In this strategy first task is to create groups. These
groups are labeled called labeled groups. These
groups are then chosen as next node or next groups to
forward message to the destination. This results in
large improvements as the labeled nodes works in
groups [26]. The group based routing efficiently
utilizes bandwidth and consumption.

III. BUFFER MANAGEMENT
Only a few studies have examined the impact of
buffer management and scheduling policies on the
performance of DTN routing. Zhang et al. in [9]
addressed this issue in the case of epidemic routing
by evaluating simple drop policies such as drop front
(DF) and drop tail, and analyzed the situation where
the buffer at a node has a capacity limit.. Lindgren
and Phanse in [10] evaluated a set of heuristic buffer
management policies based on locally available nodal
parameters and applied them to a number of DTN
routing protocols. Fathima and Wahidabanu in [34]
proposed buffer management scheme which divides
the main buffer to a number of queues of different
priorities. When the entire buffer is full, some of the
messages in the lowest priority queue are dropped to
give room for new messages. Similar idea was
explored by Dimitriou and Tsaoussidis [39], who
proposed a buffer management policy based on two
types of queues for respective type of data traffic;
namely a low-delay traffic (LDT) queue and a highdelay traffic (HDT) queue. Noticeably, all the abovementioned policies are based only on static and local
knowledge of network information. In [32], Dohyung
Kim and Yeom presented a policy which discards
first a message with the largest expected number of
copies. Erramilli and Crovella in [35] proposed
policies in a conjunction with forwarding algorithms.
Two issues are raised in [35]. First, without
addressing the message scheduling issue which is of
the same importance as buffer management, the
scheme in [35] may not be able to fully explore the
possible performance gain in the buffer management
scheme. Second, the absence of an analytical model
leaves the scheme simply a heuristic hard to be
evaluated. Krifa et al. in [11] proposed an interesting
approach for solving the problem of buffer
www.ijera.com

www.ijera.com

management by way of a drop policy and a
scheduling scheme. This is the first study that
explicitly takes global knowledge of node mobility as
a constraint in the task of message scheduling.
Specifically, their method estimates the number of
copies of message I based on the number of buffered
messages that were created before message i.
Although interesting, the method may become
inaccurate when the number of network nodes is
getting larger, especially for newly generated
messages. Meanwhile, the effect due to the change of
the number of message copies during the remaining
lifetime of a message.

IV. PROPOSED METHOD OF BUFFER
MANAGEMENT FRAMEWORK
We give a describable definition: Delay tolerant
network in such opportunistic networking is such an
ad hoc network, where the contact chance obtained
from the nodal mobility is utilized to exchange
messages between encountered nodes, by the method
until the messages is delivered to the destination
when the complete path does not exist between the
source and the destination. In case the node are
destroy the one copy of massage are stored in the
buffer.

Fig. Buffer store the massage in the Queue
The process of forwarding messages is as
follows: at t1, source node S wants to send a message
to destination node D, but S can‟t communicate with
D directly since it is not in the radio range of node D.
So S firstly sends the message to its neighbor node 3.
Node 3 gets the message and carries it until itself
enters the communication range of node 4 closer to
the destination and forwards the message to node 3 at
t2. The message is eventually delivered to the
destination D when node 4 encounters node D at t3.
In this al scenario, in case node 2 is crashed and our
sending packet is dropped. In this case buffer
management scheme is also use full the buffer store
every sending packet in one copy. In case our packet
is lost but is packet one copy is already available in
buffer queue and any time this packet is retransmit
the destination node. ). Another important issue that
23 | P a g e
Jagruti Ramabhai Patel Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 6), February 2014, pp.21-26

www.ijera.com

must be considered in DTN is the impact of buffer
management policies because DTN basically uses a
store-carry-forward routing protocol [13]. In storecarry-forward routing, if the next hop is not
immediately available for the current node to forward
a message, the node should store the message in its
buffer and carry it along while moving until the node
gets a communication opportunity to forward this
message farther.

