SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
The International Journal Of Engineering And Science (IJES)
||Volume||2 ||Issue|| 12||Pages|| 01-10||2013||
ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805

Scheduling And Dropping Policies in Vehicular Delay Tolerant
Network
1,

Milind R. Penurkar , 2,Aditi B. Gajipara

1,2,Dept. of Information Technology MIT College of Engineering
Pune,India

----------------------------------------------------ABSTRACT-----------------------------------------------------: Vehicular Delay-Tolerant Networking (VDTN) is projected as a new alternative of a delay tolerant network
(DTN), designed for vehicular networks. The characteristic of VDTN are intermittent connectivity, high node
mobility and shorted contact duration. Due to this messages are sent with more amount of delay and still so
many of the messages are dropped. As VDTN networks are resource controlled, i.e. in terms of communication
bandwidth and storage space, main challenge is to have scheduling and dropping policies that can get better
overall performance of the network. This article investigates various scheduling and dropping policies in
different routing scheme. We also have developed some new policy and compared its performance with other
existing policies. It has been seen that our developed policies ought to give better results for an improved
network performance in terms of delivery ratio and average delivery delay.

KEYWORDS - Vehicular Delay Tolerant Networks; Delay-Tolerant Networks; Scheduling and Dropping
Policies
--------------------------------------------------------------------------------------------------------------------- -----------------Date of Submission: 22 November 2013
Date of Acceptance: 20 December 2013
-------------------------------------------------------------------------------------------------------------------------- ------------I.
INTRODUCTION
The delay-tolerant network (DTN)[1] comes under the category of challenged network. These networks
are presumed to experience sparse connectivity, no knowledge of end-to-end path, high latency, long transmission
delay, and asymmetric data rates. Basically DTN was conceptualizing for the handling of interplanetary
connectivity [3]. Now a day‟s DTN concepts are used at various scenarios like underwater networks [4], wildlife
tracking networks [5], people network [6] and military tactical networks [7].Delay Tolerant Networking is based
on Store-carry-and-forward routing principle. Figure 1 shows the comparison of TCP/IP model and DTN layered
architecture. For this there is a new concept introduce that is of bundle layer. Over here data units distributed in
this context, called bundles, are self-contained and application-level data units, which can often be large. The
bundle layer binds the region specific lower layer so that application programs can communicate across multiple
regions. The bundle layer stores and forwards entire bundle or bundle fragments among nodes.

Fig.1 Generic network architecture layers: TCP/IP and DTN
In VDTN movement of vehicle & their message relaying service is used to enable network connectivity
under unreliable condition. There are so many various routing algorithms have been developed for DTN‟s

www.theijes.com

The IJES

Page 1
Scheduling And Dropping Policies In Vehicular…
improved performance. Still there is not much focus on the scheduling of bundle and discarding policies. In
VDTN there is constraint on buffer size means there is limited buffer and there is very short contact duration. So
in available bandwidth it could be insufficient. Due to this we need efficient schedule policy to make a decision
about which message should be selected when limited bandwidth is there and which message should be dropped
when buffer is full, despite of any specific routing algorithm used. In this paper, we have studied the effect of
scheduling and dropping policies on the performance of VDTN networks. This paper widens groundwork about
the impact of scheduling and dropping policies with different routing algorithms for improving the bundles
delivery time on VDTNs [8]. The paper has been extended with the introduction of some new scheduling and
dropping policies, based on discrete criteria, and the performance assessment of the scheme through extensive
simulation in various scenarios.

II.

VEHICULAR DELAY-TOLERANT NETWORKS

The DTN architecture perception has also been extended to transit networks, called Vehicular Delay
Tolerant Network (VDTN). In VDTN vehicles (e.g., cars, buses, and boats) are oppressed to offer a message
relaying service by moving around the network and collecting messages from source nodes.

Fig.2 Example of a Vehicular Delay-Tolerant Network providing connection on rural and remote regions
The VDTN architecture is based on three different types of nodes as shown in Figure 2: Terminal
Nodes, Data Mules and Relay Nodes. Terminal nodes are access points to VDTN. They provide the connection
to end-users, and let them use non-real time applications. Among all the terminal nodes there is at least one node
may have direct access to the Internet. Data Mules (Mobile Ubiquitous LAN Extension) are liable for physically
carrying data between terminal nodes and they can exchange data with one another also. They extend the
network coverage and increase communication opportunities. Relay Nodes are the fixed devices with low power
needs and story-and-forward capabilities. Generally they are located at road intersections and allow the passing
Data Mules to collect and leave data on them.Most of the problems in vehicular networks arise from the
mobility and speed of vehicles that are responsible for a highly dynamic network topology and short contact
durations. Limited transmission ranges, radio obstacles due to physical factors (e.g., buildings, tunnels, terrain
and vegetation), and interferences (i.e., high congestion channels caused by high density of nodes), lead to
disruption, intermittent connectivity, and significant loss rates. All these conditions make vehicular networks
subject to frequent fragmentation/partition (i.e., end-to-end connectivity may not exist), resulting in small
effective network diameter.As DTN, VDTN also uses the store-carry-and-forward paradigm to cop up with the
problem of sparse connectivity. VDTN nodes store the message in their buffer while they are waiting for contact
opportunities to forward message to other node or to the terminal node (destination).

www.theijes.com

The IJES

Page 2
Scheduling And Dropping Policies In Vehicular…

Fig.3 DTN and VDTN network layer architecture
VDTN also defines bundle as its protocol data unit. VDTN architecture is different from DTN architecture as
shown in Figure 3. In VDTN architecture there is a clear separation between control plane and data plane. The
bundle layer is further divided into Bundle Aggregation and De-aggregation (BAD) Layer and Bundle Signaling
Control (BSC). BAD is located below the network layer in order to aggregate incoming IP data packets into
bundle messages. BSC is responsible for executing the control plane functions, such as signaling messages
exchange, node localization, resources reservation (at the data plane) and routing, among others. The signaling
messages include information such as, but not limited to, node type, geographical location, route, velocity, data
plane link range, power status, storage status, bundle format and size, delivery options, and security
requirements, among others.

III.

