SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Presented by
Ramya R.
CONTENTS
 INTRODUCTION
 RELATED WORK
 THE PROPOSED ALGORITHM
 EVALUATION
 CONCLUSION
 REFERENCES
INTRODUCTION
 Delay tolerant network
 Real life examples
-MSNs
 Opportunistic routing of messages
 Enable nodes to make right forwarding decisions while routing
messages
Cont’d….
 The relationship defining the frequency and duration of
the connectivity between nodes has to be analyzed to route
messages efficiently
Ex: high school network
 A new metric that detects the quality of friendship
between the nodes either
Directly
Indirectly
RELATED WORK
General DTN Routing Algorithms
 Multicopy based
 Single-copy based
 Erasure-coding based
Multicopy based
 Exchange of messages
 The drawback is:
Excessive usage of bandwidth
Buffer space
Energy due to spreading of copies
Single copy based
 Based on movement of the nodes.
 In Max-Prop prioritization of the schedule of packets
that will be transmitted to other nodes or that will be
dropped from the buffer
Erasure-coding based
 The message is divided into large set of blocks
 Advantage
Robustness to failures
Increase the delivery rate
Contd…..
Social-Based Routing for MSNs
 Daly and Haahr use both social similarity and egocentric
betweenness metric to increase routing performance.
 Each node is assumed to have two rankings:
 global
 local.
Analysis of Node Relation
Friendship Community Formation
 Used in forwarding of messages.
 Three behavioral features of close friendships:
high frequency
 longevity
regularity
 A new metric, social pressures metric (SPM) to accurately
detect the quality of friendship.
 The link quality wi,j between each pair of nodes(i, j), is
defined as wi,j = 1/SPMi,j
‘what would be the average delivery delay of node i’s continuously
generated messages if they followed the path <i,j,k>’?
Handling periodic variation in node Relation
EVALUATION
 Three metrics:
Message delivery ratio
Average cost
Routing efficiency
CONCLUSION
 New metric to detect friendship-based node relations
accurately.
 Presented a new routing algorithm in which a node forwards
its messages to those nodes that contain the destination node in
their friendship communities.
 Evaluated the proposed algorithm through simulations.
 Algorithm performs better than three benchmark algorithms
proposed previously.
REFERENCES
 J. Ott and D. Kutscher, “A Disconnection-Tolerant Transport for Drive-Thru
Internet Environments,” Proc. IEEE INFOCOM, 2005.
 Y. Wang, S. Jain, M. Martonosi, and K. Fall, “Erasure-Coding Based Routing
for Opportunistic Networks,” Proc. ACM SIGCOMM Workshop Delay-Tolerant
Networking, 2005.
 E. Daly and M. Haahr, “Social Network Analysis for Routing in
Disconnected Delay-Tolerant Manets,” Proc. ACM MobiHoc, 2007.
 E. Bulut, Z. Wang, and B.K. Szymanski, “Impact of Social Networks in
Delay Tolerant Routing,” Proc. IEEE GLOBECOM, 2009.
 Q. Li, S. Zhu, and G. Cao, “Routing in Selfish Delay Tolerant Networks,”
Proc. IEEE INFOCOM, 2010.
Exploiting friendship relations for efficient routing in mobile

Weitere ähnliche Inhalte

Was ist angesagt?

Behavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBehavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant network
Bittu Roy
 
Connectivity of cognitive device to-device communications underlying cellular...
Connectivity of cognitive device to-device communications underlying cellular...Connectivity of cognitive device to-device communications underlying cellular...
Connectivity of cognitive device to-device communications underlying cellular...
ieeeprojectsbangalore
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
Distributeddatabasesforchallengednet
Vinoth Chandar
 

Was ist angesagt? (17)

Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
 
Unit 1- Intro to Wireless Standards.pdf
Unit 1- Intro to Wireless Standards.pdfUnit 1- Intro to Wireless Standards.pdf
Unit 1- Intro to Wireless Standards.pdf
 
Social Trust-aware Recommendation System: A T-Index Approach
Social Trust-aware Recommendation System: A T-Index ApproachSocial Trust-aware Recommendation System: A T-Index Approach
Social Trust-aware Recommendation System: A T-Index Approach
 
Behavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBehavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant network
 
Connectivity of cognitive device to-device communications underlying cellular...
Connectivity of cognitive device to-device communications underlying cellular...Connectivity of cognitive device to-device communications underlying cellular...
Connectivity of cognitive device to-device communications underlying cellular...
 
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
Survey paper on Evaluating Trust and Reputation Using Uncertain Reasoning in ...
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
Distributeddatabasesforchallengednet
 
Network Flow
Network FlowNetwork Flow
Network Flow
 
Communiy detection
Communiy detectionCommuniy detection
Communiy detection
 
Networking Basic
Networking BasicNetworking Basic
Networking Basic
 
Computer and Communication Networks in ODL
Computer and Communication Networks in ODLComputer and Communication Networks in ODL
Computer and Communication Networks in ODL
 
E42022125
E42022125E42022125
E42022125
 
Computer networks
Computer networksComputer networks
Computer networks
 
Network topology
Network topologyNetwork topology
Network topology
 
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents ApproachAn Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
An Opportunistic AODV Routing Scheme : A Cognitive Mobile Agents Approach
 
MICROBLOGGING CONTENT PROPAGATION MODELING USING TOPIC-SPECIFIC BEHAVIORAL FA...
MICROBLOGGING CONTENT PROPAGATION MODELING USING TOPIC-SPECIFIC BEHAVIORAL FA...MICROBLOGGING CONTENT PROPAGATION MODELING USING TOPIC-SPECIFIC BEHAVIORAL FA...
MICROBLOGGING CONTENT PROPAGATION MODELING USING TOPIC-SPECIFIC BEHAVIORAL FA...
 