V. Buffer Management Scheduling
Scenario
5.1 Node Bandwidth:
This factor determines the number of messages that
can be transmitted at each encounter opportunity. For
instance, if the bandwidth of a DTN device is
sufficient to transmit all the requested traffic load
within a given encounter duration, then this is
reasonable. However, if the traffic load increases due
to a large number of users or a larger size of
messages being transmitted, then the unsuccessful
transmissions due to insufficient encounter duration
should be taken into account. Therefore, to estimate
the number of messages that can be successfully
transmitted is useful to reduce the number of aborted
messages due to insufficient encounter duration. In
addition, to transmit messages according to a
corresponding priority is beneficial to utilize the
bandwidth.
5.2 Buffer Space:
The sufficient buffer space is essential for the carried
messages, since they would be buffered for a long
period time until the upcoming encounter opportunity
is available. In light of this, to discard the least
important message due to buffer space exhaustion is
beneficial to utilize the buffer space.
5.3 Node Energy:
A DTN device often has limited energy and can not
be connected to the power supplier easily. Energy is
required for transmitting, receiving, storing messages
and performing routing process. Hence, the routing
algorithms which transmit few messages and perform
less computation are more energy efficient.

Fig 4.2 Flow of buffer storage
The Intermediate node sends the packet on
the destination node and in case the node is crashed
and buffer B is check the node size N. The N is less
than B than packet is stored the buffer. Than finally
source node A is arrive the packet of buffer and than
after retransmit the destination node D.
5.5 node capability
The basic agents in the simulator are called nodes. A
node models a mobile endpoint capable of acting as a
store-carry-forward router (e.g., a pedestrian, car or
tram with the required hardware). Simulation
scenarios are built from groups of nodes in a
simulation world. Each group is configured with
different capabilities. Each node has a set of basic
capabilities that are modelled. These are radio
interface, persistent storage, movement, energy
consumption and message routing. Node capabilities
such as the radio interface and persistent storage that
involve only simple modelling are configured
through parameterization (e.g., communication range,
bit rate, peer scanning interval and storage capacity).
More complex capabilities such as movement and
routing are configured through specialized modules
that implement a particular behaviour for the
capability (e.g., different mobility models).

5.4.flow of how to stored massage in buffer
In communicating source node A can transmit the
packet the nearest node on the Intermediate node on
the Network. The packet size i less than the N is the
intermediate node. The intermediate node stored the
packet and than after send the next node.

www.ijera.com

24 | P a g e
Jagruti Ramabhai Patel Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 6), February 2014, pp.21-26

www.ijera.com

the service flow with the largest weighted buffer
space occupation.

VI. CONCLUSION
In this work, we investigate the problem of buffer
management in delay tolerant network. In buffer
management scheme is estimated the replication of
number of node and at list one copy stored in the
buffer in queue man or (FIFO). Then buffer is full
than drop the incoming packet. In this issue is
implemented in feature work.

ACKNOWLEDGEMENT

In source node S is defined the path of the i th
intermediate node than calculate the all the node
capacity and find the best node to meet the
destination node.
5.6 Node compare to the buffer space
The weight φi actually express the percentage of the
service flow i in the entire bandwidth B. φi will not
change with packet scheduling algorithms, and meet
𝑁
𝑖=0 φ𝑖

This research was supported by Basic Science
Research of dissertation .My sincere thanks to all the
authors whose literature I have used as a reference of
my work. I am very thankful to my Family & Friends
who supported throughout work.

REFERENCES
[1]

[2]

=1

Where N expresses the number of service flows in the
link. And the service volume is described. Where i, j
denotes two different service flows. In GPS based
Algorithms, the bandwidth allocation of different
service flows meets the requirement Bi/ φi = Bj/ φj,
where Bi is the allocated bandwidth of the service
flow i.

[3]

[4]

[5]

[6]
Fig 4.4weighted allocated node to compare the buffer
space
In buffer management algorithms, how to control the
buffer space occupation .Here we define,
Ci/Wi=Cj/Wj.
where Ci is the buffer space occupation, and Wi
expresses the synthetic weight of the service flow i.
When the buffer cache is full, the service flow with
the largest value of Ci/Wi will be droped in order of
fairness. If all packet lengths are the same, the
algorithm only needs one cycle to compare and select
www.ijera.com

[7]

[8]

Yue Cao and Zhili Sun,member IEEE
routing in delay / disruption Tolerant
network:a taxonomy , survey
and
challenges Magazine 2013(15):
Lijun TANG1, Yi CHAI 1;, Yun LI 2,
Binbin WENG2 buffer m management
Policies
in
Opportunistic
Networks
2012(5149-5159)
Yao Liu1,2, Jianxin Wang1, Shigeng
Zhang1, Hongjing Zhou2 A Buffer
management Scheme based
Message
Transmission Status in Delay tolerant
Networks IEEE Globecom 2011 .
K. Shin S. Kim Enhanced buffer
management policy that utilizes message
properties for delay-tolerant networks IET
Communications Received on 25th May
2010, pp. 26-38
Qingsong Wei, Member, IEEE, Lingfang
Zeng, Jianxi Chen, Cheng Chen ,A
popularity Aware Buffer Management to
Improve Buffer Hit Ratio and Sequentiality
for Solid State Drive IEEE 3 June 2011.
Ahmed Elwhishi, Pin-Han Ho, K. Naik, and
Basem Shihada , A Novel Message
Scheduling Framework for Delay Tolerant
Networks routing IEEE magazine 5 May
2013, pp. 65-77
A. Vahdat and D. Becker,”Epidemic
Routing for Partially Connected Ad Hoc
Network,” Technical Report CS-200006,
Duke Univ Apr. 2000.
Y.K.IP,W-C.Lau and O-C.
Yue,
“Performance Modeling of Epidemic
Routing with Heterogeneous Node Types.”
Proc.IEEE int‟l Conf.Comm.(ICC),2008.