PROBLEM STATEMENT

VDTNs are exemplifying by very high node mobility, which results in frequent topological changes
and network partition. Due to that, the node density and the mobile nodes mobility pattern have a direct effect
over the transmission opportunities, contact durations, and inter contact times.Moreover, in such challenged
scenarios, long-term storage is frequently combined with replication based routing schemes [10]. By creating
several replicas of bundles and spread them across network improves delivery rate and decreases delivery
latency. But, in a resource constrained network, these techniques can cause contention for network resources
(e.g., bandwidth and storage), and can greatly influence the performance of routing protocols [11-13].
So we need more proficient scheduling policies to decide the order by which bundles can be transmitted at the
immediate contact opportunities, and efficient drop policies to decide which bundles are dropped when a node‟s
buffer is completely occupied. Though, scheduling policies and dropping policies play significant role in
improving the overall performance of any DTN-based network.Lindgren and Phanse [14] have compared the
performance of Epidemic [15] and PRoPHET [16] routing protocols by different combinations of queuing and
forwarding policies. They show that different schedule and drop policies leads to performance improvement of
routing algorithm.Krifa et al. [17] studied Epidemic routing. They propose an optimal buffer management
policy. This policy can either maximize the average delivery probability or minimize the average delivery delay.

IV. SCHEDULING AND DROPPING POLICIES
Each VDTN node must apply various queuing mechanism which is a part of the resource allocation
mechanism to manage in which way data bundle should be buffered, how they could accepted and how they
could –assed on.
.

www.theijes.com

The IJES

Page 3
Scheduling And Dropping Policies In Vehicular…

Fig.4 Illustration of a queuing discipline composed by a scheduling and a dropping policy.
As shown in Figure 4, the queuing discipline has both scheduled and drop policy. The scheduling policy decides
the order by which bundles are passing on at a contact opportunity. The dropping policy chooses bundles to be
discarded when buffer overflow occurs. This section describes various scheduling and dropping policies, and
make out some variation which can be applied to them. Their performance is evaluated and compared by the
simulation study in Section V.
A. Scheduling Policies
The following scheduling policies are considered and studied in this work.
FIFO: In this policy bundles are ordered to be transmitted at a contact opportunity, based on their arrival time at
the node‟s buffer (based on a FCFS (first-come, first-served) approach).
Random: The limitation of Vehicular Delay Tolerant Network is finite bandwidth and nodes are having limited
contact duration. Due to this issues FIFO approach may only serve bundles that arrived first to the node‟s buffer.
To avoid this situation, random scheduling policy is used. This selects bundles randomly within a queue.
B. Dropping Policies
The following dropping policies are considered in this work.
Drop Head: In Drop Head policy whatever bundle has been stored for the longest period of time in the node‟s
buffer has been discarded in this policy. Bundle/s have been dropped to create available apace for the next
incoming bundle.
Random: When a receiving buffer is congested, this dropping policy randomly selects one of the bundles within
a queue to be dropped.
We have introduced two new schedule and drop policy. This has been as follow.
Input: DTNHost
Output: Refreshed message list after drop
1:
3:
4:
5:
6:
7:
8:
9:

NODE_ENERGY(DTNHost H)
2: Define Threshold Energy TE
IF H‟s Current Energy is less than TE Call DROP()
ELSE Accept Message
DROP()
Define minttl // Threshold TTL
SCAN all the message in the list
CHECK If M starts with „G‟ then For All M starts with „G‟ find M which is having lowest TTL &
REMOVE it.
UPDATE Buffer Content

Algorithm 1. NODE_ENERGY Algorithm
Here, in Algorithm.1 we are giving DTNHost as an input parameter. Every time message exchange
occurs at that time we are checking the energy of the node. If the energy of node is higher threshold energy than
only node accepts the message and schedule it for forwarding else we go for drop policy. In drop policy we are
checking two parameters. First of all we are setting a value of minimum TTL.

www.theijes.com

The IJES

Page 4
Scheduling And Dropping Policies In Vehicular…
Then we check that from the list if incoming message is starting from G (General message) then from
all these messages whichever is having lowest TTL we will discard that message and at last we are updating the
buffer content. In Algorithm 2, we are scheduling the incoming messages on the basis of two parameters that
is buffer occupancy and priority. First we are checking the priority of the incoming message. Here, Accidental
message are having highest priority then Traffic messages are there and at last General messages are there which
are having the lowest priority. Then we check buffer occupancy. If there is free space then we accept the
message and schedule it for forwarding but, if not then we are using dropping policy. We call drop policy to
occupy the message with highest priority.In drop policy we are checking two parameters. First of all we are
setting a value of minimum TTL. Then we check that from the list if incoming message is starting from A
(Accidental message) then from all the messages which are general or traffic message we find whichever is
having lowest TTL. Then we will discard those messages until we can occupy higher prioritized message. At
last we are updating the buffer content.

Algorithm 2: SEND_QUEUE_BUFFER Algorithm
V. PERFORMANCE ANALYSIS
This section studies the effect of the above described scheduling and dropping policies on the
performance of a vehicular delay-tolerant network. The study was carrying out by simulation using a modified
version of the Opportunistic Network Environment (ONE) simulator [18]. ONE was modified to support the
VDTN layered architecture model proposed in [15]. Additional modules were developed to implement the
scheduling and dropping policies. Next subsections describe the simulation scenario and the corresponding
performance analysis.
A. Simulation Scenario Parameters
The simulation scenario is based on a map-based model of a part of the city of Helsinki presented in
Figure 4.). Mobile nodes (e.g. vehicles) move on the map roads between random locations, with random pause
times between 5 and 15 minutes. The mobile nodes average velocity is between 30 Km/h and 50 Km/h. Each of
the mobile nodes has buffer size of 25 Megabytes to 50 Megabytes. To increase the number of contact
opportunities, five stationary relay nodes were placed at the road as may be seen in Figure 6. Each stationary
relay node has a 500 Megabytes buffer.Data bundles are generated using an inter-bundle creation interval that is
uniformly distributed in the range of [10,30] (seconds), and have random source and destination vehicles.
Data bundles size is uniformly distributed in the range of [250 KB, 2 MB] (bytes). Bundles have a time-to-live
(TTL) 300 minutes, across the simulations, and are discarded when the TTL expires.

www.theijes.com

The IJES

Page 5
Scheduling And Dropping Policies In Vehicular…

Fig.5 Helsinki simulation scenario (area of 4500×3400 meters) with the locations of the stationary relay nodes.
Increasing TTL leads to having more bundles stored at the network nodes‟ buffers, and during larger
periods of time. Therefore, more bundles will be exchanged between network nodes, and this will also
potentially increase buffer overflows. All network nodes use a data plane link connection with a transmission
data rate of 4.5 Mbps and an omni-directional transmission range of 30 meters, as proposed in [19].Performance
metrics considered in this study are the bundle delivery probability (measured as the relation of the number of
unique delivered bundles to the number of bundles sent), as well as the bundle delivery delay (measured as the
time between bundles creation and delivery). We measure the different performance results for the combination
of the above-described scheduling and dropping policies.
B.

