1 / 48

1 University of Delhi 2 University of Delhi 3 Ryerson University

Routing in Opportunistic Networks. Chapter 13: Routing Protocols in Infrastructure-less Opportunistic Networks Sanjay Kumar Dhurandher 1 , Deepak Kumar Sharma 2 , Isaac Woungang 3 ,and Shruti Bhati 1. 1 University of Delhi 2 University of Delhi 3 Ryerson University.

sal
Télécharger la présentation

1 University of Delhi 2 University of Delhi 3 Ryerson University

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Routing in Opportunistic Networks Chapter 13:Routing Protocols in Infrastructure-less Opportunistic NetworksSanjay Kumar Dhurandher1, Deepak Kumar Sharma2, Isaac Woungang3,and Shruti Bhati1 • 1University of Delhi • 2University of Delhi • 3 Ryerson University

  2. Opportunistic Networks(OppNets)Characteristics & Challenges • Opportunistic Network [1] is one of the most interesting and recent evolutions of Mobile Ad-hoc Networks (MANETs). • The traditional routing algorithms used for MANETs and Internet are not applicable here as they first establish a path between the source and the destination before the actual message transfer which is not possible in case of OppNets [2,3]. • They exhibit a store-carry and forward approach. If a suitable node is not found, the node simply stores the message and carries it through the network until a better node or destination is found [4,5].

  3. Opportunistic Networks(OppNets)Characteristics & Challenges (Contd.) • OppNets are enabled to deliver messages even when there is no connected path between the source and the destination. • One key characteristic of opportunistic networks is that they are essentially delay tolerant in nature asthey can handle large delays in message delivery from the source to the destination. • OppNets share similar routing algorithms as used in Delay Tolerant Networks [6,7]. • If a suitable node is not found, the node simply stores the message and carries it through the network until a better node or destination is found [5].

  4. Types of protocols for routing in OppNets • The routing protocols in OppNets are divided into two categories namely the infrastructure based and the infrastructure-less protocols [8] • Infrastructure based protocols: These protocols make use of some form of infrastructure to opportunistically forward messages. • Base stations and access points are often involved in the routing and forwarding of the messages. • Infrastructure-less protocols: These protocols are best suited for the flat ad-hoc networks. • They only make use of the mobility of the nodes and the contact opportunity between them in order to route the messages. • They make no previous assumptions about the network topology and all the nodes behave same in the network and are given the same priority

  5. OppNets Routing Protocols Direct Transmission [9]: • The source node does not forward the message to the intermediate nodes, but stores it in the buffer until it comes in direct contact with the destination node. • On encountering the destination node, the message is directly given to the destination. • Advantages • This protocol utilizes minimum network resources, and cannot suffer from the problems of network clogging. • The protocol is very simple and fairly easy to deploy. • Disadvantages • It is likely to suffer from heavy delays as source node may not encounter the destination node for longer period of times. • If a node failure occurs, the message can be lost since there is only one cope available in the network.

  6. Example scenario of Direct Transmission

  7. OppNets Routing Protocols (Contd.) First Contact [10]: • It is a routing scheme[10] that does not predict, utilize or assume any properties of the network or the nodes. • The carrier node forwards the message to any node that comes into contact with it. • Advantages • It does not make any assumptions about the network and thus can be implemented easily. • This scheme can be used for multicast messages. • Disadvantages • The scheme can lead to huge message delivery delays. • Indiscriminate spreading of messaging can lead to network clogging as well as packet dropping which are highly unacceptable

  8. Example Scenario of First Contact

  9. OppNets Routing Protocols (Contd.) Epidemic Protocol [11]: • This protocol [11] makes minimal assumptions about the network and is guaranteed to deliver the message to the destination. • It aims to distribute messages to other nodes within connected portions of the network. • These nodes then come into contact with another portion of the network and the message spreads like a disease (epidemic). • Advantages • The protocol makes minimum assumptions about the network topology and it is fairly easy to deploy and understand. • Out of all the opportunistic network protocols, epidemic has the least overhead in terms of calculations for determining the next hop. • The message delivery probability is very high in this protocol.

