59 research outputs found

    Message forwarding techniques in Bluetooth enabled opportunistic communication environment

    Get PDF
    These days, most of the mobile phones are smart enough with computer like intelligence and equipped with multiple communication technologies such as Bluetooth, wireless LAN, GPRS and GSM. Different communication medium on single device have unlocked the new horizon of communication means. Modern mobile phones are not only capable of using traditional way of communication via GSM or GPRS; but, also use wireless LANs using access points where available. Among these communication means, Bluetooth technology is very intriguing and unique in nature. Any two devices equipped with Bluetooth technology can communicate directly due to their unique IDs in the world. This is opposite to GSM or Wireless LAN technology; where devices are dependent on infrastructure of service providers and have to pay for their services. Due to continual advancement in the field of mobile technology, mobile ad-hoc network seems to be more realised than ever using Bluetooth. In traditional mobile ad-hoc networks (MANETs), before information sharing, devices have partial or full knowledge of routes to the destinations using ad-hoc routing protocols. This kind of communication can only be realised if nodes follow the certain pattern. However, in reality mobile ad-hoc networks are highly unpredictable, any node can join or leave network at any time, thus making them risky for effective communication. This issue is addressed by introducing new breed of ad-hoc networking, known as opportunistic networks. Opportunistic networking is a concept that is evolved from mobile ad-hoc networking. In opportunistic networks nodes have no prior knowledge of routes to intended destinations. Any node in the network can be used as potential forwarder with the exception of taking information one step closer to intended destination. The forwarding decision is based on the information gathered from the source node or encountering node. The opportunistic forwarding can only be achieved if message forwarding is carried out in store and forward fashion. Although, opportunistic networks are more flexible than traditional MANETs, however, due to little insight of network, it poses distinct challenges such as intermittent connectivity, variable delays, short connection duration and dynamic topology. Addressing these challenges in opportunistic network is the basis for developing new and efficient protocols for information sharing. The aim of this research is to design different routing/forwarding techniques for opportunistic networks to improve the overall message delivery at destinations while keeping the communication cost very low. Some assumptions are considered to improved directivity of message flow towards intended destinations. These assumptions exploit human social relationships analogies, approximate awareness of the location of nodes in the network and use of hybrid communication by combining several routing concept to gain maximum message directivity. Enhancement in message forwarding in opportunistic networks can be achieved by targeting key nodes that show high degree of influence, popularity or knowledge inside the network. Based on this observation, this thesis presents an improved version of Lobby Influence (LI) algorithm called as Enhanced Lobby Influence (ELI). In LI, the forwarding decision is based on two important factors, popularity of node and popularity of node’s neighbour. The forwarding decision of Enhanced Lobby Influence not only depends on the intermediate node selection criteria as defined in Lobby Influence but also based on the knowledge of previously direct message delivery of intended destination. An improvement can be observed if nodes are aware of approximate position of intended destinations by some communication means such as GPS, GSM or WLAN access points. With the knowledge of nodes position in the network, high message directivity can be achieved by using simple concepts of direction vectors. Based on this observation, this research presents another new algorithm named as Location-aware opportunistic content forwarding (LOC). Last but not least, this research presents an orthodox yet unexplored approach for efficient message forwarding in Bluetooth communication environment, named as Hybrid Content Forwarding (HCF). The new approach combines the characteristics of social centrality based forwarding techniques used in opportunistic networks with traditional MANETs protocols used in Bluetooth scatternets. Simulation results show that a significant increase in delivery radio and cost reduction during content forwarding is observed by deploying these proposed algorithms. Also, comparison with existing technique shows the efficiency of using the new schemes

