Multi Copy Routing Protocol for Self Adaptive Contention in Wireless Network

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 33 Number 2- March 2016
Multi Copy Routing Protocol for Self
Adaptive Contention in Wireless Network
Hanumantu VaraprasadaRao1, Konni Srinivasa Rao2
Final M. Tech Student1, Asst.professor2
1,2
Dept. of CSE, Sarada Institute of Science, Technology and Management (SISTAM), Srikakulam,
Andhra Pradesh
Abstract: Now a day’s delay tolerant network places
an important role in a mobile ad hoc network. By
implementing delay tolerant network which poses
completely different design scenario from that for
conventional mobile ad hoc network. Delay tolerant
network is characterized by lack of end to end path
for given node pair for extended periods. Due to the
intermittent connection in delay tolerant network, a
node is allowed buffer a message and wait until next
node is found to continuous storing and carrying the
message. In this paper we are proposed multi copy
routing protocol for finding routing of transferring
message and also maintain multi copies of
transferring message. By implementing this protocol
we can provide more efficiency for finding routing
and also maintain multi copy of transferring
message.
Keywords:
Delay tolerant network, routing,
efficiency, Multi copy routing.
I. INTRODUCTION
Delay tolerant networks (DTNs) [1] are mobile
wireless networks that experience frequent
partitions. In DTNs, there may never exist a fully
connected path from a source to a destination. The
basic assumption on stable end-to-end path of
routing protocols is invalid.Many real-world
network scenarios fall into this paradigm, such as
vehicular ad hoc networks [2], sensor networks for
wildlife tracking and habitat monitoring [3], pocket
switched networks [4], and mobile social networks
[5]. In DTNs, communication is mainly dependent
on the node mobility, which plays an important role
in overcoming the lack of end-to-end path. The
storage-carry-forward (SCF) routing paradigm is
used to deliver messages in the challenging
environments. Specifically, if a node receives a
message from an encountered node, it stores and
carries the message until another communication
opportunity arises. Depending on the method
whether the message carrier node keeps or removes
the forwarded message, there are two classes of
routing scheme in DTNs: single-copy routing [6]
and multiple-copy routing [7].
ISSN: 2231-5381
As the primary purpose of DTNrouting is to select
some proper relaying nodes to guarantee that the
message will be forwarded to the destination, the
DTN routing protocols usually use the multiple-copy
scheme to provide high delivery ratio. But the
multiple-copy schemes cause tremendous network
overheads. How to achieve high delivery ratio and
maintain low overheads at the same time is the most
important research issue for multiple-copy routing.
Moreover, the routing schemes are usually designed
only from the viewpoint of single message and do
not consider the problem of the usage of the whole
network resources. Many proposed routing schemes
for DTNs assume that nodes have infinite buffer
space and ignore the contention for buffer space in
network nodes. In practice, the nodes have limited
buffer space in many wireless networks. Even if a
node has large buffer space, it may share only a
limited small part with external traffic when acting
as a relaying node. Thus, how to manage buffer
space significantly affects the performance of
multiple-copy routing protocols, especially in the
environments where intermittent connectivity and
long latency require the data to be stored for a long
period throughout the network.
The rest of this paper is organized as follows.
Section 2 reviews the previous work on routing and
DTNs. Section 3 presents a multi copy routing
algorithm. Finally, Section 4 concludes the paper.
II. RELATED WORK
This section overviews state-of-the-art DTN routing
protocols issues.
2.1. Single-Copy Routing.
Direct transmission is the basic approach in singlecopy routing. The source node sends the message to
the destination node directly. Predict and relay
(PER) routing [9] used the probability distribution of
future contact times to choose the next relay node.
Recently, social characters have been explored to
design routing protocols in DTNs. MobySpace
routing [10] constructed a highdimensional
Euclidean space upon mobility patterns. The
http://www.ijettjournal.org
Page 74
International Journal of Engineering Trends and Technology (IJETT) – Volume 33 Number 2- March 2016
nodes that have themobility pattern similar to the
destination are appropriate to act as relay nodes.
SimBet [11] routing exploited ego-centric centrality
and its social similarity to choose the better carriers
for the final destination. In [12], social selfishness
was introduced into DTN routing and a social
selfishness aware routing (SSAR) algorithm was
proposed for the collaborative environment.
Whatever the routing metric used, however, singlecopy routing faces the reliability problem that the
message is not sent to its destination when the single
message copy is discarded by the relay node.