  10. OppNets Routing Protocols (Contd.) Epidemic Protocol [11]: • Disadvantages • The memory and resource consumption is very high in this protocol, as the message is passed to all the nodes indiscriminately. • Considerable amount of computation occurs at every node before exchanging the messages even in the case of nodes that might have the same messages. Hence some amount of memory is wasted. • Even when a message is received at the destination, some nodes still continue passing on the messages which wastes resources.

  11. Example Scenario of Epidemic Routing

  12. OppNets Routing Protocols (Contd.) Spray and wait [12]: • This protocol[12] is an extension to the epidemic routing protocol. • It aims to reduce the overhead of flooding which often causes network congestions and indiscriminate usage of the network resources. • One way of doing so is to only forward a copy with some probability. • The probability is the utility of every node based on the timer indicating the time elapsed since the two nodes last encountered the node maintaining the record. These are indirectly the relative node locations • There are two phases in the forwarding process – • Spray phase– Every message generated is spread randomly to L relay nodes i.e. L copies of message are created. • Wait phase– If the destination is not found in spray phase, the nodes then wait for direct transmission.

  13. OppNets Routing Protocols (Contd.) • Binary Spray and Wait– It is a variation of the spray and wait protocol. The source starts initially with L copies of the message. • The source or any relay node that has n>1 message copies hands over n/2 copies to any other node (without message copy) in the network and keeps the remaining copies n/2 with itself. • Advantages • The protocol reduces the memory inefficiencies of epidemic routing by limiting the amount of flooding caused in the network. • Disadvantages • Even though L is chosen to limit flooding, the protocol still suffers from delays and resource consumption issues. • The message delivery probability depends highly on the value of L chosen, which is assumed on the basis of the network parameters.

  14. Example Scenario of Spray and Wait

  15. OppNets Routing Protocols (Contd.) Spray and Focus [13]: • This protocol [13] overcomes the shortcomings of simple spraying algorithms and is better than the flooding. • The scheme again has two phases – • Spray phase– When a new message is generated at the source node, it creates L forwarding tokens for this message. • When a node meets another node with no message copy, the first node copies the message to the second node along with n/2 forwarding tokens. • When a node has only one forwarding token then it forwards the message according to the Focus phase. • Focus phase –Forwarding is done based on some criterion. These decisions are based on a set of timers that record the time since the two nodes last saw each other. Node i maintains a timer Ti(j) for every other node j which records time elapsed since the two nodes last saw each other.

  16. OppNets Routing Protocols (Contd.) Spray and Focus [13]: • Advantages • Owing to refined selection criterion, the protocol has higher message delivery rates. • Fewer copies are spread into the network as compared to the spray and wait protocol. • Disadvantages • The protocol suffers from a larger overhead of resource consumption. • Protocol suffers in case of sparse networks as the time taken by nodes to meet will be greater and there will be fewer opportunities to forward the data.

  17. OppNets Routing Protocols (Contd.) Adaptive Fuzzy Spray and Wait [14]: • This protocol [14] has been proposed as an improvement over the popular spray based routing schemes. • It smartly integrates the overheads and buffer management policies into an adaptive protocol that includes local network parameters estimation. • The algorithm can be summarized in the following few steps: • The node on encountering other nodes divides the values of L by 2 and updates it in the message before passing it on. • The node passes on all the copies to the nodes it encounters except the last copy which is passed on as direct transmission. • The messages in the buffer are sorted by a priority decided by a Fuzzy decision making function. • When the buffer is full, the messages are dropped according to the priority level i.e. the oldest first.

  18. OppNets Routing Protocols (Contd.) Adaptive Fuzzy Spray and Wait [14]: • Forward Transmission Count and Message Size are two indicators that help in determining the prioritization quantity. The dropping policy used for the algorithm is random instead of drop least priority scheme so that it remains fair to all the messages. • Advantages • The scheme has better delivery performance than simple spray based techniques. • Appropriate and fair buffer management schemes used in this protocol avoid the clogging of the network. • Disadvantages • Large messages might get delayed if there are a higher number of small messages. • If all the messages are of approximately the same size and a constant indicator of size is used, the size of message becomes irrelevant to priority

  19. OppNets Routing Protocols (Contd.) PRoPHET [15]: • Probabilistic Routing Protocol[15] using History of Encounters and Transitivity (PRoPHET) , assumes that instead of moving randomly the nodes in a network move in a predictable fashion wherein patterns are likely to repeat themselves. • This information can be used to improve the routing performance. • Each node before sending a message, calculates a probabilistic metric called Delivery Predictability for each known destination in form of vectors. • This Delivery Predictability is assumed to be P(a,b) {0,1} i.e. the probability of every node a to meet any other node b in the network.