25 | P a g e
Jagruti Ramabhai Patel Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 6), February 2014, pp.21-26
[9]

[10]

[11]

[12]

[13]

Burlegh, S., Hook,A., Torgerson, L., et al.:‟
Delay Tolerant networking: an approach to
Interplanet internet‟,IEEE commun. Ma,
2003, 41, (6), pp.128-136.
Lindgren, A., Doria, A, Schelen, o.
:”probabilistic
routing in intermittently
connected network “, Lect. Notes Comput
.Sci., 2004, 3126, pp. 239-254
Lebrun, J., Chuah, C.-N., Ghosal, D.,
Zhang, M.:‟ Knowledge-based opportunistic
Forwarding in vehicular wireless and ad hoc
network‟. Proc int. conf. IEEE Vehicular
Technology, Stockholm, Sweden, may 2005,
pp. 2289-2293
Shin. K., Lee, D.:frame-based probabilistic
routing for delay tolerant network‟ , IEICE
trans. Commu. 2010. E93-B,(6),pp.14511458
Lindgren, A., Phanse, K.S.: „Evaluation of
queuing policies and forwarding strategies
for routing in intermittently connected
networks‟. Proc. Int. Conf. Communication
Systems Software and Middleware, New
Delhi, India, January 2006, pp. 1–10

www.ijera.com

[14]

[15]

[16]

[17]

www.ijera.com

Daly, E.M., Haahr, M.:„Social network
analysis for routing in disconnected delaytolerant MANETs‟. Proc. Int. ACM Symp.
On Mobile Ad Hoc Networking and
Computing, Montre´al, Que´bec, Canada,
September 2007, pp. 32–40
Li, Y., Qian, M., Jin, D., Su, L., Zeng, L.:
„Adaptive optimal buffer management
policies for realistic DTN‟. Proc. Int. Conf.
IEEE Global Communications, Honolulu,
HI, November 2009, pp. 1–5
Chen, S., Yang, N.: „Congestion avoidance
based on lightweight buffer management in
sensor networks‟, IEEE Trans. Parallel
Distrib. Syst., 2006, 17, (9), pp. 934–946
Jardosh, S., Zunnun, N., Ranjan, P.,
Srivastava, „Effect of network coding on
buffer management in wireless sensor
network‟. Proc. Int. Conf. Intelligent
Sensors, Sensor Networks and Information
Processing, Sydney, Australia, December
2008, pp. 157–162

26 | P a g e

Weitere ähnliche Inhalte

Was ist angesagt?

Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic NetworksAuwal Amshi
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
 
Enhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networksEnhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networksIRJET Journal
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...ijasuc
 
Z02417321735
Z02417321735Z02417321735
Z02417321735IJMER
 
Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant NetworksAnubhav Mahajan
 
Project
Project Project
Project J M
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...ijmnct
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
 
Csit54201
Csit54201Csit54201
Csit54201csandit
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...IRJET Journal
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...ijdpsjournal
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicasIJCNCJournal
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...CSCJournals
 

Was ist angesagt? (20)

Routing in Opportunistic Networks
Routing in Opportunistic NetworksRouting in Opportunistic Networks
Routing in Opportunistic Networks
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
 
Jcomss 8358 final
Jcomss 8358 finalJcomss 8358 final
Jcomss 8358 final
 
Enhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networksEnhanced Multicast routing for QoS in delay tolerant networks
Enhanced Multicast routing for QoS in delay tolerant networks
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
 
Z02417321735
Z02417321735Z02417321735
Z02417321735
 
Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant Networks
 
Project
Project Project
Project
 
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...Impact of mobility models on supp tran optimized dtn spray and wait routing p...
Impact of mobility models on supp tran optimized dtn spray and wait routing p...
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
Csit54201
Csit54201Csit54201
Csit54201
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...A cross layer optimized reliable multicast routing protocol in wireless mesh ...
A cross layer optimized reliable multicast routing protocol in wireless mesh ...
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
Automated re allocator of replicas
Automated re allocator of replicasAutomated re allocator of replicas
Automated re allocator of replicas
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
Routing in « Delay Tolerant Networks » (DTN) Improved Routing With Prophet an...
 