2.2. Multiple-Copy Routing.
The multiple-copy routing protocols inject multiple
copies of a message to provide reliable delivery. As
one of the earliest DTN routing protocols, the
epidemic routing [13] floods the message throughout
the network and thus greatly increases the message
delivery ratio. However, the node resources, such as
buffer space, bandwidth, and energy, seriously
restrain the epidemic routing performance. To
address this problem, many approaches have been
adopted to reduce the overheads and improve the
overall network performance. Based on the method
of controlling the overheads, the multiple-copy
routing schemes can be further separated into three
classes: coding-based [14–17], quota-based [18–20],
and utility-based [21–24]. In the coding-based
algorithms, a message is divided into a set of code
blocks. Destination node can reconstruct the original
message when it receives a sufficiently large number
of code blocks.
In [14],Wang et al. combined erasure coding and
replication-based routing schemes to increase the
network throughput. Tsapeli and Tsaoussidis [15]
combined the probabilistic routing with erasure
coding to enhance the robustness of the erasurecoding based forwarding in worst-case delays and
small-delay scenarios. In [17], Altman et al.
exploited linear block-codes and rate less random
linear coding to solve the problem of optimal
transmission and scheduling policies with two-hop
routing under memory and energy constraints. In the
quota-based routing schemes, the fixed number of
message copies is inserted into the network. Thus,
the constant overhead is maintained. Spyropoulos et
al. [18] proposed two different methods, that is,
Source Spray and Wait (SS&W) and Binary Spray
and Wait (BS&W), for allocating message copies. In
[19], Nelson et al. used the encounter based metric
for optimization of message allocation. Elwhishi
et al. [20] proposed a self-adaptive contention aware
routing protocol SAURP, which makes forwarding
decision based on the utility function value of the
encountered node regarding the destination and the
number of message copy tokens. In the utility-based
routing schemes, each node maintains a defined
ISSN: 2231-5381
utility for destination. The utility can be a function
of encounter history between nodes, node resources,
and so forth. Lindgren et al. [21] used the past
encounters to predict the probability of future
encounters. Grasic et al. [22] made a little
modification to the routing metric calculations in
Prophet which can improve its performance.
Ramanathan et al. [23] presented a variant of
epidemic routing PREP, which prioritizes messages
based on costs to destination, source, and expiry
time to decide whether the message is deleted or
reserved when it faced the situation of insufficient
resources. In [24], Bala subramanian et al. treated
DTN routing as a problem of resource allocation and
proposed a heuristic approach to maximize the
specified performance metrics, but it requires high
computation cost.
III. PROPOSED SYSTEM
In this a novel delay tolerant network called multi
copy routing protocol that aims to overcome
shortcomings of previously reported schemas. Our
goal is to achieve a superb applicability to the DTN
scenario with densely distributed hand-held devices.
The main feature of multi copy routing protocol is
the strong capability in adaptation to the fluctuation
of network status, traffic patterns/characteristics,
user encounter behaviours, and user resource
availability, so as to improve network performance
in terms of message delivery ratio, message delivery
delay.
The
parameters
include
link
quality/availability and buffer occupancy statistics,
which are obtained by sampling the channels and
buffer space during each contact with another node.
Novel transitivity update rule, which can perfectly
match with the proposed routing model and the
required design premises. Novel adaptive timewindow update strategy for maintaining the quality
metric function at each node, aiming at an efficient
and optimal decision making process for each active
data message. Hence shown via extensive
simulations that the proposed multi copy routing
protocol can achieve significant performance. The
implementation process of multi copy routing
protocol is as follows.
Node Initiation:
In this module each node will send request
for connecting to server and server will accept
request. After accepting request the server will
generate ID for each node and also randomly choose
channel capacity and signal strength of each node.
The server will send id and signal strength of each
node and also store those values. Here the channel
capacity and signal strength of each node can be
used for finding routing from source node to
destination node.
http://www.ijettjournal.org
Page 75
International Journal of Engineering Trends and Technology (IJETT) – Volume 33 Number 2- March 2016
Generation of Routing Matrix:
IV. CONCLUSIONS
In this module the server will generate routing
matrix for finding route form source node
destination node. The generation of routing matrix
can be done by using channel capacity (C) and
signal strength(S) of each node. The generation of
routing matrix can be done by using following
formulas.
Channel capacity= C1 +C2 +……+Ci
Signal strength=S1 +S2 +…….+Si
Total Capacity= Si+Ci
Cost matrix=total capacity-(Si +Ci)
Find routing from source node to destination node:
In this module the server will find out routing from
source to destination node by using routing matrix.
Finding routing from source node to destination
node the server will calculate maximum channel
capacity of each node and generate routing. By using
this path data can be send from source node to
destination node. Before transferring message from
source node to destination node the server will
identify correct routing and also identify failure
occur while transmitting message. By using
following verification rules we can identify correct
routing from source node to destination node.