  20. OppNets Routing Protocols (Contd.) PRoPHET [15]: • Advantages • Simulation results of this protocol show that it has less message exchanges, less communication overhead, less delay, and higher delivery success rate as compared to the epidemic routing. • The protocol is highly suited to human mobility scenarios. • Disadvantages • Resource consumption occurs in terms of calculations occurring at each node. • Memory is needed to store the probability tables generated by the protocol. • Packets may be dropped consistently when forwarded to a few concentrated nodes due to FIFO queuing nature of PRoPHET.

  21. OppNets Routing Protocols (Contd.) PRoPHET+ [16]: • This protocol [16] is an extension to the PRoPHET protocol that uses only delivery predictabilities of the nodes to decide the next best carrier for the message. • This scheme uses several other parameters such as Buffer, Power, Bandwidth, Location and Popularity into consideration to reduce the packet loss and transmission delay. • Advantages • Packet dropping and loss are significantly reduced as compared to PRoPHET by monitoring the power and popularity of the node. • The protocol takes into account several parameters other than delivery predictability which strengthens the best node probability. • Disadvantages • Too many calculations need to be done at each node. • Uncooperative nodes can cause a problem for the sender

  22. OppNets Routing Protocols (Contd.) HiBOp [17]: • The History Based Routing Protocol for Opportunistic Networks (HiBOp) [17] aims at effectively utilizing the context information of the node in order to decrease the overhead of flooding. • The Current Context (CC) of a user is a snapshot of the local environment of the user. • It is stored in the form of Identity Tables (ITs). • Every node also stores a History table that stores values from the ITs seen by the node in the past. • Every value has a Continuity Probability (Pc), Heterogeneity (H) and Redundancy (R) counters associated with them.

  23. OppNets Routing Protocols (Contd.) HiBOp [17]: • The forwarding process in HiBOp is made of three phases: • Emission Phase:HiBOp injects the message into the network through flooding to an appropriate number of nodes by creating message replicas for reliability. • The number of neighbors (K) to which the message is forwarded by the sender is calculated using a formula that takes into account the probability of delivering the message to the destination. • The value of K should be minimized in order to minimize the joint loss probability below a certain threshold. • Forwarding Phase: It uses the node’s mobility and contacts to take the message closer to the destination. • It uses two quantities .The forwarding of message to a certain node during its journey in the network is determined by the match between the sender information and the context information of the nodes. • Delivery predictability of a node is also taken into account before passing on the message. At each node the delivery probability is calculated using node IT, its CC and its History table.

  24. OppNets Routing Protocols (Contd.) HiBOp [17]: • Delivery Phase: When an intermediate node finds the destination, the message is delivered to it and the process stops. • Advantages • This protocol stores the largest amount of context information among all context base protocols, so it can fully exploit the advantages of context information. • The protocol is very suitable for human mobility models that generally follow a particular pattern. • The protocol reduces network clogging by drastically limiting the number of copies spread in the network. • Disadvantages • The IT, CC, History table and Repository table require a large amount of memory space on every node. • The calculations done every time at every node can significantly reduce the amount of time left for message exchange.

  25. OppNets Routing Protocols (Contd.) CEPMF [18]: • This protocol [18] uses the content of the messages to relay and deliver them to their destination. • The node that generates the messages is called the publisher and the node that wants a message similar in content to the message being sent is called subscriber. • If subscribers demand a message of a particular type of content, they spray the network with their interests all over the network in the form of predicates. • The entire protocol can be divided into two steps- • Predicate propagation: The subscriber spreads its interests into the network by spraying predicates. The Spray and Wait scheme is used for sending the predicates. • Message Forwarding: Each node has a table carrying the message and tagged to it epvalue. At source node the value is zero. • When a node transfers message to a node carrying the message’s epvalue in its table, the acknowledgement tells the source to stop sending until it is out of its range.