Andere mochten auch

Madame Tussaud si mostenirea sa
Madame Tussaud si mostenirea saMadame Tussaud si mostenirea sa
Madame Tussaud si mostenirea saOvidiu Slimac
 
Cele mai bune urari in 2015
Cele mai bune urari in 2015Cele mai bune urari in 2015
Cele mai bune urari in 2015Ovidiu Slimac
 
Stefan Popa - Popa's
Stefan Popa - Popa'sStefan Popa - Popa's
Stefan Popa - Popa'sOvidiu Slimac
 
Тренинг по планированию семьи и сохранению репродуктивного здоровья
Тренинг по планированию семьи и сохранению репродуктивного здоровьяТренинг по планированию семьи и сохранению репродуктивного здоровья
Тренинг по планированию семьи и сохранению репродуктивного здоровьяСНУЯЭиП
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 

Andere mochten auch (8)

Madame Tussaud si mostenirea sa
Madame Tussaud si mostenirea saMadame Tussaud si mostenirea sa
Madame Tussaud si mostenirea sa
 
Cele mai bune urari in 2015
Cele mai bune urari in 2015Cele mai bune urari in 2015
Cele mai bune urari in 2015
 
Stefan Popa - Popa's
Stefan Popa - Popa'sStefan Popa - Popa's
Stefan Popa - Popa's
 
Тренинг по планированию семьи и сохранению репродуктивного здоровья
Тренинг по планированию семьи и сохранению репродуктивного здоровьяТренинг по планированию семьи и сохранению репродуктивного здоровья
Тренинг по планированию семьи и сохранению репродуктивного здоровья
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 

Ähnlich wie A Popularity-Aware Buffer Management for Delay Tolerant Networks

Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksIJERA Editor
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Editor Jacotech
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)graphhoc
 
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONijwmn
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
Improving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingImproving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingijitjournal
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AKARTHIKEYAN V
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETKhushbooGupta145
 
IRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
IRJET- Vitality Rooted Modern Trends in Delay Tolerant NetworksIRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
IRJET- Vitality Rooted Modern Trends in Delay Tolerant NetworksIRJET Journal
 

Ähnlich wie A Popularity-Aware Buffer Management for Delay Tolerant Networks (20)

Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant Networks
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
Ly2520762079
Ly2520762079Ly2520762079
Ly2520762079
 
Ly2520762079
Ly2520762079Ly2520762079
Ly2520762079
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATIONROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
ROUTING PROTOCOLS FOR DELAY TOLERANT NETWORKS: SURVEY AND PERFORMANCE EVALUATION
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
Improving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingImproving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routing
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
 
C0351725
C0351725C0351725
C0351725
 
IRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
IRJET- Vitality Rooted Modern Trends in Delay Tolerant NetworksIRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
IRJET- Vitality Rooted Modern Trends in Delay Tolerant Networks
 

Kürzlich hochgeladen

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Kürzlich hochgeladen (20)