Rules Verification:
To identify the correct routing and identify the
failures while transmission of data at port ends we
are following rules like forwarding rule, link rule
and drop rule.
Forwarding Rule: A forwarding rule is behaving
correctly if a test packet exercises the rule and leaves
on the correct port with the correct header.
Link Rule: A link rule is a special case of a
forwarding rule. It can be tested by making sure a
test packet passes correctly over the link without
header modifications.
Drop Rule: Testing drop rules are harder because we
must verify the absence of received test packets. We
need to know which test packets might reach an
egress test terminal if a drop rule was to fail.
By satisfying all rules the server will send message
through route nodes and reach the destination node.
In this process any rule is failed the server will stop
sending data from source node to destination. If all
the rules are satisfy the server will send message and
each node will maintain copy of message. So that by
implementing these concepts we can overcome all
existing problems and also improve the efficiency of
routing.
ISSN: 2231-5381
In this paper we are propose a novel delay tolerant
network called multi copy routing protocol for
finding routing for transferring message. By
implementing this protocol we can improve the
efficiency for finding routing of transferring and also
identify failures while transmitting data at port
ending. The main aim of multi copy routing protocol
is to explore the possibility of taking mobile nodes
as message carriers in order for end-to-end delivery
of the messages. The best carrier for a message is
determined by the prediction result using a novel
contact model, where the network status, including
wireless link condition and nodal buffer availability,
are jointly considered. To provide message carriers
from source node to destination the copy of message
also contain remaining nodes. So that we can
perform the multi coping of message for the reduce
single copy draw backs.
V. REFERENCES
[1] K. Fall, ―A delay-tolerant network architecture for challenged
internets,‖ in Proceedings of the Conference on Applications,
Technologies, Architectures, and Protocols for Computer
Communications (SIGCOMM ’03), pp. 27–34, ACM, Karlsruhe,
Germany, August 2003.
[2] K. K. Sevimli and M. Soyturk, ―Enabling delay-tolerant
communications for partially connected vehicular ad hoc
networks,‖ International Journal of Ad Hoc and Ubiquitous
Computing, vol. 11, no. 2-3, pp. 157–168, 2012.
[3] S. Ehsan, K. Bradford,M. Brugger et al., ―Design and analysis
of delay-tolerant sensor networks for monitoring and tracking
free-roaming animals,‖ IEEE Transactions on Wireless
Communications,
vol. 11, no. 3, pp. 1220–1227, 2012.
[4] P. Hui, A. Chaintreau, J. Scott,R.Gass, J. Crowcroft, andC.
Diot, ―Pocket switched networks and human mobility in
conference environments,‖ in Proceedings of the ACM
SIGCOMM Workshop
on Delay-Tolerant Networking (WDTN ’05), pp. 244–251, ACM,
Philadelphia, Pa, USA, August 2005.
[5] Y. Xie and G.Wang, ―Message matching-based greedy
behavior detection in delay tolerant networks,‖ Journal of
Computer and System Sciences, vol. 80, no. 5, pp. 903–915, 2014.
[6] T. Spyropoulos, K. Psounis, and C. S. Raghavendra, ―Efficient
routing in intermittently connected mobile networks: the singlecopy case,‖ IEEE/ACM Transactions on Networking, vol.
16, no. 1, pp. 63–76, 2008.
[7] T. Spyropoulos, K. Psounis, and C. S. Raghavendra, ―Efficient
routing in intermittently connected mobile networks: the multiplecopy case,‖ IEEE/ACM Transactions on Networking,
vol. 16, no. 1, pp. 77–90, 2008.
[8] Y. Liu, J. Wang, S. Zhang, and H. Zhou, ―A buffer
management scheme based on message transmission status in
delay tolerant networks,‖ in Proceedings of the IEEE Global
elecommunications
Conference (GLOBECOM’11), pp. 1–5, IEEE,Houston, Tex,
USA, December 2011.
http://www.ijettjournal.org
Page 76
International Journal of Engineering Trends and Technology (IJETT) – Volume 33 Number 2- March 2016
[9] Q. Yuan, I. Cardei, and J. Wu, ―An efficient prediction-based
routing in disruption-tolerant networks,‖ IEEE Transactions on
Parallel and Distributed Systems, vol. 23, no. 1, pp. 19–31, 2012.
[10] J. Leguay, T. Friedman, and V. Conan, ―DTN routing in a
mobility pattern space,‖ in Proceedings of the ACM SIGCOMM
Workshop on Delay-Tolerant Networking (WDTN ’05), pp. 276–
283, ACM, Philadelphia, Pa, USA, August 2005.