  26. OppNets Routing Protocols (Contd.) CEPMF [18]: • Advantages • The protocol can be safely used for multicast messaging situations. • It does not rely on the geographic location of the nodes and thus can be used in cases where GPS is not enabled. • Disadvantages • A node may still receive a particular message which it does not want, if its demands are partially similar to the predicates of the message. • There might be high privacy and rick issues associated with the content transparency.

  27. Example Scenario of CEPMF

  28. OppNets Routing Protocols (Contd.) Robust Proactive Routing Protocol [19]: • This protocol[19] has been proposed as a proactive scheme to deliver messages in the highly disconnected scenarios present in OppNets. • It is an adaptive protocol that uses the opportune contacts between the nodes to determine the neighborhood information for each node and use that to deliver the messages. • The basic principle is that a node can determine the predictability information and connectedness information using past history. • The nodes do not forward data randomly instead they have a well studied and selected next hop node.

  29. OppNets Routing Protocols (Contd.) Robust Proactive Routing Protocol [19]: • Advantages • The following protocol is suited to Human mobility models since it can show better results for predictable movement. • It reduces the overhead of flooding by limiting the next hop for node and only selects the best candidate. • Disadvantages • There is considerable overhead in exchanging and storing tables at each node.

  30. OppNets Routing Protocols (Contd.) Repository Based Forwarding Protocol [20]: • This protocol [20] makes distinction between the types of nodes in the network and uses them to deliver the message to its destination. • It argues that assuming all nodes to be Mobile Nodes is not correct in a model where nodes move in a predictable fashion (Human mobility model). • Some nodes are likely to be in a place more often than others. Hence commonly visited and shared location are assigned to be Fixed Nodes. • The Mobile Nodes are characterized by the mobility pattern which in turn has a strong impact on their performance. • Each node has a character table (CT) that defines the node’s home location, communication range, ID and type.

  31. OppNets Routing Protocols (Contd.) Repository Based Forwarding Protocol [20]: • When a node meets another node, they exchange their CT tables that describe their characteristics. • Depending on the type one of the nodes initiates the forwarding process. The forwarding process is further divided into two parts: • Message Dispatch: Node initiating communication sends all messages as type tsend either directly (to the target node itself) or indirectly (i.e. through a Fixed Node which eventually forwards it). • Message Collect: Node collects all the messages that have the target_ID set as the node itself. The status flag is checked to prevent from the same message being collected again • Advantages • Fixed nodes can decrease the delivery delays considerably. • Disadvantages • If fixed nodes fail, the entire network will be brought down

  32. OppNets Routing Protocols (Contd.) MaxProp [21]: • This protocol [21] assumes that it has no prior knowledge about the network connectivity and uses the local information and opportune movement to select the next best hop for the message delivery. • The protocol has three main components : • Estimating Delivery Likelihood: The protocol aims to find the optimal delivery paths by constructing a directed graph of nodes which are connected by edges [21]. • A variation of Dijkstra’s algorithm is used to determine the shortest path out of available paths at any given point of time. • Complementary Mechanisms:This step describes the priority order in which messages are exchanged when two nodes discover each other. • Managing Buffer: The protocol states that there is a difference between managing limited storage and limited transmission in that the packets sent once can be sent again.

  33. OppNets Routing Protocols (Contd.) MaxProp [21]: • Advantages • MaxProp uses Dijkstra’s algorithm to ensure that the lowest cost path is chosen so as to decreases the delivery latency. • Proper buffer management schemes lead to a lowered rate of packet dropping. • Disadvantages • The overhead of table exchange can decrease the effective time for message exchange. • The protocol is not suited for sparse networks, as it will not give a proper connected graph and thus will not satisfy the protocol criteria.