Ähnlich wie Exploiting friendship relations for efficient routing in mobile

COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
ijasuc
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
ijasuc
 
Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...
jake henry
 
Using content and interactions for discovering communities in
Using content and interactions for discovering communities inUsing content and interactions for discovering communities in
Using content and interactions for discovering communities in
moresmile
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
Iaetsd Iaetsd
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
IJERA Editor
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
IJERA Editor
 

Ähnlich wie Exploiting friendship relations for efficient routing in mobile (20)

F0313539
F0313539F0313539
F0313539
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
 
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
 
Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant Networks
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
An Experimental Result of Conditional Shortest Path Routing In Delay Toleran...
An Experimental Result of Conditional Shortest Path Routing In  Delay Toleran...An Experimental Result of Conditional Shortest Path Routing In  Delay Toleran...
An Experimental Result of Conditional Shortest Path Routing In Delay Toleran...
 
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCHTOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
TOP 10 AD HOC NETWORKS PAPERS: RECOMMENDED READING – NETWORK RESEARCH
 
D0441722
D0441722D0441722
D0441722
 
Using content and interactions for discovering communities in
Using content and interactions for discovering communities inUsing content and interactions for discovering communities in
Using content and interactions for discovering communities in
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
Gk2411581160
Gk2411581160Gk2411581160
Gk2411581160
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
 
D0431013019
D0431013019D0431013019
D0431013019
 
iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
Elsevier paper
Elsevier paperElsevier paper
Elsevier paper
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
 
Route Stability in Mobile Ad-Hoc Networks
Route Stability in Mobile Ad-Hoc NetworksRoute Stability in Mobile Ad-Hoc Networks
Route Stability in Mobile Ad-Hoc Networks
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
 

Mehr von ramya1591 (7)

ramya_Motion_Detection
ramya_Motion_Detectionramya_Motion_Detection
ramya_Motion_Detection
 
Bg l approach
Bg l approachBg l approach
Bg l approach
 
TLS network
TLS networkTLS network
TLS network
 
Automatic toll booth
Automatic toll boothAutomatic toll booth
Automatic toll booth
 
San
SanSan
San
 
Intact
IntactIntact
Intact
 
Storage virtualization
Storage virtualizationStorage virtualization
Storage virtualization
 

Kürzlich hochgeladen

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Kürzlich hochgeladen (20)

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 

Exploiting friendship relations for efficient routing in mobile

  • 2. CONTENTS  INTRODUCTION  RELATED WORK  THE PROPOSED ALGORITHM  EVALUATION  CONCLUSION  REFERENCES
  • 3. INTRODUCTION  Delay tolerant network  Real life examples -MSNs  Opportunistic routing of messages  Enable nodes to make right forwarding decisions while routing messages
  • 4. Cont’d….  The relationship defining the frequency and duration of the connectivity between nodes has to be analyzed to route messages efficiently Ex: high school network  A new metric that detects the quality of friendship between the nodes either Directly Indirectly
  • 5. RELATED WORK General DTN Routing Algorithms  Multicopy based  Single-copy based  Erasure-coding based
  • 6. Multicopy based  Exchange of messages  The drawback is: Excessive usage of bandwidth Buffer space Energy due to spreading of copies
  • 7. Single copy based  Based on movement of the nodes.  In Max-Prop prioritization of the schedule of packets that will be transmitted to other nodes or that will be dropped from the buffer
  • 8. Erasure-coding based  The message is divided into large set of blocks  Advantage Robustness to failures Increase the delivery rate
  • 9. Contd….. Social-Based Routing for MSNs  Daly and Haahr use both social similarity and egocentric betweenness metric to increase routing performance.  Each node is assumed to have two rankings:  global  local.
  • 10. Analysis of Node Relation
  • 11. Friendship Community Formation  Used in forwarding of messages.  Three behavioral features of close friendships: high frequency  longevity regularity  A new metric, social pressures metric (SPM) to accurately detect the quality of friendship.  The link quality wi,j between each pair of nodes(i, j), is defined as wi,j = 1/SPMi,j
  • 12. ‘what would be the average delivery delay of node i’s continuously generated messages if they followed the path <i,j,k>’?
  • 13. Handling periodic variation in node Relation
  • 14. EVALUATION  Three metrics: Message delivery ratio Average cost Routing efficiency
  • 15.
  • 16. CONCLUSION  New metric to detect friendship-based node relations accurately.  Presented a new routing algorithm in which a node forwards its messages to those nodes that contain the destination node in their friendship communities.  Evaluated the proposed algorithm through simulations.  Algorithm performs better than three benchmark algorithms proposed previously.
  • 17. REFERENCES  J. Ott and D. Kutscher, “A Disconnection-Tolerant Transport for Drive-Thru Internet Environments,” Proc. IEEE INFOCOM, 2005.  Y. Wang, S. Jain, M. Martonosi, and K. Fall, “Erasure-Coding Based Routing for Opportunistic Networks,” Proc. ACM SIGCOMM Workshop Delay-Tolerant Networking, 2005.  E. Daly and M. Haahr, “Social Network Analysis for Routing in Disconnected Delay-Tolerant Manets,” Proc. ACM MobiHoc, 2007.  E. Bulut, Z. Wang, and B.K. Szymanski, “Impact of Social Networks in Delay Tolerant Routing,” Proc. IEEE GLOBECOM, 2009.  Q. Li, S. Zhu, and G. Cao, “Routing in Selfish Delay Tolerant Networks,” Proc. IEEE INFOCOM, 2010.