Advertisement

EPR: An Encounter and Probability-Based Routing Protocol for Opportunistic Networks

  • Satya J. Borah
  • Sanjay Kumar Dhurandher
  • Pragya Kuchhal
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 18)

Abstract

In recent years, one of the most promising networks in the field of wireless communication is opportunistic network (OppNet). To transmit a data packet from the source to the destination in such a network is a challenging task. This is due to the absence of path, no network topology, and frequent network partitioning to name a few. So, by exploiting the node’s informative context informations, the researchers are trying to design routing protocols in OppNet. In this work the authors also try to design a routing protocol (so-called EPR): an encounter and probability-based routing protocol for OppNet based on the node’s context information such as number of times the carrier node encounters with the destination and its message delivery probability toward the destination. Further the obtained results are compared with the traditional routing protocols Prophet, HBPR, and EDR. From the obtained results, it has been observed that the proposed protocol EPR outperformed 25.24%, 19.74%, and 11.38% over EDR, HBPR, and Prophet, respectively, in terms of message delivery probability when number of nodes are being varied.

References

  1. 1.
    C.-K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems (Prentice Hall, Englewood Cliffs, 2002)Google Scholar
  2. 2.
    Y. Jennifer, B. Mukherjee, D. Ghosal, Wireless sensor network survey. Comput. Netw. 52(12), 2292–2330 (2008)CrossRefGoogle Scholar
  3. 3.
    A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, T.-W. Chen, Scalable routing strategies for ad hoc wireless networks. IEEE J. Sel. Areas Commun. 17, 1369–1379 (1999). Special Issue on Ad-Hoc NetworksGoogle Scholar
  4. 4.
    C.-M. Huang, K.-C. Lan, C.-Z, Tsai, A survey of opportunistic networks, in Proceedings of the 22nd International Conference on Advanced Information Networking and Applications – Workshops, 2008 (AINAW 2008), Okinawa, 25–28 Mar 2008, pp. 1672–1677Google Scholar
  5. 5.
    K. Fall, S. Farrell, DTN: an architectural retrospective. IEEE J. Sel. Areas Commun. 26(5), 828–836 (2008)CrossRefGoogle Scholar
  6. 6.
    WiFi, http://www.wifinotes.com. Last visited 13 June 2015
  7. 7.
    Bluetooth, The Bluetooth Specification. http://www.bluetooth.com/Pages/Bluetooth-Home.aspx. Last visited 13 June 2015
  8. 8.
    Celluler Networks, http://www.celluler.co.za/cellulernetworkoverview.html. Last visited 20 June 2011
  9. 9.
    A. Vahdat, D. Becker, Epidemic routing for partially connected ad hoc networks. Technical Report CS-2000-06, Department of Computer Science, Duke University, Durham, 2000Google Scholar
  10. 10.
    A. Lindgren, A. Doria, O. Schelen, Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(3), 19–20 (2003)CrossRefGoogle Scholar
  11. 11.
    S.K. Dhurandher, D.Kr. Sharma, I. Woungang, S. Bhati, HBPR: history based prediction for routing in infrastructureless opportunistic networks, in IEEE 27th International Conference on Advanced Information Networking and Applications, 2013Google Scholar
  12. 12.
    T. Spyropoulos, K. Psounis, C.S. Raghavendra, Spray and wait: an efficient routing scheme for intermittently connected mobile networks, in Proceedings of SIGCOMM Workshop on Delay-Tolerant Networking, Philadelphia, 22–26 Aug 2005, pp. 252–259Google Scholar
  13. 13.
    S.K. Dhurandher, S.J. Borah, M.S. Obaidat, Fellow of IEEE, D.Kr. Sharma, S. Gupta, B. Baruah, Probability-based Controlled flooding in opportunistic networks, in WINSYS 2015 International Conference on Wireless Information Networks and System, 20–22 July 2015, Colmar, pp. 3–8Google Scholar
  14. 14.
    S.K. Dhurandher, S.J. Borah, I. Woungang, D.K. Sharma, K. Arora, D. Agarwal, An encounter and distance based routing protocol for opportunistic networks, (Accepted 25 Jan 2016), in The 30th IEEE International Conference on Advanced Information Networking and Applications (AINA-2016), Crans-Montana, 23–25 Mar 2016 (to appear)Google Scholar
  15. 15.
    A. Keranen, Opportunistic Network Environment Simulator. Special Assignment Report, Helsinki University of Technology, Department of Communications and Networking, May 2008Google Scholar
  16. 16.
    A. Keranen, J. Ott, Increasing Reality for DTN Protocol Simulations. Special Technical Report, Helsinki University of Technology, Networking Laboratory, 2007Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Satya J. Borah
    • 1
  • Sanjay Kumar Dhurandher
    • 1
  • Pragya Kuchhal
    • 1
  1. 1.CAITFS, Division of Information Technology, Netaji Subhas Institute of TechnologyUniversity of DelhiNew DelhiIndia

Personalised recommendations