[11] E. M.Daly andM.Haahr, ―Social network analysis for routing
in disconnected delay-tolerant MANETs,‖ in Proceedings of the
8th ACM International Symposium on Mobile Ad Hoc Networking
and Computing (MobiHoc ’07), pp. 32–40, September 2007.
[12] Q. Li, W. Gao, S. Zhu, and G. Cao, ―A routing protocol for
socially selfish delay tolerant networks,‖ Ad Hoc Networks, vol.
10, no. 8, pp. 1619–1632, 2012.
[13] A. Vahdat and D. Becker, ―Epidemic routing for partially
connected ad hoc networks,‖ Tech. Rep. CS-200006, Duke
University, 2000.
[14] Y. Wang, S. Jain, M. Martonosi, and K. Fall, ―Erasurecoding based routing for opportunistic networks,‖ in Proceedings
of the ACM SIGCOMM Workshop on Delay-Tolerant Networking
(WDTN’05), pp. 229–236,ACM, Philadelphia, Pa, USA,August
2005.
[15] F. Tsapeli and V. Tsaoussidis, ―Routing for opportunistic
networks based on probabilistic erasure coding,‖ in
Wired/Wireless Internet Communication: 10th International
Conference, WWIC 2012, Santorini, Greece, June 6–8, 2012.
Proceedings, vol. 7277 of Lecture Notes in Computer Science, pp.
257–268, Springer,
Berlin, Germany, 2012.
[16] J. Widmer and J.-Y. Le Boudec, ―Network coding for
efficient communication in extreme networks,‖ in Proceedings of
the ACM SIGCOMM Workshop on Delay-Tolerant Networking
(WDTN ’05), pp. 284–291, August 2005.
[17] E. Altman, L. Sassatelli, and F. D. Pellegrini, ―Dynamic
control of coding for progressive packet arrivals in DTNs,‖ IEEE
Transactions on Wireles sCommunications, vol. 12,no. 2, pp.725–
735, 2013.
Mobile Systems, Applications and Services (MobiOpp’ 07), pp.
62–66, June 2007.
[24] A. Balasubramanian, B. N. Levine, and A. Venkataramani,
―Replication routing in DTNs: a resource allocation approach,‖
IEEE/ACM Transactions on Networking, vol. 18, no. 2, pp. 596–
609, 2010.
BIOGRAPHIES:
Hanumantu
VaraprasadaRao is student
in M. Tech(CSE) in Sarada
Institute
of
Science
Technology
and
Management, Srikakulam.
He has received his B.
Tech (IT) Prajna Institute
of
Technology and
Management, Ramakrishnapuram,palasa Srikakulam.
His interesting areas are network security and web
technologies
Konni SrinivasaRao is
working as an Assistant
Professor in Sarada
Institute of Science,
Technology
and
Management,
Srikakulam,
Andhra
Pradesh. He received his
M. Tech (cse) from
Pragati
engineering
college, Kakinada, East
Godavari, Andhra Pradesh. His research areas
include Network Security and Computer Networks
[18] T. Spyropoulos, K. Psounis, and C. S. Raghavendra, ―Spray
and wait: an efficient routing scheme for intermittently connected
mobile networks,‖ in Proceedings of the ACM Workshop on
Delay-Tolerant Networking (SIGCOMM’05), pp. 252–259, 2005.
[19] S. C. Nelson,M. Bakht, and R. Kravets, ―Encounter-based
routing inDTNs,‖ in Proceedings of the 28th Conference on
Computer Communications (INFOCOM ’09), pp. 846–854, IEEE,
April 2009.
[20] A. Elwhishi, P.-H.Ho, K. S. Naik, and B. Shihada, ―Selfadaptive contention aware routing protocol for intermittently
connected mobile networks,‖ IEEE Transactions on Parallel
andDistributed Systems, vol. 24, no. 7, pp. 1422–1435, 2013.
[21] A. Lindgren, A. Doria, and O. Schel´en, ―Probabilistic
routing in intermittently connected networks,‖ ACM SIGMOBILE
Mobile Computing and Communications Review, vol. 7, no. 3, pp.
19–20, 2003.
[22] S. Grasic, E. Davies, A. Lindgren, and A. Doria, ―The
evolution of a DTN routing protocol—PRoPHETv2,‖ in
Proceedings of the 6th ACMWorkshop on Challenged Networks
(CHANTS ’11), pp. 27–30, ACM, Las Vegas, Nev, USA,
September 2011.
[23] R. Ramanathan, R. Hansen, P. Basu, R. Rosales-Hain, and R.
Krishnan, ―Prioritized epidemic routing for opportunistic
networks,‖ in Proceedings of the 5th International Conference on
ISSN: 2231-5381
http://www.ijettjournal.org
Page 77
Download