    Maximizing Routing Throughput with Applications to Delay Tolerant Networks

    Get PDF
    abstract: Many applications require efficient data routing and dissemination in Delay Tolerant Networks (DTNs) in order to maximize the throughput of data in the network, such as providing healthcare to remote communities, and spreading related information in Mobile Social Networks (MSNs). In this thesis, the feasibility of using boats in the Amazon Delta Riverine region as data mule nodes is investigated and a robust data routing algorithm based on a fountain code approach is designed to ensure fast and timely data delivery considering unpredictable boat delays, break-downs, and high transmission failures. Then, the scenario of providing healthcare in Amazon Delta Region is extended to a general All-or-Nothing (Splittable) Multicommodity Flow (ANF) problem and a polynomial time constant approximation algorithm is designed for the maximum throughput routing problem based on a randomized rounding scheme with applications to DTNs. In an MSN, message content is closely related to users’ preferences, and can be used to significantly impact the performance of data dissemination. An interest- and content-based algorithm is developed where the contents of the messages, along with the network structural information are taken into consideration when making message relay decisions in order to maximize data throughput in an MSN. Extensive experiments show the effectiveness of the above proposed data dissemination algorithm by comparing it with state-of-the-art techniques.Dissertation/ThesisDoctoral Dissertation Computer Science 201

    A Message Transfer Framework for Enhanced Reliability in Delay-and Disruption-Tolerant Networks

    Get PDF
    Many infrastructure-less networks require quick, ad hoc deployment and the ability to deliver messages even if no instantaneous end-to-end path can be found. Such networks include large-scale disaster recovery networks, mobile sensor networks for ecological monitoring, ocean sensor networks, people networks, vehicular networks and projects for connectivity in developing regions such as TIER (Technology and Infrastructure for Emerging Regions). These types of networks can be realized with delay-and disruption-tolerant network (DTN) technology. Generally, messages in DTNs are transferred hop-by-hop toward the destination in an overlay above the transport layer called the ''bundle layer''. Unlike mobile ad hoc networks (MANETs), DTNs can tolerate disruption on end-to-end paths by taking advantage of temporal links emerging between nodes as nodes move in the network. Intermediate nodes store messages before forwarding opportunities become available. A series of encounters (i.e., coming within mutual transmission range) among different nodes will eventually deliver the message to the desired destination. The message delivery performance (such as delivery ratio and delay) in a DTN highly depends on time elapsed between encounters (inter-contact time) and the time two nodes remain in each others communication range once a contact is established (contact-duration). As messages are forwarded opportunistically among nodes, it is important to have sufficient contact opportunities in the network for faster, more reliable delivery of messages. In this thesis, we propose a simple yet efficient method for increasing DTN performance by increasing the contact duration of encountered nodes (i.e., mobile devices). Our proposed sticky transfer framework and protocol enable nodes in DTNs to collect neighbors' information, evaluate their movement patterns and amounts of data to transfer in order to make decisions of whether to ''stick'' with a neighbor to complete the necessary data transfers. Nodes intelligently negotiate sticky transfer parameters such as stick duration, mobility speed and movement directions based on user preferences and collected information. The sticky transfer framework can be combined with any DTN routing protocol to improve its performance. Our simulation results show that the proposed framework can improve the message delivery ratio by up to 38% and the end-to-end message transfer delay by up to 36%

    Towards reliable video transmission over sparse MANETs in emergencies

    Get PDF
    Video delivery in a mobile ad-hoc network that can be deployed by members of an emergency service in an incident zone is an appealing tool for emergency and rescue services, but has not been studied yet. In order to design and test a suitable solution, we have generated realistic evaluation scenarios by modeling fireman action plans and GPS traces from real situations. We propose an overlay network solution with routing and reliability mechanisms. The Emergency Overlay Routing (EOR) protocol is a reactive protocol integrated into a store-carry-forward architecture. It selects ferry nodes to transport video data from a camera in the Incident Area to the Incident Chief’s node, looking for the minimum delay, but reliable, candidate. We also propose a simple credit based mechanism (RTCP+) to improve the communication reliability. The evaluation of the whole system shows a great improvement against previous results and promising expectations

    Towards reliable video transmission over sparse MANETs in emergencies

    Get PDF
    Video delivery in a mobile ad-hoc network that can be deployed by members of an emergency service in an incident zone is an appealing tool for emergency and rescue services, but has not been studied yet. In order to design and test a suitable solution, we have generated realistic evaluation scenarios by modeling fireman action plans and GPS traces from real situations. We propose an overlay network solution with routing and reliability mechanisms. The Emergency Overlay Routing (EOR) protocol is a reactive protocol integrated into a store-carry-forward architecture. It selects ferry nodes to transport video data from a camera in the Incident Area to the Incident Chief’s node, looking for the minimum delay, but reliable, candidate. We also propose a simple credit based mechanism (RTCP+) to improve the communication reliability. The evaluation of the whole system shows a great improvement against previous results and promising expectations