Performance Analysis for various Scenario
Results are based on following Important Metrics- (i) Contact opportunities, (ii) Delivery probability,
(iii) Delivery latency and (iv) Message TTL. Here in this graph, few transmission opportunities are registered
when two relay nodes are deployed in the network (Figure 6)

Fig.6 Number of contacts per hour between all network nodes.
Deploying more relay nodes augments the number of contact opportunities per hour among all network
nodes. Introducing ten relay nodes increases the number of contacts. This effect suggests that relay nodes will
contribute to increase in the number of messages exchanged between vehicles.

www.theijes.com

The IJES

Page 6
Scheduling And Dropping Policies In Vehicular…

Fig.7 Number of messages delivered in Epidemic Routing
Figure 7 shows that as we increases the TTL number of delivered messages increases. In Epidemic
routing we are using flooding mechanism. Over here random policy outperforms all other policy. After that
SEND_QUEUE_BUFFER and then NODE_ENERGY policy is there.

Fig.8 Number of messages delivered in FirstContact Routing
Figure 8 shows that in FirstContact routing NODE_ENERGY policy outstand all other policies. After
that SEND_OUEUE_BUFFER then FIFO and then Random schedule policy is there. Here we are getting 20%
better result compare to FIFO and Random scheduling policies.

www.theijes.com

The IJES

Page 7
Scheduling And Dropping Policies In Vehicular…

Fig.9 Number of messages delivered in Spray and Wait Routing
In Spray and Wait, as shown in Figure 9 the best results are of SEND_QUEUE_BUFFER. After that
NODE_ENERGY policy is there. Here these two policies‟ results are almost equivalent. After that random
policy is there and then FIFO is there.

Fig.10 Overhead for various scheduling policy in different routing algorithm
Figure 10 shows Overhead for all the Scheduling policies with different routing algorithm. As we can
see over here that there is highest amount of overhead in Epidemic routing as in Epidemic routing we are using
flooding strategy. Due to that there are number of replicas are there in the network even for a single message.
Random and FIFO are the in-build policies. Compare to that my implemented polices are showing less
overhead. Overall SEND_QUEUE_BUFFER policy is having 10% less overhead compare to random and FIFO.
While NODE_ENERGY is having overall 15% less overhead compare to all the policies.

www.theijes.com

The IJES

Page 8
Scheduling And Dropping Policies In Vehicular…

Fig.11 Average Latency for all scheduling policy with different routing algorithm.
The message average delay (Figure 11) is an interesting metric, since minimizing it reduces the time
that messages spend in the network and reduces the contention for resources in the network (e.g. buffer). All
routing protocols register similar values for the message average delay, and that relay nodes do not significantly
affect this metric.

VI. CONCLUSIONS AND FUTURE WORK
This paper focused on the impact of scheduling and dropping policies on the performance of vehicular
delay tolerant networks. This work tried to find a good alternative to the traditional FIFO scheduling with “drop
head” dropping policy, which would improve the VDTN network performance. In this context, several
combinations of scheduling and dropping policies were proposed, and their relative performance was analyzed
in terms of bundle delivery probability and average delivery delay. These policies were enforced on various
routing scheme. The simulation results reveal a good performance obtained by a combination of a scheduling
policy and a dropping policy that gives preferential treatment to bundles with less TTL and energy. It has been
shown that such an approach outperforms the commonly used FIFO scheduling and “drop head” buffer
management, in both performance metrics. This result was obtained and confirmed for all simulation scenarios.
For future work, we plan to investigate the use of scheduling and routing strategies based on geographical
information for VDTNs.

REFERENCES
[1]
[2]
[3]
[4]

[5]

[6]
[7]

[8]

[9]
[10]

V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss, "Delay-Tolerant Networking
Architecture," RFC 4838, April 2007, [Online]. Available: ftp://ftp.rfc-editor.org/in-notes/rfc4838.txt.
K. Fall and S. Farrell, "DTN: An Architectural Retrospective," IEEE Journal on Selected Areas in Communications, vol. 26, no.
5, June 2008.
S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst, K. Scott, and H. Weiss, "Delay-Tolerant Networking: An
Approach to Interplanetary Internet," in IEEE Communications Magazine, vol. 41, 2003, pp. 128-136.
J. Partan, J. Kurose, and B. N. Levine, "A Survey of Practical Issues in Underwater Networks," in 1st ACM International
Workshop on Underwater Networks, in conjunction with ACM MobiCom 2006, Los Angeles, California, USA, Sep. 25, 2006, pp.
17 - 24.
P. Juang, H. Oki, Y. Wang, M. Martonosi, L. S. Peh, and D. Rubenstein, "Energy-Efficient Computing for Wildlife Tracking:
Design Tradeoffs and Early Experiences with ZebraNet," ACM SIGOPS Operating Systems Review, vol. 36, no. 5, pp. 96-107,
2002.
N. Glance, D. Snowdon, and J.-L. Meunier, "Pollen: Using People as a Communication Medium," Computer Networks: The
International Journal of Computer and Telecommunications Networking, vol. 35, no. 4, pp. 429-442, March 2001.
T. Olajide and A. N. Washington, "Epidemic Modeling of Military Networks using Group and Entity Mobility Models," in 5th
International Conference on Information Technology :New Generations (ITNG 2008), Las Vegas, Nevada, USA, April 7-9,
2008, pp. 1303-1304.
V. N. G. J. Soares, J. J. P. C. Rodrigues, P. S. Ferreira, and A. Nogueira, "Improvement of Messages Delivery Time on Vehicular
Delay-Tolerant Networks," in The 38th International Conference on Parallel Processing (ICPP- 2009) Workshops - The Second
International Workshop on Next Generation of Wireless and Mobile Networks (NGWMN- 09), Vienna, Austria, September 2225, 2009.
T. Spyropoulos, K. Psounis, and C. S. Raghavendra, "Efficient Routing in Intermittently Connected Mobile Networks: The
Multiple-copy Case," IEEE/ACM Transactions on Networking (TON), vol. 16, no. 1, pp. 77-90, February 2008.
A. Balasubramanian, B. N. Levine, and A. Venkataramani, "DTN Routing as a Resource Allocation Problem," in ACM
SIGCOMM 2007, Kyoto, Japan, August 27-31, 2007, pp. 373-384.