  34. OppNets Routing Protocols (Contd.) CAR [22]: • In this protocol[22] , the nodes are assumed to rely on their ‘logical connectivity information’ with other nodes. • They are not aware about the location of the nodes, which are the recipients of the messages they are carrying with them. • Proactive protocol such as DSDV [25] is used to deliver the messages if the recipient node belongs in the same cloud. • Otherwise, the relay nodes are chosen in such a manner that they present the highest delivery probabilities. • The process of prediction and evaluation of context takes care of following things. • Calculation of self delivery probabilities • Table • Local prediction of delivery probabilities at intervals • New message recipient • Message exchange

  35. OppNets Routing Protocols (Contd.) CAR [22]: • Advantages • The protocol is uninfluenced by the unavailability of GPS. • The proactive approach highly reduces the overhead of prediction calculation and can deliver message faster if dense networks are present. • Disadvantages • The overhead of table exchange, updating and maintenance can severely reduce the performance. • In absence of a proper buffer management scheme, the messages may be lost.

  36. OppNets Routing Protocols (Contd.) Meetings and Visits [23]: • This routing protocol [23] uses the same pair-wise message exchange principle as Epidemic Routing, but improves on the method used to determine which messages to transmit. • Instead of flooding its neighbors, each node uses observation data on the meetings between nodes and visits to locations (hence the name MV) to compute a delivery probability for every other node. • When two nodes meet, the summary vectors contain not only the message identifiers but also the computed delivery probability. • Nodes compare their own and their pair’s values, and only request messages for which their probability is higher.

  37. OppNets Routing Protocols (Contd.) Meetings and Visits [23]: • Advantages • The protocol is highly suited to human mobility scenarios as mobility patterns of nodes are stored for routing of the messages. • It uses the techniques from robotic control to obtain high-quality approximations for the optimal solution. • It also limits the number of hops that are required, by calculating an estimation of delivery likelihood assuming an infinite buffer at each peer. • Disadvantages • As it uses FIFO for buffer management at nodes, packets may get dropped consistently when forwarded to a concentrated node. • Considerable overhead occurs in storing the mobility pattern of nodes at regular time intervals.

  38. OppNets Routing Protocols (Contd.) Network Coding [24]: • This protocol[24] presents an approach in which a message is encoded into another format before transmission. • The intermediate nodes not only forward but also can combine packets using a given invertible function before forwarding to limit the message flooding. • At the receiver side, as compared to the replication based schemes which rely on successful delivery of each individual data block, this scheme consider the successful delivery of a block only when the necessary number of blocks is received to reconstruct the original data.

  39. OppNets Routing Protocols (Contd.) Network Coding [24]: • Advantages • This schemes is more robust against packet losses than replication based schemes when network connectivity is extremely poor, as it consider the successful delivery of a block only when the necessary number of blocks is received to reconstruct the original data. • The number of transmissions is reduced in this approach, and consequently the packet delivery ratio is much higher than the probabilistic forwarding both in dense mobile networks and sparse networks. • Disadvantages • When the network is well connected thisschemes is less efficient due to additional information embedded in the code blocks. • This method leads to additional processing power and memory requirements due to the encoding and decoding process.

  40. Tabular Comparison of various protocols

  41. Tabular Comparison of various protocols (contd.)

  42. Tabular Comparison of various protocols (contd.)

  43. Conclusion • In this chapter, we have given a brief outline of a number of routing protocols for infrastructure-less OppNets. • These protocols have been analyzed and compared on the basis of their advantages and disadvantages with respect to a variety of parameters. • This study leads to the identification of some critical and explicit characteristics of each protocol along with their areas of application. • A few main concerns that are reflected in almost all protocols are delivery latency, packet dropping and packet loss, memory management, computation and storage overhead. • The discussed protocols in this chapter implement different techniques to abate the inefficiencies caused due to these factors.