    Reliable Data Transmission in Challenging Vehicular Network using Delay Tolerant Network

    Get PDF
    In the 21st century, there has been an increasing tendency toward the wide adoption of wireless networks and technologies due to their significant advantages such as flexibility, mobility, accessibility, and low cost. Wireless technologies have therefore become essential factors in the improvement of intra-vehicle road safety in Vehicular Ad-hoc Network (VANET), which potentially reduce road traffic accidents by enabling efficient exchange of information between vehicles in the early stages. However, due to the inherent high mobility and rapid change of topology, there are numerous challenges in VANET. Hence, different software packages have been combined in this project to create the VANET environment, whereby the Objective Modular Network Testbed (OMNeT++) and the Simulation of Urban Mobility (SUMO), along with Vehicles in Network Simulation (VEINS) are integrated to model the VANET environment. Also, Delay Tolerant Network (DTN) are implemented in the Opportunistic Network Environment (ONE) simulator, where the Store-Carry-Forward technique is used to route traffic. When network resources are not limited, a high delivery ratio is possible. However, when network resources are scarce, these protocols will have a low delivery ratio and high overhead. Due to these limitations, in this research, an extensive performance evaluation of various routing protocols for DTN with different buffer management policies, giving insight into the impact of these policies on DTN routing protocol performance has been conducted. The empirical study gave insight into the strengths and limitations of the existing protocols thus enabling the selection of the benchmark protocols utilized in evaluating a new Enhanced Message Replication Technique (EMRT) proposed in this thesis. The main contribution of this thesis is the design, implementation, and evaluation of a novel EMRT that dynamically adjusts the number of message replicas based on a node's ability to quickly disseminate the message and maximize the delivery ratio. EMRT is evaluated using three different quota protocols: Spray&Wait, Encounter Based Routing (EBR), and Destination Based Routing Protocol (DBRP). Simulation results show that applying EMRT to these protocols improves the delivery ratio while reducing overhead ratio and latency average. For example, when combined with Spray&Wait, EBR, and DBRP, the delivery probability is improved by 13%, 8%, and 10%, respectively, while the latency average is reduced by 51%, 14%, and 13%, respectively

    An Overlay Routing Protocol for Video over sparse MANETs in Emergencies

    Get PDF
    Video delivery over a mobile ad-hoc network that can be deployed by members of an emergency service in an incident zone is an appealing tool for emergency and rescue services, but has not be studied yet. In order to design and test a suitable solution, we have generated realistic evaluation scenarios by modeling fireman action plans and GPS traces from real situations. The Emergency Overlay Routing (EOR) protocol is a reactive protocol integrated into a store-carry-forward architecture. It selects ferry nodes to transport video data from a camera in the Incident Area to the Incident Chief’s node, looking for the minimum delay, but reliable, candidate. The evaluation of EOR shows its superiority to the well-known DTN routing protocol, PROPHET, under this conditions

    Optimal Cluster Head in DTN Routing Hierarchical Topology (DRHT)

    Get PDF
    In delay tolerant networking (DTN), nodes are autonomous and behave in an unpredictable way. Consequently, a control mechanism of topology is necessary. This mechanism should ensure the overall connectivity of the network taking into account nodes’ mobility. In this paper, we study the problem of data routing with an optimal delay in the bundle layer, by exploiting: the clustering, the messages ferries and the optimal election of cluster head (CH). We first introduce the DTN routing hierarchical topology (DRHT) which incorporates these three factors into the routing metric. We propose an optimal approach to elect a CH based on four criteria: the residual energy, the intra-cluster distance, the node degree and the head count of probable CHs. We proceed then to model a Markov decision process (MDP) to decide the optimal moment for sending data in order to ensure a higher delivery rate within a reasonable delay. At the end, we present the simulation results demonstrating the effectiveness of the DRHT. Our simulation shows that while using the DRHT which is based on the optimal election of CH, the traffic control during the TTL interval (Time To Live) is balanced, which greatly increases the delivery rate of bundles and decreases the loss rate
    • …
    corecore