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

A Popularity-Aware Buffer Management for Delay Tolerant Networks

  • 1. Jagruti Ramabhai Patel Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 6), February 2014, pp.21-26 RESEARCH ARTICLE www.ijera.com OPEN ACCESS A Popularity-Aware Buffer Management System to Stored Packet Memory in Massage Transmission Grade in Delay Tolerant Network Jagruti Ramabhai Patel , Viren G. patel Department of Computer Science and Engineering, Gujarat technological university, Patan, India. ABSTRACT A delay-tolerant network is a network designed so that momentary or flashing communication problems and limitations have the least possible unpleasant impact. As the storage-carry-forward paradigm is adopted to transfer messages in DTNs, buffer management schemes greatly influence the performance of routing protocols when nodes have limited buffer space. Two major issues should be considered to achieve data delivery in such challenging networking environments: a routing strategy for the network and a buffer management policy for each node in the network. The routing strategy determines which messages should be forwarded when nodes meet and the buffer management policy determines which message is purged when the buffer overflows in a node. This study proposes an enhanced buffer management policy that utilizes message properties. For maximization of the message deliveries and minimization of the average delay, two utility functions are proposed on the basis of message properties, particularly the number of replicas, the age and the remaining timeto-live(TTL). Simulation results show that our buffer management scheme canimprove delivery ratio and has relative lower overhead ratio compared with other buffer management schemes. In this scheme several type of buffered policies, null buffered , single copy buffered ,infinite buffered etc. Our work in null buffered policies there are no massage are available in buffered after massage send. In case massage send and this massage are discarded and buffered store only single copy of massage than retransmitted it. KeyWords -Delay tolerant network, Routing, Buffer Management , Intermittent connectivity, Massage scheduling I. INTRODUCTION Delay-tolerant networking (DTN) is a field of network research focused on architectures and protocols that can operate in challenged networking environments with extremely limited resources, particularly in terms of CPU processing power, memory size and network capacity [1]. As the storage-carry-forward paradigm is adopted to transfer messages in DTNs, buffer management schemes greatly influence the performance of routing protocols when nodes have limited buffer space. These environments are typically distinguished by a distruption. Communication links, which leads to frequent and long periods of network partitioning, long delays, limited resources and heterogeneity. The implicit assumption in mobile and ad hoc networks is that networks are connected and an end-to-end path between any source and destination pair exists. Thus, data are buffered and queues and paths are not maintained because of mobility [2]. One of the issues is routing in DTN and the solutions proposed thus far for DTN routing range from the simplest mechanisms to sophisticated mechanisms. The simplest mechanism is the epidemic routing [3–5], where messages are flooded through the network to reach as www.ijera.com much of the network as possible in the hope that each message will eventually reach its destination. Another important issue that must be considered in DTN is the impact of buffer management policies because DTN basically uses a store-carry-forward routing protocol [13]. In store-carry-forward routing, if the next hop is not immediately available for the current node to forward a message, the node should store the message in its buffer and carry it along while moving until the node gets a communication opportunity to forward this message farther. Therefore the nodes must be capable of buffering messages for a considerable time. Moreover, to increase the probability of delivery, we need to ensure the messages are replicated many times in the network because of the lack of complete information about other nodes [14]. As a result, the limited buffer in each node is likely to be consumed rapidly when the flooding messages are stored. According to the literatures, buffer management policies significantly affect the performance of DTN [13–16]. Zhang et al. [13] showed that widely used traditional buffer management policies, such as drop tail and drop front, perform poorly in DTN. Recently, the historybased drop (HBD) policy based on global knowledge of the network was proposed [15]; it outperforms 21 | P a g e
  • 2. Jagruti Ramabhai Patel Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 6), February 2014, pp.21-26 traditional buffer management policies in terms of the delivery ratio and the average delay. Although the HBD outperforms traditional policies, the buffer management of DTN still has plenty of room for improvement. This study proposes an enhanced buffer management policy (EBMP) that utilises message properties to calculate the utility value of each message. This paper studies a novel message scheduling framework for DTNs under epidemic and two-hop forwarding, aiming to enable an effective decision process on which messages should be forwarded and which should be dropped when the buffer is full. Such a decision is made by evaluating the impact of dropping each buffered message according to collected network information for either optimal message delivery ratio or message delivery delay. To deal with the message propagation prediction under epidemic forwarding and evaluate the delivery delay and/ delivery ratio at any time instance during message lifetime, Markov chain model has been proven to be the best method in doing such evaluation providing numerical solution for such model becomes impractical when the number of nodes is large . II. ROUTING STRATEGES BASSED ON BUFFER MANAGEMENT IN DTN Routing in DTN is categorized in to two main categories, Flooding strategy and Forwarding strategy [26]. Flooding strategy is based on the principal of replicating messages to enough nodes so that destination nodes must receive it. Forwarding strategy uses knowledge about network to select best path to the destination. 