www.theijes.com

The IJES

Page 9
Scheduling And Dropping Policies In Vehicular…
[11]
[12]

[13]

[14]
[15]
[16]

[17]
[18]

Z. Zhang, "Routing in Intermittently Connected Mobile Ad Hoc Networks and Delay Tolerant Networks: Overview and
Challenges," IEEE Communications Surveys & Tutorials, vol. 8, no. 1, pp. 24-37, 2006.
V. N. G. J. Soares, F. Farahmand, and J. J. P. C. Rodrigues, "Evaluating the Impact of Storage Capacity Constraints on Vehicular
Delay-Tolerant Networks," in The Second International Conference on Communication Theory, Reliability, and Quality of
Service (CTRQ 2009), Colmar, France, July 20-25, 2009, pp. 75-80.
A. Lindgren and K. S. Phanse, "Evaluation of Queueing Policies and Forwarding Strategies for Routing in Intermittently
Connected Networks," in First International Conference on Communication System Software and Middleware (COMSWARE
2006), Delhi, India, January 8-12, 2006, pp. 1-10.
A. Vahdat and D. Becker, "Epidemic Routing for Partially- Connected Ad Hoc Networks," Duke University, Technical Report
CS-2000-06, April, 2000.
A. Lindgren, A. Doria, E. Davies, and S. Grasic,"Probabilistic Routing Protocol for Intermittently Connected Networks," draftirtf-dtnrg-prophet-02, March 9, 2009, [Online]. Available: http://tools.ietf.org/html/draft-irtf-dtnrgprophet- 02.
A. Krifa, C. Barakat, and T. Spyropoulos, "Optimal Buffer Management Policies for Delay Tolerant Networks," in Fifth Annual
IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks – SECON 2008, San
Francisco, California, USA June 16-20, 2008, pp. 260-268.
A. Keränen, J. Ott, and T. Kärkkäinen, "The ONE Simulator for DTN Protocol Evaluation," in Second International Conference
on Simulation Tools and Techniques (SIMUTools 2009), Rome, March 2-6, 2009.
A. Keränen and J. Ott, "Increasing Reality for DTN Protocol Simulations," Helsinki University of Technology, Networking
Laboratory, Technical Report, July, 2007.

www.theijes.com

The IJES
10

Page

Contenu connexe

Tendances

ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSIJCNCJournal
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Publishing House
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSIJCNCJournal
 
Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...
Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...
Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...IJCNCJournal
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkIJCNCJournal
 
SSI Routing Scheme for Heterogeneous MANETs
SSI Routing Scheme for Heterogeneous MANETsSSI Routing Scheme for Heterogeneous MANETs
SSI Routing Scheme for Heterogeneous MANETsINFOGAIN PUBLICATION
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...ijctet
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETScseij
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106ijctet
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkEditor IJCATR
 
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...ijaia
 

Tendances (15)

ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKSENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
ENERGY EFFICIENT NODE RANK-BASED ROUTING ALGORITHM IN MOBILE AD-HOC NETWORKS
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
 
Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...
Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...
Peer to Peer Approach based Replica and Locality Awareness to Manage and Diss...
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
SSI Routing Scheme for Heterogeneous MANETs
SSI Routing Scheme for Heterogeneous MANETsSSI Routing Scheme for Heterogeneous MANETs
SSI Routing Scheme for Heterogeneous MANETs
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
C0351725
C0351725C0351725
C0351725
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...Investigation of Clock Synchronization Techniques and its Performance Impact ...
Investigation of Clock Synchronization Techniques and its Performance Impact ...
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
 
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
MULTI-OBJECTIVE OPTIMIZATION ASSISTED NETWORK CONDITION AWARE QOS-ROUTING PRO...
 

En vedette

D03310019025
D03310019025D03310019025
D03310019025theijes
 
H03202051073
H03202051073H03202051073
H03202051073theijes
 
C0212014018
C0212014018C0212014018
C0212014018theijes
 
F021203036039
F021203036039F021203036039
F021203036039theijes
 
B032107011
B032107011B032107011
B032107011theijes
 
G0324036043
G0324036043G0324036043
G0324036043theijes
 
I03202074078
I03202074078I03202074078
I03202074078theijes
 
A0331001008
A0331001008A0331001008
A0331001008theijes
 
C021201024030
C021201024030C021201024030
C021201024030theijes
 
E021203026035
E021203026035E021203026035
E021203026035theijes
 
I021201065070
I021201065070I021201065070
I021201065070theijes
 
D021201031040
D021201031040D021201031040
D021201031040theijes
 
F03302045050
F03302045050F03302045050
F03302045050theijes
 
C03202012017
C03202012017C03202012017
C03202012017theijes
 
C0324011015
C0324011015C0324011015
C0324011015theijes
 
H03302058066
H03302058066H03302058066
H03302058066theijes
 
A03210106
A03210106A03210106
A03210106theijes
 
J03202079086
J03202079086 J03202079086
J03202079086 theijes
 
G032030056067
G032030056067G032030056067
G032030056067theijes
 

En vedette (19)