  44. References [1] L. Lilien, Z.H. Kamal, V. Bhuse, and A. Gupta, “Opportunistic Networks: The Concept and Research Challenges in Privacy and Security,” in Proceedings Of NSF Intl. Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN 2006), Miami, March 2006, pp. 134-147. [2] Charles E. Perkins and Elizabeth M. Royer, "Ad hoc On-Demand Distance Vector Routing", in Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90-100. [3] L-J. Chen, C. Hung Yu, C. Tseng, H. Chu, and C. Chou, “A Content-Centric Framework for effective Data Dissemination in Opportunistic networks”, IEEE Journal on selected Areas in Communications, vol: 26, Issue: 5, June 2008, pp. 761-772. [4] C.-M. Huang, K.-C. Lan, C.-Z, and Tsai, “A survey of opportunistic networks”, in proceedings of the 22nd Intl. Conference on Advanced Information Networking and Applications- workshops, 2008 (AINAW 2008), Okinawa, Japan, 25-28 March, 2008, pp. 1672-1677. [5] S. K. Dhurandher, D. K. Sharma, I. Woungang, and H.C. Chao, “Performance Evaluation of Various Routing Protocols in Opportunistic Networks”, in Proceedings of IEEE GLOBECOM Workshop 2011, Houston, Texas, USA , 5-9 December, 2011, pp. 1067-1071. [6] K. Fall, “A Delay-Tolerant Network Architecture for Challenged Internets”, in proceedings of ACM SIGCOMM 2003, Karlsruhe, Germany, 25-29 August, 2003, pp. 27-34. [7] Z. Zhang, “Routing in Intermittently Connected Mobile Ad Hoc Networks and Delay Tolerant Networks: Overview and Challenges”, IEEE Communications Surveys and Tutorials, Vol: 8, Issue: 1, 2006, pp. 24-37. [8] L. Pelusi, A. Passarella, and M. Conti, “Opportunistic networking: data forwarding in disconnected mobile ad hoc networks”, IEEE Communications Magazine, Vol: 44, Issue: 11, November 2006, pp. 134-141. [9] T. Spyropoulos, K. Psounis, and C. S. Raghavendra. “Single-copy routing in intermittently connected mobile Networks”. ”, in Proceedings of First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), Santa Clara, CA, USA, 4-7 Oct. 2004, pp. 235-244. [10] S. Jain, K. Fall, and R. Patra, “Routing in a Delay Tolerant Network”, in proceedings of ACM SIGCOMM 2004, Portland/ Oregon/ USA, 30 Aug.-3 Sept. 2004, pp. 145–158. [11] A. Vahdat, and D. Becker, “Epidemic routing for partially connected ad hoc networks”, Technical Report CS-2000-06, Dept. of Computer Science, Duke University, Durham, NC, 2000. [12] T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Spray and wait: An efficient routing scheme for intermittently connected mobile networks”, in proceedings of ACM SIGCOMM Workshop on Delay-Tolerant Networking (WDTN ’05), Philadelphia, PA, USA, 22-26 Aug. 2005, pp. 252–259. [13] T. Spyropoulos, K Psounis and C.S. Raghavendra, “Spray and Focus: Efficient Mobility-Assisted Routing for Heterogeneous and Correlated Mobility”, in proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW '07), White Plains, NY, 19-23 March 2007, pp. 79-85. [14] J. Makhlouta, H. Harkous, F. Hutayt and H. Artail. “Adaptive Fuzzy Spray and Wait: Efficient Routing for Opportunistic Networks”, in proceedings of IEEE International Conference on Selected Topics in Mobile and Wireless Networking( iCOST), Shanghai, China, 10-12 October, 2011, pp. 64 – 69. [15] A. Lindgren, A. Doria, and O. Schelen, “Probabilistic routing in intermittently connected networks”, ACM SIGMOBILE, Mobile Computing and Communications Review, Vol: 7, Issue: 3, July 2003, pp. 19–20.