2.1 Flooding Strategy In this strategy, the multiple copies of same message will be created and these copies will be delivered to the set of nodes called relay nodes. Relay nodes stores the messages until they come in contact with destination node [26]. 2.1.1 Single Hop Transmission The simplest strategy to transmit the data from source to destination in DTN is to transmit messages immediately as soon as the source and destination come in contact with each other directly. 2.1.2 Two Hop Transmission In this strategy source node along with the nodes which at the fIrst instance come in contact with source node work in cooperative manner to increase message delivery probability to successfully deliver the message to the destination node. www.ijera.com www.ijera.com 2.1.3 Tree Based Flooding In tree based flooding, the task of making copies to other relay node is distributed to the next nodes which come in contact with the already discovered node The relay nodes forms tree which is routed at source node [11]. 2.1.4 Epidemic Routing Epidemic routing [12] is an early sparse network routing protocol proposed for DTN. It assumes that each node has unlimited storage space and bandwidth [13]. Therefore every node can store all the messages transmitted during "contact" phase. 2.1.5 Spray and Wait Spray and wait [16] approach consists of two phase, spray phase and wait phase. During spray phase, each node will flood (spray) each message to L no. of relay nodes when they come in subsequent contact with each other. This L is initialized by source node. If destination is encounter, message transmission is successfully terminated. 2.1 6. Spray and Focus Spray and Focus [17] is modifIcation of spray and wait strategy. This is designed for specifIc application where the mobility of each node is localized. The nodes are assumed to move in small area for most of the time. Spray phase is similar to the spray and wait strategy [16]. The difference lies in second phase. In focus phase, single copy of message [18] is used to focus limited relay node to route the message to destination. 2.1.7. MaxProp strategy In MaxProp [19] strategy, city environment are taken into consideration where nodes are city buses which has high probability to meet again. MaxProp approach exploits this behavior of city buses for exchanging messages in future. 2.2. Forwarding Strategy Forwarding Approach makes use of the network topology and local or global knowledge to find best route along the path to destination. This best route is used to deliver the message. 2.2.1 Location Based routing strategy This is the simplest forwarding strategy which makes use of basic knowledge about location of a node. Each node in the network is assigned the coordinate. The coordinate may be physical such as GPS coordinate. Then distance formula is used to estimate the cost of delivering message from one node to another [24], [25]. The main advantage of location based routing is that it eliminates the need for storing 22 | P a g e
  • 3. Jagruti Ramabhai Patel Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 6), February 2014, pp.21-26 routing tables as well as control information transfer management. 2.2.2 Gradient Routing strategy In this approach weights are assigned to the nodes in the network that represents it's suitability to deliver messages to a given destination. The relay nodes, which stores the messages temporarily contacts another node that has better metric for the message destination; it passes the message to it. 2.2.3 Label Based Forwarding Strategy In this strategy first task is to create groups. These groups are labeled called labeled groups. These groups are then chosen as next node or next groups to forward message to the destination. This results in large improvements as the labeled nodes works in groups [26]. The group based routing efficiently utilizes bandwidth and consumption. III. BUFFER MANAGEMENT Only a few studies have examined the impact of buffer management and scheduling policies on the performance of DTN routing. Zhang et al. in [9] addressed this issue in the case of epidemic routing by evaluating simple drop policies such as drop front (DF) and drop tail, and analyzed the situation where the buffer at a node has a capacity limit.. Lindgren and Phanse in [10] evaluated a set of heuristic buffer management policies based on locally available nodal parameters and applied them to a number of DTN routing protocols. Fathima and Wahidabanu in [34] proposed buffer management scheme which divides the main buffer to a number of queues of different priorities. When the entire buffer is full, some of the messages in the lowest priority queue are dropped to give room for new messages. Similar idea was explored by Dimitriou and Tsaoussidis [39], who proposed a buffer management policy based on two types of queues for respective type of data traffic; namely a low-delay traffic (LDT) queue and a highdelay traffic (HDT) queue. Noticeably, all the abovementioned policies are based only on static and local knowledge of network