D03310019025
D03310019025D03310019025
D03310019025
 
H03202051073
H03202051073H03202051073
H03202051073
 
C0212014018
C0212014018C0212014018
C0212014018
 
F021203036039
F021203036039F021203036039
F021203036039
 
B032107011
B032107011B032107011
B032107011
 
G0324036043
G0324036043G0324036043
G0324036043
 
I03202074078
I03202074078I03202074078
I03202074078
 
A0331001008
A0331001008A0331001008
A0331001008
 
C021201024030
C021201024030C021201024030
C021201024030
 
E021203026035
E021203026035E021203026035
E021203026035
 
I021201065070
I021201065070I021201065070
I021201065070
 
D021201031040
D021201031040D021201031040
D021201031040
 
F03302045050
F03302045050F03302045050
F03302045050
 
C03202012017
C03202012017C03202012017
C03202012017
 
C0324011015
C0324011015C0324011015
C0324011015
 
H03302058066
H03302058066H03302058066
H03302058066
 
A03210106
A03210106A03210106
A03210106
 
J03202079086
J03202079086 J03202079086
J03202079086
 
G032030056067
G032030056067G032030056067
G032030056067
 

Similaire à A02120201010

A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...inventionjournals
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...GiselleginaGloria
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...pijans
 
Data Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
Data Aggregation Routing Protocols in Wireless Sensor Networks : A TaxonomyData Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
Data Aggregation Routing Protocols in Wireless Sensor Networks : A TaxonomyIJCNCJournal
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
CONGESTION AWARE SPRAY AND WAIT PROTOCOL: A CONGESTION CONTROL MECHANISM FOR ...
CONGESTION AWARE SPRAY AND WAIT PROTOCOL: A CONGESTION CONTROL MECHANISM FOR ...CONGESTION AWARE SPRAY AND WAIT PROTOCOL: A CONGESTION CONTROL MECHANISM FOR ...
CONGESTION AWARE SPRAY AND WAIT PROTOCOL: A CONGESTION CONTROL MECHANISM FOR ...ijcsit
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...eSAT Journals
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...IOSR Journals
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015parry prabhu
 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...IJCNCJournal
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesijcsit
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)cscpconf
 
TRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLS
TRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLSTRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLS
TRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLSijwmn
 
TRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLS
TRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLSTRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLS
TRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLSijwmn
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
 

Similaire à A02120201010 (20)

A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
A Professional QoS Provisioning in the Intra Cluster Packet Level Resource Al...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
Analysis of Neighbor Knowledge Based Bcast Protocol Performance For Multihop ...
 
Data Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
Data Aggregation Routing Protocols in Wireless Sensor Networks : A TaxonomyData Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
Data Aggregation Routing Protocols in Wireless Sensor Networks : A Taxonomy
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
CONGESTION AWARE SPRAY AND WAIT PROTOCOL: A CONGESTION CONTROL MECHANISM FOR ...
CONGESTION AWARE SPRAY AND WAIT PROTOCOL: A CONGESTION CONTROL MECHANISM FOR ...CONGESTION AWARE SPRAY AND WAIT PROTOCOL: A CONGESTION CONTROL MECHANISM FOR ...
CONGESTION AWARE SPRAY AND WAIT PROTOCOL: A CONGESTION CONTROL MECHANISM FOR ...
 
Delay tolerant network routing protocol a comprehensive survey with hybrid...
Delay tolerant network routing protocol    a comprehensive survey with hybrid...Delay tolerant network routing protocol    a comprehensive survey with hybrid...
Delay tolerant network routing protocol a comprehensive survey with hybrid...
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015
 
Ttacca
TtaccaTtacca
Ttacca
 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
 
Mercury
MercuryMercury
Mercury
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
 
Clustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performancesClustering effects on wireless mobile ad hoc networks performances
Clustering effects on wireless mobile ad hoc networks performances
 
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
AN EFFICIENT ROUTING PROTOCOL FOR DELAY TOLERANT NETWORKS (DTNs)
 
TRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLS
TRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLSTRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLS
TRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLS
 
TRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLS
TRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLSTRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLS
TRANSMISSION POWER AND QUALITY OF SERVICE IN MANET ROUTING PROTOCOLS
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
 

Dernier

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Dernier (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