  45. References (contd.) [16] Ting-Kai Huang, Chia-Keng Lee, Ling-Jyh Chen. “PRoPHET+: An Adaptive PRoPHET-Based Routing Protocol for Opportunistic Network”, in proceedings of24th IEEE International Conference on Advanced Information Networking and Applications (AINA 2010), Perth, Australia, 20-13 April 2010, pp. 112-119. [17] C. Boldrini, M. Conti, I. Iacopini and A. Passarella, “HiBOp: a History Based Routing Protocol for Opportunistic Networks”, in proceedings of IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks, 2007 (WoWMoM 2007), Espoo, Finland, 18-21 June 2007, pp. 1-12. [18] Y. Liu, J. Niu and J. Ma, “Content Encounter Probability Based Message Forwarding in Opportunistic Networks”, in proceedings of Ist IEEE International Conference on Information Science and Engineering (ICISE '09), Nanjing, 26-28 Dec. 2009, pp 2589-2594. [19] T. Kathiravelu, N. Ranasinghe and A. Pears, “A robust proactive routing protocol for intermittently connected opportunistic networks”, in proceedings of Seventh IEEE International Conference on Wireless And Optical Communications Networks (WOCN 2010), Colombo, Sri Lanka, 6-8 Sept. 2010, pp. 1-6. [20] A. Greede, S. M. Allen and R. M. Whitaker, “RFP: Repository Based Forwarding Protocol for Opportunistic Networks”, in proceedings of third Third International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST '09),  Cardiff, Wales, 15-18 Sept. 2009, pp 329-334. [21] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: Routing for vehicle-based disruption-tolerant networks”, in proceedings of 25th IEEE International Conference on Computer Communications (INFOCOM 2006), Barcelona, Spain, 23-29 April 2006, pp. 1–11. [22] M. Musolesi,S. Hailes and C. Mascolo, “Adaptive Routing for Intermittently Connected Mobile Ad Hoc Network”, in proceedings of Sixth IEEE International Symposium on World of Wireless Mobile and Multimedia Network (WOWMOM '05), Taormina-Giardini Naxos, Italy, 13-16 June 2005, pp 183-189. [23] B. Burns, O. Brock, and B. N. Levine, “MV Routing and Capacity Building in Disruption Tolerant Networks”, in proceedings of IEEE 24th Annual Joint Conference of the IEEE Computer andCommunications Societies (INFOCOM 2005) Vol: 1, Miami, FL, USA, 13-17 March 2005, pp. 398-408. [24] J. Widmer and J.-Y. Le Boudec, “Network Coding for Efficient Communication in Extreme Networks,” in Proceedings of ACM SIGCOMM workshop on Delay-tolerant networking, Philadelphia, PA, 22–26 Aug. 2005, pp. 284-291. [25] C. E. Perkins and P. Bhagwat, “Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers”, in proceedings of the ACM Conference on Communications Architecture, Protocols and Applications (SIGCOMM ‘94), London, England UK, 31 August - 02 September, 1994, pp. 234-244. [26] R. E. Kalman. “A new approach to linear filtering and prediction problems”, Transactions of the ASME – Journal of Basic Engineering, Vol: 82, No. (Series D), March 1960, pp. 35-45. [27] T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network research”, Wireless Communications & Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, Vol: 2, No. 5, 2002, pp. 483-502. [28] “Delay Tolerant Network Research Group (DTNRG)”, http://www.dtnrg.org/. [29] The CMU Monarch Project’s wireless and mobility extensions to ns-2. http://www.monarch.cs.rice.edu/cmu-ns.html. [30] A. Keranen, “ Opportunistic Network Environment Simulator”, Special Assignment Report, Helsinki University of Technology, Dept. of Communications and Networking, May 2008.