information. In [32], Dohyung Kim and Yeom presented a policy which discards first a message with the largest expected number of copies. Erramilli and Crovella in [35] proposed policies in a conjunction with forwarding algorithms. Two issues are raised in [35]. First, without addressing the message scheduling issue which is of the same importance as buffer management, the scheme in [35] may not be able to fully explore the possible performance gain in the buffer management scheme. Second, the absence of an analytical model leaves the scheme simply a heuristic hard to be evaluated. Krifa et al. in [11] proposed an interesting approach for solving the problem of buffer www.ijera.com www.ijera.com management by way of a drop policy and a scheduling scheme. This is the first study that explicitly takes global knowledge of node mobility as a constraint in the task of message scheduling. Specifically, their method estimates the number of copies of message I based on the number of buffered messages that were created before message i. Although interesting, the method may become inaccurate when the number of network nodes is getting larger, especially for newly generated messages. Meanwhile, the effect due to the change of the number of message copies during the remaining lifetime of a message. IV. PROPOSED METHOD OF BUFFER MANAGEMENT FRAMEWORK We give a describable definition: Delay tolerant network in such opportunistic networking is such an ad hoc network, where the contact chance obtained from the nodal mobility is utilized to exchange messages between encountered nodes, by the method until the messages is delivered to the destination when the complete path does not exist between the source and the destination. In case the node are destroy the one copy of massage are stored in the buffer. Fig. Buffer store the massage in the Queue The process of forwarding messages is as follows: at t1, source node S wants to send a message to destination node D, but S can‟t communicate with D directly since it is not in the radio range of node D. So S firstly sends the message to its neighbor node 3. Node 3 gets the message and carries it until itself enters the communication range of node 4 closer to the destination and forwards the message to node 3 at t2. The message is eventually delivered to the destination D when node 4 encounters node D at t3. In this al scenario, in case node 2 is crashed and our sending packet is dropped. In this case buffer management scheme is also use full the buffer store every sending packet in one copy. In case our packet is lost but is packet one copy is already available in buffer queue and any time this packet is retransmit the destination node. ). Another important issue that 23 | P a g e
  • 4. Jagruti Ramabhai Patel Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 6), February 2014, pp.21-26 www.ijera.com must be considered in DTN is the impact of buffer management policies because DTN basically uses a store-carry-forward routing protocol [13]. In storecarry-forward routing, if the next hop is not immediately available for the current node to forward a message, the node should store the message in its buffer and carry it along while moving until the node gets a communication opportunity to forward this message farther. V. Buffer Management Scheduling Scenario 5.1 Node Bandwidth: This factor determines the number of messages that can be transmitted at each encounter opportunity. For instance, if the bandwidth of a DTN device is sufficient to transmit all the requested traffic load within a given encounter duration, then this is reasonable. However, if the traffic load increases due to a large number of users or a larger size of messages being transmitted, then the unsuccessful transmissions due to insufficient encounter duration should be taken into account. Therefore, to estimate the number of messages that can be successfully transmitted is useful to reduce the number of aborted messages due to insufficient encounter duration. In addition, to transmit messages according to a corresponding priority is beneficial to utilize the bandwidth. 5.2 Buffer Space: The sufficient buffer space is essential for the carried messages, since they would be buffered for a long period time until the upcoming encounter opportunity is available. In light of this, to discard the least important message due to buffer space exhaustion is beneficial to utilize the buffer space. 5.3 Node Energy: A DTN device often has limited energy and can not be connected to the power supplier easily. Energy is required for transmitting, receiving, storing messages and performing routing process. Hence, the routing algorithms which transmit few messages and perform less computation are more energy efficient. Fig 4.2 Flow of buffer storage The Intermediate node sends the packet on the destination node and in case the node is crashed and buffer B is check the node size N. The N is less than B than packet is stored the buffer. Than finally source node A is arrive the packet of buffer and than after retransmit the destination node D. 5.5 node capability The basic agents in the simulator are called nodes. A node models a mobile endpoint capable of acting as a store-carry-forward router (e.g., a pedestrian, car or tram with the required hardware). Simulation scenarios are built from groups of nodes in a simulation world. Each group is configured with different capabilities. Each node has a set of basic capabilities that are modelled. These are radio interface, persistent storage, movement, energy consumption and message routing. Node capabilities such as the radio interface and persistent storage that involve only simple modelling are configured through parameterization (e.g., communication range, bit rate, peer scanning interval and storage capacity). More complex capabilities such as movement and routing are configured through specialized modules that implement a particular behaviour for the capability (e.g., different mobility models). 5.4.flow of how to stored massage in buffer In communicating source node A can transmit the packet the nearest node on the Intermediate node on the Network. The packet size i less than the N is the intermediate node. The intermediate node stored the packet and than after send the next node. www.ijera.com 24 | P a g e