A02120201010

  • 1. The International Journal Of Engineering And Science (IJES) ||Volume||2 ||Issue|| 12||Pages|| 01-10||2013|| ISSN(e): 2319 – 1813 ISSN(p): 2319 – 1805 Scheduling And Dropping Policies in Vehicular Delay Tolerant Network 1, Milind R. Penurkar , 2,Aditi B. Gajipara 1,2,Dept. of Information Technology MIT College of Engineering Pune,India ----------------------------------------------------ABSTRACT-----------------------------------------------------: Vehicular Delay-Tolerant Networking (VDTN) is projected as a new alternative of a delay tolerant network (DTN), designed for vehicular networks. The characteristic of VDTN are intermittent connectivity, high node mobility and shorted contact duration. Due to this messages are sent with more amount of delay and still so many of the messages are dropped. As VDTN networks are resource controlled, i.e. in terms of communication bandwidth and storage space, main challenge is to have scheduling and dropping policies that can get better overall performance of the network. This article investigates various scheduling and dropping policies in different routing scheme. We also have developed some new policy and compared its performance with other existing policies. It has been seen that our developed policies ought to give better results for an improved network performance in terms of delivery ratio and average delivery delay. KEYWORDS - Vehicular Delay Tolerant Networks; Delay-Tolerant Networks; Scheduling and Dropping Policies --------------------------------------------------------------------------------------------------------------------- -----------------Date of Submission: 22 November 2013 Date of Acceptance: 20 December 2013 -------------------------------------------------------------------------------------------------------------------------- ------------I. INTRODUCTION The delay-tolerant network (DTN)[1] comes under the category of challenged network. These networks are presumed to experience sparse connectivity, no knowledge of end-to-end path, high latency, long transmission delay, and asymmetric data rates. Basically DTN was conceptualizing for the handling of interplanetary connectivity [3]. Now a day‟s DTN concepts are used at various scenarios like underwater networks [4], wildlife tracking networks [5], people network [6] and military tactical networks [7].Delay Tolerant Networking is based on Store-carry-and-forward routing principle. Figure 1 shows the comparison of TCP/IP model and DTN layered architecture. For this there is a new concept introduce that is of bundle layer. Over here data units distributed in this context, called bundles, are self-contained and application-level data units, which can often be large. The bundle layer binds the region specific lower layer so that application programs can communicate across multiple regions. The bundle layer stores and forwards entire bundle or bundle fragments among nodes. Fig.1 Generic network architecture layers: TCP/IP and DTN In VDTN movement of vehicle & their message relaying service is used to enable network connectivity under unreliable condition. There are so many various routing algorithms have been developed for DTN‟s www.theijes.com The IJES Page 1
  • 2. Scheduling And Dropping Policies In Vehicular… improved performance. Still there is not much focus on the scheduling of bundle and discarding policies. In VDTN there is constraint on buffer size means there is limited buffer and there is very short contact duration. So in available bandwidth it could be insufficient. Due to this we need efficient schedule policy to make a decision about which message should be selected when limited bandwidth is there and which message should be dropped when buffer is full, despite of any specific routing algorithm used. In this paper, we have studied the effect of scheduling and dropping policies on the performance of VDTN networks. This paper widens groundwork about the impact of scheduling and dropping policies with different routing algorithms for improving the bundles delivery time on VDTNs [8]. The paper has been extended with the introduction of some new scheduling and dropping policies, based on discrete criteria, and the performance assessment of the scheme through extensive simulation in various scenarios. II. VEHICULAR DELAY-TOLERANT NETWORKS The DTN architecture perception has also been extended to transit networks, called Vehicular Delay Tolerant Network (VDTN). In VDTN vehicles (e.g., cars, buses, and boats) are oppressed to offer a message relaying service by moving around the network and collecting messages from source nodes. Fig.2 Example of a Vehicular Delay-Tolerant Network providing connection on rural and remote regions The VDTN architecture is based on three different types of nodes as shown in Figure 2: Terminal Nodes, Data Mules and Relay Nodes. Terminal nodes are access points to VDTN. They provide the connection to end-users, and let them use non-real time applications. Among all the terminal nodes there is at least one node may have direct access to the Internet. Data Mules (Mobile Ubiquitous LAN Extension) are liable for physically carrying data between terminal nodes and they can exchange data with one another also. They extend the network coverage and increase communication opportunities. Relay Nodes are the fixed devices with low power needs and story-and-forward capabilities. Generally they are located at road intersections and allow the passing Data Mules to collect and leave data on them.Most of the problems in vehicular networks arise from the mobility and speed of vehicles that are responsible for a highly dynamic network topology and short contact durations. Limited transmission ranges, radio obstacles due to physical factors (e.g., buildings, tunnels, terrain and vegetation), and interferences (i.e., high congestion channels caused by high density of nodes), lead to disruption, intermittent connectivity, and significant loss rates. All these conditions make vehicular networks subject to frequent fragmentation/partition (i.e., end-to-end connectivity may not exist), resulting in small effective network diameter.As DTN, VDTN also uses the store-carry-and-forward paradigm to cop up with the problem of sparse connectivity. VDTN nodes store the message in their buffer while they are waiting for contact opportunities to forward message to other node or to the terminal node (destination). www.theijes.com The IJES Page 2
  • 3. Scheduling And Dropping Policies In Vehicular… Fig.3 DTN and VDTN network layer architecture VDTN also defines bundle as its protocol data unit. VDTN architecture is different from DTN architecture as shown in Figure 3. In VDTN architecture there is a clear separation between control plane and data plane. The bundle layer is further divided into Bundle Aggregation and De-aggregation (BAD) Layer and Bundle Signaling Control (BSC). BAD is located below the network layer in order to aggregate incoming IP data packets into bundle messages. BSC is responsible for executing the control plane functions, such as signaling messages exchange, node localization, resources reservation (at the data plane) and routing, among others. The signaling messages include information such as, but not limited to, node type, geographical location, route, velocity, data plane link range, power status, storage status, bundle format and size, delivery options, and security requirements, among others. III. PROBLEM STATEMENT VDTNs are exemplifying by very high node mobility, which results in frequent topological changes and network partition. Due to that, the node density and the mobile nodes mobility pattern have a direct effect over the transmission opportunities, contact durations, and inter contact times.Moreover, in such challenged scenarios, long-term storage is frequently combined with replication based routing schemes [10]. By creating several replicas of bundles and spread them across network improves delivery rate and decreases delivery latency. But, in