  46. References (contd.) [31] FransEkman, Ari Ker¨anen, JouniKarvo, and J¨orgOtt, “Working day movement model”, in proceeding of the 1st ACMSIGMOBILE workshop on Mobility models (MobiHoc 2008), Hong Kong SAR, China, 27 - 30 May, 2008, pp. 33–40. [32] James Scott, Richard Gass, Jon Crowcroft, Pan Hui, Christophe Diot, and AugustinChaintreau, “CRAWDAD data set cambridge/haggle (v. 2006-09-15)”, Downloaded from http://crawdad.cs.dartmouth.edu/cambridge/haggle, May, 2009. [33] OMNeT++, Downloaded from http://www.omnetpp.org/ [34] R. Barr, Z. J. Haas, and R. van Renesse, “Jist: An efficient approach to simulation using virtual machines”, Software Practice & Experience, John Wiley & Sons, Inc. New York, NY, USA,Vol: 35, Issue: 6, May 2005, pp 539-576. [35]M. Musolesi, S. Hailes, and C. Mascolo, “An ad hoc mobility model founded on social network theory”, in proceedings of 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems (MSWiM '04), Venice, Italy, 4 - 6 October, 2004, pp. 20-24.  [36] The Network Simulator (NS-2). www.isi.edu/nsnam/ns/ [37] T. Small and Z. J. Haas, “The Shared Wireless Infostation Model — A New Ad Hoc Networking Paradigm (or Where There is a Whale, there is a Way),” in proceedings Of 4th ACMInternational symposium on Mobile Ad Hoc Networking and Computing(MobiHoc 2003), Annapolis, MD,USA, 1–3 June, 2003, pp. 233-244. [38] David J. Goodman, Joan Borras, Narayan B. Mandayam and Roy D. Yates, “INFOSTATIONS: A New System Model for Data and Messaging Services,” IEEE Vehicular Technology Conference 1997( VTC’97), Vol: 2, May 1997, pp. 969–973. [39] S. Jain, R. C. Shah, W.Bbrunette, G. Borriello and S. Roy, “Exploiting Mobility for Energy Efficient Data Collection in Wireless Sensor Networks,” ACM/Kluwer Mobile Networks and Applications (MONET), Vol: 11, no. 3, June 2006, pp. 327–339. [40] W. Zhao, M. Ammar, and E. Zegura, “A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks,” in proceedings of 5th ACM Int’l. Symp. Mobile AdHoc Networking and Computing 2004 (MobiHoc ‘04), ACM Press, Tokyo, Japan, 24-26 May 2004, pp. 187–198. [41] Marco Conti and Mohan Kumar, “Opportunities in opportunistic computing” IEEE Computer Journals & Magazines, Vol: 43, Issue: 1, JANUARY 2010, pp. 42-50. [42] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott, “Impact of human mobility on the design of opportunistic forwarding algorithms” in proceedings of 25th IEEE International Conference on Computer Communications (INFOCOM 2006), Barcelona, Spain, 23-29 April, 2006, pp. 1-13. [43] L. Pelusi, A. Passarella, and M. Conti, "Encoding for Efficient Data Distribution in Multi-hop Ad hoc Networks" in Handbook of Wireless Ad hoc and Sensor Networks A. Boukerche, Editor, Wiley and Sons Publisher, 2007. [44] J. Yang, Y. Chen, M. Ammar, and C. Lee, "Ferry replacement protocols in sparse MANET message ferrying systems", in proceedings of IEEE Wireless Communications and Networking Conference, New Orleans, USA, 13-17 March 2005, pp. 2038 - 2044. [45] S. Merugu, M. Ammar, and E. Zegura, “Routing in space and time in networks with predictable mobility”, Technical Report GIT-CC 04-7, Georgia Institute of Technology, 2004.

  47. References (contd.) [46] M. Conti, J. Crowcroft, S. Giordano, P. Hui, H. A. Nguyen and A. Passarella, “Routing Issues in Opportunistic Networks”, MiNEMA State-of-the-Art Book, H. Miranda, L. Rodrigues, B. Garbinato Editors, Springer, 2009. [47] I. Woungang, M. K. Denko, "Credit-based Cooperation Enforcement Schemes Tailored to Opportunistic Networks", Chapter 3 in: M. Denko (Eds.), Mobile Opportunistic Networks: Architectures, Protocols and Applications, Auerbach Publications, Taylor & Francis Group, Boca Raton, Florida, ISBN: 978-142-008-812-0, ISBN 10: 142-008-812-2, 292 pages, 2011. [48] LeBrun, Chen-Nee Chuah, D. Ghosal, and M. Zhang, “Knowledge based opportunistic forwarding in vehicular wireless ad hoc networks”, in proceedings of 61st IEEE Vehicular Technology Conference (VTC 2005-Spring), 30 May-1 June 2005, pp. 2289–2293 Vol. 4. [49] J. Leguay, T. Friedman, and V. Conan, “Evaluating mobility pattern space routing for DTNs”, in proceedings of 25th IEEE International Conference on Computer Communications (INFOCOM 2006), Barcelona, Spain, 23- 29 April, 2006, pp. 1–10. [50] Chien-Shiu Lin, Wei-Shyh Chang, Ling-Jyh Chen, and Cheng-Fu Chou, “Performance study of routing schemes in delay tolerant networks”, in proceedings of the 22nd International Conference onAdvanced Information Networking and Applications – Workshops (AINAW ’08), Washington, DC, USA, 25-28 March 2008, pp. 1702–1707,

  48. Thanks for your attention!

More Related