  • 5. Jagruti Ramabhai Patel Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 6), February 2014, pp.21-26 www.ijera.com the service flow with the largest weighted buffer space occupation. VI. CONCLUSION In this work, we investigate the problem of buffer management in delay tolerant network. In buffer management scheme is estimated the replication of number of node and at list one copy stored in the buffer in queue man or (FIFO). Then buffer is full than drop the incoming packet. In this issue is implemented in feature work. ACKNOWLEDGEMENT In source node S is defined the path of the i th intermediate node than calculate the all the node capacity and find the best node to meet the destination node. 5.6 Node compare to the buffer space The weight φi actually express the percentage of the service flow i in the entire bandwidth B. φi will not change with packet scheduling algorithms, and meet 𝑁 𝑖=0 φ𝑖 This research was supported by Basic Science Research of dissertation .My sincere thanks to all the authors whose literature I have used as a reference of my work. I am very thankful to my Family & Friends who supported throughout work. REFERENCES [1] [2] =1 Where N expresses the number of service flows in the link. And the service volume is described. Where i, j denotes two different service flows. In GPS based Algorithms, the bandwidth allocation of different service flows meets the requirement Bi/ φi = Bj/ φj, where Bi is the allocated bandwidth of the service flow i. [3] [4] [5] [6] Fig 4.4weighted allocated node to compare the buffer space In buffer management algorithms, how to control the buffer space occupation .Here we define, Ci/Wi=Cj/Wj. where Ci is the buffer space occupation, and Wi expresses the synthetic weight of the service flow i. When the buffer cache is full, the service flow with the largest value of Ci/Wi will be droped in order of fairness. If all packet lengths are the same, the algorithm only needs one cycle to compare and select www.ijera.com [7] [8] Yue Cao and Zhili Sun,member IEEE routing in delay / disruption Tolerant network:a taxonomy , survey and challenges Magazine 2013(15): Lijun TANG1, Yi CHAI 1;, Yun LI 2, Binbin WENG2 buffer m management Policies in Opportunistic Networks 2012(5149-5159) Yao Liu1,2, Jianxin Wang1, Shigeng Zhang1, Hongjing Zhou2 A Buffer management Scheme based Message Transmission Status in Delay tolerant Networks IEEE Globecom 2011 . K. Shin S. Kim Enhanced buffer management policy that utilizes message properties for delay-tolerant networks IET Communications Received on 25th May 2010, pp. 26-38 Qingsong Wei, Member, IEEE, Lingfang Zeng, Jianxi Chen, Cheng Chen ,A popularity Aware Buffer Management to Improve Buffer Hit Ratio and Sequentiality for Solid State Drive IEEE 3 June 2011. Ahmed Elwhishi, Pin-Han Ho, K. Naik, and Basem Shihada , A Novel Message Scheduling Framework for Delay Tolerant Networks routing IEEE magazine 5 May 2013, pp. 65-77 A. Vahdat and D. Becker,”Epidemic Routing for Partially Connected Ad Hoc Network,” Technical Report CS-200006, Duke Univ Apr. 2000. Y.K.IP,W-C.Lau and O-C. Yue, “Performance Modeling of Epidemic Routing with Heterogeneous Node Types.” Proc.IEEE int‟l Conf.Comm.(ICC),2008. 25 | P a g e
  • 6. Jagruti Ramabhai Patel Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 6), February 2014, pp.21-26 [9] [10] [11] [12] [13] Burlegh, S., Hook,A., Torgerson, L., et al.:‟ Delay Tolerant networking: an approach to Interplanet internet‟,IEEE commun. Ma, 2003, 41, (6), pp.128-136. Lindgren, A., Doria, A, Schelen, o. :”probabilistic routing in intermittently connected network “, Lect. Notes Comput .Sci., 2004, 3126, pp. 239-254 Lebrun, J., Chuah, C.-N., Ghosal, D., Zhang, M.:‟ Knowledge-based opportunistic Forwarding in vehicular wireless and ad hoc network‟. Proc int. conf. IEEE Vehicular Technology, Stockholm, Sweden, may 2005, pp. 2289-2293 Shin. K., Lee, D.:frame-based probabilistic routing for delay tolerant network‟ , IEICE trans. Commu. 2010. E93-B,(6),pp.14511458 Lindgren, A., Phanse, K.S.: „Evaluation of queuing policies and forwarding strategies for routing in intermittently connected networks‟. Proc. Int. Conf. Communication Systems Software and Middleware, New Delhi, India, January 2006, pp. 1–10 www.ijera.com [14] [15] [16] [17] www.ijera.com Daly, E.M., Haahr, M.:„Social network analysis for routing in disconnected delaytolerant MANETs‟. Proc. Int. ACM Symp. On Mobile Ad Hoc Networking and Computing, Montre´al, Que´bec, Canada, September 2007, pp. 32–40 Li, Y., Qian, M., Jin, D., Su, L., Zeng, L.: „Adaptive optimal buffer management policies for realistic DTN‟. Proc. Int. Conf. IEEE Global Communications, Honolulu, HI, November 2009, pp. 1–5 Chen, S., Yang, N.: „Congestion avoidance based on lightweight buffer management in sensor networks‟, IEEE Trans. Parallel Distrib. Syst., 2006, 17, (9), pp. 934–946 Jardosh, S., Zunnun, N., Ranjan, P., Srivastava, „Effect of network coding on buffer management in wireless sensor network‟. Proc. Int. Conf. Intelligent Sensors, Sensor Networks and Information Processing, Sydney, Australia, December 2008, pp. 157–162 26 | P a g e