a resource constrained network, these techniques can cause contention for network resources (e.g., bandwidth and storage), and can greatly influence the performance of routing protocols [11-13]. So we need more proficient scheduling policies to decide the order by which bundles can be transmitted at the immediate contact opportunities, and efficient drop policies to decide which bundles are dropped when a node‟s buffer is completely occupied. Though, scheduling policies and dropping policies play significant role in improving the overall performance of any DTN-based network.Lindgren and Phanse [14] have compared the performance of Epidemic [15] and PRoPHET [16] routing protocols by different combinations of queuing and forwarding policies. They show that different schedule and drop policies leads to performance improvement of routing algorithm.Krifa et al. [17] studied Epidemic routing. They propose an optimal buffer management policy. This policy can either maximize the average delivery probability or minimize the average delivery delay. IV. SCHEDULING AND DROPPING POLICIES Each VDTN node must apply various queuing mechanism which is a part of the resource allocation mechanism to manage in which way data bundle should be buffered, how they could accepted and how they could –assed on. . www.theijes.com The IJES Page 3
  • 4. Scheduling And Dropping Policies In Vehicular… Fig.4 Illustration of a queuing discipline composed by a scheduling and a dropping policy. As shown in Figure 4, the queuing discipline has both scheduled and drop policy. The scheduling policy decides the order by which bundles are passing on at a contact opportunity. The dropping policy chooses bundles to be discarded when buffer overflow occurs. This section describes various scheduling and dropping policies, and make out some variation which can be applied to them. Their performance is evaluated and compared by the simulation study in Section V. A. Scheduling Policies The following scheduling policies are considered and studied in this work. FIFO: In this policy bundles are ordered to be transmitted at a contact opportunity, based on their arrival time at the node‟s buffer (based on a FCFS (first-come, first-served) approach). Random: The limitation of Vehicular Delay Tolerant Network is finite bandwidth and nodes are having limited contact duration. Due to this issues FIFO approach may only serve bundles that arrived first to the node‟s buffer. To avoid this situation, random scheduling policy is used. This selects bundles randomly within a queue. B. Dropping Policies The following dropping policies are considered in this work. Drop Head: In Drop Head policy whatever bundle has been stored for the longest period of time in the node‟s buffer has been discarded in this policy. Bundle/s have been dropped to create available apace for the next incoming bundle. Random: When a receiving buffer is congested, this dropping policy randomly selects one of the bundles within a queue to be dropped. We have introduced two new schedule and drop policy. This has been as follow. Input: DTNHost Output: Refreshed message list after drop 1: 3: 4: 5: 6: 7: 8: 9: NODE_ENERGY(DTNHost H) 2: Define Threshold Energy TE IF H‟s Current Energy is less than TE Call DROP() ELSE Accept Message DROP() Define minttl // Threshold TTL SCAN all the message in the list CHECK If M starts with „G‟ then For All M starts with „G‟ find M which is having lowest TTL & REMOVE it. UPDATE Buffer Content Algorithm 1. NODE_ENERGY Algorithm Here, in Algorithm.1 we are giving DTNHost as an input parameter. Every time message exchange occurs at that time we are checking the energy of the node. If the energy of node is higher threshold energy than only node accepts the message and schedule it for forwarding else we go for drop policy. In drop policy we are checking two parameters. First of all we are setting a value of minimum TTL. www.theijes.com The IJES Page 4
  • 5. Scheduling And Dropping Policies In Vehicular… Then we check that from the list if incoming message is starting from G (General message) then from all these messages whichever is having lowest TTL we will discard that message and at last we are updating the buffer content. In Algorithm 2, we are scheduling the incoming messages on the basis of two parameters that is buffer occupancy and priority. First we are checking the priority of the incoming message. Here, Accidental message are having highest priority then Traffic messages are there and at last General messages are there which are having the lowest priority. Then we check buffer occupancy. If there is free space then we accept the message and schedule it for forwarding but, if not then we are using dropping policy. We call drop policy to occupy the message with highest priority.In drop policy we are checking two parameters. First of all we are setting a value of minimum TTL. Then we check that from the list if incoming message is starting from A (Accidental message) then from all the messages which are general or traffic message we find whichever is having lowest TTL. Then we will discard those messages until we can occupy higher prioritized message. At last we are updating the buffer content. Algorithm 2: SEND_QUEUE_BUFFER Algorithm V. PERFORMANCE ANALYSIS This section studies the effect of the above described scheduling and dropping policies on the performance of a vehicular delay-tolerant network. The study was carrying out by simulation using a modified version of the Opportunistic Network Environment (ONE) simulator [18]. ONE was modified to support the VDTN layered architecture model proposed in [15]. Additional modules were developed to implement the scheduling and dropping policies. Next subsections describe the simulation scenario and the corresponding performance analysis. A. Simulation Scenario Parameters The simulation scenario is based on a map-based model of a part of the city of Helsinki presented in Figure 4.). Mobile nodes (e.g. vehicles) move on the map roads between random locations, with random pause times between 5 and 15 minutes. The mobile nodes average velocity is between 30 Km/h and 50 Km/h. Each of the mobile nodes has buffer size of 25 Megabytes to 50 Megabytes. To increase the number of contact opportunities, five stationary relay nodes were placed at the road as may be seen in Figure 6. Each stationary relay node has a 500 Megabytes buffer.Data bundles are generated using an inter-bundle creation interval that is uniformly distributed in the range of [10,30] (seconds), and have random source and destination vehicles. Data bundles size is uniformly distributed in the range of [250 KB, 2 MB] (bytes). Bundles have a time-to-live (TTL) 300 minutes, across the simulations, and are discarded when the TTL expires. www.theijes.com The IJES Page 5
  • 6. Scheduling And Dropping Policies In Vehicular… Fig.5 Helsinki simulation scenario (area of 4500×3400 meters) with the locations of the stationary relay nodes. Increasing TTL leads to having more bundles stored at the network nodes‟ buffers, and during larger periods of time. Therefore, more bundles will be exchanged between network nodes, and this will also potentially increase buffer overflows. All network nodes use a data plane link connection with a transmission data rate of 4.5 Mbps and an omni-directional transmission range of 30 meters, as proposed in [19].Performance metrics considered in this study are the bundle delivery probability (measured as the relation of the number of unique delivered bundles to the number of bundles sent), as well as the bundle delivery delay (measured as the time between bundles creation and delivery). We measure the different performance results for the combination of the above-described scheduling and dropping policies. B. Performance Analysis for various Scenario Results are based on following Important Metrics- (i) Contact opportunities, (ii) Delivery probability, (iii) Delivery latency and (iv) Message TTL. Here in this graph, few transmission opportunities are registered when two relay nodes are deployed in the network (Figure 6) Fig.6 Number of contacts per hour between all network nodes. Deploying more relay nodes augments the number of contact opportunities per hour among all network nodes. Introducing ten relay nodes increases the number of contacts. This effect suggests that relay nodes will contribute to increase in the number of messages exchanged between vehicles. www.theijes.com The IJES Page 6
  • 7. Scheduling And Dropping Policies In Vehicular… Fig.7 Number of messages delivered in Epidemic Routing Figure 7 shows that as we increases the TTL number of delivered messages increases. In Epidemic routing we are using flooding mechanism. Over here random policy outperforms all other policy. After that SEND_QUEUE_BUFFER and then NODE_ENERGY policy is there. Fig.8 Number of messages delivered in FirstContact Routing Figure 8 shows that in FirstContact routing NODE_ENERGY policy outstand all other policies. After that SEND_OUEUE_BUFFER then FIFO and then Random schedule policy is there. Here we are getting 20% better result compare to FIFO and Random scheduling policies. www.theijes.com The IJES Page 7
  • 8. Scheduling And Dropping Policies In Vehicular… Fig.9 Number of messages delivered in Spray and Wait Routing In Spray and Wait, as shown in Figure 9 the best results are of SEND_QUEUE_BUFFER. After that NODE_ENERGY policy is there. Here these two policies‟ results are almost equivalent. After that random policy is there and then FIFO is there. Fig.10 Overhead for various scheduling policy in different routing algorithm Figure 10 shows Overhead for all the Scheduling policies with different routing algorithm. As we can see over here that there is highest amount of overhead in Epidemic routing as in Epidemic routing we are using flooding strategy. Due to that there are number of replicas are there in the network even for a single message. Random and FIFO are the in-build policies. Compare to that my implemented polices are showing less overhead. Overall SEND_QUEUE_BUFFER policy is having 10% less overhead compare to random and FIFO. While NODE_ENERGY is having overall 15% less overhead compare to all the policies. www.theijes.com The IJES Page 8
  • 9. Scheduling And Dropping Policies In Vehicular… Fig.11 Average Latency for all scheduling policy with different routing algorithm. The message average delay (Figure 11) is an interesting metric, since minimizing it reduces the time that messages spend in the network and reduces the contention for resources in the network (e.g. buffer). All routing protocols register similar values for the message average delay, and that relay nodes do not significantly affect this metric. VI. CONCLUSIONS AND FUTURE WORK This paper focused on the impact of scheduling and dropping policies on the performance of vehicular delay tolerant networks. This work tried to find a good alternative to the traditional FIFO scheduling with “drop head” dropping policy, which would improve the VDTN network performance. In this context, several combinations of scheduling and dropping policies were proposed, and their relative performance was analyzed in terms of bundle delivery probability and average delivery delay. These policies were enforced on various routing scheme. The simulation results reveal a good performance obtained by a combination of a scheduling policy and a dropping policy that gives preferential treatment to bundles with less TTL and energy. It has been shown that such an approach outperforms the commonly used FIFO scheduling and “drop head” buffer management, in both performance metrics. This result was obtained and confirmed for all simulation scenarios. For future work, we plan to investigate the use of scheduling and routing strategies based on geographical information for VDTNs. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss, "Delay-Tolerant Networking Architecture," RFC 4838, April 2007, [Online]. Available: ftp://ftp.rfc-editor.org/in-notes/rfc4838.txt. K. Fall and S. Farrell, "DTN: An Architectural Retrospective," IEEE Journal on Selected Areas in Communications, vol. 26, no. 5, June 2008. S. Burleigh, A. Hooke, L. Torgerson, K. Fall, V. Cerf, B. Durst, K. Scott, and H. Weiss, "Delay-Tolerant Networking: An Approach to Interplanetary Internet," in IEEE Communications Magazine, vol. 41, 2003, pp. 128-136. J. Partan, J. Kurose, and B. N. Levine, "A Survey of Practical Issues in Underwater Networks," in 1st ACM International Workshop on Underwater Networks, in conjunction with ACM MobiCom 2006, Los Angeles, California, USA, Sep. 25, 2006, pp. 17 - 24. P. Juang, H. Oki, Y. Wang, M. Martonosi, L. S. Peh, and D. Rubenstein, "Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet," ACM SIGOPS Operating Systems Review, vol. 36, no. 5, pp. 96-107, 2002. N. Glance, D. Snowdon, and J.-L. Meunier, "Pollen: Using People as a Communication Medium," Computer Networks: The International Journal of Computer and Telecommunications Networking, vol. 35, no. 4, pp. 429-442, March 2001. T. Olajide and A. N. Washington, "Epidemic Modeling of Military Networks using Group and Entity Mobility Models," in 5th International Conference on Information Technology :New Generations (ITNG 2008), Las Vegas, Nevada, USA, April 7-9, 2008, pp. 1303-1304. V. N. G. J. Soares, J. J. P. C. Rodrigues, P. S. Ferreira, and A. Nogueira, "Improvement of Messages Delivery Time on Vehicular Delay-Tolerant Networks," in The 38th International Conference on Parallel Processing (ICPP- 2009) Workshops - The Second International Workshop on Next Generation of Wireless and Mobile Networks (NGWMN- 09), Vienna, Austria, September 2225, 2009. T. Spyropoulos, K. Psounis, and C. S. Raghavendra, "Efficient Routing in Intermittently Connected Mobile Networks: The Multiple-copy Case," IEEE/ACM Transactions on Networking (TON), vol. 16, no. 1, pp. 77-90, February 2008. A. Balasubramanian, B. N. Levine, and A. Venkataramani, "DTN Routing as a Resource Allocation Problem," in ACM SIGCOMM 2007, Kyoto, Japan, August 27-31, 2007, pp. 373-384. www.theijes.com The IJES Page 9
  • 10. Scheduling And Dropping Policies In Vehicular… [11] [12] [13] [14] [15] [16] [17] [18] Z. Zhang, "Routing in Intermittently Connected Mobile Ad Hoc Networks and Delay Tolerant Networks: Overview and Challenges," IEEE Communications Surveys & Tutorials, vol. 8, no. 1, pp. 24-37, 2006. V. N. G. J. Soares, F. Farahmand, and J. J. P. C. Rodrigues, "Evaluating the Impact of Storage Capacity Constraints on Vehicular Delay-Tolerant Networks," in The Second International Conference on Communication Theory, Reliability, and Quality of Service (CTRQ 2009), Colmar, France, July 20-25, 2009, pp. 75-80. A. Lindgren and K. S. Phanse, "Evaluation of Queueing Policies and Forwarding Strategies for Routing in Intermittently Connected Networks," in First International Conference on Communication System Software and Middleware (COMSWARE 2006), Delhi, India, January 8-12, 2006, pp. 1-10. A. Vahdat and D. Becker, "Epidemic Routing for Partially- Connected Ad Hoc Networks," Duke University, Technical Report CS-2000-06, April, 2000. A. Lindgren, A. Doria, E. Davies, and S. Grasic,"Probabilistic Routing Protocol for Intermittently Connected Networks," draftirtf-dtnrg-prophet-02, March 9, 2009, [Online]. Available: http://tools.ietf.org/html/draft-irtf-dtnrgprophet- 02. A. Krifa, C. Barakat, and T. Spyropoulos, "Optimal Buffer Management Policies for Delay Tolerant Networks," in Fifth Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks – SECON 2008, San Francisco, California, USA June 16-20, 2008, pp. 260-268. A. Keränen, J. Ott, and T. Kärkkäinen, "The ONE Simulator for DTN Protocol Evaluation," in Second International Conference on Simulation Tools and Techniques (SIMUTools 2009), Rome, March 2-6, 2009. A. Keränen and J. Ott, "Increasing Reality for DTN Protocol Simulations," Helsinki University of Technology, Networking Laboratory, Technical Report, July, 2007. www.theijes.com The IJES 10 Page